p2p and e-business

Upload: cuttlazz

Post on 03-Jun-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/12/2019 P2P and E-Business

    1/41

    #Cludio Barradas 2004ESTInstituto Politcnico

    de Castelo Branco

    Negcio Electrnico e Internet

    How Peer-to-Peer Technology is Revolutionizing the Way

    We Do BusinessL. C. S. BarradasEmail: [email protected]/pessoais/claudio

    ESTIPCBAv. do Empresrio6000 767 Castelo BrancoTel. 272339335 Fax:272339399

  • 8/12/2019 P2P and E-Business

    2/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    Contents

    P2P Computing History

    Evolution of Distributed

    Computing

    P2P Models

    P2P Applications

    P2P Importance

    Social Impacts of P2P

    P2P Technology Enablers

    JXTA P2P Network

    JXTA Objectives

    JXTA Software Architecture

    JXTA Virtual Network

    JXTA Peer Types

    JXTA Peer Groups

    JXTA Security

  • 8/12/2019 P2P and E-Business

    3/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    P2P Computing

    File Sharing Instant Messaging

    MP3

    mpeg MP3 AVI

    http://emule-project.net/
  • 8/12/2019 P2P and E-Business

    4/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    P2P Computing History

    Smoke signals (native North Americans, Chinese)

    Telegraphy (Morse, 1838)

    Telephone Communications (Bell, 1876)

    Internet birth Usenet, BBS, and FTPs. (1960)

    At the end of 80s,PCs became increasingly powerful (speed and processing

    power). Software developers realized that they could put server software on

    individual PCs and initiate a direct two-way flow of information between

    peers. IRC appears (Jarkko Oikarinen,1988)

    Napster appearance (Shawn Fanning, 19992000). People began to realize thetrue potential of P2P.

    B.I.

    A.I.

  • 8/12/2019 P2P and E-Business

    5/41 #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    Evolution of Distributed Computing

    JXTA, Gnutella, ...

    HTTP

    TCP/IP

  • 8/12/2019 P2P and E-Business

    6/41 #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    Napster Architecture

  • 8/12/2019 P2P and E-Business

    7/41 #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    P2P Models I

    Pure P2P Model

    Entirely Depends on Computers

    Works without relying in a central server.

    Peers find each other dynamically.

    Allows users to set their own rules and

    environments.

    Problem: Finding other peers is a high cost

    operation.

  • 8/12/2019 P2P and E-Business

    8/41 #Cludio Barradas 2004ESTInstituto Politcnico

    de Castelo Branco

    P2P Models II

    Hybrid Model 1 P2P with Simple Discovery

    The role of the server is restricted toproviding the names of connected peers to anincoming peer, which notifies the server aboutits presence by logging in.

    The server only assists peers by providing a listof connected peers. Connections andcommunications still remains as part of thejob of the peers.

    This model surpass the pure P2P model, oncethe peers list which increases the chances offinding a larger number of peers on thenetwork.

  • 8/12/2019 P2P and E-Business

    9/41 #Cludio Barradas 2004ESTInstituto Politcnico

    de Castelo Branco

    P2P Models III

    Hybrid Model 2 P2P with a Discovery and Lookup Server

    The server provides a list of connected peersalong with the resources available with eachof them.

    Integrates the features of the pure P2P and

    the P2P with simple discovery server modelsfor enhanced functionality of the server.

    This model reduces the burden on peers, asthere is no longer a need to visit each peerpersonally for the required information.

    Two connected peers establishcommunication, keep it alive, and performvarious activities ( e.g.: logging into thedatabase the information about theconnecting peers, entering an index ofresources shared by them, and so on).

  • 8/12/2019 P2P and E-Business

    10/41#Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    Working of Various P2P Models

    A P2P application should provide the follow features:

    Tracing out other peers

    Finding other peers on the P2P network

    Monitoring other Peers

    Querying Peers for required resource

    Files, Services, etc...

    Sharing resources with other peers.

  • 8/12/2019 P2P and E-Business

    11/41#Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    Ideal P2P Applications

    Applications best suited for P2P implementation are those where:

    Centralization is not possible or desired

    Massive scalability is desired

    Relationships are transient or ad-hoc

    Resources are highly distributed

    Resilience is desired

  • 8/12/2019 P2P and E-Business

    12/41#Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    Instant Messaging:

    ICQ (www.icq.com)

    MSN Messenger (www.messenger.msn.com)

    AOL Internet Messenger (www.aol.com/aim

    Yahoo! Messenger(www.messenger.yahoo.com)

    File Sharing:

    Napster / OpenNap Emule / edonekey2000/ overnet

    Kazaa / kazaa Lite

    BearShare/ Morpheus /LimeWire (Gnutella Clients)

