SlideShare a Scribd company logo
1 of 40
Download to read offline
Peer-to-Peer Systems
    What’s behind the buzzword?


                Uwe Schmidt
       Un-Distinguished Lecture Series
                 16/02/2007
What is it?

• What does Peer-to-Peer (P2P)
  mean to you?
• What does “peer” mean?
 •   Merriam-Webster:
     one that is of equal standing with another :
     EQUAL; especially : one belonging to the same
     societal group especially based on age, grade, or status
P2P Principle
• Organizational principle, core concepts:
 • Self-organizing, no central management
 • Resource sharing, exploits resources at
    the edge of the network
 • Peers in P2P are all equal (more or less)
 • Large number of peers in the network
Properties of P2P

• Unreliable, uncoordinated, unmanaged
• Resilient to attacks, heterogeneous
• Large collection of resources
When to use it?

• Budget
• Resource relevance
• Trust
• Rate of system change
• Criticality
P2P Vision

    No More Dedicated Servers,
Everything in Internet Served by Peers
P2P File-sharing

• The most popular application
  of the P2P principle
• Made P2P popular
• We will look at the “evolution” of P2P file-
  sharing in the following...
Napster
• First P2P file-sharing application
  (June 1999)
• Only MP3 sharing possible
• Made the term “P2P” known
• Created by Shawn Fanning
  (nickname “Napster”)
How Napster worked
• Based on central index server (farm)
• User register and give list of files to share
• Searching based on keywords
 • Results: List of files with additional
    information, e.g. peer’s bandwidth,
    encoding rate, file size
Napster Diagram
                 • Peers log in
Server
                 • Send list of files to share
                 • Peer queries server
                 • Server responds
                 • File transfer directly
Strengths & Weaknesses
    Strength              Weakness

Fast, efficient and    Central server is a
 overall search      single point of failure


Consistent view of   Expensive to maintain
  the network        central server (farm)
Gnutella
• Addresses some of Napster’s weaknesses
  and introduces its own problems
• Originally developed at Nullsoft (AOL)
 • Accidentally released on their website
• Open protocol specifications
• Fully distributed
How Gnutella works
• Based on an overlay network
• All peers are fully equal
• A peer needs to know another peer, that is
  already in the network, to join
• Searching based on flooding
• Direct downloads
Gnutella Diagram
                Duplicate
                Messages

                                          Unreached
                                            Peers
                               Query:
                             “Madonna”

                                                      Query Hit:
                                                       Respond

                   Direct
                  Transfer

Query Hit:
 Respond




                       Query radius = 2
Strengths & Weaknesses
    Strength               Weakness

Fully distributed,     Flooding a query is
no attack points?     extremely inefficient

                      Search only reaches a
 Open protocol       subset of peers due to
                       limited query radius
KaZaA
• Created in March 2001 (Niklas Zennström)
• Combines strengths of Napster and
  Gnutella
• Based on “supernode architecture”
• Exploits heterogenity of peers
• Organize peers into a hierarchy
How KaZaA works

• Two-tier hierarchy
• Two kinds of nodes
 • Ordinary nodes (ON)
 • Supernodes (SN)
• ON belongs to SN
KaZaA Diagram
           SN

 Direct
Transfer
                SN
  SN
Strengths & Weaknesses
      Strength               Weakness


                       Still no overall search
Combines good points
 from Napster and
     Gnutella
                         Easier to attack?
Comparison
             Napster   Gnutella   KaZaA

Type of
        Centralized Distributed   Hybrid
network
 Efficient
              +++        ---        +
searching
Resilience
               ---       ++?        +
to attacks
Current State
• Most bigger file-sharing systems sued into
  submission (e.g. Napster and KaZaA)
 • Although many still running because of
    open clients
• User who share copyrighted content are
  sued as well...
 • e.g. by the RIAA
Non-direct file-sharing
• People try to be anonymous by disguising
  their identity, i.e. IP-address
• Idea: Non-direct file transfer, i.e. route
  traffic through intermediate peers
• Have currently too much overhead
 • slow and not very efficient
BitTorrent
• Developed by Bram Cohen in 2001
• New approach for sharing large files
• Goal: Quickly replicate one file to a large
  number of clients
• More appropriately called P2P content
  distribution instead of file-sharing
How BitTorrent works

