SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Università degli Studi di Trento
            Facoltà di Economia
Corso di Laurea Specialistica in Net-Economy
         Corso di Telecomunicazioni

               Nicola Cerami
Index
  What is P2P and    Security and
   History             Privacy issues
  Architecture of    Economic issues
   P2P systems        Applications of
  Advantages and      use
   weaknesses of      Future
   P2P Networks        developments
  Legal issues
18/04/2010                               2
What is Peer-to-Peer-1
 Is any distribuited network architecture
    composed of partecipants that make a portion
    of their resources, such as:

              Processing power
              Disk storage

              Network bandwith



 Directly available to other network
    partecipants
18/04/2010                                         3
What is Peer-to-Peer-2
  Each Peer (usually workstation) has
     equivalent capabilities and responsabilities

  Peer are both suppliers and consumers of
     resources, in contrast to the traditional client-
     server model




18/04/2010                                               4
What is Peer-to-Peer-3




18/04/2010                     5
What is Peer-to-Peer-4




18/04/2010                     6
History
  1999: first software dedicated to P2P is
     Napster (Fanning)

  Spread broadband and ADSL Flat increasingly
     accessible

  A growing success


  Today, huge numer of P2P Systems

18/04/2010                                       7
Architecture of P2P
                   systems

 1. Centralized architecture


 2. Distributed architecture, or pure


 3. Mixed or hybrid architecture

18/04/2010                              8
Centralized
 Networks
  Using on the one hand central server(s) or
     bootstrapping mechanisms (e.g. eDonkey
     network).

  Central Server:
     Makes communicating between peers
     Controls the interaction between clients
     Contains no data
18/04/2010                                       9
Distributed
  Architecture
 There is no central server managing the
     network
   Peers act as equals, merging the roles of
     clients and server
   Many access points
   P2P systems for file sharing using this
     architecture often
   You must install software P2P (e.g Gnutella
     protocol, Freenet protocol)
18/04/2010                                        10
Hybrid P2P Networks
 Mix of centralized architecture and decentralized
  architecture
 Distribute their clients into two groups:


    Clients nodes
    Overlay nodes


 Tipically, each client is able to act according to the
     momentary need of the network and can become
     part of the respective overlay network used to
     coordinate the P2P structure (e.g. Gnutella
     protocol).
18/04/2010                                         11
Advantages and weaknesses
      of P2P Networks
             Advantages            Weaknesses
  All clients provide       Not guarantee the
   resources (Bandwidth,        quality of service
   Storage space,              It is not easy to
   Computing power)             retrieve information of
  Ease of administration       interest
  Not require major           Reliability Data
   infrastructure              Security
  Extreme tolerance in        Legal issues
   the event of failure

18/04/2010                                                12
Legal issues-1
  The legal framework of reference is appointed
     to regulate the c.d. copyright

  Italian law:
     Act 22 Aprile 1941, n. 633 amended several
      times
     Dilemma law not legal P2P systems
     Art. 171: “anyone who is punisched does not
      qualify, for any purpose and in any form”

  Limit of the law illegal file sharing
18/04/2010                                          13
Legal issues-2
 European level
    Directive 2001/29/CE of the European
     Parlament and Council (May 2001)
    Telecom package approved by the European
     Parlament (Nov 2009)
    Sarkozy’s Doctrine


   United States
        Copyright: Title 17 of the Unites States Code
        Violations  Federal crimes
        Exceptions  educational and scientific
18/04/2010
           purposes                                      14
Security issues
  Fundamental use of antivirus, firewall,
     cleaning log files and removal of infectious
     agents (virus, spyware, trojan, malware).

  Attacks that a client can be, for example:

       Using file sharing systems
       Sharing an area of your disk
       It allows free access to certain ports on your
             computer
18/04/2010                                               15
Privacy issues
  Protecting sensitive data (personal, business)
     throught the adoption of:

       A network of anonymous
       Install SW such as PeerGuardian
       Encryption and obfuscation protocol
       A proxy for connection of the client’s real IP
        mask
       ect..

