SlideShare a Scribd company logo
1 of 52
 The prominent feature of P2P networks is their ability to
provide a large combined storage, CPU power, and other
resources while imposing a low cost for scalability, and for
entry into and exit from the network.
 The ongoing entry and exit of various nodes, as well as
dynamic insertion and deletion of objects in P2P network is
called churn.
 There are two types of P2P systems:
structured and unstructured.
 Overlay network is constructed over another network. For
example, connecting internet over telephone lines is an
overlay network.
Characteristics of Peer to Peer Computing:
 Peer to peer networks are usually formed by groups
computers.
 The nodes in peer to peer networks both use resources and
provide resources.
 The nodes in peer to peer networks act as both clients and
servers.
 Efficient usage of resources.
 Self -organizing nature: because of scalable storage, CPU
power and other resources.
 Distributed control: fast and efficient searching for data.
 Symmetric: highly scalable
 Anonymity: efficient management of churns
 Naming mechanism: selection of geographically close
server.
 Security, authentication, trust: Redundancy in storage
Advantages of Peer to Peer Computing:
 Each computer in the peer to peer network manages itself. The
network is quite easy to set up and maintain.
 It is easy to scale the peer to peer network and add more nodes.
This only increases the data sharing capacity of the system.
 None of the nodes in the peer to peer network are dependent on
the others for their functioning. Hence the network is fault
tolerant.
 Easy deployment and organization.
Disadvantages of Peer to Peer Computing
 Difficult to back-up the data as it is stored.
 Difficult to provide overall security in the peer to peer network.
 The Internet was originally built as a peer-to-peer system in
the late 1960s to share computing resources within the US.
 Later the transfer of resources between systems took place by
means of client server communication.
 Later Napster was developed for peer –to-peer file sharing
especially MP3 files.
 They are not fully peer-to-peer since it used central servers to
maintain lists of connected systems and the files they
provided, while actual transactions were conducted directly
between machines.
Working of Napster:
◦ Each user must have Napster software in order to
engage in file transfers.
◦ The user runs the Napster program. Once executed,
this program checks for an Internet connection.
◦ If an Internet connection is detected, another
connection between the user's computer and one of
Napster's Central Servers will be established. This
connection is made possible by the Napster file-
sharing software.
◦ The Napster Central Server keeps a directory of all
client computers connected to it and stores
information on them as described above.
 If a user wants a certain file, they place a request
to the Napster Centralized Server that it's
connected to.
 The Napster Server looks up its directory to see if
it has any matches for the user's request.
 The Server then sends the user a list of all that
matches (if any) it as found including the
corresponding, IP address, user name, file size,
ping number, bit rate etc.
 The user chooses the file it wishes to download
from the list of matches and tries to establish a
direct connection with the computer upon which
the desired file resides.
 It tries to make this connection by sending a
message to the client computer indicating their
own IP address and the file name they want to
download from the client.
 If a connection is made, the client computer
where the desired file resides is now considered
the host.
 The host now transfers the file to the user.
 The host computer breaks the connection with
the user computer when downloading is
complete.
 Middleware is the software that manages and supports the
different components of a distributed system.
 Middleware is usually off-the-shelf rather than specially written
software.
 A key problem in Peer-to-Peer applications is to provide a way
for clients to access data resources efficiently.
 Peer clients need to locate and communicate with any available
resource, even though resources may be widely distributed and
configuration may be dynamic, constantly adding and removing
resources and connections.
 A routing overlay is a distributed algorithm for a
middleware layer responsible for routing requests from any
client to a host that holds the object to which the request is
addressed.
 Main tasks:
• Routing of requests to objects: locating nodes and objects
• Insertion and deletion of objects
• Node addition and removal
Types of Routing Overlays
 DHT – Distributed Hash Tables. GUIDs are stored based on
hash values.
 DOLR – Distributed Object Location and Routing. DOLR is a
layer over the DHT that maps GUIDs and address of nodes.
GUIDs host address is notified using the Publish() operation.
 Pastry is a generic, scalable and efficient substrate for peer-to-peer
applications.
 Pastry nodes form a decentralized, self-organizing and fault-
tolerant overlay network within the Internet.
 Pastry provides efficient request routing, deterministic object
location, and load balancing in an application-independent manner.
 Each node in the Pastry network has a unique, uniform random
identifier (nodeId) in a circular 128-bit identifier space.
When presented with a message and a numeric 128-bit key, a
Pastry node efficiently routes the message to the node with a
nodeId that is numerically closest to the key, among all
