SlideShare a Scribd company logo
CS254: Network TechnologiesCS254: Network Technologies
Peer to Peer NetworksPeer to Peer Networks
James Salter
j.salter@surrey.ac.uk
16 November 2004
Client/Server ArchitectureClient/Server Architecture
 Clients send requests
to/via a central server
 Small #messages
 Single point of failure
Pure Peer-to-Peer ArchitecturePure Peer-to-Peer Architecture
 Resilient
 Large #messages
 No central server
 Clients connected to
one or more peers
Hybrid Peer-to-Peer NetworksHybrid Peer-to-Peer Networks
 Some nodes act as group managers/routers
 More robust than client/server
 Potentially lower #messages than pure P2P
Characteristics of a P2P NetworkCharacteristics of a P2P Network
 Nodes can act as clients and servers
 No centralised server/authority
 (in pure P2P networks)
 Network is highly dynamic
 Nodes join and leave regularly
 Large-scale
 Potentially millions of nodes
 Nodes are autonomous
 But co-operate to share/retrieve resources
Networking at the Application LayerNetworking at the Application Layer
OverlaysOverlays
 Creates a virtual network: network
overlay
 Connections between nodes defined by
application, not by wires
 Overlay can have little relation to
underlying network connections
 Needlessly send data across the Internet
instead of through a LAN?
Napster (1999-2002)Napster (1999-2002)
File
Transfer
GnutellaGnutella
The ProblemThe Problem
 Scalability
 Napster: central server is a bottleneck
 Gnutella: large volumes of query traffic
 Number of Messages
 Gnutella: query must be sent to every node
 Fault Tolerance
 Napster: single point of failure
 Ability to Find Resources
 Gnutella: query horizon (TTL limit)
Gnutella2Gnutella2
Structured P2PStructured P2P
 Avoid random visiting of nodes to find
content
 Utilise an index similar to Napster
 Split index and distribute over entire
network
 Must know where to find each piece of
the index – organisation of nodes
 More efficient (less hops): requests
always routed towards content
Structured P2P: ChordStructured P2P: Chord
 Each node has a unique ID number
 File names hashed to
generate file ID
 Files hosted on node
with closest ID
 Searching: hash file
name to give ID of
node hosting file
 Small routing costs
1
41
7
22
28
34
48
52
70
73
BitTorrentBitTorrent
Tracker
Seed
.torrent
P2P ApplicationsP2P Applications
 File sharing
 Distributed computing
 Instant messaging
 Media streaming/distribution
 Web services
 Workgroups
 Networked devices
Research AreasResearch Areas
 Resource discovery/searching
 Efficiency, more powerful queries
 Robustness/stability
 Can the network operate under high churn?
 Incentives
 Why should I provide as well as consume?
 Reputation/Quality
 How good/reliable are peers in the network?
 Security
 Malicious/suicidal peers, attacks on the network

More Related Content

What's hot

Peer to peer data management
Peer to peer data managementPeer to peer data management
Peer to peer data management
Junaid Lodhi
 
Peer to-peer networks
Peer to-peer networksPeer to-peer networks
Peer to-peer networks
Nkosinathi Lungu
 
Peer to peer system
Peer to peer systemPeer to peer system
Peer to peer system
Jahanzaib Niazi
 
Peer Sim & P2P
Peer Sim & P2PPeer Sim & P2P
Peer Sim & P2P
Chandan Balachandra
 
Peer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By AhnafPeer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By Ahnaf
ahnarokz
 
Final peersimp pt
Final peersimp ptFinal peersimp pt
Final peersimp pt
Clement Robert Habimana
 
P2P Seminar
P2P SeminarP2P Seminar
P2P SeminarCoRehab
 
Peer to peer(p2 p)
Peer to peer(p2 p)Peer to peer(p2 p)
Peer to peer(p2 p)
Mukesh Pilaniya
 
Overlay network
Overlay networkOverlay network
Overlay network
iQra Rafaqat
 
Peer to-peer network
Peer to-peer networkPeer to-peer network
Peer to-peer network
EILLEN IVY PORTUGUEZ
 
peer to peer and client server model
peer to peer and client server modelpeer to peer and client server model
peer to peer and client server model
Bharath Nair
 
Internet Architecture and Design Philosophy
Internet Architecture and Design PhilosophyInternet Architecture and Design Philosophy
Internet Architecture and Design Philosophy
Dilum Bandara
 
Overlay networks
Overlay networksOverlay networks
Overlay networks
Mayank Chaudhari
 
