The Start of Digital Anarchy Shawn Fanning (19-yr-old student nicknamed Napster) developed the original Napster application and service in January 1999.

Slides:



Advertisements
Similar presentations
Peer-to-peer and agent-based computing Peer-to-Peer Computing: Introduction.
Advertisements

Computer networks Fundamentals of Information Technology Session 6.
RPI Confidential - DO NOT DISTRIBUTE 1 Discovering Communities Among File Shares Aaron Sherman.
INF 123 SW ARCH, DIST SYS & INTEROP LECTURE 12 Prof. Crista Lopes.
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
Peer-to-Peer Networks João Guerreiro Truong Cong Thanh Department of Information Technology Uppsala University.
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
Protocols By Rakesh Chukkapalli CS 484.  Peer-to-Peer = P2P  The term peer-to-peer was coined as far as back in the mid-1980s by LAN vendors to describe.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
Spotlighting Decentralized P2P File Sharing Archie Kuo and Ethan Le Department of Computer Science San Jose State University.
P2P Network is good or bad? Sang-Hyun Park. P2P Network is good or bad? - Definition of P2P - History of P2P - Economic Impact - Benefits of P2P - Legal.
Peer-to-Peer (or P2P) From user to user. Peer-to-peer implies that either side can initiate a session and has equal responsibility. Corey Chan Andrew Merfeld.
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
Gnutella, Freenet and Peer to Peer Networks By Norman Eng Steven Hnatko George Papadopoulos.
1 Client-Server versus P2P  Client-server Computing  Purpose, definition, characteristics  Relationship to the GRID  Research issues  P2P Computing.
Improving Data Access in P2P Systems Karl Aberer and Magdalena Punceva Swiss Federal Institute of Technology Manfred Hauswirth and Roman Schmidt Technical.
Peer-to-peer: an overview Selo TE P2P is not a new concept P2P is not a new technology P2P is not a new technology Oct : first transmission.
Peer-peer and Application-level Networking CS 218 Fall 2003 Multicast Overlays P2P applications Napster, Gnutella, Robust Overlay Networks Distributed.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Intellectual Property Rights and Online File Sharing Erwin Solis Antoine Herve Matt Olsen Nikolai Hart Tim Scott.
Intellectual Property Rights Online File Sharing Brett Colbert Wendi Jardin Victor Cortez Brett Colbert Wendi Jardin Victor Cortez.
© Folens 2008 Cultural changes in music Brought about by ICT.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
P2P File Sharing Systems
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Peer-to-Peer Computing CS587x Lecture Department of Computer Science Iowa State University.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network

1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
1 P2P Computing. 2 What is P2P? Server-Client model.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 38 How Music Sharing and File Sharing Work.
P2P Web Standard IS3734/19/10 Michael Radzin. What is P2P? Peer to Peer Networking (P2P) is a “direct communications initiations session.” Modern uses.
Peer-to-Peer Networks University of Jordan. Server/Client Model What?
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
Freenet File sharing for a political world. Freenet: A Distributed Anonymous Information Storage and Retrieval System I. Clarke, O. Sandberg, B. Wiley,
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
 The iPod is a portable music player developed by Apple Computer. Though it is an Apple product, the iPod can be used with both Macs and PCs.
LIS508 almost last lecture: Privacy and Ethics Thomas Krichel
The Start Shawn Fanning (19-yr-old student nicknamed Napster) developed the original Napster application and service in January 1999 while a freshman.
Peer-to-Peer File Sharing Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
FastTrack Network & Applications (KaZaA & Morpheus)
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
P2PComputing/Scalab 1 Gnutella and Freenet Ramaswamy N.Vadivelu Scalab.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Peer to Peer Network Design Discovery and Routing algorithms
Peer-to-peer systems (part I) Slides by Indranil Gupta (modified by N. Vaidya)
A company called Napster was developed. This company encouraged piracy by enabling and allowing its users to trade copyrighted songs through its servers.
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
Peer-to-Peer (P2P) Networks By Bongju Yu. Contents  What is P2P?  Features of P2P systems  P2P Architecture  P2P Protocols  P2P Projects  Reference.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
CS Spring 2012 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
CMSC 691B Multi-Agent System A Scalable Architecture for Peer to Peer Agent by Naveen Srinivasan.
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
IPEmotion License Management PM (V1.2).
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 24 – Introduction to Peer-to-Peer (P2P) Systems Klara Nahrstedt (presented by Long Vu)
Distributed Web Systems Peer-to-Peer Systems Lecturer Department University.
Peer 2 Peer & Client Server
Advanced Computer Networks: Part 1
An example of peer-to-peer application
CHAPTER 3 Architectures for Distributed Systems
EE 122: Peer-to-Peer (P2P) Networks
GCSE OCR 3 A451 Computing Client-server and peer-to-peer networks
Presentation transcript:

