SlideShare ist ein Scribd-Unternehmen logo
1 von 61
Overview on P2P Principles Kalman Graffi DFG Research Group QuaP2P Technische Universität Darmstadt
Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Motivation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Peer-to-Peer  Properties ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Overlay Connection Service Delivery
Overlay Networks Picture adapted from Traversat, et.al  Project JXTA virtual network ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],TCP/IP TCP/IP TCP/IP Peers Overlay Network Underlay Networks
Overlay Networks: Properties ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Structured and Unstructured P2P Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1st Generation 2nd Generation 3rd Generation Unstructured P2P : Centralized from R.Schollmeier and J.Eberspächer, TU München DHT-Based Pure P2P Hybrid P2P Centralized P2P 1. Any terminal entity  can be removed without loss of functionality 2. No central entities, fully distributed 3. “Fixed” connections in the overlay network 4.Search costs: O(log n) 5.Costs for state: O(log n) 6.For: Lookup ,[object Object],[object Object],[object Object],[object Object],[object Object],1.Any terminal entity can be removed with- out loss of functionality 2. No central entities, fully distributed 3.Search costs: O(n) 4.Costs for state: O(1) 5.For: Searches 1.Central entity is  necessary to provide the service 2.Central entity is some kind of index database 3.Search costs: O(1) 4.Costs for state: O(n) 5.For: Searches Structured P2P Unstructured P2P
[object Object],[object Object],Unstructured Centralized P2P Systems ,[object Object],[object Object],[object Object],[object Object],2. Send Query for desired object 3. P2P com-munication. Get  Contents 1.  Publish  contents at own peer, tell server ?
Unstructured Centralized P2P Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1st Generation 2nd Generation 3rd Generation Unstructured P2P : Pure / Distributed from R.Schollmeier and J.Eberspächer, TU München DHT-Based Pure P2P Hybrid P2P Centralized P2P 1. Any terminal entity  can be removed without loss of functionality 2. No central entities, fully distributed 3. “Fixed” connections in the overlay network 4.Search costs: O(log n) 5.Costs for state: O(log n) 6.For: Lookup ,[object Object],[object Object],[object Object],[object Object],[object Object],1.Any terminal entity can be removed with- out loss of functionality 2. No central entities, fully distributed 3.Search costs: O(n) 4.Costs for state: O(1) 5.For: Searches 1.Central entity is  necessary to provide the service 2.Central entity is some kind of index database 3.Search costs: O(1) 4.Costs for state: O(n) 5.For: Searches Structured P2P Unstructured P2P
Unstructured Distributed P2P Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Unstructured Distributed P2P Systems ,[object Object],[object Object],[object Object],[object Object],Overlay Network Service delivery ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],Unstructured Distributed P2P Example 2.  Search  desired object 3. P2P com-munication. Get  Contents ,[object Object],[object Object],[object Object],[object Object],1.  Publish  contents at own peer ?
Properties of Distributed P2P Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1st Generation 2nd Generation 3rd Generation Unstructured Hybrid P2P Systems from R.Schollmeier and J.Eberspächer, TU München DHT-Based Pure P2P Hybrid P2P Centralized P2P 1. Any terminal entity  can be removed without loss of functionality 2. No central entities, fully distributed 3. “Fixed” connections in the overlay network 4.Search costs: O(log n) 5.Costs for state: O(log n) 6.For: Lookup ,[object Object],[object Object],[object Object],[object Object],[object Object],1.Any terminal entity can be removed with- out loss of functionality 2. No central entities, fully distributed 3.Search costs: O(n) 4.Costs for state: O(1) 5.For: Searches 1.Central entity is  necessary to provide the service 2.Central entity is some kind of index database 3.Search costs: O(1) 4.Costs for state: O(n) 5.For: Searches Structured P2P Unstructured P2P
Unstructured Hybrid P2P Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Unstructured Hybrid P2P Systems Example: Gnutella 0.6 from R.Schollmeier and J.Eberspächer, TU München
1st Generation 2nd Generation 3rd Generation Structured DHT-based P2P Systems from R.Schollmeier and J.Eberspächer, TU München DHT-Based Pure P2P Hybrid P2P Centralized P2P 1. Any terminal entity  can be removed without loss of functionality 2. No central entities, fully distributed 3. “Fixed” connections in the overlay network 4.Search costs: O(log n) 5.Costs for state: O(log n) 6.For: Lookup ,[object Object],[object Object],[object Object],[object Object],[object Object],1.Any terminal entity can be removed with- out loss of functionality 2. No central entities, fully distributed 3.Search costs: O(n) 4.Costs for state: O(1) 5.For: Searches 1.Central entity is  necessary to provide the service 2.Central entity is some kind of index database 3.Search costs: O(1) 4.Costs for state: O(n) 5.For: Searches Structured P2P Unstructured P2P
Distributed Hash Table: Steps of Operation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],Structured Overlay Networks: Example 3. P2P com-munication. Get  link to object. 2. “Routing” to /  Lookup  of desired Object ,[object Object],[object Object],[object Object],[object Object],1.  Publish  link at responsible Peer ?
Chord: Network Topology ,[object Object],[object Object],[object Object],Circular Key Space Link to ring successor 2207 2012-2207 2906 2683-2906 3485 2907-3485 2011 1623-2011 1622 1009-1622 1008 710-1008 709 660-709 659 612-659 2682 2208-2682 611 3486-4095 0-611 ,[object Object],[object Object],[object Object],Fingers poin to peers with ObjectIDs increasing ex-ponentially. Here: 709 + 2 k = …, 965, 1221, 1733, 2757 2207 2012-2207 2906 2683-2906 3485 2907-3485 2011 1623-2011 1622 1009-1622 1008 710-1008 709 660-709 659 612-659 2682 2208-2682 611 3486-4095 0-611
Chord: Addressing Content ,[object Object],[object Object],[object Object],Node 1008 queries item 3000 Use Fingers to locate  the destination faster Without fingers: no shortcuts, walk the circle Responsible peer found 2207 2012-2207 2906 2683-2906 3485 2907-3485 2011 1623-2011 1622 1009-1622 1008 710-1008 709 660-709 659 612-659 2682 2208-2682 611 3486-… 0-611 2 Responsible for 1008 + 1024 3 1 Responsible for 2207 + 512 Responsible for 3000
Chord: Join Procedure ,[object Object],[object Object],[object Object],[object Object],Then: 2207 2012-2207 2906 2683-2906 3485 2907-3485 2011 1623-2011 1622 1290-1622 1008 710-1008 709 660-709 659 612-659 2682 2208-2682 611 3486-… 0-611 2a. Set new predecessor  2b. Redistribute indexing information (e.g. 1009-1289) 3. Update successor of predecessor 4. Build fingers Fingers of peer n pointing to peers responsible for ObjectID n + 2 k  thus, log(N) fingers are built. 1289 1009-1289 1. Set/contact successor
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions? ,[object Object],[object Object],?
Content Addressable Network (CAN) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 n2 n3 n4 n5 f1 f2 f3 f4 2-dimensional CAN ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],n1
CAN: New Peer Join ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 n1 n2 n3 n4 n5 f1 f2 f3 f4 2-dimensional CAN Figure modified from another presentation n6 P n6
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions? ,[object Object],[object Object],?
 
