CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 14: October 28, 2003 Peer-to-Peer File Sharing.

Slides:



Advertisements
Similar presentations
The Internet.
Advertisements

The Internet and the Web
MP3 Critics Web-Based Music Downloading Services CSCI 110 Dr. Bowring Matt Lyons Jarrett Bouchette Brittany Bridges.
The Start of Digital Anarchy Shawn Fanning (19-yr-old student nicknamed Napster) developed the original Napster application and service in January 1999.
Managing P2P Applications or Where Did My Internet Bandwidth Go? David L. Merrifield University of Arkansas June 19, 2003.
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
Gnutella 2 GNUTELLA A Summary Of The Protocol and it’s Purpose By
Copyright 2004 Monash University IMS5401 Web-based Systems Development Topic 2: Elements of the Web (g) Interactivity.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
Intellectual Property Boston College Law School February 1, 2007 Copyright – Digital Issues.
Filesharing and the birth of the digital music industry Liisa Benmergui DAP02S October 28, 2004.
CS155b: E-Commerce Lecture 8: Feb. 6, 2003 Peer-to-Peer File Sharing and Internet Music.
Other File Systems: AFS, Napster. 2 Recap NFS: –Server exposes one or more directories Client accesses them by mounting the directories –Stateless server.
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
CS155a: E-Commerce Lecture 8: October 2, 2001 Business Models for Online Content Distribution.
Peer-to-Peer (or P2P) From user to user. Peer-to-peer implies that either side can initiate a session and has equal responsibility. Corey Chan Andrew Merfeld.
CS 155b: E-Commerce Lecture 9: February 6, 2001 TPSs, Business Models, and the Napster Challenge.
Company LOGO Peer-to-Peer Inside and out What is a P2P network?  All machines are connected as equal  Each user is a Peer  Peers can act as both a.
Review of Free Riding on Gnutella Eytan Adar and Bernardo Huberman Shreeram Sahasrabudhe.
Mgt 240 Lecture Website Construction: Software and Language Alternatives March 29, 2005.
COMPUTER TERMS PART 1. COOKIE A cookie is a small amount of data generated by a website and saved by your web browser. Its purpose is to remember information.
Peer-to-Peer network systems Distributed Data Processing Paulina Pasek.
Peer-to-Peer Networks & Music File Sharing Tim Caserza COEN 150 Holliday
Intellectual Property Rights Online File Sharing Brett Colbert Wendi Jardin Victor Cortez Brett Colbert Wendi Jardin Victor Cortez.
KaZaA: Behind the Scenes Shreeram Sahasrabudhe Lehigh University
P2P File Sharing Systems
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
INTRODUCTION TO WEB DATABASE PROGRAMMING
Computer Concepts 2014 Chapter 7 The Web and .
CPSC 156: The Internet: Co- Evolution of Technology and Society Lecture 9: February 13, 2007 Online Music Distribution and the DMCA.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
A Survey of P2P Filesharing Applications James Kirk CS February 3, 2004.

