P2P Networking and Applications

Total Page:16

File Type:pdf, Size:1020Kb

P2P Networking and Applications P2P Networking and Applications John F. Buford Heather Yu Eng Keong Lua AMSTERDAM • BOSTON • HEIDELBERG • LONDON NEW YORK • OXFORD • PARIS • SAN DIEGO u' SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO MORGAN Morean Kaufmann Publishers is an imprint of Elsevier Table of Contents Preface xvii About the Authors xxi CHAPTER 1 Introduction 1 P2P Emerges as a Mainstream Application 1 The Rise of P2P File-Sharing Applications 1 Voice over P2P (VoP2P) 4 P2PTV 5 P2P Networking and the Internet 8 P2P Overlays and Network Services 8 Impact of P2P Traffic on the Internet 10 Motivation for P2P Applications 11 P2P from the End User's Perspective 11 Is P2P = Piracy? 12 P2P Strengths and Benefits 12 P2P Open Issues 14 P2P Economics 14 The P2P Value Proposition 14 Barrier to Entry 15 Revenue Models and Revenue Collection 15 P2P Application Critical Mass 16 Anatomy of Some P2P Business Models 17 VoP2P 17 File Sharing 19 Social Impact 21 Technology Trends Impacting P2P 22 Summary 23 Further Reading 23 CHAPTER 2 Peer-to-Peer Concepts 25 Operation of a P2P System 25 The User View 25 P2P Beyond the Desktop Computer 26 Overlay View 28 Principles of the P2P Paradigm 29 A Graph Theoretic Perspective 31 Overview 31 Overlay 31 Graph Properties 33 Object Storage and Lookup 34 vi Table of Contents A Design Space Perspective 35 A Routing Performance Perspective 36 Routing Geometries and Resilience 36 Tradeoff Between Routing State and Path Distance 37 Churn and Maintaining the Overlay 37 Locality 39 An Implementation Perspective: OverlayWeaver 41 Summary 43 For Further Reading 44 CHAPTER 3 Unstructured Overlays 45 Connecting Peers on a Global Scale 45 Basic Routing in Unstructured Overlays 46 Flooding and Expanding Ring 46 Random Walk 49 Unstructured Topology Considerations 50 Types of Unstructured Graphs 50 Random Graphs 50 Power-Law Random Graphs 51 Scale-Free Graphs and Self-Similarity 52 Social Networks and the Small-World Phenomenon 54 Early Systems 55 Napster 55 Gnutella 55 FastTrack 55 Freenet 56 Improving on Flooding and Random Walk 61 Techniques 61 Metrics 62 Case Study: Gia 62 Social Overlays 64 Using Similar Interests Among Peers 64 Tribler 65 INGA 67 Key-based Routing in Unstructured Topologies 69 Overview 69 Local Minima Search 69 Unstructured Distributed Hash Table 70 Under the Hood: An Overlay Emulator 72 OverlayWeaver Routing Layer 72 Unstructured Overlays in OverlayWeaver 73 Summary 73 For Further Reading 73 Table of Contents ix CHAPTER 4 Structured Overlays: Geometry and Routing 75 Structured Overlays 75 Motivation and Categories 75 Geometry and Routing 77 Roadmap for the Chapter 77 Logarithmic Degree with Prefix Routing 79 PRR 79 Tapestry 82 P-Grid 84 Pastry 85 Other Prefix-Routing Overlays 86 Ring with Embedded Logarithmic Degree Mesh 86 Chord 86 DKS(N,k,f) 88 Chord* 89 Constant Degree 91 Features of Constant Degree Graphs 91 Koorde 93 Ulysses 93 Cycloid 94 Other Distance Metrics 95 Content Addressable Network (CAN) 95 Kademlia 97 0(l)-Hop Routing 99 Multihop Versus One-Hop 99. Kelips 100 OneHop 100 EpiChord 101 Comparison and Evaluation 101 Analytical Performance Bounds 101 Measurement Through Simulation 103 Summary 104 For Further Reading 104 Surveys and Frameworks 104 History of Distributed Hash Tables 105 Other Structured Overlays 105 Routing and Geometry in Computer Networks 105 CHAPTER 5 Structured Overlays: Maintenance and Dynamics 107 Peer Churn 107 Approaches to Overlay Maintenance 109 Active Maintenance 109 Opportunistic Maintenance 109 x Table of Contents Overlay Maintenance Algorithms 110 Logarithmic Degree with Prefix Routing 110 Ring with Embedded Logarithmic Degree Mesh 114 Constant Degree 116 O(l)-Hop Routing 119 Stochastic Modeling of Peer