 
After this slide: slides in reserve
Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Requirements for Overlay Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Requirements for Overlay Networks: Trade-offs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Centralized P2P Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Central Server Overlay Network
Search in Centralized P2P Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],Central Server 3,4: Service Delivery P2P 1: Query server 2: Server answers
Step 1: Addressing in Distributed Hash Tables ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The content of this slide has been adapted from “Peer-to-Peer Systems and Applications”, ed. By Steinmetz, Wehrle H(Node Y)=3485 3485 - 610 1622 - 2010 611 - 709 2011 - 2206 2207- 2905 (3485 - 610) 2906 - 3484 1008 - 1621 Y X 2 m -1 0 Often, the address  space is viewed as  a circle. Data item “D”: H(“D”)=3107 H(Node X)=2906
Step 2: Association of Address Space with Nodes ,[object Object],[object Object],[object Object],[object Object],[object Object],The content of this slide has been adapted from “Peer-to-Peer Systems and Applications”, ed. By Steinmetz, Wehrle Node 3485 is responsible for data items in range 2907 to 3485  (in case of a Chord-DHT) Logical view of the  Distributed Hash Table Mapping on the  real topology 2207 2906 3485 2011 1622 1008 709 611
Step 3: Locating a Data Item ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The content of this slide has been adapted from “Peer-to-Peer Systems and Applications”, ed. By Steinmetz, Wehrle
Step 4: Routing to a Data Item ,[object Object],[object Object],[object Object],( 3107, (ip, port) ) Value  = pointer to location of data Key  = H(“ my data ”) Node 3485 manages  keys 2907-3485,  Initial node (arbitrary) H(„ my data “) = 3107 2207 2906 3485 2011 1622 1008 709 611 ? The content of this slide has been adapted from “Peer-to-Peer Systems and Applications”, ed. By Steinmetz, Wehrle
Step 5: Data Retrieval – Usage of located Resource ,[object Object],[object Object],[object Object],H(„ my data “) = 3107 2207 2906 3485 2011 1622 1008 709 611 ? Get_Data(ip, port) Node 3485 sends  (3107, (ip/port)) to requester In case of indirect storage: After knowing the actual  Location, data is requested The content of this slide has been adapted from “Peer-to-Peer Systems and Applications”, ed. By Steinmetz, Wehrle
(Step 6) Where is the Data located? ,[object Object],[object Object],[object Object],D D 134.2.11.68 2207 2906 3485 2011 1622 1008 709 611 H SHA-1 („D“)=3107 D 2207 2906 3485 2011 1622 1008 709 611 H SHA-1 („D“)=3107 Item D: 134.2.11.68 D 134.2.11.68
Distributed Hash Table: Insert and Delete a Node ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2207 2906 3485 2011 1622 1008 709 611 ID: 3485 134.2.11.68    The content of this slide has been adapted from “Peer-to-Peer Systems and Applications”, edt. By Steinmetz, Wehrle
Node Failure and Node Departure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The content of this slide has been adapted from “Peer-to-Peer Systems and Applications”, edt. By Steinmetz, Wehrle
Summary of DHTs: Properties ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3.6
Chord: Join Procedure (1) ,[object Object],New Peer 1289 1. Contact a member  of the ring 2. Route the query  in the ring 3. Provide new  peer’s successor 2207 2012-2207 2906 2683-2906 3485 2907-3485 2011 1623-2011 1622 1009-1622 1008 710-1008 709 660-709 659 612-659 2682 2208-2682 611 3486-… 0-611
CAN: New Peer Join ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],P n6 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 n1 n2 n3 n4 n5 f1 f2 f3 f4
CAN: Routing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 n1 n2 n3 n4 n5 f2 f4 f3 f6 ,[object Object],[object Object],Abut = direkt angrenzen f5 f1
CAN: New Peer Join ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],P n6 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 n1 n2 n3 n4 n5 f1 f2 f3 f4
Kademlia ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3.9
Kademlia: System Description ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Kademlia: Lookup Operation ,[object Object],[object Object],[object Object],[object Object],[object Object],1 2 3
Communication Networks II Peer-To-Peer Networking Note: many Images were taken and adapted from contribution at the book “P2P Systems and Applications” Ed. Steinmetz, Wehrle H(„ my data “) = 3107 2207 7.31.10.25 peer-to-peer.info 12.5.7.31 95.7.6.10 86.8.10.18 planet-lab.org berkeley.edu 2906 3485 2011 1622 1008 709 611 61.51.166.150 ?
Structured Overlay Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],3. P2P com-munication. Get  Contents 2. “Routing” to /  Lookup  of desired Object 1.  Publish  contents at responsible Peer
Structured Overlay Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],3. P2P com-munication. Get  Contents 2. “Routing” to /  Lookup  of desired Object 1.  Publish  contents at responsible Peer
Structured Overlay Networks ,[object Object],[object Object],[object Object],[object Object],[object Object]
Unstructured centralized P2P networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Node  A Server  S “ A  stores  D ” Node  B The content of this slide has been adapted from “Peer-to-Peer Systems and Applications”, edt. By Steinmetz, Wehrle Transmission: D    Node B    “ Where is  D  ?”    “ A  stores  D ”    “ A  stores  D ” 
Unstructured distributed P2P networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The content of this slide has been adapted from “Peer-to-Peer Systems and Applications”, edt. By Steinmetz, Wehrle & Transmission: D    Node B “ I have  D  ?”    “ B  searches  D ” Node  A Node  B “ I   store  D ”              