1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
WXET1143 Lecture7: , Chat and Messaging. Introduction  Electronic mail is everywhere.  Now many people in business, government, and education use.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
1 INTERNET AND eBUSINESS (I) BUS Abdou Illia, Fall 2012 (October 29, 2012)
YouTube Google Video & LimeWire. YouTube founded by Chad Hurley,, Steve Chen, and Jawed Karim (former employees of PayPal) on February 15, 2005 free uploads,
徐晨桓 李柏穎.  Definition  Introduction  History  Example - Napster  Example - Gnutella 徐晨桓 李柏穎 2/27.
1 INTERNET AND WORLD WIDE WEB TECHNOLOGIES BUS Abdou Illia, Spring 2007 (Week 11, Thursday 3/22/2007)
ITIS 1210 Introduction to Web-Based Information Systems Chapter 38 How Music Sharing and File Sharing Work.
P2P Web Standard IS3734/19/10 Michael Radzin. What is P2P? Peer to Peer Networking (P2P) is a “direct communications initiations session.” Modern uses.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
1 Peer-to-Peer Communication Research Project Presentation 2002 – Sukmin Kim – Srikara Hrushikesh CIS 585.
GNUTELLA PEER-TO-PEER NETWORKING. GNUTELLA n What is Gnutella n Relation to the World Wide Web n How it Works n Sites / Links / Information.
LIS508 almost last lecture: Privacy and Ethics Thomas Krichel
The Start Shawn Fanning (19-yr-old student nicknamed Napster) developed the original Napster application and service in January 1999 while a freshman.
LEGALESE BLONDE RIAA vs. NAPSTER Daniella Nero University of Hawaii at Manoa AMST 334 Sp-13.
1 V1-Filename.ppt / / Jukka K. Nurminen Content Search UnstructuredP2P Content Search Unstructured P2P Jukka K. Nurminen *Partly adapted from.
CS155b: E-Commerce Lecture 11: February 15, 2001 Alternative Content-Distribution Methods.
FastTrack Network & Applications (KaZaA & Morpheus)
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
PEER TO PEER (P2P) NETWORK By: Linda Rockson 11/28/06.
Web Pages with Features. Features on Web Pages Interactive Pages –Shows current date, get server’s IP, interactive quizzes Processing Forms –Serach a.
Exam Unit G % of A2 - 2 hour exam marks - (50/50) Section A: Theoretical Evaluation of Production Section B: Contemporary Media Issues (Online.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Peer to Peer Network Design Discovery and Routing algorithms
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
Internet and World Wide Web
Copyright © 2002 Pearson Education, Inc. Slide 3-1 Internet II A consortium of more than 180 universities, government agencies, and private businesses.
Team Wikipedia Distributing digital stored information (computer programs, multi-media, etc). Regular methods : Removable media
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
Week-6 (Lecture-1) Publishing and Browsing the Web: Publishing: 1. upload the following items on the web Google documents Spreadsheets Presentations drawings.
Presentation transcript:

CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 14: October 28, 2003 Peer-to-Peer File Sharing

Napster Client-Server Interaction Client 1 MP3-file 1 MP3-file 2 MP3-file n Searches a db of currently online users for one that has previously stored the requested MP3. Adds client 1 and its list to db. Removes client 1 and its list from db hello ack Client 1 ’s IP address Names of MP3s on Client 1 ’s Machine Request IP address of online user (client 2 ) who has requested file [repeat] goodbye ack

Notes on Client-Server Interaction Proprietary protocol and db search. No MP3 files stored on server. Don’t need usernames. Could have made the service anonymous. No need to save IP addresses between sessions. Many are assigned dynamically. Discussion point: Are anonymity and memorylessness threats or opportunities for business?

Napster Client-Client (P2P) Interaction Client 1 Client 2 Client 1 ’s IP address Request Requested MP3 Note: This part uses “standard Internet protocols,” e.g., FTP

Napster History 1987: MP3 format developed by Karlheinz Brandenburg of Fraunhofer Gesellschaft. “CD ripping” now feasible. 1999: Shawn Fanning develops Napster, believing he has “bypassed” copyright law. Napster has >25M users in its first year. Dec., 1999: RIAA sues Napster for “contributory and vicarious” copyright infringement. April, 2000: Metallica sues Napster, Yale, Indiana Univ., and USC. (Yale bans the use of Napster within a week.)

Napster History, continued July, 2000: US District Judge Patel grants RIAA’s request for an injunction. The injunction is temporarily stayed soon thereafter. October, 2000: Napster announces a partnership with Bertlesmann AG (one of the “major labels” in the industry whose trade association is suing it!). January, 2001: Napster and Bertlesmann say that they will roll out a “subscription service” by “early summer” and will use “DRM technology.”

Napster History, continued February, 2001: Ninth Circuit upholds lower court’s findings that Napster is guilty of contributory and vicarious infringement. Summer, 2001: Napster and Bertelsmann fail to roll out subscription service. September, 2001: Napster reaches a settlement with music publishers (but not with RIAA record labels). However, CNET.com reports the number of users has “dropped from tens of millions…to almost zero.” Napster, R.I.P. !

