Transcript now

Decentralized Systems:
P2P
Networks
1
Agenda

Network Models

What are P2P Systems?

File Sharing Techniques

Content Delivery

PageRank
2
Network Models

Centralized: A centralized
network uses a server as a
central node.

Decentralized: A decentralized
network has no servers, only
clients.

People can exchange info directly,
without a central server.
3
What are P2P Systems?

Allow a group of computer users
(employing the same networking software)
to connect with each other to share
resources.

Processing power, disk storage, network
bandwidth and files to be directly available
to other peers.

They behave in a distributed manner
without a central server.

Peers can act as both server and client
then they are also called servent, which is
different from the traditional client-server
model.
4
What are P2P Systems?

First, protocols are constructed at
the application layer of the network
protocol stack.

Second, in most designs peers have
a unique identifier, which is the peer
ID or peer address.

Third, many of the message types
defined in various P2P protocols are
similar.

Finally, the protocol supports some
type of message-routing capability.

That is, a message intended for one
peer can be transmitted via
intermediate peers to reach the
destination peer.
5
What are P2P Systems?

An overlay network design that is consistent
with self-organization would not use a star
topology or a broadcast topology to operate
the peers or form the overlay.
 Instead the topology is likely to be
decentralized such that the
interconnectedness of any peer, referred to
as the degree, doesn’t dominate the overlay
graph.

Self-organization means that peers
cooperate in the formation and maintenance
of the overlay, with each peer using local
state and partial information about the
overlay.
6
What are P2P Systems?

Each peer determines its capabilities
based on its own resources.

Each peer also determines when it joins the overlay,
what requests it makes to the overlay, and when it
leaves the overlay.

A peer that searches for an object and
doesn’t find it might not be able to
determine whether the object doesn’t exist
in the overlay or the peer storing the object
has left the overlay.

Peers may act to limit their resource
contribution to the overlay, for example, by
disconnecting from the overlay when not
using it.
7
P2P File-Sharing Application

Peer-to-Peer technology is a way to share
music, video and documents, play games,
and facilitate online telephone conversations.


The technology enables computers using the same or
compatible P2P programs to form a network and share
digital files directly with other computers on the network.
User have digital media files that they want to
share with others.

These files are registered by the user using the local
application according to properties such as title, artist, date,
and format
8
P2P File-Sharing Application
How are P2Ps Different From
Traditional File Transfer Methods?

File transfer using the FTP is
referred as Client-Server file
transfer.

The file is downloaded from a
single source (the file server) by
the destination/PC (a client).
http://propakistani.pk/2010/02/08/what-is-peer-to-peer-p2p-filesharing-and-how-does-it-work/
9
P2P File-Sharing Application
How to Search for Files?

Users anywhere on the Internet can search
for these files by providing a query in terms of
some combination of the same attributes.


Peer that has local media files matching the
query will return information on how to
retrieve the files.


Query is sent to other online peers in the
network.
It may also forward the query to other peers.
Users may receive multiple successful
responses to their query and can then select
the files they want to retrieve.

The files are then downloaded from the remote
peer to the local machine.
10
P2P File-Sharing Application
Challenging Issues

A large amount of polluted or corrupted content
has been published in file-sharing systems, and it
is difficult for a user to distinguish such content
from the original digital content they seek.

A free rider is a peer that uses the file-sharing
application to access content from others but does
not contribute content to the same degree to the
community of peers.
11
P2P File-Sharing Application
Proxy Connection
 If the user hasn’t initiated any file searches or
selected local files for sharing, the P2P application is
most likely using the computer and its network
connection for other peers.



It may be responding to search requests from other peers
or acting as a bootstrap peer for newly joining peers.
It may be caching popular files on its disk drive to save
search time for other peers.
It could be proxying connections on behalf of peers
that are behind firewalls.
12
P2P File-Sharing Application

Peer is connected to the overlay, it can exchange
messages with other peers in its neighbor list.


Over time it can add and remove peers from its neighbor list.
To refresh and update its neighbor list, it can send requests to
current neighbors asking for their neighbors.
13
P2P File-Sharing Application

Random graphs and scale-free or power-law random
graphs are relevant to most unstructured topologies.
14
File Sharing Techniques (Gnutella)

Gnutella was the first full P2P file-sharing system
and has remained one of the more popular systems
to date.

The earliest versions of the Gnutella protocol,
through version 0.4, used an unstructured overlay
with flooding for query routing.

