Gnutella2: A Better Gnutella?

Slides:



Advertisements
Similar presentations
Peer-to-peer and agent-based computing P2P Algorithms.
Advertisements

Peer-to-Peer and Social Networks An overview of Gnutella.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
INF 123 SW ARCH, DIST SYS & INTEROP LECTURE 12 Prof. Crista Lopes.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
University of Cincinnati1 Towards A Content-Based Aggregation Network By Shagun Kakkar May 29, 2002.
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
Gnutella 2 GNUTELLA A Summary Of The Protocol and it’s Purpose By
Peer-to-Peer Networks João Guerreiro Truong Cong Thanh Department of Information Technology Uppsala University.
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
1 Unstructured Routing : Gnutella and Freenet Presented By Matthew, Nicolai, Paul.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
Gnutella, Freenet and Peer to Peer Networks By Norman Eng Steven Hnatko George Papadopoulos.
A Distributed Search Service for Peer-to-Peer File Sharing in Mobile Application Presented by Tony Sung On Loy, MC Lab, CUHK IE 1 A Distributed Search.
Internet Networking Spring 2002 Tutorial 13 Web Caching Protocols ICP, CARP.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
1 CCNA 2 v3.1 Module 8. 2 TCP/IP Suite Error and Control Messages CCNA 2 Module 8.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
Improving Data Access in P2P Systems Karl Aberer and Magdalena Punceva Swiss Federal Institute of Technology Manfred Hauswirth and Roman Schmidt Technical.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
P2P File Sharing Systems
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Peer-to-Peer Computing CS587x Lecture Department of Computer Science Iowa State University.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
Unstructured P2P networks by example:Gnutella 0.4,Gnutella 0.6 张旭彤 杨蕊鸿 马骕 林晔.
1 Reading Report 4 Yin Chen 26 Feb 2004 Reference: Peer-to-Peer Architecture Case Study: Gnutella Network, Matei Ruoeanu, In Int. Conf. on Peer-to-Peer.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Jonathan Walpole CSE515 - Distributed Computing Systems 1 Teaching Assistant for CSE515 Rahul Dubey.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
Mapping the Gnutella Network Presented By: Tony Young M.Math Candidate October 7th, 2004.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Quantitative Evaluation of Unstructured Peer-to-Peer Architectures Fabrício Benevenuto José Ismael Jr. Jussara M. Almeida Department of Computer Science.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
PEER TO PEER (P2P) NETWORK By: Linda Rockson 11/28/06.
P2PComputing/Scalab 1 Gnutella and Freenet Ramaswamy N.Vadivelu Scalab.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
HTTP evolution - TCP/IP issues Lecture 4 CM David De Roure
6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Peer to Peer Network Design Discovery and Routing algorithms
Evaluation GUESS and Non-Forwarding Peer-to-Peer search ICDCS paper Beverly Yang Patrick Vinograd Hector Garcia-Molina Computer Science Department, Stanford.
A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks E. Damiani S. De Capitani di Vimercati S. Paraboschi P. Samarati F.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
CS 347Notes081 CS 347: Parallel and Distributed Data Management Notes 08: P2P Systems.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
Skype.
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 24 – Introduction to Peer-to-Peer (P2P) Systems Klara Nahrstedt (presented by Long Vu)
Distributed Web Systems Peer-to-Peer Systems Lecturer Department University.
BitTorrent Vs Gnutella.
Introduction to Networking
Peer-to-Peer and Social Networks
Internet Networking recitation #12
Presentation by Theodore Mao CS294-4: Peer-to-peer Systems
Unstructured Routing : Gnutella and Freenet
The BitTorrent Protocol
Presentation transcript:

Gnutella2: A Better Gnutella? COMP 5204: Data Networks Julie Thorpe School of Computer Science Carleton University

