Internet Economics What does the internet facilitate?

Slides:



Advertisements
Similar presentations
The Start of Digital Anarchy Shawn Fanning (19-yr-old student nicknamed Napster) developed the original Napster application and service in January 1999.
Advertisements

CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 14: October 28, 2003 Peer-to-Peer File Sharing.
The BitTorrent Protocol. What is BitTorrent?  Efficient content distribution system using file swarming. Does not perform all the functions of a typical.
E – BUSINESS TECHNOLOGIES PROFESSOR EDUARD HEINDL BCM SS‘09.
CompSci 356: Computer Network Architectures Lecture 21: Content Distribution Chapter 9.4 Xiaowei Yang
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
Intellectual Property Boston College Law School February 4, 2009 Copyright – Indirect, Digital Issues.
Copyright and P2P Edward W. Felten Dept. of Computer Science Princeton University.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
Intellectual Property Boston College Law School February 1, 2007 Copyright – Digital Issues.
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
P2P Network is good or bad? Sang-Hyun Park. P2P Network is good or bad? - Definition of P2P - History of P2P - Economic Impact - Benefits of P2P - Legal.
Presented by Stephen Kozy. Presentation Outline Definition and explanation Comparison and Examples Advantages and Disadvantages Illegal and Legal uses.
Port 21 (Distribution and Promotion Remix) Brian Geoghagan Winter 2005 COM546 Professor Gill.
Part 1: Overview of Web Systems Part 2: Peer-to-Peer Systems Internet Computing Workshop Tom Chothia.
Peer-to-Peer (or P2P) From user to user. Peer-to-peer implies that either side can initiate a session and has equal responsibility. Corey Chan Andrew Merfeld.
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
Company LOGO Peer-to-Peer Inside and out What is a P2P network?  All machines are connected as equal  Each user is a Peer  Peers can act as both a.
P2P WeeSan Lee
Peer-to-Peer network systems Distributed Data Processing Paulina Pasek.
Intellectual Property Rights Online File Sharing Brett Colbert Wendi Jardin Victor Cortez Brett Colbert Wendi Jardin Victor Cortez.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
Client-Server vs P2P or, HTTP vs Bittorrent. Client-Server Architecture SERVER client.
P2P File Sharing Systems
Introduction Widespread unstructured P2P network
BitTorrent Internet Technologies and Applications.

Forensics Investigation of Peer-to- Peer File Sharing Networks Authors: Marc Liberatore, Robert Erdely, Thomas Kerle, Brian Neil Levine & Clay Shields.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 38 How Music Sharing and File Sharing Work.
P2P Web Standard IS3734/19/10 Michael Radzin. What is P2P? Peer to Peer Networking (P2P) is a “direct communications initiations session.” Modern uses.
A P2P file distribution system ——BitTorrent Pegasus Team CMPE 208.
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
Bit Torrent A good or a bad?. Common methods of transferring files in the internet: Client-Server Model Peer-to-Peer Network.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
Intellectual Property in Peer-to-Peer Networks Artsiom Yautsiukhin Natallia Kokash Intellectual Property Law, 18 October 2005.
P2P: Grid-Oriented Distribution Systems KCCMG Fall Impact 2005 Lorin Olsen, Sprint Nextel.
Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.
File Sharing Networks: Sony, Napster, Grokster, Bit Torrent Richard Warner.
The Start Shawn Fanning (19-yr-old student nicknamed Napster) developed the original Napster application and service in January 1999 while a freshman.
Peer-to-Peer File Sharing Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
p2p challenges law (and vice versa) Charles Nesson October 2, 2004.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
NETE4631 Network Information Systems (NISs): Peer-to-Peer (P2P) Suronapee, PhD 1.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Bit Torrent Nirav A. Vasa. Topics What is BitTorrent? Related Terms How BitTorrent works Steps involved in the working Advantages and Disadvantages.
Peer to Peer Networking. Network Models => Mainframe Ex: Terminal User needs direct connection to mainframe Secure Account driven  administrator controlled.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
Compsci 82, Fall Peer to Peer l What is peer to peer?  Useful? Disruptive?  Manageable, governable?  Architecture l Napster, Gnutella, Limeware,
CPS 82, Fall Leftover bits (honoring Thanksgiving) l Compliance with RIAA and p2p  Campus level issues l Voting: electronic, internet, and other.
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
Compsci 82, Fall Peer to Peer l What is peer to peer?  Useful? Disruptive?  Manageable, governable?  Architecture l Napster, Gnutella, Limeware,
Methods for Detecting & Handling unsolicited Data Transfers By: Brandon Wright.
November 19, 2016 Guide:- Mrs. Kale J. S. Presented By:- Hamand Amol Sambhaji. Hamand Amol Sambhaji. Pardeshi Dhananjay Rajendra. Pardeshi Dhananjay Rajendra.
Lecture XV: Real P2P Systems
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CLOUD COMPUTING
An example of peer-to-peer application
Introduction to BitTorrent
File Sharing Matthew Prenzler.
INTERNET AND eBUSINESS (I)
Networks Intro to Digital Technology
Copyright VI: Copyright & Internet Services
Law 507 | Intellectual Property | Spring 2003
Economics and Computation Week 7: The economics of P2P file sharing
The BitTorrent Protocol
File Sharing Networks: Sony, Napster, Grokster, Bit Torrent
PEER-TO-PEER SYSTEMS.
Chapter 2 Application Layer
Presentation transcript:

Internet Economics What does the internet facilitate? Huge numbers of users, customers How can this scale? Why was this big in 2000? Why is it big now? Caveat Emptor: who is the buyer? How does traffic 'flow', what is a peering point? Net-neutrality, Akamai, Joe the plumber What about peer-to-peer networks?