currently live Pastry nodes.
The expected number of forwarding steps in the Pastry overlay
network is O(log N), while the size of the routing table
maintained in each Pastry node is only O(log N) in size (where
N is the number of live Pastry nodes in the overlay network).
Each Pastry node keeps track of its L immediate neighbors
in the nodeId space called the leaf set, and notifies
applications of new node arrivals, node failures and node
recoveries within the leaf set.
It seeks to minimize the distance messages travel,
according to a scalar proximity metric like the ping delay.
Capabilities of Pastry
1. Mapping application objects to Pastry nodes
Application-specific objects are assigned unique, uniform random
identifiers (objIds) and mapped to the k, (k >= 1) nodes with nodeIds
numerically closest to the objId.
2. Inserting objects
Application-specific objects can be inserted by routing a Pastry
message, using the objId as the key.
3. Accessing objects
Application-specific objects can be looked up, contacted, or retrieved
by routing a Pastry message, using the objId as the key.
4. Availability and persistence
Applications interested in availability and persistence of
application-specific objects maintain the following invariant as
nodes join, fail and recover.
object replicas are maintained on the k nodes with numerically
closest nodeIds to the objId, for k> 1.
5. Diversity
The assignment of nodeIds is uniform random, and cannot be
corrupted by an attacker. Thus, with high probability, nodes with
adjacent nodeIds are diverse in geographic location, ownership,
jurisdiction, network attachment, etc.
6. Load balancing
Both nodeIds and objIds are randomly assigned and uniformly
distributed in the 128-bit Pastry identifier space.
7.Object caching
◦ Applications can cache objects on the Pastry nodes encountered along
the paths taken by insert and lookup messages.
8.Efficient, scalable information dissemination
◦ Applications can perform efficient multicast using reverse path
forwarding along the tree formed by the routes from clients to the node
with nodeId numerically closest to a given objId.
Pastry’s Routing Algorithm
 The routing algorithm involves the use of a routing table at
each node to route messages efficiently. This is divided into
two stages:
Pastry’s Routing Algorithm
 The routing algorithm involves the use of a routing table at
each node to route messages efficiently. This is divided into
two stages:
First Stage:
 In this stage a routing scheme is used, that routes messages
correctly but inefficiently without a routing table.
 Each active node stores a leaf set – a vector L (of size 2l)
containing the GUIDs and IP addresses of the nodes whose
GUIDs are numerically closest on either side of its own.
 GUID 0‟s lower neighbour is 2128–1.
 Every leaf set includes the GUIDs and IP addresses of the
current node‟s immediate neighbors.
Second Stage:
This has a full routing algorithm, which routes a
request to any node in O(log N) messages.
Each Pastry node maintains a tree-structured routing table
with GUIDs and IP addresses for a set of nodes spread
throughout the entire range of 2128 possible GUID values,
with increased density of coverage for GUIDs Numerically
close to its own.
 The structure of routing table is: GUIDs are viewed as
hexadecimal values and the table classifies GUIDs based
on their hexadecimal prefixes.
 The table has as many rows as there are hexadecimal digits
in a GUID, so for the prototype Pastry system that wear
describing, there are 128/4 = 32 rows.
 Any row n contains 15 entries – one for each possible
value of the nth hexadecimal digit, excluding the value in
the local node ‟s GUID.
Locality
 The Pastry routing structure is redundant.
 Each row in a routing table contains 16 entries.
 The entries in the ith row give the addresses of 16 nodes with
GUIDs with i–1 initial hexadecimal digits that match the
current node ‟s GUID and an ith digit that takes each of the
possible hexadecimal values.
Fault tolerance
 The Pastry routing algorithm assumes that all entries in
routing tables and leaf sets refer to live, correctly functioning
nodes.
 All nodes send “heartbeat” messages i.e., messages sent at
fixed time intervals to indicate that the sender is alive to
neighboring nodes in their leaf sets.
 information about failed nodes detected in this manner may not be
disseminated sufficiently rapidly to eliminate routing errors.
 To overcome these problems, clients that depend upon reliable
message delivery are expected to employ an at-least-once delivery
mechanism and repeat their requests several times in the absence
of a response.
Dependability
 Dependability measures include the use of acknowledgements at
each hop in the routing algorithm.
 If the sending host does not receive an acknowledgement after a
specified timeout, it selects an alternative route and retransmits the
message.
 The node that failed to send an acknowledgement is then noted as a
suspected failure.
 Tapestry is a decentralized distributed system.
 It is an overlay network that implements simple key-based
routing.
 In a Tapestry network, objects are “published” at nodes, and
once an object has been successfully published, it is
possible for any other node in the network to find the
location at which that objects is published.
 Identifiers are either NodeIds, which refer to computers that
perform routing operations, or GUIDs, which refer to the
objects.
Gnutella:
 The Gnutella network is a fully decentralized, peer-to-peer