Communication in Distributed Systems
Communication in Distributed SystemsCommunication in Distributed Systems
Communication in Distributed Systems
Dilum Bandara
 
Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
MNM Jain Engineering College
 
Always Offline: Delay-Tolerant Networking for the Internet of Things
Always Offline: Delay-Tolerant Networking for the Internet of ThingsAlways Offline: Delay-Tolerant Networking for the Internet of Things
Always Offline: Delay-Tolerant Networking for the Internet of Things
Daniel Austin
 
Networking Comptia
Networking ComptiaNetworking Comptia
Networking ComptiaMarco Cruz
 
Advance Computer networks
Advance Computer networksAdvance Computer networks
Advance Computer networks
Trinity Dwarka
 
Textual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networksTextual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networks
Uvaraj Shan
 

What's hot (20)

Peer to peer data management
Peer to peer data managementPeer to peer data management
Peer to peer data management
 
Peer to-peer networks
Peer to-peer networksPeer to-peer networks
Peer to-peer networks
 
Peer to peer system
Peer to peer systemPeer to peer system
Peer to peer system
 
Peer Sim & P2P
Peer Sim & P2PPeer Sim & P2P
Peer Sim & P2P
 
Peer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By AhnafPeer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By Ahnaf
 
Final peersimp pt
Final peersimp ptFinal peersimp pt
Final peersimp pt
 
P2P Seminar
P2P SeminarP2P Seminar
P2P Seminar
 
Peer to peer(p2 p)
Peer to peer(p2 p)Peer to peer(p2 p)
Peer to peer(p2 p)
 
Overlay network
Overlay networkOverlay network
Overlay network
 
Peer to-peer network
Peer to-peer networkPeer to-peer network
Peer to-peer network
 
peer to peer and client server model
peer to peer and client server modelpeer to peer and client server model
peer to peer and client server model
 
Internet Architecture and Design Philosophy
Internet Architecture and Design PhilosophyInternet Architecture and Design Philosophy
Internet Architecture and Design Philosophy
 
Overlay networks
Overlay networksOverlay networks
Overlay networks
 
Communication in Distributed Systems
Communication in Distributed SystemsCommunication in Distributed Systems
Communication in Distributed Systems
 
Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
 
Networking
NetworkingNetworking
Networking
 
Always Offline: Delay-Tolerant Networking for the Internet of Things
Always Offline: Delay-Tolerant Networking for the Internet of ThingsAlways Offline: Delay-Tolerant Networking for the Internet of Things
Always Offline: Delay-Tolerant Networking for the Internet of Things
 
Networking Comptia
Networking ComptiaNetworking Comptia
Networking Comptia
 
Advance Computer networks
Advance Computer networksAdvance Computer networks
Advance Computer networks
 
Textual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networksTextual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networks
 

Similar to Lecture - Network Technologies: Peer-to-Peer Networks

Lecture: Software Agents and P2P
Lecture: Software Agents and P2PLecture: Software Agents and P2P
Lecture: Software Agents and P2P
James Salter
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
icanhasfay
 
Network Fundamental for Malware Analysis.pptx
Network Fundamental for Malware Analysis.pptxNetwork Fundamental for Malware Analysis.pptx
Network Fundamental for Malware Analysis.pptx
SazidHossain9
 
computer networks
computer networks computer networks
computer networks
MiXvideos
 
Peerto Peer Networks
Peerto Peer NetworksPeerto Peer Networks
Peerto Peer Networkssanjoysanyal
 
Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptx
HananShk
 
02 - Topologies of Distributed Systems
02 - Topologies of Distributed Systems02 - Topologies of Distributed Systems
02 - Topologies of Distributed Systems
Dilum Bandara
 
Agents and P2P Networks
Agents and P2P NetworksAgents and P2P Networks
Agents and P2P Networks
James Salter
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Mumbai Academisc
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
theijes
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber Ethics
Subas Paudel
 
Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2webhostingguy
 
Fundamental Of Computer Network.
Fundamental Of Computer Network. Fundamental Of Computer Network.
Fundamental Of Computer Network.
PushpendraSingh483
 
Computer networks7
Computer networks7Computer networks7
Computer networks7
Ali Raza
 
Peer-to-peer Systems.ppt
Peer-to-peer Systems.pptPeer-to-peer Systems.ppt
Peer-to-peer Systems.ppt
Ashok Chandrasekaran
 
network fundamentals _Chapter 2 - Week 2and 3.pptx
network fundamentals _Chapter 2 - Week 2and 3.pptxnetwork fundamentals _Chapter 2 - Week 2and 3.pptx
network fundamentals _Chapter 2 - Week 2and 3.pptx
mashfiqislam
 
