LIS508 almost last lecture: Privacy and Ethics Thomas Krichel 2003-12-09.

Slides:



Advertisements
Similar presentations
Peer-to-peer and agent-based computing P2P Algorithms.
Advertisements

The Start of Digital Anarchy Shawn Fanning (19-yr-old student nicknamed Napster) developed the original Napster application and service in January 1999.
INF 123 SW ARCH, DIST SYS & INTEROP LECTURE 12 Prof. Crista Lopes.
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
Gnutella 2 GNUTELLA A Summary Of The Protocol and it’s Purpose By
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
Peer-to-Peer Networks João Guerreiro Truong Cong Thanh Department of Information Technology Uppsala University.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
The Internet Useful Definitions and Concepts About the Internet.
Peer-to-Peer Networking By: Peter Diggs Ken Arrant.
Peer-to-Peer (or P2P) From user to user. Peer-to-peer implies that either side can initiate a session and has equal responsibility. Corey Chan Andrew Merfeld.
Version Control Systems Phil Pratt-Szeliga Fall 2010.
© Lethbridge/Laganière 2001 Chap. 3: Basing Development on Reusable Technology 1 Let’s get started. Let’s start by selecting an architecture from among.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
Basics Dayton Metro Library Place photo here August 10, 2015.
DIGITAL Download Sharing and Copying. Digital Download Process of downloading content or materials with the elimination of physical media. (dvd/cdrom)
A global, public network of computer networks. The largest computer network in the world. Computer Network A collection of computing devices connected.
Client-Server vs P2P or, HTTP vs Bittorrent. Client-Server Architecture SERVER client.
KaZaA: Behind the Scenes Shreeram Sahasrabudhe Lehigh University
P2P File Sharing Systems
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Peer-to-Peer Computing CS587x Lecture Department of Computer Science Iowa State University.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
Privacy in P2P based Data Sharing Muhammad Nazmus Sakib CSCE 824 April 17, 2013.
Slide 1 What is a Computer Network? A computer network is a linked set of computer systems capable of sharing computer power and resources such as printers,
BitTorrent Internet Technologies and Applications.
Forensics Investigation of Peer-to- Peer File Sharing Networks Authors: Marc Liberatore, Robert Erdely, Thomas Kerle, Brian Neil Levine & Clay Shields.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
思科网络技术学院理事会. 1 Application Layer Functionality and Protocols Network Fundamentals – Chapter 3.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
WXET1143 Lecture7: , Chat and Messaging. Introduction  Electronic mail is everywhere.  Now many people in business, government, and education use.
1 Computer Communication & Networks Lecture 28 Application Layer: HTTP & WWW p Waleed Ejaz
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
Chapter 8 The Internet: A Resource for All of Us.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 38 How Music Sharing and File Sharing Work.
Peer-to-Peer Networks University of Jordan. Server/Client Model What?
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Jozef Goetz, Application Layer PART VI Jozef Goetz, Position of application layer The application layer enables the user, whether human.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
The Start Shawn Fanning (19-yr-old student nicknamed Napster) developed the original Napster application and service in January 1999 while a freshman.
1 V1-Filename.ppt / / Jukka K. Nurminen Content Search UnstructuredP2P Content Search Unstructured P2P Jukka K. Nurminen *Partly adapted from.
ECEN “Internet Protocols and Modeling”, Spring 2012 Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Class.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
PEER TO PEER (P2P) NETWORK By: Linda Rockson 11/28/06.
P2PComputing/Scalab 1 Gnutella and Freenet Ramaswamy N.Vadivelu Scalab.
HTTP evolution - TCP/IP issues Lecture 4 CM David De Roure
The Client-Server Model And the Socket API. Client-Server (1) The datagram service does not require cooperation between the peer applications but such.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Application Layer Functionality and Protocols.
Peer-to-peer systems (part I) Slides by Indranil Gupta (modified by N. Vaidya)
Peer to Peer Computing. What is Peer-to-Peer? A model of communication where every node in the network acts alike. As opposed to the Client-Server model,
Peer-to-Peer (P2P) Networks By Bongju Yu. Contents  What is P2P?  Features of P2P systems  P2P Architecture  P2P Protocols  P2P Projects  Reference.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Chapter 3.  The advantages and disadvantages of: ◦ Client-Server Networks & ◦ Peer-to-Peer Networks.
Distributed Web Systems Peer-to-Peer Systems Lecturer Department University.
BitTorrent Vs Gnutella.
Client-Server Computing
Computer Communication & Networks
Unexpected Peer-to-Peer
Protocol Application TCP/IP Layer Model
Computer Networks Protocols
Presentation transcript:

LIS508 almost last lecture: Privacy and Ethics Thomas Krichel

The unethical network There are a lot of ethical issues arising in computer networks! Here we list a few.

