CS 425 / ECE 428 Distributed Systems Fall 2019 Indranil Gupta (Indy) Lecture 7: Peer-To-Peer Systems I
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Cisco SCA BB Protocol Reference Guide
Cisco Service Control Application for Broadband Protocol Reference Guide Protocol Pack #60 August 02, 2018 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. -
Diapositiva 1
TRANSFERENCIA O DISTRIBUCIÓN DE ARCHIVOS ENTRE IGUALES (peer-to-peer) Características, Protocolos, Software, Luis Villalta Márquez Configuración Peer-to-peer Una red peer-to-peer, red de pares, red entre iguales, red entre pares o red punto a punto (P2P, por sus siglas en inglés) es una red de computadoras en la que todos o algunos aspectos funcionan sin clientes ni servidores fijos, sino una serie de nodos que se comportan como iguales entre sí. Es decir, actúan simultáneamente como clientes y servidores respecto a los demás nodos de la red. Las redes P2P permiten el intercambio directo de información, en cualquier formato, entre los ordenadores interconectados. Peer-to-peer Normalmente este tipo de redes se implementan como redes superpuestas construidas en la capa de aplicación de redes públicas como Internet. El hecho de que sirvan para compartir e intercambiar información de forma directa entre dos o más usuarios ha propiciado que parte de los usuarios lo utilicen para intercambiar archivos cuyo contenido está sujeto a las leyes de copyright, lo que ha generado una gran polémica entre defensores y detractores de estos sistemas. Las redes peer-to-peer aprovechan, administran y optimizan el uso del ancho de banda de los demás usuarios de la red por medio de la conectividad entre los mismos, y obtienen así más rendimiento en las conexiones y transferencias que con algunos métodos centralizados convencionales, donde una cantidad relativamente pequeña de servidores provee el total del ancho de banda y recursos compartidos para un servicio o aplicación. Peer-to-peer Dichas redes son útiles para diversos propósitos. -
Services for Microsoft Onedrive for Business
Service Overview SERVICES FOR MICROSOFT ONEDRIVE FOR BUSINESS Simplify where workers go for content sharing and collaboration Business Challenge ESSENTIALS Dynamic teams are constantly collaborating, which means easily Dell Technologies Consulting Services can sharing personal and team documents is a must for todays’ help you gain the most from your OneDrive innovative workers. All too often organizations have multiple content for Business investment with: repositories without a single standard for the entire workforce which • Repeatable, mature methodologies can cause frustration and impact worker productivity. designed for delivery efficiency and Simplifying where your workers go to collaborate and share content quality accelerate content migrations can boost innovation, increase productivity and more importantly • Determining and delivering the optimal worker satisfaction. For organizations who have adopted Office 365, OneDrive client deployment model as OneDrive for Business is the logical choice. But how do you part of your Windows 10 and Office 365 efficiently migrate, retire and consolidate personal and team files ProPlus initiatives from overlapping content repositories to control costs? • Security and management tuning at the It’s easy with Dell Technologies Consulting Services. We are a Gold worker, device and application level Certified Microsoft Partner with experience migrating organizations of all sizes and verticals to Office 365. • Migration and consolidation of content from a wide variety of sources • The right mix of -
FASTTRACK Through FUJITSU-DEV
FASTTRACK through FUJITSU-DEV Americas Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA FASTTRACK through FUJITSU-DEV FASTTRACK FASTTRACK Name/CLI Keyword fasttrack Full Name FastTrack Description FastTrack is a file sharing client software that is based on peer-to-peer connection. FastTrack is used by multiple file sharing applications such as Kazaa, Grokster, iMesh, and Morpheus. Initialization: Initial the connection with FastTrack server over HTTP. Search: Searching for files in FastTrack server. Download: Download request from FastTracker server. Reference http://developer.berlios.de/projects/gift-fasttrack/ Global ID L7:57 ID 57 Known Mappings UDP Port - TCP Port - IP Protocol - IP Version IPv4 Support Yes IPv6 Support Yes Application Group fasttrack-group Category file-sharing Sub Category p2p-networking P2P Technology Yes Encrypted No Tunnel No Underlying Protocols - 2 FASTTRACK through FUJITSU-DEV FASTTRACK-STATIC FASTTRACK-STATIC Name/CLI Keyword fasttrack-static Full Name fasttrack-static Description FastTrack Traffic - KaZaA Morpheus Grokster... Reference - Global ID L7:1322 ID 1322 Known Mappings UDP Port 1214 TCP Port 1214 IP Protocol - IP Version IPv4 Support Yes IPv6 Support Yes Application Group fasttrack-group Category file-sharing Sub Category p2p-networking P2P Technology Yes Encrypted No Tunnel No Underlying Protocols - 3 FASTTRACK through FUJITSU-DEV FATSERV FATSERV Name/CLI Keyword fatserv Full Name Fatmen Server Description Fatmen Server Reference - Global ID L4:305 ID 305 Known -
