P2P Network is good or bad? Sang-Hyun Park. P2P Network is good or bad? - Definition of P2P - History of P2P - Economic Impact - Benefits of P2P - Legal.

Slides:



Advertisements
Similar presentations
Peer-to-Peer (P2P) Software Risks Standardized Consumer Disclosures Solution To Be Universally Applied By Complying P2P Software Suppliers Developed by.
Advertisements

1. 2 Branch Office Network Performance Caches content downloaded from file and Web servers Users in the branch can quickly open files stored in the cache.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
Peer-to-Peer Technology and Security Issues By Raul Rodriguez, Arash Zarrinbakhsh, Cynthia Roger and Phillip Shires College of Business Administration.
Peer-to-Peer Content Sharing. P2P File Sharing Benefits Why use a P2P model for a file sharing application?
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
Presented by Stephen Kozy. Presentation Outline Definition and explanation Comparison and Examples Advantages and Disadvantages Illegal and Legal uses.
Peer-to-Peer (or P2P) From user to user. Peer-to-peer implies that either side can initiate a session and has equal responsibility. Corey Chan Andrew Merfeld.
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
Napster and Limewire (p2p) Presented by Kevin Draa.
1 Client-Server versus P2P  Client-server Computing  Purpose, definition, characteristics  Relationship to the GRID  Research issues  P2P Computing.
P2P NETWORKS Legal Risks. Who’s On First Identity crisis Each computer can be client Each computer can be server “Servent”
Squirrel: A decentralized peer- to-peer web cache Paul Burstein 10/27/2003.
Company LOGO Peer-to-Peer Inside and out What is a P2P network?  All machines are connected as equal  Each user is a Peer  Peers can act as both a.
Music File Sharing Caitlin Smith Stewart Rutledge Jess Culpeper.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
P2P File Sharing Systems
P2P file sharing Know the risks. Peer-to-peer (P2P) file sharing convenient way to share public-domain: – music – audio – images – documents – software.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Peer-to-Peer Computing CS587x Lecture Department of Computer Science Iowa State University.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
P EER - TO -P EER N ETWORKS Michael Fine 1. W HAT ARE P EER -T O -P EER N ETWORKS ? Napster Social networking spawned from this concept. Emerged in the.
Open up Evernote, mini whiteboards.  2 minutes – write down as many as you can think of.
A Survey of P2P Filesharing Applications James Kirk CS February 3, 2004.
Peer to Peer Network Anas Hardan. What is a Network? What is a Network? A network is a group of computers and other devices (such as printers) that are.

Chapter 1 Intro to Routing & Switching.  Networks have changed how we communicate  Everyone can connect & share  How have networks changed the way…
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
Peer-to-Peer Networking. Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer.
Copyright Law An Review on Computer Music Files and P2P File Sharing.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 38 How Music Sharing and File Sharing Work.
P2P Web Standard IS3734/19/10 Michael Radzin. What is P2P? Peer to Peer Networking (P2P) is a “direct communications initiations session.” Modern uses.
Peer-to-Peer Networks University of Jordan. Server/Client Model What?
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003.
Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.
Super-peer Network. Motivation: Search in P2P Centralised (Napster) Flooding (Gnutella)  Essentially a breadth-first search using TTLs Distributed Hash.
The Start Shawn Fanning (19-yr-old student nicknamed Napster) developed the original Napster application and service in January 1999 while a freshman.
FastTrack Network & Applications (KaZaA & Morpheus)
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
PEER TO PEER (P2P) NETWORK By: Linda Rockson 11/28/06.
Concepts of Video and File/Sharing System Reporters: Ma. Raizza M. Cantara Mary Jane Eule Richard Ravalo Maika Laguartilla.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Peer to Peer Computing. What is Peer-to-Peer? A model of communication where every node in the network acts alike. As opposed to the Client-Server model,
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
By: Ashley, Sabiha, and Roshaan. Software Piracy is the unauthorized copying of software. By buying the software, you become a licensed user rather than.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
Malugo – a scalable peer-to-peer storage system..
Jake Horsfield (P3/D1) PURPOSE OF SOFTWARE UTILITIES.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 3.  The advantages and disadvantages of: ◦ Client-Server Networks & ◦ Peer-to-Peer Networks.
Music Downloads By: Demetria Norman And Jacquelyn Menner.
File Sharing Legalities and Ethics
Peer-to-Peer Internet Networks
Section 14.1 Section 14.2 Identify the technical needs of a Web server
Distributed computing deals with hardware
PEER-TO-PEER SYSTEMS.
Presentation transcript:

P2P Network is good or bad? Sang-Hyun Park

P2P Network is good or bad? - Definition of P2P - History of P2P - Economic Impact - Benefits of P2P - Legal and Copyright issues - Public Perception - Attacks on peer-to-peer networks - Risk - Ethics of file sharing

Definition of P2P File sharing usually follows the peer-to-peer (P2P) model, where the files are stored on and served by personal computers of the users.

