Technical Track, Colonial Room
Industry Standardization - A Conversation
Tim O'Reilly, Founder and CEO, O'Reilly Media, Inc.
Marc Hedlund, Chief Product Officer, Wesabe
Christian Huitema, Trustee, Internet Society
Carl Kesselman, Director, Center for Grid Technologies, USC
Bob Knighten, P2P Evangelist, Intel
Dr. Donald Steiner, President, Foundation for Intelligent Physical Agents
The question of industry standardization for peer to peer has been a heated one. Intel's initial proposal for an industry consortium with centralized decision making by major funders drew heavy criticism at the P2P working group meeting last October. Their modified proposal will have been unveiled at the February meeting shortly before this conference. Here, panelists who have experience with other standardization efforts will react to the Intel proposal, and present some ideas of their own. Heavy audience participation will be encouraged and expected.
Technical Track, Georgian Room
What We're Learning From Gnutella
Kelly Truelove, Founder & CEO, Truelove Research
With tens of thousands of users employing a heterogeneous set of inter-communicating applications to generate millions of network messages per day, the Gnutella network is a remarkable case study in fully decentralized peer-to-peer networked applications. From extensive measurements of this open network taken over a period of many months, Clip2 Distributed Search Solutions has gained a detailed understanding of its technical issues. Out of this understanding, we present "Lessons from Gnutella" broadly relevant to other peer-to-peer systems. We discuss in detail a key lesson, the need for node connectivity rules that allocate network participation burden according to node capabilities. Drawing upon the working example of the Clip2 Reflector application, we introduce the concept of "super-peers" and review the case for hybridization of the pure and brokered peer-to-peer models. Lessons are illustrated with historical data from the Gnutella network, including a vivid characterization of the fragmentation of the Gnutella network observed in August 2000 when average network traffic began to regularly exceed dial-up modem capacity.
Growing Network Topology with Reputation Management
Lucas Gonze, Cofounder and CEO, WorldOS Corp.
Decentralized networks remove one of the most important tools in a
system architect's kit - control over the shape and composition of a
network. As a result many P2P projects have reached an impasse, and
have handled it by reverting to centralized patterns.
WorldOS takes on this problem by using behavioral tracking to discover
and shape a network dynamically. The talk will address the means,
implications and applications of this technology.
Business Track, Grand Ballroom
Business and Social Implications of Decentralized Systems- A Panel Moderated by Tames and Ehrlich of Viant
Alan Brown, Assistant Director, Digital Freedom Network
Kate Ehrlich, Innovation Center, Viant
Andrew Mahon, Director, Strategic Marketing, Groove Networks, Inc.
David McNett, United Devices
Scott Miller, Senior Developer, Uprizer, Inc.
David Tames, Creative Lead, Viant Innovation Center
Bob Young, Chairman, RedHat
This panel, moderated by Kate Ehrlich and David Tames, discusses peer-to-peer as a disruptive technology, and how it threatens the stability of conventional work structures inside and outside an organization by shifting the balance of power. The notion that the structure of work, not just its execution, can be pushed out to the edges of an organization contradicts
the conventional wisdom of the "centralized mindset" and challenges us to think in terms of decentralized systems.
Case Study: Examining The Results of Peer-to-Peer Collaboration at PricewaterhouseCoopers
Jamey Harvey, Founder, Co-President & Chief Product Officer, Ikimbo
A discussion of the Peer-To-Peer Enterprise Collaboration Beta Trials will cover the Market overview; definition of worldwide problem; definition of PWC
problem - secure instant communication/file sharing and the challenges of rolling out scalable, privately branded business collaboration hubs to their employees, partners and customers.
Technical Track, Georgian Room
Performance Issues in Decentralized Filesharing Networks
Theodore Hong, Developer, Freenet Project
Recent reports on potential scalability problems in Gnutella have
focused attention on performance issues in decentralized filesharing
networks such as Gnutella and Freenet. I propose an analytical
framework for evaluating performance in these systems, based on the
small-world model originally popularized by Stanley Milgram in the
context of social networks and more recently applied to technological
networks such as power grids and the World-Wide Web by Duncan Watts
and others. Using simulation, I examine some aspects of scalability
and fault-tolerance in Freenet and Gnutella, and attempt to explain
contrasting behaviors between the two in terms of the small-world
model. Finally, I hope to draw some conclusions for designers of
future filesharing systems.
