P2PComputing/Scalab 1 Gnutella and Freenet Ramaswamy N.Vadivelu Scalab.

Slides:



Advertisements
Similar presentations
Peer-to-Peer and Social Networks An overview of Gnutella.
Advertisements

INF 123 SW ARCH, DIST SYS & INTEROP LECTURE 12 Prof. Crista Lopes.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
University of Cincinnati1 Towards A Content-Based Aggregation Network By Shagun Kakkar May 29, 2002.
1 An Overview of Gnutella. 2 History The Gnutella network is a fully distributed alternative to the centralized Napster. Initial popularity of the network.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Network Layer and Transport Layer.
Gnutella 2 GNUTELLA A Summary Of The Protocol and it’s Purpose By
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
Peer-to-Peer Networks João Guerreiro Truong Cong Thanh Department of Information Technology Uppsala University.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
1 Unstructured Routing : Gnutella and Freenet Presented By Matthew, Nicolai, Paul.
Gnutella, Freenet and Peer to Peer Networks By Norman Eng Steven Hnatko George Papadopoulos.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
Improving Data Access in P2P Systems Karl Aberer and Magdalena Punceva Swiss Federal Institute of Technology Manfred Hauswirth and Roman Schmidt Technical.
Peer-to-Peer Networks Slides largely adopted from Ion Stoica’s lecture at UCB.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
P2P File Sharing Systems
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Peer-to-Peer Computing CS587x Lecture Department of Computer Science Iowa State University.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
P2P Architecture Case Study: Gnutella Network
1 Reading Report 4 Yin Chen 26 Feb 2004 Reference: Peer-to-Peer Architecture Case Study: Gnutella Network, Matei Ruoeanu, In Int. Conf. on Peer-to-Peer.
Gnutella2: A Better Gnutella?
BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
Postacademic Interuniversity Course in Information Technology – Module C1p1 Contents Data Communications Applications –File & print serving –Mail –Domain.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Jonathan Walpole CSE515 - Distributed Computing Systems 1 Teaching Assistant for CSE515 Rahul Dubey.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006.
Freenet File sharing for a political world. Freenet: A Distributed Anonymous Information Storage and Retrieval System I. Clarke, O. Sandberg, B. Wiley,
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
LIS508 almost last lecture: Privacy and Ethics Thomas Krichel
03/19/02Scalab Seminar Series1 Mapping the Gnutella Network Macroscopic Properties of Large Scale P2P Systems Ramaswamy N.Vadivelu Scalab, ASU.
Peer Pressure: Distributed Recovery in Gnutella Pedram Keyani Brian Larson Muthukumar Senthil Computer Science Department Stanford University.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
PEER TO PEER (P2P) NETWORK By: Linda Rockson 11/28/06.
1 Web Servers (Chapter 21 – Pages( ) Outline 21.1 Introduction 21.2 HTTP Request Types 21.3 System Architecture.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks E. Damiani S. De Capitani di Vimercati S. Paraboschi P. Samarati F.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
TCP/IP Illustrated, Volume 1: The Protocols Chapter 6. ICMP: Internet Control Message Protocol ( 월 ) 김 철 환
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
Skype.
Distributed Web Systems Peer-to-Peer Systems Lecturer Department University.
1 Gnutella. 2 Overview r P2P search mechanism r Simple and straightforward r Completely decentralized r Creates overlay network r Different applications.
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
An example of peer-to-peer application
BitTorrent Vs Gnutella.
CS 268: Lecture 22 (Peer-to-Peer Networks)
Principles of Network Applications
Application layer Lecture 7.
Unstructured Routing : Gnutella and Freenet
InfoShare A Distributed P2P Information Storage & Retrieval System
Computer Networks Protocols
#02 Peer to Peer Networking
Presentation transcript:

P2PComputing/Scalab 1 Gnutella and Freenet Ramaswamy N.Vadivelu Scalab

P2PComputing/Scalab 2 Gnutella and Freenet Applications of P2P Computing Protocols/Usage Features/Risks

Both Gnutella and Freenet are distributed Information systems. They differ significantly in both goals and implementation. Basically, Each is a system for searching for information Each returns information without telling you where it came from

Gnutella Each piece of Gnutella software is a “Servent” A new member joins a system by connecting to a known host. Messages: Broadcasted or Back Propagated. Messages are flagged with TTL GroupMembership( Ping /Pong) Search(Query/Response) File Transfer(Get/Push)

Protocol The protocol for obtaining information over Gnutella is a kind of call-and-response.

Features How are requests kept separate? What form does the returned data take? What protocol is used? How does the system stop searching? How is a search string like "MP3“ interpreted?

Flexibility allows each site to contribute to a distributed search in the most sophisticated way it can. The exponential spread of requests opens up the most likely source of disruption: denial-of-service attacks. The time-to-live imposes a horizon on each user A final limitation is the difficulty authenticating the source of the data returned.

Percentage of files shared by Peers

A socio political application: To allow people to distribute material anonymously. To allow people to retrieve material anonymously. To make the removal of material almost insuperably difficult. A technical goal of Freenet is to spread data randomly among sites. The Freenet architecture and protocol is similar to Gnutella. Freenet

Message Types HandshakeRequest Initiate connection to a node, ensures that node is connected and protocol versions match HandshakeReply Response to HandshakeRequest DataRequest Request from node for data transmission, Must provide key for data as well

When a Freenet client satisfies a request, it passes the entire data to the requester. Each client keeps a copy,countering the Slashdot effect It lets small sites distribute large, popular documents without suffering bandwidth problems. It rewards popular material and allows unpopular material to disappear quietly. It tends to bring data close to those who want it.

P2PComputing/Scalab 12 Freenet Searches

The popularity of each site's material causes the Freenet system to actually alter its topology. Bandwidth increases where it benefits the end users. Freenet is more restrained in the traffic generated. A Freenet client sends an unsatisfied request on to a single peer. Searching is done depth-first and not in parallel.

Freenet is being developed in Java and requires the Java Runtime Environment to run. It uses its own port and protocol. Freenet chooses for security reasons to hash the string. Hashing renders Freenet unusable for random searches

Summary/Conclusions Gnutella supports bi-directional data transfer, each request has a unique number and aTTL Protocol works in a call-and-response manner, with sites along paths recording requests. Gnutella runs over HTTP, can transfer any kind of information. Gnutella doesn't specify how each site interprets a search string.

Summary/Conclusions Freenet is for storing and retrieving data anonymously over the Internet. It passes the entire requested file back to the source, and copies the data all along the path. It relieves bandwidth limitation with distributed replication for popular material. Freenet sends request to a single peer, not by multicast as in Gnutella. Hard to remove a file over Freenet because of replication. Random search is not possible.

Freenet seems more scalable than Gnutella. Gnutella and Freenet make the location of Documents irrelevant The search string becomes the location. New layer of routing on top of the familiar routing done at the IP level.