title ip cheuk ho(02592263) lee yue sang(02780443) poon wai hang(02674013) tse ka ho(02526923)
TRANSCRIPT
Title
Ip Cheuk Ho (02592263)Lee Yue Sang (02780443)Poon Wai Hang (02674013)Tse Ka Ho (02526923)
Agenda
• Introduction: What is Peer-to-Peer?
• The History and Development of P2P
• Disadvantages of P2P
• Advantages of P2P
• Applications of P2P and Future Directions
Introduction to P2P
Intelligence is Shifting:Rebalancing the Computing Models
• Phase 1 – Client-Server Era– Smart Servers
• Phase 2 – Peer-to-Peer Era– Smart Applications
• Phase 3 – Web-Services Era– Smart Services
• Phase 4 – Post-P2P Era– Smart Devices– Smart Sensors
Smart Users???
Are we ready???
Flawed – Client / Server Architecture
= Two-tier model
SERVER dedicates to provide services
MULTIPLE CLIENTS enjoy the service
However,……
WANTS ARE UNLIMITED
eg. Computer Games download
NO WAY!!
How to make a compromise?
We are empowered to……• take advantage of
resources--storage, cycles, content, human presence
• available at the edges of the Internet.
↑rate of information flow
With Computing Advancement…
To let everyone contribute!!
Emergence of P2P
Shawn Fanning
Found Napster in 1999
TIME : Person in 2000 who mattered
Marvelous P2P
• each node (peer) has equivalent responsibilities
• shifting the locus of control to the edge
• leveraged the resources available at the edge
PC as SERVER!!
Criteria to be P2P
1. Variable Connectivity &
Temporary network addresses
2. Significant Autonomy of the nodes at the EDGES of the network
• eg. Napster, ICQ, BT. …..
Who play the roles in P2P
Roles:
• Client = Who make a request
• Server = Who fulfill the request
• Peer = Client + Server
P2P – 3 different Models
• Centralised P2P
• Decentralised P2P
• Hybrid P2P
Centralized P2P
Decentralized P2P
Hybrid P2P
In short, P2P shows…
Simplicity
Permeability Instantaneity
P2P is Everywhere
Some numbers about local P2P activities• 2 millions of Kuro users and 50.2% of teenagers
(15~22) have visited either Kuro or EZPeer
World-wide P2P activities• More than 3 billion people have downloaded Kazaa
(source: download.com, 2004)
• Average P2P installation was 1/25 in any given organization (source: AssetMetrix Research Labs, 2003)
P2P Popularity and User Rating
Top 20 Popular P2P File-Sharing Applications
0
50,000,000
100,000,000
150,000,000
200,000,000
250,000,000
300,000,000
350,000,000
400,000,000
# of D
ownlo
ads
0102030405060708090100
TotalDownloads
User Rating
資料來源 : National Taiwan University, July 2004
P2P Philosophy
• Information
• Knowlegde
• IT Applications
Open Mind and Vision
Avoid re-invent and idle
Teamwork
Global Brain-If society is viewed as a super-organism , communication networks play the role of its brain
“ Backups are for wimps. Real men
upload their data to an FTP site and
have everyone else mirror it “
Linux Torvalds
What do you think? ~~
History & Development
P2P Ancestors
• 1960s: ARPANET invention• Integrate different kinds of existing networks into
one common network• Hosts: UCLA, SRI, UCSB, and the University of
Utah
→share computing resources around the US
P2P Ancestors – in lawsuits
Napster
• Born in 1999 May • Invented by 19-year-old Shawn Fanning• Allows only mp3 extension• Homepage reached 25 million mark in less than a year
• 1999 Dec
• RIAA (AOL Time Warner's Warner Music, BMG, EMI and Sony Music) filed their first lawsuit against napster
• Napster (requires subscription) finally has extensive content agreements with the five major record labels, as well as hundreds of independents
http://ntrg.cs.tcd.ie/undergrad/4ba2.02-03/p1.html
US Troops against P2P
1. Government and the Senate
2. Copyright holders: RIAA, MPAA … (made up by recording industry, American motion pictures, home videos and television industries)
3. Service providers
4. Software/Hardware developers
1. Legislation:
• The Copyright Act of 1972• electronic reproduction and distribution of sound
recordings• established a home-recording exemption
• Amended in 1982, increasing the penalties for the illegal duplication of copyrighted material
http://www.extremetech.com/article2/0,1558,1158011,00.asp
Government and the Senate
