Secure Incentivization for Decentralized Content Delivery Prateesh Goyal1, Ravi Netravali1,2, Mohammad Alizadeh1, Hari Balakrishnan1 MIT CSAIL1, UCLA2

Total Page:16

File Type:pdf, Size:1020Kb

Secure Incentivization for Decentralized Content Delivery Prateesh Goyal1, Ravi Netravali1,2, Mohammad Alizadeh1, Hari Balakrishnan1 MIT CSAIL1, UCLA2 Secure Incentivization for Decentralized Content Delivery Prateesh Goyal1, Ravi Netravali1;2, Mohammad Alizadeh1, Hari Balakrishnan1 MIT CSAIL1, UCLA2 Abstract would participate. We were pleasantly surprised by this percentage, which is larger than what we expected. Those who would not Prior research has proposed technical solutions to use peer-to-peer participate were primarily concerned with device security, content (P2P) content delivery to serve Internet video, showing that it can re- liability, and impacts on device performance. To our knowledge, duce costs to content providers. Yet, such methods have not become the results we report are the first published findings on this question. widespread except for a few niche instances. An important chal- Second, how can payments for monetary incentivization be lenge is incentivization: what tangible benefits does P2P content done securely? This is challenging for several reasons. First, a delivery offer users who bring resources to the table? In this paper, content provider cannot be trusted to honor payments, and peers we ask whether monetary incentives can help attract peers in P2P may be disinclined to share payment credentials with certain content delivery systems. We commissioned a professional survey content providers. Second, existing centralized payment systems of people around the United States to answer several relevant ques- (e.g., Paypal) are not designed to support the large number of small tions. We found that 51% of the 876 respondents—substantially transactions that would be needed for P2P content delivery. This larger than our expectations—answered “yes” to whether they is particularly challenging because peers and content providers can would participate for suitable financial incentives. Encouraged by span geographic boundaries that impose foreign transaction/ex- the results of the survey, we propose Gringotts, a system to struc- change fees. Further, these issues are more pronounced for small ture incentives and securely incorporate P2P delivery into content content providers, both due to financial limitations and difficulties delivery systems. Gringotts provides a novel Proof of Delivery in convincing peers of faithful payments. mechanism that allows content providers to verify correct delivery One approach to address these challenges is to use a central au- of their files, and shows how to use cryptocurrency to pay peers thority that everyone trusts (e.g., a bank) to enforce content delivery while guarding against liars and Sybil attacks. payments. An alternative approach is to eliminate the use of a cen- tral authority (and the associated trust requirements), and to instead 1 Introduction provide the above guarantees in a completely decentralized manner. Video streams constitute over 70% of global Internet traffic [6, 28]. With either approach, content providers must be assured that deliv- Most video is delivered to users today via Content Distribution ery is happening properly. Our primary contribution is a lightweight Networks (CDNs) like Akamai and CloudFlare. Although CDN solution to this problem in which content providers, clients, and demand has nearly doubled since 2016 [6], they are too expensive peers, collectively produce a Proof of Delivery Chain (PoDC) that for many content providers [26]. serves as a proof for the delivery of a file from a set of peers to a To combat these high prices, there have been many proposals client. PoDCs are unforgeable and tamper-proof: neither the peers to have peers cache and stream videos to each other, either as nor the content providers can manipulate them to affect payments. supplements to existing CDNs [39, 38, 35], or as decentralized We present the design of Gringotts, a system that applies P2P systems [22, 29]. For example, peers within an Internet PoDC to decentralized P2P content delivery. Payments in Service Provider (ISP) in a city could stream videos directly to Gringotts are made using a cryptocurrency. Cryptocurrencies naturally address some of the aforementioned challenges, and our arXiv:1808.00826v1 [cs.NI] 2 Aug 2018 one another, avoiding expensive Internet paths. By serving content using bandwidth and storage resources that would otherwise go consumer survey revealed that 27% of users are already willing unused, such systems could significantly reduce costs for content to accept cryptocurrency payments (with 40% unsure due to providers and CDN operators. lack of familiarity). In Gringotts, peers are ensured payments by broadcasting PoDCs on a blockchain. Gringotts uses probabilistic These proposals have not seen significant adoption in practice payments to limit blockchain transaction overheads without because of a lack of sufficient participation [4, 39]. Even forms of compromising security. Gringotts is also robust to various forms incentivization like virtual tokens and in-service perks (e.g., traffic of collusion (e.g., clients and content providers, clients and peers) prioritization) have failed to attract enough peers [29, 23, 24]. We and Sybil attacks with fake clients or peers. believe that the steady increases in uplink bandwidth and storage capacity on laptops [30] motivate revisiting P2P content delivery, but with a focus on secure payments as an incentive mechanism. 