Introduction Gnutella and Gnutella2 are P2P application protocols. Gnutella has an interesting history – essentially a reverse engineered Beta version. Changes governed by Gnutella Developers Forum (GDF). Gnutella2 is a completely different protocol than Gnutella, claiming it's what Gnutella should have been. The GDF reject this claim, and refuse to call Gnutella2 by its name – they instead call it “Mike's Protocol”. Unclear whether Gnutella2 better than Gnutella. My project goal is to compare these protocols to determine which is theoretically better. Now that you've seen the quick overview of what our paper is about, the remainder of the presentation will provide the following: A brief review of the graphical password scheme we examined – Draw-A-Secret (DAS), proposed by Jermyn et al in 1999. ... And finally, we'll discuss results from more recent follow-up work we've been doing since the submission of the paper you'll find in the conference proceedings.

Presentation Outline Gnutella review Gnutella's problems Comparison: Network architecture Searching algorithms Cooperation incentives Security Concluding remarks Now that you've seen the quick overview of what our paper is about, the remainder of the presentation will provide the following: A brief review of the graphical password scheme we examined – Draw-A-Secret (DAS), proposed by Jermyn et al in 1999. ... And finally, we'll discuss results from more recent follow-up work we've been doing since the submission of the paper you'll find in the conference proceedings.

Gnutella Review (1) Purely decentralized, simple protocol for file sharing. Runs over TCP/IP connections. New node enters Gnutella network by connecting to a known server (sends Ping), and when server responds (sends Pong) they are now connected peers. Learns of other nodes if server forwards Ping to its peers (and gets a Pong back in response). Now that you've seen the quick overview of what our paper is about, the remainder of the presentation will provide the following: A brief review of the graphical password scheme we examined – Draw-A-Secret (DAS), proposed by Jermyn et al in 1999. ... And finally, we'll discuss results from more recent follow-up work we've been doing since the submission of the paper you'll find in the conference proceedings.

Gnutella Review (2) Has no way to advertise files. Peers find files by “flooding” with query requests (stop after TTL hops). Query responses are routed back along the same path as the request arrived upon. Addressed by GUIDs. Now that you've seen the quick overview of what our paper is about, the remainder of the presentation will provide the following: A brief review of the graphical password scheme we examined – Draw-A-Secret (DAS), proposed by Jermyn et al in 1999. ... And finally, we'll discuss results from more recent follow-up work we've been doing since the submission of the paper you'll find in the conference proceedings.

Gnutella's Problems Scalability. Performance. Lack of cooperation incentives. Abuse by servents (Gnutella client/server program). Now that you've seen the quick overview of what our paper is about, the remainder of the presentation will provide the following: A brief review of the graphical password scheme we examined – Draw-A-Secret (DAS), proposed by Jermyn et al in 1999. ... And finally, we'll discuss results from more recent follow-up work we've been doing since the submission of the paper you'll find in the conference proceedings.

Gnutella's Problems - Scalability For a node to be reached by a query, it (and all other nodes on the path to it) must be forwarded the request! The reach is determined by n (# connections to other hosts) and TTL (# hops each request is permitted to take): Assumption: nodes all have the same n and TTL. Ritter [1] estimated that for reasonable parameters, to achieve a reach of 106 nodes, Gnutella nodes must have a bandwidth between 19.2 and 64 Gbps! Now that you've seen the quick overview of what our paper is about, the remainder of the presentation will provide the following: A brief review of the graphical password scheme we examined – Draw-A-Secret (DAS), proposed by Jermyn et al in 1999. ... And finally, we'll discuss results from more recent follow-up work we've been doing since the submission of the paper you'll find in the conference proceedings.

Gnutella's Problems - Performance Messages are forwarded through many other peers on the network. Connection speeds are effectively restricted to the bandwidth of the slowest peer along the route. If A and B have high-speed connections, and C has a modem connection, the download rate between A and B is limited to C's speed. Now that you've seen the quick overview of what our paper is about, the remainder of the presentation will provide the following: A brief review of the graphical password scheme we examined – Draw-A-Secret (DAS), proposed by Jermyn et al in 1999. ... And finally, we'll discuss results from more recent follow-up work we've been doing since the submission of the paper you'll find in the conference proceedings.

