Peer-To-Peer Networking I

Total Page:16

File Type:pdf, Size:1020Kb

Peer-To-Peer Networking I Overview – Part 1 1 Scope and Relevance of P2P in Distributed Systems and Networking 1.1 Motivation Advanced Topics www.httc.de 1.2 Evolution of Internet Computing Paradigms 1.3 Success of P2P Networking in Distributed Systems 1.4 P2P Application & Service Domains 2 Specification of Peer-to-Peer Peer-to-Peer, Part 1 www.kom.tu-darmstadt.de 2.1 An Early Definition of P2P 2.2 Nine Characteristics of “Pure” P2P Systems 2.3 P2P Networks are Overlay Networks 2.4 Overlay Structures 3 P2P Applications and Systems 3.1 P2P Applications and Systems: 1st Generation 3.2 P2P Applications and Systems: 2nd Generation Prof. Dr.-Ing. Ralf Steinmetz, Dr.-Ing. Oliver Heckmann 3.3 Some 2nd Generation Applications and Systems Beyond File Sharing 3.4 Some Applications and Systems: 3rd Generation TU Darmstadt – Technical University of Darmstadt Dept. of Electrical Engineering and Information Technology, Dept. of Computer Science 4 Properties of P2P Network Graphs KOM - Multimedia Communications Lab 4.1 Some Metrics Merckstr. 25, D-64283 Darmstadt, Germany, 4.2 Clustering {steinmetz, heckmann}@KOM.tu-darmstadt.de Tel.+49-6151-16-5188, Fax. +49-6151-16-6152 4.3 Average Path Length 4.4 Small World Phenomenon 4.5 Power Law Phenomenon 1 2 Scope and Relevance of P2P 1 Overview – Part 2 in Distributed Systems and Networking 5 Mechanisms for Unstructured P2P Networks 5.1 Broadcast P2P (Peer-2-Peer): A distributed systems and a 5.2 Expanding Ring communications paradigm 5.3 Random Walk www.httc.de www.httc.de 5.4 Bloom filters 6 Mechanisms for Structured P2P Networks 6.1 DHT Distributed Hash Tables Distributed systems definition (very general) 6.2 DHT: Usage "A distributed system is www.kom.tu-darmstadt.de www.kom.tu-darmstadt.de 6.3 Chord, a DHT Example 6.4 Pastry, a prefix-based DHT a collection of individual computing devices 6.5 Tapestry, a suffix-based DHT 6.6 Kademlia that can communicate with each other" 6.7 Content Addressable Network (CAN) 6.8 Semantics-based Search Techniques 6.9 Topology: a Summary Lecture focus: 7 Case Study: Omicron - a Hybrid Overlay Design • Systems with loosely-coupled, autonomous devices 7.1 Design Mechanisms: Overlay Structure 7.2 De Bruijn Networks • Devices have their own semi-independent agenda 7.3 Design Mechanisms: Clusters 7.4 Design Mechanisms: Roles • (At least) limited coordination and cooperation needed 8 Accounting for P2P Networks 8.1 Introduction and Overview 8.2 KOM Token-based Accounting System 9 GRID Computing 10 Research: Some Major Issues in P2P Networking 11 Annex: Some References 3 4 1.1 Motivation Motivation (2) www.httc.de www.httc.de www.kom.tu-darmstadt.de www.kom.tu-darmstadt.de freenet One of the newest buzzwords in networking is Peer-to-Peer (P2P) Is it only a hype? • initially 40 million Napster users in 2 years • integrated into commercial systems, e.g., Microsoft P2P SDK • Advanced Networking Pack for Windows XP, http://www.microsoft.com/windowsxp/p2p • open source, e.g., JXTA (Sun) with Protocols & Services • strong presence at international networking conferences 5 6 Above logos copied from the respective web page Motivation (3) Dominant P2P Applications P2P traffic is the major traffic source, since at least 2003 Sandvine Study 2003 Overall Internet traffic is more than ~50% P2P traffic • in Europe (France, Germany, ..) www.httc.de www.httc.de • predominant EDonkey/EMule e.g. France Telecom • in USA • see N.B. Azzouna & F. Guillemin • predominant KaZaA/Fastrack www.kom.tu-darmstadt.de www.kom.tu-darmstadt.de Analysis of ADSL traffic on an IP backbone link IEEE Globecom 2003 Today, • Bittorrent seems to be the most successful P2P • Results application HTTP: 14.6 % Edonkey: 37.5 % • KaZaA more and more irrelevant FTP: 2.1 % KaZaA: 7.8 % • eDonkey largely replaced by eMule (using an NNTP: 1.9 % Napster: 3.8 % extended but compatible protocol) Other: 31.8 % Gnutella: 0.3 % Sum P2P: 49.6% + large part of “Other” 7 8 1.2 Evolution of Internet Computing Paradigms Evolution of Internet Computing Paradigms (2) 1st generation (since the beginning of the Internet): 3rd generation (since 2000): • permanent IP addresses, always connected • more collaboration and personalized applications www.httc.de www.httc.de • static domain name system (DNS) mapping • powerful edge devices (peers), instant networking • limited specialized applications, protocols: Telnet, • protocols/applications: FTP, Gopher, .... • Napster, Gnutella www.kom.tu-darmstadt.de www.kom.tu-darmstadt.de Ö World Wide Access • Emule/Edonkey/MLDonkey, Fasttrack (KaZaA), Freenet, .. •Chord, … 2nd generation (since 90ties): Ö World Wide Peering P P • WWW & graphical browsers • dynamic IP addresses / NAT / firewalls • heterogeneous applications, asymmetric server based services P P P • protocol: HTTP, .. Ö World Wide Web P P P 9 10 1.3 Success of P2P Networking Success of P2P Networking (2) Some reasons for the success of P2P applications: New services at the edge of the network • P2P overlay networks make it relatively easy to deploy new Filesharing: highly attractive and cheap content services www.httc.de www.httc.de • users share their content with other users • Ö attractive content Group collaboration superior for business processes • copyrights are usually not respected (problem!) • grow organically, non-uniform and highly dynamic www.kom.tu-darmstadt.de www.kom.tu-darmstadt.de • Ö cheap content • largely manual, ad-hoc, iterative and document-intensive work • often distributed, not centralized Unused resources at the edges • no single person/organisation understands the entire process • assume e.g. a SME enterprise with 100 desktop computers: from beginning to end • storage space: 100 x 150 GB = 15 TB spare storage space • processing power: 100 x 2,5 GHz x 5 ops/cycle = 1,25 trillion Cost effectiveness ops/sec spare processing power • reduces centralized management resources • optimizes computing, storage and communication resources Publishing: exploding amount of data • rapid deployment • 2 x 10e+18 Bytes are produced per year • 3 x 10e+12 Bytes are published per year P2P applications/protocols tailored for user’s needs • search engines like Google only index 1.3x10e+8 websites • Napster’s success depended to a great amount on its ease of • see Gong: JXTA: A Network Programming Environment, use 11 IEEE Computing 2001 12 1.4 P2P Application & Service Domains P2P Application & Service Domains (2) File Sharing: music, video and other data Distributed Computing - GRID • Napster, Gnutella, FastTrack (KaZaA, ...), eDonkey, eMule, • P2P CPU cycle sharing www.httc.de www.httc.de BitTorrent, eXeem, etc. • GRID Computing, ..., distributed simulation • SETI@home: search for extraterrestrial intelligence Distributed Storage/Distributed Filesharing • Popular Power: former battle to the influenza virus www.kom.tu-darmstadt.de www.kom.tu-darmstadt.de • (Anonymous) Publication • Freenet, PAST, OceanStore, etc. Security and Reliability • Resilient Overlay Network (RON) Collaboration • Secure Overlay Services (SOS) • P2P groupware • Groove Application Layer Multicast • P2P content generation, • Narada • Online Games • P2P instant messaging 13 14 2 Specification of Peer-to-Peer 2.1 An Early Definition of P2P www.httc.de www.httc.de www.kom.tu-darmstadt.de www.kom.tu-darmstadt.de Definition of P2P Networking (C. Shirkey): • "Peer-to-peer (P2P) is a class of applications that takes advantage of resources - storage, cycles, human presence - available at the edges of the Internet. Because accessing these decentralized resources means operating in an environment of unstable connectivity and unpredictable IP addresses, peer- to peer nodes must operate outside the DNS and have significant or total autonomy from central servers” 15 16 An Early Definition of P2P (2) 2.2 Nine Characteristics of “Pure” P2P Systems www.httc.de www.httc.de www.kom.tu-darmstadt.de www.kom.tu-darmstadt.de Litmus test for a P2P application: 1.does it treat variable connectivity as the norm? • e.g. does it support dial-up users with variable IP addresses? 2.does it give the nodes at the edges of the network significant autonomy? • e.g. is storage / processing done by autonomous end-systems ÖIf answer to both is yes then the application is P2P otherwise not. (see Andy Oram: Peer-To-Peer / Harnessing the Power of Disruptive 17 Technologies, O’Reilly 2001) 18 Detailed Characteristics (1) Detailed Characteristics (2) www.httc.de www.httc.de www.kom.tu-darmstadt.de www.kom.tu-darmstadt.de Resources (location, sharing) Networking 1. relevant resources located at nodes (peers) at the edges of a 4. variable connectivity is the norm network • support of dial-up users with variable IP addresses • operating outside the domain name system (DNS) 2. peers share their resources • often operating behind firewalls or NAT gateways 3. resource locations • widely