peer to peer

Dějiny

TheP2ParchitectureembodiesakeyconceptofInternettechnology,whichwasdescribedinthefirstRFCdocument,HostSoftwareonApril7,1969.Underthegeneraltrendofexchangingmultimediafileswithoutacentralindexserverstructure,thisconcepthasbeenwidelypopularized.

Klasifikace

Podle stupně centralizace

  • PureP2P

    • Uzly působí současně jako klient i server.

    • Existuje centrální server.

    • Existuje centrální směrovač.

    • SuchasGnutella.

  • RůznéP2P

    • Thereisacentralserverthatstoresnodeinformationandrespondstorequestsforthisinformation.

    • Nodesareresponsibleforpublishingthisinformation(becausethecentralserverdoesnotsavefiles),letthecentralserverknowwhatfilestheywanttoshare,andletthenodesthatneeditdownloaditssharableresources.

    • Theroutingterminalusestheaddresstoobtaintheabsoluteaddressbybeingreferencedbyasetofindexes.

    • Stejně jako původní Napster.

  • HybridníP2P

    • ContainsthecharacteristicsofbothpureP2PandhybridP2P.

    • SuchasSkype.

Podle topologie sítě

  • StrukturaP2P

    • Point-to-pointhaslinkinformationtoeachother,formingaspecificruletopologywitheachother.

    • Whenaresourceneedstoberequested,followthetopologyRulesearch,ifitexists,youmustfindit.

    • SuchasChord, YaCy, Kademlia.

  • NoneStrukturaP2P

    • Point-to-pointhaslinkinformationtoeachother,forminganirregularnetworktopologywitheachother.

    • Whenaresourcenodeneedstoberequested,itissearchedbybroadcast,usuallyTTLisset,evenifitexists,itmaynotbefound.

    • Například Gnutella.

  • Volně strukturované P2P

    • Point-to-pointhaslinkinformationtoeachother,forminganirregularnetworktopologywitheachother.

    • Whenaresourceneedstoberequested,itisestimatedandsearchedbasedonexistinginformation,whichisbetweenstructuredP2PandunstructuredP2P.

    • SuchasFreenet.

Výhody P2Pnetwork

AnimportantgoalofP2Pnetworkistoenableallclientstoprovideresources,includingbandwidth,Storagespaceandcomputingpower.Therefore,whenanodejoinsandrequestsforthesystemincrease,thecapacityoftheentiresystemalsoincreases.ThisisnotpossiblewiththeClient-Serverstructurewithasetoffixedservers,becauseintheabove-mentionedstructure,theincreaseofclientsmeansslowerdatatransmissionforallusers.

ThedistributednatureoftheP2Pnetworkalsoincreasestherobustnessoffailurepreventionbyreplicatingdataonmultiplenodes,andinapureP2Pnetwork,nodesdonotneedtorelyonacentralindexservertofinddata.Inthelattercase,thesystemwillnotcrashatasinglepoint.

WhenP2PisusedtodescribetheNapsternetwork,thepeer-to-peerprotocolisconsideredimportant,butinreality,theachievementoftheNapsternetworkisthatthepeernodes(justliketheendofthenetwork)uniteacentralindextofulfill.Thisallowsittolocateavailablecontentquicklyandefficiently.Thepeer-to-peerprotocolisjustageneralmethodtoachievethis.

Aplikace

Point-to-pointtechnologyhasmanyapplications.Itisverycommontosharefilescontainingvariousformatsofaudio,video,data,etc.Instantdata(suchasIPphonecommunication,Anychataudioandvideodevelopmentsoftware)canalsobetransmittedusingP2Ptechnology.

Somenetworksandcommunicationchannels,suchasNapster,OpenNAP,andIRC@find,useamaster-slavearchitecturestructuretohandlesometasks(suchassearchfunctions)ontheonehand,andP2PstructureontheotherhandTohandleothertasks.Somenetworks,suchasGnutellaandFreenet,usetheP2Pstructuretohandlealltasks,andaresometimesconsideredtobetrueP2Pnetworks.AlthoughGnutellaalsousesadirectoryservertofacilitatenodestogetthenetworkaddressesofothernodes.