application layer network that facilitates file sharing; and is
built around an open protocol developed to enable host
discovery, distributed search, and file transfer.
 It consists of the collection of Internet connected hosts on
which Gnutella protocol enabled applications are running.
 The Gnutella protocol makes possible all host-to-host
communication through the use of messages.
Message Format:
The rules are as follows:
 Prior to forwarding a message, a host will decrement its TTL
field and increment its Hops field. If the TTL field is found to
be zero following this action, the message is not forwarded.
 If a host encounters a message with the same GUID and Type
fields as a message already forwarded, the new message is
treated as a duplicate and is not forwarded a second time.
Types of Message:
There are five types of messages
 Ping -discover hosts on network
 Pong -reply to ping
 Query -search for a file
 Query hit -reply to query
 Push -download request for firewalled servants (ease
file transfer from firewalled hosts)
 Once connected to the network, a host is always involved in
discovering hosts, establishing connections, and propagating
messages that it receives from its peers
 To engage in host discovery, a host must issue a Ping message
to the host of which it has offline knowledge.
 That host will then forward the ping message across its open
connections, and optionally respond to it with a Pong
message.
 Each host that subsequently receives the Ping message will
act in a similar manner until the TTL of the message has been
exhausted.
 A Pong message may only be routed along the reverse of the
path that carried the Ping message to which it is responding.
 In searching for content, a host propagates search queries
across its active connections.
 Those queries are then processed and forwarded by its peers.
 Each host that subsequently receives the Query message will
act in a similar manner until the TTL of the message has been
exhausted.
 Query-Hit messages may only be routed along the reverse of
the path that carried the Query message to which it is a
response.
 The sharing of content on the Gnutella network is
accomplished through the use of the HTTP protocol.
Query Routing Protocol (QRP)
 Exchanging information about files contained on nodes -> only
forwarding queries down paths where the system expects positive
outcome.
 Produce QRT (Query Routing Table) and send to your ultrapeer.
 Ultrapeers make an union and exchange the table with connected
ultrapeers.
 The Digital Signature is a technique which is used to validate
the authenticity and integrity of the message.
 authentication, integrity, and non-repudiation are achieved by
using a digital signature.
 The basic idea behind the Digital Signature is to sign a
document. When we send a document electronically, we can
also sign it.
 We can sign a document in two ways: to sign a whole
document and to sign a digest.
Signing the Whole Document:
 The sender uses a private key to encrypt the message while
the receiver uses the public key of the sender to decrypt the
message.
 In Digital Signature, the private key is used for encryption
while the public key is used for decryption.
 Digital Signature cannot be achieved by using secret key
encryption.
Digital Signature is used to achieve the following three aspects:
 Integrity: The Digital Signature preserves the integrity of a
message because, if any malicious attack intercepts a message and
partially or totally changes it, then the decrypted message would be
impossible.
 Authentication: We can use the following reasoning to show how
the message is authenticated. If an intruder (user X) sends a
message pretending that it is coming from someone else (user A),
user X uses her own private key to encrypt the message. The
message is decrypted by using the public key of user A. Therefore
this makes the message unreadable. Encryption with X's private
key and decryption with A's public key results in garbage value.
 Non-Repudiation: Digital Signature also provides non-
repudiation. If the sender denies sending the message, then her
private key corresponding to her public key is tested on the
plaintext. If the decrypted message is the same as the original
message, then we know that the sender has sent the message.
Signing the Digest:
 Public key encryption is efficient if the message is short. If
the message is long, a public key encryption is inefficient to
use. The solution to this problem is to let the sender sign a
digest of the document instead of the whole document.
 The sender creates a miniature version (digest) of the
document and then signs it, the receiver checks the signature
of the miniature version.
 The hash function is used to create a digest of the message.
The hash function creates a fixed-size digest from the
variable-length message.
 The two most common hash functions used: MD5 (Message
Digest 5) and SHA-1 (Secure Hash Algorithm 1). The first
one produces 120-bit digest while the second one produces a
160-bit digest.
 At the Sender site
 Data Encryption (Sender)
 At the Receiver site
 Distributed processes are complex to debug. One of
many possible problems is that consistency restraints
must be evaluated for simultaneous attribute values in
multiple processes at different instants of time.
 Distributed problems discussed in this section have
particular solutions, but all of them also illustrate the
need to observe global states. We will now look at a
general approach to observing global states.
UNIT III DIS.pptx