2 Consumer Survey We ask two questions. First, would users be willing to participate To understand the expectations and requirements for user participa- in such a system if they were incentivized with monetary payments? tion in a peer-to-peer content delivery service, we commissioned a To answer this question, we commissioned a consumer survey to third-party professional organization to undertake a consumer sur- understand user concerns with respect to participation in P2P con- vey. They survey garnered 876 responses from around the United tent delivery (§2). Our key finding is that 51% of the 876 users States. The respondents ranged in age, with 95% between the ages 1 100% 100% more than 100 average videos. Further, consider that the average Will you participate in the Will you accept cryptocurrency 80% service? 80% as your payment? uplink capacity in the US is 22 Mbits/s [21]. Streaming HD video 60% 60% requires an average of 5 Mbits/s throughput [20], suggesting that peers should be able to stream up to 4 HD videos in parallel. 40% 40% Experiments with an Apache web server reveal that mean and peak 20% 20% CPU utilization (single core) are 0.36% and 13%, respectively, 0% 0% Yes No Yes Maybe No when serving 4 concurrent HD videos. These numbers mildly (a) (b) increase to 1.7% and 33% for 16 concurrent video streams.2 Figure 1: Key consumer survey findings. The remaining considerations are daily participation times and earnings for peers. 65% of laptop owners in our survey stated Concern Fraction concerned that they use their computers for more than 2 hours a day. Serving Security and Privacy 82.8% Liability for Illegal Content 50.5% content for 2 hours a day on a 22 Mbits/s link amounts to 580 Performance Impact on Device 47.1% GB of data served per month. If we assume that peers earn Payment Concerns 42.1% $0.05/GB [3], they will make $29 per month, which is greater than Personal Ethics 29.4% the requirement of covering half of their monthly Internet costs (the average US plan costs $50 per month [12]). We note that these Table 1: Concerns for users who specified that they would not numbers are conservative as 66% of users would keep their laptops participate in the service. on for longer times, even when not in use, to serve (and earn) more. Concern Fraction concerned Concerns. Figure 1a shows that 49% of users would not participate Don’t Know How to Use/Sell 59.7% in the service. Table 1 lists the concerns shared by those users. Not Setup to Receive 54.7% As shown, a significant fraction of users were concerned about Volatility and Risk 49.1% the impact that the service would have on their device, both with Don’t Know What it is 21.9% respect to security and privacy, and device/network performance. Other 6.9% Thus, a practical deployment must ensure that service components running on user devices are sufficiently isolated from the rest of Table 2: Concerns for users who specified that they would not be the host device, and are capped in terms of resources consumption. willing to accept payment in cryptocurrency. Many users would not participate due to content liability concerns, stemming equally from ethical considerations, legality, and of 18-60; 52% of the participants were female; annual household in- privacy. Consequently, the majority of users were willing to serve comes were distributed between $10K-200K+, with 45% between movies/shows/news, but only 11% were willing to serve adult $25K-$100K. Each participant was asked a set of 11 questions, re- content. These preferences promote distributed content filtering, lating to payments, resource availability, and participation concerns. and the inclusion of content information to the contracts between Our key findings are: peers and content providers. • 51% of users said they would participate. The other primary user concern was with respect to payments. • Of those who would participate, 70% expect to earn no more 27% of respondents were willing to accept payments in cryptocur- than 50% of their monthly Internet bill. rency, 40% were unsure, and 33% were against it (Figure 1b). Additional questions revealed that users were predominantly • 27% of users are willing to accept payment in the form concerned with lack of familiarity with cryptocurrencies. Table 2 of cryptocurrency; 40% were unsure about cryptocurrency shows that many users did not support cryptocurrency payment payments, while 33% were unwilling. because they either did not know how to use/sell them, or they were • The largest concerns for users who would not participate were not setup to receive them. Further, a significant fraction of users security and privacy concerns (83%), liability concerns over were concerned with the volatility and risk of cryptocurrencies.
