1 / 21

P2P Computing

P2P Computing. P2P Background Historical P2P Modern P2P Why P2P? P2P Environment Binding of Peers (Early + Late) NAT Translation Systems Firewalls True P2P P2P Examples SETI@Home Napster (expanded) ICQ KaZaA - Gnutella Scenario – Gnutella Lecture…. Historical P2P.

orenda
Download Presentation

P2P Computing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. P2P Computing • P2P Background • Historical P2P • Modern P2P • Why P2P? • P2P Environment • Binding of Peers (Early + Late) • NAT Translation Systems • Firewalls • True P2P • P2P Examples • SETI@Home • Napster (expanded) • ICQ • KaZaA • - Gnutella Scenario – Gnutella Lecture…

  2. Historical P2P • The Internet started as peer to peer system e.g. ARPANET, 1969 • goal - to share computing resources around the USA using different networks • UCLA, Stanford, Utah and Santa Barbara • all had equal status – P2P dial-up modems Clients IP addresses changing unpredictable The 1990's Client-Server Internet Late 1990’s Naptser, then Gnutella 2000 – the new P2P • Peer to Peer (P2P) - originally used to describe the communication of two peers. • From late 1960’s until 1994, machines were assumed to be switch on, connected and had an IP address assigned • Then, invention of Mosaic and WWW led to a different type of user….

  3. Modern Peer to Peer What is an P2P application? P2P is a class of applications that takes advantage of resources e.g. storage, cycles, content, human presence, available at the edges of the Internet – Clay Shirky • Computers/devices “at the edges of the internet” are those: • Operating within transient environments - computers come and go frequently • They can be behind a firewall or NAT systems • Have to operate outside of DNS • Often have to deal with differing transport protocols, devices and operating systems

  4. A P2P Network Application P2P Network NAT Firewall Bluetooth TCP/IP HTTP UDP/IP TCP/IP XP Linux

  5. P2P Environments • Binding of Peers (Early + Late) • Network Translation Systems (NAT) • Firewalls • True P2P • P2P: Summary of Key Points

  6. P2P & the Binding of Peers 72.14.207.99 http://www.google.com/ DNS P2P • Computers do not have a fixed address e.g. hidden behind NATs • Need a late binding of their addresses with their identifier • this is the norm in P2P • DHCP often used for LANs for dynamic IP address assignment • Dynamic DNS service providers offer late binding of changing IPs to the DNS system via their Domain Name servers. Client/Server rely on fixed IP Addresses ... • known as static or early binding

  7. NAT Systems NAT Router • IP address - unique 32-bit number, identifies computer location computer on network • A possible 232 but really around 3 billion, why? • addresses are set aside for multicasting, testing or other special uses • addresses are wasted because of the hierarchical nature of the address. • e.g. Google owns the block 209.85.128.0 - 209.85.255.255 • Explosion of the Internet - available IP addresses is not enough! Solutions: • redesign the address format to allow more addresses ? • Yes, IPv6 (requires modification to the entire infrastructure of the Internet – but it is happening) supports 2128 • or use NAT Systems Private Network Public Network Outgoing Outgoing stub domain Incoming Incoming Local Area Network Internet

  8. NAT System Types • Full Cone • Once a mapping between an internal and external address is made, it remains. • External messages directed at the external address will get routed to the mapped internal address. • Restricted Cone • External messages will only be routed to the mapped internal IP address if an initiating message first came from inside the NAT. • Port Restricted Cone • Same as a restricted cone, but the port number is also taken into account. • Symmetric NAT • Every outgoing message from a particular address and port is mapped to a unique external address. • Two separate messages from the NAT-bound node will have distinct external mappings. • If Restricted: External messages will only be routed to the mapped internal IP address if an initiating message first came from inside the NAT.

  9. NAT System Types NAT Router NAT Router Cone Private Network Public Network 192.168.0.1 131.251.169.1 One to Many Requests Local Area Network Internet Symmetric Private Network N1 131.251.169.1:20 192.168.0.1:8080 131.251.169.1:21 N2 One to One Requests N3 131.251.169.1:22 Local Area Network Internet

  10. How do you get around a NAT? • Manually configure NAT – not fun, not always possible • Initiate an outward-bound connection, and KEEP IT OPEN • Internet Gateway Device (IGD) Protocol via UPnP • Some NATs expose themselves using IGD • allows UPnP enabled nodes to discover external IP addresses and port mappings. • STUN (Simple Traversal of UDP over NATs - now Session Traversal Utilities over NAT) • Requires rendezvous nodes which accepts incoming messages from NAT-bound nodes. They return the address they see to the NAT-bound node. • TURN (Traversal Using Relay NAT) • Requires a dedicated relay server outside the NAT that receives data on behalf of the NAT bound node and forwards it.

