Vous êtes sur la page 1sur 4

Tutor.JUNE.

NEW 14/05/01 8:22 PM Page 8

tutorPEER TO PEER

POWER
TO THE PEOPLE
Pe e r-t o-peer technology does away with traditional cl i e n t /server computing and
e m p ow e rs users to create their own networks. File swapping and shared computing
a re just initial examples of what P2P will offe r.

o matter which side of the music-

N sharing fence you’re leaning


against, you can’t argue with Nap-
ster’s popularity. The applica-
tion’s enduring legacy, however, may
involve more than just music. Under the
hood, Napster (www.napster.com) uses
peer-to-peer (P2P) technology, which devi-
ates significantly from the client-server
design that has governed the Internet from
the medium’s first days. P2P is not new, but
Napster’s popularity has fueled a great deal
of interest in the technology.

WHAT’S THE DIFFERENCE?


Your PC, when connected to the Internet,
is referred to as a client. The same term also
describes most programs you use to do
things on the Web: your browser, email
software, newsreader and so forth are all
clients. The salient feature of a client is
that it doesn’t operate independently; to be
functional, it must connect to a server – a
central source of data or instructions. Every
time you use client software to interact
with the Net, you’re sending a request to
the corresponding server software and wait-
Figure 1: Napster and the Gnutella-driven BearShare offer similar-looking search results, although Napster’s
ing for the server to respond. interface demonstrates a more developed nature.
P2P doesn’t work that way. Instead, two

118 June 2001 www.DITnet.co.ae ■ www.pcmag-mideast.com


Tutor.JUNE.NEW 14/05/01 8:22 PM Page 9

p2p technology | power to the people

TWO PEER-TO-PEER MODELS

(or more) computers are linked for the pur- that system’s functions are to determine search for music files on the computers of
pose of sharing data, each taking an equal current user IP addresses and offer an index Napster users everywhere on the Net and,
role in the data transfer process without the of files available, not to intervene in the actu- at the same time, makes the music files on
intervention of a central data or instruc- al PC-to-PC communication. your computer available to the rest of the
tion source. Your home network is prob- As noted earlier, sending data over the Napster community. Some P 2 P a p p l i c a-
ably a peer-to-peer system; no server is I n t e rnet from one computer directly to tions let you share not only files but other
ne ede d to sha re i nfo r ma tio n a mon g another isn’t new by any means. Windows resources as well.
machines. users have long had access to freeware or What’s wrong with centralised servers?
Not all P2P systems call the individual shareware software that enabled them to First, they cost a lot of money. Servers
computers peers. The Gnutella file-shar- set up their own machines for access by oth- require reliability and durability beyond
ing service, for example, refers to each ers. To exchange files directly with a friend, what most workstations need and, as a
host as a servent. This term itself is telling. for example, both of you could run FTP (File result, must incorporate relatively expen-
An amalgam of server and client, the ser- Transfer Protocol) server software, set up sive technologies such as SCSI, disk mir-
vent designation implies that P2P doesn’t a username and password for the other roring and sophisticated operating systems.
so much do away with the server as incor- person, and give that information along Moving applications off servers and into a
porate the server functions into the client. with your current IP a d d resses to each P2P environment can make a lot of sense
The idea of a remote server that mediates other. (To find your IP address on a Win- financially. Servers are not needed for all
the flow of data disappears. Instead, each dows 9x system, you’d select Start | Run, applications. They’re essential for hosting
user’s com puter handles the serving, then enter winipcfg.exe and click O K ; a popular Web site, certainly, because they
although those functions are more or less under Windows NT or 2000, you’d enter can dedicate hard disk space, network
hidden from the user. ipconfig.exe.) Each of you could then log bandwidth and administrative resources to
When you install a program such as Nap- on to the other’s system and get files. As this multifunction and re s o u rc e - h u n g r y
ster, you’re simultaneously turning your you probab ly s uspect, however, thi s task. But simpler tasks such as limited file
machine into a server that other users can approach is clumsy, inefficient, and almost sharing don’t require servers.
access over the Internet, and enabling your totally useless if you want to share files
machine to access other computers run- with more than a few people. FINDING ONE ANOTHER
ning Napster that are connected to the Net. P2P, on the other hand, lets computers Avoiding the use of central servers means
To function, Napster does require a cen- connected to the Internet communicate that P2P applications have to establish dif-
tral system (run by Napster, the site), but with each other directly. Napster lets you ferent ways of working with IP addresses.