18/04/2010                                               16
Economic issues -1
  New ways to access resources SW and HW
  Strongly dependent on the market that
   produces use-value
  A study commissioned by the Dutch
   goverment(2009):

    “P2P Systems are good for the economy”



18/04/2010                                   17
Economic issues -2
  New ethnic workers (knowledge workers)
  Used to solve management problems, improve
   communication between companies but also
   within the same
  Greater sharing of know-how
  Faster data trasmission than traditional
   networks (client-server)
  Less server overload




18/04/2010
              COMPETITIVE ADVANTAGE           18
Applications of use
 Often used for file sharing:
   More Applications: Napster, Gnutella, FastTrack,
    BitTorrent, Direct Connect, eDonkey, Kademila,
    etc.
   Also widely used on mobile technology:
    SymTorrent, Direct Connect Torrent, MobileDC,
    etc.

   Sharing computational power:
        HW mainly shared resources for problem
           solving or complex calculations
        Examples: SETI@Home, GIMPS,
18/04/2010 Distributed.net, FightAIDS@Home.            19
Future developments -1
Use innovative P2P  P2P TV

    For the diffusion of high data streams generated in
     real time

    Using trasmission bandwidth of individual users


    Not require server performance


    Requires that individual users are provided with
           high bandwidth connections in both reception and
           trasmission (saturation bandwidth provided by the
18/04/2010 server)                                             20
Future developments -2
  The Server serves as the index, synchronizes the
     various users sharing the bandwidth and provides
     the data flow and initial users share

  So, although in practice a server, after supplying
     the initial data flow and have put in
     communication the various users, the server is
     not interested in the communication becomes
     totally P2P systems

  Large companies are experimenting with the
     possibility of offering paid content
18/04/2010                                              21
Future developments -3
      Limits on the dissemination P2PTV
       Systems are:

       Technical problems (diffusion
       asymmetrical Internet lines, ADSL)
       Reliability problems
       Legal issues



18/04/2010                                  22
Future developments -4
 Simulator epidemic protocols

  University of Bologna is experimenting with
     new P2P applications simulator edpidemic
     protocols for the study of issues of scale and
     dynamism that characterize the moderm
     information systems




18/04/2010                                            23
Future developments -5
  There      protocols are able to put in
     communication      between     their   various
     terminals. Such protocols are characterized by
     large scale and high dynamics.

  The simulator is built from components that
     enable rapid prototyping of communication
     protocols by combining different data blocks


18/04/2010                                          24
Future developments -6
 Using P2P Networks for mobile technologies

  System devised by TerraNet AB (Swedish
   company)
  Allows:
     Local phone calls and send messages (2-20
      km)
     Make calls to anyone with Internet access
      TerraNet
     VoIP calls free long distance

18/04/2010                                        25
Future developments -7
  TerraNet integrated with technology every
   type of mobile device becomes a wireless
     communication

  It works via P2P wireless network (mesh
     network) and no need for base stations,
     antenna installations or infrastructure



18/04/2010                                     26
Future developments -8
             Benefits               Weaknesses


  For areas of the world     Phone companies
   where you make              obviously do not like
   expensive trasmission       the idea
   infrastructure (Africa,    Political issues
   South America, etc)
  Elimination
   communications costs
  Greater privacy

18/04/2010                                             27
Conclusions -1
 Network congestion and bandwidth
  throlling

  Phenomenon increasingly attributed to P2P
   systems
  Many provider have chosen to use the
   bandwidth throlling:
                System that cuts the available bandwidth, especially
                 when using P2P systems
                Often the users knows nothing!
                For example Fastweb, Vodafone (mobile), Alice e
                 Tiscali
18/04/2010      Less opposed P2P systems  Libero e Tele2            28
Conclusions -2
  But the new version of uTorrent apparently
   meets the needs of the ISP.
  uTorrent :
       Limiting network congestion, thus helping
        Internet Provider
       The concept consists of a uTP: magnification
        Bittorrent protocol
       uTP allow clients to automatically find any
        blocks of the network (rule bandwidth
        requirements and improves the connections)

18/04/2010                                             29
Conclusions -3
  Version of uTorrent with uTP is still in beta (Nov,
     2009) but already is showing positive results

  Good thing for us users



  Providers would no longer decide on the bandwidth
     limitation!


