SlideShare a Scribd company logo
Peer-to-peer Applications and
Impact on ISPs' Operations
Charles Mok
Internet Society Hong Kong
2008.06.04
What is Peer-to-peer?

A peer-to-peer (P2P) computer network uses
diverse connectivity between participants in a
network and the cumulative bandwidth of network
participants rather than conventional centralized
resources where a relatively low number of servers
provide the core value to a service or application.
− Ad hoc connections
− Sharing of storage, cycles, bandwidth, content, etc.
− File sharing, or sharing real-time data, such as
telephony
P2P applications

File sharing
− Bit Torrent
− Napster
− eDonkey, eMule
− Foxy
− WinMX

Telephony
− Skype

Video streaming
− Joost
− PPLive, PPStream, Coolstreaming, etc.
P2P applications

Bioinformatics
− P2P networks can be used to run large programs
designed to carry out tests to identify drug
candidates

Academic
− Sciencenet P2P search engine: a free and open
search engine for scientific knowledge
− LionShare: MIT and Simon Fraser U. project for
large file-sharing among education institutions

Business
− Distributed computing, but security concerns

Military
Bit Torrent et al.

However, illegal file sharing dominates

Hong Kong: first successful BT prosecution
in the world
– 2005: 古惑天皇 uploaded three movies using BT
– Violating the copyright ordinance: copying and
distribution to public
– Upheld by Final Court of Appeals
• Has copyright infringing file sharing activities
subsided or not?
BT still dominates

1/2007: At any
given moment,
about 9.5M P2P
users on the
Internet, with
3-5M using BT
alone.
Decline of recorded music

2007 estimate: Global music sales will drop to US$23B in
2009, just over half of 1997's US$45B and down 16 percent
from 2006.
ISPs reactions to P2P

Millions of users participating in file-sharing which
contribute 50-80% of the traffic load on Internet
platforms in some Western countries

Some ISPs started to sniff out P2P traffic on their
networks and curb it, either slowing it down or
stopping it altogether
− 8/2007: Comcast (#2 ISP in US) “silently” started limiting
subscribers use of BT and penalize heavy downloaders
by suspending service
− 6/2007: Time Warner Cable announced it would slow
down bandwidth intensive P2P traffic during peak hours
on its Road Runner service
− 8/2007: Two UK ISPs said it was reluctant to carry traffic
from BBC's P2P audio/video application, iPlayer
Legal reactions to P2P

Copyright Board of Canada
− Imposed a US$25 government fee on each MP3
players and iPod, similar to what is done for
audio tapes and blank CDs – manufacturers
usually pass on the cost to consumers (2003)
− This levy goes into a fund to pay musicians and
songwriters for 'revenues lost from consumers'
personal copying.'

ISP responsibility proposals, e.g. 'three
strikes' rules to ban repeated file-sharing
users
− France, UK, Australia, etc.
'Make P2P Legal'

Voluntary collective licensing: 'performing rights
organization' i.e. CASH

Compulsory licensing: requires copyright holders to make
their works available for fair compensation, e.g. to allow
cover versions

Works only if
the majority of
copyright
owners join
and forgo
lawsuits in
exchange for
a reasonable
price.
Net neutrality

Free of restrictions on the kinds of equipment
attached, on the modes of communication allowed,
which does not restrict content, sites or platforms,
and where communication is not unreasonably
degraded by other communication streams.

Protecting consumers against discriminatory
practices by ISPs, for bandwidth control reasons or
even censorship

Net neutrality vs. prioritization or even QoS

EU: proposes toimpose minimum QoS to prevent
ISPs from degrading customers (2007)

UK: "an answer to problems we don't have, using a
philosophy we don't share" (2006)
Net neutrality

Proponents
− Consumer Union
− Content companies: Google, Yahoo!, eBay, Microsoft
− Tim Berners-Lee, Steve Wozniak, etc.
− Vint Cerf: "The Internet was designed with no
gatekeepers over new content or services. A lightweight
but enforceable neutrality rule is needed to ensure that
the Internet continues to thrive."

