1 Peer-to-Peer Communication Research Project Presentation 2002 – Sukmin Kim – Srikara Hrushikesh CIS 585.

Slides:



Advertisements
Similar presentations
Peer-to-peer and agent-based computing Peer-to-Peer Computing: Introduction.
Advertisements

INF 123 SW ARCH, DIST SYS & INTEROP LECTURE 12 Prof. Crista Lopes.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
PEER-TO-PEER Is a type of network in which each workstation has equivalent capabilities and responsibilities. This differs from client/server architectures,
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
Gnutella 2 GNUTELLA A Summary Of The Protocol and it’s Purpose By
Peer-to-Peer Networks João Guerreiro Truong Cong Thanh Department of Information Technology Uppsala University.
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Peer-to-Peer Networking By: Peter Diggs Ken Arrant.
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
1 Unstructured Routing : Gnutella and Freenet Presented By Matthew, Nicolai, Paul.
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
Gnutella, Freenet and Peer to Peer Networks By Norman Eng Steven Hnatko George Papadopoulos.
1 Client-Server versus P2P  Client-server Computing  Purpose, definition, characteristics  Relationship to the GRID  Research issues  P2P Computing.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
Improving Data Access in P2P Systems Karl Aberer and Magdalena Punceva Swiss Federal Institute of Technology Manfred Hauswirth and Roman Schmidt Technical.
Peer-to-peer: an overview Selo TE P2P is not a new concept P2P is not a new technology P2P is not a new technology Oct : first transmission.
Review of Free Riding on Gnutella Eytan Adar and Bernardo Huberman Shreeram Sahasrabudhe.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
A global, public network of computer networks. The largest computer network in the world. Computer Network A collection of computing devices connected.
P2P File Sharing Systems
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Peer-to-Peer Computing CS587x Lecture Department of Computer Science Iowa State University.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
1 Reading Report 4 Yin Chen 26 Feb 2004 Reference: Peer-to-Peer Architecture Case Study: Gnutella Network, Matei Ruoeanu, In Int. Conf. on Peer-to-Peer.
Gnutella2: A Better Gnutella?

Survey of Peer to Peer Technologies Authors: Bratislav Milić, Jelena Krunić, Veljko Milutinović,
思科网络技术学院理事会. 1 Application Layer Functionality and Protocols Network Fundamentals – Chapter 3.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
Peer-to-Peer Networking. Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer.
徐晨桓 李柏穎.  Definition  Introduction  History  Example - Napster  Example - Gnutella 徐晨桓 李柏穎 2/27.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Chapter 2: Application layer
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Peer-to-Pee Computing HP Technical Report Chin-Yi Tsai.
LIS508 almost last lecture: Privacy and Ethics Thomas Krichel
PSI Peer Search Infrastructure. Introduction What are P2P Networks? The term "peer-to-peer" refers to a class of systems and applications that employ.
The Start Shawn Fanning (19-yr-old student nicknamed Napster) developed the original Napster application and service in January 1999 while a freshman.
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications  app architectures  app requirements r 2.2 Web and HTTP r.
1 V1-Filename.ppt / / Jukka K. Nurminen Content Search UnstructuredP2P Content Search Unstructured P2P Jukka K. Nurminen *Partly adapted from.
CS155b: E-Commerce Lecture 11: February 15, 2001 Alternative Content-Distribution Methods.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
FastTrack Network & Applications (KaZaA & Morpheus)
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
P2P Computing MIRA YUN September 16, Outline What is P2P P2P taxonomies Characteristics Different P2P systems Conclusion.
P2PComputing/Scalab 1 Gnutella and Freenet Ramaswamy N.Vadivelu Scalab.
Web Server.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Peer to Peer Computing. What is Peer-to-Peer? A model of communication where every node in the network acts alike. As opposed to the Client-Server model,
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
Peer-to-Peer (P2P) Networks By Bongju Yu. Contents  What is P2P?  Features of P2P systems  P2P Architecture  P2P Protocols  P2P Projects  Reference.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
COM: 111 Introduction to Computer Applications Department of Information & Communication Technology Panayiotis Christodoulou.
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
August 2001Copyright UserLand Software 2001 Next Generation Internet Software How Broadband will be used John Robb, President and COO UserLand Software.
Napster and Gnutella Protocols English micro-project Guillaume CASSIN May 31, 2001.
BitTorrent Vs Gnutella.
Comparison of LAN, MAN, WAN
Unstructured Routing : Gnutella and Freenet
InfoShare A Distributed P2P Information Storage & Retrieval System
Presentation transcript:

1 Peer-to-Peer Communication Research Project Presentation 2002 – Sukmin Kim – Srikara Hrushikesh CIS 585

2 Presentation Contents  Introduction  Current Web Issues  P2P Business Implications  Concerns with P2P  P2P Architecture  Napster  Gnutella  Freenet  Future of P2P

3 IntroductionIntroduction

4 Introduction to P2P  Direct communication between peers –Not a Client/Server Architecture  History traces back to 1979 –Modem  Popularity from Napster  Acceptance in Business Community

5 Current Web Issues

6  Cavalier attitude towards users –Policy regarding usage of customer data  Accountability –Loss of lists and files  Hackers –TCP/IP related issues  P2P attempts to solve, but will not solve all the problems

