peer to peer
DESCRIPTION
Peer to Peer. David Strom, [email protected] PC Expo/ eBiz presentations June 2001. Summary. What is P2P? Learning from Napster, Groove Business models Motivations for using P2P Technology examples Corporate strategies. What is P2P?. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Peer to Peer](https://reader036.vdocuments.site/reader036/viewer/2022062409/56815051550346895dbe527e/html5/thumbnails/1.jpg)
(c) David Strom Inc. 2001 1
Peer to Peer
David Strom, [email protected]
PC Expo/ eBiz presentations
June 2001
![Page 2: Peer to Peer](https://reader036.vdocuments.site/reader036/viewer/2022062409/56815051550346895dbe527e/html5/thumbnails/2.jpg)
(c) David Strom Inc. 2001 2
Summary
• What is P2P?
• Learning from Napster, Groove
• Business models
• Motivations for using P2P
• Technology examples
• Corporate strategies
![Page 3: Peer to Peer](https://reader036.vdocuments.site/reader036/viewer/2022062409/56815051550346895dbe527e/html5/thumbnails/3.jpg)
(c) David Strom Inc. 2001 3
What is P2P?
• Sharing computing resources, such as files, CPU cycles, and applications
• Apps are both server and client on a distributed network
• Makes some use of Internet protocols/standards
![Page 4: Peer to Peer](https://reader036.vdocuments.site/reader036/viewer/2022062409/56815051550346895dbe527e/html5/thumbnails/4.jpg)
(c) David Strom Inc. 2001 4
Examples of P2P technologies
• Simplest example is Windows/Mac built-in file sharing: remember WfW?
• Napster/Gnutella/Aimster/etc.
• Chat products like ICQ, AIM, Bantu, OMNI, etc.
![Page 5: Peer to Peer](https://reader036.vdocuments.site/reader036/viewer/2022062409/56815051550346895dbe527e/html5/thumbnails/5.jpg)
(c) David Strom Inc. 2001 5
Other examples
• Seti@Home (search for ET)• Globus.org (distributed science)• McAfee ASAP (anti-virus protection)• Lightshare (desktop auctions) • Groove Networks (P2P Notes)• Uroam (remote access)• Roku, VxPort (file sharing) • OpenCola (info collection)
![Page 6: Peer to Peer](https://reader036.vdocuments.site/reader036/viewer/2022062409/56815051550346895dbe527e/html5/thumbnails/6.jpg)
(c) David Strom Inc. 2001 6
How does P2P leverage the existing Internet infrastructure?
• Builds on ftp, http, etc. so can pass information freely through routers and firewalls
• Doesn’t require new domain name services or other authentication processes
• May make use of email and chat protocols as well• No specialized knowledge to setup new servers
and services• No network administrators and other IT resources
involved
![Page 7: Peer to Peer](https://reader036.vdocuments.site/reader036/viewer/2022062409/56815051550346895dbe527e/html5/thumbnails/7.jpg)
(c) David Strom Inc. 2001 7
What is Napster?
• Easy to share digital music files
• Uses http and ftp protocols
• Each user's PC acts as client and server
• It creates a community of users with common goals and interests
• It builds upon P2P services to increase the overall value of the system
![Page 8: Peer to Peer](https://reader036.vdocuments.site/reader036/viewer/2022062409/56815051550346895dbe527e/html5/thumbnails/8.jpg)
(c) David Strom Inc. 2001 8
How did we obtain music before?
• Go to record store
• Deal with surly underaged clerks
• Try to find the right CD
• Take it home, play on our stereos
![Page 9: Peer to Peer](https://reader036.vdocuments.site/reader036/viewer/2022062409/56815051550346895dbe527e/html5/thumbnails/9.jpg)
(c) David Strom Inc. 2001 9
Enter MP3 downloads
• Locate an ftp server with music on it
• Try to connect to the server (often busy)
• Upload a few songs first
• Then hopefully find the right song and download it
• And much more work to host your own music ftp server!