Weitere ähnliche Inhalte

Was ist angesagt?

Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networkingicanhasfay
 
Peer-to-Peer Systems
Peer-to-Peer SystemsPeer-to-Peer Systems
Peer-to-Peer SystemsUwe Schmidt
 
Peer To Peer Protocols
Peer To Peer ProtocolsPeer To Peer Protocols
Peer To Peer Protocolsanishgoel
 
P2P Seminar
P2P SeminarP2P Seminar
P2P SeminarCoRehab
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Introduction To Computer Networks
Introduction To Computer Networks Introduction To Computer Networks
Introduction To Computer Networks AfsanaAkterRubi
 
Computer networks : intro to networking, pros and cons, uses, network edges :...
Computer networks : intro to networking, pros and cons, uses, network edges :...Computer networks : intro to networking, pros and cons, uses, network edges :...
Computer networks : intro to networking, pros and cons, uses, network edges :...Kaushik Panta
 

Was ist angesagt? (20)

Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 
Peer-to-Peer Systems
Peer-to-Peer SystemsPeer-to-Peer Systems
Peer-to-Peer Systems
 
Peer To Peer Protocols
Peer To Peer ProtocolsPeer To Peer Protocols
Peer To Peer Protocols
 
P2P Seminar
P2P SeminarP2P Seminar
P2P Seminar
 
Peer Sim & P2P
Peer Sim & P2PPeer Sim & P2P
Peer Sim & P2P
 
Final peersimp pt
Final peersimp ptFinal peersimp pt
Final peersimp pt
 
Network Topologies in Simple (Logical, Physical and Types)
Network Topologies in Simple (Logical, Physical and Types)Network Topologies in Simple (Logical, Physical and Types)
Network Topologies in Simple (Logical, Physical and Types)
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Introduction To Computer Networks
Introduction To Computer Networks Introduction To Computer Networks
Introduction To Computer Networks
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basic
 
Network Topology
Network Topology Network Topology
Network Topology
 
Computer networks : intro to networking, pros and cons, uses, network edges :...
Computer networks : intro to networking, pros and cons, uses, network edges :...Computer networks : intro to networking, pros and cons, uses, network edges :...
Computer networks : intro to networking, pros and cons, uses, network edges :...
 
Basic of Networking
Basic of NetworkingBasic of Networking
Basic of Networking
 
Overlay network
Overlay networkOverlay network
Overlay network
 
Information Networks - (Covered all the Important Topics)
Information Networks - (Covered all the Important Topics) Information Networks - (Covered all the Important Topics)
Information Networks - (Covered all the Important Topics)
 
Open Systems Interconnection
Open Systems InterconnectionOpen Systems Interconnection
Open Systems Interconnection
 
Computer networking 1
Computer networking 1Computer networking 1
Computer networking 1
 
Computer network basics
Computer network basicsComputer network basics
Computer network basics
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 

Andere mochten auch

Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Venkatesh Iyer
 
Content addressable network(can)
Content addressable network(can)Content addressable network(can)
Content addressable network(can)Amit Dahal
 