• No Electronic Theft (NET) Act (16th Dec, 1997)
• a federal crime up to $250,000 fines and 5 years imprisonment
• applicable in situations such as running a file sharing application with outgoing transfers enabled, transferring files through IRC, and other methods of making copyrighted material available over networks
• The amendment in 1998 curbs digital piracy by expanding the Copyright Act's criminal infringement liability provisions even without intention on any profit in return
http://kb.indiana.edu/data/aliv.html
NET act was further amended in 1998 Feb
http://www.usdoj.gov/criminal/cybercrime/17-18red.htm
• Earliest case on 1999 Dec: Jeffery Gerard Levy has been charged
• a 22-year old University of Oregon student had loaded large quantities of copyrighted software, music, games, and movies onto his web site for download
• 2 year probation with limited access to the Internet
http://www.findarticles.com/p/articles/mi_m0FWE/is_3_4/ai_61533806
The Digital Millennium Copyright Act (28th Oct, 1998) (DMCA)
• Highlights:
– Anti-privacy on commercial software
– Outlaws to manufacture, sale or distribution of code-cracking devices for copying software illegally
http://www.gseis.ucla.edu/iclp/dmca1.htm
Legislation
2. Advisors
• Computer Crime and Intellectual Property Section (“CCIPS”)
• consists of about forty attorneys advise federal prosecutors and law enforcement agents
• focus exclusively on electronic privacy laws, search and seizure of computers, e-commerce, hacker investigations, and intellectual property crimes
http://www.cybercrime.gov/ccips.html
Government and the Senate
3. Search and Arrest
• Law enforcement agents involved in:
- arrest the personnel
- computers seizure
Government and the Senate
25 Aug, 2004
http://www.cybercrime.gov/ipdocs.htm
Copyright holders
• engage in “self-help” measures
• vigorously protect their intellectual property against theft, in court and through private action such as warning letters
• Seek claims to cover their loss
Service Providers
• remove material from users' web sites that appears to constitute copyright infringement (required by DMCA)
• Block TCP/UDP ports for data transfer
• Upload speed cap??
Software/Hardware developers
1. Digital Watermarking
- process of embedding copyright information such as author/owner/usage restrictions into the original file
Serial Copy Management System (SCMS)
• Protection on the digital audio signal in the S/PDIF format (Sony/Philips Digital Interchange Format)
• allowed to create a single clone from the original CD to, but cannot further create more copies from the clone as it already is a copy of the original copy-protected source
http://www.xs4all.nl/~jacg/dcc-faq/scms.html
2. Digital Rights Management (DRM) – encryption on the content of media files for secure delivery of protected content for playback on a computer, portable device, or network device
• Being used by a number of online musical stores• Playable on certain players
• E.g. Microsoft DRM playable on Windows Media Player
http://frassle.rura.org/digitalRightsManagement http://www.microsoft.com/windows/windowsmedia/drm/default.aspx
Software/Hardware developers
Copyright Ordinance Section 118 – • (1) A person commits an offence if he, without the licence of the copyright owner-
(a) makes for sale or hire;(b) imports into Hong Kong otherwise than for his private and domestic use;(c) exports from Hong Kong otherwise than for his private and domestic use;(d) possesses for the purpose of, in the course of, or in connection with, any trade or business with a view to committing any act infringing the copyright; (Amended 64 of 2000 s. 7)(e) for the purpose of, in the course of, or in connection with, any trade or business- (Amended 64 of 2000 s. 7)(i) sells or lets for hire;(ii) offers or exposes for sale or hire;(iii) exhibits in public; or(iv) distributes; or(f) distributes (otherwise than for the purpose of, in the course of, or in connection with, any trade or business) to such an extent as to affect prejudicially the owner of the copyright, (Amended 64 of 2000 s. 7)an infringing copy of a copyright work.
Any substantial actions taken??