Churn 123 The Network Model 123 Stochastic Model for Long-range Connections 124 Maintenance of Short-range Connections 125 Maintenance of Long-range Connections 125 Comparison with Existing DHT Overlay 126 Federated Overlay Topologies 126 Universal Overlay 128 Hierarchical Overlays 129 Summary 133 For Further Reading 133 CHAPTER 6 Peer-to-Peer in Practice 135 P2P Building Blocks 135 Network Programming 138 Overlay Protocol Design 139 General Protocol Issues 139 Unstructured Overlay: Gnutella 140 BitTorrent 144 Structured Overlays 146 Network Address Translation and P2P Overlays 148 How NAT Effects P2P Connectivity 148 NAT Traversal 150 NAT Traversal with ICE 151 NAT Traversal in a P2P Overlay 153 Peer Capability Determination 153 Overview 153 Network Capacity 154 Peer Lifetime 155 Bootstrapping and Partitions 155 Finding a Rendezvous Peer 155 Merging Partitions 156 P2P Networking Support in Microsoft Windows 157 Peer Identity 157 Peer Name Resolution Protocol 158 Peer Overlay 158 Grouping 159 Identity Management 160 Search 161 Table of Contents xi Summary l6l For Further Reading l6l CHAPTER 7 Search 163 Overview 163 Centralized vs. Localized vs. Distributed Indexing 164 Centralized Indexing 164 Localized Indexing 166 Distributed Indexing 167 Hybrid Indexing 167 Hashing-Based Indexing and Lookups 168 Searching in a Flat DHT 168 Searching in Hierarchical DHTs 169 Discussion 169 Searching in Unstructured Overlays 170 Flooding-Based Search 170 Iterative Deepening 171 Random Walk-Based Search 171 Guided Search 171 Hybrid-Based Approaches 172 Keyword Search 173 Range Queries 173 Non-DHT-Based Approaches 174 Range Queries in DHTs 174 Skip Graphs 175 Semantic Queries 176 Semantic Search in Structured Overlays 176 Semantic Search in Unstructured Overlays 178 Advanced Topics 179 Distributed Pattern Matching System (DPMS) 179 DiffSearch 179 Content-Based Search 180 Summary 181 For Further Reading 181 CHAPTER 8 Peer-to-Peer Content Delivery 183 Content Delivery 183 Classification of P2P Content Delivery Schemes 184 Design Criteria 187 P2P Caching 187 Design Issues 191 Example P2P Caching Systems 193 Summary 195 xii Table of Contents Content Pull and Content Push 195 Case Study 196 Hybrid CDN and P2P Architectures 198 Overview 199 Case Study 199 Summary 201 For Further Reading 202 CHAPTER 9 Peercasting and Overlay Multicasting 203 Introduction 203 The Television Paradigm Shift 203 Popular Peercasting Applications 203 Terminology 204 P2P Streaming 206 Multicast Applications and P2P Overlay Multicast 209 Multicast Applications 209 IP Multicast vs. Overlay Multicast 209 Hybrid Multicast 213 Proxy-Based Overlay Multicast 214 OM Design Considerations 215 Performance Metrics 215 OM Groups and OM Sessions 215 Group Management 216 Message Dissemination 218 Categorization of OM Systems 219 Improving OM performance 221 Summary 227 For Further Reading 228 CHAPTER 10 Measurement for P2P Overlays 229 Motivation 229 Network Embedding 234 Basic Properties of Network Embedding 234 Lipschitz Embedding 236 Numerical Optimization Embedding 237 Internet Coordinate Systems 237 Systems using Lipschitz Embedding and Matrix Factorization 241 Systems using Numerical Optimization 242 Meridian 246 Multiresolution Rings 246 Ring Membership Management 247 Table of Contents xiii Gossip-based Node Discovery 248 Closest-Node Discovery 248 Accuracy and Overhead 249 Summary 252 For Further Reading 253 CHAPTER 11 Service Overlays 255 Service Orientation and P2P Networking 255 Service Overlay Concepts 257 Resource Virtualization 257 Service Orientation 257 Devices as Peers 258 Serving DNS Records From an Overlay 258 Domain Name Service 258 DDNS 259 Resilient Overlay Networks 262 Internet Routing and ISP Peering 262 Resilient Overlay Network 262 Bandwidth-Aware RON 264 QoS Aware Overlays 266 Overview 266 