Compsci 82, Fall 2010 7.1 Peer to Peer l What is peer to peer?  Useful? Disruptive?  Manageable, governable?  Architecture l Napster, Gnutella, Limeware,

Slides:



Advertisements
Similar presentations
CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 14: October 28, 2003 Peer-to-Peer File Sharing.
Advertisements

E – BUSINESS TECHNOLOGIES PROFESSOR EDUARD HEINDL BCM SS‘09.
CompSci 356: Computer Network Architectures Lecture 21: Content Distribution Chapter 9.4 Xiaowei Yang
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
Copyright and P2P Edward W. Felten Dept. of Computer Science Princeton University.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
Presented by Stephen Kozy. Presentation Outline Definition and explanation Comparison and Examples Advantages and Disadvantages Illegal and Legal uses.
Port 21 (Distribution and Promotion Remix) Brian Geoghagan Winter 2005 COM546 Professor Gill.
Part 1: Overview of Web Systems Part 2: Peer-to-Peer Systems Internet Computing Workshop Tom Chothia.
Peer-to-Peer (or P2P) From user to user. Peer-to-peer implies that either side can initiate a session and has equal responsibility. Corey Chan Andrew Merfeld.
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
Company LOGO Peer-to-Peer Inside and out What is a P2P network?  All machines are connected as equal  Each user is a Peer  Peers can act as both a.
P2P WeeSan Lee
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
Intellectual Property Rights and Online File Sharing Erwin Solis Antoine Herve Matt Olsen Nikolai Hart Tim Scott.
Peer-to-Peer network systems Distributed Data Processing Paulina Pasek.
Intellectual Property Rights Online File Sharing Brett Colbert Wendi Jardin Victor Cortez Brett Colbert Wendi Jardin Victor Cortez.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
Client-Server vs P2P or, HTTP vs Bittorrent. Client-Server Architecture SERVER client.
P2P File Sharing Systems
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
Open up Evernote, mini whiteboards.  2 minutes – write down as many as you can think of.
BitTorrent Internet Technologies and Applications.

 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
Forensics Investigation of Peer-to- Peer File Sharing Networks Authors: Marc Liberatore, Robert Erdely, Thomas Kerle, Brian Neil Levine & Clay Shields.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
Distributed Systems Concepts and Design Chapter 10: Peer-to-Peer Systems Bruce Hammer, Steve Wallis, Raymond Ho.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 38 How Music Sharing and File Sharing Work.
P2P Web Standard IS3734/19/10 Michael Radzin. What is P2P? Peer to Peer Networking (P2P) is a “direct communications initiations session.” Modern uses.
A P2P file distribution system ——BitTorrent Pegasus Team CMPE 208.
Peer-to-Peer Networks University of Jordan. Server/Client Model What?
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Chapter 2: Application layer
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
LIS508 almost last lecture: Privacy and Ethics Thomas Krichel
Intellectual Property in Peer-to-Peer Networks Artsiom Yautsiukhin Natallia Kokash Intellectual Property Law, 18 October 2005.
P2P: Grid-Oriented Distribution Systems KCCMG Fall Impact 2005 Lorin Olsen, Sprint Nextel.
Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.
File Sharing Networks: Sony, Napster, Grokster, Bit Torrent Richard Warner.
The Start Shawn Fanning (19-yr-old student nicknamed Napster) developed the original Napster application and service in January 1999 while a freshman.
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications  app architectures  app requirements r 2.2 Web and HTTP r.
LEGALESE BLONDE RIAA vs. NAPSTER Daniella Nero University of Hawaii at Manoa AMST 334 Sp-13.
1 V1-Filename.ppt / / Jukka K. Nurminen Content Search UnstructuredP2P Content Search Unstructured P2P Jukka K. Nurminen *Partly adapted from.
Peer-to-Peer File Sharing Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
p2p challenges law (and vice versa) Charles Nesson October 2, 2004.
CS155b: E-Commerce Lecture 11: February 15, 2001 Alternative Content-Distribution Methods.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
FastTrack Network & Applications (KaZaA & Morpheus)
Peer-to-Peer File Sharing
NETE4631 Network Information Systems (NISs): Peer-to-Peer (P2P) Suronapee, PhD 1.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Peer-to-Peer (P2P) Networks By Bongju Yu. Contents  What is P2P?  Features of P2P systems  P2P Architecture  P2P Protocols  P2P Projects  Reference.
Bit Torrent Nirav A. Vasa. Topics What is BitTorrent? Related Terms How BitTorrent works Steps involved in the working Advantages and Disadvantages.
Peer to Peer Networking. Network Models => Mainframe Ex: Terminal User needs direct connection to mainframe Secure Account driven  administrator controlled.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
Compsci 82, Fall Peer to Peer l What is peer to peer?  Useful? Disruptive?  Manageable, governable?  Architecture l Napster, Gnutella, Limeware,
CPS 82, Fall Leftover bits (honoring Thanksgiving) l Compliance with RIAA and p2p  Campus level issues l Voting: electronic, internet, and other.
Chapter 3.  The advantages and disadvantages of: ◦ Client-Server Networks & ◦ Peer-to-Peer Networks.
Methods for Detecting & Handling unsolicited Data Transfers By: Brandon Wright.
November 19, 2016 Guide:- Mrs. Kale J. S. Presented By:- Hamand Amol Sambhaji. Hamand Amol Sambhaji. Pardeshi Dhananjay Rajendra. Pardeshi Dhananjay Rajendra.
An example of peer-to-peer application
Internet Economics What does the internet facilitate?
File Sharing Matthew Prenzler.
File Sharing Networks: Sony, Napster, Grokster, Bit Torrent
Presentation transcript:

