P2P Web Standard IS3734/19/10 Michael Radzin. What is P2P? Peer to Peer Networking (P2P) is a “direct communications initiations session.” Modern uses.

Slides:



Advertisements
Similar presentations
The Start of Digital Anarchy Shawn Fanning (19-yr-old student nicknamed Napster) developed the original Napster application and service in January 1999.
Advertisements

THE AFTERMATH OF P2P NETWORK DOWNLOADS IN THE MUSIC INDUSTRY AND RIAA {THE NEW DIRECTION OF THE INDUSTRY}
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
BitTorrent Join the swarm! BY: Joe Petruska. What is BitTorrent? a peer-to-peer file sharing protocol used for distributing large amounts of data.
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
Protocols By Rakesh Chukkapalli CS 484.  Peer-to-Peer = P2P  The term peer-to-peer was coined as far as back in the mid-1980s by LAN vendors to describe.
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Spotlighting Decentralized P2P File Sharing Archie Kuo and Ethan Le Department of Computer Science San Jose State University.
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
Peer to Peer Programming Systems, Protocols, and Economic Models.
P2P Network is good or bad? Sang-Hyun Park. P2P Network is good or bad? - Definition of P2P - History of P2P - Economic Impact - Benefits of P2P - Legal.
Peer-to-Peer (or P2P) From user to user. Peer-to-peer implies that either side can initiate a session and has equal responsibility. Corey Chan Andrew Merfeld.
Company LOGO Peer-to-Peer Inside and out What is a P2P network?  All machines are connected as equal  Each user is a Peer  Peers can act as both a.
P2P WeeSan Lee
CS 640: Introduction to Computer Networks Yu-Chi Lai Lecture 18 - Peer-to-Peer.
Peer-to-Peer network systems Distributed Data Processing Paulina Pasek.
Peer-to-Peer Networks & Music File Sharing Tim Caserza COEN 150 Holliday
Intellectual Property Rights Online File Sharing Brett Colbert Wendi Jardin Victor Cortez Brett Colbert Wendi Jardin Victor Cortez.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
Client-Server vs P2P or, HTTP vs Bittorrent. Client-Server Architecture SERVER client.
The Bittorrent Protocol
KaZaA: Behind the Scenes Shreeram Sahasrabudhe Lehigh University
P2P File Sharing Systems
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.
Peer to Peer Network Anas Hardan. What is a Network? What is a Network? A network is a group of computers and other devices (such as printers) that are.
BitTorrent Internet Technologies and Applications.

BitTorrent How it applies to networking. What is BitTorrent P2P file sharing protocol Allows users to distribute large amounts of data without placing.
Forensics Investigation of Peer-to- Peer File Sharing Networks Authors: Marc Liberatore, Robert Erdely, Thomas Kerle, Brian Neil Levine & Clay Shields.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
1 BitTorrent System Efrat Oune Bar-Ilan What is BitTorrent? BitTorrent is a peer-to-peer file distribution system (built for intensive daily use.
徐晨桓 李柏穎.  Definition  Introduction  History  Example - Napster  Example - Gnutella 徐晨桓 李柏穎 2/27.
P2P For More Showcase Presentation Jessie Gardiner John Lasa Travis Sheppard April 29, 2010.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 38 How Music Sharing and File Sharing Work.
Peer-to-Peer Networks University of Jordan. Server/Client Model What?
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Chapter 2: Application layer
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
Bit Torrent A good or a bad?. Common methods of transferring files in the internet: Client-Server Model Peer-to-Peer Network.
P2P: Grid-Oriented Distribution Systems KCCMG Fall Impact 2005 Lorin Olsen, Sprint Nextel.
Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.
The Start Shawn Fanning (19-yr-old student nicknamed Napster) developed the original Napster application and service in January 1999 while a freshman.
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications  app architectures  app requirements r 2.2 Web and HTTP r.
Part 3: Internet Applications The Basics of Networking, Part 3 chapter 3.
Peer-to-Peer File Sharing Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
FastTrack Network & Applications (KaZaA & Morpheus)
PEER TO PEER (P2P) NETWORK By: Linda Rockson 11/28/06.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 24 - Peer-to-Peer.
Concepts of Video and File/Sharing System Reporters: Ma. Raizza M. Cantara Mary Jane Eule Richard Ravalo Maika Laguartilla.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes.
Peer-to-Peer File Sharing
NETE4631 Network Information Systems (NISs): Peer-to-Peer (P2P) Suronapee, PhD 1.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Unit 2 - Hardware Networking. What is a network? A computer network is essentially a connection between two or more computers. This connection can be.
Peer-to-Peer (P2P) Networks By Bongju Yu. Contents  What is P2P?  Features of P2P systems  P2P Architecture  P2P Protocols  P2P Projects  Reference.
Team Wikipedia Distributing digital stored information (computer programs, multi-media, etc). Regular methods : Removable media
Bit Torrent Nirav A. Vasa. Topics What is BitTorrent? Related Terms How BitTorrent works Steps involved in the working Advantages and Disadvantages.
Peer to Peer Networking. Network Models => Mainframe Ex: Terminal User needs direct connection to mainframe Secure Account driven  administrator controlled.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
FILE SHARING TECHNOLOGIES By R. Li Casanova COSC
Music Downloads By: Demetria Norman And Jacquelyn Menner.
November 19, 2016 Guide:- Mrs. Kale J. S. Presented By:- Hamand Amol Sambhaji. Hamand Amol Sambhaji. Pardeshi Dhananjay Rajendra. Pardeshi Dhananjay Rajendra.
An example of peer-to-peer application
مظفر بگ محمدی دانشگاه ایلام
Client/Server and Peer to Peer
Presentation transcript:

P2P Web Standard IS3734/19/10 Michael Radzin

What is P2P? Peer to Peer Networking (P2P) is a “direct communications initiations session.” Modern uses have seen it employed for the purpose of exchanging files over the Internet. It is a fairly broad term when used modernly. Peer to Peer Networking (P2P) is a “direct communications initiations session.” Modern uses have seen it employed for the purpose of exchanging files over the Internet. It is a fairly broad term when used modernly. P2P connections are done without a central hub. Essentially, a host server and a leech will connect, with many different variables coming into place. P2P connections are done without a central hub. Essentially, a host server and a leech will connect, with many different variables coming into place. Many modern ways of creating P2P connections are done with free downloadable programs. Many modern ways of creating P2P connections are done with free downloadable programs. With some uses of it, P2P has created a lot of legal issues with copyright infringement. With some uses of it, P2P has created a lot of legal issues with copyright infringement.

How does P2P work? At the core, any P2P system involves some type of direct communication between users and nodes. It’s use ranges from instant messaging clients to Skype to Bittorrent. At the core, any P2P system involves some type of direct communication between users and nodes. It’s use ranges from instant messaging clients to Skype to Bittorrent. Many different P2P connections work in different ways. Second generation P2P software like iMesh and KaZaA used the FastTrack protocol to create peer connections. The Fasttrack protocol uses supernodes to improve scalability and a UUHash hashing algorithm. Many different P2P connections work in different ways. Second generation P2P software like iMesh and KaZaA used the FastTrack protocol to create peer connections. The Fasttrack protocol uses supernodes to improve scalability and a UUHash hashing algorithm.

How does P2P work? UUHash is a hash algorithm that is employed on the FastTrack network. It can hash large files in very short time periods. It is vulnerable to hash collisions since it only hashes fractions of a file at a time. UUHash is a hash algorithm that is employed on the FastTrack network. It can hash large files in very short time periods. It is vulnerable to hash collisions since it only hashes fractions of a file at a time. UUHash uses MD5 to hash the first 300kb of a file, applies a smallhash function to the next n 300kb blocks, then hashes the last 300kb of the file. If there is an overlap, then the smallhash function will dominate. UUHash uses MD5 to hash the first 300kb of a file, applies a smallhash function to the next n 300kb blocks, then hashes the last 300kb of the file. If there is an overlap, then the smallhash function will dominate.

How does P2P work? A Supernode is just like a regular node on a network, but it also serves as a network relayer and a proxy server, which is usually very bandwidth consuming. Not all programs allow the user to control whether they are a supernode. A Supernode is just like a regular node on a network, but it also serves as a network relayer and a proxy server, which is usually very bandwidth consuming. Not all programs allow the user to control whether they are a supernode. Skype is a popular and modern program that uses supernodes. It uses them to maintain information about online users. Before version 3.0, users were a supernode by default and could do nothing to change this. Skype is a popular and modern program that uses supernodes. It uses them to maintain information about online users. Before version 3.0, users were a supernode by default and could do nothing to change this.