18/04/2010                                               30
Web Bibliography
 1.     http://en.wikipedia.org/wiki/Peer_to_peer
 2.     http://it.wikipedia.org/wiki/P2P_TV
 3.     http://it.wikipedia.org/wiki/Legge_italiana_sul_peer-to-peer
 4.     http://www.p2pitalia.com/
 5.     http://www.lastampa.it/redazione/cmsSezioni/economia/200805articoli/32454gira
        ta.asp
 6.     http://www.megalab.it/4061/il-peer-to-peer-fa-bene-all-economia
 7.     http://setiathome.berkeley.edu/
 8.     http://www.mersenne.org/
 9.     http://www.distributed.net/
 10.    http://fightaidsathome.scripps.edu/
 11.    http://www.cs.unibo.it/bison/
 12.    http://www.terranet.se/index.php?option=com_content&task=category&sectionid
        =9&id=18&Itemid=51
18/04/2010                                                                              31
Bibliography
  G. Pascuzzi, Il diritto dell’era digitale. Tecnologie
   informatiche e regole privatistiche, II edizione, Il
   Mulino, Bologna, 2006
  Shapiro e Varian, Information Rules. A strategic Guide
   to the Network Economy. I edizione, Etas, Novembre
   1999.
  Slide Corso Telecomunicazioni (dott. Zorat)
  Slide Corso Diritto Privato dell’Informatica (dott.
   Caso)

18/04/2010                                                  32
Peer to peer Networks

Weitere ähnliche Inhalte

Was ist angesagt?

Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver Presentation
Tuhin_Das
 
User Datagram protocol For Msc CS
User Datagram protocol For Msc CSUser Datagram protocol For Msc CS
User Datagram protocol For Msc CS
Thanveen
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
extraganesh
 

Was ist angesagt? (20)

Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
Protocol architecture TCP IP
Protocol architecture TCP IPProtocol architecture TCP IP
Protocol architecture TCP IP
 
P2P-Network.ppt
P2P-Network.pptP2P-Network.ppt
P2P-Network.ppt
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Troubleshooting Your Network.pptx
Troubleshooting Your Network.pptxTroubleshooting Your Network.pptx
Troubleshooting Your Network.pptx
 
Ethernet
EthernetEthernet
Ethernet
 
Network Interface Card
Network Interface CardNetwork Interface Card
Network Interface Card
 
Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver Presentation
 
Network management ppt
Network management pptNetwork management ppt
Network management ppt
 
User Datagram protocol For Msc CS
User Datagram protocol For Msc CSUser Datagram protocol For Msc CS
User Datagram protocol For Msc CS
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
ETHERNET
ETHERNETETHERNET
ETHERNET
 
5. IO virtualization
5. IO virtualization5. IO virtualization
5. IO virtualization
 
Ethernet
EthernetEthernet
Ethernet
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
Peer to-peer networks
Peer to-peer networksPeer to-peer networks
Peer to-peer networks
 
Snmp
SnmpSnmp
Snmp
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
RTP
RTPRTP
RTP
 

Ähnlich wie Peer to peer Networks

OttawaSubmission.072809
OttawaSubmission.072809OttawaSubmission.072809
OttawaSubmission.072809
Eric Klinker
 
MPEG-21 Digital Items in Research and Practice
MPEG-21 Digital Items in Research and PracticeMPEG-21 Digital Items in Research and Practice
MPEG-21 Digital Items in Research and Practice
Alpen-Adria-Universität
 