I heard you, we have already expressed our concerns on that
matter…
How about the HKSAR government?
http://www.legislation.gov.hk/blis_ind.nsf/E1BF50C09A33D3DC482564840019D2F4/49FE816C0B0A1543482564DF000F0495
• Questionnaires (my3q.com)• From Sep 19 – Oct 16• Both Chinese and English versions are
available
• Methods of distribution:
- hard copies
- ICQ friendlist
- local online forums
Local Survey
Gender Number of surveyees %
Male 110 72.37%
Female 42 27.63%
Age
<20 48 31.58%
20-25 63 41.45%
25-30 36 23.68%
30> 5 3.29%
Income
<5000 103 67.76%
5000-15000 43 28.29%
15000> 6 3.95%
Marriage
Single 147 96.71%
Married 5 3.29%
Education
Primary 10 6.58%
Secondary 32 21.05%
University 110 72.37%
Total: 152
Background of surveyees
Questions Number of Surveyees %
How often do you use the PC?
Twice or more daily 81 53.29%
Once daily 43 28.29%
Weekly 17 11.18%
Less than weekly 11 7.24%
How long do you spend on the PC each session?
Less than 30 minutes 11 7.24%
30 minutes - 1 hour 13 8.55%
1 to 2 hours 29 19.08%
2 hours or more 99 65.13%
What do you mainly use your PC for?
Entertainment 55 36.18%
Educational 55 36.18%
Downloading files 28 18.42%
Research 50 32.89%
Others 3 1.97%
PC usage of surveyees
PC usage of 152 surveyees
36.18% 36.18%
18.42%
32.89%
1.97%
0.00%
10.00%
20.00%
30.00%
40.00%
Entertainment Educational Downloadingfiles
Research Others
Questions Number of surveyees %
Have you ever used P2P software?
No 68 44.74%
Yes 84 55.26%
How often do you use P2P?
Twice or more daily 13 15.48%
Once daily 10 11.90%
Weekly 43 51.19%
Less than weekly 18 21.43%
Why don't you use P2P?
Not necessary 9 13.24%
Never heard of such a service 56 82.35%
No way to download 3 4.41%
Why are you using P2P? (more than one options)
Convenience 39 /
Free 37 /
Lots of sources 35 /
Other 4 /
How often are you able to find your desired files using P2P?
Rarely 18 21.43%
Average 48 57.14%
Often 18 21.43%
P2P Usage
P2P Usage Frequency of 84 P2P users
15.48%
11.90%
51.19%
21.43%
0.00% 10.00% 20.00% 30.00% 40.00% 50.00% 60.00%
Twice or more daily
Once daily
Weekly
Less than weekly
• 55% of the surveyees have used P2P
• Out of 84 P2P users, 51% use P2P every week
• 55% of the surveyees will buy the goods if P2P were made illegal
Current situation of P2P-over-dependence in Hong Kong is not serious, but it may go worse if the HKSAR government does not exert control over it
Responses Number of surveyees %
Yes 83 54.61%
No 20 13.16%
Depends on the price 48 31.58%
If using P2P were made illegal, will you buy the legitimate goods?
Disadvantages of Peer-to-Peer
P2P = Pirate to Pirate ??
-copyright infringement, intellectual piracy
P2P computing has effectively made the internet into a giant copy machine, allowing users and consumers to communicate and swap files very freely without proper controls. P2P computing may form basis of many chaotic and lawless communities.
music, films, TV programs, books or any other creative, copyrighted media are pirated.
P2P = Pirate to Pirate ??
According to a recent studies(Soruce: AssetMetrix,MSNBC):-77% of all companies have illegal downloading occurring during business hours.-1 in 25 employees download at work.-24% of employees said they take precautionary measures to avoid detection.-One in five men and one in eight women admitted to using their work computers as their primary access to sexually explicit material online.
According to a February 20, 2004 CNN article:“U.S. software companies lose up to $12 billion a year in piracy according to the Software and Information Industry Association.”“Music companies lost more than $4.6 billion worldwide last year, according to the RIAA [Recording Industry Association of America]”“Movie industry officials pegged their annual losses from bootlegged films at more than $3.5 billion.”
P2P = Pirate to Pirate ??
causes of problem
1.anonymity of p2p users-"The anonymity of the internet gives consumers the feeling that there are no repercussions to piracy." says Frank Creighton, the RIAA director of anti-piracy -all we know about a p2p user is a login name, or an ip-address, it is hard to trace where the active computer is located, or who is using the computer at that time.
2.huge number of p2p users-Should all illegal p2p downloaders be arrested? Is it possible?
