Distributed Systems Lecture 10 P 2 P systems
Distributed Systems Lecture 10 P 2 P systems 1
Previous lecture • Leader election – Problem – Algorithms 2
Why P 2 P systems? • To understand how they work, their design • principles and techniques To modify, adapt, and reuse these techniques and principles in related areas – Cloud computing relies on key value stores • • Concept borrowed from P 2 P systems To build P 2 P systems – P 2 P systems are distributed systems Reference: https: //courses. engr. illinois. edu/cs 425/fa 2013/L 14. fa 13. ppt 3
Some Questions • Why do people get together? – To share information – To share and exchange resources they have • books, class notes, experiences, videos, music, etc. • How can computers help people? – Find information – Find resources – Exchange and share resources 4
The web library • Search engines • Forums: chat rooms, blogs, e. Bay • Online business • However searches are blurry – If looking for “Star wars” – A search engine will give you merchandise, movies, animated series, books. – But you want only the initial movie • If you can find a peer who has a copy of the movie perhaps in exchange for your Star Trek movie, that would be great! – Napster: a solution light weight that was lighter than the Web 5
6
A Brief History • 6/99 - Shawn Fanning (freshman Northeastern U. ) releases Napster online music service • 12/99 - RIAA sues Napster, asking $100 K per download • 3/2000 - 25% UWisc traffic Napster, many universities ban it • 2000 - 60 M users • 2/01 - US Federal Appeals Court: users violating copyright laws, Napster is abetting this • 9/01 - Napster decides to run paid service, pay % to songwriters and music companies • Today - Napster protocol is open, people free to develop opennap clients and servers – http: //opennap. sourceforge. net 7
Napster structure Store a directory, i. e. , Filename Info about filenames with peer pointers napster. com Servers S S starwars. avi S Client machines (“Peers”) Star wars, @ 128. 84. 92. 23: 1006 …. . P P P Store their own files 8
Napster Client operations • Connect to a Napster server • Upload list of music files that you want to share – Server maintains list of <filename, ip_address, portnum> tuples – Server stores no files • Search – Send server keywords to search with – Server searches its list with the keywords – Server returns a list of hosts - <ip_address, portnum> tuples to client – Client pings each host in the list to find transfer rates – Client fetches file from best host • All communication uses TCP 9
Napster Search 2. All servers search their lists (ternary tree algo. ) Store peer pointers napster. com Servers for all files S S S Peers P P 3. Response 1. Query P P P Store their own files P 4. ping candidates 5. download from best host 10
Problems • • Centralized server a source of congestion Centralized server single point of failure No security: plaintext messages and passwords Courts declared napster. com responsible for users’ copyright violation – “Indirect infringement” 11
Gnutella • Eliminate the servers • Client machines search and retrieve amongst themselves • Clients act as servers too, called servents • 3/2000 release by AOL, 88 K users by 3/20003 • Original design underwent several modifications • Available as an open protocol today – http: //www. limewire. com 12
Gnutella Store their own files Servents (“Peers”) P P P Also store “peer pointers” P P Connected in an overlay graph (== each link is an implicit Internet path) 13
How do I search for my Star Wars file? • Gnutella routes different messages within the overlay graph • Gnutella protocol has 5 main message types – – – Query (search) Query. Hit (response to query) Ping (to probe network for other peers) Pong (reply to ping, contains address of another peer) Push (used to initiate file transfer) 14
Gnutella message header format Payload Descriptor Header Descriptor ID Payload descriptor TTL Hops Payload length 0 15 16 Type of payload ID of this 0 x 00 Ping search 0 x 01 Pong transaction 0 x 40 Push 0 x 80 Query 0 x 81 Queryhit 17 18 22 Number of bytes in message following this header Time To Live: Decremented at each hop, Message dropped when ttl=0 ttl_initial usually 7 to 10 Incremented at each hop 15
Payload format in Gnutella query message Query (0 x 80) Minimum Speed Search criteria (keywords) 0 1 …. . 16
Gnutella search Query’s flooded out, TTL-restricted, forwarded only once P P TTL=2 P P Who has starwars. avi? P 17
Payload format in Gnutella query reply message Query. Hit (0 x 81) : successful result to a query Num. hits port ip_address speed (fileindex, filename, fsize) servent_id 0 1 3 7 Info about responder 11 n n+16 Results Unique identifier of responder; a function of its IP address 18
Gnutella Search Successful results Query. Hit’s routed on reverse path P P P Who has Penny. Lane. mp 3? P 19
Avoiding excessive traffic To avoid duplicate transmissions, each peer maintains a list of recently received messages • Query forwarded to all neighbors except peer from which received • Each Query (identified by Descriptor. ID) forwarded only once • Query. Hit routed back only to peer from which Query received with same Descriptor. ID – If neighbor does not exist anymore, drop Query. Hit • Duplicates with same Descriptor. ID and Payload descriptor (msg type) are dropped • Query. Hit with Descriptor. ID for which Query was not seen is dropped 20
