SlideShare a Scribd company logo
1 of 12
Peer-to-Peer Architecture Case Study: Gnutella Network
Matei Ripeanu
Computer Science Department,
The University of Chicago
[email protected]
Abstract
Despite recent excitement generated by the P2P
paradigm and despite surprisingly fast deployment of
some P2P applications, there are few quantitative
evaluations of P2P systems behavior. Due to its open
architecture and achieved scale, Gnutella is an
interesting P2P architecture case study. Gnutella, like
most other P2P applications, builds at the application
level a virtual network with its own routing mechanisms.
The topology of this overlay network and the routing
mechanisms used have a significant influence on
application properties such as performance, reliability,
and scalability. We built a ‘crawler’ to extract the
topology of Gnutella’s application level network, we
analyze the topology graph and evaluate generated
network traffic. We find that although Gnutella is not a
pure power-law network, its current configuration has the
benefits and drawbacks of a power-law structure. These
findings lead us to propose changes to Gnutella protocol
and implementations that bring significant performance
and scalability improvements.
1. Introduction
Peer-to-peer systems (P2P) have emerged as a
significant social and technical phenomenon over the last
year. P2P systems provide infrastructure for communities
that share CPU cycles (e.g., Entropia, [email protected])
and/or, storage space (e.g., FreeNet, Gnutella), or that
support interpersonal collaborative environments. Two
factors have fostered the recent explosive growth of such
systems: first, the low cost and high availability of huge
computing and storage resources, and second, increased
network connectivity. As these trends continue, the P2P
paradigm can be expected to become more popular.
Peer-to-peer networks allow individual computers to
communicate directly with each other and to share
information and resources without using specialized
‘servers’. A common characteristic of this new breed of
applications is that they build, at the application level, a
virtual network with its own routing mechanisms. The
topology of this virtual network and the routing
mechanisms used have a significant influence on
application properties such as performance, reliability,
and, in some cases, anonymity. The virtual topology also
determines the communication costs incurred when
running the P2P application.
These considerations have motivated us to conduct a
detailed study of the topology and protocol of a popular
P2P system, Gnutella. In this study, we benefited from
Gnutella’s large existing user base and open architecture,
and, in effect, use the public Gnutella network as a large-
scale, if uncontrolled, testbed. We capture the network
topology, the generated traffic, and the resources’
dynamic behavior. We use our findings to evaluate costs
and benefits of the P2P approach and to investigate
possible improvements to the routing protocol that would
allow for better scaling and increased reliability.
Related work: Distributed Search
Solution
s (DSS)
group publishes partial results of their Gnutella research
[4]. A number of other research projects build on DSS’s
data: [2] analyzes Gnutella user behavior while [6]
focuses on efficient search protocols in power-law
networks. T. Hong [5] uses medium scale simulations to
explore Gnutella network properties. However, our
network crawling and analysis technology (developed
independently of this work) goes significantly further in
terms of scale (both spatial and temporal) and
sophistication.
2. Gnutella Network Analysis
Gnutella is an open, decentralized, P2P search protocol
[3] that is mainly used to find files. In addition, the term
Gnutella designates the virtual network of Internet
accessible hosts running Gnutella-speaking applications
We used this network for our measurements over a 6
month period.
In a Gnutella network, each maintains open TCP
connections with at least one other node, thus creating a
virtual network of servents at the application level. Query
and group maintenance messages are propagated using a
Proceedings of the First International Conference on Peer-to-
Peer Computing (P2P�01)
0-7695-1503-7/02 $17.00 © 2002 IEEE
flooding technique while query reply messages are back-
propagated. We have developed a crawler [7] that joins
the network uses the membership protocol [3] to collect
topology information.
Using the records of multiple successive crawls, we
investigated the dynamic graph structure over time. We
discover that about 40% of the nodes leave the network in
less than 4hours while only 20% of the nodes are
‘persistent’ (they are alive after 24h). We also used the
crawler to eavesdrop the traffic generated by the network.