  11. Firewalls • a system designed to prevent unauthorized access to or from a private network • Allows internal/external connections through specific ports– and hence protocols • Can restrict based on local and remote IP address as well. • firewall examines each message and blocks those that do not meet the specified security criteria Example x Telnet Audio Conferencing SSH HTTP Telnet Audio Conferencing SSH HTTP x Internal External

  12. How to get Around Firewalls? • firewall dependent • open an initiating connection and KEEP IT OPEN • tunnelling • wrap the payload of the restricted protocol in a protocol that is not restricted • HTTP is commonly allowed through firewalls • employees can argue they could not be productive with access to the Web. • relay nodes • act as ‘mailboxes’ that a restricted node can pull messages from.

  13. P2P Examples • P2P Examples • SETI@Home • Napster (expanded) • ICQ • KaZaA • - Gnutella Scenario – later…

  14. True P2P ? • Three main categories of systems • Centralized systems: peer connects to server which coordinates and manages communication. e.g. SETI@home • Brokered systems: peers connect to a server to discover other peers, but then manage the communication themselves (e.g. Napster). This is also called Brokered P2P. • Decentralized systems: peers run independently with no central services. Discovery is decentralized and communication takes place between the peers. e.g. Gnutella True P2P

  15. Example1: SETI@HOME (Client/Server) 3. SETI client gets data from server and runs Client/Server P2P • Launched In 1996 • Scientific experiment - uses Internet-connected computers in the Search for Extraterrestrial Intelligence (SETI) • Distributes a screen saver–based application to users • Applies signal analysis algorithms to different data sets to process radio-telescope data. • Has more than 3 million users - used over a million years of CPU time to date 1. Install Screen Saver SETI@Home Main Server 4. Client sends results back to server Radio-telescope Data 2. SETI client (screen Saver) starts

  16. Example 2: File Sharing with Napster 2. User A searches for song.mp3 4. Server informs User A of the location of song.mp3 User A 5. User A connects to User C and downloads song.mp3 • Launched in May 1999, by Shawn Fanning (19) and Sean Parker (20) • Allowed Users to download MP3 Files - compression format, good quality but 1/12th original size • April 2000 – Metallica starts law suit – Huge and long court case • November 2000 – Napster has 38 Million members • July 2001 – Napster ordered offline, June 2002 bankrupt Brokered/Hybrid P2P www.napster.com Main Server File List: UserC song.mp3 UserD another.mp3 ….. • 1. Construct Database • Users connect to Napster Server • Server builds up a list of available songs and locations 3. Server searches database. Finds song on User C’s machine User B … User D (Another.mp3) User C (Song.mp3)

  17. Example 3: ICQ: Instant Messaging • Released in November 1996 • Allows users to be notified when their friends come online • Users can send messages to their friends (instant messaging) • Also allows users to exchange files www.icq.com Main ServerUser List: 2.User A searches ICQ for User B 3. Server informs User A of the user B’s location 1. Members (user A and user B) register their details at the ICQ web site User A User B 4. User A connects to User C interacts and exchanges files

  18. Example 4: KaZaA • Uses the FastTrack network • up to 3 million users a day in 2002 • designed by the Skype guys • not an open protocol • SuperPeer Architecture • more decentralized form of brokered architecture • maintains a file index that maps file identifiers to the IP addresses. • Index is distributed across the SuperPeers. • SP maintains a local index for all of its children. • similar to a (mini) Napster hub, but not a dedicated server – belongs to an individual user. super peer ordinary peer

  19. KaZaA cont… • Superpeers create an overlay with a certain number of connections to other Superpeers. • roughly between 30 – 50 neighbours • change their connections frequently – every 10 – 20 minutes • Superpeers service roughly 100 – 160 ordinary nodes. • 3 million nodes • roughly 30,000 superpeers. • reduces the flooding of the entire network by queries. • instead, ordinary nodes are connected to a small number of Superpeers and query only them. • Queries are selectively flooded amongst the superpeer overlay. • measurements suggest the network is highly dynamic • supernodes look for new neighbours with a low workload. • supernodes connect briefly to share metadata • periodically reconfigure themselves to provide a good spread of connections across the network providing better query results over time. • second generation Gnutella has adopted the superpeer architecture. • we’ll look at this again next week.

  20. Examples of P2P Technologies File sharing/storage programs (see handout for references) Gnutella Napster eMule LimeWire Kazaa Freenet CPU resource-sharing systems: SETI@HOME BOINC United Devices Entropia Instant messaging: ICQ Jabber (http://www.jabber.org/) became Extensible Messaging and Presence Protocol (XMPP) Conferencing: • T.120 – Netmeeting, Sun Forum & SGI Meeting • white-boarding, voice over IP (Skype)

  21. Concluding Remarks • P2P, Things to Know • What is P2P: “Connecting devices at the edges of the internet” • Know basics of P2P Environment e.g. transient, hostile, NAT, Firewalls • Know good P2P Techniques - decentralization, equal peers etc. • Examples: Napster + Gnutella + KaZaA– know the differences

More Related