More Related Content

Similar to UNIT III DIS.pptx

Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networkingicanhasfay
 
Class work 1 computer networks-cse-317
Class work 1 computer networks-cse-317Class work 1 computer networks-cse-317
Class work 1 computer networks-cse-317Khondoker Sadia
 
Internetworking
InternetworkingInternetworking
InternetworkingRaghu nath
 
Computer network note
Computer network noteComputer network note
Computer network noteMdAnikKhan
 
unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfshubhangisonawane6
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Alexander Decker
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentalsThe Avi Sharma
 
CloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdfCloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdfkhan593595
 
CloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdfCloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdfkhan593595
 
Introduction to computer networking
Introduction to computer networkingIntroduction to computer networking
Introduction to computer networkingSameer Sharma
 
F233842
F233842F233842
F233842irjes
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking FundamentalsRajet Veshin
 
Network internet
Network internetNetwork internet
Network internetKumar
 
Networks internet
Networks internetNetworks internet
Networks internetKumar
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 

Similar to UNIT III DIS.pptx (20)

Final peersimp pt
Final peersimp ptFinal peersimp pt
Final peersimp pt
 
Peer Sim & P2P
Peer Sim & P2PPeer Sim & P2P
Peer Sim & P2P
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 
NT BY AKATSUKI.pdf E
NT BY AKATSUKI.pdf                              ENT BY AKATSUKI.pdf                              E
NT BY AKATSUKI.pdf E
 
Class work 1 computer networks-cse-317
Class work 1 computer networks-cse-317Class work 1 computer networks-cse-317
Class work 1 computer networks-cse-317
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Computer network note
Computer network noteComputer network note
Computer network note
 
unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdf
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
CNP proficiency.pptx
CNP proficiency.pptxCNP proficiency.pptx
CNP proficiency.pptx
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentals
 
CloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdfCloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdf
 
CloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdfCloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdf
 
lecture-2-tcp-ip.ppt
lecture-2-tcp-ip.pptlecture-2-tcp-ip.ppt
lecture-2-tcp-ip.ppt
 
Introduction to computer networking
Introduction to computer networkingIntroduction to computer networking
Introduction to computer networking
 
F233842
F233842F233842
F233842
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Network internet
Network internetNetwork internet
Network internet
 
Networks internet
Networks internetNetworks internet
Networks internet
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 

More from SamPrem3

20IT501_DWDM_U5.ppt
20IT501_DWDM_U5.ppt20IT501_DWDM_U5.ppt
20IT501_DWDM_U5.pptSamPrem3
 
20IT501_DWDM_PPT_Unit_IV.ppt
20IT501_DWDM_PPT_Unit_IV.ppt20IT501_DWDM_PPT_Unit_IV.ppt
20IT501_DWDM_PPT_Unit_IV.pptSamPrem3
 