AcademicP2Pnetwork

January28,2015,thedevelopersofPennsylvaniaStateUniversity,unitedtheMITOpenKnowledgeInitiative,SimonFraserUniversityResearchersfrom,andthesecond-generationInternetP2Pworkinggroup,aredevelopinganacademicapplicationofP2Pnetworks.ThisprojectiscalledLionShare,basedonthesecondgenerationofnetworktechnology,morespecificallytheGnutellamodel.Themainpurposeofthisnetworkistoallowusersfrommanydifferentacademicinstitutionstoshareacademicmaterials.TheLionSharenetworkusesahybridP2Pnetworktype,whichisamixtureofGnutella'sdecentralizedP2PnetworkandthetraditionalC/Snetwork.Usersofthisprogramcanuploadfilestoaserver,regardlessofwhethertheuserisonline,theycancontinuetoshare.Thisnetworkalsoallowsuseinsharedcommunitiesthataremuchsmallerthannormal.

ThemaindifferencebetweenthisnetworkandotherP2PnetworkscurrentlyinuseisthattheLionSharenetworkdoesnotallowanonymoususers.Thepurposeofthisistopreventcopyrightedmaterialsfrombeingsharedonthenetwork,whichalsoavoidslegaldisputes.Anotherdifferenceistheselectivesharingofindividualfilesfordifferentgroups.Theusercanindividuallyselectwhichuserscanreceivethisfileorgroupoffiles.

Theacademiccommunityneedsthistechnologybecausemoreandmoremultimediafilesareusedintheclassroom.Moreandmoreprofessorsusemultimediafiles,likeaudiofiles,videofilesandslideshows.Passingthesefilestostudentsisadifficulttask,anditismucheasierifyouuseanetworklikeLionShare.

Výhody

  • Má lepší paralelní možnosti zpracování.

  • Usingmemorytomanageexchangedata,greatlyimprovingperformance.

  • Noneedtoinvestalotofmoneyintheserver'ssoftwareandhardwareequipment.

  • Vhodné pro sítě malého rozsahu, snadná údržba.

Nevýhody

  • Thesetupismorecomplicated.Inadditiontoadevelopmentserver,italsoneedsadedicatedclient.

  • Používá se v sítích velkého rozsahu, sdílení zdrojů je neuspořádané, správa je obtížná a zabezpečení je pomalé.

Spory

Právní aspekty

InUSlaw,the"Betamaxjudgment"precedentinsiststhatcopying"technology"isnottheessenceIllegal,iftheyhaveasubstantivenon-infringinguse.ThisdecisionbeforethewidespreaduseoftheInternetisappliedtomostdatanetworks,includingP2Pnetworks,becausethedisseminationofapproveddocumentsisalsopossible.Theseillegalandinfringingusesincludeopensourcesoftware,publicdomainfiles,andworksnotcoveredbycopyright.Otherjudicialdepartmentscanviewthissituationinasimilarway.

Infact,mostofthefilessharedonP2Pnetworksarecopyrightedpopularmusicandmovies,includingvariousformats(MP3,MPEG,RM,etc.).Inmostjurisdictions,sharingthesecopiesisillegal.Thishascausedmanyobservers,includingmostmediacompaniesandsomeP2Padvocates,tocriticizethisnetworkasahugethreattotheexistingdistributionmodel.Studiesthatattempttomeasureactualmonetarylossesaresomewhatunclear.Althoughtheexistenceofthesenetworksonpapercausedalotoflosses,infact,sincetheestablishmentofthesenetworks,theactualincomehasnotchangedmuch.Regardlessofwhetherthisthreatexists,theRecordingIndustryAssociationofAmericaandtheMotionPictureAssociationofAmericaarespendingalotofmoneytryingtolobbylawmakerstocreatenewlaws.Somecopyrightownersalsopaycompaniestohelplegallychallengeuserswhoengageinillegalsharingoftheirmaterials.

DespitetheBetamaxverdict,P2Pnetworkshavebecometargetsofattacksbyartistsandrepresentativesofcopyrightlicensingorganizations.ThisincludesindustryorganizationssuchastheRecordingAssociationofAmericaandtheMotionPictureAssociationofAmerica.TheNapsterservicewasforcedtoshutdownduetoacomplaintfromtheRecordingAssociationofAmerica.Inthiscase,Napsterdeliberatelyboughtandsoldtheseaudiovisualfilesthatwerenotlicensedfromthecopyrightowner.

Withtheexpansionofmediacompanies’effortstocombatcopyrightinfringement,thesenetworkshaverapidlyandcontinuouslyadjusted,makingitdifficulttoremovethembothtechnicallyandlegally.Thisleadstouserswhoreallyviolatethelawbeingtargeted,becausealthoughtheunderlyingtechnologyislegal,itsabusebyindividualswhospreaditinawayofinfringingcopyrightisobviouslyillegal.

AnonymousP2Pnetworkallowsthepublicationofmaterials,nomatterlegalorlegal,thereislittleornolegalresponsibilityinvariousjurisdictions.Manypeoplesaythatthiswillleadtomoreillegalmaterialsmoreeasilyspread,andeven(somepeoplepointedout)promoteterrorism,requiringregulationintheseareas.Othersobjectedthatthepotentialforillegalusecannotpreventtheuseofthistechnologyforlegitimatepurposes,andthepresumptionofinnocencemustbeapplied,asothernon-P2Panonymousservices,suchasemail,havesimilarcapabilities.

Důležitý případ:

  • U.S.law

    • SonyCorp.vsUniversalCityStudios (Betamaxverdict)

    • MGMvsGrokster

Bezpečnostní aspekty

ManyP2PTheInternethasbeencontinuouslyattackedbypeoplewithvariouspurposes.Examplesinclude:

  • Poisoningattacks(providingfileswithdifferentcontentanddescription)

  • Denialofserviceattacks(makingthenetworkveryslowEvencrashcompletely)

  • Betrayalattack(bloodsucking)(usersorsoftwareusethenetworkwithoutcontributingtheirownresources)

  • Insertavirusintothedata(forexample,thedownloadedortransferredfilemaybeinfectedwithavirusoraTrojanhorse)

  • TheTrojanhorseoftheP2Psoftwareitself(forexample,thesoftwaremaycontainspyware)

  • Filtering(networkoperatorsmaytrytoprohibitthetransmissionofdatafromP2Pnetworks)

  • Identityattacks(e.g.,Trackingusersonthenetworkandcontinuouslyharassingorattackingthemlegally)

  • Spam(suchassendingunsolicitedinformationonthenetwork--notnecessarilyDenialofserviceattack)

IfP2Pnetworkiscarefullydesignedandencryptiontechnologyisused,mostoftheattackscanbeavoidedorcontrolled.P2PnetworksecurityisinfactcloselyrelatedtotheByzantinegeneralproblemconnect.However,whenmanynodestrytodestroyit,almostanynetworkwillfail,andmanyprotocolswillfailbecauseoffewerusers.

OnApril23,2007,CAissuedaninformationsecurityalert,pointingoutFoxy,BitComet,eDonkey,µTorrent,Ares,Azureus,BearShare,Lphant,Shareaza,Hamachi,exeemlite,Fpsetup,Morpheus,iMeshThe14typesofP2Psoftwarehavesecuritythreats.ThepotentialthreatsourcesoftheseP2Psoftwareincludethepossibilityofoverwritingfiles,renamingfiles,deletingfiles,andimplantingmaliciousprogramsbythirdparties.

Budoucnost výpočetní techniky

Strictlyspeaking,fromatechnicalperspective,bothpartiesinapeer-to-peernetworkarestrictlypeersandprovideandusedataequally,andthereisnodifferencebetweenaserverandaclient.ButsuchpureP2Papplicationsandnetworksarefewandfarbetween.MostofthenetworksandapplicationscalledP2Pactuallyrelyonorincludesomenon-peerunitslikeDNS.Atthesametime,multipleprotocolsareactuallyusedintheapplication,sothatnodescanbecomeclients,servers,andpeernodesatthesametimeortime-sharing;forexample,Usenet(1979)andFidoNet(1984)havebeenusedformanyyears,suchascompletelydistributedpairs.Waitforthenetwork.

ManyP2Psystemsusestrongerpeers(calledSuperNodes)asservers,andthoseclientnodesareconnectedtoasuperpeerinastar-likemanner.

Inthelate1990s,beforeinstantmessagingbecamepopular,inordertopromotethedevelopmentofpeer-to-peernetworkapplications,SunSun(SUN)addedsomeclassestoJavatechnology.Sothatdeveloperscandevelopreal-timechatappletsandapplicationsthatarenotcontrolledbythecentralserver.ThisworkiscontinuedbytheJXTAproject.

P2Psystemsandapplicationshaveattractedalotofattentionfromcomputerscienceresearch.Inthisfield,thereareChordProject,ARPANET,thePASTstorageutility,andP-Grid(aspontaneouslyorganizedemergingcoveragenetwork),AndaseriesofoutstandingresearchprojectsincludingtheCoopNetcontentdistributionsystem.

