Introduction to Peer-to-Peer Networking Applications and Malicious Peers Song Ye Dartmouth...
-
date post
21-Dec-2015 -
Category
Documents
-
view
223 -
download
2
Transcript of Introduction to Peer-to-Peer Networking Applications and Malicious Peers Song Ye Dartmouth...
Introduction to Peer-to-Peer Networking
Applications and Malicious Peers
Song YeDartmouth Experimental Visualization Laboratory
Department of Computer Science
Dartmouth College
For CS99 Team Project
ldquoDetect and Prevent Malicious Peers in a Peer-to-Peer Systemrdquo
httpwwwcsdartmouthedu~yesongP2PProjecthtml
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
What is Peer-to-Peer (P2P)
P2P is a communications model in which each party has the same capabilities and either party can initiate a communication session
Whatiscom P2P is a class of applications that takes advantage of resources ndash
storage cycles content human presence ndash available at the edges of the Internet
openp2pcom A type of network in which each workstation has equivalent capabil
ities and responsibilitiesWebopediacom
A P2P computer network refers to any network that does not have fixed clients and servers but a number of peer nodes that function as both clients and servers to other nodes on the network
Wikipediaorg
Definition
Everything except the clientserver model
Network of nodes with equivalent capabilitiesresponsibilities (symmetrical)
Nodes are both servers and clients
Whatrsquos new
Decentralize Scale
ndash people are envisioning much larger scale
Anonymityndash Protect identity and privacy
Securityndash Systems must deal with privacy and integrity
Stabilityndash Deal with unstable components as the edgesndash But can systems designed this way be more stable
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
P2P Applications
File Sharing (Gnutella) Overlay Networking (RON) Media Streaming (P2Cast) Backup and Data Archiving (OceanStore) Web Caching and Proxy (Squirrel) Database (PeerDB) CPU Cycles Sharing (SETIhome) hellip
File Sharing Killer application
P2P file sharing has been widely used ndash Napsterndash Gnutellandash eDonkeyndash Kazaandash Bittorrentndash hellip
File Sharing Pros and Cons
1048704(+) Potentially unlimited file exchange areas 1048704(+) High available safe storage duplication and
redundancy 1048704(+) Anonymity preserve anonymity of authors and
publishers 1048704(-) Network bandwidth consumption 1048704(-) Management 1048704(-) Search capabilities
P2P Overlay Networking (1)
Client Server
IP Network
Traditional System
IP Network
Overlay
Client Server
P2P Communication Network
P2P Overlay Networking (2)
An overlay network is a set of logical connections between end hosts
Overlay networks can be unstructured or structured
Proximity not necessarily taken into account
Overlay maintenance is an issue
Media Streaming in P2P Networks
P2P media streamingndash Peers playback and cache the media content
during the streaming sessionndash They stream the cached content to other peers if
requestedndash Some kind of multicast structure is used
Backup and Data Archiving
Storage space sharing Peers store data for each other
ndash Improve availability of their data When a peer loses its data
ndash Heterogeneity of peers enables data availability under virus attacks
No computer virus can attack all different OSes
ndash Cheaper than centralized backup services
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
What are malicious peers
If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally
The concept of malicious peers is application-specific
Malicious Peers (1)
File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip
Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip
Malicious Peers (2)
Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip
Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
Introduction to Media Streaming
Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )
Streaming Methodsndash Livendash On-Demand
Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)
An application of bandwidth allocation and sharing
Media Streaming vs File Downloading
File Downloading Media Streaming
Mode Open-after-downloading Play-while-downloading
Download Order Our of order In order
Download Speed Requirement
Average download speed matters
Require relatively steady download speed
Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)
Not widely used yet
Freeloaders Not a big issue A big problem
Collaborative P2P Media Streaming
Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea
m peers U(Pi) and downstream peers D(Pi)
ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable
ndash U(Pi) adjust streams to Pi accordingly
Streaming certificates are transferred piggyback with streaming control sequences
An Example
Incentive Mechanisms
A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner
A peer can get better streaming quality if it contributes more and earns more streaming certificates
Evaluation (1)
Simulation-based experiments are conducted
ndash Network topology is not considered
ndash There are no bandwidth limits in network connections
ndash Peers have inbound and outbound bandwidth limits
ndash Set different number of selfish peers
Number of Peers
Inbound
Bandwidth
Outbound
Bandwidth
Type 1 1200 112kbps 96kbps
Type 2 600 1mbps 600kbps
Type 3 200 10mbps 10mbps
An example configuration
ndash Multiple multicast trees are constructed and maintained
Evaluation (2)
The average bit rates that selfish peers receive are much less than collaborative ones
In the media streaming process selfish peers tend to be placed at the edges of multicast trees
Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora
tive to selfish
Average Bit Rate
0
100
200
300
400
500600
700
800
900
1000
300
600
900
1200
1500
1800
2100
2400
2700
3000
3300
3600
Time (seconds)
Ave
rag
e B
it R
ate
(kb
ps)
Type 1 C
Type 1 S
Type 2 C
Type 2 S
Type 3 C
Type 3 S
Change of Selfish Peers
0
5
10
15
20
25
30
35
Time
Per
cen
t o
f S
elfi
sh P
eers
10
20
30
Thank you
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-
For CS99 Team Project
ldquoDetect and Prevent Malicious Peers in a Peer-to-Peer Systemrdquo
httpwwwcsdartmouthedu~yesongP2PProjecthtml
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
What is Peer-to-Peer (P2P)
P2P is a communications model in which each party has the same capabilities and either party can initiate a communication session
Whatiscom P2P is a class of applications that takes advantage of resources ndash
storage cycles content human presence ndash available at the edges of the Internet
openp2pcom A type of network in which each workstation has equivalent capabil
ities and responsibilitiesWebopediacom
A P2P computer network refers to any network that does not have fixed clients and servers but a number of peer nodes that function as both clients and servers to other nodes on the network
Wikipediaorg
Definition
Everything except the clientserver model
Network of nodes with equivalent capabilitiesresponsibilities (symmetrical)
Nodes are both servers and clients
Whatrsquos new
Decentralize Scale
ndash people are envisioning much larger scale
Anonymityndash Protect identity and privacy
Securityndash Systems must deal with privacy and integrity
Stabilityndash Deal with unstable components as the edgesndash But can systems designed this way be more stable
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
P2P Applications
File Sharing (Gnutella) Overlay Networking (RON) Media Streaming (P2Cast) Backup and Data Archiving (OceanStore) Web Caching and Proxy (Squirrel) Database (PeerDB) CPU Cycles Sharing (SETIhome) hellip
File Sharing Killer application
P2P file sharing has been widely used ndash Napsterndash Gnutellandash eDonkeyndash Kazaandash Bittorrentndash hellip
File Sharing Pros and Cons
1048704(+) Potentially unlimited file exchange areas 1048704(+) High available safe storage duplication and
redundancy 1048704(+) Anonymity preserve anonymity of authors and
publishers 1048704(-) Network bandwidth consumption 1048704(-) Management 1048704(-) Search capabilities
P2P Overlay Networking (1)
Client Server
IP Network
Traditional System
IP Network
Overlay
Client Server
P2P Communication Network
P2P Overlay Networking (2)
An overlay network is a set of logical connections between end hosts
Overlay networks can be unstructured or structured
Proximity not necessarily taken into account
Overlay maintenance is an issue
Media Streaming in P2P Networks
P2P media streamingndash Peers playback and cache the media content
during the streaming sessionndash They stream the cached content to other peers if
requestedndash Some kind of multicast structure is used
Backup and Data Archiving
Storage space sharing Peers store data for each other
ndash Improve availability of their data When a peer loses its data
ndash Heterogeneity of peers enables data availability under virus attacks
No computer virus can attack all different OSes
ndash Cheaper than centralized backup services
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
What are malicious peers
If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally
The concept of malicious peers is application-specific
Malicious Peers (1)
File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip
Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip
Malicious Peers (2)
Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip
Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
Introduction to Media Streaming
Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )
Streaming Methodsndash Livendash On-Demand
Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)
An application of bandwidth allocation and sharing
Media Streaming vs File Downloading
File Downloading Media Streaming
Mode Open-after-downloading Play-while-downloading
Download Order Our of order In order
Download Speed Requirement
Average download speed matters
Require relatively steady download speed
Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)
Not widely used yet
Freeloaders Not a big issue A big problem
Collaborative P2P Media Streaming
Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea
m peers U(Pi) and downstream peers D(Pi)
ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable
ndash U(Pi) adjust streams to Pi accordingly
Streaming certificates are transferred piggyback with streaming control sequences
An Example
Incentive Mechanisms
A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner
A peer can get better streaming quality if it contributes more and earns more streaming certificates
Evaluation (1)
Simulation-based experiments are conducted
ndash Network topology is not considered
ndash There are no bandwidth limits in network connections
ndash Peers have inbound and outbound bandwidth limits
ndash Set different number of selfish peers
Number of Peers
Inbound
Bandwidth
Outbound
Bandwidth
Type 1 1200 112kbps 96kbps
Type 2 600 1mbps 600kbps
Type 3 200 10mbps 10mbps
An example configuration
ndash Multiple multicast trees are constructed and maintained
Evaluation (2)
The average bit rates that selfish peers receive are much less than collaborative ones
In the media streaming process selfish peers tend to be placed at the edges of multicast trees
Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora
tive to selfish
Average Bit Rate
0
100
200
300
400
500600
700
800
900
1000
300
600
900
1200
1500
1800
2100
2400
2700
3000
3300
3600
Time (seconds)
Ave
rag
e B
it R
ate
(kb
ps)
Type 1 C
Type 1 S
Type 2 C
Type 2 S
Type 3 C
Type 3 S
Change of Selfish Peers
0
5
10
15
20
25
30
35
Time
Per
cen
t o
f S
elfi
sh P
eers
10
20
30
Thank you
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
What is Peer-to-Peer (P2P)
P2P is a communications model in which each party has the same capabilities and either party can initiate a communication session