Stripe Tolj's presentation at eComm 2008
Stripe Tolj's presentation at eComm 2008Stripe Tolj's presentation at eComm 2008
Stripe Tolj's presentation at eComm 2008
eComm2008
 
Ims content distributionnetworks
Ims content distributionnetworksIms content distributionnetworks
Ims content distributionnetworks
Reid Chang
 
A Metadata Model for Peer-to-Peer Media Distribution
A Metadata Model for Peer-to-Peer Media DistributionA Metadata Model for Peer-to-Peer Media Distribution
A Metadata Model for Peer-to-Peer Media Distribution
Alpen-Adria-Universität
 

Ähnlich wie Peer to peer Networks (20)

OttawaSubmission.072809
OttawaSubmission.072809OttawaSubmission.072809
OttawaSubmission.072809
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
 
MPEG-21 Digital Items in Research and Practice
MPEG-21 Digital Items in Research and PracticeMPEG-21 Digital Items in Research and Practice
MPEG-21 Digital Items in Research and Practice
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of Iots
 
Basics of Computer Networks
Basics of Computer NetworksBasics of Computer Networks
Basics of Computer Networks
 
Internet
InternetInternet
Internet
 
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
 
chapter15.ppt
chapter15.pptchapter15.ppt
chapter15.ppt
 
Peer-to-peer Applications and Impact on ISPs\' Operations 2008.06.04
Peer-to-peer Applications and Impact on ISPs\' Operations 2008.06.04Peer-to-peer Applications and Impact on ISPs\' Operations 2008.06.04
Peer-to-peer Applications and Impact on ISPs\' Operations 2008.06.04
 
Peer To Peer Content Sharing On Wi-Fi Network For Smart Phones
Peer To Peer Content Sharing On Wi-Fi Network For Smart PhonesPeer To Peer Content Sharing On Wi-Fi Network For Smart Phones
Peer To Peer Content Sharing On Wi-Fi Network For Smart Phones
 
Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks
 
Peer-to-Peer Communication Service and Messaging System
Peer-to-Peer Communication Service and Messaging SystemPeer-to-Peer Communication Service and Messaging System
Peer-to-Peer Communication Service and Messaging System
 
IoT Lab @COPELABS
IoT Lab @COPELABSIoT Lab @COPELABS
IoT Lab @COPELABS
 
SECURING DATA TRANSFER IN THE CLOUD THROUGH INTRODUCING IDENTIFICATION PACKET...
SECURING DATA TRANSFER IN THE CLOUD THROUGH INTRODUCING IDENTIFICATION PACKET...SECURING DATA TRANSFER IN THE CLOUD THROUGH INTRODUCING IDENTIFICATION PACKET...
SECURING DATA TRANSFER IN THE CLOUD THROUGH INTRODUCING IDENTIFICATION PACKET...
 
Stripe Tolj's presentation at eComm 2008
Stripe Tolj's presentation at eComm 2008Stripe Tolj's presentation at eComm 2008
Stripe Tolj's presentation at eComm 2008
 
Ims content distributionnetworks
Ims content distributionnetworksIms content distributionnetworks
Ims content distributionnetworks
 
Copyright Protection in the Internet
Copyright Protection in the InternetCopyright Protection in the Internet
Copyright Protection in the Internet
 
A Metadata Model for Peer-to-Peer Media Distribution
A Metadata Model for Peer-to-Peer Media DistributionA Metadata Model for Peer-to-Peer Media Distribution
A Metadata Model for Peer-to-Peer Media Distribution
 
unit 2.pdf
unit 2.pdfunit 2.pdf
unit 2.pdf
 
App for peer-to-peer file transfer
App for peer-to-peer file transferApp for peer-to-peer file transfer
App for peer-to-peer file transfer
 

