* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download P2P final
Cracking of wireless networks wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Distributed firewall wikipedia , lookup
SIP extensions for the IP Multimedia Subsystem wikipedia , lookup
Remote Desktop Services wikipedia , lookup
Distributed operating system wikipedia , lookup
Airborne Networking wikipedia , lookup
Zero-configuration networking wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
Peer-to-Peer Communication Research Project Presentation 2002 CIS 585 – Sukmin Kim – Srikara Hrushikesh 1 Presentation Contents  Introduction  Current Web Issues  P2P Business Implications  Concerns with P2P  P2P Architecture  Napster  Gnutella  Freenet  Future of P2P 2 Introduction 3 Introduction to P2P  Direct communication between peers – Not a Client/Server Architecture  History traces back to 1979 – Modem  Popularity from Napster  Acceptance in Business Community 4 Current Web Issues 5 Current Web Issues  Cavalier attitude towards users – Policy regarding usage of customer data  Accountability – Loss of e-mail lists and files  Hackers – TCP/IP related issues  P2P attempts to solve, but will not solve all the problems 6 P2P Business Implications 7 P2P Business Solutions  When it comes to business P2P is like any fledging technology. It has shown lot of promise, but has encountered lot of hurdles  P2P Solutions include – – – – – File Sharing Distributed computing Collaboration Messaging C2C e-commerce 8 Industry Players  File Sharing – Gnutella – Nextpage www.gnutelliums.com www.nextpage.com  Collaboration – Groove Networks – Omniprise www.groove.net www.ikimbo.com  Distributed Computing – SETI@home www.distributed.net  C2C e-commerce – Lightshare www.lightshare.com  Direct e-mail – WorldStreet www.worldstreet.com 9 Specific Business Applications  Health Care – Santa Barbara County Health care Department  Law Firms – Chicago based law firm Baker & McKenzie  Pharmaceutical Industry – GlaxoSmithKline research center  Chip Manufacturing – Intel’s NetBatch  Investment Banking – Bear, Stearns Source: PC Magazine, “Peer Pressure” by Sarah L. Roberts, 06/26/01 PC Magazine, “Peer-to-Peer” by Cade Metz, 06/01/01 10 P2P Business Model 11 P2P Practical Model of Enterprise 12 Concerns with P2P 13 Concerns with P2P  Need for more Bandwidth  Always on Servers result in higher net connectivity.  The current asymmetry of more download and less upload will change  Serious security issues  Free-Riding effect  Copyright and Royalty violations 14 P2P Architecture 15 Napster  Online Music Sharing Business  The software was written by 19 year old guy named Shawn Fanning  Company recently filed for bankruptcy  Not a complete P2P  Napster uses servers to hold indexes that store file locations  The addresses of the Napster nodes bypass the DNS system  After resolving the IP address, the file transfer control shifts to nodes 16 Napster Model 17 Gnutella  Currently the most popular decentralized P2P file sharing program  Decentralized, No dependency on central server  No website connection  Utilizes daisy-chain effect for communication  Allows sharing of all kinds of digital files  Able to reach every computer on the internet  Survival capability is high – can not be brought down 18 Origin of Gnutella  Gnutella = GNU project of the Free Software Foundation + Nutella (the hazelnut/chocolate spread)  Originally designed by Nullsoft, a subsidiary of AOL  AOL halted Nullsoft's development of the Gnutella  Gnutella was downloaded during few hours  Programmers reverse-engineered and created their own Gnutella software 19 Comparison Between Gnutella & Napster Napster Model Gnutella Model 20 Gnutella Process 1. Search Request User A sends out a 1st layer request to computers B, C, & D. 2. Search Relay Users B, C, & D send the request on to the next layer of connected computers. 3. Search Response The file is located and a response is sent to computer A via the same pathway. 4. Download The file is then downloaded by A through a direct http connection. 21 Gnutella Terms  Servent A combination of a server and a client. In the decentralized gnutella model, each computer on the network is both a client and a server.  Time to Live Abbreviated "TTL," the Time to Live is the number of hops that a message will make on the Gnutella Network before being discarded. Each servent that views a message will decrement its TTL by 1, and will discard that message when the TTL reaches 0. This prevents messages from being sent back and forth across the Gnutella Network indefinitely. Most gnutella clones set TTL at around 7, although some allow the user to configure it. 22 Gnutella Terms (Continued)  Ping When a new user joins the Gnutella Network, he broadcasts a message called a "ping request" to the network, announcing his presence on the network. Nodes which receive this ping, send a “Pong” back to the pinging user to acknowledge that they have received this message.  Pong When a node on the Gnutella Network receives a ping request, it replies with a pong (a.k.a ping response). This pong contains the responding host's IP address and port, as well as number of files the responding host is sharing and their total size.  Horizon Horizon is the group of gnutella servents that the node is capable of communicating with at a particular time. 23 FreeNet  Freenet is an open, democratic system which cannot be controlled by any one person, not even its creators.  Freenet is a large-scale peer-to-peer network which pools the power of member computers around the world to create a massive virtual information store open to anyone to freely publish or view information of all kinds. 24 FreeNet is  Highly survivable All internal processes are completely anonymized and decentralized across the global network, making it virtually impossible for an attacker to destroy information or take control of the system.  Private Freenet makes it extremely difficult for anyone to spy on the information that you are viewing, publishing, or storing.  Secure Information stored in Freenet is protected by strong cryptography against malicious tampering or counterfeiting.  Efficient Freenet dynamically replicates and relocates information to provide efficient service and minimal bandwidth usage regardless of load. 25 FreeNet History  Freenet is an enhanced Open Source implementation of the system described by Ian Clarke's 1999 paper "A distributed decentralized information storage and retrieval system“.  Work started on Freenet shortly after the publication of this paper in July 1999 by Clarke and a small number of volunteers.  By March 2000 version 0.1 of Freenet was released.  Since March 2000 Freenet has been extensively reported in the press, primarily due to its implications for copyright rather than for its wider aim, namely freedom of communication. 26 Freenet Structure 27 Review of P2P Architecture  Napster – Hybrid P2P  Gnutella – Pure P2P  FreeNet – Purest P2P 28 Future of P2P 29 Future of P2P IT Prospect From Gartner 30 Future of P2P  Next Generation of IT Architecture Mainframe Client/Server P2P  P2P Protocol Standard is required  Killer Application of P2P is required  Profit Model based on User’s Communities 31
 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
                                             
                                             
                                             
                                             
                                             
                                             
                                             
                                             
                                             
                                            