The Start of Digital Anarchy Shawn Fanning (19-yr-old student nicknamed Napster) developed the original Napster application and service in January 1999 while a freshman at Northeastern University –Share MP3 files with peers around the world Next version: launched in May 1999, by Shawn Fanning (19 -yr-old student nicknamed Napster ) and Sean Parker (20) Allowed Users to MP3 Files - compression format, good quality but 1/12 th original size –Napster.com: p2p MP3 exchange service November 2000 – Napster has 38 Million members 40 million users in first 18 months At peak,70 million users 1.57 million simultaneous users

What is Napster Indeed? Napster is sometimes referred to as a p2p network –This is not quite true Napster ran a central server –You connected to that server and announced what files you had to share. Every search was conducted on the dataset assembled at the central server Connections to download files where done between peer machines only!

Concept of Napster Napster used centralized servers to keep a catalog of available files 1. User sends out request Napster searches central database Search request 2. The central server sends back a list of available files for download Search response Napster server user 3. Requesting user downloads the file directly from another Napster user computer Download from user

Importance of Napster The P2P revolution is started. Central indexing and searching service File downloading in a peer-to-peer point-to- point manner. Napster user B (Client + Server) Napster index Association Napster user A (Client + Server)

How Napster used to work It is first necessary to download and install Napster software and to sign up for a free account at Napster By clicking the Napster icon, a connection is established with Napster Web site, where the name of the music searched can be entered in a search window The Napster software tracks all users who are online at that particular time and provides access to tracks stored on users' hard drives When the song requested is found, Napster establishes a connection between the two computers so that it could be downloaded Four steps: Connect to Napster server Upload your list of files (push) to server. Give server keywords to search the full list with. Select “best” of correct answers. (pings)

Directory Server User Description of the Architecture A central directory server maintain index on the metadata of all the files in the network. The metadata might include file names, creation dates, and copyright information. The server also maintain a table of user connection information including user’s IP address and line speed. A file query is sent to the server first. A query consists of a list of desired words. When the server receives a query, it searches for matches in its index The query results including a list of users who hold the file are sent back to the user who initiated the query The user then opens a direct connection with the peer that has the requested file for downloading

Napster A way to share music files with others Users upload their list of files to Napster server You send queries to Napster server for files of interest –Keyword search (artist, song, album, bitrate, etc.) Napster server replies with IP address of users with matching files You connect directly to user A to download file

Overview of the P2P File Sharing Solutions

Client-Server File Sharing Server(s) perform all file sharing tasks –All files stored on server(s) –All queries regarding file availability addressed by server(s) –All files transmitted from server(s) Therefore, server(s) constrain performance –Can only hold as many files fit in server storage –Query response time dictated by server speed –Files transmitted over server network connection with limited capacity

Client-Server File Sharing The MP3.com Architecture MP3.com Machine A 1. Have any Metallica songs? 3. Please send one 2. Yes 4. Here it is Note: A few years ago, a band called Metallica sued the file sharing service Napster for allowing illegal music exchange over it’s network.