distributed 19 • most often largely replicated 20 Detailed Characteristics (3) Detailed Characteristics (4) www.httc.de www.httc.de www.kom.tu-darmstadt.de www.kom.tu-darmstadt.de Interaction of Peers Management 5. combined client and server functionality 7. peers have significant automony and mostly • “SERVer + cliENT = SERVENT” similar rights • minimal demands of the underlying infrastructure • services provided by end systems 8. no central control or centralized usage/provisioning of a service 6. direct interaction (provision of services, e.g. file transfer) between 9. self-organizing system 21 peers (= “peer to peer”) 22 Peer-to-Peer: 9 Properties 2.3 P2P Networks are Overlay Networks 1. relevant resources located at nodes (“peers”) at the edges of a network P P Service B Service A Service C www.httc.de www.httc.de 2. peers share their resources 3. resource locations P P P • widely distributed www.kom.tu-darmstadt.de www.kom.tu-darmstadt.de P P P • most often largely replicated Peers identified by PeerID 4. variable connectivity is the norm Overlay Network 5. combined Client and Server functionality 6.
Recommended publications
  • The Wealth of Networks How Social Production Transforms Markets and Freedom
    Name /yal05/27282_u00 01/27/06 10:25AM Plate # 0-Composite pg 3 # 3 The Wealth of Networks How Social Production Transforms Markets and Freedom Yochai Benkler Yale University Press Ϫ1 New Haven and London 0 ϩ1 Name /yal05/27282_u00 01/27/06 10:25AM Plate # 0-Composite pg 4 # 4 Copyright ᭧ 2006 by Yochai Benkler. All rights reserved. Subject to the exception immediately following, this book may not be repro- duced, in whole or in part, including illustrations, in any form (beyond that copy- ing permitted by Sections 107 and 108 of the U.S. Copyright Law and except by reviewers for the public press), without written permission from the publishers. The author has made an online version of the book available under a Creative Commons Noncommercial Sharealike license; it can be accessed through the author’s website at http://www.benkler.org. Printed in the United States of America. Library of Congress Cataloging-in-Publication Data Benkler, Yochai. The wealth of networks : how social production transforms markets and freedom / Yochai Benkler. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-300-11056-2 (alk. paper) ISBN-10: 0-300-11056-1 (alk. paper) 1. Information society. 2. Information networks. 3. Computer networks—Social aspects. 4. Computer networks—Economic aspects. I. Title. HM851.B457 2006 303.48'33—dc22 2005028316 A catalogue record for this book is available from the British Library. The paper in this book meets the guidelines for permanence and durability of the Committee on Production Guidelines for Book Longevity of the Council on Library Resources.
    [Show full text]
  • Étude De La Pratique Du Téléchargement Légal Et Illégal Sur Internet
    Étude de la pratique du téléchargement légal et illégal sur Internet Travail de Bachelor réalisé en vue de l’obtention du Bachelor HES par : Julien MARIETHOZ Conseiller au travail de Bachelor : (David Billard, Professeur HES) Genève, le 12 mai 2010 Haute École de Gestion de Genève (HEG-GE) Informatique de Gestion Déclaration Ce travail de Bachelor est réalisé dans le cadre de l’examen final de la Haute école de gestion de Genève, en vue de l’obtention du titre d’ « informaticien de gestion ». L’étudiant accepte, le cas échéant, la clause de confidentialité. L'utilisation des conclusions et recommandations formulées dans le travail de Bachelor, sans préjuger de leur valeur, n'engage ni la responsabilité de l'auteur, ni celle du conseiller au travail de Bachelor, du juré et de la HEG. « J’atteste avoir réalisé seul le présent travail, sans avoir utilisé des sources autres que celles citées dans la bibliographie. » Fait à Genève, le 12 mai 2010 Julien MARIETHOZ Étude de la pratique du téléchargement légal et illégal sur Internet MARIETHOZ, Julien iv Remerciements Dans le cadre de la réalisation de ce travail, je tiens à remercier tous ceux qui ont pu y contribuer directement ou indirectement : M. David Billard pour son encadrement et ses conseils. Carole, ma femme, qui a pris le temps de s’occuper de notre petit qui est né le jour après la date de début officiel, me permettant de me concentrer sur ce travail. Tous ceux qui ont pris le temps de répondre à mon questionnaire, en me fournissant les données nécessaires à ce rapport.
