* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download P2P final
Cracking of wireless networks wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Distributed firewall wikipedia , lookup
SIP extensions for the IP Multimedia Subsystem wikipedia , lookup
Remote Desktop Services wikipedia , lookup
Distributed operating system wikipedia , lookup
Airborne Networking wikipedia , lookup
Zero-configuration networking wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
Peer-to-Peer Communication Research Project Presentation 2002 CIS 585 – Sukmin Kim – Srikara Hrushikesh 1 Presentation Contents Introduction Current Web Issues P2P Business Implications Concerns with P2P P2P Architecture Napster Gnutella Freenet Future of P2P 2 Introduction 3 Introduction to P2P Direct communication between peers – Not a Client/Server Architecture History traces back to 1979 – Modem Popularity from Napster Acceptance in Business Community 4 Current Web Issues 5 Current Web Issues Cavalier attitude towards users – Policy regarding usage of customer data Accountability – Loss of e-mail lists and files Hackers – TCP/IP related issues P2P attempts to solve, but will not solve all the problems 6 P2P Business Implications 7 P2P Business Solutions When it comes to business P2P is like any fledging technology. It has shown lot of promise, but has encountered lot of hurdles P2P Solutions include – – – – – File Sharing Distributed computing Collaboration Messaging C2C e-commerce 8 Industry Players File Sharing – Gnutella – Nextpage www.gnutelliums.com www.nextpage.com Collaboration – Groove Networks – Omniprise www.groove.net www.ikimbo.com Distributed Computing – SETI@home www.distributed.net C2C e-commerce – Lightshare www.lightshare.com Direct e-mail – WorldStreet www.worldstreet.com 9 Specific Business Applications Health Care – Santa Barbara County Health care Department Law Firms – Chicago based law firm Baker & McKenzie Pharmaceutical Industry – GlaxoSmithKline research center Chip Manufacturing – Intel’s NetBatch Investment Banking – Bear, Stearns Source: PC Magazine, “Peer Pressure” by Sarah L. Roberts, 06/26/01 PC Magazine, “Peer-to-Peer” by Cade Metz, 06/01/01 10 P2P Business Model 11 P2P Practical Model of Enterprise 12 Concerns with P2P 13 Concerns with P2P Need for more Bandwidth Always on Servers result in higher net connectivity. The current asymmetry of more download and less upload will change Serious security issues Free-Riding effect Copyright and Royalty violations 14 P2P Architecture 15 Napster Online Music Sharing Business The software was written by 19 year old guy named Shawn Fanning Company recently filed for bankruptcy Not a complete P2P Napster uses servers to hold indexes that store file locations The addresses of the Napster nodes bypass the DNS system After resolving the IP address, the file transfer control shifts to nodes 16 Napster Model 17 Gnutella Currently the most popular decentralized P2P file sharing program Decentralized, No dependency on central server No website connection Utilizes daisy-chain effect for communication Allows sharing of all kinds of digital files Able to reach every computer on the internet Survival capability is high – can not be brought down 18 Origin of Gnutella Gnutella = GNU project of the Free Software Foundation + Nutella (the hazelnut/chocolate spread) Originally designed by Nullsoft, a subsidiary of AOL AOL halted Nullsoft's development of the Gnutella Gnutella was downloaded during few hours Programmers reverse-engineered and created their own Gnutella software 19 Comparison Between Gnutella & Napster Napster Model Gnutella Model 20 Gnutella Process 1. Search Request User A sends out a 1st layer request to computers B, C, & D. 2. Search Relay Users B, C, & D send the request on to the next layer of connected computers. 3. Search Response The file is located and a response is sent to computer A via the same pathway. 4. Download The file is then downloaded by A through a direct http connection. 21 Gnutella Terms Servent A combination of a server and a client. In the decentralized gnutella model, each computer on the network is both a client and a server. Time to Live Abbreviated "TTL," the Time to Live is the number of hops that a message will make on the Gnutella Network before being discarded. Each servent that views a message will decrement its TTL by 1, and will discard that message when the TTL reaches 0. This prevents messages from being sent back and forth across the Gnutella Network indefinitely. Most gnutella clones set TTL at around 7, although some allow the user to configure it. 22 Gnutella Terms (Continued) Ping When a new user joins the Gnutella Network, he broadcasts a message called a "ping request" to the network, announcing his presence on the network. Nodes which receive this ping, send a “Pong” back to the pinging user to acknowledge that they have received this message. Pong When a node on the Gnutella Network receives a ping request, it replies with a pong (a.k.a ping response). This pong contains the responding host's IP address and port, as well as number of files the responding host is sharing and their total size. Horizon Horizon is the group of gnutella servents that the node is capable of communicating with at a particular time. 23 FreeNet Freenet is an open, democratic system which cannot be controlled by any one person, not even its creators. Freenet is a large-scale peer-to-peer network which pools the power of member computers around the world to create a massive virtual information store open to anyone to freely publish or view information of all kinds. 24 FreeNet is Highly survivable All internal processes are completely anonymized and decentralized across the global network, making it virtually impossible for an attacker to destroy information or take control of the system. Private Freenet makes it extremely difficult for anyone to spy on the information that you are viewing, publishing, or storing. Secure Information stored in Freenet is protected by strong cryptography against malicious tampering or counterfeiting. Efficient Freenet dynamically replicates and relocates information to provide efficient service and minimal bandwidth usage regardless of load. 25 FreeNet History Freenet is an enhanced Open Source implementation of the system described by Ian Clarke's 1999 paper "A distributed decentralized information storage and retrieval system“. Work started on Freenet shortly after the publication of this paper in July 1999 by Clarke and a small number of volunteers. By March 2000 version 0.1 of Freenet was released. Since March 2000 Freenet has been extensively reported in the press, primarily due to its implications for copyright rather than for its wider aim, namely freedom of communication. 26 Freenet Structure 27 Review of P2P Architecture Napster – Hybrid P2P Gnutella – Pure P2P FreeNet – Purest P2P 28 Future of P2P 29 Future of P2P IT Prospect From Gartner 30 Future of P2P Next Generation of IT Architecture Mainframe Client/Server P2P P2P Protocol Standard is required Killer Application of P2P is required Profit Model based on User’s Communities 31