DOC PREVIEW
CORNELL CS 414 - Study Notes

This preview shows page 1-2-3-19-20-38-39-40 out of 40 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Peer-to-Peer FilesystemsAnnouncementsGoals for TodayNature of P2P SystemsSlide 5Slide 6Case study: NapsterNapster ArchitectureNapster ProtocolSlide 10Slide 11Slide 12Napster DiscussionOther P2P File Sharing SystemsOverlaysOverlays: UnstructuredSlide 17Overlays: StructuredDistributed Hash TablesSlide 20Slide 21Applications of DHTsPastry: Node statePastry: Node JoinsSlide 25Pastry: RoutingHow Does Routing/Lookup Work?PAST: Pastry FilesystemPAST: File ReplicationPAST: TradeoffsRationale and ValidationPAST: comparsion to CFSPAST: comparison to CFSDHT Deployment TodayWhy so many DHT implementations?DHT Deployment Tomorrow?IssuesConclusionsReferencesSlide 40Peer-to-Peer FilesystemsSlides originally created by Tom RoederAnnouncementsWelcome back from Spring break!We are in the final stretchHomework 4 and Project 4 design doc this weekHomework 5 and 6 due in AprilProject 5 and 6 due in April and beginning of MayPrelim II, Thursday April 26th???Final, Wednesday May 17thGoals for TodayWhat is P2P?P2P File Sharing SystemsCase study: NapsterOverlaysStructuredUnstructuredDistributed hash tables (DHTs)Hash table ontop of structured overlayCase studies: PAST, CFS, OpenDHTContent-Addressable Storage (CAS)Nature of P2P SystemsP2P: communicating peers in the systemnormally an overlay in the networkHot topic because of Napster, Gnutella, etcIn some sense, P2P is older than the namemany protocols used symmetric interactionsnot everything is client-serverWhat’s the real definition?no-one has a good one, yetdepends on what you want to fit in the classNature of P2P SystemsStandard definitionsymmetric interactions between peersno distinguished serverMinimally: is the Web a P2P system?We don’t want to say that it isbut it is, under this definitionI can always run a server if I want: no asymmteryThere must be more structure than thisLet’s try againNature of P2P SystemsRecent definitionNo distinguished initial stateEach server has the same codeservers cooperate to handle requestsclients don’t matter: servers are the P2P systemTry again: is the Web P2P?No, not under this def: servers don’t interactIs the Google server farm P2P?Depends on how it’s set up? Probably not.Case study: NapsterFile Sharing service created by Shawn Fanning in 1999Flat FS: single-level FS with no hierarchyMultiple files can have the same nameAll storage done at edges:Hosts export set of files stored locallyHost is registered with centralized directoryUses keepalive messages to check for connectivityCentralized directory notified of file names exported by the hostFile lookup: client sends request to central directoryDirectory server sends 100 files matching the request to clientClient pings each host, computes RTT and displays resultsClient transfers files from the closest hostFile transfers are peer-to-peer; central directory not partNapster ArchitectureNetworkFirewallIP Sprayer/RedirectorNapsterDirectoryServer 1NapsterDirectoryServer 2NapsterDirectoryServer 3Napster.comH1H2H3Napster ProtocolNetworkFirewallIP Sprayer/RedirectorNapsterDirectoryServer 1NapsterDirectoryServer 2NapsterDirectoryServer 3Napster.comH1H2H3I have “metallica / enter sandman”Napster ProtocolNetworkFirewallIP Sprayer/RedirectorNapsterDirectoryServer 1NapsterDirectoryServer 2NapsterDirectoryServer 3Napster.com“who has metallica ?”“check H1, H2”H1H2H3I have “metallica / enter sandman”Napster ProtocolNetworkFirewallIP Sprayer/RedirectorNapsterDirectoryServer 1NapsterDirectoryServer 2NapsterDirectoryServer 3Napster.com“who has metallica ?”“check H1, H2”pingpingH1H2H3I have “metallica / enter sandman”Napster ProtocolNetworkFirewallIP Sprayer/RedirectorNapsterDirectoryServer 1NapsterDirectoryServer 2NapsterDirectoryServer 3Napster.com“who has metallica ?”“check H1, H2”pingpingH1H2H3transferI have “metallica / enter sandman”Napster DiscussionIssues:Centralized file location directoryLoad balancingRelies on keepalive messagesScalability an issue!Success: ability to create and foster an online communityBuilt in ethicsBuilt in faultsCommunication mediumHad upto 40 million users in June 2000!May actually be lower, 26.4 million by February 2001Ultimately found to be illegal serviceOther P2P File Sharing SystemsNapster has a central database! Removing it will make regulating file transfers harderFreenet, gnutella, kazaa … all are decentralizedFreenet: anonymous, files encryptedSo not known which files stored locally, which file searchedKazaa: allows parallel downloads(Bit)Torrents for faster downloadLegality. Are there any good legal uses for P2P systems?OverlaysP2P systems possess some degree of self-organization each node finds its peers and helps maintain the system structureTwo types of overlays connect most P2P systemsUnstructuredNo infrastructure set up for routingRandom walks, flood searchStructuredSmall World Phenomenon: KleinbergSet up enough structure to get fast routingWe will see O(log n)For special tasks, can get O(1)Overlays: UnstructuredFrom Gribblea common unstructured overlaylook at connectivitymore structure than it seems at firstOverlays: UnstructuredGossip: state synchronization techniqueInstead of forced flooding, share stateDo so infrequently with one neighbor at a timeOriginal insight from epidemic theoryConvergence of state is reasonably fastwith high probability for almost all nodesgood probabilistic guaranteesTrivial to implementSaves bandwidth and energy consumptionOverlays: StructuredNeed to build up long distance pointersthink of routing within levels of a namespaceeg. namespace is 10 digit numbers base 40112032101then you can hop levels to find other nodesThis is the most common structure imposedDistributed Hash TablesOne way to do this structured routingAssign each node each node an id from spaceeg. 128 bits: SHA-1 salted hash of IP addressbuild up a ring: circular hashingassign nodes into this spaceValuediversity of neighborseven coverage of spaceless chance of attack?Distributed Hash TablesWhy “hash tables”?Stored named objects by hash codeRoute the object to the nearest location in spacekey idea: nodes and objects share id


View Full Document

CORNELL CS 414 - Study Notes

Documents in this Course
Security

Security

49 pages

Processes

Processes

24 pages

Deadlocks

Deadlocks

57 pages

Threads

Threads

5 pages

Threads

Threads

29 pages

Deadlocks

Deadlocks

36 pages

Load more
Download Study Notes
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Study Notes and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Study Notes 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?