    [Show full text]
  • Interconnexion Et Routage Dans Les Systèmes Pair À Pair Salma Ktari
    Interconnexion et routage dans les systèmes pair à pair Salma Ktari To cite this version: Salma Ktari. Interconnexion et routage dans les systèmes pair à pair. domain_other. Télécom ParisTech, 2009. English. pastel-00005737 HAL Id: pastel-00005737 https://pastel.archives-ouvertes.fr/pastel-00005737 Submitted on 19 May 2010 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Thèse présentée pour obtenir le grade de Docteur de l’École Nationale Supérieure des Télécommunications Spécialité : Informatique et Réseaux SALMA KTARI Interconnexion et routage dans les systèmes pair à pair Soutenue le 14 Décembre 2009 devant le jury composé de Isabelle Chrisment Rapporteurs Pascal Lorenz Maurice Gagnaire Examinateurs Sami Tabbane Yutaka Takahashi Invité Houda Labiod Directeur de thèse Artur Hecker Co-directeur de thèse ii À mon cher époux, À ma famille. iv Merci, Au terme de ce travail, je tiens à remercier mes directeurs de thèse, madame Houda Labiod et monsieur Artur Hecker qui m'ont accompagné dans ma recherche ces trois années. Un grand merci à Artur pour sa grande disponibilité et son suivi sérieux et parfois exigeant, qui m’ont été d’une aide précieuse.
    [Show full text]
  • The Edonkey File-Sharing Network
    The eDonkey File-Sharing Network Oliver Heckmann, Axel Bock, Andreas Mauthe, Ralf Steinmetz Multimedia Kommunikation (KOM) Technische Universitat¨ Darmstadt Merckstr. 25, 64293 Darmstadt (heckmann, bock, mauthe, steinmetz)@kom.tu-darmstadt.de Abstract: The eDonkey 2000 file-sharing network is one of the most successful peer- to-peer file-sharing applications, especially in Germany. The network itself is a hybrid peer-to-peer network with client applications running on the end-system that are con- nected to a distributed network of dedicated servers. In this paper we describe the eDonkey protocol and measurement results on network/transport layer and application layer that were made with the client software and with an open-source eDonkey server we extended for these measurements. 1 Motivation and Introduction Most of the traffic in the network of access and backbone Internet service providers (ISPs) is generated by peer-to-peer (P2P) file-sharing applications [San03]. These applications are typically bandwidth greedy and generate more long-lived TCP flows than the WWW traffic that was dominating the Internet traffic before the P2P applications. To understand the influence of these applications and the characteristics of the traffic they produce and their impact on network design, capacity expansion, traffic engineering and shaping, it is important to empirically analyse the dominant file-sharing applications. The eDonkey file-sharing protocol is one of these file-sharing protocols. It is imple- mented by the original eDonkey2000 client [eDonkey] and additionally by some open- source clients like mldonkey [mlDonkey] and eMule [eMule]. According to [San03] it is with 52% of the generated file-sharing traffic the most successful P2P file-sharing net- work in Germany, even more successful than the FastTrack protocol used by the P2P client KaZaa [KaZaa] that comes to 44% of the traffic.