Figure 1 categorizes generated traffic according to
message type. We detected that the volume of generated
traffic is the main obstacle for better scaling and wider
deployment.
Message Frequency
-
5
10
15
20
25
1 28 55 82 10
9
13
6
16
3
19
0
21
7
24
4
27
1
29
8
32
5
35
2
37
9
minute
m
es
sa
g
es
p
er
se
co
d
Ping
Push
Query
Other
Figure 1: Generated traffic split by message typeFigure 1:
Generated traffic split by message typeFigure 1: Generated
traffic split by message typeFigure 1: Generated traffic split by
message type over a
376 minute period. Note that overhead traffic (PING
messages serve only to maintain network connectivity)
forms more than 50% of traffic. For backward
compatibility reasons, flooding is also used to deliver some
file download requests (PUSH messages). The only �true�
user traffic is QUERY messages.
Recent research [1,8] shows that networks ranging
from natural networks such as molecules in a cell or
people in a social group to the Internet organize
themselves so that most nodes have few links and a small
number of nodes have many links. In [9], Albert finds
that networks following this organizational pattern
(power-law networks) display an unexpected degree of
robustness when facing random node failures: the ability
of the network to communicate is unaffected by high
failure rates. However, error tolerance comes at a high
price: these networks are extremely vulnerable to attacks,
i.e., to the selection and removal of a few nodes that play
the most important role in assuring the network's
connectivity. We show (in detail in [7]) that Gnutella is
similar to a power-law network, thus being able to operate
in highly dynamic environments.
3. Summary
Gnutella is an open, decentralized, P2P search protocol
that is mainly used to find and share files. Computers
running Gnutella protocol-compatible software form an
application-level network. We have developed tools to
discover and analyze this network. Our analysis shows
that Gnutella node connectivity follows a multi-modal
distribution, combining a power law and a quasi-constant
distribution. This property keeps the network as reliable
as a pure power-law network when assuming random
node failures, and makes it harder to attack by a malicious
adversary. Gnutella takes few precautions to ward off
potential attacks. For example, the network topology
information that we have obtained here is easy to obtain
and would permit highly efficient denial-of-service
attacks. Some form of security mechanisms that would
prevent an intruder from gathering topology information
appears essential for the long-term survival of the network
(although it would make global network monitoring more
difficult if not impossible).
We see two directions for improvement. First, we
observe that the application-level topology determines the
volume of generated traffic, the search success rate, and
application reliability. We could design an agent that
constantly monitors the network and intervenes by asking
servents to drop or add links as necessary to keep the
network topology optimal. Agents (or nodes) could
embed some information about the underlying physical
network and build accordingly the virtual application
topology. Note that implementing this idea requires only
minor protocol modifications.
The second direction is to replace flooding with a
smarter (less expensive in terms of communication costs)
routing and group communication mechanism. We have
collected a large amount of data on the environment in
which Gnutella operates and shall use it in simulations to
investigate the appropriateness of these and various other
alternatives.
3. References
[1] M. Faloutsos, P. Faloutsos, and C. Faloutsos, On Power-Law
Relationships of the Internet Topology, SIGCOMM 1999.
[2] E. Adar and B. Huberman, Free riding on Gnutella, First
Monday Vol. 5, Number 10, - Oct. 2nd 2000.
[3] Gnutella protocol specification v4.0. Available at:
http://dss.clip2.com/GnutellaProtocol04.pdf
[4] DSS group, Gnutella: To the Bandwidth Barrier and Beyond,
available at: http://dss.clip2.com, Nov. 6, 2000.
[5] T. Hong, Performance, In Peer-to-Peer: Harnessing the
Power of Disruptive Technologies, ed. A. Oram. O'Reilly and
Associates: Sebastopol, CA, 2001.
[6] L. Adamic, R. Lukose, A. Puniyani, and B. Huberman,
Search in Power-Law Networks
[7] M. Ripeanu, Peer-to-Peer Architecture Case Study: Gnutella
Network, University of Chicago Technical Report TR-2001-26.
[8] A. Barabasi and R. Albert. Emergence of scaling in random
networks, Science, 286(509), 1999.
[9] R. Albert, H. Jeong, and A. Barabási, Attak and tolerance in
complex networks, Nature 406 378 (2000).
Proceedings of the First International Conference on Peer-to-
Peer Computing (P2P�01)
0-7695-1503-7/02 $17.00 © 2002 IEEE
Peer-to-Peer Architecture Case Study Gnutella NetworkMate.docx

