SlideShare a Scribd company logo
1 of 40
Download to read offline
Peer-to-Peer Systems
    What’s behind the buzzword?


                Uwe Schmidt
       Un-Distinguished Lecture Series
                 16/02/2007
What is it?

• What does Peer-to-Peer (P2P)
  mean to you?
• What does “peer” mean?
 •   Merriam-Webster:
     one that is of equal standing with another :
     EQUAL; especially : one belonging to the same
     societal group especially based on age, grade, or status
P2P Principle
• Organizational principle, core concepts:
 • Self-organizing, no central management
 • Resource sharing, exploits resources at
    the edge of the network
 • Peers in P2P are all equal (more or less)
 • Large number of peers in the network
Properties of P2P

• Unreliable, uncoordinated, unmanaged
• Resilient to attacks, heterogeneous
• Large collection of resources
When to use it?

• Budget
• Resource relevance
• Trust
• Rate of system change
• Criticality
P2P Vision

    No More Dedicated Servers,
Everything in Internet Served by Peers
P2P File-sharing

• The most popular application
  of the P2P principle
• Made P2P popular
• We will look at the “evolution” of P2P file-
  sharing in the following...
Napster
• First P2P file-sharing application
  (June 1999)
• Only MP3 sharing possible
• Made the term “P2P” known
• Created by Shawn Fanning
  (nickname “Napster”)
How Napster worked
• Based on central index server (farm)
• User register and give list of files to share
• Searching based on keywords
 • Results: List of files with additional
    information, e.g. peer’s bandwidth,
    encoding rate, file size
Napster Diagram
                 • Peers log in
Server
                 • Send list of files to share
                 • Peer queries server
                 • Server responds
                 • File transfer directly
Strengths & Weaknesses
    Strength              Weakness

Fast, efficient and    Central server is a
 overall search      single point of failure


Consistent view of   Expensive to maintain
  the network        central server (farm)
Gnutella
• Addresses some of Napster’s weaknesses
  and introduces its own problems
• Originally developed at Nullsoft (AOL)
 • Accidentally released on their website
• Open protocol specifications
• Fully distributed
How Gnutella works
• Based on an overlay network
• All peers are fully equal
• A peer needs to know another peer, that is
  already in the network, to join
• Searching based on flooding
• Direct downloads
Gnutella Diagram
                Duplicate
                Messages

                                          Unreached
                                            Peers
                               Query:
                             “Madonna”

                                                      Query Hit:
                                                       Respond

                   Direct
                  Transfer

Query Hit:
 Respond




                       Query radius = 2
Strengths & Weaknesses
    Strength               Weakness

Fully distributed,     Flooding a query is
no attack points?     extremely inefficient

                      Search only reaches a
 Open protocol       subset of peers due to
                       limited query radius
KaZaA
• Created in March 2001 (Niklas Zennström)
• Combines strengths of Napster and
  Gnutella
• Based on “supernode architecture”
• Exploits heterogenity of peers
• Organize peers into a hierarchy
How KaZaA works

• Two-tier hierarchy
• Two kinds of nodes
 • Ordinary nodes (ON)
 • Supernodes (SN)
• ON belongs to SN
KaZaA Diagram
           SN

 Direct
Transfer
                SN
  SN
Strengths & Weaknesses
      Strength               Weakness


                       Still no overall search
Combines good points
 from Napster and
     Gnutella
                         Easier to attack?
Comparison
             Napster   Gnutella   KaZaA

Type of
        Centralized Distributed   Hybrid
network
 Efficient
              +++        ---        +
searching
Resilience
               ---       ++?        +
to attacks
Current State
• Most bigger file-sharing systems sued into
  submission (e.g. Napster and KaZaA)
 • Although many still running because of
    open clients
• User who share copyrighted content are
  sued as well...
 • e.g. by the RIAA
Non-direct file-sharing
• People try to be anonymous by disguising
  their identity, i.e. IP-address
• Idea: Non-direct file transfer, i.e. route
  traffic through intermediate peers
• Have currently too much overhead
 • slow and not very efficient
BitTorrent
• Developed by Bram Cohen in 2001
• New approach for sharing large files
• Goal: Quickly replicate one file to a large
  number of clients
• More appropriately called P2P content
  distribution instead of file-sharing
How BitTorrent works