P2P Protocols
CHAPTER 1 P2P Protocols Introduction This chapter lists the P2P protocols currently supported by Cisco SCA BB. For each protocol, the following information is provided: • Clients of this protocol that are supported, including the specific version supported. • Default TCP ports for these P2P protocols. Traffic on these ports would be classified to the specific protocol as a default, in case this traffic was not classified based on any of the protocol signatures. • Comments; these mostly relate to the differences between various Cisco SCA BB releases in the level of support for the P2P protocol for specified clients. Table 1-1 P2P Protocols Protocol Name Validated Clients TCP Ports Comments Acestream Acestream PC v2.1 — Supported PC v2.1 as of Protocol Pack #39. Supported PC v3.0 as of Protocol Pack #44. Amazon Appstore Android v12.0000.803.0C_642000010 — Supported as of Protocol Pack #44. Angle Media — None Supported as of Protocol Pack #13. AntsP2P Beta 1.5.6 b 0.9.3 with PP#05 — — Aptoide Android v7.0.6 None Supported as of Protocol Pack #52. BaiBao BaiBao v1.3.1 None — Baidu Baidu PC [Web Browser], Android None Supported as of Protocol Pack #44. v6.1.0 Baidu Movie Baidu Movie 2000 None Supported as of Protocol Pack #08. BBBroadcast BBBroadcast 1.2 None Supported as of Protocol Pack #12. Cisco Service Control Application for Broadband Protocol Reference Guide 1-1 Chapter 1 P2P Protocols Introduction Table 1-1 P2P Protocols (continued) Protocol Name Validated Clients TCP Ports Comments BitTorrent BitTorrent v4.0.1 6881-6889, 6969 Supported Bittorrent Sync as of PP#38 Android v-1.1.37, iOS v-1.1.118 ans PC exeem v0.23 v-1.1.27. -
NBAR2 Standard Protocol Pack 1.0
NBAR2 Standard Protocol Pack 1.0 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 © 2013 Cisco Systems, Inc. All rights reserved. CONTENTS CHAPTER 1 Release Notes for NBAR2 Standard Protocol Pack 1.0 1 CHAPTER 2 BGP 3 BITTORRENT 6 CITRIX 7 DHCP 8 DIRECTCONNECT 9 DNS 10 EDONKEY 11 EGP 12 EIGRP 13 EXCHANGE 14 FASTTRACK 15 FINGER 16 FTP 17 GNUTELLA 18 GOPHER 19 GRE 20 H323 21 HTTP 22 ICMP 23 IMAP 24 IPINIP 25 IPV6-ICMP 26 IRC 27 KAZAA2 28 KERBEROS 29 L2TP 30 NBAR2 Standard Protocol Pack 1.0 iii Contents LDAP 31 MGCP 32 NETBIOS 33 NETSHOW 34 NFS 35 NNTP 36 NOTES 37 NTP 38 OSPF 39 POP3 40 PPTP 41 PRINTER 42 RIP 43 RTCP 44 RTP 45 RTSP 46 SAP 47 SECURE-FTP 48 SECURE-HTTP 49 SECURE-IMAP 50 SECURE-IRC 51 SECURE-LDAP 52 SECURE-NNTP 53 SECURE-POP3 54 SECURE-TELNET 55 SIP 56 SKINNY 57 SKYPE 58 SMTP 59 SNMP 60 SOCKS 61 SQLNET 62 SQLSERVER 63 SSH 64 STREAMWORK 65 NBAR2 Standard Protocol Pack 1.0 iv Contents SUNRPC 66 SYSLOG 67 TELNET 68 TFTP 69 VDOLIVE 70 WINMX 71 NBAR2 Standard Protocol Pack 1.0 v Contents NBAR2 Standard Protocol Pack 1.0 vi CHAPTER 1 Release Notes for NBAR2 Standard Protocol Pack 1.0 NBAR2 Standard Protocol Pack Overview The Network Based Application Recognition (NBAR2) Standard Protocol Pack 1.0 is provided as the base protocol pack with an unlicensed Cisco image on a device. -
Title: P2P Networks for Content Sharing
Title: P2P Networks for Content Sharing Authors: Choon Hoong Ding, Sarana Nutanong, and Rajkumar Buyya Grid Computing and Distributed Systems Laboratory, Department of Computer Science and Software Engineering, The University of Melbourne, Australia (chd, sarana, raj)@cs.mu.oz.au ABSTRACT Peer-to-peer (P2P) technologies have been widely used for content sharing, popularly called “file-swapping” networks. This chapter gives a broad overview of content sharing P2P technologies. It starts with the fundamental concept of P2P computing followed by the analysis of network topologies used in peer-to-peer systems. Next, three milestone peer-to-peer technologies: Napster, Gnutella, and Fasttrack are explored in details, and they are finally concluded with the comparison table in the last section. 1. INTRODUCTION Peer-to-peer (P2P) content sharing has been an astonishingly successful P2P application on the Internet. P2P has gained tremendous public attention from Napster, the system supporting music sharing on the Web. It is a new emerging, interesting research technology and a promising product base. Intel P2P working group gave the definition of P2P as "The sharing of computer resources and services by direct exchange between systems". This thus gives P2P systems two main key characteristics: • Scalability: there is no algorithmic, or technical limitation of the size of the system, e.g. the complexity of the system should be somewhat constant regardless of number of nodes in the system. • Reliability: The malfunction on any given node will not effect the whole system (or maybe even any other nodes). File sharing network like Gnutella is a good example of scalability and reliability. -