    [Show full text]
  • IPFS and Friends: a Qualitative Comparison of Next Generation Peer-To-Peer Data Networks Erik Daniel and Florian Tschorsch
    1 IPFS and Friends: A Qualitative Comparison of Next Generation Peer-to-Peer Data Networks Erik Daniel and Florian Tschorsch Abstract—Decentralized, distributed storage offers a way to types of files [1]. Napster and Gnutella marked the beginning reduce the impact of data silos as often fostered by centralized and were followed by many other P2P networks focusing on cloud storage. While the intentions of this trend are not new, the specialized application areas or novel network structures. For topic gained traction due to technological advancements, most notably blockchain networks. As a consequence, we observe that example, Freenet [2] realizes anonymous storage and retrieval. a new generation of peer-to-peer data networks emerges. In this Chord [3], CAN [4], and Pastry [5] provide protocols to survey paper, we therefore provide a technical overview of the maintain a structured overlay network topology. In particular, next generation data networks. We use select data networks to BitTorrent [6] received a lot of attention from both users and introduce general concepts and to emphasize new developments. the research community. BitTorrent introduced an incentive Specifically, we provide a deeper outline of the Interplanetary File System and a general overview of Swarm, the Hypercore Pro- mechanism to achieve Pareto efficiency, trying to improve tocol, SAFE, Storj, and Arweave. We identify common building network utilization achieving a higher level of robustness. We blocks and provide a qualitative comparison. From the overview, consider networks such as Napster, Gnutella, Freenet, BitTor- we derive future challenges and research goals concerning data rent, and many more as first generation P2P data networks, networks.
    [Show full text]
  • Privacy Enhancing Technologies 2003 an Analysis of Gnunet And
    Privacy Enhancing Technologies 2003 An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant Networks Dennis Kügler Federal Office for Information Security, Germany [email protected] 1 Anonymous, Censorship-Resistant Networks • Anonymous Peer-to-Peer Networks – Gnutella • Searching is relatively anonymous • Downloading is not anonymous • Censorship-Resistant Networks – Eternity Service • Distributed storage medium • Attack resistant • Anonymous, Censorship-Resistant Networks – Freenet – GNUnet 2 GNUnet: Obfuscated, Distributed Filesystem Content Hash Key: [H(B),H(E (B))] • H(B) – Content encryption: H(B) – Unambiguous filename: H(E (B)) H(B) • Content replication – Caching while delivering – Based on unambiguous filename • Searchability – Keywords 3 GNUnet: Peer-to-Peer MIX Network • Initiating node – Downloads content • Supplying nodes – Store content unencrypted • Intermediary nodes – Forward and cache encrypted content – Plausible deniability due to encryption • Economic model – Based on credit Query A Priority=20 B – Charge for queries c =c -20 B B - – Pay for responses 4 GNUnet Encoding • DBlocks DBlock DBlock ... DBlock – 1KB of the content – Content hash encrypted • IBlocks IBlock ... IBlock – CHKs of 25 DBlocks – Organized as tree – Content hash encrypted IBlock • RBlock – Description of the content – CHK of the root IBlock RBlock – Keyword encrypted 5 The Attacker Model • Attacker – Controls malicious nodes that behave correctly – Prepares dictionary of interesting keywords – Observes queries and
    [Show full text]
  • P2P Protocols
    CHAPTER 1 P2P Protocols Introduction This chapter lists the P2P protocols currently supported by Cisco SCA BB. For each protocol, the following information is provided: • Clients of this protocol that are supported, including the specific version supported. • Default TCP ports for these P2P protocols. Traffic on these ports would be classified to the specific protocol as a default, in case this traffic was not classified based on any of the protocol signatures. • Comments; these mostly relate to the differences between various Cisco SCA BB releases in the level of support for the P2P protocol for specified clients. Table 1-1 P2P Protocols Protocol Name Validated Clients TCP Ports Comments Acestream Acestream PC v2.1 — Supported PC v2.1 as of Protocol Pack #39. Supported PC v3.0 as of Protocol Pack #44. Amazon Appstore Android v12.0000.803.0C_642000010 — Supported as of Protocol Pack #44. Angle Media — None Supported as of Protocol Pack #13. AntsP2P Beta 1.5.6 b 0.9.3 with PP#05 — — Aptoide Android v7.0.6 None Supported as of Protocol Pack #52. BaiBao BaiBao v1.3.1 None — Baidu Baidu PC [Web Browser], Android None Supported as of Protocol Pack #44. v6.1.0 Baidu Movie Baidu Movie 2000 None Supported as of Protocol Pack #08. BBBroadcast BBBroadcast 1.2 None Supported as of Protocol Pack #12. Cisco Service Control Application for Broadband Protocol Reference Guide 1-1 Chapter 1 P2P Protocols Introduction Table 1-1 P2P Protocols (continued) Protocol Name Validated Clients TCP Ports Comments BitTorrent BitTorrent v4.0.1 6881-6889, 6969 Supported Bittorrent Sync as of PP#38 Android v-1.1.37, iOS v-1.1.118 ans PC exeem v0.23 v-1.1.27.