IEEE P2P 2009 - Kalman Graffi - Monitoring and Management of Structured Peer-...
IEEE P2P 2009 - Kalman Graffi - Monitoring and Management of Structured Peer-...IEEE P2P 2009 - Kalman Graffi - Monitoring and Management of Structured Peer-...
IEEE P2P 2009 - Kalman Graffi - Monitoring and Management of Structured Peer-...Kalman Graffi
 
CS4344 Lecture 6: Interest Management in P2P Architecture
CS4344 Lecture 6: Interest Management in P2P ArchitectureCS4344 Lecture 6: Interest Management in P2P Architecture
CS4344 Lecture 6: Interest Management in P2P ArchitectureWei Tsang Ooi
 
Effective Web Application Development with Apache Sling
Effective Web Application Development with Apache SlingEffective Web Application Development with Apache Sling
Effective Web Application Development with Apache SlingRobert Munteanu
 
Overlay networks ppt
Overlay networks pptOverlay networks ppt
Overlay networks pptAkshay Hegde
 
Synchronization in distributed systems
Synchronization in distributed systems Synchronization in distributed systems
Synchronization in distributed systems SHATHAN
 

Andere mochten auch (12)

P2P Supernodes
P2P SupernodesP2P Supernodes
P2P Supernodes
 
Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks
 
Webtuesday Zurich
Webtuesday ZurichWebtuesday Zurich
Webtuesday Zurich
 
Content addressable network(can)
Content addressable network(can)Content addressable network(can)
Content addressable network(can)
 
IEEE P2P 2009 - Kalman Graffi - Monitoring and Management of Structured Peer-...
IEEE P2P 2009 - Kalman Graffi - Monitoring and Management of Structured Peer-...IEEE P2P 2009 - Kalman Graffi - Monitoring and Management of Structured Peer-...
IEEE P2P 2009 - Kalman Graffi - Monitoring and Management of Structured Peer-...
 
Peer to peer
Peer to peerPeer to peer
Peer to peer
 
CS4344 Lecture 6: Interest Management in P2P Architecture
CS4344 Lecture 6: Interest Management in P2P ArchitectureCS4344 Lecture 6: Interest Management in P2P Architecture
CS4344 Lecture 6: Interest Management in P2P Architecture
 
Effective Web Application Development with Apache Sling
Effective Web Application Development with Apache SlingEffective Web Application Development with Apache Sling
Effective Web Application Development with Apache Sling
 
Overlay networks ppt
Overlay networks pptOverlay networks ppt
Overlay networks ppt
 
Peer to peer system
Peer to peer systemPeer to peer system
Peer to peer system
 
Synchronization in distributed systems
Synchronization in distributed systems Synchronization in distributed systems
Synchronization in distributed systems
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 

Ähnlich wie QuaP2P P2P Tutorial 2006

Peer to peer data management
Peer to peer data managementPeer to peer data management
Peer to peer data managementJunaid Lodhi
 
IEEE ISM 2008: Kalman Graffi: A Distributed Platform for Multimedia Communities
IEEE ISM 2008: Kalman Graffi: A Distributed Platform for Multimedia CommunitiesIEEE ISM 2008: Kalman Graffi: A Distributed Platform for Multimedia Communities
IEEE ISM 2008: Kalman Graffi: A Distributed Platform for Multimedia CommunitiesKalman Graffi
 
Textual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networksTextual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networksUvaraj Shan
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
Flexible bloom for searching textual content
Flexible bloom for searching textual contentFlexible bloom for searching textual content
Flexible bloom for searching textual contentUvaraj Shan
 
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...Uvaraj Shan
 
Flexible bloom for searching textual content
Flexible bloom for searching textual contentFlexible bloom for searching textual content
Flexible bloom for searching textual contentUvaraj Shan
 
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATIONSECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATIONIJNSA Journal
 
Agents and P2P Networks
Agents and P2P NetworksAgents and P2P Networks
Agents and P2P NetworksJames Salter
 
02 - Topologies of Distributed Systems
02 - Topologies of Distributed Systems02 - Topologies of Distributed Systems
02 - Topologies of Distributed SystemsDilum Bandara
 
Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks IJECEIAES
 
Peer to peer Paradigms
Peer to peer ParadigmsPeer to peer Paradigms
Peer to peer Paradigmshassan ahmed
 
App for peer-to-peer file transfer
App for peer-to-peer file transferApp for peer-to-peer file transfer
App for peer-to-peer file transferIRJET Journal
 
Network Measurement and Monitori - Assigment 1, Group3, "Classification"
Network Measurement and Monitori - Assigment 1, Group3, "Classification"Network Measurement and Monitori - Assigment 1, Group3, "Classification"
Network Measurement and Monitori - Assigment 1, Group3, "Classification"Valentin Thirion
 
Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptxHananShk
 
Ccna exploration exams
Ccna exploration examsCcna exploration exams
Ccna exploration examsHossam Zein
 
A secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
A secure protocol for Spontaneous Wireless Ad Hoc Networks CreationA secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
A secure protocol for Spontaneous Wireless Ad Hoc Networks CreationSahil Bajaj
 

Ähnlich wie QuaP2P P2P Tutorial 2006 (20)

Peer to peer data management
Peer to peer data managementPeer to peer data management
Peer to peer data management
 
Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
 
IEEE ISM 2008: Kalman Graffi: A Distributed Platform for Multimedia Communities
IEEE ISM 2008: Kalman Graffi: A Distributed Platform for Multimedia CommunitiesIEEE ISM 2008: Kalman Graffi: A Distributed Platform for Multimedia Communities
IEEE ISM 2008: Kalman Graffi: A Distributed Platform for Multimedia Communities
 
Textual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networksTextual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networks
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
Flexible bloom for searching textual content
Flexible bloom for searching textual contentFlexible bloom for searching textual content
Flexible bloom for searching textual content
 
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
 
Flexible bloom for searching textual content
Flexible bloom for searching textual contentFlexible bloom for searching textual content
Flexible bloom for searching textual content
 
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATIONSECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
 
Agents and P2P Networks
Agents and P2P NetworksAgents and P2P Networks
Agents and P2P Networks
 
02 - Topologies of Distributed Systems
02 - Topologies of Distributed Systems02 - Topologies of Distributed Systems
02 - Topologies of Distributed Systems
 
Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks
 
Peer to peer Paradigms
Peer to peer ParadigmsPeer to peer Paradigms
Peer to peer Paradigms
 
App for peer-to-peer file transfer
App for peer-to-peer file transferApp for peer-to-peer file transfer
App for peer-to-peer file transfer
 
Network Measurement and Monitori - Assigment 1, Group3, "Classification"
Network Measurement and Monitori - Assigment 1, Group3, "Classification"Network Measurement and Monitori - Assigment 1, Group3, "Classification"
Network Measurement and Monitori - Assigment 1, Group3, "Classification"
 
Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptx
 
Networking lecture1
Networking lecture1Networking lecture1
Networking lecture1
 
Bittorrent in a P2P social network
Bittorrent in a P2P social networkBittorrent in a P2P social network
Bittorrent in a P2P social network
 
Ccna exploration exams
Ccna exploration examsCcna exploration exams
Ccna exploration exams
 
A secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
A secure protocol for Spontaneous Wireless Ad Hoc Networks CreationA secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
A secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
 

Mehr von Kalman Graffi

IEEE CRS 2014 - Secure Distributed Data Structures for Peer-to-Peer-based Soc...
IEEE CRS 2014 - Secure Distributed Data Structures for Peer-to-Peer-based Soc...IEEE CRS 2014 - Secure Distributed Data Structures for Peer-to-Peer-based Soc...
IEEE CRS 2014 - Secure Distributed Data Structures for Peer-to-Peer-based Soc...Kalman Graffi
 
LibreSocial - P2P Framework for Social Networks - Overview
LibreSocial - P2P Framework for Social Networks - OverviewLibreSocial - P2P Framework for Social Networks - Overview
LibreSocial - P2P Framework for Social Networks - OverviewKalman Graffi
 
IEEE P2P 2013 - Bootstrapping Skynet: Calibration and Autonomic Self-Control ...
IEEE P2P 2013 - Bootstrapping Skynet: Calibration and Autonomic Self-Control ...IEEE P2P 2013 - Bootstrapping Skynet: Calibration and Autonomic Self-Control ...
IEEE P2P 2013 - Bootstrapping Skynet: Calibration and Autonomic Self-Control ...Kalman Graffi
 
IEEE ICCCN 2013 - Continuous Gossip-based Aggregation through Dynamic Informa...
IEEE ICCCN 2013 - Continuous Gossip-based Aggregation through Dynamic Informa...IEEE ICCCN 2013 - Continuous Gossip-based Aggregation through Dynamic Informa...
IEEE ICCCN 2013 - Continuous Gossip-based Aggregation through Dynamic Informa...Kalman Graffi
 
IEEE ICC 2013 - Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case
IEEE ICC 2013 - Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia CaseIEEE ICC 2013 - Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case
IEEE ICC 2013 - Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia CaseKalman Graffi
 
IEEE HPCS 2013 - Comparative Evaluation of Peer-to-Peer Systems Using Peerfac...
IEEE HPCS 2013 - Comparative Evaluation of Peer-to-Peer Systems Using Peerfac...IEEE HPCS 2013 - Comparative Evaluation of Peer-to-Peer Systems Using Peerfac...
IEEE HPCS 2013 - Comparative Evaluation of Peer-to-Peer Systems Using Peerfac...Kalman Graffi
 
Kalman Graffi - IEEE NetSys 2013 - Ca-Re-Chord - A Churn Resistant Self-stabi...
Kalman Graffi - IEEE NetSys 2013 - Ca-Re-Chord - A Churn Resistant Self-stabi...Kalman Graffi - IEEE NetSys 2013 - Ca-Re-Chord - A Churn Resistant Self-stabi...
Kalman Graffi - IEEE NetSys 2013 - Ca-Re-Chord - A Churn Resistant Self-stabi...Kalman Graffi
 
Kalman Graffi - IEEE NetSys 2013 - Adding Capacity-Aware Storage Indirection ...
Kalman Graffi - IEEE NetSys 2013 - Adding Capacity-Aware Storage Indirection ...Kalman Graffi - IEEE NetSys 2013 - Adding Capacity-Aware Storage Indirection ...
Kalman Graffi - IEEE NetSys 2013 - Adding Capacity-Aware Storage Indirection ...Kalman Graffi
 