• Build a network for each file to distribute
• Each file has unique “link”
 • “torrent” file holds metadata about a file
• Tracker is a server to manage active clients
• Files are broken into chunks
BitTorrent Download

• Client gets “torrent” file from somewhere
• Client contacts tracker, gets lists of peers
• Client contacts other peers directly for
  download of specific chunks
Tit-for-Tat policy
• Encourages cooperation,
  discourages free-riding
• A peer serves peers that serve it
• Peers download rarest chunks first
 • makes them attractive to other peers,
    they can then download in return
 • also prevents chunks from disappearing
Strengths & Weaknesses
       Strength              Weakness
Works quite well, only
                       Files have to be large
slow in the beginning

Efficient distrubution
                            No searching
     mechanism

Enforces contribution,     Everyone must
discourages free-riding      contribute
Other P2P applications
• P2P Communications
 • Email, IM,VoIP
• P2P Computation
 • SETI@Home
• P2P Collaboration
 • Wikipedia
Skype

• Developed by the same people as KaZaA
• 9 Million concurrent users (Jan. 29 2007)
• Very similar to KaZaA’s architecture
 • Supernodes and ordinary nodes
• Central server for login and billing
Skype
• Proprietary and encrypted protocol
• Source code is closed
• Executable uses a lot of mechanisms to
  protect against reverse engineering
 • Anti-debugger code
 • Partly encrypted
How Skype goes
     through Firewalls
• Skype server plays mediator
 • takes IP adresses and UDP ports
 • forwards them to other side
• Both clients start connections
• Firewalls think that packets from the other
  side are responses to started connections
Joost
• Brought to you by the guys who made
  KaZaA and Skype
• Uses P2P video streaming technology
• Tries to merge the best of TV with the best
  of the Internet
• Beta test is running right now
• Advertisement based,View on demand
That’s it


Let’s get some beer...
References
     Most slides are based and copied in large part from Jussi Kangasharju’s
     lecture on “Peer-to-Peer and Grid Computing”, chapter 1 and 2.
     http://elara.tk.informatik.tu-darmstadt.de/LectureNotes/ws0607/P2P/

     Other References:

1.   quot;File sharing.quot; Wikipedia, The Free Encyclopedia.
     http://en.wikipedia.org/wiki/File_sharing

2.   quot;Skype.quot; Wikipedia, The Free Encyclopedia.
     http://en.wikipedia.org/wiki/Skype

3.   quot;Napster.quot; Wikipedia, The Free Encyclopedia.
     http://en.wikipedia.org/wiki/Napster

4.   Joost.
     http://www.joost.com
References
5.   The hole trick: How Skype & Co. get round firewalls
     http://www.heise-security.co.uk/articles/82481

6.   Silver Needle in the Skype
     http://www.secdev.org/conf/skype_BHEU06.handout.pdf

7.   Picture of Gtk-Gnutella
     http://impressive.net/people/gerald/2002/01/21/gtk-gnutella.png

8.   Picture of KaZaA
     http://www.lagranepoca.com/news_images/2006-7-28-kazaa.gif

9.   Pictures of Skype
     http://about.skype.com/pictures.html

More Related Content

What's hot

Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systemssumitjain2013
 
Cloud Computing Design Considerations
Cloud Computing Design ConsiderationsCloud Computing Design Considerations
Cloud Computing Design ConsiderationsMike Kavis
 
Distributed file system
Distributed file systemDistributed file system
Distributed file systemAnamika Singh
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System AdministrationDuressa Teshome
 
4.file service architecture
4.file service architecture4.file service architecture
4.file service architectureAbDul ThaYyal
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring toolsQaswarBosan
 