Omezení

Čínská lidová republika

P2PtechnologyisinablankstateintermsofChineselawsandinprincipleisnotsubjecttoofficialrestrictionsbytheChinesegovernment.However,becauseP2Ptechnologywilloccupyalargeamountofnetworkbandwidth,andbecauseofthecurrentstatusofChina'snetworkfacilitiesandChina'sattitudetonetworkmanagement,therearevaryingdegreesofrestrictionsonP2Pcommunicationmethods.

AllmajorISPsinChinahaveimposedspeedlimitsonnetworkaccess,andwilltakemeasuresforbandwidth-consumingapplicationssuchasP2P.CommonmethodsincludelimitingthenumberofTCPconnections,blockingtheP2Pprotocol,andrestrictingdownloads/uploads.Speed​​etc.However,becausemostoftheseactionsarecarriedoutinsecret,manyP2PusersinChinaclaimthatthishasseriouslyviolatedtheirrighttoknowanduse.InChina,themostrestrictedP2PsoftwareisBitTorrentseriessoftwareandeMule.

InthecaseofincreasinglyscarceIPv4addressresources,mostareasofChinahavebeguntoadoptthe"largeintranet"approachtoreducetheconsumptionofIPaddressresources,thatis,mosthouseholdsandindividualuserswillconnectTherouteroftheISPusesnetworkaddresstranslationtoconnecttotheexternalnetwork.DuetothelimitationsofNATandsomeP2Pprotocols,mostP2Psoftwarecanonlybetransmittedontheintranet,whichhasagreatimpactontheP2Pindustrychain.

Inaddition,outofconsiderationofdomesticindustrysupportandinformationcontrol,ChinawillalsorestrictsomeP2Pinstantmessagingsoftware.TheMinistryofInformationIndustryofChinahasissuedadocumentrequestingthatVOIPcanonlybetestedondesignatednetworkoperators,andskypeisblockedinsomeareas,butsomeofficialshavedeniedthisandstatedthatitisonlyforPC-Phone.

InDecember2009,theMinistryofIndustryandInformationTechnologyrevokedtherecordnumberoftheBtchinawebsiteonthegroundsofignoringtheaudiovisuallicenseandforcedittoclosethestation.TheactionalsoaffectedBTsitesincludingYoyoBirdForum.

Japonsko

InJaponsko,accordingtoJaponsko'scurrentcopyrightlaw,allwebsitesinJaponskothatprovidefreecommercialsoftware/orotherdatadownloadsareillegal.Seriousviolationscanbesentencedtofixed-termimprisonmentandafine.BothBitTorrentseriessoftwareandeMulearebanned.ButbecauseoftheexistenceofShareandWinnysoftware,P2PtechnologyisstillpopularinJaponsko.BothsoftwareusesIPencryptionanddataencryptiontechnology.MillionsofpeopleinJaponskousethesetwosoftwaretoexchangeanimation,games,music,softwareandotherdata,butitisclearthatthepolicehavetakencontrolofthemethodoftracingusers.OnMay9,2008,threeworkerswhopostedalargenumberofcopyrightedworksonsharewerearrested.Thepopularityofthesetwosoftwarehasalsobroughtsomenegativeproblems,suchastheleakageofconfidentialinformationandthespreadofcomputerviruses.

Nový Zéland

InNový Zéland,accordingtoNový Zéland'sSeptember2011copyrightlaw,downloadingcopyrightedcontentinNový Zélandisillegal,anditismainlyaimedatdownloadingP2Ptechnology.Ifthedownloadedcontentreceivesacomplaintfromthecopyrightparty,theISPwillevaluateitbasedonthetimetheuserisdownloading.Ifthereiscopyrightinfringement,theuserwillbewarned.Threewarningswillresultinafineof15,000Nový Zélanddollars,whichisapproximately75,000RMB.However,itshouldbenotedthatonlineviewingandfilehostingwebsitesarenotwithinthescopeofthisfine.Inotherwords,usersmaybefinediftheydownloadacopyright-protectedworkthroughthetorrentsofTorrentsoftware,buttheywillnotbepunishediftheyuseofflinefiledownloadmethods.Moreover,thecopyrightholdersreceivingcopyrightprotectioninNový ZélandusuallyonlyincludesomeEuropeanandAmericancompanies,soforlocalChinese,eveniftheyusep2ptechnologytodownloadChina,SouthKoreaandotherAsianvarietymovieswillnotbesued.

Vidět

  • Foxy

  • eMule

  • BitTorrentProtocol

  • BitTorrentProtocolSpecification

  • I2P

  • Decentralizovaná síť

Související články
HORNÍ