CS155b: E-Commerce Lecture 11: February 15, 2001 Alternative Content-Distribution Methods.

Slides:



Advertisements
Similar presentations
CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 14: October 28, 2003 Peer-to-Peer File Sharing.
Advertisements

DMCA: An Introduction Digital Millennium Copyright Act.
Why the DMCA has the right to outlaw numbers
Robin Hood and the 40 Million Thieves David Evans
The Anti-Piracy Campaign: The Drag Behind Their Efforts Jamal Haskin.
5/21/2015 (1) Complying with P2P Mandates in the HEOA of 2008 EDUCAUSE Live! 23 November 2009
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
Gnutella 2 GNUTELLA A Summary Of The Protocol and it’s Purpose By
Peer-to-Peer Networks João Guerreiro Truong Cong Thanh Department of Information Technology Uppsala University.
CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 12: October 21, 2003 Copyright Law, continued: the DMCA.
Copyrights1 By Saud Al-Harbi & AbdulAziz Al-Shamrani.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
Property in Cyberspace 1.What is “Intellectual Property”?Intellectual Property Intellectual Property Is: Intangible creative work—not necessarily the physical.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
CS155b: E-Commerce Lecture 7: Feb. 4, 2003 Copyright Law, DMCA, and Online Content Distribution Acknowledgement: V. Ramachandran.
Filesharing and the birth of the digital music industry Liisa Benmergui DAP02S October 28, 2004.
CS155b: E-Commerce Lecture 8: Feb. 6, 2003 Peer-to-Peer File Sharing and Internet Music.
CS155a: E-Commerce Lecture 8: October 2, 2001 Business Models for Online Content Distribution.
Copyright Law Boston College Law School March 13, 2003 Rights - Digital Rights.
MPAA vs Copyright Law & You. Roadmap Introduction What is at stake? How will this effect you? Conclusions – The Bigger Picture.
CS155a: E-Commerce Lecture 7: Sept. 27, 2001 Copyright Law, DMCA, and Online Content Distribution Acknowledgement: V. Ramachandran.
1 Issues in Digital Audio. 2 Intellectual Property  Non-tangible property that is the result of creativity:  Patents – products, processes etc.  Copyright.
Peer-to-Peer (or P2P) From user to user. Peer-to-peer implies that either side can initiate a session and has equal responsibility. Corey Chan Andrew Merfeld.
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
CPSC156: The Internet Co-Evolution of Technology and Society Lecture 7: February 6, 2007 More about browsers (ack.: L. Cranor); Introduction to Digital.
CptS 401 Adam Carter. Quiz Question 1 According to the book, it is important to legally protect intellectual property for the following reason(s): A.
Digital Copyright ECON 425/563 // CPSC 455/555 February 8, 2008.
C opyright Protection and Digital Rights Management 1.
Elizabeth C. Rodriguez.  A copyright is a form of protection provided by the laws of the United States to authors of “original works of authorship.”
Andrew, Lachlan and Han ONLINE PIRACY.  Copyright infringement, or ‘piracy’, is the unauthorized use of works under copyright, infringing the copyright.
Intellectual property rights concern the legal ownership and use of intellectual property such as software, music, movies, data, and information. Intellectual.
P2P File Sharing Systems
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presentation by Theodore Mao CS294-4: Peer-to-peer Systems August 27, 2003.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
CPSC 156: The Internet: Co- Evolution of Technology and Society Lecture 9: February 13, 2007 Online Music Distribution and the DMCA.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.

Forensics Investigation of Peer-to- Peer File Sharing Networks Authors: Marc Liberatore, Robert Erdely, Thomas Kerle, Brian Neil Levine & Clay Shields.
CS110: Computers and the Internet Intellectual Property.
Controlling Access to Copyrighted Works Digital Millennium Copyright Act.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 38 How Music Sharing and File Sharing Work.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
1 Peer-to-Peer Communication Research Project Presentation 2002 – Sukmin Kim – Srikara Hrushikesh CIS 585.
GNUTELLA PEER-TO-PEER NETWORKING. GNUTELLA n What is Gnutella n Relation to the World Wide Web n How it Works n Sites / Links / Information.
Group 2 Derrick Lowe Quintin King Caroline Hawes Aaron Phillips.
CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 11: October 16, 2003 Introduction to Digital Copyright and Online Content Distribution.
LIS508 almost last lecture: Privacy and Ethics Thomas Krichel
The Start Shawn Fanning (19-yr-old student nicknamed Napster) developed the original Napster application and service in January 1999 while a freshman.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Digital Audio. Analog versus Digital Analog Sound waves “similar” or “copy” Electrical impedance creates noise Digital Sound encoded in binary form Sampled.
Peer-to-Peer and Collective Intelligence A platform for collaboration Andrew Roczniak Collective Intelligence Lab Multimedia Communications Research Lab.
The DMCA, DeCSS, Copyrights and the First Amendment.
Peer-to-peer systems (part I) Slides by Indranil Gupta (modified by N. Vaidya)
Digital Rights Management / DMCA Anti-Circumvention Edward W. Felten Dept. of Computer Science Princeton University.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
Cyber Law Title: COPYRIGHT INFRINGEMENT OF ELECTRONIC COPYING Group Members Amirul Bin Jamil Engku Nadzry Bin Engku Rahmat Mohd Danial Shah Bin Shahzali.
Fundamentals of business law, 10e
A Gift of Fire Third edition Sara Baase
EE 122: Peer-to-Peer (P2P) Networks
Presentation by Theodore Mao CS294-4: Peer-to-peer Systems
Property in Cyberspace
Presentation transcript:

CS155b: E-Commerce Lecture 11: February 15, 2001 Alternative Content-Distribution Methods

Digital Video Disks (DVDs) Developed by movie studios and consumer electronics companies in Compatible with CDs. Same size and thickness as CDs. Up to 25 times the storage capacity as CDs. TPS for DVDs includes –CSS encryption (“content scrambling system”) –R/W’able copy-control marks (e.g., “copy freely,” “one copy,” “no copies”) –Macrovision analog copy protection –Other ingredients

Studios’ Overall IP-Management Strategy Use TPS to “keep honest people honest.” Assume (temporarily) that lack of bandwidth will prevent large-scale Internet distribution of movies. Use courts aggressively to punish (alleged) violators of existing copyright laws and lobby heavily for new laws that favor rights holders.

Digital Millennium Copyright Act (1998) Illegal, except under narrowly defined special circumstances, to circumvent effective technological protection measures Illegal to distribute circumvention tools Gives content owners a property right in TPS as well as the content that the TPS protects. In SAT terms, circumvention is to infringement as breaking and entering is to burglary.

Examples of Allowed Circumventions Nonprofits may circumvention to “shop.” Law enforcement and intelligence agencies. Reverse engineering to achieve interoperability. “Encryption research.” The “researcher” has to “make a good faith effort to obtain authorization.” Protection of “personally identifying information.”

Techies’ Objection to DMCA What is an “effective technological protection measure”? If a skilled hacker can break it, is it “effective”? If an average computer-literate person can break it, but few do, is it “effective”? Weakens incentives for content owners to pay for good IP-management technology. Shifts costs from content owners to society at large, by shifting responsibility from TPSs to courts and police. Exceptions for R&D are vague.

Coming Attraction for February 20 Ernest Miller of the Yale Law School will discuss at least one of the suits now working their ways through the courts in which the MPAA is suing people for DMCA violations. One “technological protection measure” that was circumvented was the CSS encryption scheme in the DVD system. Constitutionality of the DMCA “circumvention- tool distribution” ban is being challenged.

Gnutella P2P File Sharing “Pure Peer-to-Peer.” Peers are called “servents.” Servents communicate over standard HTTP. Goal is “total decentralization.” In particular, no Napster-like server that “directs traffic,” collects data, and otherwise centralizes control.

“A” Generates a Gnutella Request Creates –Search String S –(Unique) Request ID N –Time-to-Live T Sends (A, S, N, T) to all of its Gnutella neighbors.

“B” Receives Gnutella Request (A, S, N, T) If B has already received request N or T=0, B drops this request and does nothing. B looks up S in its local file system and sends (N, Result) to A. B sends (B, S, N, T-1) to all of its Gnutella neighbors, and it records the fact that A has made the request N. When B receives a response of the form (N, Result) from one of its neighbors, it forwards this response to A.

Gnutella Advantages and Disadvantages Main Advantage : “Search for S” can be done in many ways, e.g., structured database search, simple text matching, “fuzzy” text matching, etc. “Result” can take many forms. Main Disadvantage : Inefficiency! –“Flood” of Requests. If average number of neighbors is C and average TTL is D, each search can cause C D request messages. –Natural evolution into many barely-connected subnets, not one “user community.” Other Disadvantage : Request monitoring. (Comes with standard HTTP.)

......

Gnutella History Gnutella was written by Justin Frankel, the 21- year-old founder of Nullsoft. Nullsoft posted Gnutella on the Web, March Nullsoft acquired by AOL, June A day later AOL yanked Gnutella, at the bequest of Time Warner. People had already downloaded and shared the program. Gnutella continues today, run by independent programmers.

Freenet P2P File Sharing Works similarly to Gnutella. Exceptions include: –Intermediaries store all results. (Diffuses responsibility.) –Uses proprietary protocol. (Eliminates HTTP monitorability.) Launched by Ian Clarke (Univ.of Edinburgh) in Explicitly anti-censorship, anti-copyright, and pro-anonymity in its goals.