After scalability became an apparent performance
issue, the most recent version of the Gnutella
protocol (version 0.6) adopted a superpeer
architecture in which the high-capacity peers are
superpeers and all queries are routed, using a
flooding mechanism, between superpeers.

Gnutella network has a power-law distribution and
what the peer lifetime distribution is.
15
File Sharing Techniques (Napster)

Napster is a file-sharing system that used
a central server for storing and searching
the directory of files, but performed the file
transfer in a direct P2P fashion.

The majority of these designs used an
unstructured overlay mechanism.

Napster is not a full P2P system, it
popularized the P2P concept in the mass
media and influenced subsequent filesharing systems.
16
File Sharing Techniques (Freenet)

Peer identifiers are called routing keys.

Each peer has a fixed-size routing table that stores links to other peers.

Each entry contains the routing key of the peer.

Freenet uses key-based routing for inserting and retrieving objects in the mesh.

Requests are forwarded to peers with the closest matching routing key.

If a request along one hop fails, the peer will try the next closest routing key in its routing table.
17
File Sharing Techniques

Most existing P2P indexing schemes can be
categorized into local, centralized, distributed,
or hybrid indexing types.
18
File Sharing Techniques (Centralized
Indexing)

The index is kept on a centralized server.


Object lookup is done by searching over the index on the central server to
obtain the location of the target object.
Napster,190 the father of today’s P2P content distribution system, is a
classical example of centralized indexing.

Napster, peers share MP3 files stored locally on their hard drives.

Text-based content description, such as the title of a song, is then
generated, indexed, and stored by the Napster server.

Each peer in the Napster network uses the Napster client software to
connect to the centralized Napster server.

Peers connected to the Napster server can submit keyword-based queries
for a particular audio file.
19
File Sharing Techniques (Centralized
Indexing)

A list of matching files along with the description and
location of the file is sent to the peer from the
server.

The peer then tries to connect to the peer with the
desired audio file and transfers the target content in
a P2P fashion.

The most noticeable drawbacks of a fully centralized
indexing system include vulnerability to attacks on
the server and the possibility of a bottleneck at the
server.
20
File Sharing Techniques (Localized
Index)

Each peer keeps the directory of its own data objects locally.

The early Gnutella design is a typical example of local index-based P2P system.

Local object indexing can be used to support complex query search.



Compared to centralized indexing schemes, localized indexing can create more network
load since queries potentially have to be sent to many peers in the overlay.



When a peer generates a query, it conveys the query to peers in the network to locate the desired
object, most often through flooding or random walk.
Forwarding of query messages is stopped when the desired object is found or when the Time-to-Live
(TTL) value expires.
But since query processing is distributed across many peers in parallel, there is inherent scalability.
If any peer node is faulty, it affects the objects stored locally but not the overall search mechanism of
the network.
Localized indexing offers advantages over centralized schemes in terms of system
scalability and reliability. It has led to the development of many Gnutella-based systems
21
File Sharing Techniques (Distributed
Index)

Distributes the index over all peers.

Pointers to a single object may reside in multiple indices located in
different peer nodes, most often in neighborhood peer nodes.

Freenet is one of the earliest P2P systems in this category.

It uses content hash keys to identify files.

Queries are forwarded to neighborhood peers based on a peer routing
table until the target object is found or the TTL threshold is reached.

One disadvantage posed by Freenet is its long startup time at peer
joining.
22
File Sharing Techniques (Hybrid Index)

Hybrid indexing intends to take advantage of the
query efficiency of centralized indexing and the
scalability of localized and distributed indexing.

Superpeers (supernodes) maintain the indices in a
distributed manner.

A query from an ordinary peer is sent to its
superpeer to retrieve the location of the desired
object.

The superpeer forwards the query to other
superpeers if it does not find the desired object in
its own index.

Information about the desired object is sent back to
the ordinary peer via its superpeer.

Thereafter, the query issuer may directly contact
the peer with the desired object.
23
Content Delivery

The large and growing number of audiences and
traffic levels, content providers have tried to deploy
networks and systems that can provide increased
scalability, reliability, and quality of services.

A content delivery network or content distribution
network (CDN) is a system of computers containing
copies
of data
placed
at
various nodes of
a network.

When properly designed and implemented, a CDN
can improve access to the data it caches by
increasing access bandwidth and redundancy and
reducing access delay.