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • What Is Peer-To-Peer File Transfer? Bandwidth It Can Use
    sharing, with no cap on the amount of commonly used to trade copyrighted music What is Peer-to-Peer file transfer? bandwidth it can use. Thus, a single NSF PC and software. connected to NSF’s LAN with a standard The Recording Industry Association of A peer-to-peer, or “P2P,” file transfer 100Mbps network card could, with KaZaA’s America tracks users of this software and has service allows the user to share computer files default settings, conceivably saturate NSF’s begun initiating lawsuits against individuals through the Internet. Examples of P2P T3 (45Mbps) internet connection. who use P2P systems to steal copyrighted services include KaZaA, Grokster, Gnutella, The KaZaA software assesses the quality of material or to provide copyrighted software to Morpheus, and BearShare. the PC’s internet connection and designates others to download freely. These services are set up to allow users to computers with high-speed connections as search for and download files to their “Supernodes,” meaning that they provide a How does use of these services computers, and to enable users to make files hub between various users, a source of available for others to download from their information about files available on other create security issues at NSF? computers. users’ PCs. This uses much more of the When configuring these services, it is computer’s resources, including bandwidth possible to designate as “shared” not only the and processing capability. How do these services function? one folder KaZaA sets up by default, but also The free version of KaZaA is supported by the entire contents of the user’s computer as Peer to peer file transfer services are highly advertising, which appears on the user well as any NSF network drives to which the decentralized, creating a network of linked interface of the program and also causes pop- user has access, to be searchable and users.
    [Show full text]
  • The Effects of Digital Music Distribution" (2012)
    Southern Illinois University Carbondale OpenSIUC Research Papers Graduate School Spring 4-5-2012 The ffecE ts of Digital Music Distribution Rama A. Dechsakda [email protected] Follow this and additional works at: http://opensiuc.lib.siu.edu/gs_rp The er search paper was a study of how digital music distribution has affected the music industry by researching different views and aspects. I believe this topic was vital to research because it give us insight on were the music industry is headed in the future. Two main research questions proposed were; “How is digital music distribution affecting the music industry?” and “In what way does the piracy industry affect the digital music industry?” The methodology used for this research was performing case studies, researching prospective and retrospective data, and analyzing sales figures and graphs. Case studies were performed on one independent artist and two major artists whom changed the digital music industry in different ways. Another pair of case studies were performed on an independent label and a major label on how changes of the digital music industry effected their business model and how piracy effected those new business models as well. I analyzed sales figures and graphs of digital music sales and physical sales to show the differences in the formats. I researched prospective data on how consumers adjusted to the digital music advancements and how piracy industry has affected them. Last I concluded all the data found during this research to show that digital music distribution is growing and could possibly be the dominant format for obtaining music, and the battle with piracy will be an ongoing process that will be hard to end anytime soon.
    [Show full text]
  • Piratez Are Just Disgruntled Consumers Reach Global Theaters That They Overlap the Domestic USA Blu-Ray Release
    Moviegoers - or perhaps more accurately, lovers of cinema - are frustrated. Their frustrations begin with the discrepancies in film release strategies and timing. For example, audiences that saw Quentin Tarantino’s1 2 Django Unchained in the United States enjoyed its opening on Christmas day 2012; however, in Europe and other markets, viewers could not pay to see the movie until after the 17th of January 2013. Three weeks may not seem like a lot, but some movies can take months to reach an international audience. Some take so long to Piratez Are Just Disgruntled Consumers reach global theaters that they overlap the domestic USA Blu-Ray release. This delay can seem like an eternity for ultiscreen is at the top of the entertainment a desperate fan. This frustrated enthusiasm, combined industry’s agenda for delivering digital video. This with a lack of timely availability, leads to the feeling of M is discussed in the context of four main screens: being treated as a second class citizen - and may lead TVs, PCs, tablets and mobile phones. The premise being the over-anxious fan to engage in piracy. that multiscreen enables portability, usability and flexibility for consumers. But, there is a fifth screen which There has been some evolution in this practice, with is often overlooked – the cornerstone of the certain films being released simultaneously to a domestic and global audience. For example, Avatar3 was released entertainment industry - cinema. This digital video th th ecosystem is not complete without including cinema, and in theaters on the 10 and 17 of December in most it certainly should be part of the multiscreen discussion.