![Page 10: Peer to Peer](https://reader036.vdocuments.site/reader036/viewer/2022062409/56815051550346895dbe527e/html5/thumbnails/10.jpg)
(c) David Strom Inc. 2001 10
Problems with the old method
• ftp sites often busy
• Had to learn the ins and outs of ftp client software
• Uploading requirement was onerous
• Search tools crude, could often only find ftp sites, not songs
• Setting up servers painful too.
![Page 11: Peer to Peer](https://reader036.vdocuments.site/reader036/viewer/2022062409/56815051550346895dbe527e/html5/thumbnails/11.jpg)
(c) David Strom Inc. 2001 11
Shirky’s list of lessons learned from Napster
• Centralize what you need to make your business model work
• A poor user interface isn’t an issue, especially if people can still get things done
• It routes around network admins/firewalls
• It allows people to create their own namespaces without specialized knowledge
![Page 12: Peer to Peer](https://reader036.vdocuments.site/reader036/viewer/2022062409/56815051550346895dbe527e/html5/thumbnails/12.jpg)
(c) David Strom Inc. 2001 12
How do you share info now?
• Mydocsonline or similar “Internet hard disk”
• PGP secure email, maybe
• Yahoo Calendars or similar
• WebAddressBook.com
• Maybe even a web-based Office suite like TeamOn, FreeDesk or Blox
![Page 13: Peer to Peer](https://reader036.vdocuments.site/reader036/viewer/2022062409/56815051550346895dbe527e/html5/thumbnails/13.jpg)
(c) David Strom Inc. 2001 13
Problems
• Motley collection difficult to manage• Not everyone is willing to work with
multiple tools• Authentication is difficult – multiple logins• Still need to download lots of software,
despite “100 % browser” emphasis• Tiresome email exchanges of documents• Security by obscurity
![Page 14: Peer to Peer](https://reader036.vdocuments.site/reader036/viewer/2022062409/56815051550346895dbe527e/html5/thumbnails/14.jpg)
(c) David Strom Inc. 2001 14
Enter Groove Networks
• Authentication is always on• Different workspaces for different collections
of people• Setup is easy• No browser, email file swapping needed• Supports a wide variety of tools and
information sharing models• Great for sharing files between home and work
PCs
![Page 15: Peer to Peer](https://reader036.vdocuments.site/reader036/viewer/2022062409/56815051550346895dbe527e/html5/thumbnails/15.jpg)
(c) David Strom Inc. 2001 15
How distributed does your network have to be?
• Napster: central server to authenticate and track users
• Gnutella: everything is distributed
• Aimster: uses AOL IM directory to authenticate/track users
![Page 16: Peer to Peer](https://reader036.vdocuments.site/reader036/viewer/2022062409/56815051550346895dbe527e/html5/thumbnails/16.jpg)
(c) David Strom Inc. 2001 16
What business models make sense?
• Advertising
• User charges
• Corporate site licenses
• Core technology licenses
• ISP/ASP volume purchases
![Page 17: Peer to Peer](https://reader036.vdocuments.site/reader036/viewer/2022062409/56815051550346895dbe527e/html5/thumbnails/17.jpg)
(c) David Strom Inc. 2001 17
Dale Dougherty’s thoughts on business models
“All the P2P players are hoping that their research leads them to establish a new way of doing things. At that point, the winner will be obvious and the business model will be crystal clear.”
