SlideShare a Scribd company logo
Università degli Studi di Trento
            Facoltà di Economia
Corso di Laurea Specialistica in Net-Economy
         Corso di Telecomunicazioni

               Nicola Cerami
Index
  What is P2P and    Security and
   History             Privacy issues
  Architecture of    Economic issues
   P2P systems        Applications of
  Advantages and      use
   weaknesses of      Future
   P2P Networks        developments
  Legal issues
18/04/2010                               2
What is Peer-to-Peer-1
 Is any distribuited network architecture
    composed of partecipants that make a portion
    of their resources, such as:

              Processing power
              Disk storage

              Network bandwith



 Directly available to other network
    partecipants
18/04/2010                                         3
What is Peer-to-Peer-2
  Each Peer (usually workstation) has
     equivalent capabilities and responsabilities

  Peer are both suppliers and consumers of
     resources, in contrast to the traditional client-
     server model




18/04/2010                                               4
What is Peer-to-Peer-3




18/04/2010                     5
What is Peer-to-Peer-4




18/04/2010                     6
History
  1999: first software dedicated to P2P is
     Napster (Fanning)

  Spread broadband and ADSL Flat increasingly
     accessible

  A growing success


  Today, huge numer of P2P Systems

18/04/2010                                       7
Architecture of P2P
                   systems

 1. Centralized architecture


 2. Distributed architecture, or pure


 3. Mixed or hybrid architecture

18/04/2010                              8
Centralized
 Networks
  Using on the one hand central server(s) or
     bootstrapping mechanisms (e.g. eDonkey
     network).

  Central Server:
     Makes communicating between peers
     Controls the interaction between clients
     Contains no data
18/04/2010                                       9
Distributed
  Architecture
 There is no central server managing the
     network
   Peers act as equals, merging the roles of
     clients and server
   Many access points
   P2P systems for file sharing using this
     architecture often
   You must install software P2P (e.g Gnutella
     protocol, Freenet protocol)
18/04/2010                                        10
Hybrid P2P Networks
 Mix of centralized architecture and decentralized
  architecture
 Distribute their clients into two groups:


    Clients nodes
    Overlay nodes


 Tipically, each client is able to act according to the
     momentary need of the network and can become
     part of the respective overlay network used to
     coordinate the P2P structure (e.g. Gnutella
     protocol).
18/04/2010                                         11
Advantages and weaknesses
      of P2P Networks
             Advantages            Weaknesses
  All clients provide       Not guarantee the
   resources (Bandwidth,        quality of service
   Storage space,              It is not easy to
   Computing power)             retrieve information of
  Ease of administration       interest
  Not require major           Reliability Data
   infrastructure              Security
  Extreme tolerance in        Legal issues
   the event of failure

18/04/2010                                                12
Legal issues-1
  The legal framework of reference is appointed
     to regulate the c.d. copyright

  Italian law:
     Act 22 Aprile 1941, n. 633 amended several
      times
     Dilemma law not legal P2P systems
     Art. 171: “anyone who is punisched does not
      qualify, for any purpose and in any form”

  Limit of the law illegal file sharing
18/04/2010                                          13
Legal issues-2
 European level
    Directive 2001/29/CE of the European
     Parlament and Council (May 2001)
    Telecom package approved by the European
     Parlament (Nov 2009)
    Sarkozy’s Doctrine


   United States
        Copyright: Title 17 of the Unites States Code
        Violations  Federal crimes
        Exceptions  educational and scientific
18/04/2010
           purposes                                      14
Security issues
  Fundamental use of antivirus, firewall,
     cleaning log files and removal of infectious
     agents (virus, spyware, trojan, malware).

  Attacks that a client can be, for example:

       Using file sharing systems
       Sharing an area of your disk
       It allows free access to certain ports on your
             computer
18/04/2010                                               15
Privacy issues
  Protecting sensitive data (personal, business)
     throught the adoption of:

       A network of anonymous
       Install SW such as PeerGuardian
       Encryption and obfuscation protocol
       A proxy for connection of the client’s real IP
        mask
       ect..