History of P2P 1st Generation Clients  Napster was the original P2P application.  Napster hosted a central server.  Find a particular file. ("searched Napster“)

History of P2P 2nd Generation Clients  Gnutella was the second major P2P network.  Gnutella worked by connecting users to other users directly  Searching for a file.  Advantage : It couldn't easily be shut down.  Disadvantages: slow searches and islands of sub-networks.

History of P2P 3rd Generation Clients  Improve networks and improve file transfer speeds.  Fasttrack (Kazaa, or Grokster or Morpheus ).  Find a particular file. ("searched Napster“)  Supernodes and Spawning.

Economic Impact Negative impact on record sales  Dropped from $38 billion in 1999 to $32 billion in  Trend with the advent of Napster in June of 1999.

Economic Impact No negative effect on CD sales  Statistically indistinguishable from zero.  T racking downloading on OpenNap servers.  Illegal downloads: Small force in the decrease in album sales.  Slightly improving album sales of the top albums in stores.

Benefits of P2P  Efficient use of resources. - Unused bandwidth and storage. - Unused bandwidth and storage.  Scalability. - Consumers of resources also donate resources. - Consumers of resources also donate resources. - Aggregate resources grow naturally with utilization. - Aggregate resources grow naturally with utilization.

Benefits of P2P  Reliability. - Replicas. - Replicas. - Geographic distribution. - Geographic distribution. - No single point of failure. - No single point of failure.  Ease of administration. - Nodes self organize. - Nodes self organize. - No need to deploy servers to satisfy demand (c.f. scalability). - No need to deploy servers to satisfy demand (c.f. scalability). - Built-in fault tolerance, replication, and load balancing. - Built-in fault tolerance, replication, and load balancing.

Legal and copyright issues  File sharing is a legal technology with legal uses, but… - Download and upload copyrighted materials without permission. - Download and upload copyrighted materials without permission. - Copyright infringement without authorization for improper purposes. - Copyright infringement without authorization for improper purposes. - Countries to cause significant difficulties in the protection of copyright. - Countries to cause significant difficulties in the protection of copyright.

Public Perception  According to a poll in Sweden - 75% young voters in Sweden support file sharing. - 75% young voters in Sweden support file sharing. ( I think it is OK to download files from the Net, even if it is illegal. ) ( I think it is OK to download files from the Net, even if it is illegal. ) - 38% said "adamantly agreed“. - 38% said "adamantly agreed“. - 39% said "partly agreed". - 39% said "partly agreed".

Attacks on peer-to-peer networks  Viruses to carried data.  Malware in the peer-to-peer network software itself.  Denial of service attacks.  Spamming.

Risk  Malware. - spyware, viruses, or adware. - spyware, viruses, or adware.  Degraded performance on affected systems. (Malware) - Web browsers. - Web browsers. - Anti-virus software. - Anti-virus software. - Anti-spyware. - Anti-spyware. - Software firewalls. - Software firewalls.

Risk  Distribute adult pornography to children.  Child pornography to anyone.  Degraded performance on affected systems. (Malware) - Web browsers. - Web browsers. - Anti-virus software. - Anti-virus software. - Anti-spyware. - Anti-spyware. - Software firewalls. - Software firewalls.

Ethics of file sharing  Fair Use - Downloading content for which you have no license is illegal. - Downloading content for which you have no license is illegal. - In practice, very little “fair use” occurs on P2P networks – vast majority of traffic is piracy-related. - In practice, very little “fair use” occurs on P2P networks – vast majority of traffic is piracy-related.  Victimless Crime - Ease of committing the crime doesn’t make it OK. - Ease of committing the crime doesn’t make it OK. - Victims include : record companies and employees thereof (including artists) as well as network providers – bandwidth costs money. - Victims include : record companies and employees thereof (including artists) as well as network providers – bandwidth costs money.

Conclusion

Question?