Motivation - The Edge Lab Motivation Communication as a co-operative multi-party act: But interests diverge … Core question: how can we distribute control.

Slides:



Advertisements
Similar presentations
OMV Ontology Metadata Vocabulary April 10, 2008 Peter Haase.
Advertisements

Information and Communication Technologies (ICT) in the Seventh Framework Programme Coordination actions ICT Calls Jan- March 2012.
On the Economics of P2P Systems Speaker Coby Fernandess.
University of Cincinnati1 Towards A Content-Based Aggregation Network By Shagun Kakkar May 29, 2002.
Samsara: Honor Among Thieves in Peer-to-Peer Storage Landon P. Cox and Brian D. Noble University of Michigan.
0 General information Rate of acceptance 37% Papers from 15 Countries and 5 Geographical Areas –North America 5 –South America 2 –Europe 20 –Asia 2 –Australia.
Open Problems in Data- Sharing Peer-to-Peer Systems Neil Daswani, Hector Garcia-Molina, Beverly Yang.
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
Europol’s tailor-made data protection framework
1 Freeriders in P2P: Pricing Incentives Don Towsley UMass-Amherst collaborators: D. Figueiredo, J. Shapiro.
CLAG 2004 – April/041 A Workflow-based Architecture for e- Learning in the Grid Luiz A. Pereira, Fábio A. Porto, Bruno Schulze, Rubens N. Melo
Designing a Peer-to-Peer Wireless Network Confederation Elias C. Efstathiou and George C. Polyzos Department of Computer Science Athens University of Economics.
CS 268: Active Networks Ion Stoica May 6, 2002 (* Based on David Wheterall presentation from SOSP ’99)
Peer-to-Peer Networking By: Peter Diggs Ken Arrant.
Exploiting Content Localities for Efficient Search in P2P Systems Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang 1 1 College of William and Mary,
A Congestion Pricing User Study Using a a Wireless LAN Jimmy Shih, Randy Katz, Anthony Joseph.
Gnutella, Freenet and Peer to Peer Networks By Norman Eng Steven Hnatko George Papadopoulos.
1 Client-Server versus P2P  Client-server Computing  Purpose, definition, characteristics  Relationship to the GRID  Research issues  P2P Computing.
Grids and Grid Technologies for Wide-Area Distributed Computing Mark Baker, Rajkumar Buyya and Domenico Laforenza.
A Framework for Cost-Effective Peer-to- Peer Content Distribution Mohamed Hefeeda and Bharat Bhargava Department of Computer Sciences Purdue University.
Peer WLAN Consortium: A P2P Case Study Mobile Multimedia Laboratory Department of Informatics Athens University of Economics & Business Athens MMAPPS Meeting,
Peer-to-peer: an overview Selo TE P2P is not a new concept P2P is not a new technology P2P is not a new technology Oct : first transmission.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Network and WiFi By: Clara-Hannah S., Amelia H., and Margot d’I.
Content Distribution March 8, : Application Layer1.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
EU cooperation, EU projects and their implications Simone Fischer-Hübner Karlstad University.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Allerton 2011 September 28 Mathias Humbert, Mohammad Hossein Manshaei, and Jean-Pierre Hubaux EPFL - Laboratory for Communications and Applications (LCA1)
UNCHAIN – UNiversity CHAir on INnovation University Chair on Innovation Centro METID WP5 Visit to MEDA Universities: Cairo University May 2009 WP5 Planning.
Enterprise Directorate General European Commission Regional Innovation Strategies in Associated States in Associated States Dr. Michael Busch DG ENTERPRISE.
Link Recommendation In P2P Social Networks Yusuf Aytaş, Hakan Ferhatosmanoğlu, Özgür Ulusoy Bilkent University, Ankara, Turkey.
1 MultimEDia transport for mobIlE Video AppLications 9 th Concertation Meeting Brussels, 13 th February 2012 MEDIEVAL Consortium.
Cmpe 494 Peer-to-Peer Computing Anıl Gürsel Didem Unat.
GRACE Project IST EGAAP meeting – Den Haag, 25/11/2004 Giuseppe Sisto – Telecom Italia Lab.
1 P2P Computing. 2 What is P2P? Server-Client model.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
On P2P Collaboration Infrastructures Manfred Hauswirth, Ivana Podnar, Stefan Decker Infrastructure for Collaborative Enterprise, th IEEE International.
IP-Based Emergency Applications and Services for Next Generation Networks PEACE Presented by Suji Gunaratne PhD.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Colin J. MacDougall.  Class of Systems and Applications  “Employ distributed resources to perform a critical function in a decentralized manner”  Distributed.
Higashino Lab. Maximizing User Gain in Multi-flow Multicast Streaming on Overlay Networks Y.Nakamura, H.Yamaguchi and T.Higashino Graduate School of Information.
Emiran UC San Diego Alin UC San Diego K.K. at&t Divesh at&t.
Peer-to-Pee Computing HP Technical Report Chin-Yi Tsai.
Advanced Next gEneration Mobile Open NEtwork Tridentcom th International Conference on Testbeds and Research Infrastructures for the Development.
UNCHAIN – UNiversity CHAir on INnovation University Chair on Innovation Centro METID WP5 updating and planning This project has been funded with support.
ESTELA Summer Workshop, 26 June 2013 The EU-SOLARIS project.
Cascading Payment Content Exchange (CasPaCE) Framework for P2P Networks Gurleen Arora Supervisors: Dr. M. Hanneghan & Prof. M. Merabti Networked Appliances.
Peer-to-Peer Wireless Network Confederation (P2PWNC) Mobile Multimedia Laboratory Athens University of Economics and Business Athens MMAPPS Meeting, September.
Energypedia by energypedia UG (haftungsbeschänkt).
Freelib: A Self-sustainable Digital Library for Education Community Ashraf Amrou, Kurt Maly, Mohammad Zubair Computer Science Dept., Old Dominion University.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
Peer-to-Peer Computing Mrs. Tugba Taskaya-Temizel 13/February/2006.
ALTO BOF Charter Discussion. Charter Iterated (twice) on the list  Several comments on the first version Terminology, caching  No complains on current.
European Commission - DG Research - Directorate B – “Structuring the European Research Area” Jean-David MALO – Bucharest, February 12-13, NOT LEGALLY.
Semantic based P2P System for local e-Government Fernando Ortiz-Rodriguez 1, Raúl Palma de León 2 and Boris Villazón-Terrazas 2 1 1Universidad Tamaulipeca.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
1 A connection management protocol for promoting cooperation in Peer-to-Peer networks Authors: Murat Karakaya, Ibrahim Korpeoglu, and Ozgur Ulusoy Source:
Efficient P2P Search by Exploiting Localities in Peer Community and Individual Peers A DISC’04 paper Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang.
Peer-to-Peer and Collective Intelligence A platform for collaboration Andrew Roczniak Collective Intelligence Lab Multimedia Communications Research Lab.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
© UPU 2010 – All rights reserved International e-services Farah Abdallah E-Postal Services Programme UPU.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Mobile Systems Availability Integrity and Confidentiality MoSAIC M.O.Killijian, D.Powell, M.Banâtre, P.Couderc, Y.Roudier LAAS-CNRS - IRISA- Eurécom.
Peer-to-Peer (P2P) Networks By Bongju Yu. Contents  What is P2P?  Features of P2P systems  P2P Architecture  P2P Protocols  P2P Projects  Reference.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
Best Practices Presentation SEPVE The Programme is co-funded by the European Union (ERDF) and National Funds of Greece and Bulgaria.
Peer-to-peer networking
The Case for DDoS Resistant Membership Management in P2P Systems
Presentation transcript:

Motivation - The Edge Lab Motivation Communication as a co-operative multi-party act: But interests diverge … Core question: how can we distribute control between the parties? Eg sender, multiple receivers, access providers, network providers, conference chair, trusted-third party, bank, … Specific Example: Internet congestion control Multiple senders share a router and must back off when it becomes congested. How do we ensure fairness and efficiency? We have answers based on market management techniques developed by our lab in, for example, the M3I project.

Motivation - The Edge Lab Current Work Two specific projects: MMAPPS Innovative middleware to motivate fuller participation in P2P services. Stimulating routing in ad-hoc networks Multi-hop, multi-owner networks require lightweight mechanisms to stimulate nodes to contribute

Motivation - The Edge Lab MMAPPS EU funded 5th Framework project 7 partners BT Lead MYSTERIAN

Motivation - The Edge Lab P2P services exhibit the distributed control problem: Markets and Peer-to-Peer Search Download Why should I share my files? Others have looked at free-riding Only generic solution proposed so far: Gnutella Free Markets Too heavyweight Market Failures …and not very P2P! Who controls the discussion? Groove – collaboration software Free-riding

Motivation - The Edge Lab Look at the real world: –social interactions, reputation, evolution and psychology of co-operation. Mutual enforcement of rules within co- operative communities of peers Rules may supplement markets for fair exchange Approach

Motivation - The Edge Lab P2P-based Local Newspaper ADVERT Example scenario Rules relate to both service and resource contributions… Example service contribution: -At the end of each month 1/12 th of the kitty is allocated to authors in proportion to their total article rating. - Each month your reputation increases by the average of the rating of the articles you submitted that month. Authors receive financial remuneration and enhanced reputations according to the number of 'posts' and their associated ratings Example resource contribution: -You must answer 80% of the search queries, and 50% of the content requests addressed to you - A consensus (>70%) of complaints causes expulsion. Everyone should contribute resources during searches and remain usually online.

Motivation - The Edge Lab Scenario II Peer WLAN community of peer WLAN administrative domains roaming between peer domains better geographical coverage than any peer users within a domain may form their own community rules Example consortium rules if domain prevents roamers, its users denied roaming excessive misbehaving users in one domain denies roaming to all users from that domain