![Page 18: Peer to Peer](https://reader036.vdocuments.site/reader036/viewer/2022062409/56815051550346895dbe527e/html5/thumbnails/18.jpg)
(c) David Strom Inc. 2001 18
Signs that P2p is maturing
• Porn industry file swapping services (PornDigger, PORN.com)
• Already seeing downside articles in the press
![Page 19: Peer to Peer](https://reader036.vdocuments.site/reader036/viewer/2022062409/56815051550346895dbe527e/html5/thumbnails/19.jpg)
(c) David Strom Inc. 2001 19
Motivations for implementing P2P
• Add intelligence to network edge devices
• Convenience and control
• Altruism
• Free up bandwidth
![Page 20: Peer to Peer](https://reader036.vdocuments.site/reader036/viewer/2022062409/56815051550346895dbe527e/html5/thumbnails/20.jpg)
(c) David Strom Inc. 2001 20
Motivations: the network edge
• Right now network edge devices are underused or dumb when it comes to working with the network fabric itself
• P2P adds intelligence, increased utilization at the edge
• Makes it easier for people to get more work done, just like c. 1981 PCs
![Page 21: Peer to Peer](https://reader036.vdocuments.site/reader036/viewer/2022062409/56815051550346895dbe527e/html5/thumbnails/21.jpg)
(c) David Strom Inc. 2001 21
Controlling your own network destiny
• Ask your IT department for the capability to have real-time conversations with Internet users directly from your PC, that you wanted this set up within the hour, and that you had no budget for it.
• Now imagine being laughed out of the room. (from Shirky)
![Page 22: Peer to Peer](https://reader036.vdocuments.site/reader036/viewer/2022062409/56815051550346895dbe527e/html5/thumbnails/22.jpg)
(c) David Strom Inc. 2001 22
Advantages of ICQ
• No need for setting up IP addresses, DNS configuration, firewall rules, web server hosting co-location agreements, IT policy pronouncements, lengthy approvals up the IT command structure, IT R&D review, IT rollouts, …
• Do you detect a pattern here?
![Page 23: Peer to Peer](https://reader036.vdocuments.site/reader036/viewer/2022062409/56815051550346895dbe527e/html5/thumbnails/23.jpg)
(c) David Strom Inc. 2001 23
Motivations: convenience and control
• Stress-testing web sites over the Internet, from Exodus/United Devices
• Shared-processing model frees up resources in their test lab for other projects, also provides more realism for test scenarios
![Page 24: Peer to Peer](https://reader036.vdocuments.site/reader036/viewer/2022062409/56815051550346895dbe527e/html5/thumbnails/24.jpg)
(c) David Strom Inc. 2001 24
Motivations: altruism
“My goal was to harness wasted CPU cycles that to me were just warming the air. I also liked the fact that I would be participating in an interesting community and doing some good science." -- SETI user
![Page 25: Peer to Peer](https://reader036.vdocuments.site/reader036/viewer/2022062409/56815051550346895dbe527e/html5/thumbnails/25.jpg)
(c) David Strom Inc. 2001 25
Motivations: bandwidth
• McAfee ASAP uses P2P to download virus pattern files from local users, saving on wide-area connections
• The more you distribute the network, the less bandwidth you need from any centralized locations
![Page 26: Peer to Peer](https://reader036.vdocuments.site/reader036/viewer/2022062409/56815051550346895dbe527e/html5/thumbnails/26.jpg)
(c) David Strom Inc. 2001 26
Drawbacks to P2P
• Security loopholes
• Loss of control over desktop activities
• Some companies don’t like to share and play with others
![Page 27: Peer to Peer](https://reader036.vdocuments.site/reader036/viewer/2022062409/56815051550346895dbe527e/html5/thumbnails/27.jpg)
(c) David Strom Inc. 2001 27
Corporate strategies
• Download and try Napster or uRoam• Compare with downloading music or
PC/Anywhere for functionality• Examine your own programs for file transfer
components that could benefit from peering• Examine whether you can benefit from shared
processing models • Setup a trial Groove workgroup and project team
![Page 28: Peer to Peer](https://reader036.vdocuments.site/reader036/viewer/2022062409/56815051550346895dbe527e/html5/thumbnails/28.jpg)
(c) David Strom Inc. 2001 28
Places for more information
• O’Reilly P2P conference: www.openP2P.com/pub/a/P2P/conference/
• My review of Groove: strom.com/pubwork/varbiz.html