點對點

出自KMU Wiki

跳轉到: 導航, 搜索

一點對點 (或“ 點對點 ” ) 計算機網絡使用不同的參與者之間的連接在一個網絡和累積帶寬的網絡參與者,而非傳統的集中資源,相對較低的服務器的數量提供的核心價值,以一個服務或應用。 P2P networks are typically used for connecting nodes via largely ad hoc connections. P2P網絡通常用於連接節點 ,主要是通過特設的聯繫。 Such networks are useful for many purposes.這種網絡是有益的多種用途。 Sharing content files (see file sharing ) containing audio, video, data or anything in digital format is very common, and realtime data, such as telephony traffic, is also passed using P2P technology.共享內容的文件(見文件共享 ) ,其中載有音頻,視頻,數據或任何的數字格式是很普遍的,實時數據,如電話的交通,亦是通過使用P2P技術。

A pure P2P network does not have the notion of clients or servers, but only equal peer nodes that simultaneously function as both "clients" and "servers" to the other nodes on the network.一個純粹的P2P網絡沒有概念的客戶端或服務器,但只有平等的同儕 的節點功能,同時作為“客戶”和“服務器”到其他節點上的網絡。 This model of network arrangement differs from the client-server model where communication is usually to and from a central server.這種模式的網絡安排不同,從客戶端-服務器模式的溝通通常是和從一個中央服務器。 A typical example of a file transfer that is not P2P is an FTP server where the client and server programs are quite distinct, the clients initiate the download/uploads, and the servers react to and satisfy these requests.一個典型例子,文件傳輸,這不是P2P的是一個FTP伺服器客戶端和服務器程序是相當明顯的,客戶開始下載/上傳,和服務器的反應並滿足這些要求。

The earliest P2P network in widespread use was the Usenet news server system, in which peers communicated with one another to propagate Usenet news articles over the entire Usenet network.最早的P2P網絡在廣泛使用是的Usenet 新聞服務器系統,在其中同儕溝通,互相宣傳的Usenet新聞文章在整個新聞組網絡。 Particularly in the earlier days of Usenet, UUCP was used to extend even beyond the Internet .特別是在較早前天的Usenet , uucp被用來延長,甚至超越了互聯網 。 However, the news server system also acted in a client-server form when individual users accessed a local news server to read and post articles.不過,新聞服務器系統也採取行動,在客戶端-服務器的形式,當個別用戶進入本地新聞服務器的閱讀和張貼文章。 The same consideration applies to SMTP email in the sense that the core email relaying network of Mail transfer agents is a P2P network while the periphery of Mail user agents and their direct connections is client server.同樣的考慮適用的SMTP電子郵件,在意義上說,核心的電子郵件中繼網絡, 郵件傳輸代理是一個P2P網絡,而周邊的郵件用戶代理和他們的直接連接是客戶端服務器。

Some networks and channels such as Napster , OpenNAP and IRC server channels use a client-server structure for some tasks (eg searching) and a P2P structure for others.一些網絡和渠道,如Napster , opennap和IRC 服務器的渠道,使用客戶端-服務器結構的一些任務(如搜索)和一個P2P結構等。 Networks such as Gnutella or Freenet use a P2P structure for all purposes, and are sometimes referred to as true P2P networks, although Gnutella is greatly facilitated by directory servers that inform peers of the network addresses of other peers.網絡,如gnutella或freenet使用一個P2P結構的所有目的而言,有時被稱為真正的P2P網絡,雖然gnutella是大大促進了目錄服務器告知同行的網絡地址,其他同儕。

P2P architecture embodies one of the key technical concepts of the Internet, described in the first Internet Request for Comments , RFC 1 , "Host Software" dated 7 April 1969 . P2P的架構,體現了其中的關鍵技術的概念,在互聯網上,介紹了在第一次互聯網徵求意見 , 符合RFC 1 , “主機軟件” 4月7日的 1969年 。 More recently, the concept has achieved recognition in the general public in the context of the absence of central indexing servers in architectures used for exchanging multimedia files.最近,這一概念已取得承認在一般公眾語境中的情況下,中央索引服務器在架構用於交換多媒體文件。