Opponents
− Telecom companies, ISPs
− Equipment vendors: Cisco, Alcatel, etc.
− Free market think tanks: Cato Institute etc.
− Bob Kahn: "net neutrality is a slogan that would freeze
innovation in the core of the Internet."
Local perspectives

P2P is mainly an issue of:
− Copyright infringement
− Data privacy and information security
− Cost to ISPs
− Some unfairness for those who don't P2P/BT?

However:
− P2P video streaming is not as popular as in the
Mainland
− Skype impact on voice traffic/business is taken
for granted
− Net neutrality is not much debated: consumers
not asking ISPs

lack of consumer advocacy?
Thank you
Charles Mok
Internet Society Hong Kong
mok@hknet.com
charlespmok@gmail.com
http://www.isoc.hk/
http://charlesmok.blogspot.com/
http://www.it360.hk/

More Related Content

What's hot

Slide 1 -the battle over net neutrality
Slide 1 -the battle over net neutralitySlide 1 -the battle over net neutrality
Slide 1 -the battle over net neutrality
Zulkifflee Sofee
 
Net neutrality- Indian Perspective
Net neutrality- Indian PerspectiveNet neutrality- Indian Perspective
Net neutrality- Indian Perspective
Abhas Mathur
 
Maine's Three Ring Binder Network
Maine's Three Ring Binder NetworkMaine's Three Ring Binder Network
Maine's Three Ring Binder Network
GWI
 
Broadband Best Practices in Greater Minnesota
Broadband Best Practices in Greater MinnesotaBroadband Best Practices in Greater Minnesota
Broadband Best Practices in Greater Minnesota
Ann Treacy
 
Lehigh net neutrality colloquium (no video) final
Lehigh net neutrality colloquium (no video)   finalLehigh net neutrality colloquium (no video)   final
Lehigh net neutrality colloquium (no video) final
Don Holloway
 
'News: UK Internet Radio Companies Launch "ASMEC" Trade Organisation To Tackl...
'News: UK Internet Radio Companies Launch "ASMEC" Trade Organisation To Tackl...'News: UK Internet Radio Companies Launch "ASMEC" Trade Organisation To Tackl...
'News: UK Internet Radio Companies Launch "ASMEC" Trade Organisation To Tackl...
Grant Goddard
 
Implementing net neutrality: Sao Paolo Proteste Marco Civil 17/3/2015
Implementing net neutrality: Sao Paolo Proteste Marco Civil 17/3/2015Implementing net neutrality: Sao Paolo Proteste Marco Civil 17/3/2015
Implementing net neutrality: Sao Paolo Proteste Marco Civil 17/3/2015
Chris Marsden
 
IB 46 Surya Kiran Sharma
IB 46 Surya Kiran SharmaIB 46 Surya Kiran Sharma
IB 46 Surya Kiran SharmaSurya Sharma
 
Net Neutrality
Net Neutrality Net Neutrality
Net Neutrality
JadaleralWebster1
 
Connecting Cambridgeshire | Dutch public sector leaders 4 Oct 2013
Connecting Cambridgeshire | Dutch public sector leaders 4 Oct 2013Connecting Cambridgeshire | Dutch public sector leaders 4 Oct 2013
Connecting Cambridgeshire | Dutch public sector leaders 4 Oct 2013
Liz Stevenson
 
Net neutrality
Net neutralityNet neutrality
Net neutrality
Alifiya Hussain
 
Holly Raiche - Net Neutrality - ArmIGF2015
Holly Raiche - Net Neutrality - ArmIGF2015Holly Raiche - Net Neutrality - ArmIGF2015
Holly Raiche - Net Neutrality - ArmIGF2015
Arm Igf
 
Evolution of the internet
Evolution of the internetEvolution of the internet
Evolution of the internet
Brainware University
 
Net Neutrality
Net NeutralityNet Neutrality
Net Neutrality
Sourav Dey
 
New microsoft office word document
New microsoft office word documentNew microsoft office word document
New microsoft office word documentletusplayufool
 
Broadband policies and policies geared towards universal access in telecommun...
Broadband policies and policies geared towards universal access in telecommun...Broadband policies and policies geared towards universal access in telecommun...
Broadband policies and policies geared towards universal access in telecommun...
Dialogo regional sobre Sociedad de la Información
 