18/04/2010                                               16
Economic issues -1
  New ways to access resources SW and HW
  Strongly dependent on the market that
   produces use-value
  A study commissioned by the Dutch
   goverment(2009):

    “P2P Systems are good for the economy”



18/04/2010                                   17
Economic issues -2
  New ethnic workers (knowledge workers)
  Used to solve management problems, improve
   communication between companies but also
   within the same
  Greater sharing of know-how
  Faster data trasmission than traditional
   networks (client-server)
  Less server overload




18/04/2010
              COMPETITIVE ADVANTAGE           18
Applications of use
 Often used for file sharing:
   More Applications: Napster, Gnutella, FastTrack,
    BitTorrent, Direct Connect, eDonkey, Kademila,
    etc.
   Also widely used on mobile technology:
    SymTorrent, Direct Connect Torrent, MobileDC,
    etc.

   Sharing computational power:
        HW mainly shared resources for problem
           solving or complex calculations
        Examples: SETI@Home, GIMPS,
18/04/2010 Distributed.net, FightAIDS@Home.            19
Future developments -1
Use innovative P2P  P2P TV

    For the diffusion of high data streams generated in
     real time

    Using trasmission bandwidth of individual users


    Not require server performance


    Requires that individual users are provided with
           high bandwidth connections in both reception and
           trasmission (saturation bandwidth provided by the
18/04/2010 server)                                             20
Future developments -2
  The Server serves as the index, synchronizes the
     various users sharing the bandwidth and provides
     the data flow and initial users share

  So, although in practice a server, after supplying
     the initial data flow and have put in
     communication the various users, the server is
     not interested in the communication becomes
     totally P2P systems

  Large companies are experimenting with the
     possibility of offering paid content
18/04/2010                                              21
Future developments -3
      Limits on the dissemination P2PTV
       Systems are:

       Technical problems (diffusion
       asymmetrical Internet lines, ADSL)
       Reliability problems
       Legal issues



18/04/2010                                  22
Future developments -4
 Simulator epidemic protocols

  University of Bologna is experimenting with
     new P2P applications simulator edpidemic
     protocols for the study of issues of scale and
     dynamism that characterize the moderm
     information systems




18/04/2010                                            23
Future developments -5
  There      protocols are able to put in
     communication      between     their   various
     terminals. Such protocols are characterized by
     large scale and high dynamics.

  The simulator is built from components that
     enable rapid prototyping of communication
     protocols by combining different data blocks


18/04/2010                                          24
Future developments -6
 Using P2P Networks for mobile technologies

  System devised by TerraNet AB (Swedish
   company)
  Allows:
     Local phone calls and send messages (2-20
      km)
     Make calls to anyone with Internet access
      TerraNet
     VoIP calls free long distance

18/04/2010                                        25
Future developments -7
  TerraNet integrated with technology every
   type of mobile device becomes a wireless
     communication

  It works via P2P wireless network (mesh
     network) and no need for base stations,
     antenna installations or infrastructure



18/04/2010                                     26
Future developments -8
             Benefits               Weaknesses


  For areas of the world     Phone companies
   where you make              obviously do not like
   expensive trasmission       the idea
   infrastructure (Africa,    Political issues
   South America, etc)
  Elimination
   communications costs
  Greater privacy

18/04/2010                                             27
Conclusions -1
 Network congestion and bandwidth
  throlling

  Phenomenon increasingly attributed to P2P
   systems
  Many provider have chosen to use the
   bandwidth throlling:
                System that cuts the available bandwidth, especially
                 when using P2P systems
                Often the users knows nothing!
                For example Fastweb, Vodafone (mobile), Alice e
                 Tiscali
18/04/2010      Less opposed P2P systems  Libero e Tele2            28
Conclusions -2
  But the new version of uTorrent apparently
   meets the needs of the ISP.
  uTorrent :
       Limiting network congestion, thus helping
        Internet Provider
       The concept consists of a uTP: magnification
        Bittorrent protocol
       uTP allow clients to automatically find any
        blocks of the network (rule bandwidth
        requirements and improves the connections)

18/04/2010                                             29
Conclusions -3
  Version of uTorrent with uTP is still in beta (Nov,
     2009) but already is showing positive results

  Good thing for us users



  Providers would no longer decide on the bandwidth
     limitation!