CDN is an overlay network that employs
technologies, such as caching, load balancing,
scheduling, and request routing, to push replicated
content close to the network

To reduce the cost of content delivery, today many
companies are seeking or are offering peer-to-peerbased solutions in both personal and enterprise
applications
24
Content Delivery (P2P Caching)

Caching is a well-known
strategy in many networked
applications.

The capability to:



Reduce origin server load and
bandwidth requirement
Reduce network bandwidth usage
Reduce client-side latency leads to
improved scalability and
performance with lower cost.
25
Content Delivery (P2P Caching)
26
PageRank
27
27
RFID Datenvolumen
Major Issues of Existing PageRank
 Only Structure Consideration
 Knowledge of Global Network Structure
 Broken Link Problems
28
28
PageRank Calculation (Practice)

http://www.page-rank-calculator.com/
0.85
0.15
http://www.whitelines.nl/html/google-page-rank.html
29
Other Applications

VoIP (voice over IP) lack of voice
quality and limited availability of
broadband access in the consumer
market.

Skype is a VoP2P client

Skype offers both free desktop-todesktop calls and low-cost desktopto-public switched telephone
network (PSTN) calls, including
international calls.
30
Other Applications

P2PTV delivery often follows a channel organization in which
content is organized and accessed according to a directory of
programs and movies.
 Unlike file-sharing systems in which a media file is first
downloaded to the user’s computer and then played locally,
video-streaming applications must provide a real-time stream
transfer rate to each peer that equals the video playback rate.

If a media stream is encoded at 1.5 Mbps and there is a single
peer acting as the source for the stream, the path from the source
peer to the playback peer must provide a data transfer rate of 1.5
Mbps on average.

Some variation in the playback rate along the path can be
accommodated by pre-buffering a sufficient number of video frames.
Then if the transfer rate temporarily drops, the extra content in the
buffer is used to prevent dropouts at the rendering side.
31
Zattoo
Joost
32
Other Applications

Video-on-demand type applications, peers start
viewing a stream at arbitrary times, and those peers
that start viewing a stream concurrently may soon
diverge in stream position due to user actions such
as pause or rewind.

To avoid transferring complete copies of video files
to peers at playback, a method is needed for a peer
to locate the next chunk of video in its playback
schedule from some other peers in the P2P system.
33
References

John Buford, Heather Yu, Eng Keong Lua , P2P
Networking and Applications, Morgan Kaufmann Series
in Networking, December 26, 2008.

http://www.youtube.com/watch?feature=ends
creen&NR=1&v=i2m0qzRCs78
34
Telecommunication
Technology and Management
Thank you for all information and pictures referred in this lecture.
www.att.com and www22.verizon.com
Agenda

Old Technology

Modern Technologies
 Digital TV
 Cell Phone: Calling Features
 Hi-speed Internet

Network Management
 Expert System
 Knowledge Discovery and Data Mining

Other Intelligent Applications
36
Old Technologies
http://www.supermegatrolled.com/just-nokia-3310-destroysthe-dinosaurs/
http://www.prattonline.com/ResponsePoint.htm
37
Trend of Communication
38
Trend of Communication
39
Modern Technologies

Digital TV

TV Wireless Receiver

Requirements:

Wireless service from the Wireless Access Point to the
Wireless Receiver

Power outlet and connection of Wireless Receiver to TV
40
41
Modern Technologies

Home DVR

Ability to schedule recordings and pause live TV

Record up to four shows at once on a single DVR and
play them back in any room

Pause, fast-forward and rewind live or recorded shows
on any TV or pause your recorded show in one room
and pick it up in another

Play the same recorded shows on different TVs at one
time and control them separately
42
Modern Technologies

Interactive Applications (between TV and smart
phone)

Browse available TV content for current or future viewing,
search for content, and remotely manage recordings of
shows and movies on DVR.

With qualifying TV plans, download select popular TV
episodes/series from the Mobile Library to select
smartphones for viewing on the go.

Once a show is downloaded, you can watch it anytime!
43
Modern Technologies

TV Multiview

It allows you to choose your own Multiview
channels you want to watch.
44
Modern Technologies

Phone Services on TV

We can see who's calling without leaving the
comfort of their couch!