OverQoS 268 QRON 269 Service Orientation 270 Overview 270 Wide-Area Service Discovery 270 INS/Twine 271 Location-Based Service Discovery 271 Other P2P Approaches to Service Discovery 272 Replication and Load Balancing 272 Churn and Index Availability 272 Index Load and Object Popularity 274 Beehive 275 Service Composition 276 Summary 277 For Further Reading 278 CHAPTER 12 Voice Over Peer-to-Peer 279 From VoIP to VoP2P 279 VoP2P 280 VoIP Elements 280 Mapping VoIP Elements to a VoP2P Overlay 281 Application Relays 282 Types of Relays 282 xiv Table of Contents Relay Selection and Discovery 283 Dynamic Path Switching 285 Call Processing 285 Overview 285 Assumptions 286 Dimensionality 286 Example Peer Features 287 Case Study: Skype 289 Case Study: Peer-to-peer SIP 291 Overview 291 Hip-Hop 292 Address Settlement by Peer-to-Peer 294 Reload 295 Summary 296 For Further Reading 297 CHAPTER 13 Mobility and Heterogeneity 299 Impact of Mobile Devices on P2P Overlays 299 P2P Overlay Issues Caused by Mobility 300 Roaming and Node Lifetime 300 Growing Mobile Peer Frequency 302 Mitigating Mobility Churn 303 Mobile IP Support 303 Stealth Nodes 304 Bristle 305 Warp 306 Multihomed Peers 308 Variable-Hop Overlays 309 Overview 309 Accordion 309 P2PandManets 311 Overview 311 Mobile Hash Table 312 MADPastry 314 Other P2P MANET Designs 315 Summary 317 For Further Reading 317 CHAPTER 14 Security 319 Introduction 319 Security Risks and Attacks 320 Classifications of Attacks 320 The P2P Security Gap 322 Sample Attacks and Threats 323 Overlay Layer Attacks 326 Table of Contents xv Security Mechanisms 328 Cryptographic Solutions 328 DoS Countermeasures 329 Secure Routing in Structured P2P 330 Fairness in Resource Sharing 333 Trust and Privacy Issues 334 Architecture 335 Reputation 336 Privacy 337 Case Study: Groove 338 Case Study: Pollution in File-Sharing Systems 338 Summary 339 For Further Reading 340 CHAPTER 15 Managed Overlays 341 Introduction 341 Management of Overlays vs. Conventional Networks 343 Overlay Dimensions Impacting Manageability 343 Managed
Recommended publications
  • Topology Dynamics in a P2PTV Network
    Topology dynamics in a P2PTV network S. Tang, Y. Lu, J. Mart´ınHern´andez,F.A. Kuipers, and P. Van Mieghem Delft University of Technology, P.O. Box 5031, 2600 GA Delft, The Netherlands fS.Tang, Y.Lu, J.MartinHernandez, F.A.Kuipers, [email protected] Abstract. In recent years, a number of commercial peer-to-peer TV (P2PTV) applications have been launched. Yet, their mechanisms and characteristics are unknown. In this paper, we study SopCast, a typical proprietary P2PTV system. Treating SopCast as a black box, we perform a set of experiments that are suitable to analyze SopCast in depth. We attempt to disclose the SopCast protocol. The dynamic nature of the SopCast overlay, in terms of node degree, is also addressed in this paper. Our approaches in analyzing the SopCast mechanism and characterizing its topological properties reveal important design insights in SopCast, and may help to better understand similar P2PTV systems. Keywords: Topology dynamics, SopCast, P2PTV 1 Introduction The success of peer-to-peer (P2P) file-sharing systems has spurred the deploy- ment of P2P technologies in many other bandwidth-intensive large-scale ap- plications. Peer-to-Peer Television (P2PTV) has become a popular means of streaming audio and video content over the Internet. Example applications are CoolStreaming [8], TVAnts1, TVU2, SopCast3, etc. It is important to evaluate the traffic impact of such applications, while modeling their behavior. However, P2PTV streaming systems, such as SopCast, are developed for commercial pur- poses: thus, very little is known about their architectures. Some papers claim that SopCast is based on similar principles as those underlying CoolStreaming, e.g.