Whatiscom P2P is a class of applications that takes advantage of resources ndash
storage cycles content human presence ndash available at the edges of the Internet
openp2pcom A type of network in which each workstation has equivalent capabil
ities and responsibilitiesWebopediacom
A P2P computer network refers to any network that does not have fixed clients and servers but a number of peer nodes that function as both clients and servers to other nodes on the network
Wikipediaorg
Definition
Everything except the clientserver model
Network of nodes with equivalent capabilitiesresponsibilities (symmetrical)
Nodes are both servers and clients
Whatrsquos new
Decentralize Scale
ndash people are envisioning much larger scale
Anonymityndash Protect identity and privacy
Securityndash Systems must deal with privacy and integrity
Stabilityndash Deal with unstable components as the edgesndash But can systems designed this way be more stable
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
P2P Applications
File Sharing (Gnutella) Overlay Networking (RON) Media Streaming (P2Cast) Backup and Data Archiving (OceanStore) Web Caching and Proxy (Squirrel) Database (PeerDB) CPU Cycles Sharing (SETIhome) hellip
File Sharing Killer application
P2P file sharing has been widely used ndash Napsterndash Gnutellandash eDonkeyndash Kazaandash Bittorrentndash hellip
File Sharing Pros and Cons
1048704(+) Potentially unlimited file exchange areas 1048704(+) High available safe storage duplication and
redundancy 1048704(+) Anonymity preserve anonymity of authors and
publishers 1048704(-) Network bandwidth consumption 1048704(-) Management 1048704(-) Search capabilities
P2P Overlay Networking (1)
Client Server
IP Network
Traditional System
IP Network
Overlay
Client Server
P2P Communication Network
P2P Overlay Networking (2)
An overlay network is a set of logical connections between end hosts
Overlay networks can be unstructured or structured
Proximity not necessarily taken into account
Overlay maintenance is an issue
Media Streaming in P2P Networks
P2P media streamingndash Peers playback and cache the media content
during the streaming sessionndash They stream the cached content to other peers if
requestedndash Some kind of multicast structure is used
Backup and Data Archiving
Storage space sharing Peers store data for each other
ndash Improve availability of their data When a peer loses its data
ndash Heterogeneity of peers enables data availability under virus attacks
No computer virus can attack all different OSes
ndash Cheaper than centralized backup services
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
What are malicious peers
If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally
The concept of malicious peers is application-specific
Malicious Peers (1)
File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip
Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip
Malicious Peers (2)
Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip
Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
Introduction to Media Streaming
Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )
Streaming Methodsndash Livendash On-Demand
Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)
An application of bandwidth allocation and sharing
Media Streaming vs File Downloading
File Downloading Media Streaming
Mode Open-after-downloading Play-while-downloading
Download Order Our of order In order
Download Speed Requirement
Average download speed matters
Require relatively steady download speed
Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)
Not widely used yet
Freeloaders Not a big issue A big problem
Collaborative P2P Media Streaming
Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea
m peers U(Pi) and downstream peers D(Pi)
ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable
ndash U(Pi) adjust streams to Pi accordingly
Streaming certificates are transferred piggyback with streaming control sequences
An Example
Incentive Mechanisms
A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner
A peer can get better streaming quality if it contributes more and earns more streaming certificates
Evaluation (1)
Simulation-based experiments are conducted
ndash Network topology is not considered
ndash There are no bandwidth limits in network connections
ndash Peers have inbound and outbound bandwidth limits
ndash Set different number of selfish peers
Number of Peers
Inbound
Bandwidth
Outbound
Bandwidth
Type 1 1200 112kbps 96kbps
Type 2 600 1mbps 600kbps
Type 3 200 10mbps 10mbps
An example configuration
ndash Multiple multicast trees are constructed and maintained
Evaluation (2)
The average bit rates that selfish peers receive are much less than collaborative ones
In the media streaming process selfish peers tend to be placed at the edges of multicast trees
Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora
tive to selfish
Average Bit Rate
0
100
200
300
400
500600
700
800
900
1000
300
600
900
1200
1500
1800
2100
2400
2700
3000
3300
3600
Time (seconds)
Ave
rag
e B
it R
ate
(kb
ps)
Type 1 C
Type 1 S
Type 2 C
Type 2 S
Type 3 C
Type 3 S
Change of Selfish Peers
0
5
10
15
20
25
30
35
Time
Per
cen
t o
f S
elfi
sh P
eers
10
20
30
Thank you
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
What is Peer-to-Peer (P2P)
P2P is a communications model in which each party has the same capabilities and either party can initiate a communication session
Whatiscom P2P is a class of applications that takes advantage of resources ndash
storage cycles content human presence ndash available at the edges of the Internet
openp2pcom A type of network in which each workstation has equivalent capabil
ities and responsibilitiesWebopediacom
A P2P computer network refers to any network that does not have fixed clients and servers but a number of peer nodes that function as both clients and servers to other nodes on the network
Wikipediaorg
Definition
Everything except the clientserver model
Network of nodes with equivalent capabilitiesresponsibilities (symmetrical)
Nodes are both servers and clients
Whatrsquos new
Decentralize Scale
ndash people are envisioning much larger scale
Anonymityndash Protect identity and privacy
Securityndash Systems must deal with privacy and integrity
Stabilityndash Deal with unstable components as the edgesndash But can systems designed this way be more stable
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
P2P Applications
File Sharing (Gnutella) Overlay Networking (RON) Media Streaming (P2Cast) Backup and Data Archiving (OceanStore) Web Caching and Proxy (Squirrel) Database (PeerDB) CPU Cycles Sharing (SETIhome) hellip
File Sharing Killer application
P2P file sharing has been widely used ndash Napsterndash Gnutellandash eDonkeyndash Kazaandash Bittorrentndash hellip
File Sharing Pros and Cons
1048704(+) Potentially unlimited file exchange areas 1048704(+) High available safe storage duplication and
redundancy 1048704(+) Anonymity preserve anonymity of authors and
publishers 1048704(-) Network bandwidth consumption 1048704(-) Management 1048704(-) Search capabilities
P2P Overlay Networking (1)
Client Server
IP Network
Traditional System
IP Network
Overlay
Client Server
P2P Communication Network
P2P Overlay Networking (2)
An overlay network is a set of logical connections between end hosts
Overlay networks can be unstructured or structured
Proximity not necessarily taken into account
Overlay maintenance is an issue
Media Streaming in P2P Networks
P2P media streamingndash Peers playback and cache the media content
during the streaming sessionndash They stream the cached content to other peers if
requestedndash Some kind of multicast structure is used
Backup and Data Archiving
Storage space sharing Peers store data for each other
ndash Improve availability of their data When a peer loses its data
ndash Heterogeneity of peers enables data availability under virus attacks
No computer virus can attack all different OSes
ndash Cheaper than centralized backup services
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
What are malicious peers
If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally
The concept of malicious peers is application-specific
Malicious Peers (1)
File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip
Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip
Malicious Peers (2)
Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip
Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
Introduction to Media Streaming
Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )
Streaming Methodsndash Livendash On-Demand
Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)
An application of bandwidth allocation and sharing
Media Streaming vs File Downloading
File Downloading Media Streaming
Mode Open-after-downloading Play-while-downloading
Download Order Our of order In order
Download Speed Requirement
Average download speed matters
Require relatively steady download speed
Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)
Not widely used yet
Freeloaders Not a big issue A big problem
Collaborative P2P Media Streaming
Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea
m peers U(Pi) and downstream peers D(Pi)
ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable
ndash U(Pi) adjust streams to Pi accordingly
Streaming certificates are transferred piggyback with streaming control sequences
An Example
Incentive Mechanisms
A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner
A peer can get better streaming quality if it contributes more and earns more streaming certificates
Evaluation (1)
Simulation-based experiments are conducted
ndash Network topology is not considered
ndash There are no bandwidth limits in network connections
ndash Peers have inbound and outbound bandwidth limits
ndash Set different number of selfish peers
Number of Peers
Inbound
Bandwidth
Outbound
Bandwidth
Type 1 1200 112kbps 96kbps
Type 2 600 1mbps 600kbps
Type 3 200 10mbps 10mbps
An example configuration
ndash Multiple multicast trees are constructed and maintained
Evaluation (2)
The average bit rates that selfish peers receive are much less than collaborative ones
In the media streaming process selfish peers tend to be placed at the edges of multicast trees
Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora
tive to selfish
Average Bit Rate
0
100
200
300
400
500600
700
800
900
1000
300
600
900
1200
1500
1800
2100
2400
2700
3000
3300
3600
Time (seconds)
Ave
rag
e B
it R
ate
(kb
ps)
Type 1 C
Type 1 S
Type 2 C
Type 2 S
Type 3 C
Type 3 S
Change of Selfish Peers
0
5
10
15
20
25
30
35
Time
Per
cen
t o
f S
elfi
sh P
eers
10
20
30
Thank you
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-
What is Peer-to-Peer (P2P)
P2P is a communications model in which each party has the same capabilities and either party can initiate a communication session
Whatiscom P2P is a class of applications that takes advantage of resources ndash
storage cycles content human presence ndash available at the edges of the Internet
openp2pcom A type of network in which each workstation has equivalent capabil
ities and responsibilitiesWebopediacom
A P2P computer network refers to any network that does not have fixed clients and servers but a number of peer nodes that function as both clients and servers to other nodes on the network
Wikipediaorg
Definition
Everything except the clientserver model
Network of nodes with equivalent capabilitiesresponsibilities (symmetrical)
Nodes are both servers and clients
Whatrsquos new
Decentralize Scale
ndash people are envisioning much larger scale
Anonymityndash Protect identity and privacy
Securityndash Systems must deal with privacy and integrity
Stabilityndash Deal with unstable components as the edgesndash But can systems designed this way be more stable
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
P2P Applications
