peer to peer

История

TheP2ParchitectureembodiesakeyconceptofInternettechnology,whichwasdescribedinthefirstRFCdocument,HostSoftwareonApril7,1969.Underthegeneraltrendofexchangingmultimediafileswithoutacentralindexserverstructure,thisconcepthasbeenwidelypopularized.

Класификация

Според степента на централизация

  • PureP2P

    • Възлите действат и като клиент, и като сървър едновременно.

    • Няма централен сървър.

    • Няма централен рутер.

    • Като Гнутела.

  • Разни P2P

    • Thereisacentralserverthatstoresnodeinformationandrespondstorequestsforthisinformation.

    • Nodesareresponsibleforpublishingthisinformation(becausethecentralserverdoesnotsavefiles),letthecentralserverknowwhatfilestheywanttoshare,andletthenodesthatneeditdownloaditssharableresources.

    • Theroutingterminalusestheaddresstoobtaintheabsoluteaddressbybeingreferencedbyasetofindexes.

    • Като оригиналния Napster.

  • HybridP2P

    • ContainsthecharacteristicsofbothpureP2PandhybridP2P.

    • Такъв е Skype.

Според топологията на мрежата

  • СтруктураP2P

    • Point-to-pointhaslinkinformationtoeachother,formingaspecificruletopologywitheachother.

    • Whenaresourceneedstoberequested,followthetopologyRulesearch,ifitexists,youmustfindit.

    • Като Chord, YaCy, Kademlia.

  • NoneСтруктураP2P

    • Point-to-pointhaslinkinformationtoeachother,forminganirregularnetworktopologywitheachother.

    • Whenaresourcenodeneedstoberequested,itissearchedbybroadcast,usuallyTTLisset,evenifitexists,itmaynotbefound.

    • Например Гнутела.

  • Слабо структуриран P2P

    • Point-to-pointhaslinkinformationtoeachother,forminganirregularnetworktopologywitheachother.

    • Whenaresourceneedstoberequested,itisestimatedandsearchedbasedonexistinginformation,whichisbetweenstructuredP2PandunstructuredP2P.

    • Като Freenet.

Предимства на P2P мрежата

AnimportantgoalofP2Pnetworkistoenableallclientstoprovideresources,includingbandwidth,Storagespaceandcomputingpower.Therefore,whenanodejoinsandrequestsforthesystemincrease,thecapacityoftheentiresystemalsoincreases.ThisisnotpossiblewiththeClient-Serverstructurewithasetoffixedservers,becauseintheabove-mentionedstructure,theincreaseofclientsmeansslowerdatatransmissionforallusers.

ThedistributednatureoftheP2Pnetworkalsoincreasestherobustnessoffailurepreventionbyreplicatingdataonmultiplenodes,andinapureP2Pnetwork,nodesdonotneedtorelyonacentralindexservertofinddata.Inthelattercase,thesystemwillnotcrashatasinglepoint.

WhenP2PisusedtodescribetheNapsternetwork,thepeer-to-peerprotocolisconsideredimportant,butinreality,theachievementoftheNapsternetworkisthatthepeernodes(justliketheendofthenetwork)uniteacentralindextofulfill.Thisallowsittolocateavailablecontentquicklyandefficiently.Thepeer-to-peerprotocolisjustageneralmethodtoachievethis.

Приложения

Point-to-pointtechnologyhasmanyapplications.Itisverycommontosharefilescontainingvariousformatsofaudio,video,data,etc.Instantdata(suchasIPphonecommunication,Anychataudioandvideodevelopmentsoftware)canalsobetransmittedusingP2Ptechnology.

Somenetworksandcommunicationchannels,suchasNapster,OpenNAP,andIRC@find,useamaster-slavearchitecturestructuretohandlesometasks(suchassearchfunctions)ontheonehand,andP2PstructureontheotherhandTohandleothertasks.Somenetworks,suchasGnutellaandFreenet,usetheP2Pstructuretohandlealltasks,andaresometimesconsideredtobetrueP2Pnetworks.AlthoughGnutellaalsousesadirectoryservertofacilitatenodestogetthenetworkaddressesofothernodes.