www.DITnet.co.ae ■ www.pcmag-mideast.com June 2001 119


Tutor.JUNE.NEW 14/05/01 8:22 PM Page 10

tutorPEER TO PEER
cation. There is no official client and the
name doesn’t refer to a company or even
a program, creating a very elusive lawsuit
t a rget. Gnutella was touted as the tech-
nology that could supplant Napster’s dom-
inance in music file exchanges, but the real
advantage is the ability to find and down-
load any type of file. The Gnutella proto-
col does not actually handle file transfers,
employing HTTP for this function instead.
Each servent becomes an HTTP client and
server together, allowing two-way trans-
fers.
Gnutella-based servents are growing in
number and ease of use. A look at one
download site, www.gnutelliums.com,
showed servents available for Windows,
Linux, Java and the Mac. Three of the most
popular Windows variants are BearShare
( w w w . b e a r s h a r e .c o m) , L i m eW i r e
( w w w . l i m e w i re .com ) a nd To a d N o d e
(www.toadnode.com). Another servent,
Newtella (www .newtella.com), focuses in
a Napster-like way on music files. Recent
improvements in the protocol have con-
tr ib ute d t o n ew ent husi asm , ser vent
upgrades, and even interest from the record-
Figure 2: Groove lets you establish a range of P2P-based collaborative activities. ing industry and other commercial sectors.
The record industry’s attention to Nap-
Every computer on the Internet must have net. They use the essence of the Internet ster and Gnutella clearly indicates a reali-
a numeric IP address; in fact, having an IP – network connectivity, the TCP/IP proto- sation that file-swapping isn’t about to dis-
number is one of the definitions of being col, and the requisite IP addressing system appear, and that there are ways to profit.
on the Internet. For ease of use, this IP – but skirt the rest. A similar fee-based file-sharing service
number is typically referenced through its appears to be in the works at CenterSpan
corresponding domain name (pcmag.com, WHAT CAN YOU DO WITH P2P? Communications (www.centerspan.com),
for example), and keeping track of the cor- By far the most widespread application of which acquired the assets of the P2P file-
relation between IP numbers and domain P2P has been file sharing, with Napster as sh a r in g s er v i ce k no w n as S c o u r
names is the responsibility of dns (Domain the leader, of course. The RIAA (Record (www.scour.com). Scour enthusiasts pri-
Name System) servers. P2P avoids dealing Industry Association of America) suit last marily swapped movie files, and the motion
with DNS servers either by having P Cs year seemed, for a time, destined to deep- picture industry wasn’t amused. Lawsuits
address one another using IP numbers only six the enterprise, leaving only the mem- resulted in Scour shutting down the ser-
or by using a proprietary means of obtain- ory of a brief period of Internet anarchy. vice, but CenterSpan plans to relaunch the
ing current ip numbers. But the company survived and has formed service as a legal distributor of movie and
This avoidance is necessary for two rea- an alliance with media firm Bertelsmann AG music files. IBM has entered the fray as
sons. First, DNS servers rely on fixed IP to develop a pay service (latest reports sug- well, proposing a technology that would
addresses – IP numbers that are assigned gest a fee of about $5 per month) that would allow participants to share files but would
to individual computers and never change. give subscribers unlimited access to music limit the number of times those files could
Such is not the case with the majority of released by Bertelsmann Music Gro u p . be played or shown (www.zdnet.com/
surfers who access the Net via a dial-up Since forming this alliance, Napster has intweek/stories/news/0,4164,2676785,
line. At the moment of connection, these seen lawsuits dropped by Germany’s EDEL 00.html). In fact, several big computing
machines are assigned an IP number from music and US independent label T V T firms are getting involved in P2P, includ-
a block of available numbers the ISP may Records. As of this writing, both companies ing Intel, Microsoft and Hewlett-Packard.
use (this is called a dynamic IP address). are cooperating with Napster on setting up Other file-sharing systems are making
Second, all computers on the Internet have the fee-based service, although the upstart’s their mark. For example, Aimster (www.aim-
IP addresses, but not all have domain names, future is still uncertain. ster. com) works in conjunction with AOL’s
and in those cases DNS servers are of no Despite Napster’ s success, Gnutella instant messaging service to allow partic-
use. (http://gnutella.wego.com) – a search pro- ipants to send files to one another. Freenet
Because of their ability to work outside tocol, in essence – is a more interesting (http://freenetproject.org) provides a means
the DNS system and outside the system of P 2 P p roject. Designed to be completely for individual users to share any type of file.
centralised servers, P2P applications are free of central authority, Gnutella can be MojoNation (www.mojonation.net) offers
said to operate at the “edges” of the Inter- incorporated into any file-sharing appli- file sharing and tries to solve the load-bal-