20IT501_DWDM_U3.ppt
20IT501_DWDM_U3.ppt20IT501_DWDM_U3.ppt
20IT501_DWDM_U3.pptSamPrem3
 
20IT501_DWDM_PPT_Unit_II.ppt
20IT501_DWDM_PPT_Unit_II.ppt20IT501_DWDM_PPT_Unit_II.ppt
20IT501_DWDM_PPT_Unit_II.pptSamPrem3
 
20IT501_DWDM_PPT_Unit_I.ppt
20IT501_DWDM_PPT_Unit_I.ppt20IT501_DWDM_PPT_Unit_I.ppt
20IT501_DWDM_PPT_Unit_I.pptSamPrem3
 
UNIT V DIS.pptx
UNIT V DIS.pptxUNIT V DIS.pptx
UNIT V DIS.pptxSamPrem3
 
UNIT IV DIS.pptx
UNIT IV DIS.pptxUNIT IV DIS.pptx
UNIT IV DIS.pptxSamPrem3
 
UNIT II DIS.pptx
UNIT II DIS.pptxUNIT II DIS.pptx
UNIT II DIS.pptxSamPrem3
 
UNIT I DIS.pptx
UNIT I DIS.pptxUNIT I DIS.pptx
UNIT I DIS.pptxSamPrem3
 

More from SamPrem3 (9)

20IT501_DWDM_U5.ppt
20IT501_DWDM_U5.ppt20IT501_DWDM_U5.ppt
20IT501_DWDM_U5.ppt
 
20IT501_DWDM_PPT_Unit_IV.ppt
20IT501_DWDM_PPT_Unit_IV.ppt20IT501_DWDM_PPT_Unit_IV.ppt
20IT501_DWDM_PPT_Unit_IV.ppt
 
20IT501_DWDM_U3.ppt
20IT501_DWDM_U3.ppt20IT501_DWDM_U3.ppt
20IT501_DWDM_U3.ppt
 
20IT501_DWDM_PPT_Unit_II.ppt
20IT501_DWDM_PPT_Unit_II.ppt20IT501_DWDM_PPT_Unit_II.ppt
20IT501_DWDM_PPT_Unit_II.ppt
 
20IT501_DWDM_PPT_Unit_I.ppt
20IT501_DWDM_PPT_Unit_I.ppt20IT501_DWDM_PPT_Unit_I.ppt
20IT501_DWDM_PPT_Unit_I.ppt
 
UNIT V DIS.pptx
UNIT V DIS.pptxUNIT V DIS.pptx
UNIT V DIS.pptx
 
UNIT IV DIS.pptx
UNIT IV DIS.pptxUNIT IV DIS.pptx
UNIT IV DIS.pptx
 
UNIT II DIS.pptx
UNIT II DIS.pptxUNIT II DIS.pptx
UNIT II DIS.pptx
 
UNIT I DIS.pptx
UNIT I DIS.pptxUNIT I DIS.pptx
UNIT I DIS.pptx
 

Recently uploaded

University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 

Recently uploaded (20)

