V IDEO D ISCUSSION 1: C OPYRIGHT AND P2P A PPLICATIONS 23 Sep 2009 1DT052.

Slides:



Advertisements
Similar presentations
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Advertisements

Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April A note on the use.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
CompSci 356: Computer Network Architectures Lecture 21: Content Distribution Chapter 9.4 Xiaowei Yang
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
Skills: finding and downloading files with Bit Torrent Concepts: client-server, peer-to-peer, copyright, Creative Commons This work is licensed under a.
No Class on Friday There will be NO class on: FRIDAY 1/30/15.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
Spotlighting Decentralized P2P File Sharing Archie Kuo and Ethan Le Department of Computer Science San Jose State University.
The Internet Useful Definitions and Concepts About the Internet.
2: Application Layer P2P applications and Sockets.
Presented by Stephen Kozy. Presentation Outline Definition and explanation Comparison and Examples Advantages and Disadvantages Illegal and Legal uses.
Application architectures
SHAWN WILLIAMS The War on File Sharing Companies.
CSE 124 Networked Services Fall 2009 B. S. Manoj, Ph.D 11/03/2009CSE 124 Network Services FA 2009 Some of these.
Client-Server vs P2P or, HTTP vs Bittorrent. Client-Server Architecture SERVER client.
P2P File Sharing Systems
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 10 Omar Meqdadi Department of Computer Science and Software Engineering University.
2: Application Layer 1 1DT066 Distributed Information Systems Chapter 2 Application Layer.
1 One-Click Hosting Services: A File-Sharing Hideout Demetris Antoniades Evangelos P. Markatos ICS-FORTH Heraklion,
By Shobana Padmanabhan Sep 12, 2007 CSE 473 Class #4: P2P Section 2.6 of textbook (some pictures here are from the book)
BitTorrent Internet Technologies and Applications.

Application Layer – Peer-to-peer UIUC CS438: Communication Networks Summer 2014 Fred Douglas Slides: Fred, Kurose&Ross (sometimes edited)
2: Application Layer 1 1DT066 Distributed Information Systems Chapter 2 Application Layer.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
Content Distribution March 6, : Application Layer1.
Distributed Systems Concepts and Design Chapter 10: Peer-to-Peer Systems Bruce Hammer, Steve Wallis, Raymond Ho.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
Internet Basics A management-level overview of the Internet, its architecture, capabilities, and protocols. Copyright 2011 SPMI / Online Development.
P2P For More Showcase Presentation Jessie Gardiner John Lasa Travis Sheppard April 29, 2010.
P2P Web Standard IS3734/19/10 Michael Radzin. What is P2P? Peer to Peer Networking (P2P) is a “direct communications initiations session.” Modern uses.
D iocesan B oys’ S chool L 6 ASL C omputer A pplications R eading S cheme B it T orrent C han C hun H o L 6A (1)
Introduction of P2P systems
22-1 Last time □ SMTP ( ) □ DNS This time □ P2P □ Security.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Chapter 2: Application layer
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
P2P Networking and Content Distribution
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
LIS508 almost last lecture: Privacy and Ethics Thomas Krichel
File Sharing Networks: Sony, Napster, Grokster, Bit Torrent Richard Warner.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
The Start Shawn Fanning (19-yr-old student nicknamed Napster) developed the original Napster application and service in January 1999 while a freshman.
1 Peer-to-Peer Systems r Application-layer architectures r Case study: BitTorrent r P2P Search and Distributed Hash Table (DHT)
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications  app architectures  app requirements r 2.2 Web and HTTP r.
Peer-to-Peer Networks Hongli Luo CEIT, IPFW. r Topics m Application architecture m P2P file sharing m P2P networks: Napster Gnutella KaAzA Bittorrent.
CS 3830 Day 10 Introduction 1-1. Announcements r Quiz #2 this Friday r Program 2 posted yesterday 2: Application Layer 2.
B IT T ORRENT T ECHNOLOGY Anthony Pervetich. H ISTORY Bram Cohen Designed the BitTorrent protocol in April 2001 Released July 2, 2001 Concept Late 90’s.
2: Application Layer1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
2: Application Layer 1 Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April.
Computer Networks CSE 434 Fall 2009 Sandeep K. S. Gupta Arizona State University Research Experience.
6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Team Wikipedia Distributing digital stored information (computer programs, multi-media, etc). Regular methods : Removable media
Chapter 2 Application Layer Computer Networking: A Top Down Approach, 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007.
PEAR TO PEAR PROTOCOL. Pure P2P architecture no always-on server arbitrary end systems directly communicate peers are intermittently connected and change.
Distributed Web Systems Peer-to-Peer Systems Lecturer Department University.
05 - P2P applications and Sockets
An example of peer-to-peer application
File Sharing Matthew Prenzler.
REPORT PREPARED FOR:   BY SUMIT MAGGON JENNY CHONG
The BitTorrent Protocol
CMPE 252A : Computer Networks
File Sharing Networks: Sony, Napster, Grokster, Bit Torrent
PEER-TO-PEER SYSTEMS.
Pure P2P architecture no always-on server
Chapter 2 Application Layer
Presentation transcript:

V IDEO D ISCUSSION 1: C OPYRIGHT AND P2P A PPLICATIONS 23 Sep DT052

2: Application Layer 2 P URE P2P ARCHITECTURE no always-on server arbitrary end systems directly communicate peers are intermittently connected and change IP addresses Examples: File sharing Bit-Torrent (BT) e-mule peer-peer

2: Application Layer 3 P2P: CENTRALIZED INDEX original “Napster” design 1) when peer connects, it informs central server: IP address content 2) Alice queries for “Hey Jude” 3) Alice requests file from Bob centralized directory server peers Alice Bob

2: Application Layer 4 F ILE DISTRIBUTION : B IT T ORRENT tracker: tracks peers participating in torrent torrent: group of peers exchanging chunks of a file obtain list of peers trading chunks peer r P2P file distribution

2: Application Layer 5 B IT T ORRENT file divided into 256KB chunks. peers join torrent network and download peers upload chunks to other peers. peers may come and go

CASE: T HE P IRATE B AY T RIAL 21 Nov Established 31 May The website's servers in Stockholm were raided by Swedish police, causing it to go offline for three days 15 Nov The Pirate Bay announced that it had reached over 25 million unique peers. 17 Apr Peter Sunde, Fredrik Neij, Gottfrid Svartholm and Carl Lundström were found guilty of assistance to copyright infringement and sentenced to one year in prison and payment of a fine of SEK 30M 30 Jun Swedish advertising company Global Gaming Factory X AB announced their intention to buy the site for SEK 60M 15 Aug An anonymous uploader started to share a BitTorrent file containing the whole index for The Pirate Bay 24 Aug Swedish court ordered the upstream provider Black Internet to block traffic to the site. The website was inaccessible for 3 hours and it was claimed that all services were restored within 24 hours.

V IDEO Copyright and P2P: Global Collision, National Responses Source: x?fID=569&rID= x?fID=569&rID=11084

D ISCUSSION QUESTIONS Do you think that P2P applications infringe copyright? Will the following parties be liable? People who host and maintain the sites People who post the advertisements Users who upload the data Users who download the data ISP who provides the communication media For (1) the site / (2) users to download and upload How would you solve the copyright problem for P2P applications? Any other views and opinions on this topic…

S HORT A RTICLE Write a 1-2 pages summary to express your own views on copyright and P2P applications Submit your article to the course collection box by 30 Sep 2009 (Wednesday) or to it- in plain text in the without attachmentit-