Introduction to Peer-to-Peer Networking Applications and Malicious Peers Song Ye Dartmouth...

33
Introduction to Peer-to-Peer Networking Applications and Malicious Peers Song Ye Dartmouth Experimental Visualization Laboratory Department of Computer Science Dartmouth College
  • date post

    21-Dec-2015
  • Category

    Documents

  • view

    223
  • download

    2

Transcript of Introduction to Peer-to-Peer Networking Applications and Malicious Peers Song Ye Dartmouth...

Introduction to Peer-to-Peer Networking

Applications and Malicious Peers

Song YeDartmouth Experimental Visualization Laboratory

Department of Computer Science

Dartmouth College

For CS99 Team Project

ldquoDetect and Prevent Malicious Peers in a Peer-to-Peer Systemrdquo

httpwwwcsdartmouthedu~yesongP2PProjecthtml

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

What is Peer-to-Peer (P2P)

P2P is a communications model in which each party has the same capabilities and either party can initiate a communication session

Whatiscom P2P is a class of applications that takes advantage of resources ndash

storage cycles content human presence ndash available at the edges of the Internet

openp2pcom A type of network in which each workstation has equivalent capabil

ities and responsibilitiesWebopediacom

A P2P computer network refers to any network that does not have fixed clients and servers but a number of peer nodes that function as both clients and servers to other nodes on the network

Wikipediaorg

Definition

Everything except the clientserver model

Network of nodes with equivalent capabilitiesresponsibilities (symmetrical)

Nodes are both servers and clients

Whatrsquos new

Decentralize Scale

ndash people are envisioning much larger scale

Anonymityndash Protect identity and privacy

Securityndash Systems must deal with privacy and integrity

Stabilityndash Deal with unstable components as the edgesndash But can systems designed this way be more stable

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

P2P Applications

File Sharing (Gnutella) Overlay Networking (RON) Media Streaming (P2Cast) Backup and Data Archiving (OceanStore) Web Caching and Proxy (Squirrel) Database (PeerDB) CPU Cycles Sharing (SETIhome) hellip

File Sharing Killer application

P2P file sharing has been widely used ndash Napsterndash Gnutellandash eDonkeyndash Kazaandash Bittorrentndash hellip

File Sharing Pros and Cons

1048704(+) Potentially unlimited file exchange areas 1048704(+) High available safe storage duplication and

redundancy 1048704(+) Anonymity preserve anonymity of authors and

publishers 1048704(-) Network bandwidth consumption 1048704(-) Management 1048704(-) Search capabilities

P2P Overlay Networking (1)

Client Server

IP Network

Traditional System

IP Network

Overlay

Client Server

P2P Communication Network

P2P Overlay Networking (2)

An overlay network is a set of logical connections between end hosts

Overlay networks can be unstructured or structured

Proximity not necessarily taken into account

Overlay maintenance is an issue

Media Streaming in P2P Networks

P2P media streamingndash Peers playback and cache the media content

during the streaming sessionndash They stream the cached content to other peers if

requestedndash Some kind of multicast structure is used

Backup and Data Archiving

Storage space sharing Peers store data for each other

ndash Improve availability of their data When a peer loses its data

ndash Heterogeneity of peers enables data availability under virus attacks

No computer virus can attack all different OSes

ndash Cheaper than centralized backup services

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

What are malicious peers

If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally

The concept of malicious peers is application-specific

Malicious Peers (1)

File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip

Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip

Malicious Peers (2)

Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip

Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

Introduction to Media Streaming

Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )

Streaming Methodsndash Livendash On-Demand

Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)

An application of bandwidth allocation and sharing

Media Streaming vs File Downloading

File Downloading Media Streaming

Mode Open-after-downloading Play-while-downloading

Download Order Our of order In order

Download Speed Requirement

Average download speed matters

Require relatively steady download speed

Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)

Not widely used yet

Freeloaders Not a big issue A big problem

Collaborative P2P Media Streaming

Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea

m peers U(Pi) and downstream peers D(Pi)

ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable

ndash U(Pi) adjust streams to Pi accordingly

Streaming certificates are transferred piggyback with streaming control sequences

An Example

Incentive Mechanisms

A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner

A peer can get better streaming quality if it contributes more and earns more streaming certificates

Evaluation (1)

Simulation-based experiments are conducted

ndash Network topology is not considered

ndash There are no bandwidth limits in network connections

ndash Peers have inbound and outbound bandwidth limits

ndash Set different number of selfish peers

Number of Peers

Inbound

Bandwidth

Outbound

Bandwidth

Type 1 1200 112kbps 96kbps

Type 2 600 1mbps 600kbps

Type 3 200 10mbps 10mbps

An example configuration

ndash Multiple multicast trees are constructed and maintained

Evaluation (2)

The average bit rates that selfish peers receive are much less than collaborative ones

In the media streaming process selfish peers tend to be placed at the edges of multicast trees

Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora

tive to selfish

Average Bit Rate

0

100

200

300

400

500600

700

800

900

1000

300

600

900

1200

1500

1800

2100

2400

2700

3000

3300

3600

Time (seconds)

Ave

rag

e B

it R

ate

(kb

ps)

Type 1 C

Type 1 S

Type 2 C

Type 2 S

Type 3 C

Type 3 S

Change of Selfish Peers

0

5

10

15

20

25

30

35

Time

Per

cen

t o

f S

elfi

sh P

eers

10

20

30

Thank you

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

For CS99 Team Project

ldquoDetect and Prevent Malicious Peers in a Peer-to-Peer Systemrdquo

httpwwwcsdartmouthedu~yesongP2PProjecthtml

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

What is Peer-to-Peer (P2P)

P2P is a communications model in which each party has the same capabilities and either party can initiate a communication session

Whatiscom P2P is a class of applications that takes advantage of resources ndash

storage cycles content human presence ndash available at the edges of the Internet

openp2pcom A type of network in which each workstation has equivalent capabil

ities and responsibilitiesWebopediacom

A P2P computer network refers to any network that does not have fixed clients and servers but a number of peer nodes that function as both clients and servers to other nodes on the network

Wikipediaorg

Definition

Everything except the clientserver model

Network of nodes with equivalent capabilitiesresponsibilities (symmetrical)

Nodes are both servers and clients

Whatrsquos new

Decentralize Scale

ndash people are envisioning much larger scale

Anonymityndash Protect identity and privacy

Securityndash Systems must deal with privacy and integrity

Stabilityndash Deal with unstable components as the edgesndash But can systems designed this way be more stable

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

P2P Applications

File Sharing (Gnutella) Overlay Networking (RON) Media Streaming (P2Cast) Backup and Data Archiving (OceanStore) Web Caching and Proxy (Squirrel) Database (PeerDB) CPU Cycles Sharing (SETIhome) hellip

File Sharing Killer application

P2P file sharing has been widely used ndash Napsterndash Gnutellandash eDonkeyndash Kazaandash Bittorrentndash hellip

File Sharing Pros and Cons

1048704(+) Potentially unlimited file exchange areas 1048704(+) High available safe storage duplication and

redundancy 1048704(+) Anonymity preserve anonymity of authors and

publishers 1048704(-) Network bandwidth consumption 1048704(-) Management 1048704(-) Search capabilities

P2P Overlay Networking (1)

Client Server

IP Network

Traditional System

IP Network

Overlay

Client Server

P2P Communication Network

P2P Overlay Networking (2)

An overlay network is a set of logical connections between end hosts

Overlay networks can be unstructured or structured

Proximity not necessarily taken into account

Overlay maintenance is an issue

Media Streaming in P2P Networks

P2P media streamingndash Peers playback and cache the media content

during the streaming sessionndash They stream the cached content to other peers if

requestedndash Some kind of multicast structure is used

Backup and Data Archiving

Storage space sharing Peers store data for each other

ndash Improve availability of their data When a peer loses its data

ndash Heterogeneity of peers enables data availability under virus attacks

No computer virus can attack all different OSes

ndash Cheaper than centralized backup services

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

What are malicious peers

If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally

The concept of malicious peers is application-specific

Malicious Peers (1)

File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip

Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip

Malicious Peers (2)

Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip

Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

Introduction to Media Streaming

Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )

Streaming Methodsndash Livendash On-Demand

Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)

An application of bandwidth allocation and sharing

Media Streaming vs File Downloading

File Downloading Media Streaming

Mode Open-after-downloading Play-while-downloading

Download Order Our of order In order

Download Speed Requirement

Average download speed matters

Require relatively steady download speed

Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)

Not widely used yet

Freeloaders Not a big issue A big problem

Collaborative P2P Media Streaming

Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea

m peers U(Pi) and downstream peers D(Pi)

ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable

ndash U(Pi) adjust streams to Pi accordingly

Streaming certificates are transferred piggyback with streaming control sequences

An Example

Incentive Mechanisms

A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner

A peer can get better streaming quality if it contributes more and earns more streaming certificates

Evaluation (1)

Simulation-based experiments are conducted

ndash Network topology is not considered

ndash There are no bandwidth limits in network connections

ndash Peers have inbound and outbound bandwidth limits

ndash Set different number of selfish peers

Number of Peers

Inbound

Bandwidth

Outbound

Bandwidth

Type 1 1200 112kbps 96kbps

Type 2 600 1mbps 600kbps

Type 3 200 10mbps 10mbps

An example configuration

ndash Multiple multicast trees are constructed and maintained

Evaluation (2)

The average bit rates that selfish peers receive are much less than collaborative ones

In the media streaming process selfish peers tend to be placed at the edges of multicast trees

Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora

tive to selfish

Average Bit Rate

0

100

200

300

400

500600

700

800

900

1000

300

600

900

1200

1500

1800

2100

2400

2700

3000

3300

3600

Time (seconds)

Ave

rag

e B

it R

ate

(kb

ps)

Type 1 C

Type 1 S

Type 2 C

Type 2 S

Type 3 C

Type 3 S

Change of Selfish Peers

0

5

10

15

20

25

30

35

Time

Per

cen

t o

f S

elfi

sh P

eers

10

20

30

Thank you

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

What is Peer-to-Peer (P2P)

P2P is a communications model in which each party has the same capabilities and either party can initiate a communication session