    Distributed Computing

    SETI@Home

    Folding@home

    Distributed.net

    Most Popular P2P Applications

    http://www.icq.com/http://www.messenger.msn.com/http://www.aol.com/aimhttp://www.messenger.yahoo.com/http://emule-project.net/http://localhost/var/www/apps/conversion/tmp/scratch_5/http://emule-project.net/http://www.messenger.yahoo.com/http://www.messenger.yahoo.com/http://www.messenger.yahoo.com/http://www.messenger.yahoo.com/http://www.messenger.yahoo.com/http://www.messenger.yahoo.com/http://www.messenger.yahoo.com/http://www.aol.com/aimhttp://www.aol.com/aimhttp://www.aol.com/aimhttp://www.aol.com/aimhttp://www.aol.com/aimhttp://www.messenger.msn.com/http://www.messenger.msn.com/http://www.messenger.msn.com/http://www.messenger.msn.com/http://www.messenger.msn.com/http://www.messenger.msn.com/http://www.messenger.msn.com/http://www.icq.com/http://www.icq.com/http://www.icq.com/http://www.icq.com/http://www.icq.com/
  • 8/12/2019 P2P and E-Business

    13/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    General P2P Applications

  • 8/12/2019 P2P and E-Business

    14/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    Why is P2P Important?

    The Value of P2P

    P2P offers the information and services that are more important to you;

    P2P incurs minimum cost;

    P2P Saves Time

    P2P gives you control;

    P2P offers the full richness of the Internet;

    P2P offers virtual universal accessibility.

  • 8/12/2019 P2P and E-Business

    15/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    Why is P2P Important? (...)

    The Technical Value of P2P

    P2P leverages Internet openness;

    P2P leverages Technology standards;

    P2P leverages Personal Computer Hardware;

    P2P leverages Personal Computer Information and application services;

    P2P offers a fully distributed symmetric architecture.

    The P2P Value Proposition

    One-to-One P2P value;

    One-to-Many P2P value;

    Many-to-Many P2P value;

    P2P context value.

  • 8/12/2019 P2P and E-Business

    16/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    Social Impacts of P2P

    Immediacy

    Intimacy

    Intimacy and Knowledge Spaces I need my data;

    Intimacy and Virtual Presence;

    Intimacy, People, and communities

    Utility

    Control

    Digital Butterflies

    Trapped by Tools

  • 8/12/2019 P2P and E-Business

    17/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    P2P Security

    Security is unquestionably one of the major concerns in any networkedenvironment, and P2P networks are no exception.

    Security is one of the major impediments to the widespread adoption ofP2P, especially in corporate environments. There is today basically onereasons for this:

    A purely psychological reason. The initial "pirate-to-pirate" image for thetechnology (a gift from Napster and Gnutella), has been a bit difficult to getaway from.

    Some Security models for P2P networks allow today the development ofsecure P2P applications.

    Security is Multifaceted

  • 8/12/2019 P2P and E-Business

    18/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    Possible Attacks in P2P Networks

    Active Network Attacks

    Masquerades

    Man-in-the-middle

    Playback or replay attacks

    Passive Network Attacks

    Eavesdropping

    Traffic analysis

  • 8/12/2019 P2P and E-Business

    19/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    More people connected, more data generated

    More nodes on the Internet and wireless Web

    More bandwidth available

    More computing power available (disk,

    memory, CPU)

    More interesting applications, content, andservices

    Edge devices are increasingly providers orresources

    P2P Makes Sense Now

  • 8/12/2019 P2P and E-Business

    20/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    P2P Enablers

    Gnutella

    www.gnutella.org

    Sun JXTA

    www.jxta.org

    Jabber

    http://www.jabber.org/

    Freenet

    http://freenet.sourceforge.net/

    Opennap

    http://freshmeat.net/projects/opennap/

    http://www.jxta.org/http://www.gnutella.com/http://www.jabber.org/http://freenetproject.org/index.php?page=index
  • 8/12/2019 P2P and E-Business

    21/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    JXTA P2P Network

    An open set of XML-based protocols for creating peer-to-peer style network computing applications andservices

    A virtual network overlay

    Protocol based (language, OS, network, and serviceagnostic technology)

    Defines mechanisms, not policies

    Open Source project: www.jxta.org

    What is Project JXTA?

    http://www.jxta.org/
  • 8/12/2019 P2P and E-Business

    22/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    JXTA P2P Network Objectives

    Interoperability

    Across different P2P systems and communities.

    Platform independence

    Programming languages (Java, C, Perl), systemplatforms (Linux, Windows, mac OS), and networkingplatforms (IP, GPRS...).