Investigating the User Behavior of Peer-To-Peer File Sharing Software
www.ccsenet.org/ijbm International Journal of Business and Management Vol. 6, No. 9; September 2011 Investigating the User Behavior of Peer-to-Peer File Sharing Software Shun-Po Chiu (Corresponding author) PhD candidate, Department of Information Management National Central University, Jhongli, Taoyuan, Taiwan & Lecture, Department of Information Management Vanung University, Jhongli, Taoyuan, Taiwan E-mail: [email protected] Huey-Wen Chou Professor, Department of Information Management National Central University, Jhongli, Taoyuan, Taiwan E-mail: [email protected] Received: March 26, 2011 Accepted: May 10, 2011 doi:10.5539/ijbm.v6n9p68 Abstract In recent years, peer-to-peer file sharing has been a hotly debated topic in the fields of computer science, the music industry, and the movie industry. The purpose of this research was to examine the user behavior of peer-to-peer file-sharing software. A methodology of naturalistic inquiry that involved qualitative interviews was used to collect data from 21 university students in Taiwan. The results of the study revealed that a substantial amount of P2P file-sharing software is available to users. The main reasons for using P2P file-sharing software are to save money, save time, and to access files that are no longer available in stores. A majority of respondents use P2P file-sharing software to download music, movies, and software, and the respondents generally perceive the use of such software as neither illegal nor unethical. Furthermore, most users are free-riders, which means that they do not contribute files to the sharing process. Keywords: Peer to peer, File sharing, Naturalistic inquiry 1. Introduction In recent years, Peer-to-Peer (P2P) network transmission technology has matured. -
Notes the Fate of Bittorrent John Does
Ren_18 (S. Alessi) (Do Not Delete) 5/24/2013 4:36 PM Notes The Fate of BitTorrent John Does: A Civil Procedure Analysis of Copyright Litigation Patience Ren* Copyright owners can trace online violations to an infringer’s Internet protocol address but cannot identify her unless they obtain court approval to serve a subpoena on an Internet service provider. As the most popular peer-to-peer file-sharing protocol today, BitTorrent requires users to share files with each other in a conspiracy-like fashion. By arguing that this feature imparts a “same transaction” character to BitTorrent infringement activities, a copyright owner can seek to join multitudes of Internet protocol addresses as John Doe defendants in an application for early discovery. Courts are divided as to whether early discovery should be granted where tens, hundreds, or sometimes thousands of Internet protocol addresses are joined together in one case. Many in the Internet user community fault copyright owners for using the courts as a mere instrument to seek identification information en masse as part of a coercive practice to induce monetary settlements. This Note examines how case law relating to early discovery and civil procedure joinder rules applies to multiple defendants allegedly participating in a “same transaction” that occurs solely within the inner workings of a file-sharing protocol. Even if BitTorrent usage legally supports joinder, this Note highlights the difficult balance between the right to enforce a copyright and the rights of Internet users to be free from litigation threats. Without a legislative response that is resilient in the face of an ever-changing technology, copyright infringement problems will continue to inundate our courts. -
Public Peer-To-Peer Filesharing Networks’ Evaluation
