Thursday, May 29, 2008

Essay (Final Copy)!

Perhaps the most significant development in computing science since the web, Peer-to-Peer (P2P) networks have generated great interest world wide from general Internet users to networking professionals. P2P systems such as Kazaa and Guntella have ranked amongst the most popular software applications ever. According to several Internet providers, fifty percent of Internet traffic is due to P2P applications (Steinmetz, Wehlre, 2005). Many claim P2P networks to be the networking of the future. However, others argue that the use of these networks lead to illegal actions and they create more problems then they are worth. This essay will outline both the advantages and disadvantages of a P2P network. The essay will then conclude on the note that the advantages and potential P2P networks have out way the problems they create. Though before this essay takes sides, it will give a brief history and description of P2P networks.

A P2P network is a type of network in which each computer connected is equal and has the same capabilities and tasks. The term peer-to-peer refers to the concept of a network of equals and through the use of information and communication systems; two or more computers can pool resources and share with each other without needing any centralized coordination (Schoder, Fischbach, Schmitt, 2005). This contrasts to the server/client architecture as there are no server computers dedicated to serving others. P2P networks can be classified into five areas, which are communication and collaboration, distributed contribution, Internet service support, database systems and content distribution (Theotokis, Spinellis, 2004). The networks can be further classified by the degree of centralization. For example, P2P networks that are classified ‘pure’ have peers acting as equals and no central server managing the network. Many networkers argue that only networks where every peer has equal capabilities is P2P (Oram, 2001).

In the late 1960’s the Internet was originally created as a P2P network. Though the term P2P was not well established before the Internet was made available to the public, there were fixtures created that were based on the P2P concept. An example of this is Usenet. Usenet was created in 1979 and is a worldwide network of discussion groups. In some ways Usenet is considered the Grandfather of the P2P applications and software used today (Oram, 2001). Once the Internet was made available to the public, this allowed P2P networks to evolve. In 1999, Napster was created and so came the phenomenon of P2P file sharing. Napster was created as a hybrid system and though its file sharing was decentralized, the directory of those files was centralized. The network had a central server supplying the search queries and brokering user connections (Oram, 2001). Because of this, Napster was shutdown due to legal controversy. From then on, most P2P file sharing applications were created as ‘pure’ networks. In 2002 Bit Torrent was created and began another generation of P2P networks. It is clear to see from this brief timeline, that P2P networks have evolved over time and continue to become more efficient and effective.

P2P networks have easily emerged as one of the largest innovation rich areas in computer science and networking (Elsevier, 2007). This large amount of interest towards P2P networks is due to the advantages that occur through the use of the networks. The first and foremost advantage of a P2P network is that they are less expensive and easier to set up then client/server networks. The basis of P2P networks is that all clients provide the resources, which include computing power, storage and bandwidth. Therefore, as user numbers and demands on the network grow then so does its resources. The network also remains strong, healthy, flexible and adaptable by replicating data over numerous peers and in pure systems; a peer is allowed to locate data without a centralized server (Rosseholvel, 2008).

Because of these advantages, many areas within our society have begun to explore ways to adapt and use P2P networks. Academics have been creating P2P search engines to provide free and open search to academic knowledge. At the Pennsylvania State University, a P2P application has been developed called LionShare and its purpose is to share academic information between users at various academic establishments (Solyrich, 2006). In 2001, according to the Washington Post (Walker, 2001) the United States military began conducting research on P2P networks and planned to use the networks for a modern network warfare strategy against the war on terrorism. Hundreds of businesses have also invested into P2P networks, mainly in the area of file sharing networks. However, businesses have shown interest in distributing content, e-marketplace and groupware based on P2P networks. Within telecommunications, more and more emphasis is being placed on P2P networks. Many researchers are trying to apply the concept of P2P networks into cellular networks (Raivio, 2005). An example of this is the current ‘BlueTooth’ network.

However, in spite of the above advantages, P2P networks also receive large amounts of criticism and can create a number of problems. The basic problems of P2P networks are to do with the cooperation and contribution of the peers. Many peers damage a network by poisoning and polluting its contents. This occurs by providing files which contents do not fit its description and the insertion of files into the network that do not function properly. Peers known as ‘leechers’ are users that do not allow their own resources available to the network. This reduces the networks efficiency. Another huge problem for P2P networks is that they allow viruses to be spread at a rapid rate. In some countries there have even been cases of identity attacks where a user has been able to track down other users and steel their identity. Due to the rise of the P2P file-sharing phenomenon, there is an ongoing problem with copyright infringement. P2P file sharing applications allow any user to download large amounts of copyrighted video, audio and visuals. In 2002, the Recording Industry Association of America released figures that claimed Internet piracy, lead by P2P file sharing applications, was responsible for a 5% decrease in the dollar value of music worldwide in year 2001 (Ghosemmmajumder, 2002).