    [Show full text]
  • Informed Content Delivery Across Adaptive Overlay Networks
    Informed Content Delivery Across Adaptive Overlay Networks John Byers Jeffrey Considine Michael Mitzenmacher Stanislav Rost [email protected] [email protected] [email protected] [email protected] Dept. of Computer Science EECS MIT Laboratory for Boston University Harvard University Computer Science Boston, Massachusetts Cambridge, Massachusetts Cambridge, Massachusetts Abstract Categories and Subject Descriptors C.2 [Computer Systems Organization]: Computer- Overlay networks have emerged as a powerful and highly flexible Communication Networks method for delivering content. We study how to optimize through- put of large transfers across richly connected, adaptive overlay net- General Terms works, focusing on the potential of collaborative transfers between Algorithms, Measurement, Performance peers to supplement ongoing downloads. First, we make the case for an erasure-resilient encoding of the content. Using the digital Keywords fountain encoding approach, end-hosts can efficiently reconstruct Overlay, peer-to-peer, content delivery, digital fountain, erasure ¡ the original content of size ¡ from a subset of any symbols drawn correcting code, min-wise summary, Bloom filter, reconciliation, from a large universe of encoded symbols. Such an approach af- collaboration. fords reliability and a substantial degree of application-level flex- ibility, as it seamlessly accommodates connection migration and 1 Introduction parallel transfers while providing resilience to packet loss. How- ever, since the sets of encoded symbols acquired by peers during Consider the problem of distributing a large new file across a downloads may overlap substantially, care must be taken to enable content delivery network of several thousand geographically dis- them to collaborate effectively. Our main contribution is a collec- tributed machines.
    [Show full text]
  • Forescout Counteract® Endpoint Support Compatibility Matrix Updated: October 2018
    ForeScout CounterACT® Endpoint Support Compatibility Matrix Updated: October 2018 ForeScout CounterACT Endpoint Support Compatibility Matrix 2 Table of Contents About Endpoint Support Compatibility ......................................................... 3 Operating Systems ....................................................................................... 3 Microsoft Windows (32 & 64 BIT Versions) ...................................................... 3 MAC OS X / MACOS ...................................................................................... 5 Linux .......................................................................................................... 6 Web Browsers .............................................................................................. 8 Microsoft Windows Applications ...................................................................... 9 Antivirus ................................................................................................. 9 Peer-to-Peer .......................................................................................... 25 Instant Messaging .................................................................................. 31 Anti-Spyware ......................................................................................... 34 Personal Firewall .................................................................................... 36 Hard Drive Encryption ............................................................................. 38 Cloud Sync ...........................................................................................
    [Show full text]
  • In Re Xunlei Limited Securities Litigation 18-CV-00467-Amended
    Case 1:18-cv-00467-RJS Document 27 Filed 06/04/18 Page 1 of 35 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK ) ) ) Case No. 18-cv-467 (RJS) ) In re XUNLEI LIMITED SECURITIES ) LITIGATION ) CLASS ACTION COMPLAINT ) ) ) JURY TRIAL DEMANDED ) AMENDED CLASS ACTION COMPLAINT Lead Plaintiffs Tongyan Wang and Yuyan Jia and additional named plaintiff Peng Li (collectively, “Plaintiffs”), individually and on behalf of all other persons similarly situated, by Plaintiffs’ undersigned attorneys, for Plaintiffs’ complaint against Defendants, allege the following based upon personal knowledge as to Plaintiffs and Plaintiffs’ own acts, and information and belief as to all other matters, based upon, inter alia, the investigation conducted by and through Plaintiffs’ attorneys, which included, among other things, a review of the Defendants’ public documents, conference calls and announcements made by Defendants, United States Securities and Exchange Commission (“SEC”) filings, news articles and press releases published by and regarding Xunlei Limited (“Xunlei” or the “Company”) and its cryptocurrency program, analysts’ reports and advisories about the Company, and information readily obtainable on the Internet. Plaintiffs believe that substantial evidentiary support will exist for the allegations set forth herein after a reasonable opportunity for discovery. NATURE OF THE ACTION 1. This is a federal securities class action on behalf of a class consisting of persons other than defendants who purchased or otherwise acquired Xunlei’s American Depositary Shares (“ADSs”) between October 10, 2017, and January 11, 2018, both dates inclusive (the “Class 1 Case 1:18-cv-00467-RJS Document 27 Filed 06/04/18 Page 2 of 35 Period”), seeking to recover damages caused by defendants’ violations of the federal securities laws and to pursue remedies under Sections 10(b) and 20(a) of the Securities Exchange Act of 1934 (the “Exchange Act”) and Rule 10b-5 promulgated thereunder, against the Company and its Chief Executive Officer (“CEO”), Lei Chen.
