1
Peer-to-Peer CommunicationPeer-to-Peer CommunicationPeer-to-Peer CommunicationPeer-to-Peer CommunicationResearch Project Presentation Research Project Presentation 20022002
– Sukmin KimSukmin Kim– Srikara HrushikeshSrikara Hrushikesh
CIS 585CIS 585
2
Presentation ContentsPresentation ContentsPresentation ContentsPresentation Contents
IntroductionIntroduction
Current Web IssuesCurrent Web Issues
P2P Business ImplicationsP2P Business Implications
Concerns with P2PConcerns with P2P
P2P ArchitectureP2P Architecture
NapsterNapster
GnutellaGnutella
FreenetFreenet Future of P2PFuture of P2P
3
IntroductionIntroductionIntroductionIntroduction
4
Introduction to P2PIntroduction to P2PIntroduction to P2PIntroduction to P2P Direct communication between peersDirect communication between peers
– Not a Client/Server ArchitectureNot a Client/Server Architecture
History traces back to 1979History traces back to 1979– ModemModem
Popularity from NapsterPopularity from Napster Acceptance in Business CommunityAcceptance in Business Community
5
Current Web IssuesCurrent Web IssuesCurrent Web IssuesCurrent Web Issues
6
Current Web IssuesCurrent Web IssuesCurrent Web IssuesCurrent Web Issues Cavalier attitude towards usersCavalier attitude towards users
– Policy regarding usage of customer dataPolicy regarding usage of customer data
AccountabilityAccountability– Loss of e-mail lists and filesLoss of e-mail lists and files
HackersHackers– TCP/IP related issuesTCP/IP related issues
P2P attempts to solve, but will not P2P attempts to solve, but will not solve all the problemssolve all the problems
7
P2P Business ImplicationsP2P Business ImplicationsP2P Business ImplicationsP2P Business Implications
8
P2P Business SolutionsP2P Business SolutionsP2P Business SolutionsP2P Business Solutions When it comes to business P2P is like any fledging When it comes to business P2P is like any fledging
technology. It has shown lot of promise, but has technology. It has shown lot of promise, but has encountered lot of hurdlesencountered lot of hurdles
P2P Solutions includeP2P Solutions include– File SharingFile Sharing– Distributed computingDistributed computing– CollaborationCollaboration– MessagingMessaging– C2C e-commerceC2C e-commerce
9
Industry PlayersIndustry PlayersIndustry PlayersIndustry Players File SharingFile Sharing
– Gnutella Gnutella www.gnutelliums.comwww.gnutelliums.com– Nextpage Nextpage www.nextpage.comwww.nextpage.com
CollaborationCollaboration– Groove NetworksGroove Networks www.groove.netwww.groove.net– OmnipriseOmniprise www.ikimbo.comwww.ikimbo.com
Distributed ComputingDistributed Computing– SETI@homeSETI@home www.distributed.netwww.distributed.net
C2C e-commerceC2C e-commerce– LightshareLightshare www.lightshare.comwww.lightshare.com
Direct e-mailDirect e-mail– WorldStreetWorldStreet www.worldstreet.comwww.worldstreet.com
10
Specific Business ApplicationsSpecific Business ApplicationsSpecific Business ApplicationsSpecific Business Applications Health CareHealth Care
– Santa Barbara County Health care DepartmentSanta Barbara County Health care Department
Law FirmsLaw Firms– Chicago based law firm Baker & McKenzieChicago based law firm Baker & McKenzie
Pharmaceutical IndustryPharmaceutical Industry– GlaxoSmithKline research centerGlaxoSmithKline research center
Chip ManufacturingChip Manufacturing– Intel’s NetBatchIntel’s NetBatch
Investment BankingInvestment Banking– Bear, StearnsBear, Stearns
Source: PC Magazine, “Peer Pressure” by Sarah L. Roberts, 06/26/01PC Magazine, “Peer Pressure” by Sarah L. Roberts, 06/26/01
PC Magazine, “Peer-to-Peer” by Cade Metz, 06/01/01PC Magazine, “Peer-to-Peer” by Cade Metz, 06/01/01
11
P2P Business ModelP2P Business ModelP2P Business ModelP2P Business Model
12
P2P Practical Model of EnterpriseP2P Practical Model of EnterpriseP2P Practical Model of EnterpriseP2P Practical Model of Enterprise
13
Concerns with P2PConcerns with P2PConcerns with P2PConcerns with P2P
14
Concerns with P2PConcerns with P2PConcerns with P2PConcerns with P2P Need for more BandwidthNeed for more Bandwidth Always on Servers result in higher net Always on Servers result in higher net
connectivity.connectivity. The current asymmetry of more download The current asymmetry of more download
and less upload will changeand less upload will change Serious security issuesSerious security issues Free-Riding effect Free-Riding effect Copyright and Royalty violationsCopyright and Royalty violations
15
P2P ArchitectureP2P ArchitectureP2P ArchitectureP2P Architecture
16
NapsterNapsterNapsterNapster Online Music Sharing BusinessOnline Music Sharing Business The software was written by 19 year old guy The software was written by 19 year old guy
named Shawn Fanningnamed Shawn Fanning Company recently filed for bankruptcy Company recently filed for bankruptcy Not a complete P2P Not a complete P2P Napster uses servers to hold indexes that Napster uses servers to hold indexes that
store file locationsstore file locations The addresses of the Napster nodes bypass The addresses of the Napster nodes bypass
the DNS systemthe DNS system After resolving the IP address, the file transfer After resolving the IP address, the file transfer
control shifts to nodescontrol shifts to nodes
17
Napster ModelNapster ModelNapster ModelNapster Model
18
GnutellaGnutellaGnutellaGnutella Currently the most popular decentralized Currently the most popular decentralized