Caller ID notifications and Message Waiting Indicators
(MWI) will display on their TV
45
Modern Technologies

Calling Features






Call Screening – Only accept calls from a list of
phone numbers you select.
Call Transfer – Send a call that’s already in
progress to a different phone number.
Locate Me - Provides simultaneous ringing on up
to four wireless/landline numbers when someone
calls your home phone.
Call History – View a list of your recent calls, by
date and time, either online or on your TV screen.
Click to Call – Return a phone call using your Uverse TV screen and remote.
Caller ID on TV – See Caller ID and Voice Mail
notifications on your TV screen.
46
Modern Technologies

Online Photos and Music


Customers can now view the photos they've uploaded at
www.flickr.com on channel 91.
Share music and photos from networked Windows
PCs to TV
47
Modern Technologies

TV for Xbox 360

Access your DVR recordings from your
existing Xbox 360.

Switch seamlessly from playing games to
watching TV—without switching video inputs
on your TV.

Access the U-verse TV Menu, Guide, and a
robust library of On Demand programming.

Chat: Know instantly when your friends are on
Xbox LIVE®.

Use Xbox IM and Chat while watching TV.
48
Modern Technologies: Customer Support
49
Modern Technologies

Mobile Phone
50
Modern Technologies
Digital Voice: Calling Features
51
Modern Technologies
Digital Voice: Calling Features
52
Modern Technologies
Hi-Speed Internet
53
Network Solution for Business
54
Fiber Optic Technology!!
55
Network Management

Telecommunication networks are
extremely complex systems requiring
 High reliability
 High availability

The effective management of networks is
a critical, but complex, task.
 Telecommunications industry has heavily
invested in intelligent technologies.

Telecommunication industry has relied
on intelligent solutions to help manage
telecommunication networks.
http://www.qbase.gr/en/node/124
56
Network Management

Building intelligent applications involved acquiring
valuable telecommunication knowledge



Human experts
Applying this knowledge: an expert system.
This knowledge acquisition process is so timeconsuming that it is referred to as the “knowledge
acquisition bottleneck”.

Data mining techniques are now being applied to industrial
applications to break this bottleneck,

Replacing the manual knowledge acquisition process with
automated knowledge discovery.
57
Data Mining
http://www.laits.utexas.edu/~anorman/BUS.FOR/course.mat/Alex/
58
Expert Systems

Expert systems are programs which represent and
apply factual knowledge of specific areas of
expertise to solve problems



Require a knowledge engineer to acquire knowledge from
the domain experts
Encode knowledge in a rule-based expert system
These rules were very “ad-hoc” and as the number
of rules increased

Expert system became more difficult to understand and
modify
59
Expert Systems

The design of telecommunication expert
systems

needs to recognize all telecommunication
equipment incorporates self-diagnostic
capabilities
http://www.nextnine.com
60
Knowledge Discovery and Data Mining

Knowledge discovery is a field which has emerged from
various disciplines,

Artificial intelligence, Machine learning, Statistics, Databases.

Its process involves identifying valid, novel, potentially
useful and ultimately understandable patterns in data

Data mining, the most researched topic in this process,

Finding interesting patterns in the data via data analysis and
discovery algorithms.
61
Knowledge Discovery and Data Mining

The knowledge discovery process

Data preparation: selecting, cleaning and
preprocessing the data (e.g., filling in missing
values) and transforming it so that it is suitable for
data mining

Data mining: finding patterns in the data

Interpretation and evaluation: interpreting and
evaluating the patterns produced by data mining
62
Knowledge Discovery and Data Mining

A key motivation for knowledge discovery
 Replace or minimize the need for the time-consuming process of
manually acquiring knowledge from a domain expert.

Knowledge discovery is especially attractive to the
telecommunications industry since:
 Telecommunication networks are typically too complex to build
complete simulation models

Huge quantities of data are routinely available

Domain experts often are not aware of subtle patterns in data and
hence automated knowledge discovery can acquire new,
previously unknown, knowledge
63
Network Management Applications

Max & Opti-Max: Locating Problems in the Local
Loop

The Max (Maintenance administrator expert) system

diagnoses customer reported telephone problems in the local
loop, the final segment of the telephone network that connects
the customer to a central office

Max is a rule-based expert system



Diagnoses problems based on results of an electrical test on the
customer’s phone line,
Specific knowledge of the customer’s phone line and general
equipment knowledge.
Max determines where the trouble lies and selects the type of
technician to solve the problem.
64
Network Management Applications


Max & Opti-Max: Locating Problems in the Local Loop
 Problem of Max

its performance is affected by the local characteristics of each site
and thus numerous rule parameters must be tuned to optimize its
performance.