Whatiscom P2P is a class of applications that takes advantage of resources ndash

storage cycles content human presence ndash available at the edges of the Internet

openp2pcom A type of network in which each workstation has equivalent capabil

ities and responsibilitiesWebopediacom

A P2P computer network refers to any network that does not have fixed clients and servers but a number of peer nodes that function as both clients and servers to other nodes on the network

Wikipediaorg

Definition

Everything except the clientserver model

Network of nodes with equivalent capabilitiesresponsibilities (symmetrical)

Nodes are both servers and clients

Whatrsquos new

Decentralize Scale

ndash people are envisioning much larger scale

Anonymityndash Protect identity and privacy

Securityndash Systems must deal with privacy and integrity

Stabilityndash Deal with unstable components as the edgesndash But can systems designed this way be more stable

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

P2P Applications

File Sharing (Gnutella) Overlay Networking (RON) Media Streaming (P2Cast) Backup and Data Archiving (OceanStore) Web Caching and Proxy (Squirrel) Database (PeerDB) CPU Cycles Sharing (SETIhome) hellip

File Sharing Killer application

P2P file sharing has been widely used ndash Napsterndash Gnutellandash eDonkeyndash Kazaandash Bittorrentndash hellip

File Sharing Pros and Cons

1048704(+) Potentially unlimited file exchange areas 1048704(+) High available safe storage duplication and

redundancy 1048704(+) Anonymity preserve anonymity of authors and

publishers 1048704(-) Network bandwidth consumption 1048704(-) Management 1048704(-) Search capabilities

P2P Overlay Networking (1)

Client Server

IP Network

Traditional System

IP Network

Overlay

Client Server

P2P Communication Network

P2P Overlay Networking (2)

An overlay network is a set of logical connections between end hosts

Overlay networks can be unstructured or structured

Proximity not necessarily taken into account

Overlay maintenance is an issue

Media Streaming in P2P Networks

P2P media streamingndash Peers playback and cache the media content

during the streaming sessionndash They stream the cached content to other peers if

requestedndash Some kind of multicast structure is used

Backup and Data Archiving

Storage space sharing Peers store data for each other

ndash Improve availability of their data When a peer loses its data

ndash Heterogeneity of peers enables data availability under virus attacks

No computer virus can attack all different OSes

ndash Cheaper than centralized backup services

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

What are malicious peers

If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally

The concept of malicious peers is application-specific

Malicious Peers (1)

File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip

Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip

Malicious Peers (2)

Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip

Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

Introduction to Media Streaming

Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )

Streaming Methodsndash Livendash On-Demand

Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)

An application of bandwidth allocation and sharing

Media Streaming vs File Downloading

File Downloading Media Streaming

Mode Open-after-downloading Play-while-downloading

Download Order Our of order In order

Download Speed Requirement

Average download speed matters

Require relatively steady download speed

Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)

Not widely used yet

Freeloaders Not a big issue A big problem

Collaborative P2P Media Streaming

Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea

m peers U(Pi) and downstream peers D(Pi)

ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable

ndash U(Pi) adjust streams to Pi accordingly

Streaming certificates are transferred piggyback with streaming control sequences

An Example

Incentive Mechanisms

A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner

A peer can get better streaming quality if it contributes more and earns more streaming certificates

Evaluation (1)

Simulation-based experiments are conducted

ndash Network topology is not considered

ndash There are no bandwidth limits in network connections

ndash Peers have inbound and outbound bandwidth limits

ndash Set different number of selfish peers

Number of Peers

Inbound

Bandwidth

Outbound

Bandwidth

Type 1 1200 112kbps 96kbps

Type 2 600 1mbps 600kbps

Type 3 200 10mbps 10mbps

An example configuration

ndash Multiple multicast trees are constructed and maintained

Evaluation (2)

The average bit rates that selfish peers receive are much less than collaborative ones

In the media streaming process selfish peers tend to be placed at the edges of multicast trees

Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora

tive to selfish

Average Bit Rate

0

100

200

300

400

500600

700

800

900

1000

300

600

900

1200

1500

1800

2100

2400

2700

3000

3300

3600

Time (seconds)

Ave

rag

e B

it R

ate

(kb

ps)

Type 1 C

Type 1 S

Type 2 C

Type 2 S

Type 3 C

Type 3 S

Change of Selfish Peers

0

5

10

15

20

25

30

35

Time

Per

cen

t o

f S

elfi

sh P

eers

10

20

30

Thank you

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

What is Peer-to-Peer (P2P)

P2P is a communications model in which each party has the same capabilities and either party can initiate a communication session

Whatiscom P2P is a class of applications that takes advantage of resources ndash

storage cycles content human presence ndash available at the edges of the Internet

openp2pcom A type of network in which each workstation has equivalent capabil

ities and responsibilitiesWebopediacom

A P2P computer network refers to any network that does not have fixed clients and servers but a number of peer nodes that function as both clients and servers to other nodes on the network

Wikipediaorg

Definition

Everything except the clientserver model

Network of nodes with equivalent capabilitiesresponsibilities (symmetrical)

Nodes are both servers and clients

Whatrsquos new

Decentralize Scale

ndash people are envisioning much larger scale

Anonymityndash Protect identity and privacy

Securityndash Systems must deal with privacy and integrity

Stabilityndash Deal with unstable components as the edgesndash But can systems designed this way be more stable

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

P2P Applications

File Sharing (Gnutella) Overlay Networking (RON) Media Streaming (P2Cast) Backup and Data Archiving (OceanStore) Web Caching and Proxy (Squirrel) Database (PeerDB) CPU Cycles Sharing (SETIhome) hellip

File Sharing Killer application

P2P file sharing has been widely used ndash Napsterndash Gnutellandash eDonkeyndash Kazaandash Bittorrentndash hellip

File Sharing Pros and Cons

1048704(+) Potentially unlimited file exchange areas 1048704(+) High available safe storage duplication and

redundancy 1048704(+) Anonymity preserve anonymity of authors and

publishers 1048704(-) Network bandwidth consumption 1048704(-) Management 1048704(-) Search capabilities

P2P Overlay Networking (1)

Client Server

IP Network

Traditional System

IP Network

Overlay

Client Server

P2P Communication Network

P2P Overlay Networking (2)

An overlay network is a set of logical connections between end hosts

Overlay networks can be unstructured or structured

Proximity not necessarily taken into account

Overlay maintenance is an issue

Media Streaming in P2P Networks

P2P media streamingndash Peers playback and cache the media content

during the streaming sessionndash They stream the cached content to other peers if

requestedndash Some kind of multicast structure is used

Backup and Data Archiving

Storage space sharing Peers store data for each other

ndash Improve availability of their data When a peer loses its data

ndash Heterogeneity of peers enables data availability under virus attacks

No computer virus can attack all different OSes

ndash Cheaper than centralized backup services

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

What are malicious peers

If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally

The concept of malicious peers is application-specific

Malicious Peers (1)

File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip

Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip

Malicious Peers (2)

Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip

Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

Introduction to Media Streaming

Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )

Streaming Methodsndash Livendash On-Demand

Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)

An application of bandwidth allocation and sharing

Media Streaming vs File Downloading

File Downloading Media Streaming

Mode Open-after-downloading Play-while-downloading

Download Order Our of order In order

Download Speed Requirement

Average download speed matters

Require relatively steady download speed

Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)

Not widely used yet

Freeloaders Not a big issue A big problem

Collaborative P2P Media Streaming

Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea

m peers U(Pi) and downstream peers D(Pi)

ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable

ndash U(Pi) adjust streams to Pi accordingly

Streaming certificates are transferred piggyback with streaming control sequences

An Example

Incentive Mechanisms

A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner

A peer can get better streaming quality if it contributes more and earns more streaming certificates

Evaluation (1)

Simulation-based experiments are conducted

ndash Network topology is not considered

ndash There are no bandwidth limits in network connections

ndash Peers have inbound and outbound bandwidth limits

ndash Set different number of selfish peers

Number of Peers

Inbound

Bandwidth

Outbound

Bandwidth

Type 1 1200 112kbps 96kbps

Type 2 600 1mbps 600kbps

Type 3 200 10mbps 10mbps

An example configuration

ndash Multiple multicast trees are constructed and maintained

Evaluation (2)

The average bit rates that selfish peers receive are much less than collaborative ones

In the media streaming process selfish peers tend to be placed at the edges of multicast trees

Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora

tive to selfish

Average Bit Rate

0

100

200

300

400

500600

700

800

900

1000

300

600

900

1200

1500

1800

2100

2400

2700

3000

3300

3600

Time (seconds)

Ave

rag

e B

it R

ate

(kb

ps)

Type 1 C

Type 1 S

Type 2 C

Type 2 S

Type 3 C

Type 3 S

Change of Selfish Peers

0

5

10

15

20

25

30

35

Time

Per

cen

t o

f S

elfi

sh P

eers

10

20

30

Thank you

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

What is Peer-to-Peer (P2P)

P2P is a communications model in which each party has the same capabilities and either party can initiate a communication session

Whatiscom P2P is a class of applications that takes advantage of resources ndash

storage cycles content human presence ndash available at the edges of the Internet

openp2pcom A type of network in which each workstation has equivalent capabil

ities and responsibilitiesWebopediacom

A P2P computer network refers to any network that does not have fixed clients and servers but a number of peer nodes that function as both clients and servers to other nodes on the network

Wikipediaorg

Definition

Everything except the clientserver model

Network of nodes with equivalent capabilitiesresponsibilities (symmetrical)

Nodes are both servers and clients

Whatrsquos new

Decentralize Scale

ndash people are envisioning much larger scale

Anonymityndash Protect identity and privacy

Securityndash Systems must deal with privacy and integrity

Stabilityndash Deal with unstable components as the edgesndash But can systems designed this way be more stable

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

P2P Applications

File Sharing (Gnutella) Overlay Networking (RON) Media Streaming (P2Cast) Backup and Data Archiving (OceanStore) Web Caching and Proxy (Squirrel) Database (PeerDB) CPU Cycles Sharing (SETIhome) hellip

File Sharing Killer application

P2P file sharing has been widely used ndash Napsterndash Gnutellandash eDonkeyndash Kazaandash Bittorrentndash hellip