The concept of P2P is increasingly evolving to an expanded usage as the relational dynamic active in distributed networks, ie not just computer to computer, but human to human. Yochai Benkler has coined the term "commons-based peer production" to denote collaborative projects such as free software.概念的P2P是越來越演變,以擴大使用作為關係動態,積極在分佈式網絡,即不只是電腦對電腦,但在人與人之間。 yochai勒已創造了術語“的商品,基於同儕生產”是指協作項目等作為免費軟件。 Associated with peer production are the concept of peer governance (referring to the manner in which peer production projects are managed) and peer property (referring to the new type of licenses which recognize individual authorship but not exclusive property rights, such as the GNU General Public License and the Creative Commons licenses).與同儕生產的概念,同儕的管治(指以何種方式同儕的生產性項目管理)和同儕的財產(指新型執照承認個別作者,但不是排他性的財產權利,如GNU通用公共許可和在Creative Commons許可) 。

目錄

[編輯] 分類

P2P網絡可分為什麼,它們可以用來為:


file sharing文件共享
telephony電話
media streaming (audio, video)流媒體(音頻,視頻)
discussion forums討論論壇
Other classification of P2P networks is according to their degree of centralization.其他分類的P2P網絡是根據其程度的集中。

In 'pure' P2P networks:在'純'的P2P網絡:

Peers act as equals, merging the roles of clients and server同儕作為平等的,合併的角色,客戶端和服務器
There is no central server managing the network是沒有中央服務器管理網絡
There is no central router有沒有一個中央路由器
Some examples of pure P2P application layer networks designed for file sharing are Gnutella and Freenet .一些例子,純的P2P 應用層網絡的設計文件共享是gnutella和freenet 。

There also exist countless hybrid P2P systems:還存在著無數的混合P2P系統:

Has a central server that keeps information on peers and responds to requests for that information.有一個中央服務器不斷的資料,同儕回應請求這方面的資料。
Peers are responsible for hosting available resources (as the central server does not have them), for letting the central server know what resources they want to share, and for making its shareable resources available to peers that request it.同儕是負責主辦可用的資源(如中央服務器沒有他們) ,為讓中央服務器知道什麼樣的資源,他們想要分享,並作出自己的共享資源提供給同行請求。
Route terminals are used addresses, which are referenced by a set of indices to obtain an absolute address.路線終端使用地址,這是參照了一套指數,從而取得絕對地址。
eg例如:

Centralized P2P network such as Napster集中式P2P網絡,比如Napster
Decentralized P2P network such as KaZaA分散的P2P網絡Kazaa等
Structured P2P network such as CAN結構的P2P網絡,例如可以
Unstructured P2P network such as Gnutella非結構化的P2P網絡,如gnutella
Hybrid P2P network (Centralized and Decentralized) such as JXTA (an open source P2P protocol specification)混合P2P網絡(集中和分散) ,如JXTA技術 ( 1開放源代碼的P2P協議規範)


[編輯] 優勢

一個重要的目標在P2P網絡是所有客戶端提供的資源,包括帶寬 ,存儲空間,和運算能力。 Thus, as nodes arrive and demand on the system increases, the total capacity of the system also increases.因此,作為節點到達和需求,對系統的增加,總系統的容量也增加了。 This is not true of a client-server architecture with a fixed set of servers, in which adding more clients could mean slower data transfer for all users.這是不正確的客戶-服務器架構與一套固定的服務器,在其中加入更多的客戶可能意味著較慢的數據傳輸為所有用戶。


The distributed nature of P2P networks also increases robustness in case of failures by replicating data over multiple peers, and -- in pure P2P systems -- by enabling peers to find the data without relying on a centralized index server.分佈式的性質, P2P網絡也增加了魯棒性,在案件的失敗是由複製數據在多個同行和-在純粹的P 2P系統-讓同儕找到的數據而不必依賴中央索引服務器。 In the latter case, there is no single point of failure in the system.在後一種情況下,是沒有單點故障在該系統。




[編輯] 法律爭議

在索尼公司訴環球片場, 464美國417 ( 1984 ) ,最高法院裁定,索尼公司的新產品,成為Betamax ,它並沒有受到索尼中學版權責任,因為它是有能力大量非侵權用途。 Decades later, this case became the jumping-off point for all peer-to-peer copyright infringement litigation.十年後,這種情況下,成為跳躍客點為所有點對點侵犯版權的訴訟。