120 June 2001 www.DITnet.co.ae ■ www.pcmag-mideast.com


Tutor.JUNE.NEW 14/05/01 8:22 PM Page 11

p2p technology | power to the people

ancing problem of more users taking than


contributing files.
Commerce is one use predicted for P2P.
There’s no real reason for not routing trans-
actions between individuals directly rather FINDING ALIENS AND
WIPING OUT CANCER
than via intermediaries. Collaboration is
another possible application for P2P. A
g o od e xa mp le is Gro o ve N et wo rk s ’
(www.groove.net) Groove collaboration
application (Figure 2). s compelling as P2P’s cur- seti@home screensaver accepts a
A rguably, the sharing of data among
Internet users shouldn’t require servers at
all. P2P prophets predict that direct user-
to-user email will join direct file transfer
A rent applications might
be, some observers find
its close cousin, distrib-
uted computing, even more promis-
3 0 0K do w n lo a d f ro m P ro j e c t
serendip, crunches the data, and
c o m bine s th is d ata w it h da t a
analysed by other idle computers,
and another significant P2P method, instant ing. This technology involves remote- sending the results to the SERENDIP
messaging (such as ICQ). To get an idea ly linked machines sharing their com- team. To date, the 1.5 million people
of the huge variety of projects that can be putation resources over the Internet. who installed the screensaver have
placed under the P2P umbrella, see the One simple fact about personal com- contributed a total of 165,000 years
O’Reilly P 2 PD i rectory at www.oreillynet. puters is that their CPUs spend a very of computing time.
com/pub/q/p2p_category. You’ll find pro- significant percentage of their time True, this is an unusual project,
jects ranging from file sharing to collabo- doing little or nothing. This is obvi- but it’s not the only one of its kind.
ration, messaging, resource distribution ously true if we leave our computers Popular Power (www.popularpow-
and more. powered on when we’re away, but er.com) plans not only to use idle
even while working at the computer cycles from Internet-connected PCs,
SECURITY ISSUES we rarely use its full power. Surely all but also to pay for these cy cl e s .
P 2 P communication is fraught with the this processing power could be put Pa ra b o n C o m pu t at io n ( ww w.
potential for security disasters – far more to better use. Why not use the net- p a rabon.com) wa n ts to use idle
so than systems employing central servers. work to join the idle processing cycles cycles to help computers engaged
Because P2P applications allow one user from many idle computers into a kind in projects such as cancer research.
to access another’s computer directly, shar- of super-computer that can work Entropia (www.entropia.com) simi-
ing files and other resources is convenient, away at some joint task or another? larly plans to make wasted cycles
but hacking is convenient as well. For this In fact, we’re already there. The available for projects of nonprofit
reason alone, expect large organisations to seti@home project (http://setiath- organisations such as charities. These
forbid the use of popular P2P programs, ome.ssl.berkeley.edu) uses idle com- are but a few of the projects cur-
and expect hordes of users to stay away puters that are connected to the rently in place or in development.
until application providers can give assur- Internet to analyse data captured by With little effort, one can imagine
ances about security. If you’re wary of a radio telescope in Puerto Rico, part how corporations might use the idle
shopping on the Web, you should be dou- of Project SERENDIP, which sifts deep- resources of the huge number of
bly wary of allowing strangers to access space radio waves for signs of w o r k st ations on their L A Ns and
your hard disk. Such concerns, though, ex t rat e r re strial int elligence. A WANs.
haven’t stopped many thousands of users
from opening their machines to Napster
access, and P2P security warnings haven’t
followed the Napster hype. We’re not pick-
ing on Napster here; security concerns are
endemic to any kind of P2P access. Com-
panies including Intel are beginning to
address these concerns.

PERSON TO PERSON
Whether P2P will live up to the hype is still
anyone’s guess. A number of technologies
(push, for example) have shone briefly,
only to fizzle. Still, a lot of work on new
P 2 P applications is underway. And the
technology has something else going for
it: the interest and support of thousands
of individuals who like the idea of com-
The SETI@home interface lets you see how your computer is being used by the
municating directly with other users. P2P program.
may put the personal back in personal
computers.

www.DITnet.co.ae ■ www.pcmag-mideast.com June 2001 121

Vous aimerez peut-être aussi