AcademicP2Pмрежа

January28,2015,thedevelopersofPennsylvaniaStateUniversity,unitedtheMITOpenKnowledgeInitiative,SimonFraserUniversityResearchersfrom,andthesecond-generationInternetP2Pworkinggroup,aredevelopinganacademicapplicationofP2Pnetworks.ThisprojectiscalledLionShare,basedonthesecondgenerationofnetworktechnology,morespecificallytheGnutellamodel.Themainpurposeofthisnetworkistoallowusersfrommanydifferentacademicinstitutionstoshareacademicmaterials.TheLionSharenetworkusesahybridP2Pnetworktype,whichisamixtureofGnutella'sdecentralizedP2PnetworkandthetraditionalC/Snetwork.Usersofthisprogramcanuploadfilestoaserver,regardlessofwhethertheuserisonline,theycancontinuetoshare.Thisnetworkalsoallowsuseinsharedcommunitiesthataremuchsmallerthannormal.

ThemaindifferencebetweenthisnetworkandotherP2PnetworkscurrentlyinuseisthattheLionSharenetworkdoesnotallowanonymoususers.Thepurposeofthisistopreventcopyrightedmaterialsfrombeingsharedonthenetwork,whichalsoavoidslegaldisputes.Anotherdifferenceistheselectivesharingofindividualfilesfordifferentgroups.Theusercanindividuallyselectwhichuserscanreceivethisfileorgroupoffiles.

Theacademiccommunityneedsthistechnologybecausemoreandmoremultimediafilesareusedintheclassroom.Moreandmoreprofessorsusemultimediafiles,likeaudiofiles,videofilesandslideshows.Passingthesefilestostudentsisadifficulttask,anditismucheasierifyouuseanetworklikeLionShare.

Предимства

  • Има по-добри възможности за паралелна обработка.

  • Usingmemorytomanageexchangedata,greatlyimprovingperformance.

  • Noneedtoinvestalotofmoneyintheserver'ssoftwareandhardwareequipment.

  • Подходящ за мрежи с малък мащаб, лесен за поддръжка.

Недостатъци

  • Thesetupismorecomplicated.Inadditiontoadevelopmentserver,italsoneedsadedicatedclient.

  • Използва се в широкомащабни мрежи, споделянето на ресурси е нарушено, управлението е трудно и сигурността е ниска.

Спорове

Правни аспекти

InUSlaw,the"Betamaxjudgment"precedentinsiststhatcopying"technology"isnottheessenceIllegal,iftheyhaveasubstantivenon-infringinguse.ThisdecisionbeforethewidespreaduseoftheInternetisappliedtomostdatanetworks,includingP2Pnetworks,becausethedisseminationofapproveddocumentsisalsopossible.Theseillegalandinfringingusesincludeopensourcesoftware,publicdomainfiles,andworksnotcoveredbycopyright.Otherjudicialdepartmentscanviewthissituationinasimilarway.

Infact,mostofthefilessharedonP2Pnetworksarecopyrightedpopularmusicandmovies,includingvariousformats(MP3,MPEG,RM,etc.).Inmostjurisdictions,sharingthesecopiesisillegal.Thishascausedmanyobservers,includingmostmediacompaniesandsomeP2Padvocates,tocriticizethisnetworkasahugethreattotheexistingdistributionmodel.Studiesthatattempttomeasureactualmonetarylossesaresomewhatunclear.Althoughtheexistenceofthesenetworksonpapercausedalotoflosses,infact,sincetheestablishmentofthesenetworks,theactualincomehasnotchangedmuch.Regardlessofwhetherthisthreatexists,theRecordingIndustryAssociationofAmericaandtheMotionPictureAssociationofAmericaarespendingalotofmoneytryingtolobbylawmakerstocreatenewlaws.Somecopyrightownersalsopaycompaniestohelplegallychallengeuserswhoengageinillegalsharingoftheirmaterials.

DespitetheBetamaxverdict,P2Pnetworkshavebecometargetsofattacksbyartistsandrepresentativesofcopyrightlicensingorganizations.ThisincludesindustryorganizationssuchastheRecordingAssociationofAmericaandtheMotionPictureAssociationofAmerica.TheNapsterservicewasforcedtoshutdownduetoacomplaintfromtheRecordingAssociationofAmerica.Inthiscase,Napsterdeliberatelyboughtandsoldtheseaudiovisualfilesthatwerenotlicensedfromthecopyrightowner.

Withtheexpansionofmediacompanies’effortstocombatcopyrightinfringement,thesenetworkshaverapidlyandcontinuouslyadjusted,makingitdifficulttoremovethembothtechnicallyandlegally.Thisleadstouserswhoreallyviolatethelawbeingtargeted,becausealthoughtheunderlyingtechnologyislegal,itsabusebyindividualswhospreaditinawayofinfringingcopyrightisobviouslyillegal.