18/04/2010                                               30
Web Bibliography
 1.     http://en.wikipedia.org/wiki/Peer_to_peer
 2.     http://it.wikipedia.org/wiki/P2P_TV
 3.     http://it.wikipedia.org/wiki/Legge_italiana_sul_peer-to-peer
 4.     http://www.p2pitalia.com/
 5.     http://www.lastampa.it/redazione/cmsSezioni/economia/200805articoli/32454gira
        ta.asp
 6.     http://www.megalab.it/4061/il-peer-to-peer-fa-bene-all-economia
 7.     http://setiathome.berkeley.edu/
 8.     http://www.mersenne.org/
 9.     http://www.distributed.net/
 10.    http://fightaidsathome.scripps.edu/
 11.    http://www.cs.unibo.it/bison/
 12.    http://www.terranet.se/index.php?option=com_content&task=category&sectionid
        =9&id=18&Itemid=51
18/04/2010                                                                              31
Bibliography
  G. Pascuzzi, Il diritto dell’era digitale. Tecnologie
   informatiche e regole privatistiche, II edizione, Il
   Mulino, Bologna, 2006
  Shapiro e Varian, Information Rules. A strategic Guide
   to the Network Economy. I edizione, Etas, Novembre
   1999.
  Slide Corso Telecomunicazioni (dott. Zorat)
  Slide Corso Diritto Privato dell’Informatica (dott.
   Caso)

18/04/2010                                                  32
Peer to peer Networks

More Related Content

What's hot

Storage Area Network(SAN)
Storage Area Network(SAN)Storage Area Network(SAN)
Storage Area Network(SAN)Krishna Kahar
 
Advance Networking Course Details PPT
Advance Networking Course Details PPTAdvance Networking Course Details PPT
Advance Networking Course Details PPT
PSK Technolgies Pvt. Ltd. IT Company Nagpur
 
COMPED9 Module 4 Network Connectivity
COMPED9 Module 4 Network ConnectivityCOMPED9 Module 4 Network Connectivity
COMPED9 Module 4 Network Connectivity
Jeremy Flores
 
Client Server Network By Usman Ihsan
Client Server Network By Usman IhsanClient Server Network By Usman Ihsan
Client Server Network By Usman Ihsan
Subhan_Virk_UAF
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
QaswarBosan
 
Peer to-peer networks
Peer to-peer networksPeer to-peer networks
Peer to-peer networks
Nkosinathi Lungu
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
Sagar Rai
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
Ashita Agrawal
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
Sourav Roy
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
Ankur Kumar
 
what is Private and publis ip address
what is Private and publis ip addresswhat is Private and publis ip address
what is Private and publis ip address
Amit Kumar , Jaipur Engineers
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
Manjit Chavda
 
Basics of computer networks
Basics of computer networksBasics of computer networks
Basics of computer networks
Rubal Sagwal
 
TCP IP Model | Computer Science
TCP IP Model | Computer ScienceTCP IP Model | Computer Science
TCP IP Model | Computer Science
Transweb Global Inc
 
Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer network
Trinity Dwarka
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission media
Manish8976
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
Kathirvel Ayyaswamy
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
rahul kapoliya
 

What's hot (20)

Storage Area Network(SAN)
Storage Area Network(SAN)Storage Area Network(SAN)
Storage Area Network(SAN)
 
Advance Networking Course Details PPT
Advance Networking Course Details PPTAdvance Networking Course Details PPT
Advance Networking Course Details PPT
 
COMPED9 Module 4 Network Connectivity
COMPED9 Module 4 Network ConnectivityCOMPED9 Module 4 Network Connectivity
COMPED9 Module 4 Network Connectivity
 
Client Server Network By Usman Ihsan
Client Server Network By Usman IhsanClient Server Network By Usman Ihsan
Client Server Network By Usman Ihsan
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
 
Peer to-peer networks
Peer to-peer networksPeer to-peer networks
Peer to-peer networks
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
Networking (2)
Networking (2)Networking (2)
Networking (2)
 
what is Private and publis ip address
what is Private and publis ip addresswhat is Private and publis ip address
what is Private and publis ip address
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 
Network operating system
Network operating systemNetwork operating system
Network operating system
 