• Build a network for each file to distribute
• Each file has unique “link”
 • “torrent” file holds metadata about a file
• Tracker is a server to manage active clients
• Files are broken into chunks
BitTorrent Download

• Client gets “torrent” file from somewhere
• Client contacts tracker, gets lists of peers
• Client contacts other peers directly for
  download of specific chunks
Tit-for-Tat policy
• Encourages cooperation,
  discourages free-riding
• A peer serves peers that serve it
• Peers download rarest chunks first
 • makes them attractive to other peers,
    they can then download in return
 • also prevents chunks from disappearing
Strengths & Weaknesses
       Strength              Weakness
Works quite well, only
                       Files have to be large
slow in the beginning

Efficient distrubution
                            No searching
     mechanism

Enforces contribution,     Everyone must
discourages free-riding      contribute
Other P2P applications
• P2P Communications
 • Email, IM,VoIP
• P2P Computation
 • SETI@Home
• P2P Collaboration
 • Wikipedia
Skype

• Developed by the same people as KaZaA
• 9 Million concurrent users (Jan. 29 2007)
• Very similar to KaZaA’s architecture
 • Supernodes and ordinary nodes
• Central server for login and billing
Skype
• Proprietary and encrypted protocol
• Source code is closed
• Executable uses a lot of mechanisms to
  protect against reverse engineering
 • Anti-debugger code
 • Partly encrypted
How Skype goes
     through Firewalls
• Skype server plays mediator
 • takes IP adresses and UDP ports
 • forwards them to other side
• Both clients start connections
• Firewalls think that packets from the other
  side are responses to started connections
Joost
• Brought to you by the guys who made
  KaZaA and Skype
• Uses P2P video streaming technology
• Tries to merge the best of TV with the best
  of the Internet
• Beta test is running right now
• Advertisement based,View on demand
That’s it


Let’s get some beer...
References
     Most slides are based and copied in large part from Jussi Kangasharju’s
     lecture on “Peer-to-Peer and Grid Computing”, chapter 1 and 2.
     http://elara.tk.informatik.tu-darmstadt.de/LectureNotes/ws0607/P2P/

     Other References:

1.   quot;File sharing.quot; Wikipedia, The Free Encyclopedia.
     http://en.wikipedia.org/wiki/File_sharing

2.   quot;Skype.quot; Wikipedia, The Free Encyclopedia.
     http://en.wikipedia.org/wiki/Skype

3.   quot;Napster.quot; Wikipedia, The Free Encyclopedia.
     http://en.wikipedia.org/wiki/Napster

4.   Joost.
     http://www.joost.com
References
5.   The hole trick: How Skype & Co. get round firewalls
     http://www.heise-security.co.uk/articles/82481

6.   Silver Needle in the Skype
     http://www.secdev.org/conf/skype_BHEU06.handout.pdf

7.   Picture of Gtk-Gnutella
     http://impressive.net/people/gerald/2002/01/21/gtk-gnutella.png

8.   Picture of KaZaA
     http://www.lagranepoca.com/news_images/2006-7-28-kazaa.gif

9.   Pictures of Skype
     http://about.skype.com/pictures.html

More Related Content

What's hot

peer to peer and client server model
peer to peer and client server modelpeer to peer and client server model
peer to peer and client server model
Bharath Nair
 

What's hot (20)

Distributed System ppt
Distributed System pptDistributed System ppt
Distributed System ppt
 
Networking basics PPT
Networking basics PPTNetworking basics PPT
Networking basics PPT
 
peer to peer and client server model
peer to peer and client server modelpeer to peer and client server model
peer to peer and client server model
 
Introduction to Server
Introduction to ServerIntroduction to Server
Introduction to Server
 
Bit torrent ppt
Bit torrent pptBit torrent ppt
Bit torrent ppt
 
Distributed architecture (SAD)
Distributed architecture (SAD)Distributed architecture (SAD)
Distributed architecture (SAD)
 