Gnutella's Problems – Lack of Cooperation Incentives One study found that over 70% of users shared no files, and 50% of all responses are returned by the top 1% [2] . Implications of free-riders on Gnutella: Increased search horizon (farthest set of hosts reachable by a search request, directly related to its TTL). The top 1% that is providing most files reaches connection saturation. This generally a difficult problem to solve for purely decentralized systems. Now that you've seen the quick overview of what our paper is about, the remainder of the presentation will provide the following: A brief review of the graphical password scheme we examined – Draw-A-Secret (DAS), proposed by Jermyn et al in 1999. ... And finally, we'll discuss results from more recent follow-up work we've been doing since the submission of the paper you'll find in the conference proceedings.

Gnutella's Problems – Abuse by Servents Since it's a protocol, implementations can implement the Gnutella protocol as they please (in theory). Servents can act selfishly to improve their performance Increasing TTL to increase search horizon (generating geometrically higher # messages). Frequent re-querying (generating more messages, degrading network). Now that you've seen the quick overview of what our paper is about, the remainder of the presentation will provide the following: A brief review of the graphical password scheme we examined – Draw-A-Secret (DAS), proposed by Jermyn et al in 1999. ... And finally, we'll discuss results from more recent follow-up work we've been doing since the submission of the paper you'll find in the conference proceedings.

Gnutella2 GDF recommended (in version 0.6) “ultrapeers” to improve Gnutella's performance and scalability. Gnutella2 enforces a variation of this to improve performance and scalability. Decentralized, 2-tier hierarchy of peers (“leaf nodes” and “hubs”). Other important differences will come out in comparison. Now that you've seen the quick overview of what our paper is about, the remainder of the presentation will provide the following: A brief review of the graphical password scheme we examined – Draw-A-Secret (DAS), proposed by Jermyn et al in 1999. ... And finally, we'll discuss results from more recent follow-up work we've been doing since the submission of the paper you'll find in the conference proceedings.

Comparison: Gnutella vs. Gnutella2 Network architecture Searching algorithms Cooperation incentives Security Now that you've seen the quick overview of what our paper is about, the remainder of the presentation will provide the following: A brief review of the graphical password scheme we examined – Draw-A-Secret (DAS), proposed by Jermyn et al in 1999. ... And finally, we'll discuss results from more recent follow-up work we've been doing since the submission of the paper you'll find in the conference proceedings.

Gnutella's Network Architecture Recall it is completely decentralized. Now that you've seen the quick overview of what our paper is about, the remainder of the presentation will provide the following: A brief review of the graphical password scheme we examined – Draw-A-Secret (DAS), proposed by Jermyn et al in 1999. ... And finally, we'll discuss results from more recent follow-up work we've been doing since the submission of the paper you'll find in the conference proceedings.

Gnutella2's Network Architecture Decentralized, 2-tier. This architecture is recommended for Gnutella in v0.6. New node enters by connecting to a known hub (almost identical to Gnutella's handshake). Hubs typically accept 300-500 leaves, and connect to 5-30 other hubs. Leaves typically connect to 3 hubs. Now that you've seen the quick overview of what our paper is about, the remainder of the presentation will provide the following: A brief review of the graphical password scheme we examined – Draw-A-Secret (DAS), proposed by Jermyn et al in 1999. ... And finally, we'll discuss results from more recent follow-up work we've been doing since the submission of the paper you'll find in the conference proceedings.

Comparison – Network Architecture Gnutella's purely decentralized is much simpler, but not as scalable. No real difference between Gnutella's v0.6 “ultrapeer” structure and Gnutella2's “hub” structure. Either of these strategies should reduce searching traffic as explained in searching algorithms. Now that you've seen the quick overview of what our paper is about, the remainder of the presentation will provide the following: A brief review of the graphical password scheme we examined – Draw-A-Secret (DAS), proposed by Jermyn et al in 1999. ... And finally, we'll discuss results from more recent follow-up work we've been doing since the submission of the paper you'll find in the conference proceedings.