AnonymousP2Pnetworkallowsthepublicationofmaterials,nomatterlegalorlegal,thereislittleornolegalresponsibilityinvariousjurisdictions.Manypeoplesaythatthiswillleadtomoreillegalmaterialsmoreeasilyspread,andeven(somepeoplepointedout)promoteterrorism,requiringregulationintheseareas.Othersobjectedthatthepotentialforillegalusecannotpreventtheuseofthistechnologyforlegitimatepurposes,andthepresumptionofinnocencemustbeapplied,asothernon-P2Panonymousservices,suchasemail,havesimilarcapabilities.

Важен случай:

  • Законът на САЩ

    • SonyCorp.vsUniversalCityStudios(Betamaxverdict)

    • MGM срещу Грокстър

Аспекти на сигурността

ManyP2PTheInternethasbeencontinuouslyattackedbypeoplewithvariouspurposes.Examplesinclude:

  • Poisoningattacks(providingfileswithdifferentcontentanddescription)

  • Denialofserviceattacks(makingthenetworkveryslowEvencrashcompletely)

  • Betrayalattack(bloodsucking)(usersorsoftwareusethenetworkwithoutcontributingtheirownresources)

  • Insertavirusintothedata(forexample,thedownloadedortransferredfilemaybeinfectedwithavirusoraTrojanhorse)

  • TheTrojanhorseoftheP2Psoftwareitself(forexample,thesoftwaremaycontainspyware)

  • Filtering(networkoperatorsmaytrytoprohibitthetransmissionofdatafromP2Pnetworks)

  • Identityattacks(e.g.,Trackingusersonthenetworkandcontinuouslyharassingorattackingthemlegally)

  • Spam(suchassendingunsolicitedinformationonthenetwork--notnecessarilyDenialofserviceattack)

IfP2Pnetworkiscarefullydesignedandencryptiontechnologyisused,mostoftheattackscanbeavoidedorcontrolled.P2PnetworksecurityisinfactcloselyrelatedtotheByzantinegeneralproblemconnect.However,whenmanynodestrytodestroyit,almostanynetworkwillfail,andmanyprotocolswillfailbecauseoffewerusers.

OnApril23,2007,CAissuedaninformationsecurityalert,pointingoutФокси,BitComet,eDonkey,µTorrent,Ares,Azureus,BearShare,Lphant,Shareaza,Hamachi,exeemlite,Fpsetup,Morpheus,iMeshThe14typesofP2Psoftwarehavesecuritythreats.ThepotentialthreatsourcesoftheseP2Psoftwareincludethepossibilityofoverwritingfiles,renamingfiles,deletingfiles,andimplantingmaliciousprogramsbythirdparties.

Бъдещето на компютърните технологии

Strictlyspeaking,fromatechnicalperspective,bothpartiesinapeer-to-peernetworkarestrictlypeersandprovideandusedataequally,andthereisnodifferencebetweenaserverandaclient.ButsuchpureP2Papplicationsandnetworksarefewandfarbetween.MostofthenetworksandapplicationscalledP2Pactuallyrelyonorincludesomenon-peerunitslikeDNS.Atthesametime,multipleprotocolsareactuallyusedintheapplication,sothatnodescanbecomeclients,servers,andpeernodesatthesametimeortime-sharing;forexample,Usenet(1979)andFidoNet(1984)havebeenusedformanyyears,suchascompletelydistributedpairs.Waitforthenetwork.

ManyP2Psystemsusestrongerpeers(calledSuperNodes)asservers,andthoseclientnodesareconnectedtoasuperpeerinastar-likemanner.

Inthelate1990s,beforeinstantmessagingbecamepopular,inordertopromotethedevelopmentofpeer-to-peernetworkapplications,SunSun(SUN)addedsomeclassestoJavatechnology.Sothatdeveloperscandevelopreal-timechatappletsandapplicationsthatarenotcontrolledbythecentralserver.ThisworkiscontinuedbytheJXTAproject.

P2Psystemsandapplicationshaveattractedalotofattentionfromcomputerscienceresearch.Inthisfield,thereareChordProject,ARPANET,thePASTstorageutility,andP-Grid(aspontaneouslyorganizedemergingcoveragenetwork),AndaseriesofoutstandingresearchprojectsincludingtheCoopNetcontentdistributionsystem.

