O'Reilly Peer-to-Peer Conference
O'Reilly HomeO'Reilly Network
ConferencesSoftwareInternational

Arrow Home
Arrow Registration
Arrow Hotel/Travel
Arrow Sessions
Arrow Speakers
Arrow BOFs
Arrow Events
Arrow Press
Arrow Mail List
Arrow Sponsors
O'Reilly
Dr. Dobb's TechNetCast Coverage

Porpoises

The first and most important conference on P2P
O'Reilly Peer-to-Peer Conference
Westin St. Francis Hotel -- San Francisco, California
February 14-16, 2001

Friday Sessions

Overview | Wednesday | Thursday | Friday | Download Presentations
Friday, February 16
9:00 am Keynote, Grand Ballroom

Free Code, Freeing Culture
Lawrence Lessig, Professor of Law, Stanford Law School

Professor Lessig will discuss how the Internet promised an explosion of bottom up social and political movements, and the potential to tap into the power of Internet communication. That has not happened yet. But P2P technologies will bring about the explosion that was expected. In a range of cases -- including vote trading and music sharing - social life will be Napsterized.

10:15 am Break
10:45 am Technical Track, Colonial Room

Industry Standardization - A Conversation
Tim O'Reilly, Founder and CEO, O'Reilly Media, Inc.
Marc Hedlund, Chief Product Officer, Wesabe
Christian Huitema, Trustee, Internet Society
Carl Kesselman, Director, Center for Grid Technologies, USC
Bob Knighten, P2P Evangelist, Intel
Dr. Donald Steiner, President, Foundation for Intelligent Physical Agents

The question of industry standardization for peer to peer has been a heated one. Intel's initial proposal for an industry consortium with centralized decision making by major funders drew heavy criticism at the P2P working group meeting last October. Their modified proposal will have been unveiled at the February meeting shortly before this conference. Here, panelists who have experience with other standardization efforts will react to the Intel proposal, and present some ideas of their own. Heavy audience participation will be encouraged and expected.

Technical Track, Georgian Room

What We're Learning From Gnutella
Kelly Truelove, Founder & CEO, Truelove Research

With tens of thousands of users employing a heterogeneous set of inter-communicating applications to generate millions of network messages per day, the Gnutella network is a remarkable case study in fully decentralized peer-to-peer networked applications. From extensive measurements of this open network taken over a period of many months, Clip2 Distributed Search Solutions has gained a detailed understanding of its technical issues. Out of this understanding, we present "Lessons from Gnutella" broadly relevant to other peer-to-peer systems. We discuss in detail a key lesson, the need for node connectivity rules that allocate network participation burden according to node capabilities. Drawing upon the working example of the Clip2 Reflector application, we introduce the concept of "super-peers" and review the case for hybridization of the pure and brokered peer-to-peer models. Lessons are illustrated with historical data from the Gnutella network, including a vivid characterization of the fragmentation of the Gnutella network observed in August 2000 when average network traffic began to regularly exceed dial-up modem capacity.

Growing Network Topology with Reputation Management
Lucas Gonze, Cofounder and CEO, WorldOS Corp.

Decentralized networks remove one of the most important tools in a system architect's kit - control over the shape and composition of a network. As a result many P2P projects have reached an impasse, and have handled it by reverting to centralized patterns. WorldOS takes on this problem by using behavioral tracking to discover and shape a network dynamically. The talk will address the means, implications and applications of this technology.

Business Track, Grand Ballroom

Business and Social Implications of Decentralized Systems- A Panel Moderated by Tames and Ehrlich of Viant
Alan Brown, Assistant Director, Digital Freedom Network
Kate Ehrlich, Innovation Center, Viant
Andrew Mahon, Director, Strategic Marketing, Groove Networks, Inc.
David McNett, United Devices
Scott Miller, Senior Developer, Uprizer, Inc.
David Tames, Creative Lead, Viant Innovation Center
Bob Young, Chairman, RedHat

This panel, moderated by Kate Ehrlich and David Tames, discusses peer-to-peer as a disruptive technology, and how it threatens the stability of conventional work structures inside and outside an organization by shifting the balance of power. The notion that the structure of work, not just its execution, can be pushed out to the edges of an organization contradicts the conventional wisdom of the "centralized mindset" and challenges us to think in terms of decentralized systems.

Case Study: Examining The Results of Peer-to-Peer Collaboration at PricewaterhouseCoopers
Jamey Harvey, Founder, Co-President & Chief Product Officer, Ikimbo

A discussion of the Peer-To-Peer Enterprise Collaboration Beta Trials will cover the Market overview; definition of worldwide problem; definition of PWC problem - secure instant communication/file sharing and the challenges of rolling out scalable, privately branded business collaboration hubs to their employees, partners and customers.