Flexible bloom for searching textual content
Flexible bloom for searching textual contentFlexible bloom for searching textual content
Flexible bloom for searching textual contentUvaraj Shan
 
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Uvaraj Shan
 
Flexible bloom for searching textual content
Flexible bloom for searching textual contentFlexible bloom for searching textual content
Flexible bloom for searching textual contentUvaraj Shan
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2ekul
 

Similar to Lecture - Network Technologies: Peer-to-Peer Networks (20)

Lecture: Software Agents and P2P
Lecture: Software Agents and P2PLecture: Software Agents and P2P
Lecture: Software Agents and P2P
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 
Network Fundamental for Malware Analysis.pptx
Network Fundamental for Malware Analysis.pptxNetwork Fundamental for Malware Analysis.pptx
Network Fundamental for Malware Analysis.pptx
 
computer networks
computer networks computer networks
computer networks
 
Peerto Peer Networks
Peerto Peer NetworksPeerto Peer Networks
Peerto Peer Networks
 
Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptx
 
02 - Topologies of Distributed Systems
02 - Topologies of Distributed Systems02 - Topologies of Distributed Systems
02 - Topologies of Distributed Systems
 
Agents and P2P Networks
Agents and P2P NetworksAgents and P2P Networks
Agents and P2P Networks
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber Ethics
 
Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2
 
Fundamental Of Computer Network.
Fundamental Of Computer Network. Fundamental Of Computer Network.
Fundamental Of Computer Network.
 
Computer networks7
Computer networks7Computer networks7
Computer networks7
 
Peer-to-peer Systems.ppt
Peer-to-peer Systems.pptPeer-to-peer Systems.ppt
Peer-to-peer Systems.ppt
 
network fundamentals _Chapter 2 - Week 2and 3.pptx
network fundamentals _Chapter 2 - Week 2and 3.pptxnetwork fundamentals _Chapter 2 - Week 2and 3.pptx
network fundamentals _Chapter 2 - Week 2and 3.pptx
 
Flexible bloom for searching textual content
Flexible bloom for searching textual contentFlexible bloom for searching textual content
Flexible bloom for searching textual content
 
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
 
Flexible bloom for searching textual content
Flexible bloom for searching textual contentFlexible bloom for searching textual content
Flexible bloom for searching textual content
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2
 

More from James Salter

Security for The Machine: By Design
Security for The Machine: By DesignSecurity for The Machine: By Design
Security for The Machine: By Design
James Salter
 
The Machine - a vision for the future of computing
The Machine - a vision for the future of computingThe Machine - a vision for the future of computing
The Machine - a vision for the future of computing
James Salter
 
Big data ... for security
Big data ... for securityBig data ... for security
Big data ... for security
James Salter
 
Accumulo: A Quick Introduction
Accumulo: A Quick IntroductionAccumulo: A Quick Introduction
Accumulo: A Quick Introduction
James Salter
 
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
James Salter
 
INC 2005 - ROME: Optimising DHT-based Peer-to-Peer Networks
INC 2005 - ROME: Optimising DHT-based Peer-to-Peer NetworksINC 2005 - ROME: Optimising DHT-based Peer-to-Peer Networks
INC 2005 - ROME: Optimising DHT-based Peer-to-Peer Networks
James Salter
 
PDPTA 05 Poster: ROME: Optimising Lookup and Load-Balancing in DHT-Based P2P ...
PDPTA 05 Poster: ROME: Optimising Lookup and Load-Balancing in DHT-Based P2P ...PDPTA 05 Poster: ROME: Optimising Lookup and Load-Balancing in DHT-Based P2P ...
PDPTA 05 Poster: ROME: Optimising Lookup and Load-Balancing in DHT-Based P2P ...
James Salter
 
FCS 05: A Multi-Ring Method for Efficient Multi-Dimensional Data Lookup in P2...
FCS 05: A Multi-Ring Method for Efficient Multi-Dimensional Data Lookup in P2...FCS 05: A Multi-Ring Method for Efficient Multi-Dimensional Data Lookup in P2...
FCS 05: A Multi-Ring Method for Efficient Multi-Dimensional Data Lookup in P2...
James Salter
 