More Related Content

Similar to Peer-to-Peer Architecture Case Study Gnutella NetworkMate.docx

10.11648.j.ajnc.20130202.13
10.11648.j.ajnc.20130202.1310.11648.j.ajnc.20130202.13
10.11648.j.ajnc.20130202.13Uvaraj Shan
 
Node selection in Peer-to-Peer content sharing service in mobile cellular net...
Node selection in Peer-to-Peer content sharing service in mobile cellular net...Node selection in Peer-to-Peer content sharing service in mobile cellular net...
Node selection in Peer-to-Peer content sharing service in mobile cellular net...Uvaraj Shan
 
Node selection in Peer-to-Peer content sharing service in mobile cellular net...
Node selection in Peer-to-Peer content sharing service in mobile cellular net...Node selection in Peer-to-Peer content sharing service in mobile cellular net...
Node selection in Peer-to-Peer content sharing service in mobile cellular net...Uvaraj Shan
 
Scale-Free Networks to Search in Unstructured Peer-To-Peer Networks
Scale-Free Networks to Search in Unstructured Peer-To-Peer NetworksScale-Free Networks to Search in Unstructured Peer-To-Peer Networks
Scale-Free Networks to Search in Unstructured Peer-To-Peer NetworksIOSR Journals
 
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...IRJET Journal
 
IRJET- Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...
IRJET-  	  Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...IRJET-  	  Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...
IRJET- Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...IRJET Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...IJCNCJournal
 
Analyse the performance of mobile peer to Peer network using ant colony optim...
Analyse the performance of mobile peer to Peer network using ant colony optim...Analyse the performance of mobile peer to Peer network using ant colony optim...
Analyse the performance of mobile peer to Peer network using ant colony optim...IJCI JOURNAL
 
Study of computer network issues and
Study of computer network issues andStudy of computer network issues and
Study of computer network issues andijfcstjournal
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Uvaraj Shan
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Uvaraj Shan
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Uvaraj Shan
 
ITS 2010 - Extended presentation slides
ITS 2010 - Extended presentation slidesITS 2010 - Extended presentation slides
ITS 2010 - Extended presentation slidesAntonio Marcos Alberti
 
Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks IJECEIAES
 

Similar to Peer-to-Peer Architecture Case Study Gnutella NetworkMate.docx (20)

1720 1724
1720 17241720 1724
1720 1724
 
4 gstudy
4 gstudy4 gstudy
4 gstudy
 
10.11648.j.ajnc.20130202.13
10.11648.j.ajnc.20130202.1310.11648.j.ajnc.20130202.13
10.11648.j.ajnc.20130202.13
 
Node selection in Peer-to-Peer content sharing service in mobile cellular net...
Node selection in Peer-to-Peer content sharing service in mobile cellular net...Node selection in Peer-to-Peer content sharing service in mobile cellular net...
Node selection in Peer-to-Peer content sharing service in mobile cellular net...
 
Node selection in Peer-to-Peer content sharing service in mobile cellular net...
Node selection in Peer-to-Peer content sharing service in mobile cellular net...Node selection in Peer-to-Peer content sharing service in mobile cellular net...
Node selection in Peer-to-Peer content sharing service in mobile cellular net...
 