    [Show full text]
  • Diapositiva 1
    TRANSFERENCIA O DISTRIBUCIÓN DE ARCHIVOS ENTRE IGUALES (peer-to-peer) Características, Protocolos, Software, Luis Villalta Márquez Configuración Peer-to-peer Una red peer-to-peer, red de pares, red entre iguales, red entre pares o red punto a punto (P2P, por sus siglas en inglés) es una red de computadoras en la que todos o algunos aspectos funcionan sin clientes ni servidores fijos, sino una serie de nodos que se comportan como iguales entre sí. Es decir, actúan simultáneamente como clientes y servidores respecto a los demás nodos de la red. Las redes P2P permiten el intercambio directo de información, en cualquier formato, entre los ordenadores interconectados. Peer-to-peer Normalmente este tipo de redes se implementan como redes superpuestas construidas en la capa de aplicación de redes públicas como Internet. El hecho de que sirvan para compartir e intercambiar información de forma directa entre dos o más usuarios ha propiciado que parte de los usuarios lo utilicen para intercambiar archivos cuyo contenido está sujeto a las leyes de copyright, lo que ha generado una gran polémica entre defensores y detractores de estos sistemas. Las redes peer-to-peer aprovechan, administran y optimizan el uso del ancho de banda de los demás usuarios de la red por medio de la conectividad entre los mismos, y obtienen así más rendimiento en las conexiones y transferencias que con algunos métodos centralizados convencionales, donde una cantidad relativamente pequeña de servidores provee el total del ancho de banda y recursos compartidos para un servicio o aplicación. Peer-to-peer Dichas redes son útiles para diversos propósitos.
    [Show full text]
  • Measurement and Analysis of P2P IPTV Program Resource
    Hindawi Publishing Corporation e Scientific World Journal Volume 2014, Article ID 101702, 9 pages http://dx.doi.org/10.1155/2014/101702 Research Article Measurement and Analysis of P2P IPTV Program Resource Wenxian Wang,1,2 Xingshu Chen,1 Haizhou Wang,1 Qi Zhang,1 and Cheng Wang1 1 Network and Trusted Computing Institute, College of Computer Science, Sichuan University, Chengdu 610065, China 2 Mathematical College, Sichuan University, Chengdu 610064, China Correspondence should be addressed to Xingshu Chen; [email protected] Received 29 August 2013; Accepted 10 March 2014; Published 19 March 2014 Academic Editors: J. Shu and F. Yu Copyright © 2014 Wenxian Wang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. With the rapid development of P2P technology, P2P IPTV applications have received more and more attention. And program resource distribution is very important to P2P IPTV applications. In order to collect IPTV program resources, a distributed multi- protocol crawler is proposed. And the crawler has collected more than 13 million pieces of information of IPTV programs from 2009 to 2012. In addition, the distribution of IPTV programs is independent and incompact, resulting in chaos of program names, which obstructs searching and organizing programs. Thus, we focus on characteristic analysis of program resources, including the distributions of length of program names, the entropy of the character types, and hierarchy depth of programs. These analyses reveal the disorderly naming conventions of P2P IPTV programs. The analysis results can help to purify and extract useful information from chaotic names for better retrieval and accelerate automatic sorting of program and establishment of IPTV repository.