3.ambiguousness of offenders-due to the modeling of p2p:
-A,B,C,D,E are all users in a P2P network-suppose A send a file(illegal) to E-the data is sent to E via B-should B also be accused? Because B is downloading the illegal data from A and upload it to E
P2P = Pirate to Pirate ??4. Large effort in tracing a single p2p user- to prove an illegal download, investigator should obtain the ip- addresses of the uploader and downloader and resolve their ip addresses, this may take a long time.- Some users use dynamic ip or masked ip so the ip address found by investigator may not be the true one.- some p2p softwares encrypt the content sent by users, take long time to decrypt the content.
5.p2p providers are not responsible for any illegal download- quoted from WinMx license agreement:“WinMX or Frontcode Technologies makes no representations or warranties regarding the files downloaded by WinMX‘s users. Copying or distributing unauthorized files may violate copyright laws. Compliance with the copyright law is solely the user’s responsibility.“
P2P = Pirate to Pirate ??
6. Human is born to like freebies - one will always ask why should I spend thousands of dollars on a software if I can obtain it for free
7.illegal downloaders and uploaders don’t recognize the impacts of illegal downloads- like causing hundreds of companies to finish their businesses, thousands of employees lose their jobs…
8.free distribution of p2p software and 0-cost in abusing it- nowadays p2p software can be obtained everywhere on the web for free.- what you need is spending a few minute in downloading, installing it- then you can download thousands of free softwares, musics, movies- the only cost is the fee for the electricity and ISP
P2P = Pirate to Pirate ??Impact of the problem
1.reduce profit of producers- reduced revenue due to lack of buyers- more capital spend on fighting privacy- some of the companies have to close down, their employees become jobless
2.corrupt teenager’s mind- teenager no longer aware the importance of intellectual rights- worsen the moral standard of teenagers- adverse effect on society in long-term
3.lesser people participating in the related industires- lesser jobs and lower income offered- lower incentive for job-seekers
4.no more good, creative products- due to collapse of related industries- who will spend hours of time of thinking a great idea, knowing that it will be stolen?
P2P = Pirate to Pirate ??Some suggested solutions
1.Pass law to control p2p computing“No law can be successfully imposed on a huge population that does not morally support it and possesses easy means for its invisible evasion," wrote John Barlow of the Electronic Frontier Foundation.
2.Emphasize education on the importance of intellectual rights- through primary, secondary,or even tertiary education- advertisement through tv/radio channels, leaflet, poster- prevention is always better than cure
3.Producer should make the pirated material inferior to their own- like better customer support, documentations, packaging ,etc
P2P = Pirate to Pirate ??
4.research some other methods to protect their products- example: DiscGuard, StarForceencrypt the disc content, read the disc signature burnt on the disc to decrypt the content
5.reduce the price to a reasonable level
Security issues on P2PSecurity problems:
1.spread of viruses, worms, trojans-P2P have become a favorite of virus writers due to its popularity and massive users. Spreading viruses via P2P is fast and efficient.
-viruses are either bundled with the searched files or spoofed.Example: when a user download a music file, it may be bundled with a virus or the music file is actually a virus.
-some experienced programmers reverse-engineer some programs, add some malicious code to them and spoof them to be official release.
2.spyware and adware bundled with P2P software-some P2P providers bundle some spyware to obtain user’s personnel information like credit card numbers, surfing habits, etc…
3.sniffering-since files are transferred via a number of users, users on the middle may sniff your file, know your searching habits etc..
-A send a file to E via B-normally B will only forward what it receive from A to E, B don’t know what is received.-suppose now B is a hacker-B use program to sniff what he receive from A, he know what is being transferred-B may also modify what is received before forwarding to E, like adding some harmful codes(purple part)
Security issues on P2P
4.expose ip, MAC addresses-expose yourself to possible attacks
-File sharing programs such as KaZaA and iMesh are powered by FastTrack P2P technologies.A buffer overflow in the FastTrack software was discovered on May 25, 2003 (CAN-2003-0397)
5.expose personnel information-some naïve user may unaware they share the wrong foldersA recent research have found that some users share the whole harddisk!