How does P2P work? BitTorrent creates.torrent files used to store information about a specific file, but does not contain any part of that file. Opening a.torrent file connect to a tracker which tells of it’s location. Small chunks of files are transferred from multiple sources, and this is less bandwidth consuming than previous P2P software. BitTorrent creates.torrent files used to store information about a specific file, but does not contain any part of that file. Opening a.torrent file connect to a tracker which tells of it’s location. Small chunks of files are transferred from multiple sources, and this is less bandwidth consuming than previous P2P software. BitTorrent uses a file-sharing BitTorrent uses a file-sharing ideal called tit-for-tat. ideal called tit-for-tat.

A brief history of P2P Late 1960’s Advanced Research Projects Agency Network (ARPAnet): original internet intention and first packet-switching network. Origins of FTP, Telnet, and e- mail. Originally created connections of equal-peers, rather than client/server connections. Advanced Research Projects Agency Network (ARPAnet): original internet intention and first packet-switching network. Origins of FTP, Telnet, and e- mail. Originally created connections of equal-peers, rather than client/server connections. FTP + Telnet: Were early client/server connections, but technically considered peer-to-peer since every host on the Internet could FTP or Telnet to any other host. FTP + Telnet: Were early client/server connections, but technically considered peer-to-peer since every host on the Internet could FTP or Telnet to any other host.

A brief history of P2P 1979 Usenet (based on UUCP) Usenet (based on UUCP) Developed by two Duke University students and one UNC student to exchange information over the Unix community. Implemented the Unix-to- Unix copy protocol, where one Unix machine would automatically dial another, exchange files with it, and disconnect. No central authority in control. Usenet grew from the original two sites to hundreds of thousands of sites. A Usenet site joins the rest of the world by setting up a news exchange connection with at least one other news server on the Usenet network.

A brief history of P2P 1999-Napster Created in 1999 by teenager Shawn Fanning while he was Attending Northeastern University, lived through Central server kept an index of all the shared MP3 Files and connected users together. The server Would search this index based on user queries and Be able to establish a connection.

A brief history of P2P 2001-> 2001-> iMesh, KaZaA, LimeWire, etc. -After Napster’s downfall, a huge number of P2P programs became popular. KaZaA used similar technology to Napster, but it instead had a decentralized system. It used FastTrack, supernodes, and a Time to Live of 7. -Programs like BearShare, WinMX, and Limewire were Gnutella clients. These all worked very similar to KaZaA, including the Time To Live limit. The lack of a centralized server has helped keep these clients alive from court orders for the most part.

A brief history of P2P > Bittorrent protocol (accounts for 43% of all internet traffic) Seeds, Leechers, and swarms. Varying download speeds. Need a.torrent file, and a BitTorrent client of some sort. Set the foundation for a whole lot of controversy. Many popular sites and infamous sites for torrents exist, such as isohunt, thepiratebay, and mininova. Set the foundation for a whole lot of controversy. Many popular sites and infamous sites for torrents exist, such as isohunt, thepiratebay, and mininova.

P2P and Legality Napster/P2P programs: Napster/P2P programs: Napster was sued by the RIAA in 2000 for copyright infringement. After a guilty ruling and several appeals, Napster was ordered to pay $26 million to recording artists. Napster filed for bankruptcy, and it’s life as a free program ended. Following the Napster ruling, programs like Grokster, KaZaA, and Morpheus also faced legal trouble. Many of these have turned into pay programs, with variations turning into open-source programs. The RIAA also went after many individuals. In December of 2009, Joel Tenenbaum, a 25-year- old college student, was sued by the RIAA and ordered to pay $675,000 for illegal file sharing.

P2P and Legality BitTorrent/BitTorrent sites: BitTorrent/BitTorrent sites: While torrent metafiles do not contain data themselves, publishers have been held accountable of copyright infringement in many cases. Many sites have been closed down from this, such as Suprnova, Mininova, and OiNK.cd. Many torrent users have been sent cease and desist letters from their ISP. BitTorrent makes no attempt to encrypt the host responsible for file sharing. A person who wishes to make a file available must run a tracker on a specific host and distribute the tracker address in the.torrent file.

References Uuhash Uuhash Supernode Supernode Fasttrack Fasttrack How p2p works How p2p works History of p2p History of p2p History of p2p History of p2p skype p2p skype p2p p2p by ehow p2p by ehow ezp2p by wisegeek ezp2p by wisegeek top p2p programs top p2p programs definition of p2p definition of p2p peer 2 peer peer 2 peer Md5 Md5 history of p2p history of p2p future of p2p future of p2p kazaa fastrack kazaa fastrack Joel Tenenbaum vs RIAA Joel Tenenbaum vs RIAA

Questions?