Mehr von Nicola Cerami

La Reingegnerizzazione dei processi nel settore logistico: Un caso di studio
La Reingegnerizzazione dei processi nel settore logistico: Un caso di studioLa Reingegnerizzazione dei processi nel settore logistico: Un caso di studio
La Reingegnerizzazione dei processi nel settore logistico: Un caso di studio
Nicola Cerami
 

Mehr von Nicola Cerami (9)

La Reingegnerizzazione dei processi nel settore logistico: Un caso di studio
La Reingegnerizzazione dei processi nel settore logistico: Un caso di studioLa Reingegnerizzazione dei processi nel settore logistico: Un caso di studio
La Reingegnerizzazione dei processi nel settore logistico: Un caso di studio
 
Progetto per lo sviluppo di un sistema di gestione della conoscenza per il pr...
Progetto per lo sviluppo di un sistema di gestione della conoscenza per il pr...Progetto per lo sviluppo di un sistema di gestione della conoscenza per il pr...
Progetto per lo sviluppo di un sistema di gestione della conoscenza per il pr...
 
Analisi dei requisiti per un sistema informativo per la prenotazione e il pag...
Analisi dei requisiti per un sistema informativo per la prenotazione e il pag...Analisi dei requisiti per un sistema informativo per la prenotazione e il pag...
Analisi dei requisiti per un sistema informativo per la prenotazione e il pag...
 
Il mercato degli strumenti Web per il supporto alle Reti di Innovazione
Il mercato degli strumenti Web per il supporto alle Reti di Innovazione Il mercato degli strumenti Web per il supporto alle Reti di Innovazione
Il mercato degli strumenti Web per il supporto alle Reti di Innovazione
 
Project Marketing E-Commerce: VideoMagic
Project Marketing E-Commerce: VideoMagicProject Marketing E-Commerce: VideoMagic
Project Marketing E-Commerce: VideoMagic
 
Project Management
Project Management Project Management
Project Management
 
Analisi delle caratteristiche degli scooter ciclo otto 4 t 125 prodotti nell'...
Analisi delle caratteristiche degli scooter ciclo otto 4 t 125 prodotti nell'...Analisi delle caratteristiche degli scooter ciclo otto 4 t 125 prodotti nell'...
Analisi delle caratteristiche degli scooter ciclo otto 4 t 125 prodotti nell'...
 
Tecnologie semantiche per il knowledge Management
Tecnologie semantiche per il knowledge Management Tecnologie semantiche per il knowledge Management
Tecnologie semantiche per il knowledge Management
 
Deloitte Oracle Applications Day 2012
Deloitte Oracle Applications Day 2012Deloitte Oracle Applications Day 2012
Deloitte Oracle Applications Day 2012
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 