Scale-Free Networks to Search in Unstructured Peer-To-Peer Networks
Scale-Free Networks to Search in Unstructured Peer-To-Peer NetworksScale-Free Networks to Search in Unstructured Peer-To-Peer Networks
Scale-Free Networks to Search in Unstructured Peer-To-Peer Networks
 
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
 
IRJET- Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...
IRJET-  	  Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...IRJET-  	  Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...
IRJET- Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
H1075460
H1075460H1075460
H1075460
 
International R/E Routing (v1.0)
International R/E Routing (v1.0)International R/E Routing (v1.0)
International R/E Routing (v1.0)
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
 
Analyse the performance of mobile peer to Peer network using ant colony optim...
Analyse the performance of mobile peer to Peer network using ant colony optim...Analyse the performance of mobile peer to Peer network using ant colony optim...
Analyse the performance of mobile peer to Peer network using ant colony optim...
 
Study of computer network issues and
Study of computer network issues andStudy of computer network issues and
Study of computer network issues and
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...
 
05688207
0568820705688207
05688207
 
ITS 2010 - Extended presentation slides
ITS 2010 - Extended presentation slidesITS 2010 - Extended presentation slides
ITS 2010 - Extended presentation slides
 
Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks
 

More from herbertwilson5999

Write a 5-7 page paper describing the historical development of info.docx
Write a 5-7 page paper describing the historical development of info.docxWrite a 5-7 page paper describing the historical development of info.docx
Write a 5-7 page paper describing the historical development of info.docxherbertwilson5999
 
Write a  5 paragraph essay related to the healthcare fieldthree.docx
Write a  5 paragraph essay related to the healthcare fieldthree.docxWrite a  5 paragraph essay related to the healthcare fieldthree.docx
Write a  5 paragraph essay related to the healthcare fieldthree.docxherbertwilson5999
 
Write at least a six-page paper, in which youIdentify the.docx
Write at least a six-page paper, in which youIdentify the.docxWrite at least a six-page paper, in which youIdentify the.docx
Write at least a six-page paper, in which youIdentify the.docxherbertwilson5999
 
Write a 2 page paper analyzing the fact pattern scenario below. Plea.docx
Write a 2 page paper analyzing the fact pattern scenario below. Plea.docxWrite a 2 page paper analyzing the fact pattern scenario below. Plea.docx
Write a 2 page paper analyzing the fact pattern scenario below. Plea.docxherbertwilson5999
 
Write a 2 page paper analyzing the fact pattern scenario below. .docx
Write a 2 page paper analyzing the fact pattern scenario below. .docxWrite a 2 page paper analyzing the fact pattern scenario below. .docx
Write a 2 page paper analyzing the fact pattern scenario below. .docxherbertwilson5999
 
Write a 100-word response in Spanish that addresses both of .docx
Write a 100-word response in Spanish that addresses both of .docxWrite a 100-word response in Spanish that addresses both of .docx
Write a 100-word response in Spanish that addresses both of .docxherbertwilson5999
 
Write a  Request for Proposal (approx. 3 - 4 pages in a word doc.docx
Write a  Request for Proposal (approx. 3 - 4 pages in a word doc.docxWrite a  Request for Proposal (approx. 3 - 4 pages in a word doc.docx
Write a  Request for Proposal (approx. 3 - 4 pages in a word doc.docxherbertwilson5999
 
Write a  5 paragraph essay related to Physical Therapy Assistant th.docx
Write a  5 paragraph essay related to Physical Therapy Assistant th.docxWrite a  5 paragraph essay related to Physical Therapy Assistant th.docx
Write a  5 paragraph essay related to Physical Therapy Assistant th.docxherbertwilson5999
 
Write a  5 page paper with  at-least three images that represent.docx
Write a  5 page paper with  at-least three images that represent.docxWrite a  5 page paper with  at-least three images that represent.docx
Write a  5 page paper with  at-least three images that represent.docxherbertwilson5999
 
Write a  5 paragraph essay related to the healthcare fieldthree maj.docx
Write a  5 paragraph essay related to the healthcare fieldthree maj.docxWrite a  5 paragraph essay related to the healthcare fieldthree maj.docx
Write a  5 paragraph essay related to the healthcare fieldthree maj.docxherbertwilson5999
 