University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 

UNIT III DIS.pptx

  • 1.
  • 2.
  • 3.
  • 4.  The prominent feature of P2P networks is their ability to provide a large combined storage, CPU power, and other resources while imposing a low cost for scalability, and for entry into and exit from the network.  The ongoing entry and exit of various nodes, as well as dynamic insertion and deletion of objects in P2P network is called churn.  There are two types of P2P systems: structured and unstructured.  Overlay network is constructed over another network. For example, connecting internet over telephone lines is an overlay network.
  • 5. Characteristics of Peer to Peer Computing:  Peer to peer networks are usually formed by groups computers.  The nodes in peer to peer networks both use resources and provide resources.  The nodes in peer to peer networks act as both clients and servers.  Efficient usage of resources.  Self -organizing nature: because of scalable storage, CPU power and other resources.  Distributed control: fast and efficient searching for data.  Symmetric: highly scalable  Anonymity: efficient management of churns  Naming mechanism: selection of geographically close server.  Security, authentication, trust: Redundancy in storage
  • 6. Advantages of Peer to Peer Computing:  Each computer in the peer to peer network manages itself. The network is quite easy to set up and maintain.  It is easy to scale the peer to peer network and add more nodes. This only increases the data sharing capacity of the system.  None of the nodes in the peer to peer network are dependent on the others for their functioning. Hence the network is fault tolerant.  Easy deployment and organization. Disadvantages of Peer to Peer Computing  Difficult to back-up the data as it is stored.  Difficult to provide overall security in the peer to peer network.
  • 7.  The Internet was originally built as a peer-to-peer system in the late 1960s to share computing resources within the US.  Later the transfer of resources between systems took place by means of client server communication.  Later Napster was developed for peer –to-peer file sharing especially MP3 files.  They are not fully peer-to-peer since it used central servers to maintain lists of connected systems and the files they provided, while actual transactions were conducted directly between machines.
  • 8. Working of Napster: ◦ Each user must have Napster software in order to engage in file transfers. ◦ The user runs the Napster program. Once executed, this program checks for an Internet connection. ◦ If an Internet connection is detected, another connection between the user's computer and one of Napster's Central Servers will be established. This connection is made possible by the Napster file- sharing software. ◦ The Napster Central Server keeps a directory of all client computers connected to it and stores information on them as described above.
  • 9.
  • 10.
  • 11.  If a user wants a certain file, they place a request to the Napster Centralized Server that it's connected to.  The Napster Server looks up its directory to see if it has any matches for the user's request.  The Server then sends the user a list of all that matches (if any) it as found including the corresponding, IP address, user name, file size, ping number, bit rate etc.  The user chooses the file it wishes to download from the list of matches and tries to establish a direct connection with the computer upon which the desired file resides.
  • 12.  It tries to make this connection by sending a message to the client computer indicating their own IP address and the file name they want to download from the client.  If a connection is made, the client computer where the desired file resides is now considered the host.  The host now transfers the file to the user.  The host computer breaks the connection with the user computer when downloading is complete.
  • 13.  Middleware is the software that manages and supports the different components of a distributed system.  Middleware is usually off-the-shelf rather than specially written software.  A key problem in Peer-to-Peer applications is to provide a way for clients to access data resources efficiently.  Peer clients need to locate and communicate with any available resource, even though resources may be widely distributed and configuration may be dynamic, constantly adding and removing resources and connections.
  • 14.
  • 15.
  • 16.
  • 17.  A routing overlay is a distributed algorithm for a middleware layer responsible for routing requests from any client to a host that holds the object to which the request is addressed.
  • 18.  Main tasks: • Routing of requests to objects: locating nodes and objects • Insertion and deletion of objects • Node addition and removal Types of Routing Overlays  DHT – Distributed Hash Tables. GUIDs are stored based on hash values.  DOLR – Distributed Object Location and Routing. DOLR is a layer over the DHT that maps GUIDs and address of nodes. GUIDs host address is notified using the Publish() operation.
  • 19.
  • 20.
  • 21.  Pastry is a generic, scalable and efficient substrate for peer-to-peer applications.  Pastry nodes form a decentralized, self-organizing and fault- tolerant overlay network within the Internet.  Pastry provides efficient request routing, deterministic object location, and load balancing in an application-independent manner.  Each node in the Pastry network has a unique, uniform random identifier (nodeId) in a circular 128-bit identifier space.