Peer to peer Networks

  • 1. Università degli Studi di Trento Facoltà di Economia Corso di Laurea Specialistica in Net-Economy Corso di Telecomunicazioni Nicola Cerami
  • 2. Index  What is P2P and  Security and History Privacy issues  Architecture of  Economic issues P2P systems  Applications of  Advantages and use weaknesses of  Future P2P Networks developments  Legal issues 18/04/2010 2
  • 3. What is Peer-to-Peer-1  Is any distribuited network architecture composed of partecipants that make a portion of their resources, such as:  Processing power  Disk storage  Network bandwith  Directly available to other network partecipants 18/04/2010 3
  • 4. What is Peer-to-Peer-2  Each Peer (usually workstation) has equivalent capabilities and responsabilities  Peer are both suppliers and consumers of resources, in contrast to the traditional client- server model 18/04/2010 4
  • 7. History  1999: first software dedicated to P2P is Napster (Fanning)  Spread broadband and ADSL Flat increasingly accessible  A growing success  Today, huge numer of P2P Systems 18/04/2010 7
  • 8. Architecture of P2P systems 1. Centralized architecture 2. Distributed architecture, or pure 3. Mixed or hybrid architecture 18/04/2010 8
  • 9. Centralized Networks  Using on the one hand central server(s) or bootstrapping mechanisms (e.g. eDonkey network).  Central Server:  Makes communicating between peers  Controls the interaction between clients  Contains no data 18/04/2010 9
  • 10. Distributed Architecture  There is no central server managing the network  Peers act as equals, merging the roles of clients and server  Many access points  P2P systems for file sharing using this architecture often  You must install software P2P (e.g Gnutella protocol, Freenet protocol) 18/04/2010 10
  • 11. Hybrid P2P Networks  Mix of centralized architecture and decentralized architecture  Distribute their clients into two groups:  Clients nodes  Overlay nodes  Tipically, each client is able to act according to the momentary need of the network and can become part of the respective overlay network used to coordinate the P2P structure (e.g. Gnutella protocol). 18/04/2010 11
  • 12. Advantages and weaknesses of P2P Networks Advantages Weaknesses  All clients provide  Not guarantee the resources (Bandwidth, quality of service Storage space,  It is not easy to Computing power) retrieve information of  Ease of administration interest  Not require major  Reliability Data infrastructure  Security  Extreme tolerance in  Legal issues the event of failure 18/04/2010 12
  • 13. Legal issues-1  The legal framework of reference is appointed to regulate the c.d. copyright  Italian law:  Act 22 Aprile 1941, n. 633 amended several times  Dilemma law not legal P2P systems  Art. 171: “anyone who is punisched does not qualify, for any purpose and in any form”  Limit of the law illegal file sharing 18/04/2010 13
  • 14. Legal issues-2  European level  Directive 2001/29/CE of the European Parlament and Council (May 2001)  Telecom package approved by the European Parlament (Nov 2009)  Sarkozy’s Doctrine  United States  Copyright: Title 17 of the Unites States Code  Violations  Federal crimes  Exceptions  educational and scientific 18/04/2010 purposes 14
  • 15. Security issues  Fundamental use of antivirus, firewall, cleaning log files and removal of infectious agents (virus, spyware, trojan, malware).  Attacks that a client can be, for example:  Using file sharing systems  Sharing an area of your disk  It allows free access to certain ports on your computer 18/04/2010 15
  • 16. Privacy issues  Protecting sensitive data (personal, business) throught the adoption of:  A network of anonymous  Install SW such as PeerGuardian  Encryption and obfuscation protocol  A proxy for connection of the client’s real IP mask  ect.. 18/04/2010 16
  • 17. Economic issues -1  New ways to access resources SW and HW  Strongly dependent on the market that produces use-value  A study commissioned by the Dutch goverment(2009): “P2P Systems are good for the economy” 18/04/2010 17
  • 18. Economic issues -2  New ethnic workers (knowledge workers)  Used to solve management problems, improve communication between companies but also within the same  Greater sharing of know-how  Faster data trasmission than traditional networks (client-server)  Less server overload 18/04/2010 COMPETITIVE ADVANTAGE 18
  • 19. Applications of use  Often used for file sharing:  More Applications: Napster, Gnutella, FastTrack, BitTorrent, Direct Connect, eDonkey, Kademila, etc.  Also widely used on mobile technology: SymTorrent, Direct Connect Torrent, MobileDC, etc.  Sharing computational power:  HW mainly shared resources for problem solving or complex calculations  Examples: SETI@Home, GIMPS, 18/04/2010 Distributed.net, FightAIDS@Home. 19