7 P2P Business Implications

8 P2P Business Solutions  When it comes to business P2P is like any fledging technology. It has shown lot of promise, but has encountered lot of hurdles  P2P Solutions include –File Sharing –Distributed computing –Collaboration –Messaging –C2C e-commerce

9 Industry Players  File Sharing –Gnutella –Nextpage  Collaboration –Groove Networkswww.groove.net –Omniprisewww.ikimbo.com  Distributed Computing  C2C e-commerce –Lightsharewww.lightshare.com  Direct –WorldStreetwww.worldstreet.com

10 Specific Business Applications  Health Care –Santa Barbara County Health care Department  Law Firms –Chicago based law firm Baker & McKenzie  Pharmaceutical Industry –GlaxoSmithKline research center  Chip Manufacturing –Intel’s NetBatch  Investment Banking –Bear, Stearns PC Magazine, “Peer Pressure” by Sarah L. Roberts, 06/26/01 Source: PC Magazine, “Peer Pressure” by Sarah L. Roberts, 06/26/01 PC Magazine, “Peer-to-Peer” by Cade Metz, 06/01/01 PC Magazine, “Peer-to-Peer” by Cade Metz, 06/01/01

11 P2P Business Model

12 P2P Practical Model of Enterprise

13 Concerns with P2P

14 Concerns with P2P  Need for more Bandwidth  Always on Servers result in higher net connectivity.  The current asymmetry of more download and less upload will change  Serious security issues  Free-Riding effect  Copyright and Royalty violations

15 P2P Architecture

16 NapsterNapster  Online Music Sharing Business  The software was written by 19 year old guy named Shawn Fanning  Company recently filed for bankruptcy  Not a complete P2P  Napster uses servers to hold indexes that store file locations  The addresses of the Napster nodes bypass the DNS system  After resolving the IP address, the file transfer control shifts to nodes

17 Napster Model

18 GnutellaGnutella  Currently the most popular decentralized P2P file sharing program  Decentralized, No dependency on central server  No website connection  Utilizes daisy-chain effect for communication  Allows sharing of all kinds of digital files  Able to reach every computer on the internet  Survival capability is high –can not be brought down

19 Origin of Gnutella  Gnutella = GNU project of the Free Software Foundation + Nutella (the hazelnut/chocolate spread)  Originally designed by Nullsoft, a subsidiary of AOL  AOL halted Nullsoft's development of the Gnutella  Gnutella was downloaded during few hours  Programmers reverse-engineered and created their own Gnutella software

20 Napster Model Gnutella Model Comparison Between Gnutella & Napster

21 Gnutella Process 1.Search Request User A sends out a 1st layer request to computers B, C, & D. 2.Search Relay Users B, C, & D send the request on to the next layer of connected computers. 3.Search Response The file is located and a response is sent to computer A via the same pathway. 4.Download The file is then downloaded by A through a direct http connection.

22 Gnutella Terms  Servent A combination of a server and a client. In the decentralized gnutella model, each computer on the network is both a client and a server.  Time to Live Abbreviated "TTL," the Time to Live is the number of hops that a message will make on the Gnutella Network before being discarded. Each servent that views a message will decrement its TTL by 1, and will discard that message when the TTL reaches 0. This prevents messages from being sent back and forth across the Gnutella Network indefinitely. Most gnutella clones set TTL at around 7, although some allow the user to configure it.

23 Gnutella Terms (Continued)  Ping When a new user joins the Gnutella Network, he broadcasts a message called a "ping request" to the network, announcing his presence on the network. Nodes which receive this ping, send a “Pong” back to the pinging user to acknowledge that they have received this message.  Pong When a node on the Gnutella Network receives a ping request, it replies with a pong (a.k.a ping response). This pong contains the responding host's IP address and port, as well as number of files the responding host is sharing and their total size.  Horizon Horizon is the group of gnutella servents that the node is capable of communicating with at a particular time.

24FreeNetFreeNet  Freenet is an open, democratic system which cannot be controlled by any one person, not even its creators.  Freenet is a large-scale peer-to-peer network which pools the power of member computers around the world to create a massive virtual information store open to anyone to freely publish or view information of all kinds.

25 FreeNet is  Highly survivable All internal processes are completely anonymized and decentralized across the global network, making it virtually impossible for an attacker to destroy information or take control of the system.  Private Freenet makes it extremely difficult for anyone to spy on the information that you are viewing, publishing, or storing.  Secure Information stored in Freenet is protected by strong cryptography against malicious tampering or counterfeiting.  Efficient Freenet dynamically replicates and relocates information to provide efficient service and minimal bandwidth usage regardless of load.

26 FreeNet History  Freenet is an enhanced Open Source implementation of the system described by Ian Clarke's 1999 paper "A distributed decentralized information storage and retrieval system“.  Work started on Freenet shortly after the publication of this paper in July 1999 by Clarke and a small number of volunteers.  By March 2000 version 0.1 of Freenet was released.  Since March 2000 Freenet has been extensively reported in the press, primarily due to its implications for copyright rather than for its wider aim, namely freedom of communication.

27 Freenet Structure

28  Napster– Hybrid P2P  Gnutella– Pure P2P  FreeNet– Purest P2P Review of P2P Architecture

29 Future of P2P

30 Future of P2P IT Prospect From Gartner

31 Future of P2P  Next Generation of IT Architecture Mainframe Client/Server P2P  P2P Protocol Standard is required  Killer Application of P2P is required  Profit Model based on User’s Communities