Compsci 82, Fall Peer to Peer l What is peer to peer?  Useful? Disruptive?  Manageable, governable?  Architecture l Napster, Gnutella, Limeware, Kazaa, BitTorrent, Rapidshare, Usenet, Skype  Which are p2p?

Compsci 82, Fall Characteristics of Peer-to-Peer (p2p) l Peers participate as equals in a network  Unlike client-server model where there are different responsibilites: webserver compared to client-browser l Original Internet, Usenet  Current Internet is more client-server  Usenet originally between Duke and UNC ('79) l P2P systems share resources, storage, files, bandwidth, …

Compsci 82, Fall P2P: Technology, Ethics, Policy, Legal l Innocent Infringer, c 2010 Innocent Infringer, c  Maverick Recording v Whitney HarperWhitney Harper l RIAA v Limewire, 2010  Shut down Limewire l MPA v Newzbin in UK, 2010 MPA v Newzbin  Shuts down Usenet 'integrator': financial so… l Higher Education Opportunity Act 2008/10  Notice to Duke Students Notice to Duke Students l Capitol v (Jammie) Thomas  Jury trial, from $2Million to $25K …

Compsci 82, Fall P2P: Technology, Ethics, Policy, Legal l Capitol v (Jammie) Thomas  Jury trial, from $2Million to $25K … l MGM v Grokster, 2005 (scotus)  Non-infringing uses? Contributory l A&M Records v Napster (2001)  Ninth Circuit: Contributory and Vicarious l Sony v Universal Studios (Betamax, 1984)  Substantial non-infringing uses, time-shifting

Compsci 82, Fall Copyright infringement l Direct infringement  You uploaded, downloaded, copied, sang, … l Contributory (kind of indirect) infringement  Knowledge and participation (supply device) l Vicarious (kind of indirect) infringement  Ability to control, financial benefit l Proof, precedent, evidence  What have courts say, what can you show

Compsci 82, Fall Napster and Shawn Fanning l Shawn Fanning  Napster,  Centralized server, distributed "peers"  Under 20, mp3, …  Still doing startups l Napster started music peer-to-peer

Compsci 82, Fall Gnutella and Justin Frankel The goal of Cockos is to develop software sustainably while preventing profit rationale from forcing engineering compromises. By doing so, we can keep our product visions intact, giving maximum benefit to our users. (today). l Winamp,  Just 20, mp3+ others  AOL, $50+ million  Gnutella, 2000  AOL buying Gnutella AOL buying Gnutella

Compsci 82, Fall Napster is Centralized p2p l Legal ramifications?