Alternative Network Deployments
Alternative Network DeploymentsAlternative Network Deployments
Alternative Network Deployments
Jose Saldana
 
SFI Irish Future Internet Forum
SFI Irish Future Internet ForumSFI Irish Future Internet Forum
SFI Irish Future Internet Forum
Irish Future Internet Forum
 
Net neutrality
Net neutralityNet neutrality
Net neutrality
ZEESHAN ALI
 

What's hot (20)

Slide 1 -the battle over net neutrality
Slide 1 -the battle over net neutralitySlide 1 -the battle over net neutrality
Slide 1 -the battle over net neutrality
 
Net neutrality- Indian Perspective
Net neutrality- Indian PerspectiveNet neutrality- Indian Perspective
Net neutrality- Indian Perspective
 
Maine's Three Ring Binder Network
Maine's Three Ring Binder NetworkMaine's Three Ring Binder Network
Maine's Three Ring Binder Network
 
Broadband Best Practices in Greater Minnesota
Broadband Best Practices in Greater MinnesotaBroadband Best Practices in Greater Minnesota
Broadband Best Practices in Greater Minnesota
 
Lehigh net neutrality colloquium (no video) final
Lehigh net neutrality colloquium (no video)   finalLehigh net neutrality colloquium (no video)   final
Lehigh net neutrality colloquium (no video) final
 
'News: UK Internet Radio Companies Launch "ASMEC" Trade Organisation To Tackl...
'News: UK Internet Radio Companies Launch "ASMEC" Trade Organisation To Tackl...'News: UK Internet Radio Companies Launch "ASMEC" Trade Organisation To Tackl...
'News: UK Internet Radio Companies Launch "ASMEC" Trade Organisation To Tackl...
 
Implementing net neutrality: Sao Paolo Proteste Marco Civil 17/3/2015
Implementing net neutrality: Sao Paolo Proteste Marco Civil 17/3/2015Implementing net neutrality: Sao Paolo Proteste Marco Civil 17/3/2015
Implementing net neutrality: Sao Paolo Proteste Marco Civil 17/3/2015
 
IB 46 Surya Kiran Sharma
IB 46 Surya Kiran SharmaIB 46 Surya Kiran Sharma
IB 46 Surya Kiran Sharma
 
Net Neutrality
Net Neutrality Net Neutrality
Net Neutrality
 
Connecting Cambridgeshire | Dutch public sector leaders 4 Oct 2013
Connecting Cambridgeshire | Dutch public sector leaders 4 Oct 2013Connecting Cambridgeshire | Dutch public sector leaders 4 Oct 2013
Connecting Cambridgeshire | Dutch public sector leaders 4 Oct 2013
 
NET NEUTRALITY final
NET NEUTRALITY finalNET NEUTRALITY final
NET NEUTRALITY final
 
Net neutrality
Net neutralityNet neutrality
Net neutrality
 
Holly Raiche - Net Neutrality - ArmIGF2015
Holly Raiche - Net Neutrality - ArmIGF2015Holly Raiche - Net Neutrality - ArmIGF2015
Holly Raiche - Net Neutrality - ArmIGF2015
 
Evolution of the internet
Evolution of the internetEvolution of the internet
Evolution of the internet
 
Net Neutrality
Net NeutralityNet Neutrality
Net Neutrality
 
New microsoft office word document
New microsoft office word documentNew microsoft office word document
New microsoft office word document
 
Broadband policies and policies geared towards universal access in telecommun...
Broadband policies and policies geared towards universal access in telecommun...Broadband policies and policies geared towards universal access in telecommun...
Broadband policies and policies geared towards universal access in telecommun...
 