Write at least Ten sentences on your discussion. Compare and con.docx
Write at least Ten sentences on your discussion. Compare and con.docxWrite at least Ten sentences on your discussion. Compare and con.docx
Write at least Ten sentences on your discussion. Compare and con.docxherbertwilson5999
 
Write at least a three-page analysis using the case study on pages.docx
Write at least a three-page analysis using the case study on pages.docxWrite at least a three-page analysis using the case study on pages.docx
Write at least a three-page analysis using the case study on pages.docxherbertwilson5999
 
Write at least a six-page paper, in which you Identify th.docx
Write at least a six-page paper, in which you Identify th.docxWrite at least a six-page paper, in which you Identify th.docx
Write at least a six-page paper, in which you Identify th.docxherbertwilson5999
 
Write at least a paragraph for each.1) What is your understand.docx
Write at least a paragraph for each.1) What is your understand.docxWrite at least a paragraph for each.1) What is your understand.docx
Write at least a paragraph for each.1) What is your understand.docxherbertwilson5999
 
Write at least 500 words analyzing a subject you find in this .docx
Write at least 500 words analyzing a subject you find in this .docxWrite at least 500 words analyzing a subject you find in this .docx
Write at least 500 words analyzing a subject you find in this .docxherbertwilson5999
 
Write at least 750 words paper on Why is vulnerability assessme.docx
Write at least 750 words paper on Why is vulnerability assessme.docxWrite at least 750 words paper on Why is vulnerability assessme.docx
Write at least 750 words paper on Why is vulnerability assessme.docxherbertwilson5999
 
Write As if You Are Writing in Your Journal (1st Person)Your T.docx
Write As if You Are Writing in Your Journal (1st Person)Your T.docxWrite As if You Are Writing in Your Journal (1st Person)Your T.docx
Write As if You Are Writing in Your Journal (1st Person)Your T.docxherbertwilson5999
 
Write an original, Scholarly Paper, addressing a topic relevant to t.docx
Write an original, Scholarly Paper, addressing a topic relevant to t.docxWrite an original, Scholarly Paper, addressing a topic relevant to t.docx
Write an original, Scholarly Paper, addressing a topic relevant to t.docxherbertwilson5999
 
Write an observation essay that explains the unique significance.docx
Write an observation essay that explains the unique significance.docxWrite an observation essay that explains the unique significance.docx
Write an observation essay that explains the unique significance.docxherbertwilson5999
 
Write an introduction in APA format in about 2 pages to describe.docx
Write an introduction in APA format in about 2 pages to describe.docxWrite an introduction in APA format in about 2 pages to describe.docx
Write an introduction in APA format in about 2 pages to describe.docxherbertwilson5999
 

More from herbertwilson5999 (20)

Write a 5-7 page paper describing the historical development of info.docx
Write a 5-7 page paper describing the historical development of info.docxWrite a 5-7 page paper describing the historical development of info.docx
Write a 5-7 page paper describing the historical development of info.docx
 
Write a  5 paragraph essay related to the healthcare fieldthree.docx
Write a  5 paragraph essay related to the healthcare fieldthree.docxWrite a  5 paragraph essay related to the healthcare fieldthree.docx
Write a  5 paragraph essay related to the healthcare fieldthree.docx
 
Write at least a six-page paper, in which youIdentify the.docx
Write at least a six-page paper, in which youIdentify the.docxWrite at least a six-page paper, in which youIdentify the.docx
Write at least a six-page paper, in which youIdentify the.docx
 
Write a 2 page paper analyzing the fact pattern scenario below. Plea.docx
Write a 2 page paper analyzing the fact pattern scenario below. Plea.docxWrite a 2 page paper analyzing the fact pattern scenario below. Plea.docx
Write a 2 page paper analyzing the fact pattern scenario below. Plea.docx
 
Write a 2 page paper analyzing the fact pattern scenario below. .docx
Write a 2 page paper analyzing the fact pattern scenario below. .docxWrite a 2 page paper analyzing the fact pattern scenario below. .docx
Write a 2 page paper analyzing the fact pattern scenario below. .docx
 