    [Show full text]
  • A Survey on Peer-To-Peer (P2P)
    ISSN (Online) 2278-1021 ISSN (Print) 2319-5940 IJARCCE International Journal of Advanced Research in Computer and Communication Engineering ICRITCSA M S Ramaiah Institute of Technology, Bangalore Vol. 5, Special Issue 2, October 2016 A Survey on Peer-to-Peer (P2P) Shruti Ghatnatti1, Patil Aishwarya Prasanna2, Shailaja2 Assistant Professor, BCA, P.C. Jabin Science College, Hubballi, India1 Student, BCA, P.C. Jabin Science College, Hubballi, India2 Abstract: Today‟s world the internet is on boom. Its trending on a very high basis.Its a food for many organizations and apllications in computer field. The communication is high over the internet. It‟s a good practice to have a secured communication over a peers. This paper attempts to survey on the peer-to-peer communication over a distributed networking. Its working and features are clearly explained. Keywords: P2P, Peers,Distributed Network, Network. I. INTRODUCTION Peer-to-peer (P2P) is an application that is used for search engines , virtual file systems ,and supercomputers”. computable process or to connect two or more computers In earlier software systems and networking discussions the or other devices that distributes the architecture to separate peer-to-peer was primary concept that is used for jobs or labors between peers. They are privileged equally, computable process visualized, stated in the first Request strong participants in the application program .And also for comments as reaching back to a P2P that is near to they are interconnected with several networks that are the principles
    [Show full text]
  • HET- Nets 2010
    Performance Modelling and Evaluation of Heterogeneous Networks PROCEEDINGS OF 6 TH WORKING INTERNATIONAL CONFERENCE HET- NETs 2010 EDITOR Tadeusz Czachórski Gliwice 2009 PUBLISHED BY Institute of Theoretical and Applied Informatics of the Polish Academy of Sciences Bałtycka 5, 44-100 Gliwice, POLAND www.iitis.gliwice.pl TECHNICAL PROGRAM COMMITTEE Tulin Atmaca, France Demetres Kouvatsos, UK Simonetta Balsamo, Italy Udo Krieger, Germany Andrzej Bartoszewicz, Poland Józef Lubacz, Poland Monique Becker, France Wojciech Molisz, Poland Wojciech Burakowski, Poland Andrzej R. Pach, Poland Leszek Borzemski, Poland António Pacheco, Portugal Jalel Ben-Otman, France Michele Pagano, Italy Vicente Casares-Giner, Spain Zdzisław Papir, Poland Ram Chakka, India Ferhan Pekergin, France Tadeusz Czachórski, Poland Nihal Pekergin, France Tien Do, Hungary Michał Pióro, Poland Peter Emstad, Norway Adrian Popescu, Sweden Markus Fiedler, Sweden David Remondo-Bueno, Spain Jean Michele Fourneau, France Werner Sandmann, Germany Erol Gelenbe, UK Maciej Stasiak, Poland Adam Grzech, Poland Zhili Sun, UK Andrzej Grzywak, Poland Nigel Thomas, UK Peter Harrison, UK Phuoc Tran-Gia, Germany Andrzej Jajszczyk, Poland Tereza Vazao, Portugal Wojciech Kabaciński, Poland Krzysztof Walkowiak, Poland Sylwester Kaczmarek, Poland Sabine Wittevrongel, Belgium Andrzej Kasprzak, Poland Józef Woźniak, Poland Jerzy Konorski, Poland ORGANIZING COMMITTEE Chair: Krzysztof Grochla [email protected], Phone: +48 32 231 73 19 ext 218; Fax: +48 32 231 70 26 Joanna Domańska Sławomir Nowak Cover designed by Krzysztof Grochla ISBN: 978-83-926054-4-7 CONTENTS Keynote Talks Erol Gelenbe: Steps towards self-aware networks ................................................ 9 Michał Pióro: On the notion of max-min fairness and its applications in network design ...................................................................................................... 11 Vincente Casares-Giner: Mobility models for mobility management ..................