INC 2004: An Efficient Mechanism for Adaptive Resource Discovery in Grids
INC 2004: An Efficient Mechanism for Adaptive Resource Discovery in GridsINC 2004: An Efficient Mechanism for Adaptive Resource Discovery in Grids
INC 2004: An Efficient Mechanism for Adaptive Resource Discovery in Grids
James Salter
 

More from James Salter (9)

Security for The Machine: By Design
Security for The Machine: By DesignSecurity for The Machine: By Design
Security for The Machine: By Design
 
The Machine - a vision for the future of computing
The Machine - a vision for the future of computingThe Machine - a vision for the future of computing
The Machine - a vision for the future of computing
 
Big data ... for security
Big data ... for securityBig data ... for security
Big data ... for security
 
Accumulo: A Quick Introduction
Accumulo: A Quick IntroductionAccumulo: A Quick Introduction
Accumulo: A Quick Introduction
 
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
 
INC 2005 - ROME: Optimising DHT-based Peer-to-Peer Networks
INC 2005 - ROME: Optimising DHT-based Peer-to-Peer NetworksINC 2005 - ROME: Optimising DHT-based Peer-to-Peer Networks
INC 2005 - ROME: Optimising DHT-based Peer-to-Peer Networks
 
PDPTA 05 Poster: ROME: Optimising Lookup and Load-Balancing in DHT-Based P2P ...
PDPTA 05 Poster: ROME: Optimising Lookup and Load-Balancing in DHT-Based P2P ...PDPTA 05 Poster: ROME: Optimising Lookup and Load-Balancing in DHT-Based P2P ...
PDPTA 05 Poster: ROME: Optimising Lookup and Load-Balancing in DHT-Based P2P ...
 
FCS 05: A Multi-Ring Method for Efficient Multi-Dimensional Data Lookup in P2...
FCS 05: A Multi-Ring Method for Efficient Multi-Dimensional Data Lookup in P2...FCS 05: A Multi-Ring Method for Efficient Multi-Dimensional Data Lookup in P2...
FCS 05: A Multi-Ring Method for Efficient Multi-Dimensional Data Lookup in P2...
 
INC 2004: An Efficient Mechanism for Adaptive Resource Discovery in Grids
INC 2004: An Efficient Mechanism for Adaptive Resource Discovery in GridsINC 2004: An Efficient Mechanism for Adaptive Resource Discovery in Grids
INC 2004: An Efficient Mechanism for Adaptive Resource Discovery in Grids
 

Recently uploaded

Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
varshanayak241
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
XfilesPro
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
KrzysztofKkol1
 
Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024
Sharepoint Designs
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
Globus
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 

Recently uploaded (20)

Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 
Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 

Lecture - Network Technologies: Peer-to-Peer Networks

  • 1. CS254: Network TechnologiesCS254: Network Technologies Peer to Peer NetworksPeer to Peer Networks James Salter j.salter@surrey.ac.uk 16 November 2004
  • 2. Client/Server ArchitectureClient/Server Architecture  Clients send requests to/via a central server  Small #messages  Single point of failure
  • 3. Pure Peer-to-Peer ArchitecturePure Peer-to-Peer Architecture  Resilient  Large #messages  No central server  Clients connected to one or more peers
  • 4. Hybrid Peer-to-Peer NetworksHybrid Peer-to-Peer Networks  Some nodes act as group managers/routers  More robust than client/server  Potentially lower #messages than pure P2P
  • 5. Characteristics of a P2P NetworkCharacteristics of a P2P Network  Nodes can act as clients and servers  No centralised server/authority  (in pure P2P networks)  Network is highly dynamic  Nodes join and leave regularly  Large-scale  Potentially millions of nodes  Nodes are autonomous  But co-operate to share/retrieve resources
  • 6. Networking at the Application LayerNetworking at the Application Layer
  • 7. OverlaysOverlays  Creates a virtual network: network overlay  Connections between nodes defined by application, not by wires  Overlay can have little relation to underlying network connections  Needlessly send data across the Internet instead of through a LAN?
  • 10. The ProblemThe Problem  Scalability  Napster: central server is a bottleneck  Gnutella: large volumes of query traffic  Number of Messages  Gnutella: query must be sent to every node  Fault Tolerance  Napster: single point of failure  Ability to Find Resources  Gnutella: query horizon (TTL limit)
  • 12. Structured P2PStructured P2P  Avoid random visiting of nodes to find content  Utilise an index similar to Napster  Split index and distribute over entire network  Must know where to find each piece of the index – organisation of nodes  More efficient (less hops): requests always routed towards content
  • 13. Structured P2P: ChordStructured P2P: Chord  Each node has a unique ID number  File names hashed to generate file ID  Files hosted on node with closest ID  Searching: hash file name to give ID of node hosting file  Small routing costs 1 41 7 22 28 34 48 52 70 73
  • 15. P2P ApplicationsP2P Applications  File sharing  Distributed computing  Instant messaging  Media streaming/distribution  Web services  Workgroups  Networked devices
  • 16. Research AreasResearch Areas  Resource discovery/searching  Efficiency, more powerful queries  Robustness/stability  Can the network operate under high churn?  Incentives  Why should I provide as well as consume?  Reputation/Quality  How good/reliable are peers in the network?  Security  Malicious/suicidal peers, attacks on the network