Gnutella's Searching Algorithm Recall that using the purely decentralized version, packets are flooded throughout the network. If the v0.6 ultrapeer recommendation is implemented, searching is optimized using Query hash tables(QHTs). A QHT is maintained by each node, and describes the content it is sharing. An ultrapeer maintains an aggregate of its leaf's QHTs and its own QHT. Searches are performed by forwarding a query to an ultrapeer, who checks its aggregate QHT for a match. If there is a match, the query is forwarded to the appropriate leaf, otherwise the query is forwarded to neighbouring ultrapeers by “flooding”. Now that you've seen the quick overview of what our paper is about, the remainder of the presentation will provide the following: A brief review of the graphical password scheme we examined – Draw-A-Secret (DAS), proposed by Jermyn et al in 1999. ... And finally, we'll discuss results from more recent follow-up work we've been doing since the submission of the paper you'll find in the conference proceedings.

Gnutella2's Searching Algorithm Ultrapeers are called “hubs”. Uses a QHT like Gnutella, but if a hub cannot match a query to its aggregate QHT, it checks a set of caches: Each hub maintains a cached copy of each neighbouring hub's aggregate QHT. Upon a search miss, a hub will try to match the query against its cached copies of its neighbours QHTs. If the query matches, it will forward the query once, and the node that receives the query processes it and directly sends the result back to the client. If no match is made, the searching client will continue at another untried hub. Now that you've seen the quick overview of what our paper is about, the remainder of the presentation will provide the following: A brief review of the graphical password scheme we examined – Draw-A-Secret (DAS), proposed by Jermyn et al in 1999. ... And finally, we'll discuss results from more recent follow-up work we've been doing since the submission of the paper you'll find in the conference proceedings.

Comparison – Searching Algorithms Both Gnutella with Ultrapeers and Gnutella2 significantly reduce the number of messages. Should increase performance and scalability. Gnutella2's method further reduces the number of messages sent for a query: Less query request messages due to caching neighbour's QHTs. Less response messages since Gnutella2's method allows the responding node to directly contact the requesting node, rather than sending the message back through the path to get there. Now that you've seen the quick overview of what our paper is about, the remainder of the presentation will provide the following: A brief review of the graphical password scheme we examined – Draw-A-Secret (DAS), proposed by Jermyn et al in 1999. ... And finally, we'll discuss results from more recent follow-up work we've been doing since the submission of the paper you'll find in the conference proceedings.

Comparison: Cooperation Incentives Neither Gnutella nor Gnutella2 specify cooperation incentives. Implementations often will not allow connections to network unless you share something, and by default make downloads shared. The problem of cooperation incentives in a decentralized environment is interesting, since nodes can avoid connecting to those that have a profile of their behaviour. Now that you've seen the quick overview of what our paper is about, the remainder of the presentation will provide the following: A brief review of the graphical password scheme we examined – Draw-A-Secret (DAS), proposed by Jermyn et al in 1999. ... And finally, we'll discuss results from more recent follow-up work we've been doing since the submission of the paper you'll find in the conference proceedings.

Gnutella's Security Gnutella's query messages are routed through peers, and the query does not contain the querying node's IP address, but a Globally Unique Identifier (GUID). Provides anonymity by masking requester's identity. Denial-of-service (DOS) attacks are possible by flooding the network with many requests with a fake GUID. Another node could be similarly DOS'ed if a GUID for one of their request GUIDs is known. Response IP addresses could be spoofed and malicious content provided. Now that you've seen the quick overview of what our paper is about, the remainder of the presentation will provide the following: A brief review of the graphical password scheme we examined – Draw-A-Secret (DAS), proposed by Jermyn et al in 1999. ... And finally, we'll discuss results from more recent follow-up work we've been doing since the submission of the paper you'll find in the conference proceedings.