    [Show full text]
  • List of Search Engines
    A blog network is a group of blogs that are connected to each other in a network. A blog network can either be a group of loosely connected blogs, or a group of blogs that are owned by the same company. The purpose of such a network is usually to promote the other blogs in the same network and therefore increase the advertising revenue generated from online advertising on the blogs.[1] List of search engines From Wikipedia, the free encyclopedia For knowing popular web search engines see, see Most popular Internet search engines. This is a list of search engines, including web search engines, selection-based search engines, metasearch engines, desktop search tools, and web portals and vertical market websites that have a search facility for online databases. Contents 1 By content/topic o 1.1 General o 1.2 P2P search engines o 1.3 Metasearch engines o 1.4 Geographically limited scope o 1.5 Semantic o 1.6 Accountancy o 1.7 Business o 1.8 Computers o 1.9 Enterprise o 1.10 Fashion o 1.11 Food/Recipes o 1.12 Genealogy o 1.13 Mobile/Handheld o 1.14 Job o 1.15 Legal o 1.16 Medical o 1.17 News o 1.18 People o 1.19 Real estate / property o 1.20 Television o 1.21 Video Games 2 By information type o 2.1 Forum o 2.2 Blog o 2.3 Multimedia o 2.4 Source code o 2.5 BitTorrent o 2.6 Email o 2.7 Maps o 2.8 Price o 2.9 Question and answer .
    [Show full text]
  • Wired 13.01: the Bittorrent Effect
    Wired 13.01: The BitTorrent Effect Search: Wired Magazine 6 Search The BitTorrent Effect Movie studios hate it. File-swappers love it. Bram Cohen's blazing-fast P2P software has turned the Internet into a universal TiVo. For free video-on-demand, just click here. By Clive ThompsonPage 1 of 5 next » "That was a bad move," Bram Cohen tells me. We're huddled over a table in Feature: his Bellevue, Washington, house playing a board game called Amazons. Cohen The Bit Torrent Effect picked it up two weeks ago and has already mastered it. The 29-year-old programmer consumes logic puzzles at the same rate most of us buy magazines. Plus: Behind his desk he keeps an enormous plastic bin filled with dozens of Rubik's A Better Way to Share Files Cube-style twisting gewgaws that he periodically scrambles and solves throughout the day. Cohen says he loves Amazons, a cross between chess and the Japanese game Go, because it is pure strategy. Players take turns dropping more and more tokens on a grid, trying to box in their opponent. As I ponder my next move, Cohen studies the board, his jet-black hair hanging in front of his face, and tells me his philosophy of the perfect game."The best strategy games are the ones where you put a piece down and it stays there for the whole game," he explains. "You say, OK, I'm staking out this area. But you can't always figure out if that's going to work for you or against you.
    [Show full text]
  • P2PTV Multi-Channel Peers Analysis Marwan Ghanem, Olivier Fourmaux, Fabien Tarissan, Takumi Miyoshi
    P2PTV Multi-channel Peers Analysis Marwan Ghanem, Olivier Fourmaux, Fabien Tarissan, Takumi Miyoshi To cite this version: Marwan Ghanem, Olivier Fourmaux, Fabien Tarissan, Takumi Miyoshi. P2PTV Multi-channel Peers Analysis. The 18th Asia-Pacific Network Operations and Management Symposium, Oct 2016, Kanazawa, Japan. hal-01366453 HAL Id: hal-01366453 https://hal.archives-ouvertes.fr/hal-01366453 Submitted on 14 Sep 2016 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. P2PTV Multi-channel Peers Analysis Marwan Ghanem, Olivier Fourmaux Fabien Tarissan Takumi Miyoshi Sorbonne Universités, UPMC Univ Paris 06 Université Paris-Saclay College of Systems Eng. and Sc. CNRS, LIP6 UMR 7606 ISP, ENS Cachan, CNRS Shibaura Institute of Technology 75005 Paris, France 94235 Cachan, France Saitama, 337-8570 Japan Email: [email protected] Abstract—After being the support of the data and voice audio/video streams to distribute in real-time to a large number convergence, the Internet has become one of the main video of receivers. The large number of streams and their intrinsic providers such as TV-stream. As an alternative to limited or real-time characteristics generate timing constraints which are expensive technologies, P2PTV has turned out to be a promising support for such applications.
