Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.

Slides:



Advertisements
Similar presentations
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Advertisements

University of Cincinnati1 Towards A Content-Based Aggregation Network By Shagun Kakkar May 29, 2002.
PEER-TO-PEER Is a type of network in which each workstation has equivalent capabilities and responsibilities. This differs from client/server architectures,
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
Company Confidential 1 © 2005 Nokia V1-Filename.ppt / yyyy-mm-dd / Initials Towards a mobile content delivery network with a P2P architecture Carlos Quiroz.
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
An Overview of Peer-to-Peer. What is Peer-to-Peer (P2P)?
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Spotlighting Decentralized P2P File Sharing Archie Kuo and Ethan Le Department of Computer Science San Jose State University.
Basic Computer Networks Configurations (cont.) School of Business Eastern Illinois University © Abdou Illia, Spring 2006 Week 2, Thursday 1/19/2006)
Peer-to-Peer Computing
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
Beyond Napster: An Overview of Peer-to-Peer Systems and Applications Sami Rollins.
Object Naming & Content based Object Search 2/3/2003.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Peer-to-Peer Networks & JXTA by Madhurasmitha Chakravarthy & Priti Sabadra.
Skype & its protocol Aaron Loar CPE 401. Introduction Skype’s Background Topology 3 Node Types Questions.
A Study on Mobile P2P Systems Hongyu Li. Outline  Introduction  Characteristics of P2P  Architecture  Mobile P2P Applications  Conclusion.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
By Shobana Padmanabhan Sep 12, 2007 CSE 473 Class #4: P2P Section 2.6 of textbook (some pictures here are from the book)
Cmpe 494 Peer-to-Peer Computing Anıl Gürsel Didem Unat.
Peer-to-Peer Overlay Networks. Outline Overview of P2P overlay networks Applications of overlay networks Classification of overlay networks – Structured.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
Forensics Investigation of Peer-to- Peer File Sharing Networks Authors: Marc Liberatore, Robert Erdely, Thomas Kerle, Brian Neil Levine & Clay Shields.
Distributed Systems Concepts and Design Chapter 10: Peer-to-Peer Systems Bruce Hammer, Steve Wallis, Raymond Ho.
1 P2P Computing. 2 What is P2P? Server-Client model.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
Thesis Proposal Data Consistency in DHTs. Background Peer-to-peer systems have become increasingly popular Lots of P2P applications around us –File sharing,
Peer-to-Peer Networking. Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer.
Peer To Peer Applications
An affinity-driven clustering approach for service discovery and composition for pervasive computing J. Gaber and M.Bakhouya Laboratoire SeT Université.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
Colin J. MacDougall.  Class of Systems and Applications  “Employ distributed resources to perform a critical function in a decentralized manner”  Distributed.
Peer-to-Pee Computing HP Technical Report Chin-Yi Tsai.
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
PSI Peer Search Infrastructure. Introduction What are P2P Networks? The term "peer-to-peer" refers to a class of systems and applications that employ.
Super-peer Network. Motivation: Search in P2P Centralised (Napster) Flooding (Gnutella)  Essentially a breadth-first search using TTLs Distributed Hash.
1 V1-Filename.ppt / / Jukka K. Nurminen Content Search UnstructuredP2P Content Search Unstructured P2P Jukka K. Nurminen *Partly adapted from.
DISTRIBUTED COMPUTING Introduction Dr. Yingwu Zhu.
Peer-to-Peer Systems Rodrigo Rodrigues Peter Druschel Max Planck Institute for Software Systems.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
FastTrack Network & Applications (KaZaA & Morpheus)
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
A P2P-Based Architecture for Secure Software Delivery Using Volunteer Assistance Purvi Shah, Jehan-François Pâris, Jeffrey Morgan and John Schettino IEEE.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services BY Sai kamal neeli AVINASH THOTA.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Peer to Peer Network Design Discovery and Routing algorithms
Peer to Peer Computing. What is Peer-to-Peer? A model of communication where every node in the network acts alike. As opposed to the Client-Server model,
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Bruce Hammer, Steve Wallis, Raymond Ho
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
An overlay for latency gradated multicasting Anwitaman Datta SCE, NTU Singapore Ion Stoica, Mike Franklin EECS, UC Berkeley
Malugo – a scalable peer-to-peer storage system..
Peer-to-peer systems ”Sharing is caring”. Why P2P? Client-server systems limited by management and bandwidth P2P uses network resources at the edges.
Peer-to-Peer File Sharing Systems Group Meeting Speaker: Dr. Xiaowen Chu April 2, 2004 Centre for E-transformation Research Department of Computer Science.
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 24 – Introduction to Peer-to-Peer (P2P) Systems Klara Nahrstedt (presented by Long Vu)
Vehicular Communications Paradigms ORT Braude College of Engineering Software Engineering Department April 2012 Students: Evgeny Yudashkin & Tal Bahalool.
An example of peer-to-peer application
Peer-to-Peer Data Management
CHAPTER 3 Architectures for Distributed Systems
PROGRAM STUDI TEKNIK INFORMATIKA FAKULTAS ILMU KOMPUTER
OneSwarm: Privacy Preserving P2P
Presentation transcript:

Peer-to-Peer Systems: An Overview Hongyu Li

Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion

Introduction  In client-server model, most resources are concentrated on a small number of nodes.  Most PCs do not use 100 percent of its resources – there is a lot of excess capacity  Better way – distributing processing load and network bandwidth among all nodes or peers.

Introduction  What is P2P “A type of network in which each workstation has equivalent capabilities and responsibilities. This differs from client/server architectures, in which some computers are dedicated to serving the others.”

Introduction Client-Server ModelGeneral P2P Model

Characteristics  Decentralization: emphasis on the user‘s ownership and control of resources  Improved Scalability: An immediate benefit of decentralization  Better Performance: improved by aggregating distributed storage capacity

Characteristics  Increased autonomy: P2P requires the local node do work on behalf of its user  Enhanced privacy: users can avoid having to provide any information about themselves to anyone else  Dynamism: nodes will be entering and leaving the system continuously

Algorithms  Centralized model : all object index items are kept in a centralized server – “hybrid P2P”

Algorithms  Decentralized but unstructured model: “pure P2P” model no advertisement of shared resources occurs the object query is distributed and the logical P2P topology is often random and unstructured

Algorithms

 Decentralized and structured model : the most recent approach object query is also distributed, but the logical P2P topology is the structured topology such as Mesh, Ring, and Butterfly structured topologies are usually constructed using distributed hashing table (DHT) techniques

Algorithms

P2P Applications  Skype a peer-to-peer voice over IP (VoIP) system two types of nodes in the overlay network, ordinary nodes and super nodes (SN). claims to have implemented a “3G P2P” or “Global Index” technology

P2P Applications  BitTorrent peer-to-peer protocol for distributing files use the upstream bandwidth of every downloader to increase the effectiveness of the distribution. upload pieces of the file to each other when downloading

P2P Applications  JXTA peer-to-peer networking platform released by Sun Microsystems attempts to create a framework by providing the capabilities that most P2P applications require provides core functionality in multiple layers, including higher level services, etc.

Conclusion  Challenges security threats – sufficient guarantees or additional trust has to be established among the peers lack of central control – serious challenges to the imposition of authority; breach the laws of various jurisdictions, particularly censorship and copyright

Conclusion  Future an important solution to certain inherent problems in distributed systems a strong alternative for scalability, anonymity, and fault resilience requirements the future of P2P is very promising

Thank You !