SlideShare a Scribd company logo
Peer-to-peer: past, present, future
Cristina Cărbunaru
16 February 2011
Peer-to-peer
   Internet today
    ◦ Large number of hosts
    ◦ Large amount of content
 Significant challenges for traditional
  client-server architectures
 Make use of the inter-connectivity of
  the nodes in the Internet
    ◦ Alleviate the load from servers


                                           2
Client-server vs. P2p




                        3
The Peer
   Double function:
    ◦ Client - consumer
    ◦ Server - producer
 Incentives to offer service, not just
  benefit from service
 More peers means more capacity
  added to the system



                                          4
P2p Goals
 Reduced central control
 Heterogeneity
 Flat topology
 Autonomy
 Fault resilience
…




                            5
History
   File sharing applications
    ◦   1999: Napster
    ◦   Gnutella, Kazaa, Freenet
    ◦   2001: BitTorrent (Bram Cohen)
    ◦   Multiple variations of p2p programs
   Nowadays:
    ◦ File sharing – among individual users or in
      the data centers
    ◦ Media streaming – on-demand or live content
    ◦ Communication – Skype!
                                                6
The beginnings: Napster




                          7
BitTorrent
             Seed




             Tracker




                       8
BitTorrent
              Seed


Leecher




              Tracker




                        9
BitTorrent




             10
BitTorrent




             11
BitTorrent




             12
BitTorrent




             13
BitTorrent




             14
BitTorrent




             15
BitTorrent




             Free-rider




                          16
Swarm Behavior
   Incentive mechanisms
    ◦ Why offer service?
   Flash crowd
    ◦ Large number of peers choke the
      performance
   Steady state
    ◦ Number of peers stays constant over time
    ◦ Easy to predict performance
   Lifetime
    ◦ When and why is the torrent dying?
   ...

                                                 17
Peer Behavior
   Free riding
    ◦ Evaluate performance loss
    ◦ Methods to prevent
   Best results with minimum of effort
    ◦ Cheating, but not exactly
   Clustering of peers
    ◦ Peers download/upload to similar bandwidth
      peers
   Security of content
    ◦ Malicious data
   Connectivity
    ◦ NAT boxes

                                                   18
Approaches
   Measurement
    ◦ Real swarms
    ◦ Experimental platforms: PlanetLab, EmuLab
   Simulation
   Modeling
   Proposing new p2p protocols that solve
    different problems
    ◦ Proportional upload bandwidth: PropShare
    ◦ Amount of data transferred: Avalanche
    ◦ Upload bandwidth allocation among peers to
      get the best download speed: BitTyrant

                                                   19
P2p in 2008/2009 (Ipoque study)




                                  20
Popularity
   Decreasing popularity for p2p file
    sharing
    ◦   Packet filtering
    ◦   Packet inspection
    ◦   Lawsuit against Pirate Bay
    ◦   …
   One click file hosting services
    (Rapidshare, Hotfile) become popular


                                           21
What to Research?
   Packet filtering
    ◦ Glasnost
   Hiding identity
    ◦ Tor
    ◦ Anonymous p2p
   Copyright issues
    ◦ Download might be legal in some
      countries
    ◦ Upload is illegal
   …
                                        22
What’s Next?
   Increasing usage of p2p protocols in
    other contexts:
    ◦   Media streaming, communication
    ◦   Inside the data centers
    ◦   Social networks
    ◦   Economics




                                           23
Future
   New technologies
    ◦ IPv6
    ◦ Mobile devices
   From computer-to-computer to
    human-to-human
    ◦ commons-based peer production (Yochai
      Benkler):
      Peer governance
      Peer property
      Peer distribution

                                              24
Conclusions
   Successful piece of research
    ◦ P2p transcended computer science
   Changed the way we share
    ◦ Files
    ◦ Knowledge
    ◦ Peer generated content
   P2p is here to stay!



                                         25
Questions?



        Thank you!