Design issues of dos
Design issues of dosDesign issues of dos
Design issues of dosvanamali_vanu
 
Network File System in Distributed Computing
Network File System in Distributed ComputingNetwork File System in Distributed Computing
Network File System in Distributed ComputingChandan Padalkar
 
Peer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By AhnafPeer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By Ahnafahnarokz
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)ashiesh0007
 
Introduction to Network Applications & Network Services
Introduction to  Network Applications &  Network ServicesIntroduction to  Network Applications &  Network Services
Introduction to Network Applications & Network ServicesMuhammadRizaHilmi
 
Deadlock in Distributed Systems
Deadlock in Distributed SystemsDeadlock in Distributed Systems
Deadlock in Distributed SystemsPritom Saha Akash
 

What's hot (20)

Nfs
NfsNfs
Nfs
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systems
 
2019 types of network cables
2019 types of network cables2019 types of network cables
2019 types of network cables
 
Network Virtualization
Network VirtualizationNetwork Virtualization
Network Virtualization
 
Cluster Computing
Cluster ComputingCluster Computing
Cluster Computing
 
Cloud Computing Design Considerations
Cloud Computing Design ConsiderationsCloud Computing Design Considerations
Cloud Computing Design Considerations
 
Distributed file system
Distributed file systemDistributed file system
Distributed file system
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
4.file service architecture
4.file service architecture4.file service architecture
4.file service architecture
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
 
Design issues of dos
Design issues of dosDesign issues of dos
Design issues of dos
 
Network File System in Distributed Computing
Network File System in Distributed ComputingNetwork File System in Distributed Computing
Network File System in Distributed Computing
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Peer to-peer networks
Peer to-peer networksPeer to-peer networks
Peer to-peer networks
 
Peer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By AhnafPeer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By Ahnaf
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)
 
TCP/IP and UDP protocols
TCP/IP and UDP protocolsTCP/IP and UDP protocols
TCP/IP and UDP protocols
 
Distributed Computing
Distributed ComputingDistributed Computing
Distributed Computing
 
Introduction to Network Applications & Network Services
Introduction to  Network Applications &  Network ServicesIntroduction to  Network Applications &  Network Services
Introduction to Network Applications & Network Services
 
Deadlock in Distributed Systems
Deadlock in Distributed SystemsDeadlock in Distributed Systems
Deadlock in Distributed Systems
 

Similar to Peer-to-Peer Systems

New School Man-in-the-Middle
New School Man-in-the-MiddleNew School Man-in-the-Middle
New School Man-in-the-MiddleTom Eston
 
CSTalks - Peer-to-peer - 16 Feb
CSTalks - Peer-to-peer - 16 FebCSTalks - Peer-to-peer - 16 Feb
CSTalks - Peer-to-peer - 16 Febcstalks
 
Xen_and_Rails_deployment
Xen_and_Rails_deploymentXen_and_Rails_deployment
Xen_and_Rails_deploymentAbhishek Singh
 
The Evolving Internet Fndtn
The Evolving Internet FndtnThe Evolving Internet Fndtn
The Evolving Internet Fndtnguestbf78f8b
 
Mark Little Fence Sitting Soa Geek
Mark Little Fence Sitting Soa GeekMark Little Fence Sitting Soa Geek
Mark Little Fence Sitting Soa Geekdeimos
 
Retooling the world wide web for its original purpose
Retooling the world wide web for its original purposeRetooling the world wide web for its original purpose
Retooling the world wide web for its original purposesingingfish
 
Netcetera Proactive Management Service
Netcetera Proactive Management ServiceNetcetera Proactive Management Service
Netcetera Proactive Management ServicePeter Skelton
 
Bringing Wireless Sensing to its full potential
Bringing Wireless Sensing to its full potentialBringing Wireless Sensing to its full potential
Bringing Wireless Sensing to its full potentialAdrian Hornsby
 