Basics of computer networks
Basics of computer networksBasics of computer networks
Basics of computer networks
 
TCP IP Model | Computer Science
TCP IP Model | Computer ScienceTCP IP Model | Computer Science
TCP IP Model | Computer Science
 
Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer network
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission media
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
 

Similar to Peer to peer Networks

OttawaSubmission.072809
OttawaSubmission.072809OttawaSubmission.072809
OttawaSubmission.072809Eric Klinker
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
jajinekkanti
 
MPEG-21 Digital Items in Research and Practice
MPEG-21 Digital Items in Research and PracticeMPEG-21 Digital Items in Research and Practice
MPEG-21 Digital Items in Research and PracticeAlpen-Adria-Universität
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of Iots
Samantha Randall
 
Basics of Computer Networks
Basics of Computer NetworksBasics of Computer Networks
Basics of Computer Networks
IndrajaMeghavathula
 
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Paolo Nesi
 
chapter15.ppt
chapter15.pptchapter15.ppt
chapter15.ppt
AdityaAggarwal93
 
Peer-to-peer Applications and Impact on ISPs\' Operations 2008.06.04
Peer-to-peer Applications and Impact on ISPs\' Operations 2008.06.04Peer-to-peer Applications and Impact on ISPs\' Operations 2008.06.04
Peer-to-peer Applications and Impact on ISPs\' Operations 2008.06.04
Charles Mok
 
Peer To Peer Content Sharing On Wi-Fi Network For Smart Phones
Peer To Peer Content Sharing On Wi-Fi Network For Smart PhonesPeer To Peer Content Sharing On Wi-Fi Network For Smart Phones
Peer To Peer Content Sharing On Wi-Fi Network For Smart Phones
IOSR Journals
 
Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks
IJECEIAES
 
Peer-to-Peer Communication Service and Messaging System
Peer-to-Peer Communication Service and Messaging SystemPeer-to-Peer Communication Service and Messaging System
Peer-to-Peer Communication Service and Messaging System
Editor IJMTER
 
IoT Lab @COPELABS
IoT Lab @COPELABSIoT Lab @COPELABS
IoT Lab @COPELABS
Rute C. Sofia
 
SECURING DATA TRANSFER IN THE CLOUD THROUGH INTRODUCING IDENTIFICATION PACKET...
SECURING DATA TRANSFER IN THE CLOUD THROUGH INTRODUCING IDENTIFICATION PACKET...SECURING DATA TRANSFER IN THE CLOUD THROUGH INTRODUCING IDENTIFICATION PACKET...
SECURING DATA TRANSFER IN THE CLOUD THROUGH INTRODUCING IDENTIFICATION PACKET...
IJNSA Journal
 
Stripe Tolj's presentation at eComm 2008
Stripe Tolj's presentation at eComm 2008Stripe Tolj's presentation at eComm 2008
Stripe Tolj's presentation at eComm 2008eComm2008
 
Ims content distributionnetworks
Ims content distributionnetworksIms content distributionnetworks
Ims content distributionnetworksReid Chang
 
Copyright Protection in the Internet
Copyright Protection in the InternetCopyright Protection in the Internet
Copyright Protection in the Internet
ipoque
 
A Metadata Model for Peer-to-Peer Media Distribution
A Metadata Model for Peer-to-Peer Media DistributionA Metadata Model for Peer-to-Peer Media Distribution
A Metadata Model for Peer-to-Peer Media DistributionAlpen-Adria-Universität
 
unit 2.pdf
unit 2.pdfunit 2.pdf
unit 2.pdf
SupratimNandi3
 
App for peer-to-peer file transfer
App for peer-to-peer file transferApp for peer-to-peer file transfer
App for peer-to-peer file transfer
IRJET Journal
 

Similar to Peer to peer Networks (20)

OttawaSubmission.072809
OttawaSubmission.072809OttawaSubmission.072809
OttawaSubmission.072809
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
 
MPEG-21 Digital Items in Research and Practice
MPEG-21 Digital Items in Research and PracticeMPEG-21 Digital Items in Research and Practice
MPEG-21 Digital Items in Research and Practice
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of Iots
 