Security in distributed systems
Security in distributed systems Security in distributed systems
Security in distributed systems
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection tools
 
Types of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsTypes of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design Tools
 
How a Proxy Server Works
How a Proxy Server WorksHow a Proxy Server Works
How a Proxy Server Works
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
 
Network cable
Network cableNetwork cable
Network cable
 
Ethical Hacking - sniffing
Ethical Hacking - sniffingEthical Hacking - sniffing
Ethical Hacking - sniffing
 
Firewall
FirewallFirewall
Firewall
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Peer to peer
Peer to peerPeer to peer
Peer to peer
 
Naming in Distributed Systems
Naming in Distributed SystemsNaming in Distributed Systems
Naming in Distributed Systems
 

Similar to Peer-to-Peer Systems

CSTalks - Peer-to-peer - 16 Feb
CSTalks - Peer-to-peer - 16 FebCSTalks - Peer-to-peer - 16 Feb
CSTalks - Peer-to-peer - 16 Feb
cstalks
 
Xen_and_Rails_deployment
Xen_and_Rails_deploymentXen_and_Rails_deployment
Xen_and_Rails_deployment
Abhishek Singh
 
Mark Little Fence Sitting Soa Geek
Mark Little Fence Sitting Soa GeekMark Little Fence Sitting Soa Geek
Mark Little Fence Sitting Soa Geek
deimos
 
Bringing Wireless Sensing to its full potential
Bringing Wireless Sensing to its full potentialBringing Wireless Sensing to its full potential
Bringing Wireless Sensing to its full potential
Adrian Hornsby
 
Yahoo Communities Architecture Unlikely Bedfellows
Yahoo Communities Architecture Unlikely BedfellowsYahoo Communities Architecture Unlikely Bedfellows
Yahoo Communities Architecture Unlikely Bedfellows
ConSanFrancisco123
 
OSCON 2004: A Developer's Tour of Chandler
OSCON 2004: A Developer's Tour of ChandlerOSCON 2004: A Developer's Tour of Chandler
OSCON 2004: A Developer's Tour of Chandler
Ted Leung
 

Similar to Peer-to-Peer Systems (20)

New School Man-in-the-Middle
New School Man-in-the-MiddleNew School Man-in-the-Middle
New School Man-in-the-Middle
 
CSTalks - Peer-to-peer - 16 Feb
CSTalks - Peer-to-peer - 16 FebCSTalks - Peer-to-peer - 16 Feb
CSTalks - Peer-to-peer - 16 Feb
 
Xen_and_Rails_deployment
Xen_and_Rails_deploymentXen_and_Rails_deployment
Xen_and_Rails_deployment
 
The Evolving Internet Fndtn
The Evolving Internet FndtnThe Evolving Internet Fndtn
The Evolving Internet Fndtn
 
Mark Little Fence Sitting Soa Geek
Mark Little Fence Sitting Soa GeekMark Little Fence Sitting Soa Geek
Mark Little Fence Sitting Soa Geek
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Advanced Deployment
Advanced DeploymentAdvanced Deployment
Advanced Deployment
 
Retooling the world wide web for its original purpose
Retooling the world wide web for its original purposeRetooling the world wide web for its original purpose
Retooling the world wide web for its original purpose
 
Netcetera Proactive Management Service
Netcetera Proactive Management ServiceNetcetera Proactive Management Service
Netcetera Proactive Management Service
 
Bringing Wireless Sensing to its full potential
Bringing Wireless Sensing to its full potentialBringing Wireless Sensing to its full potential
Bringing Wireless Sensing to its full potential
 
HDFS Architecture
HDFS ArchitectureHDFS Architecture
HDFS Architecture
 
Hdfs Dhruba
Hdfs DhrubaHdfs Dhruba
Hdfs Dhruba
 
Kentik Network@Scale (Dan Ellis)
Kentik Network@Scale (Dan Ellis)Kentik Network@Scale (Dan Ellis)
Kentik Network@Scale (Dan Ellis)
 
Qcon
QconQcon
Qcon
 
Lesson 01 - Network Assessment
Lesson 01 - Network AssessmentLesson 01 - Network Assessment
Lesson 01 - Network Assessment
 
Yahoo Communities Architecture Unlikely Bedfellows
Yahoo Communities Architecture Unlikely BedfellowsYahoo Communities Architecture Unlikely Bedfellows
Yahoo Communities Architecture Unlikely Bedfellows
 
How to over-engineer things and have fun? Building a modern, distributed real...
How to over-engineer things and have fun? Building a modern, distributed real...How to over-engineer things and have fun? Building a modern, distributed real...
How to over-engineer things and have fun? Building a modern, distributed real...
 