PUBLIC PEER-TO-PEER FILESHARING NETWORKS’ EVALUATION J. Lloret Mauri1, B. Molina Moreno2, C. Palau Salvador3, M. Esteve Domingo4 Department of Communications, Polytechnic University of Valencia Camino Vera s/n, Valencia, Spain [email protected], [email protected], [email protected], [email protected] ABSTRACT • Download speed: some internal P2P network, due to Since the recent appearance of P2P file-sharing networks, its internal behaviour, are optimal for downloading many Internet users have chosen this technology to search files of reduced size. Others, however, use for programs, films, songs, etc. Their number of users is multisplitting mechanisms and permit the download growing every day due to the attractive and interesting from multiple sources, making them suitable for content type that can be found and downloaded over these obtaining larger files. networks. In this article six public architectures are analyzed, Gnutella, FastTrack, Opennap, Edonkey, MP2P These parameters are responsible for an architecture and Soulseek, tracking their evolution during a week in becoming very popular or, on the other hand, terms of connected users, number of files and size of disappearing. The above factors can make a P2P network shared files per hour. The results will be compared and more attractive to users of a specific nation due to the discussed with previous measurements taken a year ago. utilization of a specific language or even social trends [7]. These data can be used to design new network models, to It is also interesting to distinguish between a P2P network calculate their performance or to optimize new network and P2P client, the development of which must not be parameters. -
When Worlds Collide the Intersection of Constructivism, Learning Objects, and Peer-To-Peer Networking Technologies
When Worlds Collide The intersection of constructivism, learning objects, and peer-to-peer networking technologies David Wiley (and hopefully others soon) v1.3, November 6, 2000 The current conception of learning objects There is a vision. A vision in which the creation of instruction can be automated; in which a computer program is capable of inspecting, selecting, and assembling learning objects in order to instantiate an instructional design. And why not? From automobiles to computer processors, humans have succeeded in automating some pretty complex assembly processes. Historically, the success of automation has relied on two factors. The first is an understanding of the assembly process, first discovered and performed by hand, then captured, studied, and expressed in a technology. The second factor is the standardization of component properties. The standardization of component properties creates a marketplace in which many vendors can create components competitively. The broad availability of inexpensive standardized components makes assembly processes easier to express in concrete terms. For example, once standard building construction components such as bricks and two-by-fours were widely available, it became easier to create detailed building plans. The construction metaphor is an apt one for the current discussion, as the current term “learning objects” is borrowed from the 1994 CEdMA working group entitled “Learning Architectures and Learning Objects” (LALO), in which the Architecture is the expression of the construction or assembly process (the blueprint), and the Objects are the standardized components (bricks and boards). But our concern is the facilitation of learning. In our case, the assembly plans are probabilistic instructional design theories and models, prescriptive methods likely to facilitate learning. -
Secondary Liability for Copyright Infringement & Safe Harbors in The
CHAPTER FOURTEEN Secondary Liability for Copyright Infringement & Safe Harbors in the Digital Age Introduction Generally, in the common law, “secondary liability” is imposed on someone who does not commit the legal wrong directly, but is found responsible for encouraging, facilitating or profiting from it. As you will see, the Copyright Act has no provisions imposing secondary liability. (Compare to e.g. § 271 of the Patent Act.) As a result, the secondary liability provisions of copyright law are entirely judge-developed, without even an open-ended statutory basis like that given to fair use jurisprudence under § 107. Until recently, there were two principal forms of secondary liability: contributory infringement and vicarious liability. (It should be noted here that the Sony v. Universal case does not clearly delineate whether and when it is talking about contributory infringe- ment, vicarious liability or both.) • Contributory infringement may be found if someone, with knowledge of the infringing activity, induces, causes or materially contributes to the infringing conduct of another. • Vicarious liability—an outgrowth of respondeat superior—may be imposed on someone who has the right and ability to supervise the infringing activity and also has a direct financial interest in the activity. In both cases, there needs to be underlying direct infringement. In other words, someone needs directly to violate the exclusive rights provided by § 106, before contributory or vicarious liability can be imposed on any third party. Sony Corp. of America v. Universal City Studios, Inc. 464 U.S. 417 (1984) Re-read sections I, II and III of the Sony opinion from Chapter 13, page 415.