Kentik Network@Scale (Dan Ellis)
Kentik Network@Scale (Dan Ellis)Kentik Network@Scale (Dan Ellis)
Kentik Network@Scale (Dan Ellis)gvillain
 
Lesson 01 - Network Assessment
Lesson 01 - Network AssessmentLesson 01 - Network Assessment
Lesson 01 - Network AssessmentAngel G Diaz
 
Yahoo Communities Architecture Unlikely Bedfellows
Yahoo Communities Architecture Unlikely BedfellowsYahoo Communities Architecture Unlikely Bedfellows
Yahoo Communities Architecture Unlikely BedfellowsConSanFrancisco123
 
How to over-engineer things and have fun? Building a modern, distributed real...
How to over-engineer things and have fun? Building a modern, distributed real...How to over-engineer things and have fun? Building a modern, distributed real...
How to over-engineer things and have fun? Building a modern, distributed real...Oto Brglez
 
Module: Mutable Content in IPFS
Module: Mutable Content in IPFSModule: Mutable Content in IPFS
Module: Mutable Content in IPFSIoannis Psaras
 
OSCON 2004: A Developer's Tour of Chandler
OSCON 2004: A Developer's Tour of ChandlerOSCON 2004: A Developer's Tour of Chandler
OSCON 2004: A Developer's Tour of ChandlerTed Leung
 
Just In Time Scalability Agile Methods To Support Massive Growth Presentation
Just In Time Scalability  Agile Methods To Support Massive Growth PresentationJust In Time Scalability  Agile Methods To Support Massive Growth Presentation
Just In Time Scalability Agile Methods To Support Massive Growth PresentationLong Nguyen
 

Similar to Peer-to-Peer Systems (20)

New School Man-in-the-Middle
New School Man-in-the-MiddleNew School Man-in-the-Middle
New School Man-in-the-Middle
 
CSTalks - Peer-to-peer - 16 Feb
CSTalks - Peer-to-peer - 16 FebCSTalks - Peer-to-peer - 16 Feb
CSTalks - Peer-to-peer - 16 Feb
 
Xen_and_Rails_deployment
Xen_and_Rails_deploymentXen_and_Rails_deployment
Xen_and_Rails_deployment
 
The Evolving Internet Fndtn
The Evolving Internet FndtnThe Evolving Internet Fndtn
The Evolving Internet Fndtn
 
Mark Little Fence Sitting Soa Geek
Mark Little Fence Sitting Soa GeekMark Little Fence Sitting Soa Geek
Mark Little Fence Sitting Soa Geek
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Advanced Deployment
Advanced DeploymentAdvanced Deployment
Advanced Deployment
 
Retooling the world wide web for its original purpose
Retooling the world wide web for its original purposeRetooling the world wide web for its original purpose
Retooling the world wide web for its original purpose
 
Netcetera Proactive Management Service
Netcetera Proactive Management ServiceNetcetera Proactive Management Service
Netcetera Proactive Management Service
 
Bringing Wireless Sensing to its full potential
Bringing Wireless Sensing to its full potentialBringing Wireless Sensing to its full potential
Bringing Wireless Sensing to its full potential
 
HDFS Architecture
HDFS ArchitectureHDFS Architecture
HDFS Architecture
 
Hdfs Dhruba
Hdfs DhrubaHdfs Dhruba
Hdfs Dhruba
 
Kentik Network@Scale (Dan Ellis)
Kentik Network@Scale (Dan Ellis)Kentik Network@Scale (Dan Ellis)
Kentik Network@Scale (Dan Ellis)
 
Qcon
QconQcon
Qcon
 
Lesson 01 - Network Assessment
Lesson 01 - Network AssessmentLesson 01 - Network Assessment
Lesson 01 - Network Assessment
 
Yahoo Communities Architecture Unlikely Bedfellows
Yahoo Communities Architecture Unlikely BedfellowsYahoo Communities Architecture Unlikely Bedfellows
Yahoo Communities Architecture Unlikely Bedfellows
 
How to over-engineer things and have fun? Building a modern, distributed real...
How to over-engineer things and have fun? Building a modern, distributed real...How to over-engineer things and have fun? Building a modern, distributed real...
How to over-engineer things and have fun? Building a modern, distributed real...
 