    [Show full text]
  • The Robustness of Content-Based Search in Hierarchical Peer to Peer Networks
    The Robustness of Content-Based Search in Hierarchical Peer to Peer Networks ∗ M. Elena Renda Jamie Callan I.S.T.I. – C.N.R. Language Technologies Institute and School of Computer Science Scuola Superiore Sant’Anna Carnegie Mellon University I-56100 Pisa, Italy Pittsburgh, PA 15213, US [email protected] [email protected] ABSTRACT Keywords Hierarchical peer to peer networks with multiple directory services Peer to Peer, Hierarchical, Search, Retrieval, Content-based, Ro- are an important architecture for large-scale file sharing due to their bustness effectiveness and efficiency. Recent research argues that they are also an effective method of providing large-scale content-based federated search of text-based digital libraries. In both cases the 1. INTRODUCTION directory services are critical resources that are subject to attack Peer to peer (P2P) networks have emerged in recent years as a or failure, but the latter architecture may be particularly vulnera- popular method of sharing information, primarily popular music, ble because content is less likely to be replicated throughout the movies, and software, among large numbers of networked com- network. puters. Computers (‘nodes’) in P2P networks can be information This paper studies the robustness, effectiveness and efficiency providers and information consumers, and may provide network of content-based federated search in hierarchical peer to peer net- services such as message routing and regional directory services. works when directory services fail unexpectedly. Several recovery A single node may play several roles at once, for example, posting methods are studied using simulations with varying failure rates. queries, sharing files, and relaying messages.
    [Show full text]
  • Instart Logic TWITTER LINKEDIN
    Instart Logic TWITTER LINKEDIN MOBILE VIDEO AND APPS WEBSITE Who we are Our advantage Instart Logic is a platform designed to make the delivery of It is a fully responsive platform, offering both flexibility and websites and applications fast, secure and easy. It’s the world’s control. It provides: first endpoint-aware application delivery solution. Performance – Helps improve site-wide performance, especially on mobile through image, code and network Instart’s intelligent architecture provides a new way to optimisation techniques. accelerate web and mobile application performance, based on the user’s specific device, browser, and network conditions. Ad Security – Ability to recover lost advertising revenue from ad-blockers. This new breed of technology goes beyond a traditional Security – Helps protect from harmful bots that flood the site, content delivery network (CDN) to enable businesses to deliver skew data and warp search algorithms and shield from rapid customer-centric website and mobile application Distributed Denial of Service (DDoS), brute-force entry, and experiences. other cyber attacks Agility – Use a DevOps first infrastructure allowed for self-sufficient management and deployment of new content and applications throughout network. Our partnership How does our solution work? Telstra will be using Instart Logic to optimise, monetise and AppSpeed: Instart Logic’s endpoint-aware application delivery deliver managed websites and web applications. Those that are solution provides a new way to accelerate web and mobile application performance. It’s intelligent architecture optimises currently on trial include: images, HTML, JavaScript and other page elements based on • Australian Football League (AFL) each user’s specific device, browser, and network conditions.