Trust: Who Needs It?
Scott Miller, Senior Developer, Uprizer, Inc.
Much emphasis is often placed on the need for a mechanism for creating
or determining trust in distributed systems. Freenet takes a different
approach: We assume that no Freenet node can be fully trusted.
Nevertheless, Freenet can guarantee the integrity of data; pristine,
unmodified, and as the publisher intended it. We discuss the design of
Freenet's keys, the cryptographic mechanisms for protecting data, and the
manner in which Freenet thwarts potential attacks.
Accountability and Resource Management in Peer-to-Peer Systems
Roger Dingledine, Security Philosopher, The Free Haven Project
Michael J. Freedman, Graduate Student, MIT
We address accountability and resource allocation approaches for current
and future peer-to-peer systems, including ways of limiting the damage
done by freeloaders. We show how micropayments and reputations can help
prevent communications denial of service and storage flooding attacks. Our
discussion emphasizes accountability solutions that maintain other design
requirements, such as anonymity or dynamic networks. After our talk, a
conference participant will be in a position to think carefully about
how resource allocation problems apply to new peer-to-peer systems and
will have some idea of where to start solving these problems.
Attack Resistant Sharing of Metadata
Bryce Wilcox-O'Hearn, Software Engineer, zooko.com
Any peer-to-peer network must face the threat of active attacks against the
network by some of the peers. One of the most vulnerable areas of
cooperation is the sharing of metadata. Sharing of metadata is particularly
susceptible to attack because metadata (for example, the authorship of a
work of art, the keywords used to index a text, or an opinion of the beauty
of a piece of music) is often impossible to verify for "correctness"
automatically. Attackers have already initiated "metadata poisoning" attacks
against many of the peer to peer networks, for example by uploading mp3
files marked as being copies of popular songs, but containing instead a
recording of a chainsaw or of an anti-piracy lecture.
We introduce "attack resistance" -- a measure of the robustness of a network
in the face of active attacks by some of its peers -- as applied to systems
for metadata sharing, and propose a novel protocol for sharing arbitrary
metadata across a network while ensuring this property. In addition to
attack resistance, the proposed protocol exhibits other desirable
characteristics, such as respecting the presence of diverse opinions, and
discovering well-recommended but little-known songs ("diamonds in the
The metadata sharing protocol is only one example of a general class of
flow-bounded trust networks, a class which includes the Advogato trust
metric. An experimental implementation is underway on the Mojo Nation peer-to-peer network.
Technical Track, Colonial Room
P2P on the Go - Peer Mobility in The Wireless Era
Dana Moore, Senior Scientist, BBN Technologies
John Hebeler, Roku
This session discusses the technologies, architectures, and component solutions that deliver the "peer" personal computer and its critical tools and information directly to any wired or wireless device. The discussion details mobile challenges and key technologies, and then establishes a mobile architecture that enables seamless information movement and control across the many mobile devices. Actual demonstrations, code samples, and planning steps enable your solution to get "on the go" quickly.
Building Peer Support into Devices by Scaling Down the Web
Greg Bolcer, CTO, Endeavors Technology
Devices literally no larger than a matchhead now interact
on an equal footing with hosts whose capacity, by every metric imaginable,
exceeds that of their lilliputian peer by a factor of 10,000 to 1. Thus,
for the first time, personal digital assistants, wireless telephones, and
kitchen appliances can peer with hosts anywhere within the network.
Within the new world of peer computing, standard Web protocols are
the universal level playing field. So long as a device obeys the
protocols required for peering, its size, shape, form, and location are
irrelevant. This talk will discuss Endeavors Technology's
Magi architecture, implementation gotchas, the techniques used
for downscaling it to devices including Compaq's iPAQ and PalmOS-based
devices, and plans for embedding Magi peer services into other devices.