Kalman Graffi - IEEE ICC 2013 - Symbiotic Coupling of Peer-to-Peer and Cloud ...
Kalman Graffi - IEEE ICC 2013 - Symbiotic Coupling of Peer-to-Peer and Cloud ...Kalman Graffi - IEEE ICC 2013 - Symbiotic Coupling of Peer-to-Peer and Cloud ...
Kalman Graffi - IEEE ICC 2013 - Symbiotic Coupling of Peer-to-Peer and Cloud ...Kalman Graffi
 
Kalman Graffi - IEEE HPCS 2013 - Comparative Evaluation of P2P Systems Using ...
Kalman Graffi - IEEE HPCS 2013 - Comparative Evaluation of P2P Systems Using ...Kalman Graffi - IEEE HPCS 2013 - Comparative Evaluation of P2P Systems Using ...
Kalman Graffi - IEEE HPCS 2013 - Comparative Evaluation of P2P Systems Using ...Kalman Graffi
 
Kalman Graffi - Monitoring and Management of P2P Systems - 2010
Kalman Graffi - Monitoring and Management of P2P Systems - 2010Kalman Graffi - Monitoring and Management of P2P Systems - 2010
Kalman Graffi - Monitoring and Management of P2P Systems - 2010Kalman Graffi
 
IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...
IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...
IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...Kalman Graffi
 
Kalman Graffi - 15 Slide on Monitoring P2P Systems - 2010
Kalman Graffi - 15 Slide on Monitoring P2P Systems - 2010Kalman Graffi - 15 Slide on Monitoring P2P Systems - 2010
Kalman Graffi - 15 Slide on Monitoring P2P Systems - 2010Kalman Graffi
 
QuaP2P Lunchtalk on Online Social Networks 2010 - LifeSocial
QuaP2P Lunchtalk on Online Social Networks 2010 - LifeSocialQuaP2P Lunchtalk on Online Social Networks 2010 - LifeSocial
QuaP2P Lunchtalk on Online Social Networks 2010 - LifeSocialKalman Graffi
 
LifeSocial - A P2P-Platform for Secure Online Social Networks
LifeSocial - A P2P-Platform for Secure Online Social NetworksLifeSocial - A P2P-Platform for Secure Online Social Networks
LifeSocial - A P2P-Platform for Secure Online Social NetworksKalman Graffi
 
Dagstuhl 2010 - Kalman Graffi - Alternative, more promising IT Paradigms for ...
Dagstuhl 2010 - Kalman Graffi - Alternative, more promising IT Paradigms for ...Dagstuhl 2010 - Kalman Graffi - Alternative, more promising IT Paradigms for ...
Dagstuhl 2010 - Kalman Graffi - Alternative, more promising IT Paradigms for ...Kalman Graffi
 
Kalman Graffi - 10 Slide - 2010
Kalman Graffi - 10 Slide - 2010Kalman Graffi - 10 Slide - 2010
Kalman Graffi - 10 Slide - 2010Kalman Graffi
 
Kalman Graffi - 1 Slide - 2010
Kalman Graffi - 1 Slide - 2010Kalman Graffi - 1 Slide - 2010
Kalman Graffi - 1 Slide - 2010Kalman Graffi
 
Kalman Graffi - Sichere Digitale Soziale Netzwerke – Eine Chance für E-Learni...
Kalman Graffi - Sichere Digitale Soziale Netzwerke – Eine Chance für E-Learni...Kalman Graffi - Sichere Digitale Soziale Netzwerke – Eine Chance für E-Learni...
Kalman Graffi - Sichere Digitale Soziale Netzwerke – Eine Chance für E-Learni...Kalman Graffi
 
Kalman Graffi - 3rd Research Talk - 2010
Kalman Graffi - 3rd Research Talk - 2010Kalman Graffi - 3rd Research Talk - 2010
Kalman Graffi - 3rd Research Talk - 2010Kalman Graffi
 

Mehr von Kalman Graffi (20)

IEEE CRS 2014 - Secure Distributed Data Structures for Peer-to-Peer-based Soc...
IEEE CRS 2014 - Secure Distributed Data Structures for Peer-to-Peer-based Soc...IEEE CRS 2014 - Secure Distributed Data Structures for Peer-to-Peer-based Soc...
IEEE CRS 2014 - Secure Distributed Data Structures for Peer-to-Peer-based Soc...
 
LibreSocial - P2P Framework for Social Networks - Overview
LibreSocial - P2P Framework for Social Networks - OverviewLibreSocial - P2P Framework for Social Networks - Overview
LibreSocial - P2P Framework for Social Networks - Overview
 
IEEE P2P 2013 - Bootstrapping Skynet: Calibration and Autonomic Self-Control ...
IEEE P2P 2013 - Bootstrapping Skynet: Calibration and Autonomic Self-Control ...IEEE P2P 2013 - Bootstrapping Skynet: Calibration and Autonomic Self-Control ...
IEEE P2P 2013 - Bootstrapping Skynet: Calibration and Autonomic Self-Control ...
 
IEEE ICCCN 2013 - Continuous Gossip-based Aggregation through Dynamic Informa...
IEEE ICCCN 2013 - Continuous Gossip-based Aggregation through Dynamic Informa...IEEE ICCCN 2013 - Continuous Gossip-based Aggregation through Dynamic Informa...
IEEE ICCCN 2013 - Continuous Gossip-based Aggregation through Dynamic Informa...
 
