P2P Conference – Trip Report Ilya Mironov, Crypto group.

Slides:



Advertisements
Similar presentations
Peer-to-peer and agent-based computing Peer-to-Peer Computing: Introduction.
Advertisements

PastPresentFuture The Past, Present and Future of P2P (Peer-to-Peer) Ming-Wei (Benson) Wu Dept. of Electrical Engineering National Taiwan University &
Copyright or Copywrong. What is a copyright and what can be copyrighted? What is “Fair Use” and what four factors determine “Fair Use”? What are the two.
Peer-to-Peer is Not Always Decentralized …when Centralization is Good Nelson Minar
University of Cincinnati1 Towards A Content-Based Aggregation Network By Shagun Kakkar May 29, 2002.
1 Pertemuan 14 Understanding Interactive Communication Matakuliah: J0324/Sistem e-Bisnis Tahun: 2005 Versi: 02/02.
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
Name Services Jessie Crane CPSC 550. History ARPAnet – experimental computer network (late 1960s) hosts.txt – a file that contained all the information.
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Peer-to-Peer Networking By: Peter Diggs Ken Arrant.
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
Peer-to-Peer Computing
P2P Conference – Trip Report Ilya Mironov, Crypto group.
Part 1: Overview of Web Systems Part 2: Peer-to-Peer Systems Internet Computing Workshop Tom Chothia.
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
Beyond Napster: An Overview of Peer-to-Peer Systems and Applications Sami Rollins.
Peer-to-Peer Networks & JXTA by Madhurasmitha Chakravarthy & Priti Sabadra.
Peer-to-peer: an overview Selo TE P2P is not a new concept P2P is not a new technology P2P is not a new technology Oct : first transmission.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
P2P File Sharing Systems
Internet Review Academic Talent Search. All About Networking DevicesDevices Packet TransferPacket Transfer HardwareHardware SoftwareSoftware Wiring/CablingWiring/Cabling.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Cli/Serv.: JXTA/151 Client/Server Distributed Systems v Objective –explain JXTA, a support environment for P2P services and applications ,
Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Peter Scott Based on paper by S. E. Schechter, R. A. Greenstadt,
1 Reading Report 4 Yin Chen 26 Feb 2004 Reference: Peer-to-Peer Architecture Case Study: Gnutella Network, Matei Ruoeanu, In Int. Conf. on Peer-to-Peer.
Cmpe 494 Peer-to-Peer Computing Anıl Gürsel Didem Unat.
Survey of Peer to Peer Technologies Authors: Bratislav Milić, Jelena Krunić, Veljko Milutinović,
Sun’s Project JXTA Technical Overview Presented by Sergei Kovalenko Red Team: Janhavi James A. Davis Fernando D. Diaz.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12 1.
徐晨桓 李柏穎.  Definition  Introduction  History  Example - Napster  Example - Gnutella 徐晨桓 李柏穎 2/27.
Peer To Peer Applications
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Colin J. MacDougall.  Class of Systems and Applications  “Employ distributed resources to perform a critical function in a decentralized manner”  Distributed.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
1 Peer-to-Peer Communication Research Project Presentation 2002 – Sukmin Kim – Srikara Hrushikesh CIS 585.
Compsci 82, Fall IP: Intellectual Property l Term is pervasive, so we will use it  What does Stallman say about IP?  What does IP mean to Cisco.
Peer-to-Pee Computing HP Technical Report Chin-Yi Tsai.
Today’s Topics Chapter 8: Networks Chapter 8: Networks HTML Introduction HTML Introduction.
Lecture 1 Internet CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger and Daniel Zappala Lecture 2 Introduction.
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
LIS508 almost last lecture: Privacy and Ethics Thomas Krichel
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
Part 3: Internet Applications The Basics of Networking, Part 3 chapter 3.
 Introduction – Consumer Market  Benefits – Operational Cost & Flexibility  Challenges – Quality of Service & Securing VOIP  Legal Issuers  Risk.
FastTrack Network & Applications (KaZaA & Morpheus)
JXTAJXTA By Fawaz AlSulaiman
Peer-to-Peer and Collective Intelligence A platform for collaboration Andrew Roczniak Collective Intelligence Lab Multimedia Communications Research Lab.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Free, online, technical courses Take a free online course. Microsoft Virtual Academy.
The History of Java By: Drew Fleming. Before I Start Teaching You Guys Important things to keep in mind Java is not the next step in C++ progression Java.
Peer-to-Peer (P2P) Networks By Bongju Yu. Contents  What is P2P?  Features of P2P systems  P2P Architecture  P2P Protocols  P2P Projects  Reference.
P2P Systems1 2. Peer-2-Peer Systems (1/14) 1.P2P Background a)What’s exciting? b)Historical P2P c)Modern P2P d)Why P2P? 2.P2P Environment a)Binding of.
The Public Domain Chapter 8. Assumptions of IP? Largely an economic argument – Economic motivation – Ability to trade rights in a market How accurate.
Book Review The Future of Ideas: The Fate of the Commons in a Connected World By Lawrence Lessig Heather Nodler INF 385Q - KM Systems Dr. Don Turnbull.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
Peer-to-peer systems ”Sharing is caring”. Why P2P? Client-server systems limited by management and bandwidth P2P uses network resources at the edges.
NT1210 Introduction to Networking
August 2001Copyright UserLand Software 2001 Next Generation Internet Software How Broadband will be used John Robb, President and COO UserLand Software.
Is the Domain Name System the heart of the internet?
Hiding in the Dark: The Internet You Cannot See Marc Visnick
Innovations in P2P Communications David A. Bryan College of William and Mary April 11, 2006 Advisor: Bruce B. Lowekamp.
Fix Windows 10 Error Code 0x80072ee7,Call Support Number
Peer-to-Peer Internet Networks
Copyright VI: Copyright & Internet Services
Peer-to-Peer Information Systems Week 6: Performance
An Overview of Peer-to-Peer
Peer-To-Peer Data Management
InfoShare A Distributed P2P Information Storage & Retrieval System
Presentation transcript:

P2P Conference – Trip Report Ilya Mironov, Crypto group

The conference The O’Reilly Peer-to-Peer conference Feb , 2001, San Francisco “The first and most important conference on P2P” About 900 attendees, 75 speakers.

Not a research or technical Five talks I liked: –lawyer –liberal profession –patent expert –business consultant –venture capitalist Talks I didn’t like: –CEO –developer –VP of marketing

Clay Shirky Definition of P2P: An application is P2P if it aggregates resources at the network’s edge. P2P applications address the nodes outside the DNS.

Clay Shirky “Because you could not get an IP address for your PC, you could not really host anything. The veil of second-class connectivity created a second class of users.” Balkanization of the address space (ICQ and AIM have created 150 mln cf. to 22 mln in whois)

Clay Shirky One-liners: He overestimated by four. Thomas Watson said in 1943 that “I think there is a world market for maybe five computers.” We now know that that figure was wrong. PC is the dark matter of the Internet.

Larry Cheng Overview of the P2P landscape 150+ companies $300 mln in VC funding in 2000 associate with Battery Ventures Distributed computations~35% capital Collaboration/knowledge sharing~30% Content distribution (aka Akamai killers)~10% Infrastructure/platform for P2P~10% File sharing~10% Distributed search~5%

Larry Cheng Distributed computing: $2b/year—the total market for supercomputing divided between about 5 companies. On his watch list: –Applied Meta (LEGION) –Entropia –United Devices

Larry Cheng On his radar (in distributed computations): –Popular Powers –eZaro –Porivo –Simulant –Blackstone

Larry Cheng On his watch list in collaboration/knowledge management –Autonomy –Consilent –Groove Networks Watch list for distributed search –Infrasearch –OpenCola

Larry Cheng Best funded companies Groove Networks$60 mln Entropia$29 Consilent$23 Napster$17+ NextPage$20 OpenCola$15 United Devices$13 Xdegrees$8

Bill Joy Unveiled another j-word: JXTA –pipes from one peer to another –ability to group a set of peers together, and create groups of groups –monitoring and metering –security layer. Open source on the Apache license

Patent Expert : about 984 patents that mention P2P, with about 200 in claims. Patents on P2P date back to the early 80s. Probably, most of them are invalid. YearsPatents

Lawrence Lessig Communication Decency Act Supreme Court’s message to lawmakers: you must wait [before stepping in and messing it up] Lawrence Lessig: “We have to wait to see how the things shake out, before we send lawyers in.” Napster case is relevant to all innovators

Lawrence Lessig The copyright we have now is not your dad’s copyright. “What is happening in the digital realm is that fair use is being coded away both through technology and through the licenses…” (“Alice in Wonderland” e-book—you are not allowed to read this book aloud) The copyright law must be changed

Kelly Truelove (Clip2 CEO) R&D company on Gnutella

Bill Joy on security "In the short term, you can do a lot of stuff without security. In the long term, you need to design thinking through security and anonymity up front. We're committed to doing security up front and if it takes us longer, so be it. Success will depend on doing security in a proper way."

David Anderson on security more than 50% of project resources dealing with security problems “It’s a fortunate property of our problem that incorrect computation on a piece of data is not disastrous.” Having about x3 more power than needed, they are able to double-check the work

Folks on Security Security’s our first priority. We use SHA-1 and zero-knowledge. We may use PGP-type certificates or Verisign-type certificates. Entropia: sandbox for binaries

Three most frequent words 1.Peer[-to-peer] 2.Napster 3.Tragedy of the commons

Companies to watch I add to my radar: –OpenCola –Clip2 –XDegrees –Free Haven –P2P working group Watch out! –Mojo Nation

Miscellaneous pics Ian Clarke (Freenet) and Shawn Fanning (Napster) run into each other

Miscellaneous pics Web-programmer, street performer, songlet writer

Miscellaneous pics