Basics of Computer Networks
Basics of Computer NetworksBasics of Computer Networks
Basics of Computer Networks
 
Internet
InternetInternet
Internet
 
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
 
chapter15.ppt
chapter15.pptchapter15.ppt
chapter15.ppt
 
Peer-to-peer Applications and Impact on ISPs\' Operations 2008.06.04
Peer-to-peer Applications and Impact on ISPs\' Operations 2008.06.04Peer-to-peer Applications and Impact on ISPs\' Operations 2008.06.04
Peer-to-peer Applications and Impact on ISPs\' Operations 2008.06.04
 
Peer To Peer Content Sharing On Wi-Fi Network For Smart Phones
Peer To Peer Content Sharing On Wi-Fi Network For Smart PhonesPeer To Peer Content Sharing On Wi-Fi Network For Smart Phones
Peer To Peer Content Sharing On Wi-Fi Network For Smart Phones
 
Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks
 
Peer-to-Peer Communication Service and Messaging System
Peer-to-Peer Communication Service and Messaging SystemPeer-to-Peer Communication Service and Messaging System
Peer-to-Peer Communication Service and Messaging System
 
IoT Lab @COPELABS
IoT Lab @COPELABSIoT Lab @COPELABS
IoT Lab @COPELABS
 
SECURING DATA TRANSFER IN THE CLOUD THROUGH INTRODUCING IDENTIFICATION PACKET...
SECURING DATA TRANSFER IN THE CLOUD THROUGH INTRODUCING IDENTIFICATION PACKET...SECURING DATA TRANSFER IN THE CLOUD THROUGH INTRODUCING IDENTIFICATION PACKET...
SECURING DATA TRANSFER IN THE CLOUD THROUGH INTRODUCING IDENTIFICATION PACKET...
 
Stripe Tolj's presentation at eComm 2008
Stripe Tolj's presentation at eComm 2008Stripe Tolj's presentation at eComm 2008
Stripe Tolj's presentation at eComm 2008
 
Ims content distributionnetworks
Ims content distributionnetworksIms content distributionnetworks
Ims content distributionnetworks
 
Copyright Protection in the Internet
Copyright Protection in the InternetCopyright Protection in the Internet
Copyright Protection in the Internet
 
A Metadata Model for Peer-to-Peer Media Distribution
A Metadata Model for Peer-to-Peer Media DistributionA Metadata Model for Peer-to-Peer Media Distribution
A Metadata Model for Peer-to-Peer Media Distribution
 
unit 2.pdf
unit 2.pdfunit 2.pdf
unit 2.pdf
 
App for peer-to-peer file transfer
App for peer-to-peer file transferApp for peer-to-peer file transfer
App for peer-to-peer file transfer
 

More from Nicola Cerami

La Reingegnerizzazione dei processi nel settore logistico: Un caso di studio
La Reingegnerizzazione dei processi nel settore logistico: Un caso di studioLa Reingegnerizzazione dei processi nel settore logistico: Un caso di studio
La Reingegnerizzazione dei processi nel settore logistico: Un caso di studioNicola Cerami
 
Progetto per lo sviluppo di un sistema di gestione della conoscenza per il pr...
Progetto per lo sviluppo di un sistema di gestione della conoscenza per il pr...Progetto per lo sviluppo di un sistema di gestione della conoscenza per il pr...
Progetto per lo sviluppo di un sistema di gestione della conoscenza per il pr...
Nicola Cerami
 
Analisi dei requisiti per un sistema informativo per la prenotazione e il pag...
Analisi dei requisiti per un sistema informativo per la prenotazione e il pag...Analisi dei requisiti per un sistema informativo per la prenotazione e il pag...
Analisi dei requisiti per un sistema informativo per la prenotazione e il pag...
Nicola Cerami
 
Il mercato degli strumenti Web per il supporto alle Reti di Innovazione
Il mercato degli strumenti Web per il supporto alle Reti di Innovazione Il mercato degli strumenti Web per il supporto alle Reti di Innovazione
Il mercato degli strumenti Web per il supporto alle Reti di Innovazione
Nicola Cerami
 