Module: Mutable Content in IPFS
Module: Mutable Content in IPFSModule: Mutable Content in IPFS
Module: Mutable Content in IPFS
 
OSCON 2004: A Developer's Tour of Chandler
OSCON 2004: A Developer's Tour of ChandlerOSCON 2004: A Developer's Tour of Chandler
OSCON 2004: A Developer's Tour of Chandler
 
Just In Time Scalability Agile Methods To Support Massive Growth Presentation
Just In Time Scalability  Agile Methods To Support Massive Growth PresentationJust In Time Scalability  Agile Methods To Support Massive Growth Presentation
Just In Time Scalability Agile Methods To Support Massive Growth Presentation
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Peer-to-Peer Systems

  • 1. Peer-to-Peer Systems What’s behind the buzzword? Uwe Schmidt Un-Distinguished Lecture Series 16/02/2007
  • 2. What is it? • What does Peer-to-Peer (P2P) mean to you? • What does “peer” mean? • Merriam-Webster: one that is of equal standing with another : EQUAL; especially : one belonging to the same societal group especially based on age, grade, or status
  • 3. P2P Principle • Organizational principle, core concepts: • Self-organizing, no central management • Resource sharing, exploits resources at the edge of the network • Peers in P2P are all equal (more or less) • Large number of peers in the network
  • 4. Properties of P2P • Unreliable, uncoordinated, unmanaged • Resilient to attacks, heterogeneous • Large collection of resources
  • 5. When to use it? • Budget • Resource relevance • Trust • Rate of system change • Criticality
  • 6. P2P Vision No More Dedicated Servers, Everything in Internet Served by Peers
  • 7. P2P File-sharing • The most popular application of the P2P principle • Made P2P popular • We will look at the “evolution” of P2P file- sharing in the following...
  • 8.
  • 9. Napster • First P2P file-sharing application (June 1999) • Only MP3 sharing possible • Made the term “P2P” known • Created by Shawn Fanning (nickname “Napster”)
  • 10. How Napster worked • Based on central index server (farm) • User register and give list of files to share • Searching based on keywords • Results: List of files with additional information, e.g. peer’s bandwidth, encoding rate, file size
  • 11. Napster Diagram • Peers log in Server • Send list of files to share • Peer queries server • Server responds • File transfer directly
  • 12. Strengths & Weaknesses Strength Weakness Fast, efficient and Central server is a overall search single point of failure Consistent view of Expensive to maintain the network central server (farm)
  • 13.
  • 14. Gnutella • Addresses some of Napster’s weaknesses and introduces its own problems • Originally developed at Nullsoft (AOL) • Accidentally released on their website • Open protocol specifications • Fully distributed
  • 15. How Gnutella works • Based on an overlay network • All peers are fully equal • A peer needs to know another peer, that is already in the network, to join • Searching based on flooding • Direct downloads
  • 16. Gnutella Diagram Duplicate Messages Unreached Peers Query: “Madonna” Query Hit: Respond Direct Transfer Query Hit: Respond Query radius = 2
  • 17. Strengths & Weaknesses Strength Weakness Fully distributed, Flooding a query is no attack points? extremely inefficient Search only reaches a Open protocol subset of peers due to limited query radius
  • 18.
  • 19. KaZaA • Created in March 2001 (Niklas Zennström) • Combines strengths of Napster and Gnutella • Based on “supernode architecture” • Exploits heterogenity of peers • Organize peers into a hierarchy
  • 20. How KaZaA works • Two-tier hierarchy • Two kinds of nodes • Ordinary nodes (ON) • Supernodes (SN) • ON belongs to SN
  • 21. KaZaA Diagram SN Direct Transfer SN SN
  • 22. Strengths & Weaknesses Strength Weakness Still no overall search Combines good points from Napster and Gnutella Easier to attack?