Though there are various problems that arise from the use of P2P networks, it is clear to see that in the end, the advantages and potential of P2P networks out-way the disadvantages. With the proper research and development, P2P networks will be able to be filtered and controlled effectively to rid the networks of any basic impurities. Companies concerned with copyright infringement need to adapt to the new age of computer science and begin to implement new ways to distribute their content. When our society begins to adapt we will then be able to see the true potential of P2P networks.

Reference List:

Books:
(1) Oram, Andrew, 2001, Peer-to-Peer: Harnessing the Power of Disruptive Technologies, O’Reilly and Associates, Sebastopol CA.
(2) Steinmetz, Ralf & Wehlre, Klaus, 2005, Peer-to-Peer Systems and Applications, Springer Publishing, Germany.

Jounral Articles:
(1) Schoder, Detlef & Fischbach, Kai & Schmitt, Christian, 2005, ‘Core Concepts in Peer-to-Peer Networking’, Idea Group Inc.
(2) Raivio, Yrjo, 2005, ‘Mobile Peer-to-Peer in Cellular Networks’, Helsinki University of Technology.
(3) Elsevier, 2007, ‘Foundations of Peer-to-Peer Computing’, Computer Communications, Vol. 31, pp. 187-189.
(4) Theotokis, Stephanos Androutsellis & Spinellis, Diomidis, 2004, ‘A Survey of Peer-to-Peer Content Distribution Technologies’, ACM Computer Surveys, Vol. 36, No. 4, pp. 335-371.
(5) Ghosemajumder, Shuman, 2002, ‘Advanaced Peer-Based Technology Business Models‘, MIT Sloan.

Internet Sites:
(1) Solyrich, 2006, Advantages of Peer-to-Peer Networks, P2P World http://www.solyrich.com/p2p-pros-cons.asp
(2) Walker, Leslie, 2001, Uncle Sam Wants Napster!, Washington Post http://www.washingtonpost.com/ac2/wp-dyn?pagename=article&node=washtech/techthursday/columns/dotcom&contentId=A59099-2001Nov7
(3) Rossenhovel, Carsten, 2008, Peer-to-Peer Filters: The Big Report, Internet Evolution http://www.internetevolution.com/document.asp?doc_id=148803&f_src=flfone

Monday, May 12, 2008

Essay Outline!

Topic: Peer-to-Peer networks; Arguments for and against.

Summary:
For my essay I have chosen the topic of Peer-to-Peer networks. I chose this topic because I am familiar with it and there is a lot of controversy on how people look at peer-to-peer networks and whether they are good or bad. Within the essay my argument will be that even though Peer-to-Peer networks create many problems, the advantages out way the disadvantages and the networks have a lot of potential in the future. When researching the topic I used the catalogue databases Griffith has access to and Google Scholar. I found Google Scholar much more effective then going through Griffith databases. Once I had some references I was able to begin to structure my essay.

Introduction-

  • Introduce the topic of Peer-to-Peer networks; give a brief explanation on what they are. Outline the structure of the essay.

Body-

  • History of Peer-to-Peer networks, explain how they work and how they have evolved over time. Give examples of major peer-to-peer networks.
  • Outline the advantages of Peer-to-Peer networks. Describe the different areas in society that use peer-to-peer networks such as Bioinformatics, military, education, business, TV and telecommunications.
  • Describe the problems of peer-to-peer networks; outline the disadvantages. This includes the spread of viruses, leeching, spamming, copyright infringement, illegal downloading and identity attacks. Use Napster as an example to describe the problem of illegal downloading and to outline legal controversy.

Conclusion-

  • Conclude on the note that even though there are many problems with Peer-to-Peer networks, they are very useful and have significant potential.

Resources:

  • Schoder, Detlef & Fischbach, Kai & Schmitt, Christian, 2005, Core Concepts in Peer-to-Peer Networking, Idea Group Inc, Germany.
  • Khan, Javid I & Wierzbicki, Adam, 2007, Foundations of Peer to Peer Computing, Elsevier B.V, pp. 187 – 189.
  • Engle, Marling & Khan, Javid I, 2006, Vulnerabilities of P2P Systems and a Critical Look at their Solutions, Internetworking and Media Communications Research Laboratories, Department of Computer Science, Kent State University.
  • Theotok, S, 2004, A Survey of Peer-to-Peer Content Distribution Technologies, Athens University of Economics and Business, Athens.
  • Rossenhovel, Carsten 2008, Peer to Peer Filters: Ready for the Internet Prime Time? Internet Evolution, http://www.internetevolution.com/document.asp?doc_id=148803&f_src=flfon