                     26

More Related Content

Similar to CSTalks - Peer-to-peer - 16 Feb

Please, do not decentralize the Internet (with permissionless) blockchains
Please, do not decentralize the Internet (with permissionless) blockchainsPlease, do not decentralize the Internet (with permissionless) blockchains
Please, do not decentralize the Internet (with permissionless) blockchains
pgarcial
 
Peer-to-Peer Systems
Peer-to-Peer SystemsPeer-to-Peer Systems
Peer-to-Peer Systems
Uwe Schmidt
 
P2p networks
P2p networksP2p networks
P2p networks
Shane Farrell
 
P2P networking.pptx
P2P networking.pptxP2P networking.pptx
P2P networking.pptx
WasiqMehraj2
 
Peer to peer(p2 p)
Peer to peer(p2 p)Peer to peer(p2 p)
Peer to peer(p2 p)
Mukesh Pilaniya
 
Maidsafe presentation
Maidsafe presentationMaidsafe presentation
Maidsafe presentation
Dirk Hoving
 
MongoDB IoT City Tour LONDON: Why your Dad's database won't work for IoT. Joe...
MongoDB IoT City Tour LONDON: Why your Dad's database won't work for IoT. Joe...MongoDB IoT City Tour LONDON: Why your Dad's database won't work for IoT. Joe...
MongoDB IoT City Tour LONDON: Why your Dad's database won't work for IoT. Joe...
MongoDB
 
PeerShark - Detecting Peer-to-Peer Botnets by Tracking Conversations
PeerShark - Detecting Peer-to-Peer Botnets by Tracking ConversationsPeerShark - Detecting Peer-to-Peer Botnets by Tracking Conversations
PeerShark - Detecting Peer-to-Peer Botnets by Tracking Conversations
Pratik Narang
 
OttawaSubmission.072809
OttawaSubmission.072809OttawaSubmission.072809
OttawaSubmission.072809
Eric Klinker
 
Long Term Preservation Dale Peters
Long Term Preservation Dale PetersLong Term Preservation Dale Peters
Long Term Preservation Dale Peters
DigitalPreservationEurope
 
Why WebRTC DataChannel excites me
Why WebRTC DataChannel excites meWhy WebRTC DataChannel excites me
Why WebRTC DataChannel excites me
Eric Zhang
 
Raspberry pi x kubernetes x tensorflow
Raspberry pi x kubernetes x tensorflowRaspberry pi x kubernetes x tensorflow
Raspberry pi x kubernetes x tensorflow
霈萱 蔡
 
Pac sec2011 ruoando-nict-2011-11-09-01-eng
Pac sec2011 ruoando-nict-2011-11-09-01-engPac sec2011 ruoando-nict-2011-11-09-01-eng
Pac sec2011 ruoando-nict-2011-11-09-01-eng
Ruo Ando
 
Pac sec2011 ruoando-nict-2011-11-09-01-eng
Pac sec2011 ruoando-nict-2011-11-09-01-engPac sec2011 ruoando-nict-2011-11-09-01-eng
Pac sec2011 ruoando-nict-2011-11-09-01-eng
Ruo_Ando
 
1-7 P2PMS P2P-Next
1-7 P2PMS P2P-Next1-7 P2PMS P2P-Next
1-7 P2PMS P2P-Next
skame
 
Streaming
StreamingStreaming
International SIP conference 2009
International SIP conference 2009International SIP conference 2009
International SIP conference 2009
Victor Pascual Ávila
 
Internet
InternetInternet
A reid ands_ttt2_perth_network-literacy 17_may18
A reid ands_ttt2_perth_network-literacy 17_may18A reid ands_ttt2_perth_network-literacy 17_may18
A reid ands_ttt2_perth_network-literacy 17_may18
ARDC
 
Internet Of Things: Hands on: YOW! night
Internet Of Things: Hands on: YOW! nightInternet Of Things: Hands on: YOW! night
Internet Of Things: Hands on: YOW! night
Andy Gelme
 

Similar to CSTalks - Peer-to-peer - 16 Feb (20)

Please, do not decentralize the Internet (with permissionless) blockchains
Please, do not decentralize the Internet (with permissionless) blockchainsPlease, do not decentralize the Internet (with permissionless) blockchains
Please, do not decentralize the Internet (with permissionless) blockchains
 