IEEE ICC 2013 - Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case
IEEE ICC 2013 - Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia CaseIEEE ICC 2013 - Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case
IEEE ICC 2013 - Symbiotic Coupling of P2P and Cloud Systems: The Wikipedia Case
 
IEEE HPCS 2013 - Comparative Evaluation of Peer-to-Peer Systems Using Peerfac...
IEEE HPCS 2013 - Comparative Evaluation of Peer-to-Peer Systems Using Peerfac...IEEE HPCS 2013 - Comparative Evaluation of Peer-to-Peer Systems Using Peerfac...
IEEE HPCS 2013 - Comparative Evaluation of Peer-to-Peer Systems Using Peerfac...
 
Kalman Graffi - IEEE NetSys 2013 - Ca-Re-Chord - A Churn Resistant Self-stabi...
Kalman Graffi - IEEE NetSys 2013 - Ca-Re-Chord - A Churn Resistant Self-stabi...Kalman Graffi - IEEE NetSys 2013 - Ca-Re-Chord - A Churn Resistant Self-stabi...
Kalman Graffi - IEEE NetSys 2013 - Ca-Re-Chord - A Churn Resistant Self-stabi...
 
Kalman Graffi - IEEE NetSys 2013 - Adding Capacity-Aware Storage Indirection ...
Kalman Graffi - IEEE NetSys 2013 - Adding Capacity-Aware Storage Indirection ...Kalman Graffi - IEEE NetSys 2013 - Adding Capacity-Aware Storage Indirection ...
Kalman Graffi - IEEE NetSys 2013 - Adding Capacity-Aware Storage Indirection ...
 
Kalman Graffi - IEEE ICC 2013 - Symbiotic Coupling of Peer-to-Peer and Cloud ...
Kalman Graffi - IEEE ICC 2013 - Symbiotic Coupling of Peer-to-Peer and Cloud ...Kalman Graffi - IEEE ICC 2013 - Symbiotic Coupling of Peer-to-Peer and Cloud ...
Kalman Graffi - IEEE ICC 2013 - Symbiotic Coupling of Peer-to-Peer and Cloud ...
 
Kalman Graffi - IEEE HPCS 2013 - Comparative Evaluation of P2P Systems Using ...
Kalman Graffi - IEEE HPCS 2013 - Comparative Evaluation of P2P Systems Using ...Kalman Graffi - IEEE HPCS 2013 - Comparative Evaluation of P2P Systems Using ...
Kalman Graffi - IEEE HPCS 2013 - Comparative Evaluation of P2P Systems Using ...
 
Kalman Graffi - Monitoring and Management of P2P Systems - 2010
Kalman Graffi - Monitoring and Management of P2P Systems - 2010Kalman Graffi - Monitoring and Management of P2P Systems - 2010
Kalman Graffi - Monitoring and Management of P2P Systems - 2010
 
IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...
IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...
IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...
 
Kalman Graffi - 15 Slide on Monitoring P2P Systems - 2010
Kalman Graffi - 15 Slide on Monitoring P2P Systems - 2010Kalman Graffi - 15 Slide on Monitoring P2P Systems - 2010
Kalman Graffi - 15 Slide on Monitoring P2P Systems - 2010
 
QuaP2P Lunchtalk on Online Social Networks 2010 - LifeSocial
QuaP2P Lunchtalk on Online Social Networks 2010 - LifeSocialQuaP2P Lunchtalk on Online Social Networks 2010 - LifeSocial
QuaP2P Lunchtalk on Online Social Networks 2010 - LifeSocial
 
LifeSocial - A P2P-Platform for Secure Online Social Networks
LifeSocial - A P2P-Platform for Secure Online Social NetworksLifeSocial - A P2P-Platform for Secure Online Social Networks
LifeSocial - A P2P-Platform for Secure Online Social Networks
 
Dagstuhl 2010 - Kalman Graffi - Alternative, more promising IT Paradigms for ...
Dagstuhl 2010 - Kalman Graffi - Alternative, more promising IT Paradigms for ...Dagstuhl 2010 - Kalman Graffi - Alternative, more promising IT Paradigms for ...
Dagstuhl 2010 - Kalman Graffi - Alternative, more promising IT Paradigms for ...
 
Kalman Graffi - 10 Slide - 2010
Kalman Graffi - 10 Slide - 2010Kalman Graffi - 10 Slide - 2010
Kalman Graffi - 10 Slide - 2010
 
Kalman Graffi - 1 Slide - 2010
Kalman Graffi - 1 Slide - 2010Kalman Graffi - 1 Slide - 2010
Kalman Graffi - 1 Slide - 2010
 
Kalman Graffi - Sichere Digitale Soziale Netzwerke – Eine Chance für E-Learni...
Kalman Graffi - Sichere Digitale Soziale Netzwerke – Eine Chance für E-Learni...Kalman Graffi - Sichere Digitale Soziale Netzwerke – Eine Chance für E-Learni...
Kalman Graffi - Sichere Digitale Soziale Netzwerke – Eine Chance für E-Learni...
 