Finally, assuming a world where every device can speak the same
language with any other, several novel applications will be presented.
Creating a Collaborative Computing Fabric From Disparate Devices
Erick Von Schweber, CTO, Cacheon, Inc.
With the explosion in the number and type of networked devices comes a side effect: Managing integrated, distributed applications whose software components are deployed far and wide becomes a roadblock to doing e-business successfully. This talk explains the concept of adding a new management layer a “computing fabric” in order to exploit the P2P and middleware infrastructures that have been and will continue to be deployed. With this approach, an enterprise or a solutions provider could use any connected device to inspect what application components are running across the network. From this same access point, users could discover, introspect, assemble, distribute and manage applications and services as they run all with a lightweight, standards-based environment.
Brazil Technology and P2P
Rinaldo Di Giorgio, Sun
The ability to provide Web services, Commerce services, and Identity services for P2P applications is important for broader commercial use. As P2P technologies develop, there will be a need to integrate with existing applications. In this talk we will present some early ideas utilizing Brazil technology to add commerce technologies like P2P micro payments to an already established P2P technology and protocol. The talk will briefly introduce Brazil then discuss a Gnutella Handler commonly known as BrazilGnut followed by an example of how to perform micro payments using JavaCard technology. The P2P micro payment approach will also be used to introduce the idea of P2P applications on Mobile devices using instances of Brazil that communicate with each other, without using a coordinating server. Time and development permitting, an example of JINI to Gnutella via Brazil will be presented, as well as the use of Brazil Technology for the hosting of personal web servers on J2ME instances having CDC or CLDC configurations with the intent of generating future discussions and joint development.
Business Track, Grand Ballroom
Governance in Coercian-Free Societies
Marc Stiegler, consultant/author
Starting with an imaginary universe with perfect walls, perfect locks, and the ability to "blink out" so that no one may grab you or shoot you, we examine the consequences for conventional forms of governance. We identify the seven missing features of the Web to make it such a universe, and explore solutions to problems deemed sensational and therefore newsworthy by popular media.
A Distributed Configuration Tool for Distributed Control Systems
Michael Hitz, CTO, skyfish.com
Shelley Powers, consultant/author, Burning Bird Enterprises
The talk focuses on the development of a collaborative specification tool for large scale complex systems such as energy and distribution management systems, gas pipelines and rail networks. P2P technologies and dynamically generated user interfaces will offer participants real-time access to system descriptions, quotes, demand orders and material specifications - first steps to a well costed and engineering intensive tender response.
Napster Fabbing - P2P Delivery of Physical Products
Marshall Burns, President, Ennex Corporation
James Howison, Doctoral Student, Syracuse University
As fabbers decline in price and improve in user friendliness, their proliferation among professional and recreational computer users will provide a whole new purpose for peer-to-peer exchanges like Napster, Gnutella, and FreeNet. With fabbers instead of MP3 players and *.fab files instead of *.MP3, the inventories distributed by such networks naturally expand from information products to the physical: toys, clothing, furniture, sporting gear, consumer electronics, and even, one day, automobiles.
Digital fabbing will be to designers, engineers, and manufacturers what MP3 has been to musicians and record companies. This presentation explores the business opportunities presented by this radical new technology, and related legal and economic issues.
Bookster: Superdistribution and Content Metering
Al Saurette, CEO, RightsMarket, Inc.
In the physical world, control of distribution, is how money is pumped from
consumers to providers. While Napster and its P2P spawn (Bookster,
Gnutella, etc.) have improved the distribution of content and information,
they have not offered a business model that is sustainable. An economic
pump from consumers of intellectual property (IP) to creators must be
Money pumps based on digital bit distribution control are a futile exercise
in Cyberspace. What is required are techniques and approaches that
recognize digital content will be superdistributed and usage, not possession,
is the key determinant of value. RightsMarket will present how it is
implementing a Content Metering solution in an educational environment that
has 75,000 students in cooperation with a large State government.