Project Marketing E-Commerce: VideoMagic
Project Marketing E-Commerce: VideoMagicProject Marketing E-Commerce: VideoMagic
Project Marketing E-Commerce: VideoMagic
Nicola Cerami
 
Project Management
Project Management Project Management
Project Management
Nicola Cerami
 
Analisi delle caratteristiche degli scooter ciclo otto 4 t 125 prodotti nell'...
Analisi delle caratteristiche degli scooter ciclo otto 4 t 125 prodotti nell'...Analisi delle caratteristiche degli scooter ciclo otto 4 t 125 prodotti nell'...
Analisi delle caratteristiche degli scooter ciclo otto 4 t 125 prodotti nell'...
Nicola Cerami
 
Tecnologie semantiche per il knowledge Management
Tecnologie semantiche per il knowledge Management Tecnologie semantiche per il knowledge Management
Tecnologie semantiche per il knowledge Management
Nicola Cerami
 
Deloitte Oracle Applications Day 2012
Deloitte Oracle Applications Day 2012Deloitte Oracle Applications Day 2012
Deloitte Oracle Applications Day 2012
Nicola Cerami
 

More from Nicola Cerami (9)

La Reingegnerizzazione dei processi nel settore logistico: Un caso di studio
La Reingegnerizzazione dei processi nel settore logistico: Un caso di studioLa Reingegnerizzazione dei processi nel settore logistico: Un caso di studio
La Reingegnerizzazione dei processi nel settore logistico: Un caso di studio
 
Progetto per lo sviluppo di un sistema di gestione della conoscenza per il pr...
Progetto per lo sviluppo di un sistema di gestione della conoscenza per il pr...Progetto per lo sviluppo di un sistema di gestione della conoscenza per il pr...
Progetto per lo sviluppo di un sistema di gestione della conoscenza per il pr...
 
Analisi dei requisiti per un sistema informativo per la prenotazione e il pag...
Analisi dei requisiti per un sistema informativo per la prenotazione e il pag...Analisi dei requisiti per un sistema informativo per la prenotazione e il pag...
Analisi dei requisiti per un sistema informativo per la prenotazione e il pag...
 
Il mercato degli strumenti Web per il supporto alle Reti di Innovazione
Il mercato degli strumenti Web per il supporto alle Reti di Innovazione Il mercato degli strumenti Web per il supporto alle Reti di Innovazione
Il mercato degli strumenti Web per il supporto alle Reti di Innovazione
 
Project Marketing E-Commerce: VideoMagic
Project Marketing E-Commerce: VideoMagicProject Marketing E-Commerce: VideoMagic
Project Marketing E-Commerce: VideoMagic
 
Project Management
Project Management Project Management
Project Management
 
Analisi delle caratteristiche degli scooter ciclo otto 4 t 125 prodotti nell'...
Analisi delle caratteristiche degli scooter ciclo otto 4 t 125 prodotti nell'...Analisi delle caratteristiche degli scooter ciclo otto 4 t 125 prodotti nell'...
Analisi delle caratteristiche degli scooter ciclo otto 4 t 125 prodotti nell'...
 
Tecnologie semantiche per il knowledge Management
Tecnologie semantiche per il knowledge Management Tecnologie semantiche per il knowledge Management
Tecnologie semantiche per il knowledge Management
 
Deloitte Oracle Applications Day 2012
Deloitte Oracle Applications Day 2012Deloitte Oracle Applications Day 2012
Deloitte Oracle Applications Day 2012
 

Recently uploaded

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 

Recently uploaded (20)