File Sharing Pros and Cons

1048704(+) Potentially unlimited file exchange areas 1048704(+) High available safe storage duplication and

redundancy 1048704(+) Anonymity preserve anonymity of authors and

publishers 1048704(-) Network bandwidth consumption 1048704(-) Management 1048704(-) Search capabilities

P2P Overlay Networking (1)

Client Server

IP Network

Traditional System

IP Network

Overlay

Client Server

P2P Communication Network

P2P Overlay Networking (2)

An overlay network is a set of logical connections between end hosts

Overlay networks can be unstructured or structured

Proximity not necessarily taken into account

Overlay maintenance is an issue

Media Streaming in P2P Networks

P2P media streamingndash Peers playback and cache the media content

during the streaming sessionndash They stream the cached content to other peers if

requestedndash Some kind of multicast structure is used

Backup and Data Archiving

Storage space sharing Peers store data for each other

ndash Improve availability of their data When a peer loses its data

ndash Heterogeneity of peers enables data availability under virus attacks

No computer virus can attack all different OSes

ndash Cheaper than centralized backup services

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

What are malicious peers

If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally

The concept of malicious peers is application-specific

Malicious Peers (1)

File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip

Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip

Malicious Peers (2)

Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip

Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

Introduction to Media Streaming

Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )

Streaming Methodsndash Livendash On-Demand

Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)

An application of bandwidth allocation and sharing

Media Streaming vs File Downloading

File Downloading Media Streaming

Mode Open-after-downloading Play-while-downloading

Download Order Our of order In order

Download Speed Requirement

Average download speed matters

Require relatively steady download speed

Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)

Not widely used yet

Freeloaders Not a big issue A big problem

Collaborative P2P Media Streaming

Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea

m peers U(Pi) and downstream peers D(Pi)

ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable

ndash U(Pi) adjust streams to Pi accordingly

Streaming certificates are transferred piggyback with streaming control sequences

An Example

Incentive Mechanisms

A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner

A peer can get better streaming quality if it contributes more and earns more streaming certificates

Evaluation (1)

Simulation-based experiments are conducted

ndash Network topology is not considered

ndash There are no bandwidth limits in network connections

ndash Peers have inbound and outbound bandwidth limits

ndash Set different number of selfish peers

Number of Peers

Inbound

Bandwidth

Outbound

Bandwidth

Type 1 1200 112kbps 96kbps

Type 2 600 1mbps 600kbps

Type 3 200 10mbps 10mbps

An example configuration

ndash Multiple multicast trees are constructed and maintained

Evaluation (2)

The average bit rates that selfish peers receive are much less than collaborative ones

In the media streaming process selfish peers tend to be placed at the edges of multicast trees

Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora

tive to selfish

Average Bit Rate

0

100

200

300

400

500600

700

800

900

1000

300

600

900

1200

1500

1800

2100

2400

2700

3000

3300

3600

Time (seconds)

Ave

rag

e B

it R

ate

(kb

ps)

Type 1 C

Type 1 S

Type 2 C

Type 2 S

Type 3 C

Type 3 S

Change of Selfish Peers

0

5

10

15

20

25

30

35

Time

Per

cen

t o

f S

elfi

sh P

eers

10

20

30

Thank you

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

Definition

Everything except the clientserver model

Network of nodes with equivalent capabilitiesresponsibilities (symmetrical)

Nodes are both servers and clients

Whatrsquos new

Decentralize Scale

ndash people are envisioning much larger scale

Anonymityndash Protect identity and privacy

Securityndash Systems must deal with privacy and integrity

Stabilityndash Deal with unstable components as the edgesndash But can systems designed this way be more stable

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

P2P Applications

File Sharing (Gnutella) Overlay Networking (RON) Media Streaming (P2Cast) Backup and Data Archiving (OceanStore) Web Caching and Proxy (Squirrel) Database (PeerDB) CPU Cycles Sharing (SETIhome) hellip

File Sharing Killer application

P2P file sharing has been widely used ndash Napsterndash Gnutellandash eDonkeyndash Kazaandash Bittorrentndash hellip

File Sharing Pros and Cons

1048704(+) Potentially unlimited file exchange areas 1048704(+) High available safe storage duplication and

redundancy 1048704(+) Anonymity preserve anonymity of authors and

publishers 1048704(-) Network bandwidth consumption 1048704(-) Management 1048704(-) Search capabilities

P2P Overlay Networking (1)

Client Server

IP Network

Traditional System

IP Network

Overlay

Client Server

P2P Communication Network

P2P Overlay Networking (2)

An overlay network is a set of logical connections between end hosts

Overlay networks can be unstructured or structured

Proximity not necessarily taken into account

Overlay maintenance is an issue

Media Streaming in P2P Networks

P2P media streamingndash Peers playback and cache the media content

during the streaming sessionndash They stream the cached content to other peers if

requestedndash Some kind of multicast structure is used

Backup and Data Archiving

Storage space sharing Peers store data for each other

ndash Improve availability of their data When a peer loses its data

ndash Heterogeneity of peers enables data availability under virus attacks

No computer virus can attack all different OSes

ndash Cheaper than centralized backup services

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

What are malicious peers

If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally

The concept of malicious peers is application-specific

Malicious Peers (1)

File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip

Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip

Malicious Peers (2)

Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip

Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

Introduction to Media Streaming

Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )

Streaming Methodsndash Livendash On-Demand

Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)

An application of bandwidth allocation and sharing

Media Streaming vs File Downloading

File Downloading Media Streaming

Mode Open-after-downloading Play-while-downloading

Download Order Our of order In order

Download Speed Requirement

Average download speed matters

Require relatively steady download speed

Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)

Not widely used yet

Freeloaders Not a big issue A big problem

Collaborative P2P Media Streaming

Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea

m peers U(Pi) and downstream peers D(Pi)

ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable

ndash U(Pi) adjust streams to Pi accordingly

Streaming certificates are transferred piggyback with streaming control sequences

An Example

Incentive Mechanisms

A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner

A peer can get better streaming quality if it contributes more and earns more streaming certificates

Evaluation (1)

Simulation-based experiments are conducted

ndash Network topology is not considered

ndash There are no bandwidth limits in network connections

ndash Peers have inbound and outbound bandwidth limits

ndash Set different number of selfish peers

Number of Peers

Inbound

Bandwidth

Outbound

Bandwidth

Type 1 1200 112kbps 96kbps

Type 2 600 1mbps 600kbps

Type 3 200 10mbps 10mbps

An example configuration

ndash Multiple multicast trees are constructed and maintained

Evaluation (2)

The average bit rates that selfish peers receive are much less than collaborative ones

In the media streaming process selfish peers tend to be placed at the edges of multicast trees

Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora

tive to selfish

Average Bit Rate

0

100

200

300

400

500600

700

800

900

1000

300

600

900

1200

1500

1800

2100

2400

2700

3000

3300

3600

Time (seconds)

Ave

rag

e B

it R

ate

(kb

ps)

Type 1 C

Type 1 S

Type 2 C

Type 2 S

Type 3 C

Type 3 S

Change of Selfish Peers

0

5

10

15

20

25

30

35

Time

Per

cen

t o

f S

elfi

sh P

eers

10

20

30

Thank you

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

Whatrsquos new

Decentralize Scale

ndash people are envisioning much larger scale

Anonymityndash Protect identity and privacy

Securityndash Systems must deal with privacy and integrity

Stabilityndash Deal with unstable components as the edgesndash But can systems designed this way be more stable

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

P2P Applications

File Sharing (Gnutella) Overlay Networking (RON) Media Streaming (P2Cast) Backup and Data Archiving (OceanStore) Web Caching and Proxy (Squirrel) Database (PeerDB) CPU Cycles Sharing (SETIhome) hellip

File Sharing Killer application

P2P file sharing has been widely used ndash Napsterndash Gnutellandash eDonkeyndash Kazaandash Bittorrentndash hellip

File Sharing Pros and Cons

1048704(+) Potentially unlimited file exchange areas 1048704(+) High available safe storage duplication and

redundancy 1048704(+) Anonymity preserve anonymity of authors and

publishers 1048704(-) Network bandwidth consumption 1048704(-) Management 1048704(-) Search capabilities

P2P Overlay Networking (1)

Client Server

IP Network

Traditional System

IP Network

Overlay

Client Server

P2P Communication Network

P2P Overlay Networking (2)

An overlay network is a set of logical connections between end hosts

Overlay networks can be unstructured or structured

Proximity not necessarily taken into account

Overlay maintenance is an issue

Media Streaming in P2P Networks

P2P media streamingndash Peers playback and cache the media content

during the streaming sessionndash They stream the cached content to other peers if

requestedndash Some kind of multicast structure is used

Backup and Data Archiving

Storage space sharing Peers store data for each other

ndash Improve availability of their data When a peer loses its data

ndash Heterogeneity of peers enables data availability under virus attacks

No computer virus can attack all different OSes

ndash Cheaper than centralized backup services

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

What are malicious peers

If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally

The concept of malicious peers is application-specific

Malicious Peers (1)

File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip

Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip

Malicious Peers (2)

Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip

Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

Introduction to Media Streaming

Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )

Streaming Methodsndash Livendash On-Demand

Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)

An application of bandwidth allocation and sharing

Media Streaming vs File Downloading

File Downloading Media Streaming

Mode Open-after-downloading Play-while-downloading

Download Order Our of order In order

Download Speed Requirement

Average download speed matters

Require relatively steady download speed

Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)

Not widely used yet

Freeloaders Not a big issue A big problem

Collaborative P2P Media Streaming

Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea

m peers U(Pi) and downstream peers D(Pi)

ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable

ndash U(Pi) adjust streams to Pi accordingly

Streaming certificates are transferred piggyback with streaming control sequences

An Example

Incentive Mechanisms

A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner

A peer can get better streaming quality if it contributes more and earns more streaming certificates

Evaluation (1)

Simulation-based experiments are conducted

ndash Network topology is not considered

ndash There are no bandwidth limits in network connections

ndash Peers have inbound and outbound bandwidth limits

ndash Set different number of selfish peers

Number of Peers

Inbound

Bandwidth

Outbound

Bandwidth

Type 1 1200 112kbps 96kbps

Type 2 600 1mbps 600kbps

Type 3 200 10mbps 10mbps

An example configuration

ndash Multiple multicast trees are constructed and maintained

Evaluation (2)