  • 20. Future developments -1 Use innovative P2P  P2P TV  For the diffusion of high data streams generated in real time  Using trasmission bandwidth of individual users  Not require server performance  Requires that individual users are provided with high bandwidth connections in both reception and trasmission (saturation bandwidth provided by the 18/04/2010 server) 20
  • 21. Future developments -2  The Server serves as the index, synchronizes the various users sharing the bandwidth and provides the data flow and initial users share  So, although in practice a server, after supplying the initial data flow and have put in communication the various users, the server is not interested in the communication becomes totally P2P systems  Large companies are experimenting with the possibility of offering paid content 18/04/2010 21
  • 22. Future developments -3 Limits on the dissemination P2PTV Systems are:  Technical problems (diffusion asymmetrical Internet lines, ADSL)  Reliability problems  Legal issues 18/04/2010 22
  • 23. Future developments -4 Simulator epidemic protocols  University of Bologna is experimenting with new P2P applications simulator edpidemic protocols for the study of issues of scale and dynamism that characterize the moderm information systems 18/04/2010 23
  • 24. Future developments -5  There protocols are able to put in communication between their various terminals. Such protocols are characterized by large scale and high dynamics.  The simulator is built from components that enable rapid prototyping of communication protocols by combining different data blocks 18/04/2010 24
  • 25. Future developments -6 Using P2P Networks for mobile technologies  System devised by TerraNet AB (Swedish company)  Allows:  Local phone calls and send messages (2-20 km)  Make calls to anyone with Internet access TerraNet  VoIP calls free long distance 18/04/2010 25
  • 26. Future developments -7  TerraNet integrated with technology every type of mobile device becomes a wireless communication  It works via P2P wireless network (mesh network) and no need for base stations, antenna installations or infrastructure 18/04/2010 26
  • 27. Future developments -8 Benefits Weaknesses  For areas of the world  Phone companies where you make obviously do not like expensive trasmission the idea infrastructure (Africa,  Political issues South America, etc)  Elimination communications costs  Greater privacy 18/04/2010 27
  • 28. Conclusions -1 Network congestion and bandwidth throlling  Phenomenon increasingly attributed to P2P systems  Many provider have chosen to use the bandwidth throlling:  System that cuts the available bandwidth, especially when using P2P systems  Often the users knows nothing!  For example Fastweb, Vodafone (mobile), Alice e Tiscali 18/04/2010  Less opposed P2P systems  Libero e Tele2 28
  • 29. Conclusions -2  But the new version of uTorrent apparently meets the needs of the ISP.  uTorrent :  Limiting network congestion, thus helping Internet Provider  The concept consists of a uTP: magnification Bittorrent protocol  uTP allow clients to automatically find any blocks of the network (rule bandwidth requirements and improves the connections) 18/04/2010 29
  • 30. Conclusions -3  Version of uTorrent with uTP is still in beta (Nov, 2009) but already is showing positive results  Good thing for us users  Providers would no longer decide on the bandwidth limitation! 18/04/2010 30
  • 31. Web Bibliography 1. http://en.wikipedia.org/wiki/Peer_to_peer 2. http://it.wikipedia.org/wiki/P2P_TV 3. http://it.wikipedia.org/wiki/Legge_italiana_sul_peer-to-peer 4. http://www.p2pitalia.com/ 5. http://www.lastampa.it/redazione/cmsSezioni/economia/200805articoli/32454gira ta.asp 6. http://www.megalab.it/4061/il-peer-to-peer-fa-bene-all-economia 7. http://setiathome.berkeley.edu/ 8. http://www.mersenne.org/ 9. http://www.distributed.net/ 10. http://fightaidsathome.scripps.edu/ 11. http://www.cs.unibo.it/bison/ 12. http://www.terranet.se/index.php?option=com_content&task=category&sectionid =9&id=18&Itemid=51 18/04/2010 31
  • 32. Bibliography  G. Pascuzzi, Il diritto dell’era digitale. Tecnologie informatiche e regole privatistiche, II edizione, Il Mulino, Bologna, 2006  Shapiro e Varian, Information Rules. A strategic Guide to the Network Economy. I edizione, Etas, Novembre 1999.  Slide Corso Telecomunicazioni (dott. Zorat)  Slide Corso Diritto Privato dell’Informatica (dott. Caso) 18/04/2010 32