Offensive Speech WWW and other network installations are full of speech that offends some –views on religion and politics –sexually explicit material –spam Are Internet Service Providers (ISPs) reliable for contents? Are they allowed to restrict contents?

Government snooping FBI has installed a system at many ISPs to snoop for any interesting contents. Originally called carnivore, now DCS1000. But fourth amendment prohibit searches without a search warrant. At the world summit for the information society, developing countries have pushed for UN control of the Internet.

Private snooping Web providers have cookies installed to recognize users of the some machine. If this is a home machine, behavior of a user may be quite traceable. But, of course, it can be used to provide convenient features that overcome the stateless nature of http.

Illegal copying Some copyright holders view the Internet as a giant copying machine. They may be right when it comes to file sharing. File sharing operates on peer-to-peer networks exchanging information.

Peer-to-Peer (P2P) Most Internet services are based on a client/server architecture. In a P2P architecture, users run clients that also run as servers, called "servents". But we can stick to client/server way of terminology –You act as a client when I want something –You act as a server when you give something

Napster Napster is sometimes referred to as a p2p network. This is not quite true. Napster ran a central server. You connected to that server and announced what files you had to share. Every search was conducted on the dataset assembled at the central server. Connections to download files where done between peer machines only!

end of Napster Napster argued since it was only involved in collecting the information about files available, it was legal. Napster never shared any illegal file. The courts thought otherwise. It was shut down. Napster network died without a central machine. To enable true piracy, we need a truly distributed system.

gnutella protocol This protocol underlies much of the current file-sharing activity on the Internet. It is based on TCP/IP and http! A file sharing network (fsn) is a bunch of machines that exchange files using gnutella. To connect to a gnutella network, you need the IP address of one single machine that is already part of the network.

connection to a fns Once you establish connection to the first servent, you announce your presence. The first servent will pass on that message to all the servents that it is connected to, and so on. These servents all reply with data about themselves –how many files it is sharing –how many kilo bytes the files take up This already adds up to a lot of traffic!

time to live Every gnutella message has a time to live (ttl). It is decremented every time it passes at a servent. The TTL is usually quite small. It can be arbitrarily reduced by servents. The number of servents that the packet has already been rooted to is also noted.

detail on the message MessageID16 bytes ID FunctionID1 byte function of packet –search –connection announcement (initialization), etc. RemainingTTL1 byteTTL left to this packet HopsTaken1 bytenumber of servents this packet has already been routed through DataLength4 bytessize of the remaining data in the packet (no need to remember for quiz)

example scenario Alice starts a servent. Knows Charlie's IP and send him an init packet. Charlie gets it and routes it to Bob and Eve. They pass it on further and so on, until TTL is reached. Charlie sends his file data to Alice. Charlie gets responses from Bob and Eve, sends it to Alice… Everyone only knows about the servents that they are connected to.

searches When you do a search, it is passed on from servent to servent through the fsn. Servents have their own rule how to repond to queries. –If you search for '.mp3' a servent may only look for a file '.mp3' a servent may look for all files ending with.mp3 –Servents may respond with a truncated results set. Searches are public, most fsn software has a search monitor.

downloading to establish downloads the servents use http. this is a well-established protocol with a good code base. Thus everyone who is connected to a file sharing network run a web server!

ease to infringe Clearly all the traffic on a fsn, with current technology, can be observed. But the infringement is so massive that it appears difficult to clamp down on. The easy to infringe is technological. RIAA have sued. They reach the tippy top of the iceberg, with the hope to dissuade.

copyright holders are scared ISPs can keep track who has what IP at a given moment. Some block the ports that are used for file sharing. Copyright holders have demanded these lists. This is a violation of customer privacy.

Freenet This is as different file sharing system that is still under development. It aims: –To allow people to distribute material anonymously. –To allow people to retrieve material anonymously. –To make the removal of material almost insuperably difficult. –To operate without central control. Ethics are more political.

operation of freenet Searches are only passed to one other servent, which pass it on. After no positive response from that chain, another servent is tried. But the entire document sought is passed along, unless it is too large Servents keep caches of popular documents until no one asks for it for a long time. popular documents frequent and close to users.

searching on freenet You basically can not search on freenet. Each document has an identifier. The identifier and the document can not be changed. This will make it difficult to use it on its own as a device for people to exchange copyrighted material.

Thank you for your attention!