The average bit rates that selfish peers receive are much less than collaborative ones

In the media streaming process selfish peers tend to be placed at the edges of multicast trees

Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora

tive to selfish

Average Bit Rate

0

100

200

300

400

500600

700

800

900

1000

300

600

900

1200

1500

1800

2100

2400

2700

3000

3300

3600

Time (seconds)

Ave

rag

e B

it R

ate

(kb

ps)

Type 1 C

Type 1 S

Type 2 C

Type 2 S

Type 3 C

Type 3 S

Change of Selfish Peers

0

5

10

15

20

25

30

35

Time

Per

cen

t o

f S

elfi

sh P

eers

10

20

30

Thank you

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

P2P Applications

File Sharing (Gnutella) Overlay Networking (RON) Media Streaming (P2Cast) Backup and Data Archiving (OceanStore) Web Caching and Proxy (Squirrel) Database (PeerDB) CPU Cycles Sharing (SETIhome) hellip

File Sharing Killer application

P2P file sharing has been widely used ndash Napsterndash Gnutellandash eDonkeyndash Kazaandash Bittorrentndash hellip

File Sharing Pros and Cons

1048704(+) Potentially unlimited file exchange areas 1048704(+) High available safe storage duplication and

redundancy 1048704(+) Anonymity preserve anonymity of authors and

publishers 1048704(-) Network bandwidth consumption 1048704(-) Management 1048704(-) Search capabilities

P2P Overlay Networking (1)

Client Server

IP Network

Traditional System

IP Network

Overlay

Client Server

P2P Communication Network

P2P Overlay Networking (2)

An overlay network is a set of logical connections between end hosts

Overlay networks can be unstructured or structured

Proximity not necessarily taken into account

Overlay maintenance is an issue

Media Streaming in P2P Networks

P2P media streamingndash Peers playback and cache the media content

during the streaming sessionndash They stream the cached content to other peers if

requestedndash Some kind of multicast structure is used

Backup and Data Archiving

Storage space sharing Peers store data for each other

ndash Improve availability of their data When a peer loses its data

ndash Heterogeneity of peers enables data availability under virus attacks

No computer virus can attack all different OSes

ndash Cheaper than centralized backup services

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

What are malicious peers

If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally

The concept of malicious peers is application-specific

Malicious Peers (1)

File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip

Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip

Malicious Peers (2)

Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip

Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

Introduction to Media Streaming

Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )

Streaming Methodsndash Livendash On-Demand

Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)

An application of bandwidth allocation and sharing

Media Streaming vs File Downloading

File Downloading Media Streaming

Mode Open-after-downloading Play-while-downloading

Download Order Our of order In order

Download Speed Requirement

Average download speed matters

Require relatively steady download speed

Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)

Not widely used yet

Freeloaders Not a big issue A big problem

Collaborative P2P Media Streaming

Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea

m peers U(Pi) and downstream peers D(Pi)

ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable

ndash U(Pi) adjust streams to Pi accordingly

Streaming certificates are transferred piggyback with streaming control sequences

An Example

Incentive Mechanisms

A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner

A peer can get better streaming quality if it contributes more and earns more streaming certificates

Evaluation (1)

Simulation-based experiments are conducted

ndash Network topology is not considered

ndash There are no bandwidth limits in network connections

ndash Peers have inbound and outbound bandwidth limits

ndash Set different number of selfish peers

Number of Peers

Inbound

Bandwidth

Outbound

Bandwidth

Type 1 1200 112kbps 96kbps

Type 2 600 1mbps 600kbps

Type 3 200 10mbps 10mbps

An example configuration

ndash Multiple multicast trees are constructed and maintained

Evaluation (2)

The average bit rates that selfish peers receive are much less than collaborative ones

In the media streaming process selfish peers tend to be placed at the edges of multicast trees

Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora

tive to selfish

Average Bit Rate

0

100

200

300

400

500600

700

800

900

1000

300

600

900

1200

1500

1800

2100

2400

2700

3000

3300

3600

Time (seconds)

Ave

rag

e B

it R

ate

(kb

ps)

Type 1 C

Type 1 S

Type 2 C

Type 2 S

Type 3 C

Type 3 S

Change of Selfish Peers

0

5

10

15

20

25

30

35

Time

Per

cen

t o

f S

elfi

sh P

eers

10

20

30

Thank you

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

P2P Applications

File Sharing (Gnutella) Overlay Networking (RON) Media Streaming (P2Cast) Backup and Data Archiving (OceanStore) Web Caching and Proxy (Squirrel) Database (PeerDB) CPU Cycles Sharing (SETIhome) hellip

File Sharing Killer application

P2P file sharing has been widely used ndash Napsterndash Gnutellandash eDonkeyndash Kazaandash Bittorrentndash hellip

File Sharing Pros and Cons

1048704(+) Potentially unlimited file exchange areas 1048704(+) High available safe storage duplication and

redundancy 1048704(+) Anonymity preserve anonymity of authors and

publishers 1048704(-) Network bandwidth consumption 1048704(-) Management 1048704(-) Search capabilities

P2P Overlay Networking (1)

Client Server

IP Network

Traditional System

IP Network

Overlay

Client Server

P2P Communication Network

P2P Overlay Networking (2)

An overlay network is a set of logical connections between end hosts

Overlay networks can be unstructured or structured

Proximity not necessarily taken into account

Overlay maintenance is an issue

Media Streaming in P2P Networks

P2P media streamingndash Peers playback and cache the media content

during the streaming sessionndash They stream the cached content to other peers if

requestedndash Some kind of multicast structure is used

Backup and Data Archiving

Storage space sharing Peers store data for each other

ndash Improve availability of their data When a peer loses its data

ndash Heterogeneity of peers enables data availability under virus attacks

No computer virus can attack all different OSes

ndash Cheaper than centralized backup services

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

What are malicious peers

If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally

The concept of malicious peers is application-specific

Malicious Peers (1)

File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip

Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip

Malicious Peers (2)

Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip

Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

Introduction to Media Streaming

Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )

Streaming Methodsndash Livendash On-Demand

Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)

An application of bandwidth allocation and sharing

Media Streaming vs File Downloading

File Downloading Media Streaming

Mode Open-after-downloading Play-while-downloading

Download Order Our of order In order

Download Speed Requirement

Average download speed matters

Require relatively steady download speed

Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)

Not widely used yet

Freeloaders Not a big issue A big problem

Collaborative P2P Media Streaming

Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea

m peers U(Pi) and downstream peers D(Pi)

ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable

ndash U(Pi) adjust streams to Pi accordingly

Streaming certificates are transferred piggyback with streaming control sequences

An Example

Incentive Mechanisms

A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner

A peer can get better streaming quality if it contributes more and earns more streaming certificates

Evaluation (1)

Simulation-based experiments are conducted

ndash Network topology is not considered

ndash There are no bandwidth limits in network connections

ndash Peers have inbound and outbound bandwidth limits

ndash Set different number of selfish peers

Number of Peers

Inbound

Bandwidth

Outbound

Bandwidth

Type 1 1200 112kbps 96kbps

Type 2 600 1mbps 600kbps

Type 3 200 10mbps 10mbps

An example configuration

ndash Multiple multicast trees are constructed and maintained

Evaluation (2)

The average bit rates that selfish peers receive are much less than collaborative ones

In the media streaming process selfish peers tend to be placed at the edges of multicast trees

Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora

tive to selfish

Average Bit Rate

0

100

200

300

400

500600

700

800

900

1000

300

600

900

1200

1500

1800

2100

2400

2700

3000

3300

3600

Time (seconds)

Ave

rag

e B

it R

ate

(kb

ps)

Type 1 C

Type 1 S

Type 2 C

Type 2 S

Type 3 C

Type 3 S

Change of Selfish Peers

0

5

10

15

20

25

30

35

Time

Per

cen

t o

f S

elfi

sh P

eers

10

20

30

Thank you

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

P2P Applications

File Sharing (Gnutella) Overlay Networking (RON) Media Streaming (P2Cast) Backup and Data Archiving (OceanStore) Web Caching and Proxy (Squirrel) Database (PeerDB) CPU Cycles Sharing (SETIhome) hellip

File Sharing Killer application

P2P file sharing has been widely used ndash Napsterndash Gnutellandash eDonkeyndash Kazaandash Bittorrentndash hellip

File Sharing Pros and Cons

1048704(+) Potentially unlimited file exchange areas 1048704(+) High available safe storage duplication and

redundancy 1048704(+) Anonymity preserve anonymity of authors and

publishers 1048704(-) Network bandwidth consumption 1048704(-) Management 1048704(-) Search capabilities

P2P Overlay Networking (1)

Client Server

IP Network

Traditional System

IP Network

Overlay

Client Server

P2P Communication Network

P2P Overlay Networking (2)

An overlay network is a set of logical connections between end hosts

Overlay networks can be unstructured or structured

Proximity not necessarily taken into account

Overlay maintenance is an issue

Media Streaming in P2P Networks

P2P media streamingndash Peers playback and cache the media content

during the streaming sessionndash They stream the cached content to other peers if

requestedndash Some kind of multicast structure is used

Backup and Data Archiving

Storage space sharing Peers store data for each other

ndash Improve availability of their data When a peer loses its data

ndash Heterogeneity of peers enables data availability under virus attacks

No computer virus can attack all different OSes

ndash Cheaper than centralized backup services

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

What are malicious peers

If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally

The concept of malicious peers is application-specific

Malicious Peers (1)

File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip

Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip

Malicious Peers (2)

Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip

Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

Introduction to Media Streaming

Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )

Streaming Methodsndash Livendash On-Demand

Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)

An application of bandwidth allocation and sharing

Media Streaming vs File Downloading

File Downloading Media Streaming

Mode Open-after-downloading Play-while-downloading

Download Order Our of order In order

Download Speed Requirement

Average download speed matters

Require relatively steady download speed

Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)

Not widely used yet

Freeloaders Not a big issue A big problem

Collaborative P2P Media Streaming

Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea

m peers U(Pi) and downstream peers D(Pi)

ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable

ndash U(Pi) adjust streams to Pi accordingly

Streaming certificates are transferred piggyback with streaming control sequences

An Example

Incentive Mechanisms

A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner

A peer can get better streaming quality if it contributes more and earns more streaming certificates

Evaluation (1)

Simulation-based experiments are conducted

ndash Network topology is not considered

ndash There are no bandwidth limits in network connections

ndash Peers have inbound and outbound bandwidth limits

ndash Set different number of selfish peers

Number of Peers

Inbound

Bandwidth

Outbound

Bandwidth

Type 1 1200 112kbps 96kbps

Type 2 600 1mbps 600kbps

Type 3 200 10mbps 10mbps

An example configuration

ndash Multiple multicast trees are constructed and maintained

Evaluation (2)

The average bit rates that selfish peers receive are much less than collaborative ones

In the media streaming process selfish peers tend to be placed at the edges of multicast trees

Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora

tive to selfish

Average Bit Rate

0

100

200

300

400

500600

700

800

900

1000

300

600

900

1200

1500

1800

2100

2400

2700

3000

3300

3600

Time (seconds)

Ave

rag

e B

it R

ate

(kb

ps)

Type 1 C

Type 1 S

Type 2 C

Type 2 S

Type 3 C

Type 3 S

Change of Selfish Peers

0

5

10

15

20

25

30

35

Time

Per

cen

t o

f S

elfi

sh P

eers

10

20

30

Thank you

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

File Sharing Killer application

P2P file sharing has been widely used ndash Napsterndash Gnutellandash eDonkeyndash Kazaandash Bittorrentndash hellip

File Sharing Pros and Cons

1048704(+) Potentially unlimited file exchange areas 1048704(+) High available safe storage duplication and

redundancy 1048704(+) Anonymity preserve anonymity of authors and

publishers 1048704(-) Network bandwidth consumption 1048704(-) Management 1048704(-) Search capabilities

P2P Overlay Networking (1)

Client Server

IP Network

Traditional System

IP Network

Overlay

Client Server

P2P Communication Network

P2P Overlay Networking (2)

An overlay network is a set of logical connections between end hosts

Overlay networks can be unstructured or structured

Proximity not necessarily taken into account

Overlay maintenance is an issue

Media Streaming in P2P Networks

P2P media streamingndash Peers playback and cache the media content

during the streaming sessionndash They stream the cached content to other peers if

requestedndash Some kind of multicast structure is used

Backup and Data Archiving

Storage space sharing Peers store data for each other

ndash Improve availability of their data When a peer loses its data

ndash Heterogeneity of peers enables data availability under virus attacks

No computer virus can attack all different OSes

ndash Cheaper than centralized backup services

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

What are malicious peers

If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally

The concept of malicious peers is application-specific

Malicious Peers (1)

File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip

Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip

Malicious Peers (2)

Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip

Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

Introduction to Media Streaming

Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )

Streaming Methodsndash Livendash On-Demand

Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)

An application of bandwidth allocation and sharing

Media Streaming vs File Downloading

File Downloading Media Streaming

Mode Open-after-downloading Play-while-downloading

Download Order Our of order In order

Download Speed Requirement

Average download speed matters

Require relatively steady download speed

Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)

Not widely used yet

Freeloaders Not a big issue A big problem

Collaborative P2P Media Streaming

Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea

m peers U(Pi) and downstream peers D(Pi)

ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable

ndash U(Pi) adjust streams to Pi accordingly

Streaming certificates are transferred piggyback with streaming control sequences

An Example

Incentive Mechanisms

A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner

A peer can get better streaming quality if it contributes more and earns more streaming certificates

Evaluation (1)

Simulation-based experiments are conducted

ndash Network topology is not considered

ndash There are no bandwidth limits in network connections

ndash Peers have inbound and outbound bandwidth limits

ndash Set different number of selfish peers

Number of Peers

Inbound

Bandwidth

Outbound

Bandwidth

Type 1 1200 112kbps 96kbps

Type 2 600 1mbps 600kbps

Type 3 200 10mbps 10mbps

An example configuration

ndash Multiple multicast trees are constructed and maintained

Evaluation (2)

The average bit rates that selfish peers receive are much less than collaborative ones

In the media streaming process selfish peers tend to be placed at the edges of multicast trees

Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora

tive to selfish

Average Bit Rate

0

100

200

300

400

500600

700

800

900

1000

300

600

900

1200

1500

1800

2100

2400

2700

3000

3300

3600

Time (seconds)

Ave

rag

e B

it R

ate

(kb

ps)

Type 1 C

Type 1 S

Type 2 C

Type 2 S

Type 3 C

Type 3 S

Change of Selfish Peers

0

5

10

15

20

25

30

35

Time

Per

cen

t o

f S

elfi

sh P

eers

10

20

30

Thank you

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

File Sharing Pros and Cons

1048704(+) Potentially unlimited file exchange areas 1048704(+) High available safe storage duplication and

redundancy 1048704(+) Anonymity preserve anonymity of authors and

publishers 1048704(-) Network bandwidth consumption 1048704(-) Management 1048704(-) Search capabilities

P2P Overlay Networking (1)

Client Server

IP Network

Traditional System

IP Network

Overlay

Client Server

P2P Communication Network

P2P Overlay Networking (2)

An overlay network is a set of logical connections between end hosts

Overlay networks can be unstructured or structured

Proximity not necessarily taken into account

Overlay maintenance is an issue

Media Streaming in P2P Networks

P2P media streamingndash Peers playback and cache the media content

during the streaming sessionndash They stream the cached content to other peers if

requestedndash Some kind of multicast structure is used

Backup and Data Archiving

Storage space sharing Peers store data for each other

ndash Improve availability of their data When a peer loses its data

ndash Heterogeneity of peers enables data availability under virus attacks

No computer virus can attack all different OSes

ndash Cheaper than centralized backup services

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

What are malicious peers

If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally

The concept of malicious peers is application-specific

Malicious Peers (1)

File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip

Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip

Malicious Peers (2)

Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip

Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

Introduction to Media Streaming

Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )

Streaming Methodsndash Livendash On-Demand

Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)

An application of bandwidth allocation and sharing

Media Streaming vs File Downloading

File Downloading Media Streaming

Mode Open-after-downloading Play-while-downloading

Download Order Our of order In order

Download Speed Requirement

Average download speed matters

Require relatively steady download speed

Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)

Not widely used yet

Freeloaders Not a big issue A big problem

Collaborative P2P Media Streaming

Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea

m peers U(Pi) and downstream peers D(Pi)

ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable

ndash U(Pi) adjust streams to Pi accordingly

Streaming certificates are transferred piggyback with streaming control sequences

An Example

Incentive Mechanisms

A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner

A peer can get better streaming quality if it contributes more and earns more streaming certificates

Evaluation (1)

Simulation-based experiments are conducted

ndash Network topology is not considered

ndash There are no bandwidth limits in network connections

ndash Peers have inbound and outbound bandwidth limits

ndash Set different number of selfish peers

Number of Peers

Inbound

Bandwidth

Outbound

Bandwidth

Type 1 1200 112kbps 96kbps

Type 2 600 1mbps 600kbps

Type 3 200 10mbps 10mbps

An example configuration

ndash Multiple multicast trees are constructed and maintained

Evaluation (2)

The average bit rates that selfish peers receive are much less than collaborative ones

In the media streaming process selfish peers tend to be placed at the edges of multicast trees

Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora

tive to selfish

Average Bit Rate

0

100

200

300

400

500600

700

800

900

1000

300

600

900

1200

1500

1800

2100

2400

2700

3000

3300

3600

Time (seconds)

Ave

rag

e B

it R

ate

(kb

ps)

Type 1 C

Type 1 S

Type 2 C

Type 2 S

Type 3 C

Type 3 S

Change of Selfish Peers

0

5

10

15

20

25

30

35

Time

Per

cen

t o

f S

elfi

sh P

eers

10

20

30

Thank you

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

P2P Overlay Networking (1)

Client Server

IP Network

Traditional System

IP Network

Overlay

Client Server

P2P Communication Network

P2P Overlay Networking (2)

An overlay network is a set of logical connections between end hosts

Overlay networks can be unstructured or structured

Proximity not necessarily taken into account

Overlay maintenance is an issue

Media Streaming in P2P Networks

P2P media streamingndash Peers playback and cache the media content

during the streaming sessionndash They stream the cached content to other peers if

requestedndash Some kind of multicast structure is used

Backup and Data Archiving

Storage space sharing Peers store data for each other

ndash Improve availability of their data When a peer loses its data

ndash Heterogeneity of peers enables data availability under virus attacks

No computer virus can attack all different OSes

ndash Cheaper than centralized backup services

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

What are malicious peers

If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally

The concept of malicious peers is application-specific

Malicious Peers (1)

File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip

Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip

Malicious Peers (2)

Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip

Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

Introduction to Media Streaming

Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )

Streaming Methodsndash Livendash On-Demand

Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)

An application of bandwidth allocation and sharing

Media Streaming vs File Downloading

File Downloading Media Streaming

Mode Open-after-downloading Play-while-downloading

Download Order Our of order In order

Download Speed Requirement

Average download speed matters

Require relatively steady download speed

Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)

Not widely used yet

Freeloaders Not a big issue A big problem

Collaborative P2P Media Streaming

Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea

m peers U(Pi) and downstream peers D(Pi)

ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable

ndash U(Pi) adjust streams to Pi accordingly

Streaming certificates are transferred piggyback with streaming control sequences

An Example

Incentive Mechanisms

A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner

A peer can get better streaming quality if it contributes more and earns more streaming certificates

Evaluation (1)

Simulation-based experiments are conducted

ndash Network topology is not considered

ndash There are no bandwidth limits in network connections

ndash Peers have inbound and outbound bandwidth limits

ndash Set different number of selfish peers

Number of Peers

Inbound

Bandwidth

Outbound

Bandwidth

Type 1 1200 112kbps 96kbps

Type 2 600 1mbps 600kbps

Type 3 200 10mbps 10mbps

An example configuration

ndash Multiple multicast trees are constructed and maintained

Evaluation (2)

The average bit rates that selfish peers receive are much less than collaborative ones

