Peer-to-Peer Networks 16 P2P in the Wild Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.

Slides:



Advertisements
Similar presentations
P2P Media Summit Silicon Valley August 4, 2008 Jeff Capone.
Advertisements

INTRODUCTION TO COMPUTER NETWORKS Zeeshan Abbas. Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
Protocols By Rakesh Chukkapalli CS 484.  Peer-to-Peer = P2P  The term peer-to-peer was coined as far as back in the mid-1980s by LAN vendors to describe.
Introduction to Computer Networks
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Magic Jack Magic Jack is a computer attachment that, in combination with telephone service from the related YMAX Corporation, provides internet-based.
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
5th Edition, Irv Englander
INTRODUCTION TO COMPUTER NETWORKS INTRODUCTION Lecture # 1 (
Introduction to Cyberspace
* The Internet’s genesis - Defense Department project to create a network that could survive a nuclear conflict * The first users - Government agencies.
Peer-to-Peer network systems Distributed Data Processing Paulina Pasek.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
2: Application Layer1 Chapter 2 Application Layer These slides derived from Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross.
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
Privacy in P2P based Data Sharing Muhammad Nazmus Sakib CSCE 824 April 17, 2013.
Cli/Serv.: JXTA/151 Client/Server Distributed Systems v Objective –explain JXTA, a support environment for P2P services and applications ,
Networking and the Internet © 2007 Pearson Addison-Wesley. All rights reserved.
Cmpe 494 Peer-to-Peer Computing Anıl Gürsel Didem Unat.

Application Layer – Peer-to-peer UIUC CS438: Communication Networks Summer 2014 Fred Douglas Slides: Fred, Kurose&Ross (sometimes edited)
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B5 Networks and Telecommunications.
1 P2P Computing. 2 What is P2P? Server-Client model.
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
Peer-to-Peer Networking. Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer.
Networked Information Systems 1 Advantages of and classified by their size & architecture or design.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
Network Operating Systems versus Operating Systems Computer Networks.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources Usually, the connections.
TELECOM ITALIA GROUP P2P-TV Workshop Torino, Jan 2011 Application-Layer Traffic Optimization How did we get here? Where are we going? Enrico Marocco
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B5 Networks and Telecommunications.
1 V1-Filename.ppt / / Jukka K. Nurminen Peer-to-peer T Applications and Services in Internet, Fall 2008 Jukka K. Nurminen.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
PEER TO PEER (P2P) NETWORK By: Linda Rockson 11/28/06.
Kuliah Pengantar Teknologi Informasi Coky Fauzi Alfi cokyfauzialfi.wordpress.com Internet (2)
Peer-to-Peer Networks 01: Organization and Introduction Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
University of South Asia Course Name: Distributed System
Using Public Key Cryptography Key management and public key infrastructures.
Peer to Peer Computing. What is Peer-to-Peer? A model of communication where every node in the network acts alike. As opposed to the Client-Server model,
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
Peer-to-Peer Networks 16 P2P in the Wild Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
Peer-to-Peer Networks 14 Security Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
Malugo – a scalable peer-to-peer storage system..
Peer-to-Peer Networks 10 Fast Download Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
Billy Ripple Dr. Oblitey COSC  File-Sharing ◦ What is it? ◦ Uses ◦ History ◦ Types ◦ Dangers  Case Study  Summary  Works Cited.
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the.
Hiding in the Dark: The Internet You Cannot See Marc Visnick
3.1 Types of Servers.
Jenny Pange University of Ioannina
3.1 Types of Servers.
Principles of Network Applications
3.1 Types of Servers.
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
Services Provided by Network Operating Systems
Unit 8 Network Security.
InfoShare A Distributed P2P Information Storage & Retrieval System
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

Peer-to-Peer Networks 16 P2P in the Wild Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg

Real-World P2P Applications in 2016  File sharing & transmission  Bittorrent, eMule, FastTrack, DirectConnect, Gnutella, Skype, Maidsafe  Chat  Skype, Tonic, OMessenger, PoPNote, LAN Messenger, WireNote, Mossawir LAN Messenger, Squiggle, CDMessenger, Softros LAN Messenger, …  VoIP, Video-Chat  Skype, Zello, Brosix, Google Hangout  Synchronization & backup  Bittorrent Sync, SyncThing  Money  Bitcoin, Maissafe  Software distribution & update  Windows 10 updates, Steam  Anonymize  I2P, Freenet, TorChat, Tribler, Bitmessage, DigitalNote XDN, Osiris, Syndle, Perfect Dark, Netsukuku, DigitalNote XDN, Tahoe-LAFS  Media Streaming  Vuze, Tribler, Miro Media Player, PPLive  Programming platforms, Frameworks  JXTA, GNUNet, Windows Peer Networking  Web search  Yacy, Faroo 2

Synchronization & Backup  Problem  Synchronize two file systems  Differential backups  Standard solutions  rsync  network protocol and tool  transmits only the differences of files  for upholding copies of file systems  no versioning  Cloud services  e.g. Google drive, Dropbox, BWsync&share, etc  synchronizes directories to server  only differential update  versioning 3

Peer-to-Peer File Synchronization  Idea  rsync but for many peers  Bittorrent Sync  uses Bittorrent for updates  closed group of servers  symmetric cryptography AES-128  versioning  no conflict handling  SyncThing  open source  secure, authenticated, TLS  versioning  no conflict handling 4

BitCoin  Peer-to-Peer Money transactions -open source digital currency -decentralized currency -Public-key cryptography -Digital signatures -Anonymity if TOR is used  Peer-to-Peer network for transactions -Distributed computation tasks determine the order of transactions 5

Chat Tools  Lots of commercial/open software -Skype, Tonic, OMessenger, PoPNote, LAN Messenger, WireNote, Mossawir LAN Messenger, Squiggle, CDMessenger, Softros LAN Messenger, …  Motivation -Harness the power of the Internet for direct communication  Features -often group features -secure communication -cheap server less solutions 6

File Sharing  Bittorrent -dominates traffic -with DHT or tracker hosts -extra infrastructure for search  eMule, FastTrack, DirectConnect, Gnutella -less traffic since security issues  Other P2P tools like Skype -offer also file transmission 7

Media Streaming  A lot of former P2P Streaming  Peercast, peerstreamer, QQLive, Joost, Zattoo, Moved to Client-Server  Octoshape, Zattoo  Survivers:  Bittorrent-related: Vuze, Bittorrent  streamer (p2p radio)  Miro Media Player (malware financed)  Big in China  PPStream, PPTV, Funshion 8

I2P  I2P (Invisible Internet Project)  darknet  anonymous peer-to-peer distribution communication layer  Garlic routing  combining small onions in one message  allows any traditional internet application  , IRC, file sharing, web hosting, HTTP  File sharing  Bittorrent, iMule, I2Phex   I2P-Bote  Instant Messaging  I2P-Messenger, I2P-Talk 9

Peer-to-Peer Networks 16 P2P in the Wild Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg