p2p final.ppt

31
1 Peer-to-Peer Peer-to-Peer Communication Communication Research Project Research Project Presentation 2002 Presentation 2002 Sukmin Kim Sukmin Kim Srikara Hrushikesh Srikara Hrushikesh CIS 585 CIS 585

Upload: samanthafox

Post on 16-Dec-2014

1.152 views

Category:

Documents


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: P2P final.ppt

1

Peer-to-Peer CommunicationPeer-to-Peer CommunicationPeer-to-Peer CommunicationPeer-to-Peer CommunicationResearch Project Presentation Research Project Presentation 20022002

– Sukmin KimSukmin Kim– Srikara HrushikeshSrikara Hrushikesh

CIS 585CIS 585

Page 2: P2P final.ppt

2

Presentation ContentsPresentation ContentsPresentation ContentsPresentation Contents

IntroductionIntroduction

Current Web IssuesCurrent Web Issues

P2P Business ImplicationsP2P Business Implications

Concerns with P2PConcerns with P2P

P2P ArchitectureP2P Architecture

NapsterNapster

GnutellaGnutella

FreenetFreenet Future of P2PFuture of P2P

Page 3: P2P final.ppt

3

IntroductionIntroductionIntroductionIntroduction

Page 4: P2P final.ppt

4

Introduction to P2PIntroduction to P2PIntroduction to P2PIntroduction to P2P Direct communication between peersDirect communication between peers

– Not a Client/Server ArchitectureNot a Client/Server Architecture

History traces back to 1979History traces back to 1979– ModemModem

Popularity from NapsterPopularity from Napster Acceptance in Business CommunityAcceptance in Business Community

Page 5: P2P final.ppt

5

Current Web IssuesCurrent Web IssuesCurrent Web IssuesCurrent Web Issues

Page 6: P2P final.ppt

6

Current Web IssuesCurrent Web IssuesCurrent Web IssuesCurrent Web Issues Cavalier attitude towards usersCavalier attitude towards users

– Policy regarding usage of customer dataPolicy regarding usage of customer data

AccountabilityAccountability– Loss of e-mail lists and filesLoss of e-mail lists and files

HackersHackers– TCP/IP related issuesTCP/IP related issues

P2P attempts to solve, but will not P2P attempts to solve, but will not solve all the problemssolve all the problems

Page 7: P2P final.ppt

7

P2P Business ImplicationsP2P Business ImplicationsP2P Business ImplicationsP2P Business Implications

Page 8: P2P final.ppt

8

P2P Business SolutionsP2P Business SolutionsP2P Business SolutionsP2P Business Solutions When it comes to business P2P is like any fledging When it comes to business P2P is like any fledging

technology. It has shown lot of promise, but has technology. It has shown lot of promise, but has encountered lot of hurdlesencountered lot of hurdles

P2P Solutions includeP2P Solutions include– File SharingFile Sharing– Distributed computingDistributed computing– CollaborationCollaboration– MessagingMessaging– C2C e-commerceC2C e-commerce

Page 9: P2P final.ppt

9

Industry PlayersIndustry PlayersIndustry PlayersIndustry Players File SharingFile Sharing

– Gnutella Gnutella www.gnutelliums.comwww.gnutelliums.com– Nextpage Nextpage www.nextpage.comwww.nextpage.com

CollaborationCollaboration– Groove NetworksGroove Networks www.groove.netwww.groove.net– OmnipriseOmniprise www.ikimbo.comwww.ikimbo.com

Distributed ComputingDistributed Computing– SETI@homeSETI@home www.distributed.netwww.distributed.net

C2C e-commerceC2C e-commerce– LightshareLightshare www.lightshare.comwww.lightshare.com

Direct e-mailDirect e-mail– WorldStreetWorldStreet www.worldstreet.comwww.worldstreet.com

Page 10: P2P final.ppt

10

Specific Business ApplicationsSpecific Business ApplicationsSpecific Business ApplicationsSpecific Business Applications Health CareHealth Care

– Santa Barbara County Health care DepartmentSanta Barbara County Health care Department