Alternative Network Deployments
Alternative Network DeploymentsAlternative Network Deployments
Alternative Network Deployments
 
SFI Irish Future Internet Forum
SFI Irish Future Internet ForumSFI Irish Future Internet Forum
SFI Irish Future Internet Forum
 
Net neutrality
Net neutralityNet neutrality
Net neutrality
 

Similar to Peer-to-peer Applications and Impact on ISPs\' Operations 2008.06.04

Sydney 22 March: EU neutrality
Sydney 22 March: EU neutralitySydney 22 March: EU neutrality
Sydney 22 March: EU neutrality
Chris Marsden
 
OttawaSubmission.072809
OttawaSubmission.072809OttawaSubmission.072809
OttawaSubmission.072809Eric Klinker
 
THIS IS AN ARTICLE PLEASE GIVE ANSWERS FOR THE QUESTIONS (THE PROBLE.pdf
THIS IS AN ARTICLE PLEASE GIVE ANSWERS FOR THE QUESTIONS (THE PROBLE.pdfTHIS IS AN ARTICLE PLEASE GIVE ANSWERS FOR THE QUESTIONS (THE PROBLE.pdf
THIS IS AN ARTICLE PLEASE GIVE ANSWERS FOR THE QUESTIONS (THE PROBLE.pdf
info824691
 
Monash net neutrality 2202 2012
Monash net neutrality 2202 2012Monash net neutrality 2202 2012
Monash net neutrality 2202 2012Chris Marsden
 
NET NEUTRALITY
NET NEUTRALITYNET NEUTRALITY
NET NEUTRALITY
Mavis Osei
 
Net Neutrality discussion
Net Neutrality discussionNet Neutrality discussion
Net Neutrality discussion
UoS
 
Network Neutrality and Quality of Experience
Network Neutrality and Quality of ExperienceNetwork Neutrality and Quality of Experience
Network Neutrality and Quality of Experience
Toshiya Jitsuzumi
 
Taking A Look At Net Neutrality
Taking A Look At Net NeutralityTaking A Look At Net Neutrality
Taking A Look At Net Neutrality
Rochelle Schear
 
IXPs and Competition Policy
IXPs and Competition PolicyIXPs and Competition Policy
IXPs and Competition Policy
David Opderbeck
 
Net neutrality: Rome Lega Coop 14 March
Net neutrality: Rome Lega Coop 14 MarchNet neutrality: Rome Lega Coop 14 March
Net neutrality: Rome Lega Coop 14 March
Chris Marsden
 
Read the Case Study Below. Answer the questions. Paper must be a pag.docx
Read the Case Study Below. Answer the questions. Paper must be a pag.docxRead the Case Study Below. Answer the questions. Paper must be a pag.docx
Read the Case Study Below. Answer the questions. Paper must be a pag.docx
apatrick3
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks
Nicola Cerami
 
Day 2 C2C - SACF: Impact of OTT services
Day 2 C2C - SACF: Impact of OTT servicesDay 2 C2C - SACF: Impact of OTT services
Day 2 C2C - SACF: Impact of OTT services
Myles Freedman
 
Carrier Hotels and Network Neutrality
Carrier Hotels and Network NeutralityCarrier Hotels and Network Neutrality
Carrier Hotels and Network Neutrality
John R Savageau
 
Mac309 Network Effect: Net Neutrality
Mac309 Network Effect: Net NeutralityMac309 Network Effect: Net Neutrality
Mac309 Network Effect: Net Neutrality
Rob Jewitt
 
Session 2 ure_changingrules_final
Session 2 ure_changingrules_finalSession 2 ure_changingrules_final
Session 2 ure_changingrules_final
TRPC Pte Ltd
 
EUTIC Athens 2007
EUTIC Athens 2007EUTIC Athens 2007
EUTIC Athens 2007smyrnaios
 
Internet service provider
Internet service providerInternet service provider
Internet service provider
ashrafulislam293
 
Mac309 Net Neutrality 2008 9
Mac309 Net Neutrality 2008 9Mac309 Net Neutrality 2008 9
Mac309 Net Neutrality 2008 9
Rob Jewitt
 

Similar to Peer-to-peer Applications and Impact on ISPs\' Operations 2008.06.04 (20)

Sydney 22 March: EU neutrality
Sydney 22 March: EU neutralitySydney 22 March: EU neutrality
Sydney 22 March: EU neutrality
 
OttawaSubmission.072809
OttawaSubmission.072809OttawaSubmission.072809
OttawaSubmission.072809
 