Module: Mutable Content in IPFS
Module: Mutable Content in IPFSModule: Mutable Content in IPFS
Module: Mutable Content in IPFS
 
OSCON 2004: A Developer's Tour of Chandler
OSCON 2004: A Developer's Tour of ChandlerOSCON 2004: A Developer's Tour of Chandler
OSCON 2004: A Developer's Tour of Chandler
 
Just In Time Scalability Agile Methods To Support Massive Growth Presentation
Just In Time Scalability  Agile Methods To Support Massive Growth PresentationJust In Time Scalability  Agile Methods To Support Massive Growth Presentation
Just In Time Scalability Agile Methods To Support Massive Growth Presentation
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Peer-to-Peer Systems

  • 1. Peer-to-Peer Systems What’s behind the buzzword? Uwe Schmidt Un-Distinguished Lecture Series 16/02/2007
  • 2. What is it? • What does Peer-to-Peer (P2P) mean to you? • What does “peer” mean? • Merriam-Webster: one that is of equal standing with another : EQUAL; especially : one belonging to the same societal group especially based on age, grade, or status
  • 3. P2P Principle • Organizational principle, core concepts: • Self-organizing, no central management • Resource sharing, exploits resources at the edge of the network • Peers in P2P are all equal (more or less) • Large number of peers in the network
  • 4. Properties of P2P • Unreliable, uncoordinated, unmanaged • Resilient to attacks, heterogeneous • Large collection of resources
  • 5. When to use it? • Budget • Resource relevance • Trust • Rate of system change • Criticality
  • 6. P2P Vision No More Dedicated Servers, Everything in Internet Served by Peers
  • 7. P2P File-sharing • The most popular application of the P2P principle • Made P2P popular • We will look at the “evolution” of P2P file- sharing in the following...
  • 8.
  • 9. Napster • First P2P file-sharing application (June 1999) • Only MP3 sharing possible • Made the term “P2P” known • Created by Shawn Fanning (nickname “Napster”)
  • 10. How Napster worked • Based on central index server (farm) • User register and give list of files to share • Searching based on keywords • Results: List of files with additional information, e.g. peer’s bandwidth, encoding rate, file size
  • 11. Napster Diagram • Peers log in Server • Send list of files to share • Peer queries server • Server responds • File transfer directly
  • 12. Strengths & Weaknesses Strength Weakness Fast, efficient and Central server is a overall search single point of failure Consistent view of Expensive to maintain the network central server (farm)
  • 13.
  • 14. Gnutella • Addresses some of Napster’s weaknesses and introduces its own problems • Originally developed at Nullsoft (AOL) • Accidentally released on their website • Open protocol specifications • Fully distributed
  • 15. How Gnutella works • Based on an overlay network • All peers are fully equal • A peer needs to know another peer, that is already in the network, to join • Searching based on flooding • Direct downloads
  • 16. Gnutella Diagram Duplicate Messages Unreached Peers Query: “Madonna” Query Hit: Respond Direct Transfer Query Hit: Respond Query radius = 2
  • 17. Strengths & Weaknesses Strength Weakness Fully distributed, Flooding a query is no attack points? extremely inefficient Search only reaches a Open protocol subset of peers due to limited query radius
  • 18.
  • 19. KaZaA • Created in March 2001 (Niklas Zennström) • Combines strengths of Napster and Gnutella • Based on “supernode architecture” • Exploits heterogenity of peers • Organize peers into a hierarchy
  • 20. How KaZaA works • Two-tier hierarchy • Two kinds of nodes • Ordinary nodes (ON) • Supernodes (SN) • ON belongs to SN
  • 21. KaZaA Diagram SN Direct Transfer SN SN
  • 22. Strengths & Weaknesses Strength Weakness Still no overall search Combines good points from Napster and Gnutella Easier to attack?