Security issues on P2PCauses of problems
1.loose control and monitor over P2P network- hard to monitor such a vast peer-to-peer network
2.Anonymity of viruses spreader- hard to trace who the real attacker is
3.security holes in P2P model- no well-defined standard for P2P model
4.popularity of P2P
5.no guarantee on the files you will download- files shared on P2P is not guaranteed to be the files you searched for, they are neither guaranteed to be clean, whether to download it is the user’s personnel interest
Security issues on P2P
Some suggested solutions:1. P2P provider should set some default settings to protect naïve users
2.P2P provider should bundle virus scanner instead of spyware and adware with its program
3.messages and files passed in the P2P network should be encrypted.- so intruder cannot read the content without decryption.
4.users should also be informed of possible viruses threat or spoof files
Spread of bad information
Likes pornography, tutorials on cyber crimes, offensive, illegal material etc…-because of the poor control over P2P network and its high popularity again..-Spread of bad materials is rapid-It is hard to remove it due to the high availability of sources.
Solutions:1.P2P software provider should add filter to the search such that the bad files cannot be searched/shared.2.laws must be passed to censor those offensive materials
Network congestion
P2P is a fast mean of searching,transferring file via the network. BUT it is a very inefficient way.-Because in a single file transfer, all the peers on the route need to forward the file being transmitted. This consume their bandwidth and computing power.-Now we have a large number of peers which generate a large number of search queries and file-transfers every moment. This would consume a large amount of bandwidth and congest the network.-This burden some ISPs(internet service provider) result in significant slow down and decline in quality of service.
Network congestion
Some possible solutions:
1.ISPs should buy more expensive routers or upgrade their cable facilities-increase the maximum bandwidth the network can tolerate such that congestion is less likely to occur.
2.ISP can consider to adjust the charge according to user’s consumed bandwidth- the more he consumed, the more he will pay
3.P2P provider may impose a limit on the file size being shared.
Conclusion
• piracy & Copyright issues• security problems• spread of bad information• Congest network traffic
Benefits of P2P
Harnessing the power of technology
Benefits of P2P
• Low cost distribution channel
• Easy content acquisition
• Disintermediation of distribution agents
• Wider audience base
• New marketing strategies
• Bypassing of censorship
• Decentralization of networks
• Large variety of applications
0
5
10
15
20
25
30
35
40
Number of respondents
Convenience Free Lots ofsources
Other
Reasons for using P2P
Low cost distribution channel
• The only requirements for acquiring content via P2P are a PC and an Internet connection.
• Most people in Hong Kong already have a PC and a broadband line.
• Up to 90% of respondents to our survey used a PC
Low cost distribution channel
• P2P is also a low-cost channel for distributors / artists.
• The medium cost of Internet distribution is less than the material cost of a CD.
Easy content acquisition
• Digital audio and video formats (MP3, OGG, MPG, DIV) may be stored and transferred on a variety of portable devices.
• An iPod can store 40GBs of music. That is roughly 10,000 songs!
Easy content acquisition
• Using P2P distribution, customers do not need to “re-buy” a damaged product, as they can download it again at little cost to the content creator.
• Files may be accessed anytime and anywhere, as long as there is an Internet connection.
Convenient content acquisition
Disintermediation of agents
• Customers no longer need to go through a distribution agent (e.g. HMV or a record label), simplifying the process and reducing cost.
• Record labels “turned to copyright law in the hope of finding immunity from competition…”
Disintermediation of agents
• Being an independent artist is becoming increasingly viable.
• Anyone can sell their record through Amazon, and have music played on any of the many Internet radio sites.
• This lowers the barrier of entry and creates an environment that fosters competition.
Wider audience base
• 60 million Americans use file-sharing software.
• 50 million Americans voted for George W. Bush in the 2000 US Presidential election.
• Over 112 million copies of Morpheus, a common P2P client has been downloaded.
• Studies demonstrate that P2P encourages sales by introducing listeners to new material which is then purchased in CD format.
• In less than six months, people have downloaded over 10,000,000 songs from iTunes.
Wider audience base
• Beginning May 1, every specially marked 12-pack of Heineken will include a unique code redeemable for two free music downloads from RealNetworks' RealPlayer Music Store.
New marketing strategies
New marketing strategies
• Artists cannot be harmed by P2P users who download a copyrighted work they never intended to buy anyway. This does not constitute a lost sale.
• However, people who wouldn't listen to a song may download it, then buy it because they like it.
