Administrative Details Grade – 90% test, 10% homework 3-4 homework assignments Office hours after lesson E-mail – [email protected] Tel. 054-6501047 1 Course outline Introduction to P2P networks Overlay networks Node addition and deletion Resource addition and deletion Discovery in P2P networks Search in P2P networks, distributed hash tables File sharing P2P networks Quality of service in P2P networks Security of P2P networks Actual networks: BitTorrent, Gnutella, Skype Anonymity in P2P networks 2 What is P2P Client – server model Peer-to-Peer model Example – search for information on favorite topic – compare the two models Discovery Load balancing Data transfer 3 Why use P2P? Shared resources CPU time, Storage Bandwidth Files (music, video etc.) Knowledge of network Proximity of peers may enable more efficient communication than hierarchical networks Scalability “Equality” – no central corporation that wants something from us Security – there are both pros and cons Anonymity 4 Disadvantages of P2P Management Discovery Reliability Files may disappear Nodes may disappear Voice quality may be reduced Malicious content masquerades as benign (Microsoft 2010: more than 30% of illegal (i.e. free) Microsoft software has malware) No responsible central authority 5 Architecture 1: Central Node Central Node holds control information Node A wants resource R Location of central node is configured in every participating node, e.g. during installation A contacts central node, asks for location of resource R Central node answers with pair <B,R> where B is a node address A and B negotiate directly for R Example: Napster music service 6 Central node: Pros and Cons Pros: Good manageability Reliable resource search Economically attractive, all the visibility (e.g. for advertising or as a brand name), with less resources. Cons: Scalability may be a problem Networking bottleneck at central node Central authority may be blamed for illegal activities of whole network (Napster case) 7 Architecture 2: Pure P2P All nodes are equal Node A wants a resource R Node A may “know” several nodes, i.e. have neighbors in an overlay network Node A searches for resource in one of several methods, e.g. limited flooding, distributed hash tables etc. If A receives as response a pair <B, R>, A contacts B for resource R Otherwise, A doesn’t get R Examples: Early Gnutella, Freenet 8 Pure P2P: Pros and Cons Pros Scalability Robustness: no single point of failure Cons: Existing resources may not be found Inefficient distribution of resources, e.g. resource duplication Security problems and cheating 9 Architecture 3: Hybrid Model Two types of nodes Regular nodes Super nodes Super nodes distribute the functions of a central node Node A wants a resource R Node A may “know” one or more super nodes Node A contacts super node and asks for R Super node searches for R among other super nodes If super node receives as response a pair <B, R>, super node returns R to A Otherwise, A doesn’t get R Examples: BitTorrent, Skype,SMTP 10 Hybrid P2P: pros and cons A mix between central node and pure P2P Pros More robust and scalable than central node Economic advantages compared to client-server mode. More reliable than pure P2P Super nodes can dictate more efficient use of resources and discourage cheaters (hopefully) Cons: the usual manageability and reliability problems of P2P 11 P2P Applications File sharing Voice over IP (VoIP) Content Delivery Networks Video on Demand Sharing stolen content Instant messaging Connection of servers in a client-server network (e.g. SMTP) Cloud and grid computing 12 Why P2P? Some numbers… Next: an example comparing file distribution in Client-Server vs. P2P Example and slides courtesy of “Computer Networking: A Top Down Approach”, 4th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. 13 File Distribution: Server-Client vs P2P Question : How much time to distribute file from one server to N peers? us: server upload bandwidth Server us File, size F dN uN u1 d1 u2 ui: peer i upload bandwidth d2 di: peer i download bandwidth Network (with abundant bandwidth) 14 File distribution time: server-client server sequentially sends N copies: NF/us time client i takes F/di time to download Server F us dN u1 d1 u2 d2 Network (with abundant bandwidth) uN Time to distribute F to N clients using = dcs = max { NF/us, F/min(di) } i client/server approach increases linearly in N (for large N) 15 File distribution time: P2P server must send one Server F u1 d1 u2 d2 copy: F/us time us client i takes F/di time Network (with dN to download abundant bandwidth) uN NF bits must be downloaded (aggregate) fastest possible upload rate: us + Sui (This is a little optimistic, since data has to propagate through the network peers) dP2P = max { F/us, F/min(di) , NF/(us + Sui) } i 16 Server-client vs. P2P: example Client upload rate = u, F/u = 1 hour, us = 10u, dmin ≥ us Minimum Distribution Time 3.5 P2P Client-Server 3 2.5 2 1.5 1 0.5 0 0 5 10 15 20 25 30 35 N 17 File Distribution Time P2P (cont.) Previous analysis is valid if m peers have file and n peers download. If only server has file then initial distribution to peers takes time. Alternative strategy: Peer1 downloads from server Peeri downloads from Peeri-1 for i=2,…,n Simple case: assume that i, ui=di=α Analysis: time to download is N-1/α+F/α 18 P2P external threats Threat to conventional economic models Divert traffic to cheaper alternatives (e.g. Skype) Heavily use resources of service providers (e.g. file sharing) Threat to conventional Intellectual Property laws Threat to user security due to many trust issues Threat to law enforcement capabilities 19 Threats to P2P users File sharing Wrong file Damaged file File contains malicious code Prosecution connected to Intellectual Property Deliberate downgrade of service Censorship Monitoring of activity (by law enforcement and others) Untrustworthy nodes 20 Is P2P successful? Some file sharing services shut down: Napster Kazaa Other content models threatening P2P file sharing: User provided: • Central storage services: DropBox, RapidShare • Central content services Pay services • iTunes BitTorrent and eMule still alive and kicking 21
© Copyright 2026 Paperzz