    [Show full text]
  • Smart Regulation in the Age of Disruptive Technologies
    SMART REGULATION IN THE AGE OF DISRUPTIVE TECHNOLOGIES Andrea Renda CEPS, Duke, College of Europe 13 March 2018 A New Wave of Regulatory Governance? • First wave: structural reforms (1970s-1980s) • Privatizations, liberalizations • Second wave: regulatory reform (1980s-1990s) • Ex ante filters + “Less is more” • Third wave: regulatory governance/management (2000s) • Policy cycle concept + importance of oversight • Better is more? Alternatives to regulation, nudges, etc. • Fourth wave: coping with disruptive technologies? (2010s) Competition Collusion Access Discrimination Digital Technology as “enabler” Jobs Unemployment Enforcement Infringement Key emerging challenges • From national/EU to global governance • From ex post to ex ante/continuous market monitoring (a new approach to the regulatory governance cycle) • Need for new forms of structured scientific input (a new approach to the innovation principle, and to innovation deals) • From regulation “of” technology to regulation “by” technology • A whole new set of alternative policy options • Away from neoclassical economic analysis, towards multi-criteria analysis and enhance risk assessment/management/evaluation Alternative options & Problem definition Regulatory cycle Impact Analysis Risk assessment, Risk management Evaluation dose-response Emerging, disruptive Policy strategy and Learning technology experimentation • Scientific input and forecast • Mission-oriented options • Ongoing evaluation • Mission-led assessment • Pilots, sprints, sandboxes, tech- • Pathway updates • Long-term
    [Show full text]
  • CS505: Distributed Systems
    Cristina Nita-Rotaru CS505: Distributed Systems Lookup services. Chord. CAN. Pastry. Kademlia. Required Reading } I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, H. Balakrishnan, Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications, SIGCOMM 2001. } A Scalable Content-Addressable Network S.a Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker, SIGCOMM 2001 } A. Rowstron and P. Druschel. "Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems". IFIP/ACM International Conference on Distributed Systems Platforms (Middleware), 2001 } Kademlia: A Peer-to-peer Information System Based on the XOR Metric. P. Maymounkov and D. Mazieres, IPTPS '02 2 DHTs 1: Lookup services Peer-to-Peer (P2P) Systems } Applications that take advantage of resources (storage, cycles, content, human presence) available at the edges of the Internet. } Characteristics: } System consists of clients connected through Internet and acting as peers } System is designed to work in the presence of variable connectivity } Nodes at the edges of the network have significant autonomy; no centralized control } Nodes are symmetric in function 4 DHTs Benefits of P2P and Applications } High capacity: all clients provide resources (bandwidth, storage space, and computing power). The capacity of the system increases as more nodes become part of the system. } Increased reliability: achieved by replicating data over multiple peers, and by enabling peers to find the data without relying on a centralized index server. } Applications:
    [Show full text]
  • Practical Anonymous Networking?
    gap – practical anonymous networking? Krista Bennett Christian Grothoff S3 lab and CERIAS, Department of Computer Sciences, Purdue University [email protected], [email protected] http://www.gnu.org/software/GNUnet/ Abstract. This paper describes how anonymity is achieved in gnunet, a framework for anonymous distributed and secure networking. The main focus of this work is gap, a simple protocol for anonymous transfer of data which can achieve better anonymity guarantees than many traditional indirection schemes and is additionally more efficient. gap is based on a new perspective on how to achieve anonymity. Based on this new perspective it is possible to relax the requirements stated in traditional indirection schemes, allowing individual nodes to balance anonymity with efficiency according to their specific needs. 1 Introduction In this paper, we present the anonymity aspect of gnunet, a framework for secure peer-to-peer networking. The gnunet framework provides peer discovery, link encryption and message-batching. At present, gnunet’s primary application is anonymous file-sharing. The anonymous file-sharing application uses a content encoding scheme that breaks files into 1k blocks as described in [1]. The 1k blocks are transmitted using gnunet’s anonymity protocol, gap. This paper describes gap and how it attempts to achieve privacy and scalability in an environment with malicious peers and actively participating adversaries. The gnunet core API offers node discovery, authentication and encryption services. All communication between nodes in the network is confidential; no host outside the network can observe the actual contents of the data that flows through the network. Even the type of the data cannot be observed, as all packets are padded to have identical size.