After receiving Query. Hit messages • Requestor chooses “best” Query. Hit responder – Initiates HTTP request directly to responder’s IP+port GET /get/<File Index>/<File Name>/HTTP/1. 0rn Connection: Keep-Alivern Range: bytes=0 -rn User-Agent: Gnutellarn • Responder then replies following start message, followed by packets containing file: HTTP 200 OKrn Server: Gnutellarn Content-type: application/binaryrn Content-length: 1024 rn • HTTP is the file transfer protocol. Why? • Why the “range” field in the GET request? • What if responder is behind firewall that disallows incoming connections? 21
Dealing with firewalls Requestor sends Push to responder asking for file transfer P P P Has starwars. avi But behind firewall P P (Why is the Push routed and not sent directly? ) 22
Payload format in Gnutella push message Push (0 x 40) servent_id fileindex ip_address port same as in received Query. Hit Address at which requestor can accept incoming connections 23
Handling push messages • Responder establishes a TCP connection at ip_address, port specified GIV <File Index>: <Servent Identifier>/<File Name>nn • Requestor then sends GET to responder (as before) and file is transferred • What if requestor is behind firewall too? – Gnutella gives up – Solutions? 24
Ping-Pong Ping (0 x 00) no payload Pong (0 x 01) Port ip_address Num. files shared Num. KB shared • P 2 P systems have churn – peers continuously joining, leaving, and failing • Peers initiate Ping’s periodically • Ping’s flooded out like Query’s, Pong’s routed along reverse path (like Query. Hit’s) • Pong replies used to update set of neighboring peers • to keep neighbor lists fresh in spite of churn 25
Gnutella Summary • No servers • Peers/servents maintain “neighbors”, this forms an overlay graph • Peers store their own files • Queries flooded out, TTL restricted • Query. Hit (replies) reverse path routed • Supports file transfer through firewalls • Periodic Ping-pong to continuously refresh neighbor lists – List size specified by user at peer : heterogeneity means some peers may have more neighbors – Gnutella found to follow power law distribution: P(#links = L) ~ (k is a constant) 26
Problems • Ping/Pong constituted 50% traffic – Solution: Multiplex, cache and reduce frequency of pings/pongs • Repeated searches with same keywords – Solution: Cache Query, Query. Hit messages • Modem-connected hosts do not have enough bandwidth for passing Gnutella traffic – Solution: use a central server to act as proxy for such peers – Another solution: Fast. Track System (in a few slides) 27
Problems (contd. ) • Large number of freeloaders – 70% of users in 2000 were freeloaders – Only download files, never upload own files – Endemic to all P 2 P systems in deployment • Flooding causes excessive traffic – Is there some way of maintaining meta-information about peers that leads to more intelligent routing? Structured P 2 P systems e. g. , Chord System (next lecture) 28
Fast. Track • Hybrid between Gnutella and Napster • Takes advantage of “healthier” participants in the system • Underlying technology in Kazaa, Kazaa. Lite, Grokster • Proprietary protocol, but some details available • Like Gnutella, but with some peers designated as supernodes 29
A Fast. Track-like System Peers P P P S Supernodes P 30
Fast. Track (contd. ) • A supernode stores a directory listing (<filename, peer pointer>), similar to Napster servers • A peer searches by contacting a nearby supernode • Supernode membership changes over time • Any peer can become (and stay) a supernode, provided it has earned enough reputation – Kazaalite: participation level (=reputation) of a user between 0 and 1000. Initially 10, then affected by length of periods of connectivity and total number of uploads. 31
Bit. Torrent – A Quick Overview Website links to. torrent 1. Get tracker 2. Get peers Peer Tracker, per file (receives heartbeats, joins and leaves from peers) 3. Get file blocks (new, leecher) Peer (seed, has full file) Peer (leecher, has some blocks) (seed) 32
Bit. Torrent – A Quick Overview (2) • File split into blocks (32 KB – 256 KB) • Download Local Rarest First block policy: prefer early download of blocks that are least replicated among neighbors – Exception: New node allowed to pick one random neighbor: helps in bootstrapping • Tit for tat bandwidth usage: Provide blocks to neighbors that provided it the best download rates – Incentive for nodes to provide good download rates – Both Leechers and Seeds • Choking: Limit number of neighbors to which concurrent uploads <= a number (5), i. e. , the “best” neighbors – Everyone else choked – Periodically re-evaluate this set (e. g. , 10 s) – Optimistic unchoke: periodically (e. g. , ~30 s), unchoke a random neigbhor – helps keep unchoked set fresh 33
Wrap-up Notes Applies to all P 2 P systems • How does a peer join the system – Send an http request to well-known url for that P 2 P service • http: //www. myp 2 pservice. com – Message routed (after DNS lookup) to a well known server which then initializes new peers’ neighbor table – Server only maintains a partial list of online clients 34
Summary • Napster: protocol overview, more details available on webpage • Gnutella protocol • Fast. Track protocol • Bit. Torrent • Protocols continually evolving, software for new clients and servers conforming to respective protocols: developer forums at – Napster: http: //opennap. sourceforge. net – Gnutella: http: //www. limewire. com • Others – Peer to peer working groups: http: //p 2 p. internet 2. edu 35
Next lecture • Networking and routing 36
- Slides: 36