File Sharing (Gnutella) Overlay Networking (RON) Media Streaming (P2Cast) Backup and Data Archiving (OceanStore) Web Caching and Proxy (Squirrel) Database (PeerDB) CPU Cycles Sharing (SETIhome) hellip
File Sharing Killer application
P2P file sharing has been widely used ndash Napsterndash Gnutellandash eDonkeyndash Kazaandash Bittorrentndash hellip
File Sharing Pros and Cons
1048704(+) Potentially unlimited file exchange areas 1048704(+) High available safe storage duplication and
redundancy 1048704(+) Anonymity preserve anonymity of authors and
publishers 1048704(-) Network bandwidth consumption 1048704(-) Management 1048704(-) Search capabilities
P2P Overlay Networking (1)
Client Server
IP Network
Traditional System
IP Network
Overlay
Client Server
P2P Communication Network
P2P Overlay Networking (2)
An overlay network is a set of logical connections between end hosts
Overlay networks can be unstructured or structured
Proximity not necessarily taken into account
Overlay maintenance is an issue
Media Streaming in P2P Networks
P2P media streamingndash Peers playback and cache the media content
during the streaming sessionndash They stream the cached content to other peers if
requestedndash Some kind of multicast structure is used
Backup and Data Archiving
Storage space sharing Peers store data for each other
ndash Improve availability of their data When a peer loses its data
ndash Heterogeneity of peers enables data availability under virus attacks
No computer virus can attack all different OSes
ndash Cheaper than centralized backup services
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
What are malicious peers
If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally
The concept of malicious peers is application-specific
Malicious Peers (1)
File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip
Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip
Malicious Peers (2)
Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip
Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
Introduction to Media Streaming
Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )
Streaming Methodsndash Livendash On-Demand
Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)
An application of bandwidth allocation and sharing
Media Streaming vs File Downloading
File Downloading Media Streaming
Mode Open-after-downloading Play-while-downloading
Download Order Our of order In order
Download Speed Requirement
Average download speed matters
Require relatively steady download speed
Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)
Not widely used yet
Freeloaders Not a big issue A big problem
Collaborative P2P Media Streaming
Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea
m peers U(Pi) and downstream peers D(Pi)
ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable
ndash U(Pi) adjust streams to Pi accordingly
Streaming certificates are transferred piggyback with streaming control sequences
An Example
Incentive Mechanisms
A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner
A peer can get better streaming quality if it contributes more and earns more streaming certificates
Evaluation (1)
Simulation-based experiments are conducted
ndash Network topology is not considered
ndash There are no bandwidth limits in network connections
ndash Peers have inbound and outbound bandwidth limits
ndash Set different number of selfish peers
Number of Peers
Inbound
Bandwidth
Outbound
Bandwidth
Type 1 1200 112kbps 96kbps
Type 2 600 1mbps 600kbps
Type 3 200 10mbps 10mbps
An example configuration
ndash Multiple multicast trees are constructed and maintained
Evaluation (2)
The average bit rates that selfish peers receive are much less than collaborative ones
In the media streaming process selfish peers tend to be placed at the edges of multicast trees
Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora
tive to selfish
Average Bit Rate
0
100
200
300
400
500600
700
800
900
1000
300
600
900
1200
1500
1800
2100
2400
2700
3000
3300
3600
Time (seconds)
Ave
rag
e B
it R
ate
(kb
ps)
Type 1 C
Type 1 S
Type 2 C
Type 2 S
Type 3 C
Type 3 S
Change of Selfish Peers
0
5
10
15
20
25
30
35
Time
Per
cen
t o
f S
elfi
sh P
eers
10
20
30
Thank you
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-
Definition
Everything except the clientserver model
Network of nodes with equivalent capabilitiesresponsibilities (symmetrical)
Nodes are both servers and clients
Whatrsquos new
Decentralize Scale
ndash people are envisioning much larger scale
Anonymityndash Protect identity and privacy
Securityndash Systems must deal with privacy and integrity
Stabilityndash Deal with unstable components as the edgesndash But can systems designed this way be more stable
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
P2P Applications
File Sharing (Gnutella) Overlay Networking (RON) Media Streaming (P2Cast) Backup and Data Archiving (OceanStore) Web Caching and Proxy (Squirrel) Database (PeerDB) CPU Cycles Sharing (SETIhome) hellip
File Sharing Killer application
P2P file sharing has been widely used ndash Napsterndash Gnutellandash eDonkeyndash Kazaandash Bittorrentndash hellip
File Sharing Pros and Cons
1048704(+) Potentially unlimited file exchange areas 1048704(+) High available safe storage duplication and
redundancy 1048704(+) Anonymity preserve anonymity of authors and
publishers 1048704(-) Network bandwidth consumption 1048704(-) Management 1048704(-) Search capabilities
P2P Overlay Networking (1)
Client Server
IP Network
Traditional System
IP Network
Overlay
Client Server
P2P Communication Network
P2P Overlay Networking (2)
An overlay network is a set of logical connections between end hosts
Overlay networks can be unstructured or structured
Proximity not necessarily taken into account
Overlay maintenance is an issue
Media Streaming in P2P Networks
P2P media streamingndash Peers playback and cache the media content
during the streaming sessionndash They stream the cached content to other peers if
requestedndash Some kind of multicast structure is used
Backup and Data Archiving
Storage space sharing Peers store data for each other
ndash Improve availability of their data When a peer loses its data
ndash Heterogeneity of peers enables data availability under virus attacks
No computer virus can attack all different OSes
ndash Cheaper than centralized backup services
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
What are malicious peers
If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally
The concept of malicious peers is application-specific
Malicious Peers (1)
File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip
Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip
Malicious Peers (2)
Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip
Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
Introduction to Media Streaming
Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )
Streaming Methodsndash Livendash On-Demand
Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)
An application of bandwidth allocation and sharing
Media Streaming vs File Downloading
File Downloading Media Streaming
Mode Open-after-downloading Play-while-downloading
Download Order Our of order In order
Download Speed Requirement
Average download speed matters
Require relatively steady download speed
Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)
Not widely used yet
Freeloaders Not a big issue A big problem
Collaborative P2P Media Streaming
Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea
m peers U(Pi) and downstream peers D(Pi)
ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable
ndash U(Pi) adjust streams to Pi accordingly
Streaming certificates are transferred piggyback with streaming control sequences
An Example
Incentive Mechanisms
A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner
A peer can get better streaming quality if it contributes more and earns more streaming certificates
Evaluation (1)
Simulation-based experiments are conducted
ndash Network topology is not considered
ndash There are no bandwidth limits in network connections
ndash Peers have inbound and outbound bandwidth limits
ndash Set different number of selfish peers
Number of Peers
Inbound
Bandwidth
Outbound
Bandwidth
Type 1 1200 112kbps 96kbps
Type 2 600 1mbps 600kbps
Type 3 200 10mbps 10mbps
An example configuration
ndash Multiple multicast trees are constructed and maintained
Evaluation (2)
The average bit rates that selfish peers receive are much less than collaborative ones
In the media streaming process selfish peers tend to be placed at the edges of multicast trees
Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora
tive to selfish
Average Bit Rate
0
100
200
300
400
500600
700
800
900
1000
300
600
900
1200
1500
1800
2100
2400
2700
3000
3300
3600
Time (seconds)
Ave
rag
e B
it R
ate
(kb
ps)
Type 1 C
Type 1 S
Type 2 C
Type 2 S
Type 3 C
Type 3 S
Change of Selfish Peers
0
5
10
15
20
25
30
35
Time
Per
cen
t o
f S
elfi
sh P
eers
10
20
30
Thank you
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-
Whatrsquos new
Decentralize Scale
ndash people are envisioning much larger scale
Anonymityndash Protect identity and privacy
Securityndash Systems must deal with privacy and integrity
Stabilityndash Deal with unstable components as the edgesndash But can systems designed this way be more stable
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
P2P Applications
File Sharing (Gnutella) Overlay Networking (RON) Media Streaming (P2Cast) Backup and Data Archiving (OceanStore) Web Caching and Proxy (Squirrel) Database (PeerDB) CPU Cycles Sharing (SETIhome) hellip
File Sharing Killer application
P2P file sharing has been widely used ndash Napsterndash Gnutellandash eDonkeyndash Kazaandash Bittorrentndash hellip
File Sharing Pros and Cons
1048704(+) Potentially unlimited file exchange areas 1048704(+) High available safe storage duplication and
redundancy 1048704(+) Anonymity preserve anonymity of authors and
publishers 1048704(-) Network bandwidth consumption 1048704(-) Management 1048704(-) Search capabilities
P2P Overlay Networking (1)
Client Server
IP Network
Traditional System
IP Network
Overlay
Client Server
P2P Communication Network
P2P Overlay Networking (2)
An overlay network is a set of logical connections between end hosts
Overlay networks can be unstructured or structured
Proximity not necessarily taken into account
Overlay maintenance is an issue
Media Streaming in P2P Networks
P2P media streamingndash Peers playback and cache the media content
during the streaming sessionndash They stream the cached content to other peers if
requestedndash Some kind of multicast structure is used
Backup and Data Archiving
Storage space sharing Peers store data for each other
ndash Improve availability of their data When a peer loses its data
ndash Heterogeneity of peers enables data availability under virus attacks
No computer virus can attack all different OSes
ndash Cheaper than centralized backup services
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
What are malicious peers
If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally
The concept of malicious peers is application-specific
Malicious Peers (1)
File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip
Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip
Malicious Peers (2)
Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip
Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
Introduction to Media Streaming
Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )
Streaming Methodsndash Livendash On-Demand
Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)
An application of bandwidth allocation and sharing
Media Streaming vs File Downloading
File Downloading Media Streaming
Mode Open-after-downloading Play-while-downloading
Download Order Our of order In order
Download Speed Requirement
Average download speed matters
Require relatively steady download speed
Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)
Not widely used yet
Freeloaders Not a big issue A big problem
Collaborative P2P Media Streaming
Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea
m peers U(Pi) and downstream peers D(Pi)
ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable
ndash U(Pi) adjust streams to Pi accordingly
Streaming certificates are transferred piggyback with streaming control sequences
An Example
Incentive Mechanisms
A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner
A peer can get better streaming quality if it contributes more and earns more streaming certificates
Evaluation (1)
Simulation-based experiments are conducted
ndash Network topology is not considered
ndash There are no bandwidth limits in network connections
ndash Peers have inbound and outbound bandwidth limits
ndash Set different number of selfish peers
Number of Peers
Inbound
Bandwidth
Outbound
Bandwidth
Type 1 1200 112kbps 96kbps
Type 2 600 1mbps 600kbps
Type 3 200 10mbps 10mbps
An example configuration
ndash Multiple multicast trees are constructed and maintained
Evaluation (2)
The average bit rates that selfish peers receive are much less than collaborative ones
In the media streaming process selfish peers tend to be placed at the edges of multicast trees
Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora
tive to selfish
Average Bit Rate
0
100
200
300
400
500600
700
800
900
1000
300
600
900
1200
1500
1800
2100
2400
2700
3000
3300
3600
Time (seconds)
Ave
rag
e B
it R
ate
(kb
ps)
Type 1 C
Type 1 S
Type 2 C
Type 2 S
Type 3 C
Type 3 S
Change of Selfish Peers
0
5
10
15
20
25
30
35
Time
Per
cen
t o
f S
elfi
sh P
eers
10
20
30
Thank you
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
P2P Applications
File Sharing (Gnutella) Overlay Networking (RON) Media Streaming (P2Cast) Backup and Data Archiving (OceanStore) Web Caching and Proxy (Squirrel) Database (PeerDB) CPU Cycles Sharing (SETIhome) hellip
File Sharing Killer application
P2P file sharing has been widely used ndash Napsterndash Gnutellandash eDonkeyndash Kazaandash Bittorrentndash hellip
File Sharing Pros and Cons
1048704(+) Potentially unlimited file exchange areas 1048704(+) High available safe storage duplication and
redundancy 1048704(+) Anonymity preserve anonymity of authors and
publishers 1048704(-) Network bandwidth consumption 1048704(-) Management 1048704(-) Search capabilities
P2P Overlay Networking (1)
Client Server
IP Network
Traditional System
IP Network
Overlay
Client Server
P2P Communication Network
P2P Overlay Networking (2)
An overlay network is a set of logical connections between end hosts
Overlay networks can be unstructured or structured
Proximity not necessarily taken into account
Overlay maintenance is an issue
Media Streaming in P2P Networks
P2P media streamingndash Peers playback and cache the media content
during the streaming sessionndash They stream the cached content to other peers if
requestedndash Some kind of multicast structure is used
Backup and Data Archiving
Storage space sharing Peers store data for each other
ndash Improve availability of their data When a peer loses its data
ndash Heterogeneity of peers enables data availability under virus attacks
No computer virus can attack all different OSes
ndash Cheaper than centralized backup services
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
What are malicious peers
If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally
The concept of malicious peers is application-specific
Malicious Peers (1)
File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip
Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip
Malicious Peers (2)
Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip
Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
Introduction to Media Streaming
Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )
Streaming Methodsndash Livendash On-Demand
Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)
An application of bandwidth allocation and sharing
Media Streaming vs File Downloading
File Downloading Media Streaming
Mode Open-after-downloading Play-while-downloading
Download Order Our of order In order
Download Speed Requirement
Average download speed matters
Require relatively steady download speed
Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)
Not widely used yet
Freeloaders Not a big issue A big problem
Collaborative P2P Media Streaming
Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea
m peers U(Pi) and downstream peers D(Pi)
ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable
ndash U(Pi) adjust streams to Pi accordingly
Streaming certificates are transferred piggyback with streaming control sequences
An Example
Incentive Mechanisms
A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner
A peer can get better streaming quality if it contributes more and earns more streaming certificates
Evaluation (1)
Simulation-based experiments are conducted
ndash Network topology is not considered
ndash There are no bandwidth limits in network connections
ndash Peers have inbound and outbound bandwidth limits
ndash Set different number of selfish peers
Number of Peers
Inbound
Bandwidth
Outbound
Bandwidth
Type 1 1200 112kbps 96kbps
Type 2 600 1mbps 600kbps
Type 3 200 10mbps 10mbps
An example configuration
ndash Multiple multicast trees are constructed and maintained
Evaluation (2)
The average bit rates that selfish peers receive are much less than collaborative ones
In the media streaming process selfish peers tend to be placed at the edges of multicast trees
Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora
tive to selfish
Average Bit Rate
0
100
200
300
400
500600
700
800
900
1000
300
600
900
1200
1500
1800
2100
2400
2700
3000
3300
3600
Time (seconds)
Ave
rag
e B
it R
ate
(kb
ps)
Type 1 C
Type 1 S
Type 2 C
Type 2 S
Type 3 C
Type 3 S
Change of Selfish Peers
0
5
10
15
20
25
30
35
Time
Per
cen
t o
f S
elfi
sh P
eers
10
20
30
Thank you
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
P2P Applications
File Sharing (Gnutella) Overlay Networking (RON) Media Streaming (P2Cast) Backup and Data Archiving (OceanStore) Web Caching and Proxy (Squirrel) Database (PeerDB) CPU Cycles Sharing (SETIhome) hellip
File Sharing Killer application
P2P file sharing has been widely used ndash Napsterndash Gnutellandash eDonkeyndash Kazaandash Bittorrentndash hellip
File Sharing Pros and Cons
1048704(+) Potentially unlimited file exchange areas 1048704(+) High available safe storage duplication and
redundancy 1048704(+) Anonymity preserve anonymity of authors and
publishers 1048704(-) Network bandwidth consumption 1048704(-) Management 1048704(-) Search capabilities
P2P Overlay Networking (1)
Client Server
IP Network
Traditional System
IP Network
Overlay
Client Server
P2P Communication Network
P2P Overlay Networking (2)
An overlay network is a set of logical connections between end hosts
Overlay networks can be unstructured or structured
Proximity not necessarily taken into account
Overlay maintenance is an issue
Media Streaming in P2P Networks
P2P media streamingndash Peers playback and cache the media content
during the streaming sessionndash They stream the cached content to other peers if
requestedndash Some kind of multicast structure is used
Backup and Data Archiving
Storage space sharing Peers store data for each other
ndash Improve availability of their data When a peer loses its data
ndash Heterogeneity of peers enables data availability under virus attacks
No computer virus can attack all different OSes
ndash Cheaper than centralized backup services
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
What are malicious peers
If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally
The concept of malicious peers is application-specific
Malicious Peers (1)
File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip
Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip
Malicious Peers (2)
Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip
Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
Introduction to Media Streaming
Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )
Streaming Methodsndash Livendash On-Demand
Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)
An application of bandwidth allocation and sharing
Media Streaming vs File Downloading
File Downloading Media Streaming
Mode Open-after-downloading Play-while-downloading
Download Order Our of order In order
Download Speed Requirement
Average download speed matters
Require relatively steady download speed
Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)
Not widely used yet
Freeloaders Not a big issue A big problem
Collaborative P2P Media Streaming
Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea
m peers U(Pi) and downstream peers D(Pi)
ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable
ndash U(Pi) adjust streams to Pi accordingly
Streaming certificates are transferred piggyback with streaming control sequences
An Example
Incentive Mechanisms
A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner
A peer can get better streaming quality if it contributes more and earns more streaming certificates
Evaluation (1)
Simulation-based experiments are conducted
ndash Network topology is not considered
ndash There are no bandwidth limits in network connections
ndash Peers have inbound and outbound bandwidth limits
ndash Set different number of selfish peers
Number of Peers
Inbound
Bandwidth
Outbound
Bandwidth
Type 1 1200 112kbps 96kbps
Type 2 600 1mbps 600kbps
Type 3 200 10mbps 10mbps
An example configuration
ndash Multiple multicast trees are constructed and maintained
Evaluation (2)
The average bit rates that selfish peers receive are much less than collaborative ones
In the media streaming process selfish peers tend to be placed at the edges of multicast trees
Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora
tive to selfish
Average Bit Rate
0
100
200
300
400
500600
700
800
900
1000
300
600
900
1200
1500
1800
2100
2400
2700
3000
3300
3600
Time (seconds)
Ave
rag
e B
it R
ate
(kb
ps)
Type 1 C
Type 1 S
Type 2 C
Type 2 S
Type 3 C
Type 3 S
Change of Selfish Peers
0
5
10
15
20
25
30
35
Time
Per
cen
t o
f S
elfi
sh P
eers
10
20
30
Thank you
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-
P2P Applications
File Sharing (Gnutella) Overlay Networking (RON) Media Streaming (P2Cast) Backup and Data Archiving (OceanStore) Web Caching and Proxy (Squirrel) Database (PeerDB) CPU Cycles Sharing (SETIhome) hellip
File Sharing Killer application
P2P file sharing has been widely used ndash Napsterndash Gnutellandash eDonkeyndash Kazaandash Bittorrentndash hellip
File Sharing Pros and Cons
1048704(+) Potentially unlimited file exchange areas 1048704(+) High available safe storage duplication and
redundancy 1048704(+) Anonymity preserve anonymity of authors and
publishers 1048704(-) Network bandwidth consumption 1048704(-) Management 1048704(-) Search capabilities
P2P Overlay Networking (1)
Client Server
IP Network
Traditional System
IP Network
Overlay
Client Server
P2P Communication Network
P2P Overlay Networking (2)
An overlay network is a set of logical connections between end hosts
Overlay networks can be unstructured or structured
Proximity not necessarily taken into account
Overlay maintenance is an issue
Media Streaming in P2P Networks
P2P media streamingndash Peers playback and cache the media content
during the streaming sessionndash They stream the cached content to other peers if
requestedndash Some kind of multicast structure is used
Backup and Data Archiving
Storage space sharing Peers store data for each other
ndash Improve availability of their data When a peer loses its data
ndash Heterogeneity of peers enables data availability under virus attacks
No computer virus can attack all different OSes
ndash Cheaper than centralized backup services