  • 22. When presented with a message and a numeric 128-bit key, a Pastry node efficiently routes the message to the node with a nodeId that is numerically closest to the key, among all currently live Pastry nodes. The expected number of forwarding steps in the Pastry overlay network is O(log N), while the size of the routing table maintained in each Pastry node is only O(log N) in size (where N is the number of live Pastry nodes in the overlay network).
  • 23. Each Pastry node keeps track of its L immediate neighbors in the nodeId space called the leaf set, and notifies applications of new node arrivals, node failures and node recoveries within the leaf set. It seeks to minimize the distance messages travel, according to a scalar proximity metric like the ping delay.
  • 24. Capabilities of Pastry 1. Mapping application objects to Pastry nodes Application-specific objects are assigned unique, uniform random identifiers (objIds) and mapped to the k, (k >= 1) nodes with nodeIds numerically closest to the objId. 2. Inserting objects Application-specific objects can be inserted by routing a Pastry message, using the objId as the key. 3. Accessing objects Application-specific objects can be looked up, contacted, or retrieved by routing a Pastry message, using the objId as the key.
  • 25. 4. Availability and persistence Applications interested in availability and persistence of application-specific objects maintain the following invariant as nodes join, fail and recover. object replicas are maintained on the k nodes with numerically closest nodeIds to the objId, for k> 1. 5. Diversity The assignment of nodeIds is uniform random, and cannot be corrupted by an attacker. Thus, with high probability, nodes with adjacent nodeIds are diverse in geographic location, ownership, jurisdiction, network attachment, etc. 6. Load balancing Both nodeIds and objIds are randomly assigned and uniformly distributed in the 128-bit Pastry identifier space.
  • 26. 7.Object caching ◦ Applications can cache objects on the Pastry nodes encountered along the paths taken by insert and lookup messages. 8.Efficient, scalable information dissemination ◦ Applications can perform efficient multicast using reverse path forwarding along the tree formed by the routes from clients to the node with nodeId numerically closest to a given objId. Pastry’s Routing Algorithm  The routing algorithm involves the use of a routing table at each node to route messages efficiently. This is divided into two stages:
  • 27. Pastry’s Routing Algorithm  The routing algorithm involves the use of a routing table at each node to route messages efficiently. This is divided into two stages: First Stage:  In this stage a routing scheme is used, that routes messages correctly but inefficiently without a routing table.  Each active node stores a leaf set – a vector L (of size 2l) containing the GUIDs and IP addresses of the nodes whose GUIDs are numerically closest on either side of its own.  GUID 0‟s lower neighbour is 2128–1.  Every leaf set includes the GUIDs and IP addresses of the current node‟s immediate neighbors.
  • 28. Second Stage: This has a full routing algorithm, which routes a request to any node in O(log N) messages. Each Pastry node maintains a tree-structured routing table with GUIDs and IP addresses for a set of nodes spread throughout the entire range of 2128 possible GUID values, with increased density of coverage for GUIDs Numerically close to its own.
  • 29.  The structure of routing table is: GUIDs are viewed as hexadecimal values and the table classifies GUIDs based on their hexadecimal prefixes.  The table has as many rows as there are hexadecimal digits in a GUID, so for the prototype Pastry system that wear describing, there are 128/4 = 32 rows.  Any row n contains 15 entries – one for each possible value of the nth hexadecimal digit, excluding the value in the local node ‟s GUID.
  • 30.
  • 31.
  • 32.
  • 33. Locality  The Pastry routing structure is redundant.  Each row in a routing table contains 16 entries.  The entries in the ith row give the addresses of 16 nodes with GUIDs with i–1 initial hexadecimal digits that match the current node ‟s GUID and an ith digit that takes each of the possible hexadecimal values. Fault tolerance  The Pastry routing algorithm assumes that all entries in routing tables and leaf sets refer to live, correctly functioning nodes.  All nodes send “heartbeat” messages i.e., messages sent at fixed time intervals to indicate that the sender is alive to neighboring nodes in their leaf sets.
  • 34.  information about failed nodes detected in this manner may not be disseminated sufficiently rapidly to eliminate routing errors.  To overcome these problems, clients that depend upon reliable message delivery are expected to employ an at-least-once delivery mechanism and repeat their requests several times in the absence of a response. Dependability  Dependability measures include the use of acknowledgements at each hop in the routing algorithm.  If the sending host does not receive an acknowledgement after a specified timeout, it selects an alternative route and retransmits the message.  The node that failed to send an acknowledgement is then noted as a suspected failure.
  • 35.  Tapestry is a decentralized distributed system.  It is an overlay network that implements simple key-based routing.  In a Tapestry network, objects are “published” at nodes, and once an object has been successfully published, it is possible for any other node in the network to find the location at which that objects is published.  Identifiers are either NodeIds, which refer to computers that perform routing operations, or GUIDs, which refer to the objects.
  • 36.
  • 37.