Law FirmsLaw Firms– Chicago based law firm Baker & McKenzieChicago based law firm Baker & McKenzie

Pharmaceutical IndustryPharmaceutical Industry– GlaxoSmithKline research centerGlaxoSmithKline research center

Chip ManufacturingChip Manufacturing– Intel’s NetBatchIntel’s NetBatch

Investment BankingInvestment Banking– Bear, StearnsBear, Stearns

Source: PC Magazine, “Peer Pressure” by Sarah L. Roberts, 06/26/01PC Magazine, “Peer Pressure” by Sarah L. Roberts, 06/26/01

PC Magazine, “Peer-to-Peer” by Cade Metz, 06/01/01PC Magazine, “Peer-to-Peer” by Cade Metz, 06/01/01

Page 11: P2P final.ppt

11

P2P Business ModelP2P Business ModelP2P Business ModelP2P Business Model

Page 12: P2P final.ppt

12

P2P Practical Model of EnterpriseP2P Practical Model of EnterpriseP2P Practical Model of EnterpriseP2P Practical Model of Enterprise

Page 13: P2P final.ppt

13

Concerns with P2PConcerns with P2PConcerns with P2PConcerns with P2P

Page 14: P2P final.ppt

14

Concerns with P2PConcerns with P2PConcerns with P2PConcerns with P2P Need for more BandwidthNeed for more Bandwidth Always on Servers result in higher net Always on Servers result in higher net

connectivity.connectivity. The current asymmetry of more download The current asymmetry of more download

and less upload will changeand less upload will change Serious security issuesSerious security issues Free-Riding effect Free-Riding effect Copyright and Royalty violationsCopyright and Royalty violations

Page 15: P2P final.ppt

15

P2P ArchitectureP2P ArchitectureP2P ArchitectureP2P Architecture

Page 16: P2P final.ppt

16

NapsterNapsterNapsterNapster Online Music Sharing BusinessOnline Music Sharing Business The software was written by 19 year old guy The software was written by 19 year old guy

named Shawn Fanningnamed Shawn Fanning Company recently filed for bankruptcy Company recently filed for bankruptcy Not a complete P2P Not a complete P2P Napster uses servers to hold indexes that Napster uses servers to hold indexes that

store file locationsstore file locations The addresses of the Napster nodes bypass The addresses of the Napster nodes bypass

the DNS systemthe DNS system After resolving the IP address, the file transfer After resolving the IP address, the file transfer

control shifts to nodescontrol shifts to nodes

Page 17: P2P final.ppt

17

Napster ModelNapster ModelNapster ModelNapster Model

Page 18: P2P final.ppt

18

GnutellaGnutellaGnutellaGnutella Currently the most popular decentralized Currently the most popular decentralized

P2P file sharing programP2P file sharing program Decentralized, No dependency on central Decentralized, No dependency on central

server server No website connectionNo website connection Utilizes daisy-chain effect for communicationUtilizes daisy-chain effect for communication Allows sharing of all kinds of digital filesAllows sharing of all kinds of digital files Able to reach every computer on the internetAble to reach every computer on the internet Survival capability is highSurvival capability is high

– can not be brought down can not be brought down

Page 19: P2P final.ppt

19

Origin of Origin of GnutellaGnutellaOrigin of Origin of GnutellaGnutella

Gnutella = GNU project of the Free Software Foundation + Nutella (the hazelnut/chocolate spread)

Originally designed by Nullsoft, a subsidiary of AOL

AOL halted Nullsoft's development of the Gnutella

Gnutella was downloaded during few hours

Programmers reverse-engineered and created their own Gnutella software

Page 20: P2P final.ppt

20

Napster ModelNapster Model Gnutella ModelGnutella Model

Comparison Comparison Between Gnutella & NapsterBetween Gnutella & Napster

Comparison Comparison Between Gnutella & NapsterBetween Gnutella & Napster

Page 21: P2P final.ppt

21

Gnutella ProcessGnutella ProcessGnutella ProcessGnutella Process

1.1. Search RequestSearch RequestUser User AA sends out a 1st layer sends out a 1st layer request to computers request to computers BB, , C, C, && D D..

