Peer-to-Peer Networking. Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer.

Slides:



Advertisements
Similar presentations
An Overview of Peer-to-Peer Sami Rollins
Advertisements

Peer-to-Peer Systems Chapter 25. What is Peer-to-Peer (P2P)? Napster? Gnutella? Most people think of P2P as music sharing.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
Application Layer Overlays IS250 Spring 2010 John Chuang.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
Peer-to-Peer Technology and Security Issues By Raul Rodriguez, Arash Zarrinbakhsh, Cynthia Roger and Phillip Shires College of Business Administration.
Peer-to-Peer Content Sharing. P2P File Sharing Benefits Why use a P2P model for a file sharing application?
Spotlighting Decentralized P2P File Sharing Archie Kuo and Ethan Le Department of Computer Science San Jose State University.
CSc 461/561 CSc 461/561 Peer-to-Peer Streaming. CSc 461/561 Summary (1) Service Models (2) P2P challenges (3) Service Discovery (4) P2P Streaming (5)
P2P Network is good or bad? Sang-Hyun Park. P2P Network is good or bad? - Definition of P2P - History of P2P - Economic Impact - Benefits of P2P - Legal.
Mobile Peer-to-Peer Network Architectures Matt Monroe 4/7/11.
Beyond Napster: An Overview of Peer-to-Peer Systems and Applications Sami Rollins.
Data Management in Peer-to- Peer Systems Qi Sun Beverly Yang.
1 Client-Server versus P2P  Client-server Computing  Purpose, definition, characteristics  Relationship to the GRID  Research issues  P2P Computing.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
P2P WeeSan Lee
Peer-to-peer: an overview Selo TE P2P is not a new concept P2P is not a new technology P2P is not a new technology Oct : first transmission.
A Study on Mobile P2P Systems Hongyu Li. Outline  Introduction  Characteristics of P2P  Architecture  Mobile P2P Applications  Conclusion.
Peer-to-Peer network systems Distributed Data Processing Paulina Pasek.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
P2P File Sharing Systems
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Peer-to-Peer Computing CS587x Lecture Department of Computer Science Iowa State University.
Introduction Widespread unstructured P2P network
Cmpe 494 Peer-to-Peer Computing Anıl Gürsel Didem Unat.
Peer to Peer Network Anas Hardan. What is a Network? What is a Network? A network is a group of computers and other devices (such as printers) that are.

Peer-to-Peer Overlay Networks. Outline Overview of P2P overlay networks Applications of overlay networks Classification of overlay networks – Structured.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
1 P2P Computing. 2 What is P2P? Server-Client model.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
徐晨桓 李柏穎.  Definition  Introduction  History  Example - Napster  Example - Gnutella 徐晨桓 李柏穎 2/27.
Introduction of P2P systems
The application of P2P technology. Team Member: LIU Chang, ZHANG jianing Presentation: LIU Chang.
Peer-to-Peer Networks University of Jordan. Server/Client Model What?
Chapter 2: Application layer
Colin J. MacDougall.  Class of Systems and Applications  “Employ distributed resources to perform a critical function in a decentralized manner”  Distributed.
Peer-to-Pee Computing HP Technical Report Chin-Yi Tsai.
SPAM DETECTION IN P2P SYSTEMS Team Matrix Abhishek GhagDarshan Kapadia Pratik Singh.
Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.
PSI Peer Search Infrastructure. Introduction What are P2P Networks? The term "peer-to-peer" refers to a class of systems and applications that employ.
Super-peer Network. Motivation: Search in P2P Centralised (Napster) Flooding (Gnutella)  Essentially a breadth-first search using TTLs Distributed Hash.
1 V1-Filename.ppt / / Jukka K. Nurminen Content Search UnstructuredP2P Content Search Unstructured P2P Jukka K. Nurminen *Partly adapted from.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
Peer-to-Peer Computing Mrs. Tugba Taskaya-Temizel 13/February/2006.
FastTrack Network & Applications (KaZaA & Morpheus)
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
PEER TO PEER (P2P) NETWORK By: Linda Rockson 11/28/06.
Peer-to-Peer and Collective Intelligence A platform for collaboration Andrew Roczniak Collective Intelligence Lab Multimedia Communications Research Lab.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Peer to Peer Computing. What is Peer-to-Peer? A model of communication where every node in the network acts alike. As opposed to the Client-Server model,
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
1 A Measurement Study of Peer-to-Peer File Sharing Systems by Stefan Saroiu P. Krishna Gummadi Steven D. Gribble Presentation by Nanda Kishore Lella
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
Napster and Gnutella Protocols English micro-project Guillaume CASSIN May 31, 2001.
Distributed Web Systems Peer-to-Peer Systems Lecturer Department University.
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
Peer to peer Internet telephony challenges, status and trend
Peer-to-Peer Data Management
Peer-to-Peer Internet Networks
An Overview of Peer-to-Peer
Presentation transcript:

Peer-to-Peer Networking

Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer architectures Statistics

Introduction Mass content distribution – Inefficient and costly. Commercialization of internet – Mass medium. – Mostly client/server. – Foundation of peer-to-peer: penetration broadband internet, reliability of connections, capacity of user equipment, evolution compression technology, and etc. – Increasing demand for multimedia content. – Conclusion: traditional distribution models under pressure.

Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer architectures Statistics

Characteristics and challenges of Peer-to-Peer Peer-to-Peer versus client/server Client/Server: - Easy to manage and control (centralized) - Negative network externalities: a) limited scalability b) expensive distribution model c) danger for bottlenecks and single points of failure

Characteristics and challenges of Peer-to-Peer Sharing resources in Peer-to- Peer manner Partial or full decentralization Self organizing systems depending on the level of decentralization

Characteristics and challenges of Peer-to-Peer Peer-to-Peer versus client/server Peer-to-Peer: - Scalability, decentralization, transient connectivity, cost efficiency, fault tolerance, self organization, resource sharing - Servents -> SERVer + cliENTS - Positive network externalities: additional users = additional resources - Challenges: transient connectivity, security, availability of resources and scalability

Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer architectures Statistics

Peer-to-Peer applications Napster Gnutella (Bearshare, Limewire) Kademlia (Overnet, eDonkey) Fasttrack (Kazaa) Bittorrent

Peer-to-Peer applications Communication: IM and Telephony Grid computing Collaborative applications File sharing and content distribution Wireless and ubiquitious peer- to-peer

Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer architectures Statistics

Classification of Peer-to-Peer applications Centralized Flooding Document Routing

Classification of Peer-to-Peer applications Centralized structure (e.g. Napster) Degree of decentralization - Centralized - Decentralized - Hybrid Degree of structure - Unstructured - Structured

Classification of Peer-to-Peer applications Napster - Central directory server - Search process via server - Exchange of data occurs in peer-to-peer manner BCD E A Serve r Query D ? Download

Classification of Peer-to-Peer applications + Efficient search + Limited bandwith usage + No per-node state - Central point of failure - Limited scale BobAlice JaneJudy

Classification of Peer-to-Peer applications Gnutella 0.4 (decentralized unstructured) - No centralized component - Node functions: client, server, router, cache and search - Complete self organization

Classification of Peer-to-Peer applications A B C D QH

Classification of Peer-to-Peer applications + No central point of failure + Limited per-node state -Slow searches -Bandwith intesive Bob Alice Jane Judy Carl

Classification of Peer-to-Peer applications Gnutella 0.6 (hybrid unstructured) - Convergence: combining advantages and circumventing the drawbacks of centralized and pure decentralized systems - Introducing hierarchy in the system via super nodes

Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer architectures Statistics

Measured Bandwith

Measured Latency

Measured Uptime

Number of Shared Files

Connectivity

Presentation History of p2p networking p2p areas of usage Risks in p2p networking Future of p2p networking

History of p2p networking April 7, 1969: Internet Request for Comments Dec.1979: creation of Usenet Dec. 1987: creation of WWIVnet July, 1999: publication of Freenet protocol Sept.1999: creation of Napster Nov.1999: first release of Direct Connect client

History of p2p networking March : first release of Gnutella September 6, 2000: first release of eDonkey2000 March, 2001: introduction of the FastTrack protocol April, 2001: design of the BitTorrent protocol

History of p2p networking May, 2001: first release of WinMX Peer Network Protocol July, 2001: shutdown of Napster Nov 6, 2001: first release of GNUnet March, 2002: publication of the Kademlia DHT August, 2007: the P4P working group is formed

Presentation History of p2p networking p2p areas of usage Risks in p2p networking Future of p2p networking

p2p areas of usage Home Peer to Peer Networks File sharing Bioinformatics Academic Search engine Military Business P2PTV Telecommunication

p2p areas of usage Home Peer to Peer Networks File sharing Bioinformatics Academic Search engine Military Business P2PTV Telecommunication

p2p areas of usage Home Peer to Peer Networks File sharing Bioinformatics Academic Search engine Military Business P2PTV Telecommunication

p2p areas of usage Home Peer to Peer Networks File sharing Bioinformatics Academic Search engine Military Business P2PTV Telecommunication

p2p areas of usage Home Peer to Peer Networks File sharing Bioinformatics Academic Search engine Military Business P2PTV Telecommunication

p2p areas of usage Home Peer to Peer Networks File sharing Bioinformatics Academic Search engine Military Business P2PTV Telecommunication

p2p areas of usage Home Peer to Peer Networks File sharing Bioinformatics Academic Search engine Military Business P2PTV Telecommunication

P2PTV SopCast TVants TVUPlayer Abroadcasting Zattoo Octoshape

p2p areas of usage Home Peer to Peer Networks File sharing Bioinformatics Academic Search engine Military Business P2PTV Telecommunication

Skype

Presentation History of p2p networking p2p areas of usage Risks in p2p networking Future of p2p networking

Attacks on peer-to-peer networks Poisoning attacks (e.g. providing files whose contents are different from the description, aka "spoofing") Polluting attacks (e.g. inserting "bad" chunks/packets into an otherwise valid file on the network) Defection attacks (users or software that make use of the network without contributing resources to it) Insertion of viruses to carried data (e.g. downloaded or carried files may be infected with viruses or other malware) Malware in the peer-to-peer network software itself (e.g. distributed software may contain spyware)

Attacks on peer-to-peer networks Denial of service attacks (attacks that may make the network run very slowly or break completely) Filtering (network operators may attempt to prevent peer-to-peer network data from being carried) Identity attacks (e.g. tracking down the users of the network and harassing or legally attacking them) Spamming (e.g. sending unsolicited information across the network--not necessarily as a denial of service attack) Distributed Denial of Service (a denial of service that attacks multiple host computers)

Legal controversy Napster shutdown The Piratebay case

Presentation History of p2p networking p2p areas of usage Risks in p2p networking Future of p2p networking

Anonymous P2P P4P File mirroring Encryption

References eertopeer/a/p2pintroduction.htmhttp://compnetworking.about.com/od/p2pp eertopeer/a/p2pintroduction.htm group.com/downloads/excerpts/Subramani an01.pdfhttp:// group.com/downloads/excerpts/Subramani an01.pdf