This tuning process is time consuming and for this reason a system
called Opti-Max was created to automatically tune these parameters
to appropriate values.
Opti-Max takes as input a set of training examples,
 Problem description and a diagnosis assigned by an expert,

Uses a hill-climbing search to find a set of parameter values
which perform well on these examples.

Opti-Max performs a type of automated knowledge discovery.
65
Network Management Applications

Trouble Locator: Locating Cable Network Troubles


It determines the location of troubles in a local telephone cable network
Data generated by a nightly automated test to help narrow down potential
cables or network equipment which may be faulty;


The Trouble Locator uses a Bayesian network and Bayesian inference
to solve this problem.


Test results are not sufficient to determine the exact cause.
The system begins by generating a local plant topology graph and then from
this generates a Bayesian network, where each node in the network contains
state information (belief of failure) of a plant component.
This system is used by preventative maintenance analysts as a
decision support system.
66
Network Management Applications

TASA: Finding Frequently Occurring Alarm
Episodes

The Telecommunication Network Alarm Sequence
Analyzer (TASA)


System for extracting knowledge about the behavior of the
network from a database of telecommunication network
alarms.
The goal of this system



To locate regularities in the alarm sequences in order to filter
redundant alarms
Locate problems in the network
Predict future faults
67
Network Management Applications

TASA operates in two phases


First phase: specialized algorithms are used to
find rules that describe frequently occurring alarm
episodes from the sequential alarm data
An example rule describing an alarm episode
is:

if alarms of types A and B occur within 5 seconds,
then an alarm of type C occurs within 60 seconds
with probability 0.7.
68
Network Management Applications

Second phase: collections of episodes are
interactively manipulated by the user


Interesting episodes from the original set can be
found
TASA supports this process by providing
operations to prune uninteresting episodes


Order the set of episodes
Group similar episodes
69
Network Management Applications

Scout: Identifying Network Faults via Data Mining

It operates by mining historical telecommunication data



Machine learning
Correlation techniques.
Scout identifies patterns of chronic problems directly
from the data by examining the network behavior
over periods of days and weeks.
70
Other Intelligent Applications

APRI: Predicting Uncollectible Debt

The Advanced Pattern Recognition and Identification
(APRI) system


The output of APRI is fed into a decision support
system which can take a variety of actions


To predict the probability of uncollectible debt based on
historical data, including data of past uncollectibles
Blocking a call from being completed.
APRI automatically constructs Bayesian network
models for classification problems using extremely
large databases.
71
ANSWER: A Hybrid Approach to Network
Management

Automatic Network Surveillance with Expert
Rules (ANSWER)

ANSWER utilizes both rule-based and objectoriented technologies

Employing a rule-based extension to the C++
object-oriented programming language.
72
Forecasting Telecommunication Equipment Failures
from Time Series Data

Errors may occur during the transmission of data over the
network,
 These errors can be detected and the data rerouted through
alternate paths.

The effect of the failure of a single component is limited due to
the redundancy in modern large-scale telecommunications
networks.

Modern telecommunication equipment contains self-diagnostic
testing capabilities.
 When any of these tests fail, an alarm message is sent to a
centralized site,

where it may be handled by a human or by an expert system
73
Challenging Works

Existing Researches:


http://www.research.att.com/evergreen/what_we_do
/research.html?fbid=A_Kn38ajPF9#Computing and
Communications Foundations
Existing Software's:

http://www.research.att.com/export/sites/att_labs/sof
tware_tools/index.html?fbid=A_Kn38ajPF9
74
Telecommunication Union

ITU (International Telecommunication Union) is the
United Nations specialized agency for information and
communication technologies – ICTs.
 สหภาพโทรคมนาคมระหว่างประเทศ


http://www.itu.int/en/Pages/default.aspx
National Broadcasting and Telecommunications
Commission (NBTC)

คณะกรรมการกิจการกระจายเสี ยง กิจการโทรทัศน์และกิจการโทรคมนาคมแห่งชาติ

http://www.nbtc.go.th/wps/portal/NTC/eng
75
References



http://www.att.com/
Gary Weiss, John Eddy, Sholom Weiss, “INTELLIGENT
TELECOMMUNICATION TECHNOLOGIES”, AT&T Labs, AT&T
Corporation, United States
http://www22.verizon.com/home/aboutfios/

http://www.research.att.com/evergreen/what_we_do/research.html?f
bid=A_Kn38ajPF9#Computing and Communications Foundations

http://www.research.att.com/export/sites/att_labs/software_tools/ind
ex.html?fbid=A_Kn38ajPF9
76