2.2. Search RelaySearch RelayUsers Users B, C, B, C, & & DD send the request send the request on to the next layer of connected on to the next layer of connected computers.computers.

3.3. Search ResponseSearch ResponseThe file is located and a The file is located and a response is sent to computer response is sent to computer AA via the same pathway.via the same pathway.

4.4. DownloadDownloadThe file is then downloaded by The file is then downloaded by AA through a direct through a direct httphttp connection. connection.

Page 22: P2P final.ppt

22

Gnutella TermsGnutella TermsGnutella TermsGnutella Terms

Servent A combination of a server and a client. In the decentralized gnutella model, each computer on the network is both a client and a server.

Time to Live Abbreviated "TTL," the Time to Live is the number of hops that a message will make on the Gnutella Network before being discarded. Each servent that views a message will decrement its TTL by 1, and will discard that message when the TTL reaches 0. This prevents messages from being sent back and forth across the Gnutella Network indefinitely. Most gnutella clones set TTL at around 7, although some allow the user to configure it.

Page 23: P2P final.ppt

23

Gnutella Terms (Continued)Gnutella Terms (Continued)Gnutella Terms (Continued)Gnutella Terms (Continued)

PingWhen a new user joins the Gnutella Network, he broadcasts a message called a "ping request" to the network, announcing his presence on the network. Nodes which receive this ping, send a “Pong” back to the pinging user to acknowledge that they have received this message.

Pong When a node on the Gnutella Network receives a ping request, it replies with a pong (a.k.a ping response). This pong contains the responding host's IP address and port, as well as number of files the responding host is sharing and their total size.

HorizonHorizon is the group of gnutella servents that the node is capable of communicating with at a particular time.

Page 24: P2P final.ppt

24

FreeNetFreeNetFreeNetFreeNet

Freenet is an open, democratic system which cannot be controlled by any one person, not even its creators.

Freenet is a large-scale peer-to-peer network which pools the power of member computers around the world to create a massive virtual information store open to anyone to freely publish or view information of all kinds.

Page 25: P2P final.ppt

25

FreeNet isFreeNet isFreeNet isFreeNet is

Highly survivable All internal processes are completely anonymized and decentralized across the global network, making it virtually impossible for an attacker to destroy information or take control of the system.

PrivateFreenet makes it extremely difficult for anyone to spy on the information that you are viewing, publishing, or storing.

SecureInformation stored in Freenet is protected by strong cryptography against malicious tampering or counterfeiting.

EfficientFreenet dynamically replicates and relocates information to provide efficient service and minimal bandwidth usage regardless of load.

Page 26: P2P final.ppt

26

FreeNet HistoryFreeNet History

Freenet is an enhanced Open Source implementation of the system described by Ian Clarke's 1999 paper "A distributed decentralized information storage and retrieval system“.

Work started on Freenet shortly after the publication of this paper in July 1999 by Clarke and a small number of volunteers.

By March 2000 version 0.1 of Freenet was released.

Since March 2000 Freenet has been extensively reported in the press, primarily due to its implications for copyright rather than for its wider aim, namely freedom of communication.

Page 27: P2P final.ppt

27

Freenet StructureFreenet StructureFreenet StructureFreenet Structure

Page 28: P2P final.ppt

28

Napster – Hybrid P2P

Gnutella – Pure P2P

FreeNet – Purest P2P

Review of P2P ArchitectureReview of P2P ArchitectureReview of P2P ArchitectureReview of P2P Architecture

Page 29: P2P final.ppt

29

Future of P2PFuture of P2PFuture of P2PFuture of P2P

Page 30: P2P final.ppt

30

Future of P2PFuture of P2PFuture of P2PFuture of P2P

IT Prospect From Gartner

Page 31: P2P final.ppt

31

Future of P2PFuture of P2PFuture of P2PFuture of P2P

Next Generation of IT ArchitectureMainframe Client/Server P2P

P2P Protocol Standard is required

Killer Application of P2P is required

Profit Model based on User’s Communities