12:00 pm Lunch
1:15 pm Technical Track, Georgian Room

Performance Issues in Decentralized Filesharing Networks
Theodore Hong, Developer, Freenet Project

Recent reports on potential scalability problems in Gnutella have focused attention on performance issues in decentralized filesharing networks such as Gnutella and Freenet. I propose an analytical framework for evaluating performance in these systems, based on the small-world model originally popularized by Stanley Milgram in the context of social networks and more recently applied to technological networks such as power grids and the World-Wide Web by Duncan Watts and others. Using simulation, I examine some aspects of scalability and fault-tolerance in Freenet and Gnutella, and attempt to explain contrasting behaviors between the two in terms of the small-world model. Finally, I hope to draw some conclusions for designers of future filesharing systems.

Trust: Who Needs It?
Scott Miller, Senior Developer, Uprizer, Inc.

Much emphasis is often placed on the need for a mechanism for creating or determining trust in distributed systems. Freenet takes a different approach: We assume that no Freenet node can be fully trusted. Nevertheless, Freenet can guarantee the integrity of data; pristine, unmodified, and as the publisher intended it. We discuss the design of Freenet's keys, the cryptographic mechanisms for protecting data, and the manner in which Freenet thwarts potential attacks.

Accountability and Resource Management in Peer-to-Peer Systems
Roger Dingledine, Security Philosopher, The Free Haven Project
Michael J. Freedman, Graduate Student, MIT

We address accountability and resource allocation approaches for current and future peer-to-peer systems, including ways of limiting the damage done by freeloaders. We show how micropayments and reputations can help prevent communications denial of service and storage flooding attacks. Our discussion emphasizes accountability solutions that maintain other design requirements, such as anonymity or dynamic networks. After our talk, a conference participant will be in a position to think carefully about how resource allocation problems apply to new peer-to-peer systems and will have some idea of where to start solving these problems.

Attack Resistant Sharing of Metadata
Bryce Wilcox-O'Hearn, Software Engineer, zooko.com

Any peer-to-peer network must face the threat of active attacks against the network by some of the peers. One of the most vulnerable areas of cooperation is the sharing of metadata. Sharing of metadata is particularly susceptible to attack because metadata (for example, the authorship of a work of art, the keywords used to index a text, or an opinion of the beauty of a piece of music) is often impossible to verify for "correctness" automatically. Attackers have already initiated "metadata poisoning" attacks against many of the peer to peer networks, for example by uploading mp3 files marked as being copies of popular songs, but containing instead a recording of a chainsaw or of an anti-piracy lecture.

We introduce "attack resistance" -- a measure of the robustness of a network in the face of active attacks by some of its peers -- as applied to systems for metadata sharing, and propose a novel protocol for sharing arbitrary metadata across a network while ensuring this property. In addition to attack resistance, the proposed protocol exhibits other desirable characteristics, such as respecting the presence of diverse opinions, and discovering well-recommended but little-known songs ("diamonds in the rough").

The metadata sharing protocol is only one example of a general class of flow-bounded trust networks, a class which includes the Advogato trust metric. An experimental implementation is underway on the Mojo Nation peer-to-peer network.

Technical Track, Colonial Room

P2P on the Go - Peer Mobility in The Wireless Era
Dana Moore, Senior Scientist, BBN Technologies
John Hebeler, Roku

This session discusses the technologies, architectures, and component solutions that deliver the "peer" personal computer and its critical tools and information directly to any wired or wireless device. The discussion details mobile challenges and key technologies, and then establishes a mobile architecture that enables seamless information movement and control across the many mobile devices. Actual demonstrations, code samples, and planning steps enable your solution to get "on the go" quickly.

Building Peer Support into Devices by Scaling Down the Web
Greg Bolcer, CTO, Endeavors Technology

Devices literally no larger than a matchhead now interact on an equal footing with hosts whose capacity, by every metric imaginable, exceeds that of their lilliputian peer by a factor of 10,000 to 1. Thus, for the first time, personal digital assistants, wireless telephones, and kitchen appliances can peer with hosts anywhere within the network. Within the new world of peer computing, standard Web protocols are the universal level playing field. So long as a device obeys the protocols required for peering, its size, shape, form, and location are irrelevant. This talk will discuss Endeavors Technology's Magi architecture, implementation gotchas, the techniques used for downscaling it to devices including Compaq's iPAQ and PalmOS-based devices, and plans for embedding Magi peer services into other devices. Finally, assuming a world where every device can speak the same language with any other, several novel applications will be presented.

Creating a Collaborative Computing Fabric From Disparate Devices
Erick Von Schweber, CTO, Cacheon, Inc.

