P2P Conference – Trip Report Ilya Mironov, Crypto group.

Slides:



Advertisements
Similar presentations
An Overview of Peer-to-Peer Sami Rollins
Advertisements

Peer-to-peer and agent-based computing Peer-to-Peer Computing: Introduction.
PastPresentFuture The Past, Present and Future of P2P (Peer-to-Peer) Ming-Wei (Benson) Wu Dept. of Electrical Engineering National Taiwan University &
Copyright or Copywrong. What is a copyright and what can be copyrighted? What is “Fair Use” and what four factors determine “Fair Use”? What are the two.
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
Peer-to-Peer Networks João Guerreiro Truong Cong Thanh Department of Information Technology Uppsala University.
Name Services Jessie Crane CPSC 550. History ARPAnet – experimental computer network (late 1960s) hosts.txt – a file that contained all the information.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
Peer-to-Peer Networking By: Peter Diggs Ken Arrant.
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
P2P Networks Connecting Businesses, Individuals, and the World By: Katie Solie.
P2P Network is good or bad? Sang-Hyun Park. P2P Network is good or bad? - Definition of P2P - History of P2P - Economic Impact - Benefits of P2P - Legal.
Peer-to-Peer Computing
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
Beyond Napster: An Overview of Peer-to-Peer Systems and Applications Sami Rollins.
Peer-to-Peer Networks & JXTA by Madhurasmitha Chakravarthy & Priti Sabadra.
Peer-to-peer: an overview Selo TE P2P is not a new concept P2P is not a new technology P2P is not a new technology Oct : first transmission.
P2P Conference – Trip Report Ilya Mironov, Crypto group.
Client-Server vs P2P or, HTTP vs Bittorrent. Client-Server Architecture SERVER client.
P2P File Sharing Systems
Lecture 1 Internet CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger and Daniel Zappala Lecture 1 Introduction.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Cli/Serv.: JXTA/151 Client/Server Distributed Systems v Objective –explain JXTA, a support environment for P2P services and applications ,
Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Peter Scott Based on paper by S. E. Schechter, R. A. Greenstadt,
Cmpe 494 Peer-to-Peer Computing Anıl Gürsel Didem Unat.
Forensics Investigation of Peer-to- Peer File Sharing Networks Authors: Marc Liberatore, Robert Erdely, Thomas Kerle, Brian Neil Levine & Clay Shields.
思科网络技术学院理事会. 1 Application Layer Functionality and Protocols Network Fundamentals – Chapter 3.
Kelly Ralph EDUC 318. Points of interest:  Ethical Issues  Social Networking  Acceptable use of policies  Netiquette  Cyberbullying  Student data.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
Peer To Peer Applications
Network Operating Systems versus Operating Systems Computer Networks.
1 A P2P Collaborative System Using JXTA Hosei Graduation School ITPC 02R3315 Katsuhiro CHIBA.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Project JXTA : An Open Peer-to-Peer Network Environment Gene Kan Project JXTA Sun Microsystems, Inc.
Colin J. MacDougall.  Class of Systems and Applications  “Employ distributed resources to perform a critical function in a decentralized manner”  Distributed.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
1 Peer-to-Peer Communication Research Project Presentation 2002 – Sukmin Kim – Srikara Hrushikesh CIS 585.
Compsci 82, Fall IP: Intellectual Property l Term is pervasive, so we will use it  What does Stallman say about IP?  What does IP mean to Cisco.
Jeopardy Computer Internet Policy & Legal Potpourri Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final Jeopardy.
Peer-to-Pee Computing HP Technical Report Chin-Yi Tsai.
Lecture 1 Internet CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger and Daniel Zappala Lecture 2 Introduction.
Architectures of distributed systems Fundamental Models
LIS508 almost last lecture: Privacy and Ethics Thomas Krichel
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications  app architectures  app requirements r 2.2 Web and HTTP r.
Part 3: Internet Applications The Basics of Networking, Part 3 chapter 3.
 Introduction – Consumer Market  Benefits – Operational Cost & Flexibility  Challenges – Quality of Service & Securing VOIP  Legal Issuers  Risk.
Peer-to-Peer and Collective Intelligence A platform for collaboration Andrew Roczniak Collective Intelligence Lab Multimedia Communications Research Lab.
Networks Am I hooked up?. Networks definition sizes of networks types advantages and disadvantages how data is sent transmission media business uses.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
1 Pertemuan 5 Networking Models. Discussion Topics Using layers to analyze problems in a flow of materials Using layers to describe data communication.
Peer-to-Peer (P2P) Networks By Bongju Yu. Contents  What is P2P?  Features of P2P systems  P2P Architecture  P2P Protocols  P2P Projects  Reference.
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Cisco Networking Training (CCENT/CCT/CCNA R&S) Rick Rowe Ron Giannetti.
P2P Systems1 2. Peer-2-Peer Systems (1/14) 1.P2P Background a)What’s exciting? b)Historical P2P c)Modern P2P d)Why P2P? 2.P2P Environment a)Binding of.
Motivation - The Edge Lab Motivation Communication as a co-operative multi-party act: But interests diverge … Core question: how can we distribute control.
Book Review The Future of Ideas: The Fate of the Commons in a Connected World By Lawrence Lessig Heather Nodler INF 385Q - KM Systems Dr. Don Turnbull.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
Peer-to-Peer Networks 14 Security Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
NT1210 Introduction to Networking
August 2001Copyright UserLand Software 2001 Next Generation Internet Software How Broadband will be used John Robb, President and COO UserLand Software.
E-Commerce: Doing Business on the Internet
E-Commerce: Regulatory, Ethical, and Social Environments
CPE 401 / 601 Computer Network Systems
Copyright VI: Copyright & Internet Services
Chapter 9 Introduction To Data-Link Layer 9.# 1
Blockchain Technology and IoT Security Andy Wang March 21, 2018
Peer-to-Peer Information Systems Week 6: Performance
Presentation transcript:

P2P Conference – Trip Report Ilya Mironov, Crypto group

The conference The O’Reilly Peer-to-Peer conference Feb , 2001, San Francisco “The first and most important conference on P2P” About 900 attendees, 75 speakers.

RIAA vs P2P? Peer-to-peer is larger than file-swapping. P2P = Power to the People? Where does copyright fit into the picture? Fair use for powerful users.

Clay Shirky Definition of P2P: An application is P2P if it aggregates resources at the network’s edge. P2P applications address the nodes outside the DNS.

Clay Shirky “Because you could not get an IP address for your PC, you could not really host anything. The veil of second-class connectivity created a second class of users.” Balkanization of the address space (ICQ and AIM have created 150 mln cf. to 22 mln in whois)

Clay Shirky One-liners: He overestimated by four. Thomas Watson said in 1943 that “I think there is a world market for maybe five computers.” We now know that that figure was wrong. PC is the dark matter of the Internet.

Larry Cheng Overview of the P2P landscape 150+ companies $300 mln in VC funding in 2000 associate with Battery Ventures Distributed computations~35% capital Collaboration/knowledge sharing~30% Content distribution (aka Akamai killers)~10% Infrastructure/platform for P2P~10% File sharing~10% Distributed search~5%

Larry Cheng Distributed computing: $2b/year—the total market for supercomputing divided between several companies. On his watch list: –Applied Meta (LEGION) –Entropia –United Devices

Larry Cheng Best funded companies Groove Networks$60 mln Entropia$29 Consilent$23 Napster$17+ NextPage$20 OpenCola$15 United Devices$13 Xdegrees$8

Obituary

Bill Joy Unveiled another j-word: JXTA –pipes from one peer to another –ability to group a set of peers together, and create groups of groups –monitoring and metering –security layer. Open source on the Apache license

Patent Expert : about 984 patents that mention P2P, with about 200 in claims. Patents on P2P date back to the early 80s. Probably, most of them are invalid. YearsPatents

Lawrence Lessig Communication Decency Act Supreme Court’s message to lawmakers: you must wait [before stepping in and messing it up] Lawrence Lessig: “We have to wait to see how the things shake out, before we send lawyers in.” Napster case is relevant to all innovators

Lawrence Lessig The copyright we have now is not your dad’s copyright. “What is happening in the digital realm is that fair use is being coded away both through technology and through the licenses…” (“Alice in Wonderland” e-book—you are not allowed to read this book aloud) The copyright law must be changed

Kelly Truelove (Clip2 CEO) R&D company on Gnutella

Top 5 concerns 1.Viable business model 2.Security and privacy 3.Legal issues 4.Usability 5.Standards, interoperability

Three most frequent words 1.Peer[-to-peer] 2.Napster 3.Tragedy of the commons

Companies to watch I add to my radar: –OpenCola –Clip2 –XDegrees –Free Haven –P2P working group

The end

More Full version of this talk Links to companies, research projects and speeches: crypto.stanford.edu/~mironov/p2p or redirect from