- This article describes what P2P technology is and then expands upon that to ask, what came before P2P technology, leading to tracing through the evolution of P2P technology.
- It also focuses not only on major historical developments but what is happening now, and the prospects for P2P in the future.
- In their conclusion section they pose the question when will the "'killer app" for P2P emerge to take full advantage to the P2P technology.
Music and P2P
- The article gives a overview of music copying throughout the ages from Edison all the way to Napster. This leads on to the more complex issues of today. And the first section puts forth many arguments for the regulation of P2P communities having to pay fees and also similar suggestions why free service can still be available as well.
- The authors then look at the Music industry in the P2P arena and ask "it is helping or hindering musicians". Points are made for and against, which then leads onto their last sections.
- The authors have written about not only the technical issues of Music & P2P, but taken on a global level the impact this has had and is having on countries and governments. The article suggests that it seems unlikely that governments will monitor P2P traffic, but it may become law that ISPs do it.
Copyright and P2P
- Nearly all the articles in this site mention the legal issues of P2P, but this article gives an in-depth look not only at the past cases to P2P copyright cases, but aids the reader in giving them a general overview of copyright legislation.
- It also takes into account copyright on the global scene, since P2P networks can span many countries a continents.
- The central issue is how copyright applies to P2P, a question that has no easy answer, as this is still evolving in the courts today.
- The articles ends with what impact P2P has had, is having and will have on our lives. The authors suggest that the solution to these issues may not be technology based, but there is a human to solution to this dilemma.
- A concise piece focusing initially on the technology aspect of napster, uncovering how it works. Everything from how does a napster user enter the network to how a napster user searched for files.
- It then moves straight onto legal issues surrounding napster. Tracing through the major events between napster and the record labels until its eventual demise
- It then takes into account, not only the legal issues napster faced but the issues that the entire P2P sector now faces, in "The legacy of Napster: Online warfare on P2P networks"
- The article concludes with a highly concise timeline for events surrounding the rise and fall of napster from their preliminary injunction in June 2000, to napster filing from chapter 11 bankruptcy in June 2002.
- "Gnutella is a very simple file sharing protocol that uses the principles of peer-to-peer networking to allow users to share data", and authors expand upon this to explore the historical development of Gnutella to then go into the details of this P2P technology.
- The articles gives a detailed account of Gnutella, everything from connecting to it, how queries are done and even what the Gnutella packets look like.
- The authors then critique the protocols pointing out some of their weaknesses, and concludes with the future of Gnutella and what it might hold, and this might not necessarily just be about music swapping. The authors mention others way the Gnutella network will be used in the future.
- This article initially traces through the evolution of YouServ, and what prospects it has in the future, and then dives into the more technical aspects of YouServ.
- "YouServ establishes a simple interface that makes it easy for web content both to be accessed and published." The authors expand upon this to explore not only the features of YouServ, but security issues also, in detail
- Performance and Scalability issues are also discussed, leading to the social impact this technology might have on our lives.
- The article concludes with the alternatives to YouServ.
- "Freenet is a completely distributed decentralized peer-to-peer system", and this articles give as brief overview for freenet and why it is used, and its main design goals.
- It then gives a history of freenet, it evolution, and the implications 9/11 had on it, and where freenet is going in the future.
- A major section of the article is dedicated to the technology used in freenet, analyzing its performance, and how efficiently it can operate.
- In such a concise article the authors even trace the effects of freenet, not only on businesses, but also on people who use it for their own personal use.
P2P Search Engines
- Before the authors describe how P2P search engines work, the article begins with how current search engines operates, and they use this initially starting point to compare and contrast the advantages and disadvantages of P2P search engines.
- A highly in depth look at P2P Search engines is then given and explained, with sections dedicated to different discovery methods.
- This then leads of what implementations are out there working today such as Kazza and eDonkey.
- The article concludes with more information about JXTA, a Java protocol and a look at how its functionality is used to search over P2P networks.
- Initially Gnutella as an example is discussed, that leads into the details of how information is routed in a P2P network. There is a section, obviously on the packet that is sent, describing the Descriptor Header, which is utilized in P2P for routing.
- The articles describes in detail the procedure used in many different routing technologies, but concentrates on the JXTA protocol developed by sun, as a benchmark for showing how P2P routing technology operates.
- The article employs images, and animations for show how packets are transported around the network.
- Again another very concise article does not dive into the nuts and bolts initially of P2P security but shows why security is needed, and gives a general overview for the topic. Security issues can evolve from Bugs in the software, Trojans virus and so on, and these are explained here.
- The article then goes on to explain the techniques used in P2P security, such as the used of secret and public keys, the protocols used, like SSL, and other areas.
- The article concludes with the future of P2P security technologies, areas such as biometric reading or even quantum key encryption are technologies with might be common place soon