Ограничения

Китайската народна република

P2PtechnologyisinablankstateintermsofChineselawsandinprincipleisnotsubjecttoofficialrestrictionsbytheChinesegovernment.However,becauseP2Ptechnologywilloccupyalargeamountofnetworkbandwidth,andbecauseofthecurrentstatusofChina'snetworkfacilitiesandChina'sattitudetonetworkmanagement,therearevaryingdegreesofrestrictionsonP2Pcommunicationmethods.

AllmajorISPsinChinahaveimposedspeedlimitsonnetworkaccess,andwilltakemeasuresforbandwidth-consumingapplicationssuchasP2P.CommonmethodsincludelimitingthenumberofTCPconnections,blockingtheP2Pprotocol,andrestrictingdownloads/uploads.Speed​​etc.However,becausemostoftheseactionsarecarriedoutinsecret,manyP2PusersinChinaclaimthatthishasseriouslyviolatedtheirrighttoknowanduse.InChina,themostrestrictedP2PsoftwareisBitTorrentseriessoftwareandeMule.

InthecaseofincreasinglyscarceIPv4addressresources,mostareasofChinahavebeguntoadoptthe"largeintranet"approachtoreducetheconsumptionofIPaddressresources,thatis,mosthouseholdsandindividualuserswillconnectTherouteroftheISPusesnetworkaddresstranslationtoconnecttotheexternalnetwork.DuetothelimitationsofNATandsomeP2Pprotocols,mostP2Psoftwarecanonlybetransmittedontheintranet,whichhasagreatimpactontheP2Pindustrychain.

Inaddition,outofconsiderationofdomesticindustrysupportandinformationcontrol,ChinawillalsorestrictsomeP2Pinstantmessagingsoftware.TheMinistryofInformationIndustryofChinahasissuedadocumentrequestingthatVOIPcanonlybetestedondesignatednetworkoperators,andskypeisblockedinsomeareas,butsomeofficialshavedeniedthisandstatedthatitisonlyforPC-Phone.

InDecember2009,theMinistryofIndustryandInformationTechnologyrevokedtherecordnumberoftheBtchinawebsiteonthegroundsofignoringtheaudiovisuallicenseandforcedittoclosethestation.TheactionalsoaffectedBTsitesincludingYoyoBirdForum.

Япония

InЯпония,accordingtoЯпония'scurrentcopyrightlaw,allwebsitesinЯпонияthatprovidefreecommercialsoftware/orotherdatadownloadsareillegal.Seriousviolationscanbesentencedtofixed-termimprisonmentandafine.BothBitTorrentseriessoftwareandeMulearebanned.ButbecauseoftheexistenceofShareandWinnysoftware,P2PtechnologyisstillpopularinЯпония.BothsoftwareusesIPencryptionanddataencryptiontechnology.MillionsofpeopleinЯпонияusethesetwosoftwaretoexchangeanimation,games,music,softwareandotherdata,butitisclearthatthepolicehavetakencontrolofthemethodoftracingusers.OnMay9,2008,threeworkerswhopostedalargenumberofcopyrightedworksonsharewerearrested.Thepopularityofthesetwosoftwarehasalsobroughtsomenegativeproblems,suchastheleakageofconfidentialinformationandthespreadofcomputerviruses.

Нова Зеландия

InНова Зеландия,accordingtoНова Зеландия'sSeptember2011copyrightlaw,downloadingcopyrightedcontentinНова Зеландияisillegal,anditismainlyaimedatdownloadingP2Ptechnology.Ifthedownloadedcontentreceivesacomplaintfromthecopyrightparty,theISPwillevaluateitbasedonthetimetheuserisdownloading.Ifthereiscopyrightinfringement,theuserwillbewarned.Threewarningswillresultinafineof15,000Нова Зеландияdollars,whichisapproximately75,000RMB.However,itshouldbenotedthatonlineviewingandfilehostingwebsitesarenotwithinthescopeofthisfine.Inotherwords,usersmaybefinediftheydownloadacopyright-protectedworkthroughthetorrentsofTorrentsoftware,buttheywillnotbepunishediftheyuseofflinefiledownloadmethods.Moreover,thecopyrightholdersreceivingcopyrightprotectioninНова ЗеландияusuallyonlyincludesomeEuropeanandAmericancompanies,soforlocalChinese,eveniftheyusep2ptechnologytodownloadChina,SouthKoreaandotherAsianvarietymovieswillnotbesued.

Вижте

  • Фокси

  • eMule

  • BitTorrentProtocol

  • Спецификация на BitTorrentProtocol

  • I2P

  • Децентрализирана мрежа

Related Articles
TOP