Gnutella P2P File Sharing “Pure Peer-to-Peer.” Peers communicate over standard HTTP. Goal is “total decentralization.” In particular, no Napster-like server that “directs traffic,” collects data, and otherwise centralizes control.

“A” Generates a Gnutella Request Creates –Search String S –(Unique) Request ID N –Time-to-Live T Sends (A, S, N, T) to all of its Gnutella neighbors.

“B” Receives Gnutella Request (A, S, N, T) If B has already received request N or T=0, B drops this request and does nothing. B looks up S in its local file system and sends (N, Result) to A. B sends (B, S, N, T-1) to all of its Gnutella neighbors, and it records the fact that A has made the request N. When B receives a response of the form (N, Result) from one of its neighbors, it forwards this response to A.

Gnutella Advantages and Disadvantages Main Advantage : “Search for S” can be done in many ways, e.g., structured database search, simple text matching, “fuzzy” text matching, etc. “Result” can take many forms. Main Disadvantage : Inefficiency! –“Flood” of Requests. If average number of neighbors is C and average TTL is D, each search can cause C D request messages. –Natural evolution into many barely-connected subnets, not one “user community.” Other Disadvantage : Request monitoring. (Comes with standard HTTP.)

......

Gnutella History Gnutella was written by Justin Frankel, the 21-year-old founder of Nullsoft. Nullsoft (maker of WinAmp) posted Gnutella on the Web, March Nullsoft acquired by AOL, June A day later AOL yanked Gnutella, at the bequest of Time Warner. People had already downloaded and shared the program. Gnutella continues today, run by independent programmers.

Number of Gnutella Hosts Over Time

Gnutella Clients LimeWire BearShare XoloX Morpheus Phex Shareaza … and many others, developed by companies and individuals.

LimeWire, LLC, is a wholly owned subsidiary of the Lime Group, a “technology incubator” that owns several small, “innovative” companies. LimeWire provides a Java-based Gnutella client. This allows the software to run on multiple platforms with a consistent interface.

LimeWire’s Business Strategy Distribute its software as “the best file- sharing client available.” –Take advantage of the Gnutella network (> hosts online simultaneously) –Improve and enhance interface –Reach more users by supporting multiple platforms Give away a free, ad-supported version; sell an ad-free, enhanced version for a small price. Charge companies for advertisements and provide partner links on website.

Kazaa Media Desktop is produced by Sharman Networks, Ltd., “a consortium of private investors with multimedia interests” (see company website). Based in Australia with offices in Europe. Kazaa Media Desktop is a Windows file- sharing client available for free download. The application displays an ad banner. Recently released Kazaa Plus, which costs $ This version has enhanced search features and no advertisements. Design goal: Achieve Napster-like efficiency and avoid Napster-like liability. Kazaa

Kazaa File Sharing Peers connect directly to each other; content is distributed and there is no central server. Search requests are sent to the “nearest” supernode, which tries to locate the content; if it fails, the request is sent to other supernodes. Any node running Kazaa with a good Internet connection can become a supernode. –Other Kazaa users upload lists of shared files to neighboring supernodes. –Supernodes facilitate search but do not host content; peers connect directly to download files. –Supernode status is controlled by the software based on user settings (permission to become a supernode, bandwidth restrictions, etc.).

Freenet P2P File Sharing Works similarly to Gnutella. Exceptions include: –Intermediaries store all results. (Diffuses responsibility.) –Uses proprietary protocol. (Eliminates HTTP monitorability.) Launched by Ian Clarke (Univ.of Edinburgh) in Explicitly anti-censorship, anti-copyright, and pro-anonymity in its goals. Less popular and less developed, although certain clients exist (see for a FreeNet 0.4 client).

Reading Assignment this Week The following two sections of the Digital Dilemma report on technical-protection systems are required reading: The following two articles are optional: “The Heavenly Jukebox” by C. Mann and “With Cable TV at MIT, Who Needs Napster?” by J. Schwartz.