In the media streaming process selfish peers tend to be placed at the edges of multicast trees

Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora

tive to selfish

Average Bit Rate

0

100

200

300

400

500600

700

800

900

1000

300

600

900

1200

1500

1800

2100

2400

2700

3000

3300

3600

Time (seconds)

Ave

rag

e B

it R

ate

(kb

ps)

Type 1 C

Type 1 S

Type 2 C

Type 2 S

Type 3 C

Type 3 S

Change of Selfish Peers

0

5

10

15

20

25

30

35

Time

Per

cen

t o

f S

elfi

sh P

eers

10

20

30

Thank you

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

P2P Overlay Networking (2)

An overlay network is a set of logical connections between end hosts

Overlay networks can be unstructured or structured

Proximity not necessarily taken into account

Overlay maintenance is an issue

Media Streaming in P2P Networks

P2P media streamingndash Peers playback and cache the media content

during the streaming sessionndash They stream the cached content to other peers if

requestedndash Some kind of multicast structure is used

Backup and Data Archiving

Storage space sharing Peers store data for each other

ndash Improve availability of their data When a peer loses its data

ndash Heterogeneity of peers enables data availability under virus attacks

No computer virus can attack all different OSes

ndash Cheaper than centralized backup services

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

What are malicious peers

If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally

The concept of malicious peers is application-specific

Malicious Peers (1)

File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip

Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip

Malicious Peers (2)

Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip

Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

Introduction to Media Streaming

Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )

Streaming Methodsndash Livendash On-Demand

Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)

An application of bandwidth allocation and sharing

Media Streaming vs File Downloading

File Downloading Media Streaming

Mode Open-after-downloading Play-while-downloading

Download Order Our of order In order

Download Speed Requirement

Average download speed matters

Require relatively steady download speed

Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)

Not widely used yet

Freeloaders Not a big issue A big problem

Collaborative P2P Media Streaming

Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea

m peers U(Pi) and downstream peers D(Pi)

ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable

ndash U(Pi) adjust streams to Pi accordingly

Streaming certificates are transferred piggyback with streaming control sequences

An Example

Incentive Mechanisms

A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner

A peer can get better streaming quality if it contributes more and earns more streaming certificates

Evaluation (1)

Simulation-based experiments are conducted

ndash Network topology is not considered

ndash There are no bandwidth limits in network connections

ndash Peers have inbound and outbound bandwidth limits

ndash Set different number of selfish peers

Number of Peers

Inbound

Bandwidth

Outbound

Bandwidth

Type 1 1200 112kbps 96kbps

Type 2 600 1mbps 600kbps

Type 3 200 10mbps 10mbps

An example configuration

ndash Multiple multicast trees are constructed and maintained

Evaluation (2)

The average bit rates that selfish peers receive are much less than collaborative ones

In the media streaming process selfish peers tend to be placed at the edges of multicast trees

Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora

tive to selfish

Average Bit Rate

0

100

200

300

400

500600

700

800

900

1000

300

600

900

1200

1500

1800

2100

2400

2700

3000

3300

3600

Time (seconds)

Ave

rag

e B

it R

ate

(kb

ps)

Type 1 C

Type 1 S

Type 2 C

Type 2 S

Type 3 C

Type 3 S

Change of Selfish Peers

0

5

10

15

20

25

30

35

Time

Per

cen

t o

f S

elfi

sh P

eers

10

20

30

Thank you

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

Media Streaming in P2P Networks

P2P media streamingndash Peers playback and cache the media content

during the streaming sessionndash They stream the cached content to other peers if

requestedndash Some kind of multicast structure is used

Backup and Data Archiving

Storage space sharing Peers store data for each other

ndash Improve availability of their data When a peer loses its data

ndash Heterogeneity of peers enables data availability under virus attacks

No computer virus can attack all different OSes

ndash Cheaper than centralized backup services

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

What are malicious peers

If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally

The concept of malicious peers is application-specific

Malicious Peers (1)

File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip

Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip

Malicious Peers (2)

Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip

Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

Introduction to Media Streaming

Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )

Streaming Methodsndash Livendash On-Demand

Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)

An application of bandwidth allocation and sharing

Media Streaming vs File Downloading

File Downloading Media Streaming

Mode Open-after-downloading Play-while-downloading

Download Order Our of order In order

Download Speed Requirement

Average download speed matters

Require relatively steady download speed

Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)

Not widely used yet

Freeloaders Not a big issue A big problem

Collaborative P2P Media Streaming

Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea

m peers U(Pi) and downstream peers D(Pi)

ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable

ndash U(Pi) adjust streams to Pi accordingly

Streaming certificates are transferred piggyback with streaming control sequences

An Example

Incentive Mechanisms

A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner

A peer can get better streaming quality if it contributes more and earns more streaming certificates

Evaluation (1)

Simulation-based experiments are conducted

ndash Network topology is not considered

ndash There are no bandwidth limits in network connections

ndash Peers have inbound and outbound bandwidth limits

ndash Set different number of selfish peers

Number of Peers

Inbound

Bandwidth

Outbound

Bandwidth

Type 1 1200 112kbps 96kbps

Type 2 600 1mbps 600kbps

Type 3 200 10mbps 10mbps

An example configuration

ndash Multiple multicast trees are constructed and maintained

Evaluation (2)

The average bit rates that selfish peers receive are much less than collaborative ones

In the media streaming process selfish peers tend to be placed at the edges of multicast trees

Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora

tive to selfish

Average Bit Rate

0

100

200

300

400

500600

700

800

900

1000

300

600

900

1200

1500

1800

2100

2400

2700

3000

3300

3600

Time (seconds)

Ave

rag

e B

it R

ate

(kb

ps)

Type 1 C

Type 1 S

Type 2 C

Type 2 S

Type 3 C

Type 3 S

Change of Selfish Peers

0

5

10

15

20

25

30

35

Time

Per

cen

t o

f S

elfi

sh P

eers

10

20

30

Thank you

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

Backup and Data Archiving

Storage space sharing Peers store data for each other

ndash Improve availability of their data When a peer loses its data

ndash Heterogeneity of peers enables data availability under virus attacks

No computer virus can attack all different OSes

ndash Cheaper than centralized backup services

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

What are malicious peers

If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally

The concept of malicious peers is application-specific

Malicious Peers (1)

File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip

Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip

Malicious Peers (2)

Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip

Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

Introduction to Media Streaming

Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )

Streaming Methodsndash Livendash On-Demand

Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)

An application of bandwidth allocation and sharing

Media Streaming vs File Downloading

File Downloading Media Streaming

Mode Open-after-downloading Play-while-downloading

Download Order Our of order In order

Download Speed Requirement

Average download speed matters

Require relatively steady download speed

Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)

Not widely used yet

Freeloaders Not a big issue A big problem

Collaborative P2P Media Streaming

Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea

m peers U(Pi) and downstream peers D(Pi)

ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable

ndash U(Pi) adjust streams to Pi accordingly

Streaming certificates are transferred piggyback with streaming control sequences

An Example

Incentive Mechanisms

A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner

A peer can get better streaming quality if it contributes more and earns more streaming certificates

Evaluation (1)

Simulation-based experiments are conducted

ndash Network topology is not considered

ndash There are no bandwidth limits in network connections

ndash Peers have inbound and outbound bandwidth limits

ndash Set different number of selfish peers

Number of Peers

Inbound

Bandwidth

Outbound

Bandwidth

Type 1 1200 112kbps 96kbps

Type 2 600 1mbps 600kbps

Type 3 200 10mbps 10mbps

An example configuration

ndash Multiple multicast trees are constructed and maintained

Evaluation (2)

The average bit rates that selfish peers receive are much less than collaborative ones

In the media streaming process selfish peers tend to be placed at the edges of multicast trees

Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora

tive to selfish

Average Bit Rate

0

100

200

300

400

500600

700

800

900

1000

300

600

900

1200

1500

1800

2100

2400

2700

3000

3300

3600

Time (seconds)

Ave

rag

e B

it R

ate

(kb

ps)

Type 1 C

Type 1 S

Type 2 C

Type 2 S

Type 3 C

Type 3 S

Change of Selfish Peers

0

5

10

15

20

25

30

35

Time

Per

cen

t o

f S

elfi

sh P

eers

10

20

30

Thank you

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

What are malicious peers

If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally

The concept of malicious peers is application-specific

Malicious Peers (1)

File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip

Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip

Malicious Peers (2)

Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip

Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

Introduction to Media Streaming

Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )

Streaming Methodsndash Livendash On-Demand

Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)

An application of bandwidth allocation and sharing

Media Streaming vs File Downloading

File Downloading Media Streaming

Mode Open-after-downloading Play-while-downloading

Download Order Our of order In order

Download Speed Requirement

Average download speed matters

Require relatively steady download speed

Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)

Not widely used yet

Freeloaders Not a big issue A big problem

Collaborative P2P Media Streaming

Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea

m peers U(Pi) and downstream peers D(Pi)

ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable

ndash U(Pi) adjust streams to Pi accordingly

Streaming certificates are transferred piggyback with streaming control sequences

An Example

Incentive Mechanisms

A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner

A peer can get better streaming quality if it contributes more and earns more streaming certificates

Evaluation (1)

Simulation-based experiments are conducted

ndash Network topology is not considered

ndash There are no bandwidth limits in network connections

ndash Peers have inbound and outbound bandwidth limits

ndash Set different number of selfish peers

Number of Peers

Inbound

Bandwidth

Outbound

Bandwidth

Type 1 1200 112kbps 96kbps

Type 2 600 1mbps 600kbps

Type 3 200 10mbps 10mbps

An example configuration

ndash Multiple multicast trees are constructed and maintained

Evaluation (2)

The average bit rates that selfish peers receive are much less than collaborative ones

In the media streaming process selfish peers tend to be placed at the edges of multicast trees

Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora

tive to selfish

Average Bit Rate

0

100

200

300

400

500600

700

800

900

1000

300

600

900

1200

1500

1800

2100

2400

2700

3000

3300

3600

Time (seconds)

Ave

rag

e B

it R

ate

(kb

ps)