Write a 100-word response in Spanish that addresses both of .docx
Write a 100-word response in Spanish that addresses both of .docxWrite a 100-word response in Spanish that addresses both of .docx
Write a 100-word response in Spanish that addresses both of .docx
 
Write a  Request for Proposal (approx. 3 - 4 pages in a word doc.docx
Write a  Request for Proposal (approx. 3 - 4 pages in a word doc.docxWrite a  Request for Proposal (approx. 3 - 4 pages in a word doc.docx
Write a  Request for Proposal (approx. 3 - 4 pages in a word doc.docx
 
Write a  5 paragraph essay related to Physical Therapy Assistant th.docx
Write a  5 paragraph essay related to Physical Therapy Assistant th.docxWrite a  5 paragraph essay related to Physical Therapy Assistant th.docx
Write a  5 paragraph essay related to Physical Therapy Assistant th.docx
 
Write a  5 page paper with  at-least three images that represent.docx
Write a  5 page paper with  at-least three images that represent.docxWrite a  5 page paper with  at-least three images that represent.docx
Write a  5 page paper with  at-least three images that represent.docx
 
Write a  5 paragraph essay related to the healthcare fieldthree maj.docx
Write a  5 paragraph essay related to the healthcare fieldthree maj.docxWrite a  5 paragraph essay related to the healthcare fieldthree maj.docx
Write a  5 paragraph essay related to the healthcare fieldthree maj.docx
 
Write at least Ten sentences on your discussion. Compare and con.docx
Write at least Ten sentences on your discussion. Compare and con.docxWrite at least Ten sentences on your discussion. Compare and con.docx
Write at least Ten sentences on your discussion. Compare and con.docx
 
Write at least a three-page analysis using the case study on pages.docx
Write at least a three-page analysis using the case study on pages.docxWrite at least a three-page analysis using the case study on pages.docx
Write at least a three-page analysis using the case study on pages.docx
 
Write at least a six-page paper, in which you Identify th.docx
Write at least a six-page paper, in which you Identify th.docxWrite at least a six-page paper, in which you Identify th.docx
Write at least a six-page paper, in which you Identify th.docx
 
Write at least a paragraph for each.1) What is your understand.docx
Write at least a paragraph for each.1) What is your understand.docxWrite at least a paragraph for each.1) What is your understand.docx
Write at least a paragraph for each.1) What is your understand.docx
 
Write at least 500 words analyzing a subject you find in this .docx
Write at least 500 words analyzing a subject you find in this .docxWrite at least 500 words analyzing a subject you find in this .docx
Write at least 500 words analyzing a subject you find in this .docx
 
Write at least 750 words paper on Why is vulnerability assessme.docx
Write at least 750 words paper on Why is vulnerability assessme.docxWrite at least 750 words paper on Why is vulnerability assessme.docx
Write at least 750 words paper on Why is vulnerability assessme.docx
 
Write As if You Are Writing in Your Journal (1st Person)Your T.docx
Write As if You Are Writing in Your Journal (1st Person)Your T.docxWrite As if You Are Writing in Your Journal (1st Person)Your T.docx
Write As if You Are Writing in Your Journal (1st Person)Your T.docx
 
Write an original, Scholarly Paper, addressing a topic relevant to t.docx
Write an original, Scholarly Paper, addressing a topic relevant to t.docxWrite an original, Scholarly Paper, addressing a topic relevant to t.docx
Write an original, Scholarly Paper, addressing a topic relevant to t.docx
 
Write an observation essay that explains the unique significance.docx
Write an observation essay that explains the unique significance.docxWrite an observation essay that explains the unique significance.docx
Write an observation essay that explains the unique significance.docx
 
Write an introduction in APA format in about 2 pages to describe.docx
Write an introduction in APA format in about 2 pages to describe.docxWrite an introduction in APA format in about 2 pages to describe.docx
Write an introduction in APA format in about 2 pages to describe.docx
 