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
What are malicious peers
If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally
The concept of malicious peers is application-specific
Malicious Peers (1)
File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip
Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip
Malicious Peers (2)
Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip
Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
Introduction to Media Streaming
Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )
Streaming Methodsndash Livendash On-Demand
Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)
An application of bandwidth allocation and sharing
Media Streaming vs File Downloading
File Downloading Media Streaming
Mode Open-after-downloading Play-while-downloading
Download Order Our of order In order
Download Speed Requirement
Average download speed matters
Require relatively steady download speed
Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)
Not widely used yet
Freeloaders Not a big issue A big problem
Collaborative P2P Media Streaming
Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea
m peers U(Pi) and downstream peers D(Pi)
ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable
ndash U(Pi) adjust streams to Pi accordingly
Streaming certificates are transferred piggyback with streaming control sequences
An Example
Incentive Mechanisms
A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner
A peer can get better streaming quality if it contributes more and earns more streaming certificates
Evaluation (1)
Simulation-based experiments are conducted
ndash Network topology is not considered
ndash There are no bandwidth limits in network connections
ndash Peers have inbound and outbound bandwidth limits
ndash Set different number of selfish peers
Number of Peers
Inbound
Bandwidth
Outbound
Bandwidth
Type 1 1200 112kbps 96kbps
Type 2 600 1mbps 600kbps
Type 3 200 10mbps 10mbps
An example configuration
ndash Multiple multicast trees are constructed and maintained
Evaluation (2)
The average bit rates that selfish peers receive are much less than collaborative ones
In the media streaming process selfish peers tend to be placed at the edges of multicast trees
Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora
tive to selfish
Average Bit Rate
0
100
200
300
400
500600
700
800
900
1000
300
600
900
1200
1500
1800
2100
2400
2700
3000
3300
3600
Time (seconds)
Ave
rag
e B
it R
ate
(kb
ps)
Type 1 C
Type 1 S
Type 2 C
Type 2 S
Type 3 C
Type 3 S
Change of Selfish Peers
0
5
10
15
20
25
30
35
Time
Per
cen
t o
f S
elfi
sh P
eers
10
20
30
Thank you
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-
File Sharing Killer application
P2P file sharing has been widely used ndash Napsterndash Gnutellandash eDonkeyndash Kazaandash Bittorrentndash hellip
File Sharing Pros and Cons
1048704(+) Potentially unlimited file exchange areas 1048704(+) High available safe storage duplication and
redundancy 1048704(+) Anonymity preserve anonymity of authors and
publishers 1048704(-) Network bandwidth consumption 1048704(-) Management 1048704(-) Search capabilities
P2P Overlay Networking (1)
Client Server
IP Network
Traditional System
IP Network
Overlay
Client Server
P2P Communication Network
P2P Overlay Networking (2)
An overlay network is a set of logical connections between end hosts
Overlay networks can be unstructured or structured
Proximity not necessarily taken into account
Overlay maintenance is an issue
Media Streaming in P2P Networks
P2P media streamingndash Peers playback and cache the media content
during the streaming sessionndash They stream the cached content to other peers if
requestedndash Some kind of multicast structure is used
Backup and Data Archiving
Storage space sharing Peers store data for each other
ndash Improve availability of their data When a peer loses its data
ndash Heterogeneity of peers enables data availability under virus attacks
No computer virus can attack all different OSes
ndash Cheaper than centralized backup services
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
What are malicious peers
If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally
The concept of malicious peers is application-specific
Malicious Peers (1)
File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip
Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip
Malicious Peers (2)
Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip
Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
Introduction to Media Streaming
Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )
Streaming Methodsndash Livendash On-Demand
Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)
An application of bandwidth allocation and sharing
Media Streaming vs File Downloading
File Downloading Media Streaming
Mode Open-after-downloading Play-while-downloading
Download Order Our of order In order
Download Speed Requirement
Average download speed matters
Require relatively steady download speed
Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)
Not widely used yet
Freeloaders Not a big issue A big problem
Collaborative P2P Media Streaming
Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea
m peers U(Pi) and downstream peers D(Pi)
ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable
ndash U(Pi) adjust streams to Pi accordingly
Streaming certificates are transferred piggyback with streaming control sequences
An Example
Incentive Mechanisms
A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner
A peer can get better streaming quality if it contributes more and earns more streaming certificates
Evaluation (1)
Simulation-based experiments are conducted
ndash Network topology is not considered
ndash There are no bandwidth limits in network connections
ndash Peers have inbound and outbound bandwidth limits
ndash Set different number of selfish peers
Number of Peers
Inbound
Bandwidth
Outbound
Bandwidth
Type 1 1200 112kbps 96kbps
Type 2 600 1mbps 600kbps
Type 3 200 10mbps 10mbps
An example configuration
ndash Multiple multicast trees are constructed and maintained
Evaluation (2)
The average bit rates that selfish peers receive are much less than collaborative ones
In the media streaming process selfish peers tend to be placed at the edges of multicast trees
Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora
tive to selfish
Average Bit Rate
0
100
200
300
400
500600
700
800
900
1000
300
600
900
1200
1500
1800
2100
2400
2700
3000
3300
3600
Time (seconds)
Ave
rag
e B
it R
ate
(kb
ps)
Type 1 C
Type 1 S
Type 2 C
Type 2 S
Type 3 C
Type 3 S
Change of Selfish Peers
0
5
10
15
20
25
30
35
Time
Per
cen
t o
f S
elfi
sh P
eers
10
20
30
Thank you
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-
File Sharing Pros and Cons
1048704(+) Potentially unlimited file exchange areas 1048704(+) High available safe storage duplication and
redundancy 1048704(+) Anonymity preserve anonymity of authors and
publishers 1048704(-) Network bandwidth consumption 1048704(-) Management 1048704(-) Search capabilities
P2P Overlay Networking (1)
Client Server
IP Network
Traditional System
IP Network
Overlay
Client Server
P2P Communication Network
P2P Overlay Networking (2)
An overlay network is a set of logical connections between end hosts
Overlay networks can be unstructured or structured
Proximity not necessarily taken into account
Overlay maintenance is an issue
Media Streaming in P2P Networks
P2P media streamingndash Peers playback and cache the media content
during the streaming sessionndash They stream the cached content to other peers if
requestedndash Some kind of multicast structure is used
Backup and Data Archiving
Storage space sharing Peers store data for each other
ndash Improve availability of their data When a peer loses its data
ndash Heterogeneity of peers enables data availability under virus attacks
No computer virus can attack all different OSes
ndash Cheaper than centralized backup services
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
What are malicious peers
If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally
The concept of malicious peers is application-specific
Malicious Peers (1)
File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip
Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip
Malicious Peers (2)
Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip
Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
Introduction to Media Streaming
Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )
Streaming Methodsndash Livendash On-Demand
Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)
An application of bandwidth allocation and sharing
Media Streaming vs File Downloading
File Downloading Media Streaming
Mode Open-after-downloading Play-while-downloading
Download Order Our of order In order
Download Speed Requirement
Average download speed matters
Require relatively steady download speed
Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)
Not widely used yet
Freeloaders Not a big issue A big problem
Collaborative P2P Media Streaming
Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea
m peers U(Pi) and downstream peers D(Pi)
ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable
ndash U(Pi) adjust streams to Pi accordingly
Streaming certificates are transferred piggyback with streaming control sequences
An Example
Incentive Mechanisms
A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner
A peer can get better streaming quality if it contributes more and earns more streaming certificates
Evaluation (1)
Simulation-based experiments are conducted
ndash Network topology is not considered
ndash There are no bandwidth limits in network connections
ndash Peers have inbound and outbound bandwidth limits
ndash Set different number of selfish peers
Number of Peers
Inbound
Bandwidth
Outbound
Bandwidth
Type 1 1200 112kbps 96kbps
Type 2 600 1mbps 600kbps
Type 3 200 10mbps 10mbps
An example configuration
ndash Multiple multicast trees are constructed and maintained
Evaluation (2)
The average bit rates that selfish peers receive are much less than collaborative ones
In the media streaming process selfish peers tend to be placed at the edges of multicast trees
Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora
tive to selfish
Average Bit Rate
0
100
200
300
400
500600
700
800
900
1000
300
600
900
1200
1500
1800
2100
2400
2700
3000
3300
3600
Time (seconds)
Ave
rag
e B
it R
ate
(kb
ps)
Type 1 C
Type 1 S
Type 2 C
Type 2 S
Type 3 C
Type 3 S
Change of Selfish Peers
0
5
10
15
20
25
30
35
Time
Per
cen
t o
f S
elfi
sh P
eers
10
20
30
Thank you
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-
P2P Overlay Networking (1)
Client Server
IP Network
Traditional System
IP Network
Overlay
Client Server
P2P Communication Network
P2P Overlay Networking (2)
An overlay network is a set of logical connections between end hosts
Overlay networks can be unstructured or structured
Proximity not necessarily taken into account
Overlay maintenance is an issue
Media Streaming in P2P Networks
P2P media streamingndash Peers playback and cache the media content
during the streaming sessionndash They stream the cached content to other peers if
requestedndash Some kind of multicast structure is used
Backup and Data Archiving
Storage space sharing Peers store data for each other
ndash Improve availability of their data When a peer loses its data
ndash Heterogeneity of peers enables data availability under virus attacks
No computer virus can attack all different OSes
ndash Cheaper than centralized backup services
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
What are malicious peers
If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally
The concept of malicious peers is application-specific
Malicious Peers (1)
File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip
Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip
Malicious Peers (2)
Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip
Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
Introduction to Media Streaming
Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )
Streaming Methodsndash Livendash On-Demand
Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)
An application of bandwidth allocation and sharing
Media Streaming vs File Downloading
File Downloading Media Streaming
Mode Open-after-downloading Play-while-downloading
Download Order Our of order In order
Download Speed Requirement
Average download speed matters
Require relatively steady download speed
Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)
Not widely used yet
Freeloaders Not a big issue A big problem
Collaborative P2P Media Streaming
Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea
m peers U(Pi) and downstream peers D(Pi)
ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable
ndash U(Pi) adjust streams to Pi accordingly
Streaming certificates are transferred piggyback with streaming control sequences
An Example
Incentive Mechanisms
A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner
A peer can get better streaming quality if it contributes more and earns more streaming certificates
Evaluation (1)
Simulation-based experiments are conducted
ndash Network topology is not considered
ndash There are no bandwidth limits in network connections
ndash Peers have inbound and outbound bandwidth limits
ndash Set different number of selfish peers
Number of Peers
Inbound
Bandwidth
Outbound
Bandwidth
Type 1 1200 112kbps 96kbps
Type 2 600 1mbps 600kbps
Type 3 200 10mbps 10mbps
An example configuration
ndash Multiple multicast trees are constructed and maintained
Evaluation (2)
The average bit rates that selfish peers receive are much less than collaborative ones
In the media streaming process selfish peers tend to be placed at the edges of multicast trees
Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora
tive to selfish
Average Bit Rate
0
100
200
300
400
500600
700
800
900
1000
300
600
900
1200
1500
1800
2100
2400
2700
3000
3300
3600
Time (seconds)
Ave
rag
e B
it R
ate
(kb
ps)
Type 1 C
Type 1 S
Type 2 C
Type 2 S
Type 3 C
Type 3 S
Change of Selfish Peers
0
5
10
15
20
25
30
35
Time
Per
cen
t o
f S
elfi
sh P
eers
10
20
30
Thank you
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-
P2P Overlay Networking (2)
An overlay network is a set of logical connections between end hosts
Overlay networks can be unstructured or structured
Proximity not necessarily taken into account
Overlay maintenance is an issue
Media Streaming in P2P Networks
P2P media streamingndash Peers playback and cache the media content
during the streaming sessionndash They stream the cached content to other peers if
requestedndash Some kind of multicast structure is used
Backup and Data Archiving
Storage space sharing Peers store data for each other
ndash Improve availability of their data When a peer loses its data
ndash Heterogeneity of peers enables data availability under virus attacks
No computer virus can attack all different OSes
ndash Cheaper than centralized backup services
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
What are malicious peers
If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally
The concept of malicious peers is application-specific
Malicious Peers (1)
File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip
Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip
Malicious Peers (2)
Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip
Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
Introduction to Media Streaming
Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )
Streaming Methodsndash Livendash On-Demand
Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)
An application of bandwidth allocation and sharing
Media Streaming vs File Downloading
File Downloading Media Streaming
Mode Open-after-downloading Play-while-downloading
Download Order Our of order In order
Download Speed Requirement
Average download speed matters
Require relatively steady download speed
Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)
Not widely used yet
Freeloaders Not a big issue A big problem
Collaborative P2P Media Streaming
Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea
m peers U(Pi) and downstream peers D(Pi)
ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable
ndash U(Pi) adjust streams to Pi accordingly
Streaming certificates are transferred piggyback with streaming control sequences
An Example
Incentive Mechanisms
A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner
A peer can get better streaming quality if it contributes more and earns more streaming certificates
Evaluation (1)
Simulation-based experiments are conducted
ndash Network topology is not considered
ndash There are no bandwidth limits in network connections
ndash Peers have inbound and outbound bandwidth limits
ndash Set different number of selfish peers
Number of Peers
Inbound
Bandwidth
Outbound
Bandwidth
Type 1 1200 112kbps 96kbps
Type 2 600 1mbps 600kbps
Type 3 200 10mbps 10mbps
An example configuration
ndash Multiple multicast trees are constructed and maintained
Evaluation (2)
The average bit rates that selfish peers receive are much less than collaborative ones
In the media streaming process selfish peers tend to be placed at the edges of multicast trees
Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora
tive to selfish
Average Bit Rate
0
100
200
300
400
500600
700
800
900
1000
300
600
900
1200
1500
1800
2100
2400
2700
3000
3300
3600
Time (seconds)
Ave
rag
e B
it R
ate
(kb
ps)
Type 1 C
Type 1 S
Type 2 C
Type 2 S
Type 3 C
Type 3 S
Change of Selfish Peers
0
5
10
15
20
25
30
35
Time
Per
cen
t o
f S
elfi
sh P
eers
10
20
30
Thank you
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-
Media Streaming in P2P Networks
P2P media streamingndash Peers playback and cache the media content
during the streaming sessionndash They stream the cached content to other peers if
requestedndash Some kind of multicast structure is used
Backup and Data Archiving
Storage space sharing Peers store data for each other
ndash Improve availability of their data When a peer loses its data
ndash Heterogeneity of peers enables data availability under virus attacks
No computer virus can attack all different OSes
ndash Cheaper than centralized backup services
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
What are malicious peers
If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally
The concept of malicious peers is application-specific
Malicious Peers (1)
File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip
Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip
Malicious Peers (2)
Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip
Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
Introduction to Media Streaming
Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )
Streaming Methodsndash Livendash On-Demand
Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)
An application of bandwidth allocation and sharing
Media Streaming vs File Downloading
File Downloading Media Streaming
Mode Open-after-downloading Play-while-downloading
Download Order Our of order In order
Download Speed Requirement
Average download speed matters
Require relatively steady download speed
Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)
Not widely used yet
Freeloaders Not a big issue A big problem
Collaborative P2P Media Streaming
Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea
m peers U(Pi) and downstream peers D(Pi)
ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable
ndash U(Pi) adjust streams to Pi accordingly
Streaming certificates are transferred piggyback with streaming control sequences
An Example
Incentive Mechanisms
A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner
A peer can get better streaming quality if it contributes more and earns more streaming certificates
Evaluation (1)
Simulation-based experiments are conducted
ndash Network topology is not considered
ndash There are no bandwidth limits in network connections
ndash Peers have inbound and outbound bandwidth limits
ndash Set different number of selfish peers
Number of Peers
Inbound
Bandwidth
Outbound
Bandwidth
Type 1 1200 112kbps 96kbps
Type 2 600 1mbps 600kbps
Type 3 200 10mbps 10mbps
An example configuration
ndash Multiple multicast trees are constructed and maintained
Evaluation (2)
The average bit rates that selfish peers receive are much less than collaborative ones
In the media streaming process selfish peers tend to be placed at the edges of multicast trees
Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora
tive to selfish
Average Bit Rate
0
100
200
300
400
500600
700
800
900
1000
300
600
900
1200
1500
1800
2100
2400
2700
3000
3300
3600
Time (seconds)
Ave
rag
e B
it R
ate
(kb
ps)
Type 1 C
Type 1 S
Type 2 C
Type 2 S
Type 3 C
Type 3 S
Change of Selfish Peers
0
5
10
15
20
25
30
35
Time
Per
cen
t o
f S
elfi
sh P
eers
10
20
30
Thank you
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-
Backup and Data Archiving
Storage space sharing Peers store data for each other
ndash Improve availability of their data When a peer loses its data
ndash Heterogeneity of peers enables data availability under virus attacks
No computer virus can attack all different OSes
ndash Cheaper than centralized backup services
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
What are malicious peers
If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally
The concept of malicious peers is application-specific
Malicious Peers (1)
File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip
Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip
Malicious Peers (2)
Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip
Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
Introduction to Media Streaming
Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )
Streaming Methodsndash Livendash On-Demand
Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)
An application of bandwidth allocation and sharing
Media Streaming vs File Downloading
File Downloading Media Streaming
Mode Open-after-downloading Play-while-downloading
Download Order Our of order In order
Download Speed Requirement
Average download speed matters
Require relatively steady download speed
Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)
Not widely used yet
Freeloaders Not a big issue A big problem
Collaborative P2P Media Streaming
Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea
m peers U(Pi) and downstream peers D(Pi)
ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable
ndash U(Pi) adjust streams to Pi accordingly
Streaming certificates are transferred piggyback with streaming control sequences
An Example
Incentive Mechanisms
A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner
A peer can get better streaming quality if it contributes more and earns more streaming certificates
Evaluation (1)
Simulation-based experiments are conducted
ndash Network topology is not considered
ndash There are no bandwidth limits in network connections
ndash Peers have inbound and outbound bandwidth limits
ndash Set different number of selfish peers
Number of Peers
Inbound
Bandwidth
Outbound
Bandwidth
Type 1 1200 112kbps 96kbps
Type 2 600 1mbps 600kbps
Type 3 200 10mbps 10mbps
An example configuration
ndash Multiple multicast trees are constructed and maintained
Evaluation (2)
The average bit rates that selfish peers receive are much less than collaborative ones
In the media streaming process selfish peers tend to be placed at the edges of multicast trees
Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora
tive to selfish
Average Bit Rate
0
100
200
300
400
500600
700
800
900
1000
300
600
900
1200
1500
1800
2100
2400
2700
3000
3300
3600
Time (seconds)
Ave
rag