Peer-to-Peer File Sharing At least some tasks are distributed among peers: –Files stored on and transmitted from peer hosts –Queries regarding file availability addressed by peer hosts Distributed tasks are not limited by server performance –Network can hold as much as can be stored on all peers –Transmission costs shared by all peers –Each peer contributes to responding to queries For example, –Napster distributed file storage and transmission –File availability was centralized

Peer-to-Peer File Sharing In Action Interacting Messages –Ping: “Are you there?”: Directed at a Peer –Pong: “Yes, I am here” –Query: “I am looking for 007 posters” –Query Response: “I have the poster. Download from xxx.xxx.xxx.xxx:xx All these messages are forwarded from a Peer to its neighbors

Main Server File List: UserC song.mp3 UserD another.mp3 ….. User A 2. User A searches for song.mp3 User C (Song.mp3) 1. Construct Database Users connect to Napster Server Server builds up a list of available songs and locations User D (Another.mp3) User B … 3. Server searches database. Finds song on User C’s machine 4. Server informs User A of the location of song.mp3 5. User A connects to User C and downloads song.mp3 Brokered/ Hybrid P2P File Sharing with Napster

Broker Mediated File Sharing Model Users register files with a broker for sharing use broker to find files to copy Broker BobCarol Where is “X-File Season 7”? Carol has it Copying X-File Season 7

Centralized Napster model Benefits: –Efficient search –Limited bandwidth usage –No per-node state Drawbacks: –Central point of failure –Limited scale BobAlice JaneJudy Resource Discovery

Advantages and Disadvantages of Centralized Indexing Advantages: –Locates files quickly and efficiently (more effective) –Searches are as comprehensive as possible –All users must registered to be on the network Access is controlled Disadvantages: –Vulnerable to censorship and technical failure System has single points of entry; one fails could bring whole system down –Popular data become less accessible because of the load of the requests on a central server –Central index might be out of data because the central server’s database is only refreshed periodically Resource Discovery

napster.com users File list is uploaded 1. A Simple Example

napster.com user Request and results User requests search at server. 2. A Simple Example

napster.com user pings User pings hosts that apparently have data. Looks for best transfer rate. 3. A Simple Example

napster.com user Retrieves file User retrieves file 4.

Summary of the Features Central Napster server –Can ensure correct results –Bottleneck for scalability –Single point of failure –Susceptible to denial of service Malicious users Lawsuits, legislation Search is centralized File transfer is direct (peer-to-peer)

Screenshots – Napster Searching …

Screenshots – Napster Downloading ….

Benefits and Drawbacks of the Napster Model Benefits: –Efficient search –Limited bandwidth usage –No per-node state Drawbacks: –Central point of failure –Limited scale BobAlice JaneJudy

Traffic Generated by Napster 3/00: 25% UWisc traffic Napster 2000: est. 60M users 7/01: # simultaneous online users: Napster 160K Gnutella: 40K Morpheus: 300K Approximately 10,000 music files were shared per second using Napster, and every second more than 100 users attempted to connect to the system and there will be 75 million Napster users by the end of 2000 A “disruptive” application/technology?…

Reported Bandwidth of Napster

End of Napster 12/99: first lawsuit April 2000 – Metallica starts law suit – Huge and long court case July 2001 – Napster ordered offline, June 2002 bankrupt 2/01: US Circuit Court of Appeals: Napster knew users violating copyright laws After the Recording Industry Association of America sued Napster for copyright infringements, the court ruled that Napster was indeed violating copyrights and it is shut down

End of Napster (Cont.) Napster argued since it was only involved in collecting the information about files available, it was legal. Napster never shared any illegal file. The courts thought otherwise. It was shut down. Napster network died without a central machine. To enable true piracy, we need a truly distributed system.

Last minute humor Steve Sack, Minnesota, The Minneapolis Star-Tribune

Epilogue 1999: Napster is born 2002: Napster is gone… April 30, 2002: A new study from WebSense indicates that the number of file- swapping, and peer-to-peer websites, has grown by 535 percent in 2001, despite legal efforts to have them shut down According to the study findings, the number of p2p websites totals nearly 38,000 universities notice first mid-01: shut down service; other apps emerge since 00