THIS IS AN ARTICLE PLEASE GIVE ANSWERS FOR THE QUESTIONS (THE PROBLE.pdf
THIS IS AN ARTICLE PLEASE GIVE ANSWERS FOR THE QUESTIONS (THE PROBLE.pdfTHIS IS AN ARTICLE PLEASE GIVE ANSWERS FOR THE QUESTIONS (THE PROBLE.pdf
THIS IS AN ARTICLE PLEASE GIVE ANSWERS FOR THE QUESTIONS (THE PROBLE.pdf
 
Monash net neutrality 2202 2012
Monash net neutrality 2202 2012Monash net neutrality 2202 2012
Monash net neutrality 2202 2012
 
NET NEUTRALITY
NET NEUTRALITYNET NEUTRALITY
NET NEUTRALITY
 
Net Neutrality: WSD
Net Neutrality: WSDNet Neutrality: WSD
Net Neutrality: WSD
 
Net Neutrality discussion
Net Neutrality discussionNet Neutrality discussion
Net Neutrality discussion
 
Network Neutrality and Quality of Experience
Network Neutrality and Quality of ExperienceNetwork Neutrality and Quality of Experience
Network Neutrality and Quality of Experience
 
Taking A Look At Net Neutrality
Taking A Look At Net NeutralityTaking A Look At Net Neutrality
Taking A Look At Net Neutrality
 
IXPs and Competition Policy
IXPs and Competition PolicyIXPs and Competition Policy
IXPs and Competition Policy
 
Net neutrality: Rome Lega Coop 14 March
Net neutrality: Rome Lega Coop 14 MarchNet neutrality: Rome Lega Coop 14 March
Net neutrality: Rome Lega Coop 14 March
 
Read the Case Study Below. Answer the questions. Paper must be a pag.docx
Read the Case Study Below. Answer the questions. Paper must be a pag.docxRead the Case Study Below. Answer the questions. Paper must be a pag.docx
Read the Case Study Below. Answer the questions. Paper must be a pag.docx
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks
 
Day 2 C2C - SACF: Impact of OTT services
Day 2 C2C - SACF: Impact of OTT servicesDay 2 C2C - SACF: Impact of OTT services
Day 2 C2C - SACF: Impact of OTT services
 
Carrier Hotels and Network Neutrality
Carrier Hotels and Network NeutralityCarrier Hotels and Network Neutrality
Carrier Hotels and Network Neutrality
 
Mac309 Network Effect: Net Neutrality
Mac309 Network Effect: Net NeutralityMac309 Network Effect: Net Neutrality
Mac309 Network Effect: Net Neutrality
 
Session 2 ure_changingrules_final
Session 2 ure_changingrules_finalSession 2 ure_changingrules_final
Session 2 ure_changingrules_final
 
EUTIC Athens 2007
EUTIC Athens 2007EUTIC Athens 2007
EUTIC Athens 2007
 
Internet service provider
Internet service providerInternet service provider
Internet service provider
 
Mac309 Net Neutrality 2008 9
Mac309 Net Neutrality 2008 9Mac309 Net Neutrality 2008 9
Mac309 Net Neutrality 2008 9
 

More from Charles Mok

Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
Charles Mok
 
Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
Charles Mok
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
Charles Mok
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
Charles Mok
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
Charles Mok
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Charles Mok
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
Charles Mok
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Charles Mok
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
Charles Mok
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital Repression
Charles Mok
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
Charles Mok
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
Charles Mok
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
Charles Mok
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Charles Mok
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
Charles Mok
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
Charles Mok
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
Charles Mok
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
Charles Mok
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
Charles Mok
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
Charles Mok
 

More from Charles Mok (20)

Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital Repression
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 