Type 1 C

Type 1 S

Type 2 C

Type 2 S

Type 3 C

Type 3 S

Change of Selfish Peers

0

5

10

15

20

25

30

35

Time

Per

cen

t o

f S

elfi

sh P

eers

10

20

30

Thank you

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

What are malicious peers

If peers do not do what they are supposed to do (according to the application protocol) they are malicious peers (aka non-collaborative peers)ndash Intentionally or unintentionally

The concept of malicious peers is application-specific

Malicious Peers (1)

File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip

Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip

Malicious Peers (2)

Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip

Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

Introduction to Media Streaming

Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )

Streaming Methodsndash Livendash On-Demand

Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)

An application of bandwidth allocation and sharing

Media Streaming vs File Downloading

File Downloading Media Streaming

Mode Open-after-downloading Play-while-downloading

Download Order Our of order In order

Download Speed Requirement

Average download speed matters

Require relatively steady download speed

Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)

Not widely used yet

Freeloaders Not a big issue A big problem

Collaborative P2P Media Streaming

Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea

m peers U(Pi) and downstream peers D(Pi)

ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable

ndash U(Pi) adjust streams to Pi accordingly

Streaming certificates are transferred piggyback with streaming control sequences

An Example

Incentive Mechanisms

A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner

A peer can get better streaming quality if it contributes more and earns more streaming certificates

Evaluation (1)

Simulation-based experiments are conducted

ndash Network topology is not considered

ndash There are no bandwidth limits in network connections

ndash Peers have inbound and outbound bandwidth limits

ndash Set different number of selfish peers

Number of Peers

Inbound

Bandwidth

Outbound

Bandwidth

Type 1 1200 112kbps 96kbps

Type 2 600 1mbps 600kbps

Type 3 200 10mbps 10mbps

An example configuration

ndash Multiple multicast trees are constructed and maintained

Evaluation (2)

The average bit rates that selfish peers receive are much less than collaborative ones

In the media streaming process selfish peers tend to be placed at the edges of multicast trees

Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora

tive to selfish

Average Bit Rate

0

100

200

300

400

500600

700

800

900

1000

300

600

900

1200

1500

1800

2100

2400

2700

3000

3300

3600

Time (seconds)

Ave

rag

e B

it R

ate

(kb

ps)

Type 1 C

Type 1 S

Type 2 C

Type 2 S

Type 3 C

Type 3 S

Change of Selfish Peers

0

5

10

15

20

25

30

35

Time

Per

cen

t o

f S

elfi

sh P

eers

10

20

30

Thank you

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

Malicious Peers (1)

File Sharingndash Freeloadersndash Share invalid filesndash Distribute virusndash hellip

Overlay Networkndash Freeloadersndash Misroute other peersrsquo packetsndash hellip

Malicious Peers (2)

Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip

Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

Introduction to Media Streaming

Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )

Streaming Methodsndash Livendash On-Demand

Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)

An application of bandwidth allocation and sharing

Media Streaming vs File Downloading

File Downloading Media Streaming

Mode Open-after-downloading Play-while-downloading

Download Order Our of order In order

Download Speed Requirement

Average download speed matters

Require relatively steady download speed

Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)

Not widely used yet

Freeloaders Not a big issue A big problem

Collaborative P2P Media Streaming

Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea

m peers U(Pi) and downstream peers D(Pi)

ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable

ndash U(Pi) adjust streams to Pi accordingly

Streaming certificates are transferred piggyback with streaming control sequences

An Example

Incentive Mechanisms

A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner

A peer can get better streaming quality if it contributes more and earns more streaming certificates

Evaluation (1)

Simulation-based experiments are conducted

ndash Network topology is not considered

ndash There are no bandwidth limits in network connections

ndash Peers have inbound and outbound bandwidth limits

ndash Set different number of selfish peers

Number of Peers

Inbound

Bandwidth

Outbound

Bandwidth

Type 1 1200 112kbps 96kbps

Type 2 600 1mbps 600kbps

Type 3 200 10mbps 10mbps

An example configuration

ndash Multiple multicast trees are constructed and maintained

Evaluation (2)

The average bit rates that selfish peers receive are much less than collaborative ones

In the media streaming process selfish peers tend to be placed at the edges of multicast trees

Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora

tive to selfish

Average Bit Rate

0

100

200

300

400

500600

700

800

900

1000

300

600

900

1200

1500

1800

2100

2400

2700

3000

3300

3600

Time (seconds)

Ave

rag

e B

it R

ate

(kb

ps)

Type 1 C

Type 1 S

Type 2 C

Type 2 S

Type 3 C

Type 3 S

Change of Selfish Peers

0

5

10

15

20

25

30

35

Time

Per

cen

t o

f S

elfi

sh P

eers

10

20

30

Thank you

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

Malicious Peers (2)

Media Streamingndash Freeloadersndash Share invalid videoaudio clipsndash Intentionally modify videoaudio clips being sharedndash hellip

Backupndash Discard other peersrsquo datandash Unreliable storage spacendash hellip

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

Introduction to Media Streaming

Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )

Streaming Methodsndash Livendash On-Demand

Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)

An application of bandwidth allocation and sharing

Media Streaming vs File Downloading

File Downloading Media Streaming

Mode Open-after-downloading Play-while-downloading

Download Order Our of order In order

Download Speed Requirement

Average download speed matters

Require relatively steady download speed

Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)

Not widely used yet

Freeloaders Not a big issue A big problem

Collaborative P2P Media Streaming

Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea

m peers U(Pi) and downstream peers D(Pi)

ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable

ndash U(Pi) adjust streams to Pi accordingly

Streaming certificates are transferred piggyback with streaming control sequences

An Example

Incentive Mechanisms

A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner

A peer can get better streaming quality if it contributes more and earns more streaming certificates

Evaluation (1)

Simulation-based experiments are conducted

ndash Network topology is not considered

ndash There are no bandwidth limits in network connections

ndash Peers have inbound and outbound bandwidth limits

ndash Set different number of selfish peers

Number of Peers

Inbound

Bandwidth

Outbound

Bandwidth

Type 1 1200 112kbps 96kbps

Type 2 600 1mbps 600kbps

Type 3 200 10mbps 10mbps

An example configuration

ndash Multiple multicast trees are constructed and maintained

Evaluation (2)

The average bit rates that selfish peers receive are much less than collaborative ones

In the media streaming process selfish peers tend to be placed at the edges of multicast trees

Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora

tive to selfish

Average Bit Rate

0

100

200

300

400

500600

700

800

900

1000

300

600

900

1200

1500

1800

2100

2400

2700

3000

3300

3600

Time (seconds)

Ave

rag

e B

it R

ate

(kb

ps)

Type 1 C

Type 1 S

Type 2 C

Type 2 S

Type 3 C

Type 3 S

Change of Selfish Peers

0

5

10

15

20

25

30

35

Time

Per

cen

t o

f S

elfi

sh P

eers

10

20

30

Thank you

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

Outline

What is Peer-to-Peer (P2P) P2P Applications Malicious Peers in P2P Applications Case Study P2P Media Streaming

Introduction to Media Streaming

Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )

Streaming Methodsndash Livendash On-Demand

Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)

An application of bandwidth allocation and sharing

Media Streaming vs File Downloading

File Downloading Media Streaming

Mode Open-after-downloading Play-while-downloading

Download Order Our of order In order

Download Speed Requirement

Average download speed matters

Require relatively steady download speed

Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)

Not widely used yet

Freeloaders Not a big issue A big problem

Collaborative P2P Media Streaming

Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea

m peers U(Pi) and downstream peers D(Pi)

ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable

ndash U(Pi) adjust streams to Pi accordingly

Streaming certificates are transferred piggyback with streaming control sequences

An Example

Incentive Mechanisms

A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner

A peer can get better streaming quality if it contributes more and earns more streaming certificates

Evaluation (1)

Simulation-based experiments are conducted

ndash Network topology is not considered

ndash There are no bandwidth limits in network connections

ndash Peers have inbound and outbound bandwidth limits

ndash Set different number of selfish peers

Number of Peers

Inbound

Bandwidth

Outbound

Bandwidth

Type 1 1200 112kbps 96kbps

Type 2 600 1mbps 600kbps

Type 3 200 10mbps 10mbps

An example configuration

ndash Multiple multicast trees are constructed and maintained

Evaluation (2)

The average bit rates that selfish peers receive are much less than collaborative ones

In the media streaming process selfish peers tend to be placed at the edges of multicast trees

Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora

tive to selfish

Average Bit Rate

0

100

200

300

400

500600

700

800

900

1000

300

600

900

1200

1500

1800

2100

2400

2700

3000

3300

3600

Time (seconds)

Ave

rag

e B

it R

ate

(kb

ps)

Type 1 C

Type 1 S

Type 2 C

Type 2 S

Type 3 C

Type 3 S

Change of Selfish Peers

0

5

10

15

20

25

30

35

Time

Per

cen

t o

f S

elfi

sh P

eers

10

20

30

Thank you

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

Introduction to Media Streaming

Streamed Mediandash Audio (~300Kbps)ndash Video (150Kbps 750Kbps 2Mbps )

Streaming Methodsndash Livendash On-Demand

Streaming Products ndash Real (rm rmvb ra hellip)ndash Microsoft (asf wmv hellip)

An application of bandwidth allocation and sharing

Media Streaming vs File Downloading

File Downloading Media Streaming

Mode Open-after-downloading Play-while-downloading

Download Order Our of order In order

Download Speed Requirement

Average download speed matters

Require relatively steady download speed

Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)

Not widely used yet

Freeloaders Not a big issue A big problem

Collaborative P2P Media Streaming

Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea

m peers U(Pi) and downstream peers D(Pi)

ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable

ndash U(Pi) adjust streams to Pi accordingly

Streaming certificates are transferred piggyback with streaming control sequences

An Example

Incentive Mechanisms

A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner

A peer can get better streaming quality if it contributes more and earns more streaming certificates

Evaluation (1)

Simulation-based experiments are conducted

ndash Network topology is not considered

ndash There are no bandwidth limits in network connections

ndash Peers have inbound and outbound bandwidth limits

ndash Set different number of selfish peers

Number of Peers

Inbound

Bandwidth

Outbound

Bandwidth

Type 1 1200 112kbps 96kbps

Type 2 600 1mbps 600kbps

Type 3 200 10mbps 10mbps

An example configuration

ndash Multiple multicast trees are constructed and maintained

Evaluation (2)