Peer-to-Peer Systems
Peer-to-Peer SystemsPeer-to-Peer Systems
Peer-to-Peer Systems
 
P2p networks
P2p networksP2p networks
P2p networks
 
P2P networking.pptx
P2P networking.pptxP2P networking.pptx
P2P networking.pptx
 
Peer to peer(p2 p)
Peer to peer(p2 p)Peer to peer(p2 p)
Peer to peer(p2 p)
 
Maidsafe presentation
Maidsafe presentationMaidsafe presentation
Maidsafe presentation
 
MongoDB IoT City Tour LONDON: Why your Dad's database won't work for IoT. Joe...
MongoDB IoT City Tour LONDON: Why your Dad's database won't work for IoT. Joe...MongoDB IoT City Tour LONDON: Why your Dad's database won't work for IoT. Joe...
MongoDB IoT City Tour LONDON: Why your Dad's database won't work for IoT. Joe...
 
PeerShark - Detecting Peer-to-Peer Botnets by Tracking Conversations
PeerShark - Detecting Peer-to-Peer Botnets by Tracking ConversationsPeerShark - Detecting Peer-to-Peer Botnets by Tracking Conversations
PeerShark - Detecting Peer-to-Peer Botnets by Tracking Conversations
 
OttawaSubmission.072809
OttawaSubmission.072809OttawaSubmission.072809
OttawaSubmission.072809
 
Long Term Preservation Dale Peters
Long Term Preservation Dale PetersLong Term Preservation Dale Peters
Long Term Preservation Dale Peters
 
Why WebRTC DataChannel excites me
Why WebRTC DataChannel excites meWhy WebRTC DataChannel excites me
Why WebRTC DataChannel excites me
 
Raspberry pi x kubernetes x tensorflow
Raspberry pi x kubernetes x tensorflowRaspberry pi x kubernetes x tensorflow
Raspberry pi x kubernetes x tensorflow
 
Pac sec2011 ruoando-nict-2011-11-09-01-eng
Pac sec2011 ruoando-nict-2011-11-09-01-engPac sec2011 ruoando-nict-2011-11-09-01-eng
Pac sec2011 ruoando-nict-2011-11-09-01-eng
 
Pac sec2011 ruoando-nict-2011-11-09-01-eng
Pac sec2011 ruoando-nict-2011-11-09-01-engPac sec2011 ruoando-nict-2011-11-09-01-eng
Pac sec2011 ruoando-nict-2011-11-09-01-eng
 
1-7 P2PMS P2P-Next
1-7 P2PMS P2P-Next1-7 P2PMS P2P-Next
1-7 P2PMS P2P-Next
 
Streaming
StreamingStreaming
Streaming
 
International SIP conference 2009
International SIP conference 2009International SIP conference 2009
International SIP conference 2009
 
Internet
InternetInternet
Internet
 
A reid ands_ttt2_perth_network-literacy 17_may18
A reid ands_ttt2_perth_network-literacy 17_may18A reid ands_ttt2_perth_network-literacy 17_may18
A reid ands_ttt2_perth_network-literacy 17_may18
 
Internet Of Things: Hands on: YOW! night
Internet Of Things: Hands on: YOW! nightInternet Of Things: Hands on: YOW! night
Internet Of Things: Hands on: YOW! night
 

More from cstalks

CSTalks-Sensor-Rich Mobile Video Indexing and Search-17Aug
CSTalks-Sensor-Rich Mobile Video Indexing and Search-17AugCSTalks-Sensor-Rich Mobile Video Indexing and Search-17Aug
CSTalks-Sensor-Rich Mobile Video Indexing and Search-17Aug
cstalks
 
CSTalks-Visualizing Software Behavior-14Sep
CSTalks-Visualizing Software Behavior-14SepCSTalks-Visualizing Software Behavior-14Sep
CSTalks-Visualizing Software Behavior-14Sep
cstalks
 
CSTalks-Polymorphic heterogeneous multicore systems-17Aug
CSTalks-Polymorphic heterogeneous multicore systems-17AugCSTalks-Polymorphic heterogeneous multicore systems-17Aug
CSTalks-Polymorphic heterogeneous multicore systems-17Aug
cstalks
 
