A Survey of P2P Filesharing Applications James Kirk CS595-114 February 3, 2004.

Slides:



Advertisements
Similar presentations
CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 14: October 28, 2003 Peer-to-Peer File Sharing.
Advertisements

2/66 GET /index.html HTTP/1.0 HTTP/ OK... Clients Server.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
Web Applications: Peer-to-Peer Networks Presentation by Michael Smathers Chapter 7.4 Internet Measurement: Infrastructure, Traffic and Applications by.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Peer-to-Peer Networking By: Peter Diggs Ken Arrant.
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
EMule behind the scenes. Overview Extends the eDonkey protocol File sharing network Several hundreds of eMule servers Millions of eMule clients Each server.
P2P Network is good or bad? Sang-Hyun Park. P2P Network is good or bad? - Definition of P2P - History of P2P - Economic Impact - Benefits of P2P - Legal.
Part 1: Overview of Web Systems Part 2: Peer-to-Peer Systems Internet Computing Workshop Tom Chothia.
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
Peer-to-Peer Intro Jani & Sami Peltotalo.
Academic Advisor: Dr. Yuval Elovici Technical Advisor: Dr. Lidror Troyansky.
Company LOGO Peer-to-Peer Inside and out What is a P2P network?  All machines are connected as equal  Each user is a Peer  Peers can act as both a.
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
Top P2P File- sharing Software (some of them ). eDonkey/Overnet Especially popular in Europe, the two P2P networks eDonkey and Overnet combined support.
CS 640: Introduction to Computer Networks Yu-Chi Lai Lecture 18 - Peer-to-Peer.
Free Powerpoint Templates Page 1 Free Powerpoint Templates Peer-2-Peer File Sharing Kenie Moses TECH621Social Internet Spring 2011.
KaZaA: Behind the Scenes Shreeram Sahasrabudhe Lehigh University
P2P File Sharing Systems
P2P file sharing Know the risks. Peer-to-peer (P2P) file sharing convenient way to share public-domain: – music – audio – images – documents – software.
Concepts of Video and File/Sharing System Reporters: Ma. Raizza M. Cantara Mary Jane Eule Richard Ravalo Maika Laguartilla.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
Peer to Peer Network Anas Hardan. What is a Network? What is a Network? A network is a group of computers and other devices (such as printers) that are.
BitTorrent Internet Technologies and Applications.

Cs423-cotter1 P2P Discovering P2P (Miller) Internet.
Peer-to-Peer Overlay Networks. Outline Overview of P2P overlay networks Applications of overlay networks Classification of overlay networks – Structured.
Forensics Investigation of Peer-to- Peer File Sharing Networks Authors: Marc Liberatore, Robert Erdely, Thomas Kerle, Brian Neil Levine & Clay Shields.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 38 How Music Sharing and File Sharing Work.
P2P Web Standard IS3734/19/10 Michael Radzin. What is P2P? Peer to Peer Networking (P2P) is a “direct communications initiations session.” Modern uses.
Introduction of P2P systems
Skype P2P Kedar Kulkarni 04/02/09.
Peer-to-Peer Networks University of Jordan. Server/Client Model What?
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Chapter 2: Application layer
Mark Williams-Thomas MA Director - WT Associates Ltd.
Peer-2-Peer Programming Greg Gamm Senior Seminar Fall 2007.
Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.
The Start Shawn Fanning (19-yr-old student nicknamed Napster) developed the original Napster application and service in January 1999 while a freshman.
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications  app architectures  app requirements r 2.2 Web and HTTP r.
Part 3: Internet Applications The Basics of Networking, Part 3 chapter 3.
1 V1-Filename.ppt / / Jukka K. Nurminen Content Search UnstructuredP2P Content Search Unstructured P2P Jukka K. Nurminen *Partly adapted from.
Peer-to-Peer File Sharing Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
Peer-to-Peer Networks Hongli Luo CEIT, IPFW. r Topics m Application architecture m P2P file sharing m P2P networks: Napster Gnutella KaAzA Bittorrent.
FastTrack Network & Applications (KaZaA & Morpheus)
PEER TO PEER (P2P) NETWORK By: Linda Rockson 11/28/06.
Impact of Incentives in BitTorrent By Jenny Liu and Seth Cooper.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 24 - Peer-to-Peer.
Concepts of Video and File/Sharing System Reporters: Ma. Raizza M. Cantara Mary Jane Eule Richard Ravalo Maika Laguartilla.
Hui Zhang, Fall Computer Networking CDN and P2P.
6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes.
Peer-to-Peer File Sharing
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Peer-to-Peer (P2P) Networks By Bongju Yu. Contents  What is P2P?  Features of P2P systems  P2P Architecture  P2P Protocols  P2P Projects  Reference.
Peer to Peer Networking. Network Models => Mainframe Ex: Terminal User needs direct connection to mainframe Secure Account driven  administrator controlled.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
Compsci 82, Fall Peer to Peer l What is peer to peer?  Useful? Disruptive?  Manageable, governable?  Architecture l Napster, Gnutella, Limeware,
Peer-to-Peer File Sharing Systems Group Meeting Speaker: Dr. Xiaowen Chu April 2, 2004 Centre for E-transformation Research Department of Computer Science.
Music Downloads By: Demetria Norman And Jacquelyn Menner.
DSRG Presentation Presenter: Bradley Momberger Date: April 29, 2004
Peer-to-Peer and Social Networks
مظفر بگ محمدی دانشگاه ایلام
Unit 8 Network Security.
#02 Peer to Peer Networking
Presentation transcript:

A Survey of P2P Filesharing Applications James Kirk CS February 3, 2004

P2P Applications Napster Napster KaZaA KaZaA Morpheus Morpheus eMule eMule W.A.S.T.E. W.A.S.T.E.

Napster Audio files (MP3) only Audio files (MP3) only Basic operation: Basic operation:  Connect to Napster server  Upload list of shared files to server  Submit search keywords to server  Select “best” matches by ping time

KaZaA Developed by Sharman Networks, incorporated in Vanatu Developed by Sharman Networks, incorporated in Vanatu Security/Trust: Security/Trust:  Integrated virus scan  IM Rejection  Family Filter  Disable personal folder browsing FastTrack Network: assigns “supernodes” FastTrack Network: assigns “supernodes” “Peer Points Manager” reward system “Peer Points Manager” reward system

Morpheus Uses Gnutella as a base Uses Gnutella as a base Also searches FastTrack & eDonkey Also searches FastTrack & eDonkey Asks for geographical location on install Asks for geographical location on install Can search for audio, video, images, applications, documents, ROMs, and all Can search for audio, video, images, applications, documents, ROMs, and all

eMule Open-Source project Open-Source project Uses local server list generated offline Uses local server list generated offline Self-elected servers index peer files (much like Napster) Self-elected servers index peer files (much like Napster) Servers identified by IP, but peers protected Servers identified by IP, but peers protected

W.A.S.T.E. Open-Source application developed by Nullsoft’s Justin Frankel Open-Source application developed by Nullsoft’s Justin Frankel Uses RSA MD5 Encryption between links Uses RSA MD5 Encryption between links Used to create private P2P network among friends Used to create private P2P network among friends

BitTorrent Purpose: To decrease server load on downloaded files Purpose: To decrease server load on downloaded files 3 types of hosts: 3 types of hosts:  HTTP servers  Trackers  Peers “Choking” mechanism “Choking” mechanism