    [Show full text]
  • Zeronet Presentation
    ZeroNet Decentralized web platform using Bitcoin cryptography and BitTorrent network. ABOUT ZERONET Why? Current features We believe in open, free, and ◦ Real-time updated sites uncensored network and communication. ◦ Namecoin .bit domain support ◦ No hosting costs ◦ Multi-user sites Sites are served by visitors. ◦ Password less, Bitcoin's BIP32- ◦ Impossible to shut down based authorization It's nowhere because it's ◦ Built-in SQL server with P2P data everywhere. synchronization ◦ No single point of failure ◦ Tor network support Site remains online so long as at least 1 peer serving it. ◦ Works in any browser/OS ◦ Fast and works offline You can access the site even if your internet is unavailable. HOW DOES IT WORK? THE BASICS OF ASYMMETRIC CRYPTOGRAPHY When you create a new site you get two keys: Private key Public key 5JNiiGspzqt8sC8FM54FMr53U9XvLVh8Waz6YYDK69gG6hso9xu 16YsjZK9nweXyy3vNQQPKT8tfjCNjEX9JM ◦ Only you have it ◦ This is your site address ◦ Allows you to sign new content for ◦ Using this anyone can verify if the your site. file is created by the site owner. ◦ No central registry ◦ Every downloaded file is verified, It never leaves your computer. makes it safe from malicious code inserts or any modifications. ◦ Impossible to modify your site without it. MORE INFO ABOUT CRYPTOGRAPHY OF ZERONET ◦ ZeroNet uses the same elliptic curve based encryption as in your Bitcoin wallet. ◦ You can accept payments directly to your site address. ◦ Using the current fastest supercomputer, it would take around 1 billion years to "hack" a private key. WHAT HAPPENS WHEN YOU VISIT A ZERONET SITE? WHAT HAPPENS WHEN YOU VISIT A ZERONET SITE? (1/2) 1 Gathering visitors IP addresses: Please send some IP addresses for site 1EU1tbG9oC1A8jz2ouVwGZyQ5asrNsE4Vr OK, Here are some: 12.34.56.78:13433, 42.42.42.42:13411, ..
    [Show full text]
  • CS 552 Peer 2 Peer Networking
    CS 552 Peer 2 Peer Networking R. Martin Credit slides from B. Richardson, I. Stoica, M. Cuenca Peer to Peer • Outline • Overview • Systems: – Gnutella – Freenet – Chord – PlanetP Why Study P2P • Huge fraction of traffic on networks today – >=50%! • Exciting new applications • Next level of resource sharing – Vs. timesharing, client-server, P2P – E.g. Access 10’s-100’s of TB at low cost. P2P usage • CMU network (external to world), 2003 • 47% of all traffic was easily classifiable as P2P • 18% of traffic was HTTP • Other traffic: 35% – Believe ~28% is port- hopping P2P • Other sites have a similar distribution Big Picture • Gnutella – Focus is simple sharing – Using simple flooding • Bit torrent – Designed for high bandwidth • PlanetP – Focus on search and retrieval – Creates global index on each node via controlled, randomized flooding • Cord – Focus on building a distributed hash table (DHT) – Finger tables Other P2P systems • Freenet: – Focus privacy and anonymity – Builds internal routing tables • KaaZa • eDonkey • Napster – Success started the whole craze Key issues for P2P systems • Join/leave – How do nodes join/leave? Who is allowed? • Search and retrieval – How to find content? – How are metadata indexes built, stored, distributed? • Content Distribution – Where is content stored? How is it downloaded and retrieved? Search and Retrieval • Basic strategies: – Flooding the query – Flooding the index – Routing the query • Different tradeoffs depending on application – Robustness, scalability, legal issues Flooding the Query (Gnutella) N3 Lookup(“title”) N1 N2 N4 N5 Key=title N8 N6 Value=mp3 N7 Pros: highly robust. Cons: Huge network traffic Flooding the Index (PlanetP) Key1=title1 N3 N1 Key2=title2 N2 N4 N5 Lookup(“title4”) Key1=title3 N8 N6 Key2=title4 N7 Pros: Robust.
    [Show full text]