With the explosion in the number and type of networked devices comes a side effect: Managing integrated, distributed applications whose software components are deployed far and wide becomes a roadblock to doing e-business successfully. This talk explains the concept of adding a new management layer ­a “computing fabric” ­in order to exploit the P2P and middleware infrastructures that have been and will continue to be deployed. With this approach, an enterprise or a solutions provider could use any connected device to inspect what application components are running across the network. From this same access point, users could discover, introspect, assemble, distribute and manage applications and services as they run ­ all with a lightweight, standards-based environment.

Brazil Technology and P2P
Rinaldo Di Giorgio, Sun

The ability to provide Web services, Commerce services, and Identity services for P2P applications is important for broader commercial use. As P2P technologies develop, there will be a need to integrate with existing applications. In this talk we will present some early ideas utilizing Brazil technology to add commerce technologies like P2P micro payments to an already established P2P technology and protocol. The talk will briefly introduce Brazil then discuss a Gnutella Handler commonly known as BrazilGnut followed by an example of how to perform micro payments using JavaCard technology. The P2P micro payment approach will also be used to introduce the idea of P2P applications on Mobile devices using instances of Brazil that communicate with each other, without using a coordinating server. Time and development permitting, an example of JINI to Gnutella via Brazil will be presented, as well as the use of Brazil Technology for the hosting of personal web servers on J2ME instances having CDC or CLDC configurations with the intent of generating future discussions and joint development.

Business Track, Grand Ballroom

Governance in Coercian-Free Societies
Marc Stiegler, consultant/author

Starting with an imaginary universe with perfect walls, perfect locks, and the ability to "blink out" so that no one may grab you or shoot you, we examine the consequences for conventional forms of governance. We identify the seven missing features of the Web to make it such a universe, and explore solutions to problems deemed sensational and therefore newsworthy by popular media.

A Distributed Configuration Tool for Distributed Control Systems
Michael Hitz, CTO, skyfish.com
Shelley Powers, consultant/author, Burning Bird Enterprises

The talk focuses on the development of a collaborative specification tool for large scale complex systems such as energy and distribution management systems, gas pipelines and rail networks. P2P technologies and dynamically generated user interfaces will offer participants real-time access to system descriptions, quotes, demand orders and material specifications - first steps to a well costed and engineering intensive tender response.

Napster Fabbing - P2P Delivery of Physical Products
Marshall Burns, President, Ennex Corporation
James Howison, Doctoral Student, Syracuse University

As fabbers decline in price and improve in user friendliness, their proliferation among professional and recreational computer users will provide a whole new purpose for peer-to-peer exchanges like Napster, Gnutella, and FreeNet. With fabbers instead of MP3 players and *.fab files instead of *.MP3, the inventories distributed by such networks naturally expand from information products to the physical: toys, clothing, furniture, sporting gear, consumer electronics, and even, one day, automobiles.

Digital fabbing will be to designers, engineers, and manufacturers what MP3 has been to musicians and record companies. This presentation explores the business opportunities presented by this radical new technology, and related legal and economic issues.

Bookster: Superdistribution and Content Metering
Al Saurette, CEO, RightsMarket, Inc.

In the physical world, control of distribution, is how money is pumped from consumers to providers. While Napster and its P2P spawn (Bookster, Gnutella, etc.) have improved the distribution of content and information, they have not offered a business model that is sustainable. An economic pump from consumers of intellectual property (IP) to creators must be established.

Money pumps based on digital bit distribution control are a futile exercise in Cyberspace. What is required are techniques and approaches that recognize digital content will be superdistributed and usage, not possession, is the key determinant of value. RightsMarket will present how it is implementing a Content Metering solution in an educational environment that has 75,000 students in cooperation with a large State government.

3:15 pm Break
3:45 pm Plenary, Grand Ballroom

Closing Plenary - P2P Town Meeting
Tim O'Reilly, Founder and CEO, O'Reilly Media, Inc.
Clay Shirky, Decentralization Writer/Consultant, shirky.com

In a tradition carried over from the O'Reilly Perl Conference, Tim O'Reilly and Clay Shirky will host a "town meeting", in which a panel of speakers from the conference (and potentially prominent audience members) will respond to the concerns and questions of the audience. This is our chance, as a community, to air what's on our mind, and to get a "sense of the crowd" about future directions for the technology and what they like and don't like about the conference.

Room assignments are subject to change.


O'Reilly Home | Conferences Home | P2P Conference Home
Events | Registration | Hotels/Travel | Sessions | Speakers
Press | Mail List | Sponsors | P2P Brochure

© 2001, O'Reilly Media, Inc.
conftech@oreilly.com