    [Show full text]
  • A Peer-To-Peer Internet Measurement Platform and Its Applications in Content Delivery Networks
    A PEER-TO-PEER INTERNET MEASUREMENT PLATFORM AND ITS APPLICATIONS IN CONTENT DELIVERY NETWORKS BY SIPAT TRIUKOSE Submitted in partial fulfillment of the requirements for the degree of Doctor Of Philosophy DISSERTATION ADVISOR: DR. MICHAEL RABINOVICH DEPARTMENT OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE CASE WESTERN RESERVE UNIVERSITY JANUARY 2014 CASE WESTERN RESERVE UNIVERSITY SCHOOL OF GRADUATE STUDIES We hereby approve the dissertation of SIPAT TRIUKOSE candidate for the Doctor of Philosophy degree *. MICHAEL RABINOVICH TEKIN OZSOYOGLU SHUDONG JIN VIRA CHANKONG MARK ALLMAN (date) December 1st, 2010 *We also certify that written approval has been obtained for any proprietary material contained therein. Contents List of Tables . vi List of Figures . ix List of Abbreviations . x Abstract . xi 1 Introduction 1 1.1 Internet Measurements . 1 1.2 Content Delivery Network (CDN) . 4 1.2.1 Akamai and Limelight . 6 1.2.2 Coral . 7 1.3 Outline . 7 1.4 Acknowledgement . 9 2 Related Work 10 2.1 On-demand Network Measurements . 10 2.2 Content Delivery Network (CDN) Research . 12 2.2.1 Performance Assessment . 12 2.2.2 Security . 13 2.2.3 Performance Improvement . 14 3 DipZoom: Peer-to-Peer Internet Measurement Platform 17 3.1 System Overview . 17 i 3.2 The DipZoom Measuring Point (MP) . 21 3.2.1 MP-Loader, MP-Class, and MP Configurations . 25 3.2.2 Authentication . 30 3.2.3 Keep Alive . 37 3.2.4 Measurement . 39 3.3 The DipZoom Client and API . 43 3.4 Security . 44 3.5 Performance . 47 3.5.1 Scalability: Measuring Point Fan-Out .
    [Show full text]
  • A Study of Peer-To-Peer Systems
    A Study of Peer-to-Peer Systems JIA, Lu A Thesis Submitted in Partial Fulfilment of the Requirements for the Degree of Master of Philosophy in Information Engineering The Chinese University of Hong Kong August 2009 Abstract of thesis entitled: A Study of Peer-to-Peer Systems Submitted by JIA, Lu for the degree of Master of Philosophy at The Chinese University of Hong Kong in June 2009 Peer-to-peer (P2P) systems have evolved rapidly and become immensely popular in Internet. Users in P2P systems can share resources with each other and in this way the server loading is reduced. P2P systems' good performance and scalability attract a lot of interest in the research community as well as in industry. Yet, P2P systems are very complicated systems. Building a P2P system requires carefully and repeatedly thinking and ex- amining architectural design issues. Instead of setting foot in all aspects of designing a P2P system, this thesis focuses on two things: analyzing reliability and performance of different tracker designs and studying a large-scale P2P file sharing system, Xun- lei. The "tracker" of a P2P system is used to lookup which peers hold (or partially hold) a given object. There are various designs for the tracker function, from a single-server tracker, to DHT- based (distributed hash table) serverless systems. In the first part of this thesis, we classify the different tracker designs, dis- cuss the different considerations for these designs, and provide simple models to evaluate the reliability of these designs. Xunlei is a new proprietary P2P file sharing protocol that has become very popular in China.
    [Show full text]
  • Content Distribution in P2P Systems Manal El Dick, Esther Pacitti
    Content Distribution in P2P Systems Manal El Dick, Esther Pacitti To cite this version: Manal El Dick, Esther Pacitti. Content Distribution in P2P Systems. [Research Report] RR-7138, INRIA. 2009. inria-00439171 HAL Id: inria-00439171 https://hal.inria.fr/inria-00439171 Submitted on 6 Dec 2009 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE Content Distribution in P2P Systems Manal El Dick — Esther Pacitti N° 7138 Décembre 2009 Thème COM apport de recherche ISSN 0249-6399 ISRN INRIA/RR--7138--FR+ENG Content Distribution in P2P Systems∗ Manal El Dick y, Esther Pacittiz Th`emeCOM | Syst`emescommunicants Equipe-Projet´ Atlas Rapport de recherche n° 7138 | D´ecembre 2009 | 63 pages Abstract: The report provides a literature review of the state-of-the-art for content distribution. The report's contributions are of threefold. First, it gives more insight into traditional Content Distribution Networks (CDN), their re- quirements and open issues. Second, it discusses Peer-to-Peer (P2P) systems as a cheap and scalable alternative for CDN and extracts their design challenges. Finally, it evaluates the existing P2P systems dedicated for content distribution according to the identified requirements and challenges.
    [Show full text]