Peer-to-peer: an overview Selo TE 2005. P2P is not a new concept P2P is not a new technology P2P is not a new technology Oct. 29 1969: first transmission.

Slides:



Advertisements
Similar presentations
Peer-to-peer: an overview of a disruptive technology Ana Preston Program Manager, International Internet2 TERENA Networking Conference.
Advertisements

Peer-to-peer and agent-based computing Peer-to-Peer Computing: Introduction.
Peer-to-Peer Computing Ding Choon Hoong Grid Computing and Distributed Systems (GRIDS) Lab. The University of Melbourne Melbourne, Australia
Jan 17, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements.
CompSci 356: Computer Network Architectures Lecture 21: Content Distribution Chapter 9.4 Xiaowei Yang
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Peer-to-Peer Networking By: Peter Diggs Ken Arrant.
Other File Systems: AFS, Napster. 2 Recap NFS: –Server exposes one or more directories Client accesses them by mounting the directories –Stateless server.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
1 Client-Server versus P2P  Client-server Computing  Purpose, definition, characteristics  Relationship to the GRID  Research issues  P2P Computing.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
CHAPTER 2: Introduction to Systems Concepts and Systems Architecture
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
CS 640: Introduction to Computer Networks Yu-Chi Lai Lecture 18 - Peer-to-Peer.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
Introduction Widespread unstructured P2P network Currently between 200,000 & 300,000 hosts Currently between 200,000 & 300,000 hosts Ideal as a research.
Cli/Serv.: JXTA/151 Client/Server Distributed Systems v Objective –explain JXTA, a support environment for P2P services and applications ,
Cmpe 494 Peer-to-Peer Computing Anıl Gürsel Didem Unat.

Cs423-cotter1 P2P Discovering P2P (Miller) Internet.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
Forensics Investigation of Peer-to- Peer File Sharing Networks Authors: Marc Liberatore, Robert Erdely, Thomas Kerle, Brian Neil Levine & Clay Shields.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
1 P2P Computing. 2 What is P2P? Server-Client model.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
Peer-to-Peer Networking. Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer.
1 A P2P Collaborative System Using JXTA Hosei Graduation School ITPC 02R3315 Katsuhiro CHIBA.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
 A P2P IRC Network Built on Top of the Kademlia Distributed Hash Table.
GNUTELLA PEER-TO-PEER NETWORKING. GNUTELLA n What is Gnutella n Relation to the World Wide Web n How it Works n Sites / Links / Information.
Peer-to-Pee Computing HP Technical Report Chin-Yi Tsai.
PSI Peer Search Infrastructure. Introduction What are P2P Networks? The term "peer-to-peer" refers to a class of systems and applications that employ.
The Start Shawn Fanning (19-yr-old student nicknamed Napster) developed the original Napster application and service in January 1999 while a freshman.
1 V1-Filename.ppt / / Jukka K. Nurminen Content Search UnstructuredP2P Content Search Unstructured P2P Jukka K. Nurminen *Partly adapted from.
1 Lecture # 21 Evolution of Internet. 2 Circuit switching network This allows the communication circuits to be shared among users. E.g. Telephone exchange.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
FastTrack Network & Applications (KaZaA & Morpheus)
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
P2P Computing MIRA YUN September 16, Outline What is P2P P2P taxonomies Characteristics Different P2P systems Conclusion.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 24 - Peer-to-Peer.
Peer-to-Peer and Collective Intelligence A platform for collaboration Andrew Roczniak Collective Intelligence Lab Multimedia Communications Research Lab.
APAN 2003 ConferenceInternet2 Status of the Internet2/P2P working group and present activities David Futey Stanford University January 24, 2003.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
11 January 2016 ¿Puede ser P2P una herramienta para la Ciencia y la Tecnología? P2P, tecnología disruptiva… Ana Preston Program Manager,
Peer to Peer Computing. What is Peer-to-Peer? A model of communication where every node in the network acts alike. As opposed to the Client-Server model,
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
Peer-to-Peer (P2P) Networks By Bongju Yu. Contents  What is P2P?  Features of P2P systems  P2P Architecture  P2P Protocols  P2P Projects  Reference.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
P2P Systems1 2. Peer-2-Peer Systems (1/14) 1.P2P Background a)What’s exciting? b)Historical P2P c)Modern P2P d)Why P2P? 2.P2P Environment a)Binding of.
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
Computer Networking Fundamentals
PEER-TO-PEER NETWORK FAMILIES
Building Distributed Educational Applications using P2P
Peer-to-peer networking
CHAPTER 3 Architectures for Distributed Systems
Peer-to-Peer Internet Networks
Distributed computing deals with hardware
Unexpected Peer-to-Peer
InfoShare A Distributed P2P Information Storage & Retrieval System
Presentation transcript:

Peer-to-peer: an overview Selo TE 2005

P2P is not a new concept P2P is not a new technology P2P is not a new technology Oct : first transmission UCLA  Stanford Research Inst. (SRI) [UCSB, U. Of Utah]; Peer computing status among independent computing sites Oct : first transmission UCLA  Stanford Research Inst. (SRI) [UCSB, U. Of Utah]; Peer computing status among independent computing sites 1970s-1980s: ARPANET completed (1978); Usenet and DNS 1970s-1980s: ARPANET completed (1978); Usenet and DNS 1990s: NSFnet and Internet explosion 1990s: NSFnet and Internet explosion 1996: ICQ (bypassing DNS by offering own addressing scheme and allowing end points to be directly addressable with each other) 1996: ICQ (bypassing DNS by offering own addressing scheme and allowing end points to be directly addressable with each other)

Frameworks simplest form.. simplest form.. Models: Centralized Decentralized Controlled-decentralized | Hybrids Components: client, server, servents Main differences: how information is shared and how much information is shared

Centralized: Napster Napster used centralized servers to keep a catalog of available files. Napster used centralized servers to keep a catalog of available files. 1. User sends out request Napster searches central database Search request 2. The central server sends back a list of available files for download Search response Napster server user 3. Requesting user downloads the file directly from another Napster user computer Download from user

Centralized: pros and cons More effective, comprehensive searches More effective, comprehensive searches Access is controlled Access is controlled System has single points of entry; one fails could bring whole system down System has single points of entry; one fails could bring whole system down Broken links, out of date information. Broken links, out of date information.

Decentralized every user acts as a client, a server or both (servent). every user acts as a client, a server or both (servent). User connects to framework and becomes a member of the community, allowing others to connect through him/her User connects to framework and becomes a member of the community, allowing others to connect through him/her Users speak directly to other users with no intermediate or central authority Users speak directly to other users with no intermediate or central authority Not one entity controls the information that passes through the community Not one entity controls the information that passes through the community

Decentralized: Pros and Cons Peers speak directly with no central authority. Nobody owns the Gnutella Network and nobody can shut it down. Peers speak directly with no central authority. Nobody owns the Gnutella Network and nobody can shut it down. Isolated node failure can quickly and automatically be worked around. Isolated node failure can quickly and automatically be worked around. Free loading Free loading Scalability Scalability Searches are less effective and can be slow. Searches are less effective and can be slow. Gnutella network evolving to include “controlled decentralization” (limewire, bearshare, toadnode) Gnutella network evolving to include “controlled decentralization” (limewire, bearshare, toadnode)

Hybrids: controlled decentralization Characteristics of both centralized and decentralized frameworks Characteristics of both centralized and decentralized frameworks User’s computer may act as client, a server or a servent; there are server operators which may control which clients and/or servents are allowed to access a particular server. User’s computer may act as client, a server or a servent; there are server operators which may control which clients and/or servents are allowed to access a particular server. Examples: Morpheus, Groove Examples: Morpheus, Groove

Key application/function areas File sharing / Content Distribution File sharing / Content Distribution Not just mp3s/media sharing ones Not just mp3s/media sharing ones Distributed searching: Used to easily lookup and share files and offer content management (NextPage) Distributed searching: Used to easily lookup and share files and offer content management (NextPage) Instant Messaging Instant Messaging Jabber, IM Jabber, IM Distributed Computation: Distributed Computation: Use under utilized Internet and/or network resources for improving computation and data analysis Use under utilized Internet and/or network resources for improving computation and data analysis

Key application/function areas P2P groupware / Collaboration P2P groupware / Collaboration Cooperative publishing, messaging, group project management. Secure environments are offered in some products Cooperative publishing, messaging, group project management. Secure environments are offered in some products Development Frameworks; Development tools and suites Development Frameworks; Development tools and suites Project JXTA (Sun),.NET (Microsoft) Project JXTA (Sun),.NET (Microsoft) [See 2002 P2P Networking Overview Also see: ]

Classifying p2p… Another classification of p2p applications according to function and audience (Burton Group)