Three short case studies



Similar documents
Protocols. Packets. What's in an IP packet

The Challenges of Stopping Illegal Peer-to-Peer File Sharing

P2P: centralized directory (Napster s Approach)

Peer-to-Peer Networks Status th Week

Skype network has three types of machines, all running the same software and treated equally:

Professor Yashar Ganjali Department of Computer Science University of Toronto.

Network Applications

Equipment Needed. Connecting to the Internet

Guidance Regarding Skype and Other P2P VoIP Solutions

Copyright (Infringing File Sharing) Amendment Bill further glossary of terms relating to File Sharing and the Digital Environment

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

P2P Filesharing Population Tracking Based on Network Flow Data

An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol

INSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAW

How To Use A Phone Over Ip (Phyto) For A Phone Call

OVERVIEW OF ALL VOIP SOLUTIONS

Computer System Management: Hosting Servers, Miscellaneous

From Centralization to Distribution: A Comparison of File Sharing Protocols

TLS and SRTP for Skype Connect. Technical Datasheet

Online music distribution Core-Edge Working Group Meeting, September 28-29, 2004 Natalie Klym Research Associate, MIT CFP

N6Lookup( title ) Client

PEER-TO-PEER NETWORK

The Algorithm of Sharing Incomplete Data in Decentralized P2P

Internet Security. Prof. Anja Feldmann, Ph.D.

VoIP over P2P networks

Biological Sciences Computer Systems

Peer-to-Peer Networks Organization and Introduction 1st Week

Distributed Systems. 2. Application Layer

Lecture 28: Internet Protocols

Peer to Peer File Sharing and Copyright Infringement Policy

The Future of IP. As value shifts from connectivity to content

Peer-to-peer filetransfer protocols and IPv6. János Mohácsi NIIF/HUNGARNET TF-NGN meeting, 1/Oct/2004

CGHub Client Security Guide Documentation

Peer-to-Peer Networks. Chapter 2: Initial (real world) systems Thorsten Strufe

Wireless systems. Radio. how radio works radio spectrum allocation examples. tradeoffs. non-technical issues

How To Block Skype

Table of Contents. Cisco Blocking Peer to Peer File Sharing Programs with the PIX Firewall

Skype characteristics

CSCI-1680 CDN & P2P Chen Avin

3. Some of the technical measures presently under consideration are methods of traffic shaping, namely bandwidth capping and bandwidth shaping 2.

The Role of Internet Service Providers in Stopping Internet Copyright Infringement. Jennie Ness Regional IP Attaché U.S. Commercial Service

Computer Networks. Examples of network applica3ons. Applica3on Layer


Common VoIP problems, How to detect, correct and avoid them. Penny Tone LLC 1

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?

Alexandre Weffort Thenorio - Data. IP-Telephony

VoIP Glossary. Client (Softphone client): The software installed in the userâ s computer to make calls over the Internet.

Peer-to-Peer File Sharing

TECHNICAL CHALLENGES OF VoIP BYPASS

NineStar Connect MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION. Policy Statement:

Unit 3 - Advanced Internet Architectures

Multicast vs. P2P for content distribution

COPYRIGHT, PEER-TO-PEER FILE SHARING AND DMCA SUBPOENAS

An Introduction to VoIP Protocols

Best Practices for Controlling Skype within the Enterprise. Whitepaper

Chapter 5. Data Communication And Internet Technology

APTA TransiTech Conference Communications: Vendor Perspective (TT) Phoenix, Arizona, Tuesday, VoIP Solution (101)

Skype Connect Requirements Guide

Lab Testing Summary Report

Introduction Chapter 1. Uses of Computer Networks

VIRUS TRACKER CHALLENGES OF RUNNING A LARGE SCALE SINKHOLE OPERATION

Voice over IP Basics for IT Technicians

Request for Comments on Section 1201(g) of the Digital Millennium Copyright Act COMMENTS OF THE COMPUTER & COMMUNICATIONS INDUSTRY ASSOCIATION (CCIA)

PEER-TO-PEER FILE SHARING POLICY

SSL VPN vs. IPSec VPN

INTERNET CRIMES AGAINST CHILDREN: PEER-TO-PEER TECHNOLOGIES WEBCAST

SSL A discussion of the Secure Socket Layer

Application Note. Network Optimization with Exinda Optimizer

Security Policy Revision Date: 23 April 2009

Network Simulation Traffic, Paths and Impairment

The Bottom Line on Information Technology Use and, in particular, File-Sharing at Immaculata University

Skype VoIP service- architecture and comparison

Best Practices for Controlling Skype within the Enterprise > White Paper

Overlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004.

Goal We want to know. Introduction. What is VoIP? Carrier Grade VoIP. What is Meant by Carrier-Grade? What is Meant by VoIP? Why VoIP?

Chakchai So-In, Ph.D.

Ringling College of Art and Design

Chapter 7 Transport-Level Security

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Principles of Network Applications. Dr. Philip Cannata

VoIP Security. Seminar: Cryptography and Security Michael Muncan

Calling All Countries: The VoIP Revolution is Here!