CSTalks-Quaternary Semantics Recomandation System-24 Aug
CSTalks-Quaternary Semantics Recomandation System-24 AugCSTalks-Quaternary Semantics Recomandation System-24 Aug
CSTalks-Quaternary Semantics Recomandation System-24 Aug
cstalks
 
CSTalks - Object detection and tracking - 25th May
CSTalks - Object detection and tracking - 25th MayCSTalks - Object detection and tracking - 25th May
CSTalks - Object detection and tracking - 25th May
cstalks
 
CSTalks - The Multicore Midlife Crisis - 30 Mar
CSTalks - The Multicore Midlife Crisis - 30 MarCSTalks - The Multicore Midlife Crisis - 30 Mar
CSTalks - The Multicore Midlife Crisis - 30 Mar
cstalks
 
CSTalks - On machine learning - 2 Mar
CSTalks - On machine learning - 2 MarCSTalks - On machine learning - 2 Mar
CSTalks - On machine learning - 2 Mar
cstalks
 
CSTalks - Real movie recommendation - 9 Mar
CSTalks - Real movie recommendation - 9 MarCSTalks - Real movie recommendation - 9 Mar
CSTalks - Real movie recommendation - 9 Mar
cstalks
 
CSTalks-LifeBeyondPhD-16Mar
CSTalks-LifeBeyondPhD-16MarCSTalks-LifeBeyondPhD-16Mar
CSTalks-LifeBeyondPhD-16Mar
cstalks
 
CSTalks - Music Information Retrieval - 23 Feb
CSTalks - Music Information Retrieval - 23 FebCSTalks - Music Information Retrieval - 23 Feb
CSTalks - Music Information Retrieval - 23 Feb
cstalks
 
CSTalks - GPGPU - 19 Jan
CSTalks  -  GPGPU - 19 JanCSTalks  -  GPGPU - 19 Jan
CSTalks - GPGPU - 19 Jan
cstalks
 

More from cstalks (11)

CSTalks-Sensor-Rich Mobile Video Indexing and Search-17Aug
CSTalks-Sensor-Rich Mobile Video Indexing and Search-17AugCSTalks-Sensor-Rich Mobile Video Indexing and Search-17Aug
CSTalks-Sensor-Rich Mobile Video Indexing and Search-17Aug
 
CSTalks-Visualizing Software Behavior-14Sep
CSTalks-Visualizing Software Behavior-14SepCSTalks-Visualizing Software Behavior-14Sep
CSTalks-Visualizing Software Behavior-14Sep
 
CSTalks-Polymorphic heterogeneous multicore systems-17Aug
CSTalks-Polymorphic heterogeneous multicore systems-17AugCSTalks-Polymorphic heterogeneous multicore systems-17Aug
CSTalks-Polymorphic heterogeneous multicore systems-17Aug
 
CSTalks-Quaternary Semantics Recomandation System-24 Aug
CSTalks-Quaternary Semantics Recomandation System-24 AugCSTalks-Quaternary Semantics Recomandation System-24 Aug
CSTalks-Quaternary Semantics Recomandation System-24 Aug
 
CSTalks - Object detection and tracking - 25th May
CSTalks - Object detection and tracking - 25th MayCSTalks - Object detection and tracking - 25th May
CSTalks - Object detection and tracking - 25th May
 
CSTalks - The Multicore Midlife Crisis - 30 Mar
CSTalks - The Multicore Midlife Crisis - 30 MarCSTalks - The Multicore Midlife Crisis - 30 Mar
CSTalks - The Multicore Midlife Crisis - 30 Mar
 
CSTalks - On machine learning - 2 Mar
CSTalks - On machine learning - 2 MarCSTalks - On machine learning - 2 Mar
CSTalks - On machine learning - 2 Mar
 
CSTalks - Real movie recommendation - 9 Mar
CSTalks - Real movie recommendation - 9 MarCSTalks - Real movie recommendation - 9 Mar
CSTalks - Real movie recommendation - 9 Mar
 