The average bit rates that selfish peers receive are much less than collaborative ones

In the media streaming process selfish peers tend to be placed at the edges of multicast trees

Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora

tive to selfish

Average Bit Rate

0

100

200

300

400

500600

700

800

900

1000

300

600

900

1200

1500

1800

2100

2400

2700

3000

3300

3600

Time (seconds)

Ave

rag

e B

it R

ate

(kb

ps)

Type 1 C

Type 1 S

Type 2 C

Type 2 S

Type 3 C

Type 3 S

Change of Selfish Peers

0

5

10

15

20

25

30

35

Time

Per

cen

t o

f S

elfi

sh P

eers

10

20

30

Thank you

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

Media Streaming vs File Downloading

File Downloading Media Streaming

Mode Open-after-downloading Play-while-downloading

Download Order Our of order In order

Download Speed Requirement

Average download speed matters

Require relatively steady download speed

Current Status Widely deployed and accepted (eDonkey BitTorrent hellip)

Not widely used yet

Freeloaders Not a big issue A big problem

Collaborative P2P Media Streaming

Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea

m peers U(Pi) and downstream peers D(Pi)

ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable

ndash U(Pi) adjust streams to Pi accordingly

Streaming certificates are transferred piggyback with streaming control sequences

An Example

Incentive Mechanisms

A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner

A peer can get better streaming quality if it contributes more and earns more streaming certificates

Evaluation (1)

Simulation-based experiments are conducted

ndash Network topology is not considered

ndash There are no bandwidth limits in network connections

ndash Peers have inbound and outbound bandwidth limits

ndash Set different number of selfish peers

Number of Peers

Inbound

Bandwidth

Outbound

Bandwidth

Type 1 1200 112kbps 96kbps

Type 2 600 1mbps 600kbps

Type 3 200 10mbps 10mbps

An example configuration

ndash Multiple multicast trees are constructed and maintained

Evaluation (2)

The average bit rates that selfish peers receive are much less than collaborative ones

In the media streaming process selfish peers tend to be placed at the edges of multicast trees

Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora

tive to selfish

Average Bit Rate

0

100

200

300

400

500600

700

800

900

1000

300

600

900

1200

1500

1800

2100

2400

2700

3000

3300

3600

Time (seconds)

Ave

rag

e B

it R

ate

(kb

ps)

Type 1 C

Type 1 S

Type 2 C

Type 2 S

Type 3 C

Type 3 S

Change of Selfish Peers

0

5

10

15

20

25

30

35

Time

Per

cen

t o

f S

elfi

sh P

eers

10

20

30

Thank you

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

Collaborative P2P Media Streaming

Our solutionndash A peer Pirsquos behavior is monitored by both its upstrea

m peers U(Pi) and downstream peers D(Pi)

ndash D(Pi) send streaming certificates for Pi to U(Pi) Streaming certificates are negotiable

ndash U(Pi) adjust streams to Pi accordingly

Streaming certificates are transferred piggyback with streaming control sequences

An Example

Incentive Mechanisms

A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner

A peer can get better streaming quality if it contributes more and earns more streaming certificates

Evaluation (1)

Simulation-based experiments are conducted

ndash Network topology is not considered

ndash There are no bandwidth limits in network connections

ndash Peers have inbound and outbound bandwidth limits

ndash Set different number of selfish peers

Number of Peers

Inbound

Bandwidth

Outbound

Bandwidth

Type 1 1200 112kbps 96kbps

Type 2 600 1mbps 600kbps

Type 3 200 10mbps 10mbps

An example configuration

ndash Multiple multicast trees are constructed and maintained

Evaluation (2)

The average bit rates that selfish peers receive are much less than collaborative ones

In the media streaming process selfish peers tend to be placed at the edges of multicast trees

Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora

tive to selfish

Average Bit Rate

0

100

200

300

400

500600

700

800

900

1000

300

600

900

1200

1500

1800

2100

2400

2700

3000

3300

3600

Time (seconds)

Ave

rag

e B

it R

ate

(kb

ps)

Type 1 C

Type 1 S

Type 2 C

Type 2 S

Type 3 C

Type 3 S

Change of Selfish Peers

0

5

10

15

20

25

30

35

Time

Per

cen

t o

f S

elfi

sh P

eers

10

20

30

Thank you

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

An Example

Incentive Mechanisms

A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner

A peer can get better streaming quality if it contributes more and earns more streaming certificates

Evaluation (1)

Simulation-based experiments are conducted

ndash Network topology is not considered

ndash There are no bandwidth limits in network connections

ndash Peers have inbound and outbound bandwidth limits

ndash Set different number of selfish peers

Number of Peers

Inbound

Bandwidth

Outbound

Bandwidth

Type 1 1200 112kbps 96kbps

Type 2 600 1mbps 600kbps

Type 3 200 10mbps 10mbps

An example configuration

ndash Multiple multicast trees are constructed and maintained

Evaluation (2)

The average bit rates that selfish peers receive are much less than collaborative ones

In the media streaming process selfish peers tend to be placed at the edges of multicast trees

Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora

tive to selfish

Average Bit Rate

0

100

200

300

400

500600

700

800

900

1000

300

600

900

1200

1500

1800

2100

2400

2700

3000

3300

3600

Time (seconds)

Ave

rag

e B

it R

ate

(kb

ps)

Type 1 C

Type 1 S

Type 2 C

Type 2 S

Type 3 C

Type 3 S

Change of Selfish Peers

0

5

10

15

20

25

30

35

Time

Per

cen

t o

f S

elfi

sh P

eers

10

20

30

Thank you

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

Incentive Mechanisms

A peerrsquos selfish behavior can be detected by its upstream peers in a timely manner

A peer can get better streaming quality if it contributes more and earns more streaming certificates

Evaluation (1)

Simulation-based experiments are conducted

ndash Network topology is not considered

ndash There are no bandwidth limits in network connections

ndash Peers have inbound and outbound bandwidth limits

ndash Set different number of selfish peers

Number of Peers

Inbound

Bandwidth

Outbound

Bandwidth

Type 1 1200 112kbps 96kbps

Type 2 600 1mbps 600kbps

Type 3 200 10mbps 10mbps

An example configuration

ndash Multiple multicast trees are constructed and maintained

Evaluation (2)

The average bit rates that selfish peers receive are much less than collaborative ones

In the media streaming process selfish peers tend to be placed at the edges of multicast trees

Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora

tive to selfish

Average Bit Rate

0

100

200

300

400

500600

700

800

900

1000

300

600

900

1200

1500

1800

2100

2400

2700

3000

3300

3600

Time (seconds)

Ave

rag

e B

it R

ate

(kb

ps)

Type 1 C

Type 1 S

Type 2 C

Type 2 S

Type 3 C

Type 3 S

Change of Selfish Peers

0

5

10

15

20

25

30

35

Time

Per

cen

t o

f S

elfi

sh P

eers

10

20

30

Thank you

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

Evaluation (1)

Simulation-based experiments are conducted

ndash Network topology is not considered

ndash There are no bandwidth limits in network connections

ndash Peers have inbound and outbound bandwidth limits

ndash Set different number of selfish peers

Number of Peers

Inbound

Bandwidth

Outbound

Bandwidth

Type 1 1200 112kbps 96kbps

Type 2 600 1mbps 600kbps

Type 3 200 10mbps 10mbps

An example configuration

ndash Multiple multicast trees are constructed and maintained

Evaluation (2)

The average bit rates that selfish peers receive are much less than collaborative ones

In the media streaming process selfish peers tend to be placed at the edges of multicast trees

Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora

tive to selfish

Average Bit Rate

0

100

200

300

400

500600

700

800

900

1000

300

600

900

1200

1500

1800

2100

2400

2700

3000

3300

3600

Time (seconds)

Ave

rag

e B

it R

ate

(kb

ps)

Type 1 C

Type 1 S

Type 2 C

Type 2 S

Type 3 C

Type 3 S

Change of Selfish Peers

0

5

10

15

20

25

30

35

Time

Per

cen

t o

f S

elfi

sh P

eers

10

20

30

Thank you

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

Evaluation (2)

The average bit rates that selfish peers receive are much less than collaborative ones

In the media streaming process selfish peers tend to be placed at the edges of multicast trees

Peers tend to behave collaboratively if they are allowed change their behavior from selfish to collaborativendash Peers are not allowed to change from collabora

tive to selfish

Average Bit Rate

0

100

200

300

400

500600

700

800

900

1000

300

600

900

1200

1500

1800

2100

2400

2700

3000

3300

3600

Time (seconds)

Ave

rag

e B

it R

ate

(kb

ps)

Type 1 C

Type 1 S

Type 2 C

Type 2 S

Type 3 C

Type 3 S

Change of Selfish Peers

0

5

10

15

20

25

30

35

Time

Per

cen

t o

f S

elfi

sh P

eers

10

20

30

Thank you

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

Average Bit Rate

0

100

200

300

400

500600

700

800

900

1000

300

600

900

1200

1500

1800

2100

2400

2700

3000

3300

3600

Time (seconds)

Ave

rag

e B

it R

ate

(kb

ps)

Type 1 C

Type 1 S

Type 2 C

Type 2 S

Type 3 C

Type 3 S

Change of Selfish Peers

0

5

10

15

20

25

30

35

Time

Per

cen

t o

f S

elfi

sh P

eers

10

20

30

Thank you

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

Change of Selfish Peers

0

5

10

15

20

25

30

35

Time

Per

cen

t o

f S

elfi

sh P

eers

10

20

30

Thank you

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

Thank you

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

P2P Research Projects and Systems

Freenet Publis SFS Bayou FARSITE Logistical Networking Pangaea Pastiche Bullet P2Cast SETIhome

Dagster SplitStream Gia OceanStore PAST Squirrel CFS Ivy PeerDB PIER hellip

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30

P2P courses

UC Berkeley httpwwwcsberkeleyedu~kubitroncoursescs294-4-F03

U Waterloo

httpbcr2uwaterlooca~rboutabacs856cs856schedulehtml

  • Slide 29
  • Slide 30