  • 23. Comparison Napster Gnutella KaZaA Type of Centralized Distributed Hybrid network Efficient +++ --- + searching Resilience --- ++? + to attacks
  • 24. Current State • Most bigger file-sharing systems sued into submission (e.g. Napster and KaZaA) • Although many still running because of open clients • User who share copyrighted content are sued as well... • e.g. by the RIAA
  • 25. Non-direct file-sharing • People try to be anonymous by disguising their identity, i.e. IP-address • Idea: Non-direct file transfer, i.e. route traffic through intermediate peers • Have currently too much overhead • slow and not very efficient
  • 26. BitTorrent • Developed by Bram Cohen in 2001 • New approach for sharing large files • Goal: Quickly replicate one file to a large number of clients • More appropriately called P2P content distribution instead of file-sharing
  • 27. How BitTorrent works • Build a network for each file to distribute • Each file has unique “link” • “torrent” file holds metadata about a file • Tracker is a server to manage active clients • Files are broken into chunks
  • 28. BitTorrent Download • Client gets “torrent” file from somewhere • Client contacts tracker, gets lists of peers • Client contacts other peers directly for download of specific chunks
  • 29. Tit-for-Tat policy • Encourages cooperation, discourages free-riding • A peer serves peers that serve it • Peers download rarest chunks first • makes them attractive to other peers, they can then download in return • also prevents chunks from disappearing
  • 30. Strengths & Weaknesses Strength Weakness Works quite well, only Files have to be large slow in the beginning Efficient distrubution No searching mechanism Enforces contribution, Everyone must discourages free-riding contribute
  • 31. Other P2P applications • P2P Communications • Email, IM,VoIP • P2P Computation • SETI@Home • P2P Collaboration • Wikipedia
  • 32.
  • 33. Skype • Developed by the same people as KaZaA • 9 Million concurrent users (Jan. 29 2007) • Very similar to KaZaA’s architecture • Supernodes and ordinary nodes • Central server for login and billing
  • 34. Skype • Proprietary and encrypted protocol • Source code is closed • Executable uses a lot of mechanisms to protect against reverse engineering • Anti-debugger code • Partly encrypted
  • 35. How Skype goes through Firewalls • Skype server plays mediator • takes IP adresses and UDP ports • forwards them to other side • Both clients start connections • Firewalls think that packets from the other side are responses to started connections
  • 36. Joost • Brought to you by the guys who made KaZaA and Skype • Uses P2P video streaming technology • Tries to merge the best of TV with the best of the Internet • Beta test is running right now • Advertisement based,View on demand
  • 37.
  • 38. That’s it Let’s get some beer...
  • 39. References Most slides are based and copied in large part from Jussi Kangasharju’s lecture on “Peer-to-Peer and Grid Computing”, chapter 1 and 2. http://elara.tk.informatik.tu-darmstadt.de/LectureNotes/ws0607/P2P/ Other References: 1. quot;File sharing.quot; Wikipedia, The Free Encyclopedia. http://en.wikipedia.org/wiki/File_sharing 2. quot;Skype.quot; Wikipedia, The Free Encyclopedia. http://en.wikipedia.org/wiki/Skype 3. quot;Napster.quot; Wikipedia, The Free Encyclopedia. http://en.wikipedia.org/wiki/Napster 4. Joost. http://www.joost.com
  • 40. References 5. The hole trick: How Skype & Co. get round firewalls http://www.heise-security.co.uk/articles/82481 6. Silver Needle in the Skype http://www.secdev.org/conf/skype_BHEU06.handout.pdf 7. Picture of Gtk-Gnutella http://impressive.net/people/gerald/2002/01/21/gtk-gnutella.png 8. Picture of KaZaA http://www.lagranepoca.com/news_images/2006-7-28-kazaa.gif 9. Pictures of Skype http://about.skype.com/pictures.html