    Ubiquity

    Every device with a digital heartbeat (PersonalComputers, Personal Digital Assistants, 3G CellPhones....).

    Security and Monitoring

    For commercial and enterprise deployment.

    http://www.jxta.org/
  • 8/12/2019 P2P and E-Business

    23/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    JXTA Software Architecture

    http://www.jxta.org/
  • 8/12/2019 P2P and E-Business

    24/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    JXTA Virtual Network

    http://www.jxta.org/
  • 8/12/2019 P2P and E-Business

    25/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    JXTA Peer Types

    Micro peers

    Standard peers

    Super peers:

    Rendezvous peer

    Relay peer

    Proxy peer

    http://www.jxta.org/
  • 8/12/2019 P2P and E-Business

    26/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    JXTA Peer Groups

    http://www.jxta.org/
  • 8/12/2019 P2P and E-Business

    27/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    JXTA Security

    Security Requirements

    Confidentiality

    Authentication

    Authorization

    Data integrity

    Refutability

    http://www.jxta.org/
  • 8/12/2019 P2P and E-Business

    28/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    Intrinsic Security in P2P Networks

    Decentralization

    Privacy

    Locality

    Web of Trust

    http://www.jxta.org/
  • 8/12/2019 P2P and E-Business

    29/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    JXTA Security Technologies

    Transport Layer Security (TLS)

    End-to-end transport independence of JXTA protocols

    Digital certificates and certificate authorities

    http://www.jxta.org/
  • 8/12/2019 P2P and E-Business

    30/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    Security in JXTA

    TLS Endpoint Transport

    Simple cryptography library

    Peer security

    Every peer has its own root certificate

    Public key certificate part of peer advertisements

    Credential certificate embedded in every JXTA protocol message

    Authentication framework

    Password-based login scheme

    A S i R

    http://www.jxta.org/
  • 8/12/2019 P2P and E-Business

    31/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    JXTA Security Resources

    JXTA Security project

    http://security.jxta.org

    [email protected]

    White papers

    http://www.jxta.org/white_papers.html

    TLS

    http://www.ietf.org.rfc.rfc2246.txt

    http://www.claymoresystems.com (Pure TLS)

    P2P i h E i

    http://www.jxta.org/
  • 8/12/2019 P2P and E-Business

    32/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    P2P in the Enterprise

    From the perspective of an e-business or a solution developer, P2P canrepresent more than a tool. It can be a platform upon which a widevariety of business solutions can be developed and securely deployed andsupport the following communications capabilities:

    Transparency

    Awareness

    Adaptability

    Mobility

    A P2P Platform for business solutions

    P2P f B i S l ti

  • 8/12/2019 P2P and E-Business

    33/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    P2P for Business Solutions

    Para las iniciativas actuales hay dos soluciones clsicas que pueden seradoptadas:

    Aceptar la esponsorizacin y campaas de marketing: Las aplicaciones con lasque los diferentes participantes acceden a los recursos pueden ser al mismotiempo plataformas de marketing permisivo. El interesado en el uso de lacomunidad P2P, para utilizarla aceptara la recepcin de anuncios por medio delinterfaz o por otros canales.

    Extraccin y venta de datos de los usuarios: Ciertas empresas pueden interesarsepor los datos personales, gustos y preferencias de los usuarios de la comunidadP2P, por lo que la promotora de la comunidad puede vender estos datos, siemprecon la complicidad del usuario.

    Pero est en la mente de todos que las potencialidades del modelo P2P nopueden quedar pendientes en definitiva del inters o no que tenga la iniciativapara las campaas de marketing de terceras empresas.

    Por este motivo estn apareciendo en el mercado utilidades e iniciativas quepretenden hacer negocio con la tecnologa asociada al P2P. Esta tecnologa tienegrandes posibilidades de ser utilizada por la empresa en los siguientes campos:

    P2P f B i S l ti

  • 8/12/2019 P2P and E-Business

    34/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    P2P for Business Solutions

    Creacin de comunidades en el seno de una empresa: Posibilitara el intercambiode archivos de forma descentralizada, haciendo muy sencilla la bsqueda de

    recursos en un red local.

    Intercambio de informacin en comunidades de profesionales: Comunidadesdonde las tareas de investigacin sean de suma importancia, como laBiotecnolgica, pueden beneficiarse del intercambio de informacin de formarpida y descentralizada, poniendo en contacto los diferentes centros deinvestigacin en tiempo real.

    Arrendamiento de capacidades ociosas de las computadoras: Ciertos organismosy empresas con necesidades de computacin importantes se pueden plantear laposibilidad de remuneracin por el uso de las capacidades ociosas decomputacin de PCs de particulares.

    eMarketplaces descentralizados: Uno de los problemas ms importantes con los

    que se puede encontrar un eMarketplace es la falta de confianza para con elpromotor de la iniciativa. La tecnologa asociada a los modelos P2P permiten lacreacin de plataformas descentralizadas, que una vez implantadas en lasdiferentes empresas no seran controladas por ningn tercero.