• Even if that person doesn't buy it, chances are that they will tell someone about it and that person might buy it. It has a cascading effect.
New marketing strategies
• P2P technologies create a platform for users to sample a copyrighted work before buying it.
• The only condition is if the downloaded content is sub-par to the distributed work. This is already the case with MP3’s, which are shared online usually at a lower bit-rate / quality.
Bypassing of censorship
• The Internet is a borderless network
• Most P2P software implement anonymity features
• Net Result: Censorship would be close to impossible
Bypassing of censorship
• “By the year 2010, file-sharers could be swapping news rather than music, eliminating censorship of any kind.”
Tracey Logan, BBC News
• “The effect of peer-to-peer networks will be to make censorship difficult, if not impossible.”
Prof. R. Anderson, Cambridge
• This allows countries with a strict regime the same access to information as countries which honor the freedom of speech.
Decentralization of networks
• No single server for directory or content– No single point of failure, i.e. reliability
• Multiple sources for data– Users may locate nearest server, for quicker
download
Large variety of applications
• Distribution of news and scientific articles.
• Distributed computing.
Applications and Directions
Bringing P2P to a new frontier
Distributed Computing
• Example: GreenTea Platform
• Allows resource sharing across multiple hosts (both hardware and software)
• For computationally intensive tasks: multimedia rendering, scientific calculations, etc…
Distributed Computing
• DNS Protocol is the most fundamental technology behind the Internet.
• Allows different machines to communicate without knowing the physical location of any other machine.
• DNS is based on a peer-to-peer structure, with top level DNS roots in most major developed countries.
Distributed Computing
• SETI@Home is a P2P application that searches for extraterrestrial life.
• It sends out computations for many different computers to perform and sends the result back to SETI.
Distributed Computing
• Intel Philanthropic P2P Program
• Different computers donate resources to accelerate medical research.
• Calculation of large scientific problems by spreading the computations across different computers.
• Users download an applet to join the network.
FinNet• FinNet is a secure private network established to support
the financial sector in Hong Kong.• It provides a P2P framework for delivering applications,
conducting secure transactions online, and information sharing.
• Based on the economies of scale of the large financial sector in Hong Kong.
Content Distribution
• WebJays – a P2P-based link sharing system.
• Instead of sharing files, WebJays shares multimedia links.
• P2P may be used to distribute content across social boundaries and political borders by reducing barriers to entry and ensuring anonymity.
Content Distribution
• BitTorrent, Kazaa, Morpheus, eDonkey, etc… are all examples of current P2P software for distributing files.
• Mostly used for multimedia files (MP3s, Videos, e-books).
Instant Messenger
• AIM is based partly on peer-to-peer technology.
• Direct connections between different computers are made to exchange information.
Future Applications in Hong Kong
• SARS (Biological Research) between medical institutions.
• University resource sharing.
• Unpublished journal circulation.
Application I –
Biochemical Research
SARS DNA Sequencing Project
Computing Network Adopted by Michael Smith Genome Sciences Centre
In a Dozen days …
27/3 – 7/4 2004
References• http://www.guardian.co.uk/online/story/0%2C3605%2C384480%2C00.html• http://www.eecs.harvard.edu/p2pecon/confman/papers/s1p2.pdf• http://www.clango.com/documents/P2P_Impact.pdf• http://www.cachelogic.com/products/cp4000ds.pdf• http://www.house.gov/judiciary/spanier022603.htm• http://marcel.wanda.ch/Publications/rinaldi02routing-techreport.pdf• http://www.naradabrokering.org/papers/NB-Framework.pdf• http://www.it-wire.nu/members/iss23/attachments/IRIS_Q2_2003.pdf• http://www-swiss.ai.mit.edu/classes/6.805/admin/admin-spring-2001/topics/p2p.html• http://www.networkmagazineindia.com/200204/200204focus3.shtml• http://www.corante.com/importance/archives/P2P_United_Letter_%288-5-04%29.pdf• http://web.mit.edu/patil/Public/805project/• http://www.cio.com/analyst/031601_rfgonline.html• http://www.ecademy.com/node.php?id=1930• http://marketwatch-cnet.com.com/2100-1025-1027508.html• http://developer.intel.com/update/contents/it02012.htm• http://www.nwfusion.com/newsletters/sec/2000/0828sec1.html?nf
END
‘Explore the future’