Editor's Notes

  1. In traditional client/server environment all requests are handled by the server. No direct client to client communication. There are only a small number of messages required to send data to the server. Each machine knows where the server is on the network. Having a single server leads to a single point of failure. If the server goes down, nobody can access any resources.
  2. Opposite of this is a pure peer-to-peer environment. Each machine can be both a client and server, so we remove the need for a single central server and therefore the single point of failure. Clients no longer know exactly where the machine hosting the resource they need is. Increase in #messages required to find the resource.
  3. Not all P2P networks “pure”. In fact, many are hybrids somewhere between client/server and pure P2P. More organisation – group managers hold more information about the network so resources can be found in less messages.
  4. P2P operates on the Application Layer Connections can be independent of underlying physical topology Primarily only concerned with actual computers – ignore bridges, routers, other networking devices
  5. Hybrid P2P Queries sent to central server Nodes upload list of files they hold Server returns IPs of nodes hosting matching files Direct connection between nodes for transferring files Napster had a central server where all search queries were sent. Server held list of all machines that hosted the requested file. Direct connection between peers only set up to actually download the file. The single centralised server ultimately led to Napster’s downfall. Lawyers for the Recording Industry Association of America (RIAA) were able to show Napster knew their users were sharing copyrighted material (and could stop it) because everything passed through their servers. When the central server was shut down, the Napster network was broken.
  6. Pure P2P Network Queries flooded from node to node Query has Time-To-Live (TTL) counter Decremented each time visits a node Query discarded when TTL=0 Prevents endless loops Huge amounts of traffic can be generated if many users are submitting queries at the same time What happens if a machine hosting the file you are searching for lies outside the query “horizon”? – It will not be found.
  7. Leaves and hubs Leaves connect to one or two hubs. Hubs connected to hundreds of leaves and many other hubs. Search: node obtains a list of hubs and contacts the hubs in the list, noting which have been searched, until the list is exhausted, or a predefined search limit has been reached. - allows user to find popular file easily without loading the network, while theoretically maintaining the ability for a user to find a single file located anywhere on the network. Hubs maintain index of what files a leaf has – shares this index with neighbouring hubs. Saves messages by only forwarding queries to leaves & neighbouring hubs where search query is found in index/routing tables.
  8. Don’t visit each node until find what you need – use an index like Napster However, split the index into parts and distribute the parts throughout the network Construct the network so that it is known where each part of the index will be
  9. No discovery/search mechanism - user must know location of .torrent file (usually hosted on well-known websites) No permanent connections To download a file: Find location of a .torrent file on a standard web server .torrent file contains information on the file to be downloaded, plus the URL of a tracker Tracker sends list of other machines currently downloading the file The file is split into pieces (typically ¼ Mb) Download different pieces from each peer (different peers may have different pieces of the file) Various techniques for deciding which pieces to download in which order from which peer (e.g. download rarest piece first) Must have “seed” machine with complete copy of file. Architecture in a way similar to Napster, with single machine acting as tracker.
  10. File sharing – BitTorrent, KaZaA, Morpheus, eDonkey, WinMX, etc Distributed Computing – e.g. Seti@home search for aliens using spare CPU cycles Instant Messaging – e.g. ICQ, MSN Messenger, AOL, etc. – all these mainstream IMs have central servers in control Media Streaming/Distribution - BBC Olympics (BBC Peering), Abacast – e.g. Virgin radio (although the company claim its not p2p in the classic sense) Web services – server-to-server peering for more powerful applications Workgroups – form ad-hoc groups e.g. software development workgroups Networked devices – interconnecting potentially billions of devices – e.g. (on a smaller scale) formation of Bluetooth networks?
  11. Suicidal peers – the peer behaves properly for a time period, then suddenly switches