    [Show full text]
  • NET Institute*
    NET Institute* www.NETinst.org Working Paper #07-42 October 2007 Online Peer-to-peer Communities: An Empirical Investigation of a Music Sharing Network as a Dynamic Two-sided Network Bin Gu, University of Texas, Yun Huang, University of Texas, Wenjing Duan, George Washington University Andrew Whinston, University of Texas * The Networks, Electronic Commerce, and Telecommunications (“NET”) Institute, http://www.NETinst.org, is a non-profit institution devoted to research on network industries, electronic commerce, telecommunications, the Internet, “virtual networks” comprised of computers that share the same technical standard or operating system, and on network issues in general. ONLINE PEER-TO-PEER COMMUNITIES: AN EMPIRICAL INVESTIGATION OF A MUSIC SHARING COMMUNITY AS A 1 DYNAMIC TWO-SIDED NETWORK Bin Gu2, Yun Huang2, Wenjing Duan3, Andrew Whinston2 Abstract Online peer-to-peer communities and online social networks have become increasingly popular. In particular, the recent boost of online peer-to-peer communities leads to exponential growth in sharing of user-contributed content which have brought profound changes to business and economic practices. Understanding the formation and sustainability of such peer-to-peer communities has important implications for businesses. We develop a dynamic two-sided network model that relates growth of communities to interactions between contribution and consumption of resources in online sharing activities. Using online music sharing data collected from a popular IRC music sharing service over five years, we empirically apply the model to identify dynamics in the music sharing community. We find that the music sharing community demonstrates distinctive characteristics of a two-sided network. Contribution in the community leads to more consumption and consumption leads to more contribution, creating positive network effects in the community.
    [Show full text]
  • Smart Internet 2010 Report
    SMART INTERNET TECHNOLOGY CRC SMART INTERNET 2010 REPORT SMART INTERNET 2010 Version: General distribution Date of Publication: August 2005 Authors: Trevor Barr, Alex Burns, Darren Sharp Faculty of Life and Social Sciences Swinburne University of Technology Established and supported under the Australian Government’s Cooperative Research Centres Programme Acknowledgment The editorial team who compiled and wrote sections of this report, and the individual section contributors, wish to collectively thank all of the interviewees who so generously gave of their time, and their thoughts, for this report. The interviewees responded in person, or by email, or in taped telephone conversations. Many were overseas and agreed to be interviewed at difficult times for them. Every endeavour has been made to fully acknowledge the views of those external experts who were consulted and quoted for the compilation of this report. Disclaimer This report contains references, comments and views regarding the topic of Smart Internet 2010. The recipient acknowledges that these references, comments and views reflect opinions and assumptions by the individual contributors, editorial team and Smart Internet Technology CRC Pty Ltd concerning the future, which may or may not prove correct. Smart Internet Technology CRC Pty Ltd and its respective directors and officers expressly disclaim any liability, representations or warranties expressed or implied contained in this report or any omissions from it. This disclaimer extends to any other information whether written or not, provided at any time by or on behalf of the Smart Internet Technology CRC Pty Ltd. © Smart Internet Technology CRC Pty Ltd 2005. All Rights Reserved. All trademarks mentioned in this document are the property of their respective owners.