  • 23. Comparison Napster Gnutella KaZaA Type of Centralized Distributed Hybrid network Efficient +++ --- + searching Resilience --- ++? + to attacks
  • 24. Current State • Most bigger file-sharing systems sued into submission (e.g. Napster and KaZaA) • Although many still running because of open clients • User who share copyrighted content are sued as well... • e.g. by the RIAA
  • 25. Non-direct file-sharing • People try to be anonymous by disguising their identity, i.e. IP-address • Idea: Non-direct file transfer, i.e. route traffic through intermediate peers • Have currently too much overhead • slow and not very efficient
  • 26. BitTorrent • Developed by Bram Cohen in 2001 • New approach for sharing large files • Goal: Quickly replicate one file to a large number of clients • More appropriately called P2P content distribution instead of file-sharing
  • 27. How BitTorrent works • Build a network for each file to distribute • Each file has unique “link” • “torrent” file holds metadata about a file • Tracker is a server to manage active clients • Files are broken into chunks
  • 28. BitTorrent Download • Client gets “torrent” file from somewhere • Client contacts tracker, gets lists of peers • Client contacts other peers directly for download of specific chunks
  • 29. Tit-for-Tat policy • Encourages cooperation, discourages free-riding • A peer serves peers that serve it • Peers download rarest chunks first • makes them attractive to other peers, they can then download in return • also prevents chunks from disappearing
  • 30. Strengths & Weaknesses Strength Weakness Works quite well, only Files have to be large slow in the beginning Efficient distrubution No searching mechanism Enforces contribution, Everyone must discourages free-riding contribute
  • 31. Other P2P applications • P2P Communications • Email, IM,VoIP • P2P Computation • SETI@Home • P2P Collaboration • Wikipedia
  • 32.
  • 33. Skype • Developed by the same people as KaZaA • 9 Million concurrent users (Jan. 29 2007) • Very similar to KaZaA’s architecture • Supernodes and ordinary nodes • Central server for login and billing
  • 34. Skype • Proprietary and encrypted protocol • Source code is closed • Executable uses a lot of mechanisms to protect against reverse engineering • Anti-debugger code • Partly encrypted
  • 35. How Skype goes through Firewalls • Skype server plays mediator • takes IP adresses and UDP ports • forwards them to other side • Both clients start connections • Firewalls think that packets from the other side are responses to started connections
  • 36. Joost • Brought to you by the guys who made KaZaA and Skype • Uses P2P video streaming technology • Tries to merge the best of TV with the best of the Internet • Beta test is running right now • Advertisement based,View on demand
  • 37.
  • 38. That’s it Let’s get some beer...
  • 39. References Most slides are based and copied in large part from Jussi Kangasharju’s lecture on “Peer-to-Peer and Grid Computing”, chapter 1 and 2. http://elara.tk.informatik.tu-darmstadt.de/LectureNotes/ws0607/P2P/ Other References: 1. quot;File sharing.quot; Wikipedia, The Free Encyclopedia. http://en.wikipedia.org/wiki/File_sharing 2. quot;Skype.quot; Wikipedia, The Free Encyclopedia. http://en.wikipedia.org/wiki/Skype 3. quot;Napster.quot; Wikipedia, The Free Encyclopedia. http://en.wikipedia.org/wiki/Napster 4. Joost. http://www.joost.com
  • 40. References 5. The hole trick: How Skype & Co. get round firewalls http://www.heise-security.co.uk/articles/82481 6. Silver Needle in the Skype http://www.secdev.org/conf/skype_BHEU06.handout.pdf 7. Picture of Gtk-Gnutella http://impressive.net/people/gerald/2002/01/21/gtk-gnutella.png 8. Picture of KaZaA http://www.lagranepoca.com/news_images/2006-7-28-kazaa.gif 9. Pictures of Skype http://about.skype.com/pictures.html