4. H.323 Components. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19

Peer-to-peer networking. Jupiter Research

ResNet Guide. Information & Learning Services. Here to support your study and research

Layered protocol (service) architecture

1.4 To overcome this biasness, this Policy is in place to ensure all Maxis customers have a good experience.

CS 360 Internet Programming

Voice over IP (VoIP) Basics for IT Technicians

Voice over Internet Protocol. Kristie Prinz. The Prinz Law Office

HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009

Early technology: Communications and networking. The Internet. Telephone system (Alexander Graham Bell, 1876) Local Area Networks

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

The Internet is Flat: A brief history of networking over the next ten years. Don Towsley UMass - Amherst

VPN. Date: 4/15/2004 By: Heena Patel

A Survey of Peer-to-Peer Network Security Issues

Peer-to-Peer Networks

Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream

VoIP P2P: breakthrought technology, lot of hype (after Skype) but which business impacts at the end?

Transcription:

Three short case studies peer to peer networking wireless systems search engines each includes issues of hardware processors, storage, peripherals, networks,... representation of information, analog vs. digital, bits & bytes software applications, operating system, client-server and peer to peer organization of information, file systems,... algorithms: searching, sorting, compression communications, Internet, Web, TCP/IP, protocols bandwidth, speed, caching compression, error detection and correction security and privacy; cryptography intellectual property and ownership social & legal & policy concerns

Peer to peer networking direct connections between peers distributed instead of clients talking to single server all clients provide bandwidth, storage, processing "peer-to-peer" file-sharing centralized directories (original Napster in 1999) decentralized directories (Gnutella, Kazaa, Limewire, Morpheus, etc.) once a file is found somewhere set up direct connection between supplier and consumer ("peers") applications typically use TCP/IP (analogous to HTTP, SSH, SMTP, etc.) other examples BitTorrent file distribution system (2001) Skype Internet telephony (2003) [hybrid] Bitcoin digital money (2009)

BitTorrent file-sharing for big files in high demand original file exists on at least one "seed" site "tracker" server knows who has what pieces coordinates all transfers but does not have any of the file contents clients download blocks of file from multiple sources in parallel blocks have cryptographic checksum to verify correct content downloaded blocks also then uploaded to others download rate limited by upload rate: have to contribute tracker knows download and upload statuses balances traffic, favors sites that are cooperating blocks reassembled by client when client has the whole file, it can be a seed for further transfers much faster than single server for right kind of use less vulnerable to flash crowds but takes time to get started, can't do streaming, etc.

Internet telephony Voice over IP package speech in IP packets may connect to public telephone network on each end strict requirements on delay (latency), jitter (variable delay), error handling, etc. lots of commercial providers (AT&T, Comcast, Verizon, Vonage,...) alternative to conventional telephone service Skype: peer to peer VoIP 256-bit AES to encrypt each call, RSA to establish AES session key proprietary protocol, uses both TCP and UDP it can use your computer as a supernode (like Kazaa) Skype bought by ebay 10/05 for $2.5B, sold again 11/09 for $2B bought by Microsoft 10/11 for $8.5B

Technology meets law/policy/economics/politics should there be laws controlling peer to peer technology? should content providers like RIAA be permitted to install search (& destroy) software on home computers? should universities be required to enforce file-sharing laws? should VoIP be regulated by the FCC? should VoIP suppliers have to provide services like 911? should VoIP suppliers pay taxes and fees, and for connectivity to public telephone network? should VoIP calls be subject to wire-tapping laws like regular phones? should common carriers like Verizon be permitted to discriminate against traffic from competitors like other VoIP suppliers? should there be different prices and policies for different kinds of traffic?

Copyright protects expression, not idea duration used to be 17 years + one renewal now life + 70 years, or 95 years for commercial works (the "Mickey Mouse Protection Act", 1998) "fair use" permits limited copying under some circumstances criticism, comment, scholarship, research, news reporting, teaching uncertain what fair use really is -- case by case decisions considerations: purpose and character of the use nature of the copyrighted work amount and substantiality of the portion used effect of the use on potential market or value of the copyrighted work recent copyright laws may prevent some fair uses can't decrypt to make excerpt for teaching or criticism can't reverse engineer to make copies in different media

DMCA: Digital Millennium Copyright Act (1998) US copyright law: www.copyright.gov/title17, Chapter 12 anticircumvention: illegal to circumvent a technological measure protecting access to or copying of a copyrighted work limited exceptions for reverse engineering for interoperability, encryption research, security testing illegal to remove or alter copyright notices and management information "safe harbor": protects ISPs from copyright infringement claims if they follow notice and takedown procedures

DMCA test cases Grokster peer to peer software makes copyright infringement easy; are its distributors violating the DMCA? Diebold internal emails reveal flaws in voting machine software; is posting of the emails a violation of DMCA? SDMI does demonstration of how to remove digital watermarking on audio files violate DMCA? Lexmark cryptography used to prevent 3rd parties from supplying replacement ink cartridges; is reverse engineering a violation of DMCA? Viacom v Google YouTube shows numerous copyrighted clips; is it sufficient that Google responds to individual takedown notices? DeCSS Content Scrambling System protects DVDs from copying; does publication of code to defeat it violate DMCA?