    [Show full text]
  • 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28
    UMG Recordings, Inc. et al v. Veoh Networks, Inc. et al Doc. 78 1 Re: Docket # 71 Steven A. Marenberg (101033) ([email protected]) 2 Elliot Brown (150802) ([email protected]) Brian Ledahl (186579) ([email protected]) 3 Benjamin Glatstein (242034) ([email protected]) IRELL & MANELLA LLP 4 1800 Avenue of the Stars, Suite 900 Los Angeles, California 90067-4276 5 Telephone: (310) 277-1010 Facsimile: (310) 203-7199 6 Attorneys for Plaintiffs 7 ADDITIONAL COUNSEL LISTED 8 ON SIGNATURE PAGE 9 UNITED STATES DISTRICT COURT 10 CENTRAL DISTRICT OF CALIFORNIA 11 WESTERN DIVISION 12 13 UMG RECORDINGS, INC., et al., ) Case No. CV-07-05744 AHM (AJWx) 14 ) ) JOINT STIPULATION UNDER 15 Plaintiffs, ) LOCAL RULE 37-2 REGARDING ) UMG RECORDINGS, INC.’S 16 ) MOTION TO COMPEL v. ) RESPONSES TO DISCOVERY 17 ) AGAINST VEOH NETWORKS, INC. ) 18 VEOH NETWORKS, INC., ) Filed Concurrently Herewith: ) [Declaration of Brian Ledahl and 19 ) Jennifer A. Golinveaux] Defendant. ) 20 ) ) Magistrate: Hon. Andrew J. Wistrich 21 ) ) Date: August 11, 2008 22 ) Time: 10:00 a.m. ) Courtroom: 690 23 ) ) Discovery Cutoff: January 12, 2009 24 ) Pretrial Conference: April 6, 2009 ) Trial Date: April 21, 2009 25 26 REDACTED PURSUANT TO INTERIM PROTECTIVE ORDER ENTERED 27 ON MAY 21, 2008-CONFIDENTIAL INFORMATION OMITTED 28 UNREDACTED COPY FILED UNDER SEAL 1899242 Dockets.Justia.com 1 TABLE OF CONTENTS 2 Page 3 I. INTRODUCTORY STATEMENTS ...............................................................2 4 A. UMG’s Introductory Statement .............................................................2
    [Show full text]
  • Singing for the School
    Journal of Theoretical and Applied Electronic Commerce Research This paper is Available online at ISSN 0718–1876 Electronic Version www.jtaer.com VOL 1 / ISSUE 3 / DECEMBER 2006 / 42 - 57 © 2006 Universidad de Talca - Chile P2P's Significance for eBusiness: Towards a Research Agenda Roger Clarke1 1 Xamax Consultancy Pty Ltd, Canberra, Australia and Visiting Professor in eCommerce at Uni. of Hong Kong, in Cyberspace Law and Policy at Uni. of N.S.W. and in Computer Science at A.N.U. [email protected] Received 25 April 2006; received in revised form 15 August 2006; accepted 13 October 2006 Abstract Applications running over peer-to-peer (P2P) networks have exploded since the late 1990s. Research is needed into many aspects of P2P. These include architecture, application functionality, and the categories of digital works that are shared using P2P facilities. A range of significant strategic, consumer and policy issues also arise, such as challenges to the operation of copyright, defamation and other censorship laws. Organisations affected by P2P are devising and deploying countermeasures, such as technological protections for digital works and attempts to identify devices and users. These too require study. This paper presents the landscape of research opportunities, indicating methods that might be appropriately applied to the various kinds of questions. Key words: P2P overlay networks, P2P applications, file-sharing, strategic impacts, policy impacts 42 P2P's Significance for eBusiness: Towards a Research Agenda Roger Clarke Journal of Theoretical and Applied Electronic Commerce Research This paper is Available online at ISSN 0718–1876 Electronic Version www.jtaer.com VOL 1 / ISSUE 3 / DECEMBER 2006 / 42 - 57 © 2006 Universidad de Talca - Chile 1 Introduction Applications of Peer-to-peer (P2P) technology have exploded since the late 1990s.
    [Show full text]