Bitcoin: Internet Economics? http://www.weusecoins.com/ What is the purpose? Why is it free, open-source? Who is using it? http://bitcoinme.com Electronic money Limited to 21 million? What else?

Peer to Peer What is peer to peer? Useful? Disruptive? Manageable, governable? Architecture Napster, Gnutella, Limeware, Kazaa, BitTorrent, Rapidshare, Usenet, Skype Which are p2p?

Characteristics of Peer-to-Peer (p2p) Peers participate as equals in a network Unlike client-server model where there are different responsibilites: webserver compared to client-browser Original Internet, Usenet Current Internet is more client-server Usenet originally between Duke and UNC ('79) P2P systems share resources, storage, files, bandwidth, …

P2P: Technology, Ethics, Policy, Legal Innocent Infringer, 17.504.c 2010 Maverick Recording v Whitney Harper RIAA v Limewire, 2010 Shut down Limewire MPA v Newzbin in UK, 2010 Shuts down Usenet 'integrator': financial so… Higher Education Opportunity Act 2008/10 Notice to Duke Students Capitol v (Jammie) Thomas Jury trial, from $2Million to $25K …

P2P: Technology, Ethics, Policy, Legal Capitol v (Jammie) Thomas Jury trial, from $2Million to $25K … MGM v Grokster, 2005 (scotus) Non-infringing uses? Contributory A&M Records v Napster (2001) Ninth Circuit: Contributory and Vicarious Sony v Universal Studios (Betamax, 1984) Substantial non-infringing uses, time-shifting

Copyright infringement Direct infringement You uploaded, downloaded, copied, sang, … Contributory (kind of indirect) infringement Knowledge and participation (supply device) Vicarious (kind of indirect) infringement Ability to control, financial benefit Proof, precedent, evidence What have courts say, what can you show

Napster and Shawn Fanning Centralized server, distributed "peers" Under 20, mp3, … Still doing startups Napster started music peer-to-peer

Gnutella and Justin Frankel Winamp, 1998-99 Just 20, mp3+ others AOL, $50+ million Gnutella, 2000 AOL buying Gnutella The goal of Cockos is to develop software sustainably while preventing profit rationale from forcing engineering compromises. By doing so, we can keep our product visions intact, giving maximum benefit to our users. (today) .

Napster is Centralized p2p Legal ramifications?

Gnutella/Limewire decentralized p2p Distributed Bootstrap issues

Started by Bram Cohen, http://bitconjurer.org Distributed p2p, torrent, tracker You must cooperate to download 20-30% of all Internet traffic Files are split up and downloaded in pieces Advantages? Disadvantages? Seeder, swarm, clients “optimistic unchoking” not tit-for-tat?

Brian Fox GNU Bash Shell (developer) Buddycast (co-developer) “each person has a sweet spot — a place where they are incredibly productive and at their happiest while doing so — okorians spend their lives living there — the okori sweet spot is the realization of the concept, the delivery of the impossible, from the germ of the idea to the instantiation of it” http://www.theokorigroup.com/sweet_spot

BitTorrent advantages?

Bittorrent meets DMCA and RIAA Indirect Swarm detection In swarm? Liable NAT, other IP address “in-the-wild” experiment False positives Direct harder Man-in-the-middle No Encryption

Kazaa and Skype, Disruptive? “Skype literally touches millions of lives and this is something to be proud of…I would like to think that we have contributed to making the world a little bit flatter.” www.crunchbase.com When Niklas is not creating innovative, disruptive businesses, he is a passionate sailor and enjoys offshore racing with his wife as well as skiing. (Niklas Zennstrom)

Costs of dealing with campus p2p The Campus Computing Project, Paul Green, 10/08 http://tinyurl.com/5mqxyd Private universities spend (average, ’07-’08) $105K software, $158K hardware, $144K other direct costs (e.g., personnel) Software for monitoring, shaping p2p Hardware, e.g., Copysense appliance Keeping up with RIAA: IT and student support

Audible Magic: Copysense Appliance EFF ‘analysis’ of solutions http://tinyurl.com/6l36p6 What does this do? Database of copyrighted works with digital fingerprints Compare packet data with database If there’s a match do “something” to squelch use $60-75K/year Ethics? Tussles?

Packet shaping From $1,500 to $58,000 (Packeteer, there are others) Look at where packets go, specific port http: 80, limewire: 6346, Edonkey: 4662, … Look at what type of information packet carries Typically don’t need to do “deep” inspection Throughput, latency, throttling Change network behavior

Deep Packet Inspection Comcast (2007) DPI to shape/deter p2p traffic Look at packets and then deploy subterfuge Forge RST (reset) packet, similar technique to what’s done with Great Firewall of China Machine A “forges” a reset packet from machine B and sends to C. C then cuts off communication to B Really? Is it that simple? Violates end-to-end principle, havoc wreaking