Gnutella2's Security Gnutella2 does not use GUIDs for queries Sends the response directly back to the requesting node. The QHTs do not contain information about the content stored on a neighbouring node, providing privacy. Queries make use of query keys (to verify the query return address is that of the original sender). Prevents malicious users from sending out queries for the purpose of flooding the network with spoofed requests. Search clients only permitted to query a hub after obtaining a “query key”, which are unique to each (hub, search client return address) from it to include in the transmission. Now that you've seen the quick overview of what our paper is about, the remainder of the presentation will provide the following: A brief review of the graphical password scheme we examined – Draw-A-Secret (DAS), proposed by Jermyn et al in 1999. ... And finally, we'll discuss results from more recent follow-up work we've been doing since the submission of the paper you'll find in the conference proceedings.

Comparison - Security Both Gnutella with ultrapeers and Gnutella2 provide privacy through their caching. Both Gnutella and Gnutella2 are suceptible to spoofed response IP addresses. For Gnutella2: Gnutella does not provide authentication of nodes for querying, thus it is susceptible to request flooding attacks. Gnutella ultrapeers cannot block certain hosts (do not have query keys or unique request addresses). For Gnutella: Gnutella2 does not provide anonymous queries. Now that you've seen the quick overview of what our paper is about, the remainder of the presentation will provide the following: A brief review of the graphical password scheme we examined – Draw-A-Secret (DAS), proposed by Jermyn et al in 1999. ... And finally, we'll discuss results from more recent follow-up work we've been doing since the submission of the paper you'll find in the conference proceedings.

Concluding Remarks Gnutella has some serious flaws (scalability, performance, lack of cooperation incentives and servent abuse). Gnutella2 solves all but cooperation incentives. Gnutella with ultrapeers solves scalability and performance, but the searching algorithm and caching is less sophisticated. Gnutella2 has many more features outside of this comparison, primarily being more extensible (yet specific) to support applications other than file sharing. Although they are different protocols, Gnutella2 is in essence, an improved version of Gnutella with ultrapeers. We believe in the absence of this work, there's a strong likelihood that the security of DAS implementations are over-estimated. (After points): Any questions?

Open Problems Is it possible to create useful cooperation incentives in a large, truly distributed environment like Gnutella where peers may reconnect to different hubs upon connection? Now that you've seen the quick overview of what our paper is about, the remainder of the presentation will provide the following: A brief review of the graphical password scheme we examined – Draw-A-Secret (DAS), proposed by Jermyn et al in 1999. ... And finally, we'll discuss results from more recent follow-up work we've been doing since the submission of the paper you'll find in the conference proceedings.

References Jordan Ritter, “Why Gnutella Can't Scale. No, Really.”, http://www.tch.org/gnutella.htm. Eytan Adar and Bernardo A. Huberman, “Free-Riding on Gnutella”, http://www.firstmonday.org/issues/issue5_10/adar/index.html. Farhad Manjoo, “Gnutella Bandwidth Bandits”, Aug. 8, 2002. RFC-Gnutella 0.6, http://rfc-gnutella.sourceforge.net/developer/testing/index.html. Anurag Singla and Christopher Rohrs, “Ultrapeers: Another Step Towards Gnutella Scalability”, Version 1.0, http://rfc-gnutella.sourceforge.net/src/Ultrapeers_1.0.html Gnutella vs. Gnutella2, Part 1, http://www.mp3newswire.net/stories/2003/gnutella.html. The Gnutella2 Developers Network. http://www.gnutella2.com. “LimeWire: Network Improvements”, http://www.limewire.com/developer/net_improvements.html P2P Networking Technologies. URL: http://ntrg.cs.tcd.ie/undergrad/4ba2.02-03/Intro.html. Now that you've seen the quick overview of what our paper is about, the remainder of the presentation will provide the following: A brief review of the graphical password scheme we examined – Draw-A-Secret (DAS), proposed by Jermyn et al in 1999. ... And finally, we'll discuss results from more recent follow-up work we've been doing since the submission of the paper you'll find in the conference proceedings.