e B
it R
ate
(kb
ps)
Type 1 C
Type 1 S
Type 2 C
Type 2 S
Type 3 C
Type 3 S
Change of Selfish Peers
0
5
10
15
20
25
30
35
Time
Per
cen
t o
f S
elfi
sh P
eers
10
20
30
Thank you
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
What are malicious peers
If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally
The concept of malicious peers is application-specific
Malicious Peers (1)
File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip
Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip
Malicious Peers (2)
Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip
Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
Introduction to Media Streaming
Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )
Streaming Methodsndash Livendash On-Demand
Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)
An application of bandwidth allocation and sharing
Media Streaming vs File Downloading
File Downloading Media Streaming
Mode Open-after-downloading Play-while-downloading
Download Order Our of order In order
Download Speed Requirement
Average download speed matters
Require relatively steady download speed
Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)
Not widely used yet
Freeloaders Not a big issue A big problem
Collaborative P2P Media Streaming
Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea
m peers U(Pi) and downstream peers D(Pi)
ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable
ndash U(Pi) adjust streams to Pi accordingly
Streaming certificates are transferred piggyback with streaming control sequences
An Example
Incentive Mechanisms
A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner
A peer can get better streaming quality if it contributes more and earns more streaming certificates
Evaluation (1)
Simulation-based experiments are conducted
ndash Network topology is not considered
ndash There are no bandwidth limits in network connections
ndash Peers have inbound and outbound bandwidth limits
ndash Set different number of selfish peers
Number of Peers
Inbound
Bandwidth
Outbound
Bandwidth
Type 1 1200 112kbps 96kbps
Type 2 600 1mbps 600kbps
Type 3 200 10mbps 10mbps
An example configuration
ndash Multiple multicast trees are constructed and maintained
Evaluation (2)
The average bit rates that selfish peers receive are much less than collaborative ones
In the media streaming process selfish peers tend to be placed at the edges of multicast trees
Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora
tive to selfish
Average Bit Rate
0
100
200
300
400
500600
700
800
900
1000
300
600
900
1200
1500
1800
2100
2400
2700
3000
3300
3600
Time (seconds)
Ave
rag
e B
it R
ate
(kb
ps)
Type 1 C
Type 1 S
Type 2 C
Type 2 S
Type 3 C
Type 3 S
Change of Selfish Peers
0
5
10
15
20
25
30
35
Time
Per
cen
t o
f S
elfi
sh P
eers
10
20
30
Thank you
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-
What are malicious peers
If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally
The concept of malicious peers is application-specific
Malicious Peers (1)
File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip
Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip
Malicious Peers (2)
Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip
Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
Introduction to Media Streaming
Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )
Streaming Methodsndash Livendash On-Demand
Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)
An application of bandwidth allocation and sharing
Media Streaming vs File Downloading
File Downloading Media Streaming
Mode Open-after-downloading Play-while-downloading
Download Order Our of order In order
Download Speed Requirement
Average download speed matters
Require relatively steady download speed
Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)
Not widely used yet
Freeloaders Not a big issue A big problem
Collaborative P2P Media Streaming
Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea
m peers U(Pi) and downstream peers D(Pi)
ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable
ndash U(Pi) adjust streams to Pi accordingly
Streaming certificates are transferred piggyback with streaming control sequences
An Example
Incentive Mechanisms
A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner
A peer can get better streaming quality if it contributes more and earns more streaming certificates
Evaluation (1)
Simulation-based experiments are conducted
ndash Network topology is not considered
ndash There are no bandwidth limits in network connections
ndash Peers have inbound and outbound bandwidth limits
ndash Set different number of selfish peers
Number of Peers
Inbound
Bandwidth
Outbound
Bandwidth
Type 1 1200 112kbps 96kbps
Type 2 600 1mbps 600kbps
Type 3 200 10mbps 10mbps
An example configuration
ndash Multiple multicast trees are constructed and maintained
Evaluation (2)
The average bit rates that selfish peers receive are much less than collaborative ones
In the media streaming process selfish peers tend to be placed at the edges of multicast trees
Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora
tive to selfish
Average Bit Rate
0
100
200
300
400
500600
700
800
900
1000
300
600
900
1200
1500
1800
2100
2400
2700
3000
3300
3600
Time (seconds)
Ave
rag
e B
it R
ate
(kb
ps)
Type 1 C
Type 1 S
Type 2 C
Type 2 S
Type 3 C
Type 3 S
Change of Selfish Peers
0
5
10
15
20
25
30
35
Time
Per
cen
t o
f S
elfi
sh P
eers
10
20
30
Thank you
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-
Malicious Peers (1)
File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip
Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip
Malicious Peers (2)
Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip
Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
Introduction to Media Streaming
Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )
Streaming Methodsndash Livendash On-Demand
Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)
An application of bandwidth allocation and sharing
Media Streaming vs File Downloading
File Downloading Media Streaming
Mode Open-after-downloading Play-while-downloading
Download Order Our of order In order
Download Speed Requirement
Average download speed matters
Require relatively steady download speed
Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)
Not widely used yet
Freeloaders Not a big issue A big problem
Collaborative P2P Media Streaming
Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea
m peers U(Pi) and downstream peers D(Pi)
ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable
ndash U(Pi) adjust streams to Pi accordingly
Streaming certificates are transferred piggyback with streaming control sequences
An Example
Incentive Mechanisms
A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner
A peer can get better streaming quality if it contributes more and earns more streaming certificates
Evaluation (1)
Simulation-based experiments are conducted
ndash Network topology is not considered
ndash There are no bandwidth limits in network connections
ndash Peers have inbound and outbound bandwidth limits
ndash Set different number of selfish peers
Number of Peers
Inbound
Bandwidth
Outbound
Bandwidth
Type 1 1200 112kbps 96kbps
Type 2 600 1mbps 600kbps
Type 3 200 10mbps 10mbps
An example configuration
ndash Multiple multicast trees are constructed and maintained
Evaluation (2)
The average bit rates that selfish peers receive are much less than collaborative ones
In the media streaming process selfish peers tend to be placed at the edges of multicast trees
Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora
tive to selfish
Average Bit Rate
0
100
200
300
400
500600
700
800
900
1000
300
600
900
1200
1500
1800
2100
2400
2700
3000
3300
3600
Time (seconds)
Ave
rag
e B
it R
ate
(kb
ps)
Type 1 C
Type 1 S
Type 2 C
Type 2 S
Type 3 C
Type 3 S
Change of Selfish Peers
0
5
10
15
20
25
30
35
Time
Per
cen
t o
f S
elfi
sh P
eers
10
20
30
Thank you
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-
Malicious Peers (2)
Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip
Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
Introduction to Media Streaming
Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )
Streaming Methodsndash Livendash On-Demand
Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)
An application of bandwidth allocation and sharing
Media Streaming vs File Downloading
File Downloading Media Streaming
Mode Open-after-downloading Play-while-downloading
Download Order Our of order In order
Download Speed Requirement
Average download speed matters
Require relatively steady download speed
Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)
Not widely used yet
Freeloaders Not a big issue A big problem
Collaborative P2P Media Streaming
Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea
m peers U(Pi) and downstream peers D(Pi)
ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable
ndash U(Pi) adjust streams to Pi accordingly
Streaming certificates are transferred piggyback with streaming control sequences
An Example
Incentive Mechanisms
A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner
A peer can get better streaming quality if it contributes more and earns more streaming certificates
Evaluation (1)
Simulation-based experiments are conducted
ndash Network topology is not considered
ndash There are no bandwidth limits in network connections
ndash Peers have inbound and outbound bandwidth limits
ndash Set different number of selfish peers
Number of Peers
Inbound
Bandwidth
Outbound
Bandwidth
Type 1 1200 112kbps 96kbps
Type 2 600 1mbps 600kbps
Type 3 200 10mbps 10mbps
An example configuration
ndash Multiple multicast trees are constructed and maintained
Evaluation (2)
The average bit rates that selfish peers receive are much less than collaborative ones
In the media streaming process selfish peers tend to be placed at the edges of multicast trees
Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora
tive to selfish
Average Bit Rate
0
100
200
300
400
500600
700
800
900
1000
300
600
900
1200
1500
1800
2100
2400
2700
3000
3300
3600
Time (seconds)
Ave
rag
e B
it R
ate
(kb
ps)
Type 1 C
Type 1 S
Type 2 C
Type 2 S
Type 3 C
Type 3 S
Change of Selfish Peers
0
5
10
15
20
25
30
35
Time
Per
cen
t o
f S
elfi
sh P
eers
10
20
30
Thank you
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-
Outline
What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming
Introduction to Media Streaming
Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )
Streaming Methodsndash Livendash On-Demand
Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)
An application of bandwidth allocation and sharing
Media Streaming vs File Downloading
File Downloading Media Streaming
Mode Open-after-downloading Play-while-downloading
Download Order Our of order In order
Download Speed Requirement
Average download speed matters
Require relatively steady download speed
Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)
Not widely used yet
Freeloaders Not a big issue A big problem
Collaborative P2P Media Streaming
Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea
m peers U(Pi) and downstream peers D(Pi)
ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable
ndash U(Pi) adjust streams to Pi accordingly
Streaming certificates are transferred piggyback with streaming control sequences
An Example
Incentive Mechanisms
A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner
A peer can get better streaming quality if it contributes more and earns more streaming certificates
Evaluation (1)
Simulation-based experiments are conducted
ndash Network topology is not considered
ndash There are no bandwidth limits in network connections
ndash Peers have inbound and outbound bandwidth limits
ndash Set different number of selfish peers
Number of Peers
Inbound
Bandwidth
Outbound
Bandwidth
Type 1 1200 112kbps 96kbps