Recently uploaded

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 

Recently uploaded (20)

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 

Peer-to-Peer Architecture Case Study Gnutella NetworkMate.docx

  • 1. Peer-to-Peer Architecture Case Study: Gnutella Network Matei Ripeanu Computer Science Department, The University of Chicago [email protected] Abstract Despite recent excitement generated by the P2P paradigm and despite surprisingly fast deployment of some P2P applications, there are few quantitative evaluations of P2P systems behavior. Due to its open architecture and achieved scale, Gnutella is an interesting P2P architecture case study. Gnutella, like most other P2P applications, builds at the application level a virtual network with its own routing mechanisms. The topology of this overlay network and the routing mechanisms used have a significant influence on application properties such as performance, reliability, and scalability. We built a ‘crawler’ to extract the topology of Gnutella’s application level network, we analyze the topology graph and evaluate generated network traffic. We find that although Gnutella is not a pure power-law network, its current configuration has the benefits and drawbacks of a power-law structure. These findings lead us to propose changes to Gnutella protocol and implementations that bring significant performance and scalability improvements. 1. Introduction
  • 2. Peer-to-peer systems (P2P) have emerged as a significant social and technical phenomenon over the last year. P2P systems provide infrastructure for communities that share CPU cycles (e.g., Entropia, [email protected]) and/or, storage space (e.g., FreeNet, Gnutella), or that support interpersonal collaborative environments. Two factors have fostered the recent explosive growth of such systems: first, the low cost and high availability of huge computing and storage resources, and second, increased network connectivity. As these trends continue, the P2P paradigm can be expected to become more popular. Peer-to-peer networks allow individual computers to communicate directly with each other and to share information and resources without using specialized ‘servers’. A common characteristic of this new breed of applications is that they build, at the application level, a virtual network with its own routing mechanisms. The topology of this virtual network and the routing mechanisms used have a significant influence on application properties such as performance, reliability, and, in some cases, anonymity. The virtual topology also determines the communication costs incurred when running the P2P application. These considerations have motivated us to conduct a detailed study of the topology and protocol of a popular P2P system, Gnutella. In this study, we benefited from Gnutella’s large existing user base and open architecture, and, in effect, use the public Gnutella network as a large- scale, if uncontrolled, testbed. We capture the network topology, the generated traffic, and the resources’ dynamic behavior. We use our findings to evaluate costs and benefits of the P2P approach and to investigate possible improvements to the routing protocol that would
  • 3. allow for better scaling and increased reliability. Related work: Distributed Search Solution s (DSS) group publishes partial results of their Gnutella research [4]. A number of other research projects build on DSS’s data: [2] analyzes Gnutella user behavior while [6] focuses on efficient search protocols in power-law networks. T. Hong [5] uses medium scale simulations to explore Gnutella network properties. However, our network crawling and analysis technology (developed independently of this work) goes significantly further in terms of scale (both spatial and temporal) and sophistication. 2. Gnutella Network Analysis Gnutella is an open, decentralized, P2P search protocol [3] that is mainly used to find files. In addition, the term Gnutella designates the virtual network of Internet accessible hosts running Gnutella-speaking applications We used this network for our measurements over a 6
  • 4. month period. In a Gnutella network, each maintains open TCP connections with at least one other node, thus creating a virtual network of servents at the application level. Query and group maintenance messages are propagated using a Proceedings of the First International Conference on Peer-to- Peer Computing (P2P�01) 0-7695-1503-7/02 $17.00 © 2002 IEEE flooding technique while query reply messages are back- propagated. We have developed a crawler [7] that joins the network uses the membership protocol [3] to collect topology information. Using the records of multiple successive crawls, we investigated the dynamic graph structure over time. We discover that about 40% of the nodes leave the network in less than 4hours while only 20% of the nodes are ‘persistent’ (they are alive after 24h). We also used the crawler to eavesdrop the traffic generated by the network. Figure 1 categorizes generated traffic according to