    P2P i th E t i

  • 8/12/2019 P2P and E-Business

    35/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    P2P in the Enterprise

    Traditional e-Marketplaces P2P based e-Marketplaces

    P2P Based e Marketplaces

  • 8/12/2019 P2P and E-Business

    36/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    P2P Based e-Marketplaces

    Completely distributed repository;

    Peers are able to interact directly and perform one-to-one exchanges;

    Up-to-date, dynamic information can be provided by one peer to another;

    Transactions are distributed across the network and the addition or removal of one node

    does not put the e-marketplace at risk; instead, it shapes the e-marketplace;

    Peers can attach to each other and develop virtual communities;

    The exchange rules can be set by each pair of peers performing an exchange;

    Peers can exchange virtually any information in order to make decisions;

    Peers are able to settle agreements by iterated phases of negotiation;

    P2P Based e Marketplaces

  • 8/12/2019 P2P and E-Business

    37/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    P2P Based e-Marketplaces

    P2P Based e Marketplaces

  • 8/12/2019 P2P and E-Business

    38/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    P2P Based e-Marketplaces

    Each peer is able to collect more information about other peers and about the e-

    marketplace in general, so as to develop the most advantageous, possibly long-termrelationships;

    It is possible to set up a P2P e-marketplace without service charges, where everyone

    benefits from being able to connect to everyone else.

    P2P e-marketplace reinforces trust between business partners:

    Reinforces inductive trust because peers deal with each other directly, so that they

    can estimate the behaviour of the other party in future transactions.

    Reinforces deductive trust because peers are provided with a decentralised,

    reliable infrastructure where business communities can develop within protectedpeer groups.

    Setting Your Course!

  • 8/12/2019 P2P and E-Business

    39/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    Setting Your Course!

    As a manager, your challenge will be to figure out exactly where and how peer-to-peer

    technologies will fit into your business.

    This is not a one-size-fits-all technology. Depending on :

    your business and your needs;

    your geographic dispersion;

    and your size,

    different peer-topeer applications will be more appropriate for you.

    Remember: P2P is a way of thinking as much as a computing mode!. As you reruse the

    growing list of peer-to-peer applications, ask yourselff the following kind of questions.

    Setting Your Course! ( )

  • 8/12/2019 P2P and E-Business

    40/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    Setting Your Course! (...)

    What Problem are you Solving?

    Is it a human issue or a machine issue?

    How broadly do you intend to implement it?

    Are you ready to give employees more control?

    Is it secure?

    Does it integrate with other applications?

    So is it a revolution or an innovation?

    P2P Resources

  • 8/12/2019 P2P and E-Business

    41/41

    #Cludio Barradas 2004EST Instituto Politcnicode Castelo Branco

    P2P Resources

    Mastering JXTA: Building Java Peer-to-Peer Applications; Joseph D. Gradecki, John Wiley & Sons; 1stedition (August 15, 2002); ISBN: 0471250848

    www.jxta.org

    P2P: How Peer-to-Peer Technology Is Revolutionizing the Way We Do Business;Hassan M. Fattan; Dearborn Trade Publishing; 1st edition (January 15, 2002) ASIN: 0793148782

    JXTA: Java P2P Programming; Daniel Brookshier , Darren Govoni, Navaneeth Krishnan , Juan Carlos SotoSAMS; 1st edition (March 22, 2002); ISBN: 0672323664.

    Peer-to-Peer : Harnessing the Power of Disruptive Technologies; Andy Oram;O'Reilly & Associates; 1st edition (March 15, 2001); ISBN: 059600110X.

    JXTA in a Nutshell;Scott Oaks, Bernard Traversat, Li Gong; O'Reilly & Associates; (September 2002); ISBN:059600236X

    JXTA; Brendon J. Wilson; New Riders; 1st edition (June 15, 2002); ASIN:0735712344.

    Peer-to-Peer: Building Secure, Scalable, and Manageable Networks

    Dana Moore, John Hebeler; McGraw-Hill Osborne Media; 1st edition (November 28, 2001); ASIN:0072192844.

    Wikipedia, the free encyclopedia - http://en.wikipedia.org

    http://www.amazon.com/exec/obidos/search-handle-url/index=books&field-author=Wilson%2C%20Brendon%20J./102-4132334-3320143http://www.amazon.com/exec/obidos/search-handle-url/index=books&field-author=Wilson%2C%20Brendon%20J./102-4132334-3320143