Type 2 600 1mbps 600kbps
Type 3 200 10mbps 10mbps
An example configuration
ndash Multiple multicast trees are constructed and maintained
Evaluation (2)
The average bit rates that selfish peers receive are much less than collaborative ones
In the media streaming process selfish peers tend to be placed at the edges of multicast trees
Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora
tive to selfish
Average Bit Rate
0
100
200
300
400
500600
700
800
900
1000
300
600
900
1200
1500
1800
2100
2400
2700
3000
3300
3600
Time (seconds)
Ave
rag
e B
it R
ate
(kb
ps)
Type 1 C
Type 1 S
Type 2 C
Type 2 S
Type 3 C
Type 3 S
Change of Selfish Peers
0
5
10
15
20
25
30
35
Time
Per
cen
t o
f S
elfi
sh P
eers
10
20
30
Thank you
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-
Introduction to Media Streaming
Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )
Streaming Methodsndash Livendash On-Demand
Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)
An application of bandwidth allocation and sharing
Media Streaming vs File Downloading
File Downloading Media Streaming
Mode Open-after-downloading Play-while-downloading
Download Order Our of order In order
Download Speed Requirement
Average download speed matters
Require relatively steady download speed
Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)
Not widely used yet
Freeloaders Not a big issue A big problem
Collaborative P2P Media Streaming
Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea
m peers U(Pi) and downstream peers D(Pi)
ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable
ndash U(Pi) adjust streams to Pi accordingly
Streaming certificates are transferred piggyback with streaming control sequences
An Example
Incentive Mechanisms
A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner
A peer can get better streaming quality if it contributes more and earns more streaming certificates
Evaluation (1)
Simulation-based experiments are conducted
ndash Network topology is not considered
ndash There are no bandwidth limits in network connections
ndash Peers have inbound and outbound bandwidth limits
ndash Set different number of selfish peers
Number of Peers
Inbound
Bandwidth
Outbound
Bandwidth
Type 1 1200 112kbps 96kbps
Type 2 600 1mbps 600kbps
Type 3 200 10mbps 10mbps
An example configuration
ndash Multiple multicast trees are constructed and maintained
Evaluation (2)
The average bit rates that selfish peers receive are much less than collaborative ones
In the media streaming process selfish peers tend to be placed at the edges of multicast trees
Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora
tive to selfish
Average Bit Rate
0
100
200
300
400
500600
700
800
900
1000
300
600
900
1200
1500
1800
2100
2400
2700
3000
3300
3600
Time (seconds)
Ave
rag
e B
it R
ate
(kb
ps)
Type 1 C
Type 1 S
Type 2 C
Type 2 S
Type 3 C
Type 3 S
Change of Selfish Peers
0
5
10
15
20
25
30
35
Time
Per
cen
t o
f S
elfi
sh P
eers
10
20
30
Thank you
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-
Media Streaming vs File Downloading
File Downloading Media Streaming
Mode Open-after-downloading Play-while-downloading
Download Order Our of order In order
Download Speed Requirement
Average download speed matters
Require relatively steady download speed
Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)
Not widely used yet
Freeloaders Not a big issue A big problem
Collaborative P2P Media Streaming
Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea
m peers U(Pi) and downstream peers D(Pi)
ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable
ndash U(Pi) adjust streams to Pi accordingly
Streaming certificates are transferred piggyback with streaming control sequences
An Example
Incentive Mechanisms
A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner
A peer can get better streaming quality if it contributes more and earns more streaming certificates
Evaluation (1)
Simulation-based experiments are conducted
ndash Network topology is not considered
ndash There are no bandwidth limits in network connections
ndash Peers have inbound and outbound bandwidth limits
ndash Set different number of selfish peers
Number of Peers
Inbound
Bandwidth
Outbound
Bandwidth
Type 1 1200 112kbps 96kbps
Type 2 600 1mbps 600kbps
Type 3 200 10mbps 10mbps
An example configuration
ndash Multiple multicast trees are constructed and maintained
Evaluation (2)
The average bit rates that selfish peers receive are much less than collaborative ones
In the media streaming process selfish peers tend to be placed at the edges of multicast trees
Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora
tive to selfish
Average Bit Rate
0
100
200
300
400
500600
700
800
900
1000
300
600
900
1200
1500
1800
2100
2400
2700
3000
3300
3600
Time (seconds)
Ave
rag
e B
it R
ate
(kb
ps)
Type 1 C
Type 1 S
Type 2 C
Type 2 S
Type 3 C
Type 3 S
Change of Selfish Peers
0
5
10
15
20
25
30
35
Time
Per
cen
t o
f S
elfi
sh P
eers
10
20
30
Thank you
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-
Collaborative P2P Media Streaming
Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea
m peers U(Pi) and downstream peers D(Pi)
ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable
ndash U(Pi) adjust streams to Pi accordingly
Streaming certificates are transferred piggyback with streaming control sequences
An Example
Incentive Mechanisms
A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner
A peer can get better streaming quality if it contributes more and earns more streaming certificates
Evaluation (1)
Simulation-based experiments are conducted
ndash Network topology is not considered
ndash There are no bandwidth limits in network connections
ndash Peers have inbound and outbound bandwidth limits
ndash Set different number of selfish peers
Number of Peers
Inbound
Bandwidth
Outbound
Bandwidth
Type 1 1200 112kbps 96kbps
Type 2 600 1mbps 600kbps
Type 3 200 10mbps 10mbps
An example configuration
ndash Multiple multicast trees are constructed and maintained
Evaluation (2)
The average bit rates that selfish peers receive are much less than collaborative ones
In the media streaming process selfish peers tend to be placed at the edges of multicast trees
Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora
tive to selfish
Average Bit Rate
0
100
200
300
400
500600
700
800
900
1000
300
600
900
1200
1500
1800
2100
2400
2700
3000
3300
3600
Time (seconds)
Ave
rag
e B
it R
ate
(kb
ps)
Type 1 C
Type 1 S
Type 2 C
Type 2 S
Type 3 C
Type 3 S
Change of Selfish Peers
0
5
10
15
20
25
30
35
Time
Per
cen
t o
f S
elfi
sh P
eers
10
20
30
Thank you
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-
An Example
Incentive Mechanisms
A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner
A peer can get better streaming quality if it contributes more and earns more streaming certificates
Evaluation (1)
Simulation-based experiments are conducted
ndash Network topology is not considered
ndash There are no bandwidth limits in network connections
ndash Peers have inbound and outbound bandwidth limits
ndash Set different number of selfish peers
Number of Peers
Inbound
Bandwidth
Outbound
Bandwidth
Type 1 1200 112kbps 96kbps
Type 2 600 1mbps 600kbps
Type 3 200 10mbps 10mbps
An example configuration
ndash Multiple multicast trees are constructed and maintained
Evaluation (2)
The average bit rates that selfish peers receive are much less than collaborative ones
In the media streaming process selfish peers tend to be placed at the edges of multicast trees
Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora
tive to selfish
Average Bit Rate
0
100
200
300
400
500600
700
800
900
1000
300
600
900
1200
1500
1800
2100
2400
2700
3000
3300
3600
Time (seconds)
Ave
rag
e B
it R
ate
(kb
ps)
Type 1 C
Type 1 S
Type 2 C
Type 2 S
Type 3 C
Type 3 S
Change of Selfish Peers
0
5
10
15
20
25
30
35
Time
Per
cen
t o
f S
elfi
sh P
eers
10
20
30
Thank you
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-
Incentive Mechanisms
A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner
A peer can get better streaming quality if it contributes more and earns more streaming certificates
Evaluation (1)
Simulation-based experiments are conducted
ndash Network topology is not considered
ndash There are no bandwidth limits in network connections
ndash Peers have inbound and outbound bandwidth limits
ndash Set different number of selfish peers
Number of Peers
Inbound
Bandwidth
Outbound
Bandwidth
Type 1 1200 112kbps 96kbps
Type 2 600 1mbps 600kbps
Type 3 200 10mbps 10mbps
An example configuration
ndash Multiple multicast trees are constructed and maintained
Evaluation (2)
The average bit rates that selfish peers receive are much less than collaborative ones
In the media streaming process selfish peers tend to be placed at the edges of multicast trees
Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora
tive to selfish
Average Bit Rate
0
100
200
300
400
500600
700
800
900
1000
300
600
900
1200
1500
1800
2100
2400
2700
3000
3300
3600
Time (seconds)
Ave
rag
e B
it R
ate
(kb
ps)
Type 1 C
Type 1 S
Type 2 C
Type 2 S
Type 3 C
Type 3 S
Change of Selfish Peers
0
5
10
15
20
25
30
35
Time
Per
cen
t o
f S
elfi
sh P
eers
10
20
30
Thank you
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-
Evaluation (1)
Simulation-based experiments are conducted
ndash Network topology is not considered
ndash There are no bandwidth limits in network connections
ndash Peers have inbound and outbound bandwidth limits
ndash Set different number of selfish peers
Number of Peers
Inbound
Bandwidth
Outbound
Bandwidth
Type 1 1200 112kbps 96kbps
Type 2 600 1mbps 600kbps
Type 3 200 10mbps 10mbps
An example configuration
ndash Multiple multicast trees are constructed and maintained
Evaluation (2)
The average bit rates that selfish peers receive are much less than collaborative ones
In the media streaming process selfish peers tend to be placed at the edges of multicast trees
Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora
tive to selfish
Average Bit Rate
0
100
200
300
400
500600
700
800
900
1000
300
600
900
1200
1500
1800
2100
2400
2700
3000
3300
3600
Time (seconds)
Ave
rag
e B
it R
ate
(kb
ps)
Type 1 C
Type 1 S
Type 2 C
Type 2 S
Type 3 C
Type 3 S
Change of Selfish Peers
0
5
10
15
20
25
30
35
Time
Per
cen
t o
f S
elfi
sh P
eers
10
20
30
Thank you
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-
Evaluation (2)
The average bit rates that selfish peers receive are much less than collaborative ones
In the media streaming process selfish peers tend to be placed at the edges of multicast trees
Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora
tive to selfish
Average Bit Rate
0
100
200
300
400
500600
700
800
900
1000
300
600
900
1200
1500
1800
2100
2400
2700
3000
3300
3600
Time (seconds)
Ave
rag
e B
it R
ate
(kb
ps)
Type 1 C
Type 1 S
Type 2 C
Type 2 S
Type 3 C
Type 3 S
Change of Selfish Peers
0
5
10
15
20
25
30
35
Time
Per
cen
t o
f S
elfi
sh P
eers
10
20
30
Thank you
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-
Average Bit Rate
0
100
200
300
400
500600
700
800
900
1000
300
600
900
1200
1500
1800
2100
2400
2700
3000
3300
3600
Time (seconds)
Ave
rag
e B
it R
ate
(kb
ps)
Type 1 C
Type 1 S
Type 2 C
Type 2 S
Type 3 C
Type 3 S
Change of Selfish Peers
0
5
10
15
20
25
30
35
Time
Per
cen
t o
f S
elfi
sh P
eers
10
20
30
Thank you
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-
Change of Selfish Peers
0
5
10
15
20
25
30
35
Time
Per
cen
t o
f S
elfi
sh P
eers
10
20
30
Thank you
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-
Thank you
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-
P2P Research Projects and Systems
Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome
Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip
P2P courses
UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03
U Waterloo
httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml
- Slide 29
- Slide 30
-