Kalman Graffi - 3rd Research Talk - 2010
Kalman Graffi - 3rd Research Talk - 2010Kalman Graffi - 3rd Research Talk - 2010
Kalman Graffi - 3rd Research Talk - 2010
 

QuaP2P P2P Tutorial 2006

  • 1. Overview on P2P Principles Kalman Graffi DFG Research Group QuaP2P Technische Universität Darmstadt
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Unstructured Hybrid P2P Systems Example: Gnutella 0.6 from R.Schollmeier and J.Eberspächer, TU München
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.  
  • 33.  
  • 34. After this slide: slides in reserve
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56. Communication Networks II Peer-To-Peer Networking Note: many Images were taken and adapted from contribution at the book “P2P Systems and Applications” Ed. Steinmetz, Wehrle H(„ my data “) = 3107 2207 7.31.10.25 peer-to-peer.info 12.5.7.31 95.7.6.10 86.8.10.18 planet-lab.org berkeley.edu 2906 3485 2011 1622 1008 709 611 61.51.166.150 ?
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.

Hinweis der Redaktion

  1. Nicht standard protokoll, es ist das bekannteste in der Lehre Am einfachsten zum erklären. Kommt in freier Wildbahn aber kaum vor. Am häufigsten zitiert.
  2. It has been observed by many measurement studies (e.g. Tran-Gia, Saroiu, etc.) that the rate at which peers join and leave the P2P systems is very high. This raises additional concerns, especially in cases where peers are assigned particular responsibilities and the connectivity of the overlay is not high enough to ensure that no partitioning of the system will take place. Overlay network design should not ignore the heterogeneity in node capabilities and behavior. Designing schemes that require homogenous components can either decrease the system capabilities to those achievable by the weakest components, or faulty/inefficient operation should be expected from the least capable nodes. Moreover, the observed variation in node behavior (e.g. up-time patterns) should be taken into account in the design of the overlay to increase the efficiency of the systems. Load-balance is the extent to which the load is evenly spread across nodes. The accounted load consists of the effort required for the basic overlay operations, e.g. maintenance, routing, indexing, caching, etc. Designing an overlay that avoids communication hot spots can increase the performance and the fault-tolerance of the overall system. On the other hand, by taking into account the heterogeneous environment , not all of the nodes are capable of offering the same amount of resources. A fair solution on the offered services should provide the incentives and the weighted balance between the resource contribution and the consumed overlay services. Security is the ability of a system to manage, protect and distribute sensitive information. In the context of P2P overlays security issues are basically raised by the presence of malicious peers , which do not forward or forward in the wrong direction received search requests . Additionally, selfish peers can behave in a way that could have similar results. Anonymity is the degree to which a system or component allows for (or supports) anonymous transactions. This is a special requirement for certain applications that require anti-censorship features or increase d privacy for the participating users. Of course misusage of those systems is always an issue (e.g. can be used to share illegal or inappropriate content) . (Introduce next slide) Meeting the complete set of the aforementioned requirements is not a trivial task. A number of trade-offs appear while designing P2P search services.
  3. A trade-off which is common both in distributed and local search (although different techniques apply for each case) is the one between the time required to find the requested information versus the space that is required to store the information. In the case of distributed systems, the communication among peers is the most costly operation with respect to time and we will mainly consider only the number of messages exchanged and not local search operations on data structures. An example of a technique that favors time over space is the complete replication of the indexing information on every peer. No communication is required (at least for searching). An example of a technique that favors space over time is to assign every peer indexing responsibilities only for its local content. Every peer should contact every other peer to find all the information it searches (Gnutella approach). Another interesting trade-off appears between the request for security and privacy. Many security techniques require the logging of detailed information on the interactions among peers. This enables the easy tracing of peer‘s operations. On the other hand, the opposite effect appears in systems that provide anonymity on users‘ actions. More specifically for search operations, as it has already been mentioned, two main operations have been proposed: Looking for information that can be mapped in a simple key and searching for a set of results based on a more complex descripion. While the first approach can be very efficient in terms of workload and latency, the latter offers a more rich functionality. But in order to cover completely the matched items it comes at a high communication cost. In order to face the high communication cost, TTL-based solutions have been proposed to limit the network load. In that case, the overlay is not search exaustively and matching content will not be reported to the requestor. More advanced techniques can provide alternative trade-offs among these factors. P2P systems are supposed to be composed by autonomous entities. But for large scale systems this comes at a very high cost, either for search operations or the maintenance of the overlay. For this reason, alternatives have been proposed where hierarchical solutions introduced the concept of „super-peers“. Super-peers are peers with higher responsibilities that serve normal peers in certain aspects of the inter-peer collaboration. This introduces dependencies among the peers and can cause larger problems by (accidental or not) misbehavior of the super-peers. A different aspect on P2P algoritms is their reliability degree, which determines the additional operational overhead. This overhead can be required for example for the maintenance of the overlay structure that provides the degree of reliability. For example, deterministic maintenance algorithms require a very specific structure for the overlay. Althernatively, probabilistic approaches do not provide the same level of reliability, but they can provide a certain level on average at a much lower cost since they tolarate more overlay changes. (Introduce next slide) Until now we have described the environment, where the P2P search algorithms should operate, the general requirements and the introduced trade-offs. As a next step we will investigate the design dimensions of the most crucial component of a P2P system, the Overlay.
  4. (This slide contains animation)