CSTalks-LifeBeyondPhD-16Mar
CSTalks-LifeBeyondPhD-16MarCSTalks-LifeBeyondPhD-16Mar
CSTalks-LifeBeyondPhD-16Mar
 
CSTalks - Music Information Retrieval - 23 Feb
CSTalks - Music Information Retrieval - 23 FebCSTalks - Music Information Retrieval - 23 Feb
CSTalks - Music Information Retrieval - 23 Feb
 
CSTalks - GPGPU - 19 Jan
CSTalks  -  GPGPU - 19 JanCSTalks  -  GPGPU - 19 Jan
CSTalks - GPGPU - 19 Jan
 

Recently uploaded

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

CSTalks - Peer-to-peer - 16 Feb

  • 1. Peer-to-peer: past, present, future Cristina Cărbunaru 16 February 2011
  • 2. Peer-to-peer  Internet today ◦ Large number of hosts ◦ Large amount of content  Significant challenges for traditional client-server architectures  Make use of the inter-connectivity of the nodes in the Internet ◦ Alleviate the load from servers 2
  • 4. The Peer  Double function: ◦ Client - consumer ◦ Server - producer  Incentives to offer service, not just benefit from service  More peers means more capacity added to the system 4
  • 5. P2p Goals  Reduced central control  Heterogeneity  Flat topology  Autonomy  Fault resilience … 5
  • 6. History  File sharing applications ◦ 1999: Napster ◦ Gnutella, Kazaa, Freenet ◦ 2001: BitTorrent (Bram Cohen) ◦ Multiple variations of p2p programs  Nowadays: ◦ File sharing – among individual users or in the data centers ◦ Media streaming – on-demand or live content ◦ Communication – Skype! 6
  • 8. BitTorrent Seed Tracker 8
  • 9. BitTorrent Seed Leecher Tracker 9
  • 16. BitTorrent Free-rider 16
  • 17. Swarm Behavior  Incentive mechanisms ◦ Why offer service?  Flash crowd ◦ Large number of peers choke the performance  Steady state ◦ Number of peers stays constant over time ◦ Easy to predict performance  Lifetime ◦ When and why is the torrent dying?  ... 17
  • 18. Peer Behavior  Free riding ◦ Evaluate performance loss ◦ Methods to prevent  Best results with minimum of effort ◦ Cheating, but not exactly  Clustering of peers ◦ Peers download/upload to similar bandwidth peers  Security of content ◦ Malicious data  Connectivity ◦ NAT boxes 18
  • 19. Approaches  Measurement ◦ Real swarms ◦ Experimental platforms: PlanetLab, EmuLab  Simulation  Modeling  Proposing new p2p protocols that solve different problems ◦ Proportional upload bandwidth: PropShare ◦ Amount of data transferred: Avalanche ◦ Upload bandwidth allocation among peers to get the best download speed: BitTyrant 19
  • 20. P2p in 2008/2009 (Ipoque study) 20
  • 21. Popularity  Decreasing popularity for p2p file sharing ◦ Packet filtering ◦ Packet inspection ◦ Lawsuit against Pirate Bay ◦ …  One click file hosting services (Rapidshare, Hotfile) become popular 21
  • 22. What to Research?  Packet filtering ◦ Glasnost  Hiding identity ◦ Tor ◦ Anonymous p2p  Copyright issues ◦ Download might be legal in some countries ◦ Upload is illegal  … 22
  • 23. What’s Next?  Increasing usage of p2p protocols in other contexts: ◦ Media streaming, communication ◦ Inside the data centers ◦ Social networks ◦ Economics 23
  • 24. Future  New technologies ◦ IPv6 ◦ Mobile devices  From computer-to-computer to human-to-human ◦ commons-based peer production (Yochai Benkler):  Peer governance  Peer property  Peer distribution 24
  • 25. Conclusions  Successful piece of research ◦ P2p transcended computer science  Changed the way we share ◦ Files ◦ Knowledge ◦ Peer generated content  P2p is here to stay! 25
  • 26. Questions? Thank you! 26