  • 38. Gnutella:  The Gnutella network is a fully decentralized, peer-to-peer application layer network that facilitates file sharing; and is built around an open protocol developed to enable host discovery, distributed search, and file transfer.  It consists of the collection of Internet connected hosts on which Gnutella protocol enabled applications are running.  The Gnutella protocol makes possible all host-to-host communication through the use of messages. Message Format:
  • 39. The rules are as follows:  Prior to forwarding a message, a host will decrement its TTL field and increment its Hops field. If the TTL field is found to be zero following this action, the message is not forwarded.  If a host encounters a message with the same GUID and Type fields as a message already forwarded, the new message is treated as a duplicate and is not forwarded a second time.
  • 40. Types of Message: There are five types of messages  Ping -discover hosts on network  Pong -reply to ping  Query -search for a file  Query hit -reply to query  Push -download request for firewalled servants (ease file transfer from firewalled hosts)  Once connected to the network, a host is always involved in discovering hosts, establishing connections, and propagating messages that it receives from its peers
  • 41.  To engage in host discovery, a host must issue a Ping message to the host of which it has offline knowledge.  That host will then forward the ping message across its open connections, and optionally respond to it with a Pong message.  Each host that subsequently receives the Ping message will act in a similar manner until the TTL of the message has been exhausted.  A Pong message may only be routed along the reverse of the path that carried the Ping message to which it is responding.
  • 42.  In searching for content, a host propagates search queries across its active connections.  Those queries are then processed and forwarded by its peers.  Each host that subsequently receives the Query message will act in a similar manner until the TTL of the message has been exhausted.  Query-Hit messages may only be routed along the reverse of the path that carried the Query message to which it is a response.  The sharing of content on the Gnutella network is accomplished through the use of the HTTP protocol.
  • 43.
  • 44. Query Routing Protocol (QRP)  Exchanging information about files contained on nodes -> only forwarding queries down paths where the system expects positive outcome.  Produce QRT (Query Routing Table) and send to your ultrapeer.  Ultrapeers make an union and exchange the table with connected ultrapeers.
  • 45.  The Digital Signature is a technique which is used to validate the authenticity and integrity of the message.  authentication, integrity, and non-repudiation are achieved by using a digital signature.  The basic idea behind the Digital Signature is to sign a document. When we send a document electronically, we can also sign it.  We can sign a document in two ways: to sign a whole document and to sign a digest.
  • 46. Signing the Whole Document:  The sender uses a private key to encrypt the message while the receiver uses the public key of the sender to decrypt the message.  In Digital Signature, the private key is used for encryption while the public key is used for decryption.  Digital Signature cannot be achieved by using secret key encryption.
  • 47. Digital Signature is used to achieve the following three aspects:  Integrity: The Digital Signature preserves the integrity of a message because, if any malicious attack intercepts a message and partially or totally changes it, then the decrypted message would be impossible.  Authentication: We can use the following reasoning to show how the message is authenticated. If an intruder (user X) sends a message pretending that it is coming from someone else (user A), user X uses her own private key to encrypt the message. The message is decrypted by using the public key of user A. Therefore this makes the message unreadable. Encryption with X's private key and decryption with A's public key results in garbage value.  Non-Repudiation: Digital Signature also provides non- repudiation. If the sender denies sending the message, then her private key corresponding to her public key is tested on the plaintext. If the decrypted message is the same as the original message, then we know that the sender has sent the message.
  • 48. Signing the Digest:  Public key encryption is efficient if the message is short. If the message is long, a public key encryption is inefficient to use. The solution to this problem is to let the sender sign a digest of the document instead of the whole document.  The sender creates a miniature version (digest) of the document and then signs it, the receiver checks the signature of the miniature version.  The hash function is used to create a digest of the message. The hash function creates a fixed-size digest from the variable-length message.  The two most common hash functions used: MD5 (Message Digest 5) and SHA-1 (Secure Hash Algorithm 1). The first one produces 120-bit digest while the second one produces a 160-bit digest.
  • 49.  At the Sender site  Data Encryption (Sender)
  • 50.  At the Receiver site
  • 51.  Distributed processes are complex to debug. One of many possible problems is that consistency restraints must be evaluated for simultaneous attribute values in multiple processes at different instants of time.  Distributed problems discussed in this section have particular solutions, but all of them also illustrate the need to observe global states. We will now look at a general approach to observing global states.