Compsci 82, Fall Gnutella/Limewire decentralized p2p l Distributed  Bootstrap issues

Compsci 82, Fall l Started by Bram Cohen,  Distributed p2p, torrent, tracker  You must cooperate to download  20-30% of all Internet traffic l Files are split up and downloaded in pieces  Advantages? Disadvantages? l Seeder, swarm, clients  “optimistic unchoking” not tit-for-tat?

Compsci 82, Fall Brian Fox l GNU Bash Shell (developer) l Buddycast (co-developer) “each person has a sweet spot — a place where they are incredibly productive and at their happiest while doing so — okorians spend their lives living there — the okori sweet spot is the realization of the concept, the delivery of the impossible, from the germ of the idea to the instantiation of it”

Compsci 82, Fall BitTorrent advantages?

Compsci 82, Fall Bittorrent meets DMCA and RIAA l Indirect Swarm detection  In swarm? Liable  NAT, other IP address  “in-the-wild” experiment l False positives  Direct harder l Man-in-the-middle  No Encryption

Compsci 82, Fall Campus and Other P2P issues l Skype, what, where, when (Sky+p2p=?)  Does Skype have a commercial model?  Origins of technology?  Current issues with US Government?  eBay purchases for $2.6 billion in 2005 then …  Bootstrapping after login, but true p2p  Proprietary code, some open standards AES, RSA, for encryption l Compliance with HEOA: campus monitors  Why? What? How?  Issues for students

Compsci 82, Fall Kazaa and Skype, Disruptive? “Skype literally touches millions of lives and this is something to be proud of…I would like to think that we have contributed to making the world a little bit flatter.” When Niklas is not creating innovative, disruptive businesses, he is a passionate sailor and enjoys offshore racing with his wife as well as skiing. (Niklas Zennstrom)

Compsci 82, Fall Kazaa and Skype, Disruptive? Skype has been an incredible adventure and I am proud to have been part of it. Looking back at 2003, at two guys running around with a crazy idea of building a global phone company purely on the Internet, …, still battling a major lawsuit from our Kazaa days, 2003 seems a long time ago. It is amazing to think that it is only four years! Janus Friss blog

Compsci 82, Fall Costs of dealing with campus p2p l The Campus Computing Project, Paul Green, 10/08  l Private universities spend (average, ’07-’08)  $105K software, $158K hardware, $144K other direct costs (e.g., personnel)  Software for monitoring, shaping p2p  Hardware, e.g., Copysense appliance  Keeping up with RIAA: IT and student support

Compsci 82, Fall Audible Magic: Copysense Appliance l EFF ‘analysis’ of solutions  l What does this do? Database of copyrighted works with digital fingerprints  Compare packet data with database  If there’s a match do “something” to squelch use  $60-75K/year l Ethics? l Tussles?

Compsci 82, Fall Packet shaping l From $1,500 to $58,000 (Packeteer, there are others)  Look at where packets go, specific port http: 80, limewire: 6346, Edonkey: 4662, …  Look at what type of information packet carries Typically don’t need to do “deep” inspection l Throughput, latency, throttling  Change network behavior

Compsci 82, Fall Deep Packet Inspection l Comcast (2007) DPI to shape/deter p2p traffic  Look at packets and then deploy subterfuge  Forge RST (reset) packet, similar technique to what’s done with Great Firewall of China l Machine A “forges” a reset packet from machine B and sends to C. C then cuts off communication to B  Really? Is it that simple?  Violates end-to-end principle, havoc wreaking