1. P2P Systems Flashcards

1
Q

What are P2P Systems?

A

P2P is a class of applications that takes advantage of resources –
storage, cycles, content, human presence – available at the edge of
the Internet.
Because accessing these decentralized resources means operating in
an environment of unstable connectivity and unpredictable IP
addresses, P2P nodes must operate outside the DNS system and
have significant or total autonomy from central servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the characteristics of P2P systems?

A
  • Direct interaction of systems (peers)
  • Equal and autonomous participants
  • Joint usage of resources
  • No central control / usage of central services
  • Self-organization of the system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 1st generation p2p systems?

A
  • Centralized P2P (Napster)
  • Pure P2P (Gnutella 0.4)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the characteristics of Napster

A
  • Central Directory Server stores all information
  • One-hop lookup
  • Then direct p2p communicatoin
    Disadvantages:
  • SPOF, bottleneck
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the characteristics of Gnutella 0.4

A
  • Message flooding on query
  • Then p2p communication
    Disadvantages:
  • Lots of overhead
  • Possible false negatives due to maximum hop distance of query
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the 2nd generation p2p system and what are its charactesristics?

A

Hybrid P2P (Gnutella 0.6):
- Hierarchical network (superpeers and leafnodes)
- Election process to determine superpeers
- Reduces traffic at leaf nodes but not at superpeers
- Creates asymmetric load
- Still false positives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Give the definition for the clustering coefficient

A

C(v) = (2*e(v)) / (deg(v) * (deg(v) -1))
e(v) denotes the number of connections of v’s neighbors that are
connected with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Give the definition for the path length |P(v,w)|, the distance d(v,w) and the diameter of g.

A
  • The path length is defined by the number of edges in path P
  • The distance is the minimal path length of any path between point v and w
  • The diameter of g is the largest distance between two nodes (v,w) in g.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a small world network?

A

A small world network is a network with a dense local structure and a
diameter comparable to a random graph with same numbers of nodes
and edges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name models that create random, small-world and power-law networks.

A

Random: Gilbert Random Graph
- n vertices. Connect two vertices with the probability p

Small world: Watts-Strogatz model
- Create a ring of n vertices and connect them to the next k neighbours clockwise.
- Generate a random number for each edge between 0 and 1.
- Set threshold p and rewire edges with a number below p. Keep source vertex and choose a random destination node

Power law networks: Barábasi-Albert model
- Start with a small network
- Every time step, add a new vertex x. Add m edges from x to the
vertices v that are already there, where the target of the edges is
drawn with the probability given by the preferential attachment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are three measures for networks?

A
  • Average path length
  • Clustering coefficient
  • Node degree distribution
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does a new node join the chord ring?

A
  1. Generate node id (e.g. hash(ip + port))
  2. Contact entry node ( known via e.g. reverse dns, public list)
  3. Copy data for give chord range
  4. Update finger tables
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are applications for i3?

A
  • Mobility support
  • Multicast
  • Anycast
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does i3 work?

A
  • Based on DHT
  • Content identifier (ID) is a hash
  • Sender sends (ID, data) to responsible i3 node
  • Receiver subscribes to data with a trigger (ID, R) at i3 node
  • i3 nodes forwards data (R, data)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How is multicast realized in i3?

A
  • Multiple triggers at i3 node: (ID, R1), (ID, R2), …
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How is anycast realized in i3?

A

Separate trigger into a k-bit prefix and a postfix:
Prefix - Anycast group
Postfix - can be used for selection (e.g. load balancing)
Longest prefix match determines where to forward the data

17
Q

Briefly describe the triangular routing problem and how this could be solved with the mechanisms available in i3.

A

Triangulation problem: Sender and receiver are physically close, but i3 node is far away, due to separation from IP layer.
Solved by implementing private triggers for direct communication. Search for close i3 node by randomly probing for RTT. Insert private triggers.

18
Q

Describe service composition for i3

A

Extend i3 protocol by allowing ID stacks in trigger.
From sender: (ID_s, ID | data) –service–> (ID | data) –[ID|R]–> (R|data)
From receiver: (ID | Data) –[ID| ID_s, R]–> (ID_s, R | data) –service–> (R | data)

19
Q

What sort of different nodes exist in bitcoin?

A
  • Full node (default): Validates all blocks and transactions they receive
  • Archival nodes: Store the whole blockchain
  • Backbone nodes: Full and archival node
  • Miner: Find new blocks and get rewarded
20
Q

What is the bitcoin address?

A
  • Especially encoded public-key hash with checksum
  • Should only be used once to prevent traceability of transactions
21
Q

How are private and public keys used in bitcoin?

A

User creates a private and public key pair. Transactions are signed with the private key to verify ownership of bitcoins. El

22
Q

What fundamental problem of decentralized cryptocurrencies does the blockchain solve?

A

Double spending

23
Q
A