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 

Peer to peer Networks

  • 1. Università degli Studi di Trento Facoltà di Economia Corso di Laurea Specialistica in Net-Economy Corso di Telecomunicazioni Nicola Cerami
  • 2. Index  What is P2P and  Security and History Privacy issues  Architecture of  Economic issues P2P systems  Applications of  Advantages and use weaknesses of  Future P2P Networks developments  Legal issues 18/04/2010 2
  • 3. What is Peer-to-Peer-1  Is any distribuited network architecture composed of partecipants that make a portion of their resources, such as:  Processing power  Disk storage  Network bandwith  Directly available to other network partecipants 18/04/2010 3
  • 4. What is Peer-to-Peer-2  Each Peer (usually workstation) has equivalent capabilities and responsabilities  Peer are both suppliers and consumers of resources, in contrast to the traditional client- server model 18/04/2010 4
  • 7. History  1999: first software dedicated to P2P is Napster (Fanning)  Spread broadband and ADSL Flat increasingly accessible  A growing success  Today, huge numer of P2P Systems 18/04/2010 7
  • 8. Architecture of P2P systems 1. Centralized architecture 2. Distributed architecture, or pure 3. Mixed or hybrid architecture 18/04/2010 8
  • 9. Centralized Networks  Using on the one hand central server(s) or bootstrapping mechanisms (e.g. eDonkey network).  Central Server:  Makes communicating between peers  Controls the interaction between clients  Contains no data 18/04/2010 9
  • 10. Distributed Architecture  There is no central server managing the network  Peers act as equals, merging the roles of clients and server  Many access points  P2P systems for file sharing using this architecture often  You must install software P2P (e.g Gnutella protocol, Freenet protocol) 18/04/2010 10
  • 11. Hybrid P2P Networks  Mix of centralized architecture and decentralized architecture  Distribute their clients into two groups:  Clients nodes  Overlay nodes  Tipically, each client is able to act according to the momentary need of the network and can become part of the respective overlay network used to coordinate the P2P structure (e.g. Gnutella protocol). 18/04/2010 11
  • 12. Advantages and weaknesses of P2P Networks Advantages Weaknesses  All clients provide  Not guarantee the resources (Bandwidth, quality of service Storage space,  It is not easy to Computing power) retrieve information of  Ease of administration interest  Not require major  Reliability Data infrastructure  Security  Extreme tolerance in  Legal issues the event of failure 18/04/2010 12
  • 13. Legal issues-1  The legal framework of reference is appointed to regulate the c.d. copyright  Italian law:  Act 22 Aprile 1941, n. 633 amended several times  Dilemma law not legal P2P systems  Art. 171: “anyone who is punisched does not qualify, for any purpose and in any form”  Limit of the law illegal file sharing 18/04/2010 13
  • 14. Legal issues-2  European level  Directive 2001/29/CE of the European Parlament and Council (May 2001)  Telecom package approved by the European Parlament (Nov 2009)  Sarkozy’s Doctrine  United States  Copyright: Title 17 of the Unites States Code  Violations  Federal crimes  Exceptions  educational and scientific 18/04/2010 purposes 14
  • 15. Security issues  Fundamental use of antivirus, firewall, cleaning log files and removal of infectious agents (virus, spyware, trojan, malware).  Attacks that a client can be, for example:  Using file sharing systems  Sharing an area of your disk  It allows free access to certain ports on your computer 18/04/2010 15
  • 16. Privacy issues  Protecting sensitive data (personal, business) throught the adoption of:  A network of anonymous  Install SW such as PeerGuardian  Encryption and obfuscation protocol  A proxy for connection of the client’s real IP mask  ect.. 18/04/2010 16
  • 17. Economic issues -1  New ways to access resources SW and HW  Strongly dependent on the market that produces use-value  A study commissioned by the Dutch goverment(2009): “P2P Systems are good for the economy” 18/04/2010 17
  • 18. Economic issues -2  New ethnic workers (knowledge workers)  Used to solve management problems, improve communication between companies but also within the same  Greater sharing of know-how  Faster data trasmission than traditional networks (client-server)  Less server overload 18/04/2010 COMPETITIVE ADVANTAGE 18
  • 19. Applications of use  Often used for file sharing:  More Applications: Napster, Gnutella, FastTrack, BitTorrent, Direct Connect, eDonkey, Kademila, etc.  Also widely used on mobile technology: SymTorrent, Direct Connect Torrent, MobileDC, etc.  Sharing computational power:  HW mainly shared resources for problem solving or complex calculations  Examples: SETI@Home, GIMPS, 18/04/2010 Distributed.net, FightAIDS@Home. 19