Peer-to-peer Applications and Impact on ISPs\' Operations 2008.06.04

  • 1. Peer-to-peer Applications and Impact on ISPs' Operations Charles Mok Internet Society Hong Kong 2008.06.04
  • 2. What is Peer-to-peer?  A peer-to-peer (P2P) computer network uses diverse connectivity between participants in a network and the cumulative bandwidth of network participants rather than conventional centralized resources where a relatively low number of servers provide the core value to a service or application. − Ad hoc connections − Sharing of storage, cycles, bandwidth, content, etc. − File sharing, or sharing real-time data, such as telephony
  • 3. P2P applications  File sharing − Bit Torrent − Napster − eDonkey, eMule − Foxy − WinMX  Telephony − Skype  Video streaming − Joost − PPLive, PPStream, Coolstreaming, etc.
  • 4. P2P applications  Bioinformatics − P2P networks can be used to run large programs designed to carry out tests to identify drug candidates  Academic − Sciencenet P2P search engine: a free and open search engine for scientific knowledge − LionShare: MIT and Simon Fraser U. project for large file-sharing among education institutions  Business − Distributed computing, but security concerns  Military
  • 5. Bit Torrent et al.  However, illegal file sharing dominates  Hong Kong: first successful BT prosecution in the world – 2005: 古惑天皇 uploaded three movies using BT – Violating the copyright ordinance: copying and distribution to public – Upheld by Final Court of Appeals • Has copyright infringing file sharing activities subsided or not?
  • 6. BT still dominates  1/2007: At any given moment, about 9.5M P2P users on the Internet, with 3-5M using BT alone.
  • 7. Decline of recorded music  2007 estimate: Global music sales will drop to US$23B in 2009, just over half of 1997's US$45B and down 16 percent from 2006.
  • 8. ISPs reactions to P2P  Millions of users participating in file-sharing which contribute 50-80% of the traffic load on Internet platforms in some Western countries  Some ISPs started to sniff out P2P traffic on their networks and curb it, either slowing it down or stopping it altogether − 8/2007: Comcast (#2 ISP in US) “silently” started limiting subscribers use of BT and penalize heavy downloaders by suspending service − 6/2007: Time Warner Cable announced it would slow down bandwidth intensive P2P traffic during peak hours on its Road Runner service − 8/2007: Two UK ISPs said it was reluctant to carry traffic from BBC's P2P audio/video application, iPlayer
  • 9. Legal reactions to P2P  Copyright Board of Canada − Imposed a US$25 government fee on each MP3 players and iPod, similar to what is done for audio tapes and blank CDs – manufacturers usually pass on the cost to consumers (2003) − This levy goes into a fund to pay musicians and songwriters for 'revenues lost from consumers' personal copying.'  ISP responsibility proposals, e.g. 'three strikes' rules to ban repeated file-sharing users − France, UK, Australia, etc.
  • 10. 'Make P2P Legal'  Voluntary collective licensing: 'performing rights organization' i.e. CASH  Compulsory licensing: requires copyright holders to make their works available for fair compensation, e.g. to allow cover versions  Works only if the majority of copyright owners join and forgo lawsuits in exchange for a reasonable price.
  • 11. Net neutrality  Free of restrictions on the kinds of equipment attached, on the modes of communication allowed, which does not restrict content, sites or platforms, and where communication is not unreasonably degraded by other communication streams.  Protecting consumers against discriminatory practices by ISPs, for bandwidth control reasons or even censorship  Net neutrality vs. prioritization or even QoS  EU: proposes toimpose minimum QoS to prevent ISPs from degrading customers (2007)  UK: "an answer to problems we don't have, using a philosophy we don't share" (2006)
  • 12. Net neutrality  Proponents − Consumer Union − Content companies: Google, Yahoo!, eBay, Microsoft − Tim Berners-Lee, Steve Wozniak, etc. − Vint Cerf: "The Internet was designed with no gatekeepers over new content or services. A lightweight but enforceable neutrality rule is needed to ensure that the Internet continues to thrive."  Opponents − Telecom companies, ISPs − Equipment vendors: Cisco, Alcatel, etc. − Free market think tanks: Cato Institute etc. − Bob Kahn: "net neutrality is a slogan that would freeze innovation in the core of the Internet."
  • 13. Local perspectives  P2P is mainly an issue of: − Copyright infringement − Data privacy and information security − Cost to ISPs − Some unfairness for those who don't P2P/BT?  However: − P2P video streaming is not as popular as in the Mainland − Skype impact on voice traffic/business is taken for granted − Net neutrality is not much debated: consumers not asking ISPs  lack of consumer advocacy?
  • 14. Thank you Charles Mok Internet Society Hong Kong mok@hknet.com charlespmok@gmail.com http://www.isoc.hk/ http://charlesmok.blogspot.com/ http://www.it360.hk/