  • 5. message type. We detected that the volume of generated traffic is the main obstacle for better scaling and wider deployment. Message Frequency - 5 10 15 20 25 1 28 55 82 10 9 13 6 16
  • 8. Figure 1: Generated traffic split by message typeFigure 1: Generated traffic split by message typeFigure 1: Generated traffic split by message typeFigure 1: Generated traffic split by message type over a 376 minute period. Note that overhead traffic (PING messages serve only to maintain network connectivity) forms more than 50% of traffic. For backward compatibility reasons, flooding is also used to deliver some file download requests (PUSH messages). The only �true� user traffic is QUERY messages. Recent research [1,8] shows that networks ranging from natural networks such as molecules in a cell or people in a social group to the Internet organize themselves so that most nodes have few links and a small number of nodes have many links. In [9], Albert finds that networks following this organizational pattern (power-law networks) display an unexpected degree of robustness when facing random node failures: the ability of the network to communicate is unaffected by high failure rates. However, error tolerance comes at a high price: these networks are extremely vulnerable to attacks, i.e., to the selection and removal of a few nodes that play the most important role in assuring the network's
  • 9. connectivity. We show (in detail in [7]) that Gnutella is similar to a power-law network, thus being able to operate in highly dynamic environments. 3. Summary Gnutella is an open, decentralized, P2P search protocol that is mainly used to find and share files. Computers running Gnutella protocol-compatible software form an application-level network. We have developed tools to discover and analyze this network. Our analysis shows that Gnutella node connectivity follows a multi-modal distribution, combining a power law and a quasi-constant distribution. This property keeps the network as reliable as a pure power-law network when assuming random node failures, and makes it harder to attack by a malicious adversary. Gnutella takes few precautions to ward off potential attacks. For example, the network topology information that we have obtained here is easy to obtain and would permit highly efficient denial-of-service attacks. Some form of security mechanisms that would prevent an intruder from gathering topology information appears essential for the long-term survival of the network (although it would make global network monitoring more
  • 10. difficult if not impossible). We see two directions for improvement. First, we observe that the application-level topology determines the volume of generated traffic, the search success rate, and application reliability. We could design an agent that constantly monitors the network and intervenes by asking servents to drop or add links as necessary to keep the network topology optimal. Agents (or nodes) could embed some information about the underlying physical network and build accordingly the virtual application topology. Note that implementing this idea requires only minor protocol modifications. The second direction is to replace flooding with a smarter (less expensive in terms of communication costs) routing and group communication mechanism. We have collected a large amount of data on the environment in which Gnutella operates and shall use it in simulations to investigate the appropriateness of these and various other alternatives. 3. References [1] M. Faloutsos, P. Faloutsos, and C. Faloutsos, On Power-Law
  • 11. Relationships of the Internet Topology, SIGCOMM 1999. [2] E. Adar and B. Huberman, Free riding on Gnutella, First Monday Vol. 5, Number 10, - Oct. 2nd 2000. [3] Gnutella protocol specification v4.0. Available at: http://dss.clip2.com/GnutellaProtocol04.pdf [4] DSS group, Gnutella: To the Bandwidth Barrier and Beyond, available at: http://dss.clip2.com, Nov. 6, 2000. [5] T. Hong, Performance, In Peer-to-Peer: Harnessing the Power of Disruptive Technologies, ed. A. Oram. O'Reilly and Associates: Sebastopol, CA, 2001. [6] L. Adamic, R. Lukose, A. Puniyani, and B. Huberman, Search in Power-Law Networks [7] M. Ripeanu, Peer-to-Peer Architecture Case Study: Gnutella Network, University of Chicago Technical Report TR-2001-26. [8] A. Barabasi and R. Albert. Emergence of scaling in random networks, Science, 286(509), 1999. [9] R. Albert, H. Jeong, and A. Barabási, Attak and tolerance in complex networks, Nature 406 378 (2000). Proceedings of the First International Conference on Peer-to- Peer Computing (P2P�01) 0-7695-1503-7/02 $17.00 © 2002 IEEE