  • 20. Future developments -1 Use innovative P2P  P2P TV  For the diffusion of high data streams generated in real time  Using trasmission bandwidth of individual users  Not require server performance  Requires that individual users are provided with high bandwidth connections in both reception and trasmission (saturation bandwidth provided by the 18/04/2010 server) 20
  • 21. Future developments -2  The Server serves as the index, synchronizes the various users sharing the bandwidth and provides the data flow and initial users share  So, although in practice a server, after supplying the initial data flow and have put in communication the various users, the server is not interested in the communication becomes totally P2P systems  Large companies are experimenting with the possibility of offering paid content 18/04/2010 21
  • 22. Future developments -3 Limits on the dissemination P2PTV Systems are:  Technical problems (diffusion asymmetrical Internet lines, ADSL)  Reliability problems  Legal issues 18/04/2010 22
  • 23. Future developments -4 Simulator epidemic protocols  University of Bologna is experimenting with new P2P applications simulator edpidemic protocols for the study of issues of scale and dynamism that characterize the moderm information systems 18/04/2010 23
  • 24. Future developments -5  There protocols are able to put in communication between their various terminals. Such protocols are characterized by large scale and high dynamics.  The simulator is built from components that enable rapid prototyping of communication protocols by combining different data blocks 18/04/2010 24
  • 25. Future developments -6 Using P2P Networks for mobile technologies  System devised by TerraNet AB (Swedish company)  Allows:  Local phone calls and send messages (2-20 km)  Make calls to anyone with Internet access TerraNet  VoIP calls free long distance 18/04/2010 25
  • 26. Future developments -7  TerraNet integrated with technology every type of mobile device becomes a wireless communication  It works via P2P wireless network (mesh network) and no need for base stations, antenna installations or infrastructure 18/04/2010 26
  • 27. Future developments -8 Benefits Weaknesses  For areas of the world  Phone companies where you make obviously do not like expensive trasmission the idea infrastructure (Africa,  Political issues South America, etc)  Elimination communications costs  Greater privacy 18/04/2010 27
  • 28. Conclusions -1 Network congestion and bandwidth throlling  Phenomenon increasingly attributed to P2P systems  Many provider have chosen to use the bandwidth throlling:  System that cuts the available bandwidth, especially when using P2P systems  Often the users knows nothing!  For example Fastweb, Vodafone (mobile), Alice e Tiscali 18/04/2010  Less opposed P2P systems  Libero e Tele2 28
  • 29. Conclusions -2  But the new version of uTorrent apparently meets the needs of the ISP.  uTorrent :  Limiting network congestion, thus helping Internet Provider  The concept consists of a uTP: magnification Bittorrent protocol  uTP allow clients to automatically find any blocks of the network (rule bandwidth requirements and improves the connections) 18/04/2010 29
  • 30. Conclusions -3  Version of uTorrent with uTP is still in beta (Nov, 2009) but already is showing positive results  Good thing for us users  Providers would no longer decide on the bandwidth limitation! 18/04/2010 30
  • 31. Web Bibliography 1. http://en.wikipedia.org/wiki/Peer_to_peer 2. http://it.wikipedia.org/wiki/P2P_TV 3. http://it.wikipedia.org/wiki/Legge_italiana_sul_peer-to-peer 4. http://www.p2pitalia.com/ 5. http://www.lastampa.it/redazione/cmsSezioni/economia/200805articoli/32454gira ta.asp 6. http://www.megalab.it/4061/il-peer-to-peer-fa-bene-all-economia 7. http://setiathome.berkeley.edu/ 8. http://www.mersenne.org/ 9. http://www.distributed.net/ 10. http://fightaidsathome.scripps.edu/ 11. http://www.cs.unibo.it/bison/ 12. http://www.terranet.se/index.php?option=com_content&task=category&sectionid =9&id=18&Itemid=51 18/04/2010 31
  • 32. Bibliography  G. Pascuzzi, Il diritto dell’era digitale. Tecnologie informatiche e regole privatistiche, II edizione, Il Mulino, Bologna, 2006  Shapiro e Varian, Information Rules. A strategic Guide to the Network Economy. I edizione, Etas, Novembre 1999.  Slide Corso Telecomunicazioni (dott. Zorat)  Slide Corso Diritto Privato dell’Informatica (dott. Caso) 18/04/2010 32