P2P file sharing programP2P file sharing program Decentralized, No dependency on central Decentralized, No dependency on central
server server No website connectionNo website connection Utilizes daisy-chain effect for communicationUtilizes daisy-chain effect for communication Allows sharing of all kinds of digital filesAllows sharing of all kinds of digital files Able to reach every computer on the internetAble to reach every computer on the internet Survival capability is highSurvival capability is high
– can not be brought down can not be brought down
19
Origin of Origin of GnutellaGnutellaOrigin of Origin of GnutellaGnutella
Gnutella = GNU project of the Free Software Foundation + Nutella (the hazelnut/chocolate spread)
Originally designed by Nullsoft, a subsidiary of AOL
AOL halted Nullsoft's development of the Gnutella
Gnutella was downloaded during few hours
Programmers reverse-engineered and created their own Gnutella software
20
Napster ModelNapster Model Gnutella ModelGnutella Model
Comparison Comparison Between Gnutella & NapsterBetween Gnutella & Napster
Comparison Comparison Between Gnutella & NapsterBetween Gnutella & Napster
21
Gnutella ProcessGnutella ProcessGnutella ProcessGnutella Process
1.1. Search RequestSearch RequestUser User AA sends out a 1st layer sends out a 1st layer request to computers request to computers BB, , C, C, && D D..
2.2. Search RelaySearch RelayUsers Users B, C, B, C, & & DD send the request send the request on to the next layer of connected on to the next layer of connected computers.computers.
3.3. Search ResponseSearch ResponseThe file is located and a The file is located and a response is sent to computer response is sent to computer AA via the same pathway.via the same pathway.
4.4. DownloadDownloadThe file is then downloaded by The file is then downloaded by AA through a direct through a direct httphttp connection. connection.
22
Gnutella TermsGnutella TermsGnutella TermsGnutella Terms
Servent A combination of a server and a client. In the decentralized gnutella model, each computer on the network is both a client and a server.
Time to Live Abbreviated "TTL," the Time to Live is the number of hops that a message will make on the Gnutella Network before being discarded. Each servent that views a message will decrement its TTL by 1, and will discard that message when the TTL reaches 0. This prevents messages from being sent back and forth across the Gnutella Network indefinitely. Most gnutella clones set TTL at around 7, although some allow the user to configure it.
23
Gnutella Terms (Continued)Gnutella Terms (Continued)Gnutella Terms (Continued)Gnutella Terms (Continued)
PingWhen a new user joins the Gnutella Network, he broadcasts a message called a "ping request" to the network, announcing his presence on the network. Nodes which receive this ping, send a “Pong” back to the pinging user to acknowledge that they have received this message.
Pong When a node on the Gnutella Network receives a ping request, it replies with a pong (a.k.a ping response). This pong contains the responding host's IP address and port, as well as number of files the responding host is sharing and their total size.
HorizonHorizon is the group of gnutella servents that the node is capable of communicating with at a particular time.
24
FreeNetFreeNetFreeNetFreeNet
Freenet is an open, democratic system which cannot be controlled by any one person, not even its creators.
Freenet is a large-scale peer-to-peer network which pools the power of member computers around the world to create a massive virtual information store open to anyone to freely publish or view information of all kinds.
25
FreeNet isFreeNet isFreeNet isFreeNet is
Highly survivable All internal processes are completely anonymized and decentralized across the global network, making it virtually impossible for an attacker to destroy information or take control of the system.
PrivateFreenet makes it extremely difficult for anyone to spy on the information that you are viewing, publishing, or storing.
SecureInformation stored in Freenet is protected by strong cryptography against malicious tampering or counterfeiting.
EfficientFreenet dynamically replicates and relocates information to provide efficient service and minimal bandwidth usage regardless of load.
26
FreeNet HistoryFreeNet History
Freenet is an enhanced Open Source implementation of the system described by Ian Clarke's 1999 paper "A distributed decentralized information storage and retrieval system“.
Work started on Freenet shortly after the publication of this paper in July 1999 by Clarke and a small number of volunteers.
By March 2000 version 0.1 of Freenet was released.
Since March 2000 Freenet has been extensively reported in the press, primarily due to its implications for copyright rather than for its wider aim, namely freedom of communication.
27
Freenet StructureFreenet StructureFreenet StructureFreenet Structure
28
Napster – Hybrid P2P
Gnutella – Pure P2P
FreeNet – Purest P2P
Review of P2P ArchitectureReview of P2P ArchitectureReview of P2P ArchitectureReview of P2P Architecture
29
Future of P2PFuture of P2PFuture of P2PFuture of P2P
30
Future of P2PFuture of P2PFuture of P2PFuture of P2P
IT Prospect From Gartner
31
Future of P2PFuture of P2PFuture of P2PFuture of P2P
Next Generation of IT ArchitectureMainframe Client/Server P2P
P2P Protocol Standard is required
Killer Application of P2P is required
Profit Model based on User’s Communities