The first peer-to-peer case was A&M Records v. Napster, 239 F.3d 1004 (9th Cir. 2001).第一點對點的情況是A & M大學的紀錄,訴Napster公司, 239 f.3d 1004 (第九稅務局局長。 2001年) 。 In the Napster case, the 9th Circuit considered whether Napster was liable as a secondary infringer.在Napster的情況下,第九電路有否考慮的Napster是被作為次要侵權者。 First, the court considered whether Napster was contributorily liable for copyright infringement.首先,法院考慮是否Napster的是contributorily承擔侵犯版權。 To be found contributorily liable, Napster must have engaged in "personal conduct that encourages or assists the infringement." [1] The court found that Napster was contributorily liable for the copyright infringement of its end-users because it "knowingly encourages and assists the infringement of plaintiffs' copyrights." [2] The court goes on to analyze whether Napster was vicariously liable for copyright infringement.必須找到contributorily承擔賠償責任, Napster公司必須有從事“個人行為,鼓勵或協助侵權” 。 [ 1 ]法院認定Napster公司是contributorily須為侵犯版權的,其最終用戶,因為它“明知鼓勵和協助侵犯原告的著作權。 “ [ 2 ]法院的推移,以分析是否Napster的是vicariously承擔侵犯版權。 The standard applied by the court is whether Napster "has the right and ability to supervise the infringing activity and also has a direct financial interest in such activities." [3] The court found that Napster did receive a financial benefit, and had the right and ability to supervise the activity, meaning that the plaintiffs demonstrated a likelihood of success on the merits of their claim of vicarious infringement. [4] The court denied all of Napster's defenses, including its claim of fair use.標準適用於由法院是否Napster的“有權利和能力,以監督與侵權活動也有直接的財務利益,在這樣的活動” 。 [ 3 ]法院認定Napster公司沒有收到財政利益,並有權利和能力,以監督活動,即原告,體現了成功的可能性就案情,他們的索賠替代侵權。 [ 4 ]法庭拒絕了所有的Napster的防禦,包括其債權的公平使用。

The next major peer-to-peer case was MGM v. Grokster, 514 US 913 (2005).下一個主要的點對點的情況是米高梅訴Grokster的, 514美國913 ( 2005年) 。 In this case, the Supreme Court found that even if Grokster was capable of substantial non-infringing uses, which the Sony Court found was enough to relieve one of secondary copyright liability, Grokster was still secondarily liable because it induced its users to infringe. [5]在這種情況下,最高法院裁定,即使Grokster的是能夠大量非侵權用途,其中索尼法院認定是不夠的,以紓緩一中學的版權責任, Grokster的仍是第二賠償責任,因為它誘導用戶侵犯。




[編輯] 攻擊p2p網路

許多P2P網絡正在不斷的攻擊,出於不同的原因:


Examples include:例子包括:

poisoning attacks (eg providing files whose contents are different from the description)中毒攻擊(例如提供檔案的內容是不同的描述)
polluting attacks (eg inserting "bad" chunks/packets into an otherwise valid file on the network)造成污染的攻擊(例如插入“壞”塊/包,否則成為一個有效的檔案在網絡上)
freeloaders (Sometimes known as 'Leechers') (users or software that make use of the network without contributing resources to it) freeloaders (有時也被稱為' leechers ' ) (用戶或軟件,利用網絡資源,沒有貢獻的話)
insertion of viruses to carried data (eg downloaded or carried files may be infected with viruses or other malware)插入病毒進行數據(如下載或進行文件可能感染病毒或其它惡意代碼)
malware in the P2P network software itself (eg distributed software may contain spyware) 惡意軟件 ,在P2P網絡軟件本身(如分佈式軟件可能含有間諜軟件)
denial of service attacks (attacks that may make the network run very slowly or break completely) 拒絕服務攻擊(攻擊可能使網絡運行速度很慢或完全打破)
filtering (network operators may attempt to prevent P2P network data from being carried)過濾(網絡營辦商可能會試圖阻止P2P網絡的數據進行)
identity attacks (eg tracking down the users of the network and harassing or legally attacking them)身份攻擊(如跟踪用戶的網絡和騷擾或攻擊,他們在法律上)
spamming (eg sending unsolicited information across the network- not necessarily as a denial of service attack) 垃圾郵件 (例如發送不請自來的資料,整個網絡的-不一定是作為一個拒絕服務攻擊)
copyright infringement侵犯版權
Most attacks can be defeated or controlled by careful design of the P2P network and through the use of encryption.大多數攻擊可以被否決或控制的仔細設計的P2P網絡,並通過使用加密。 P2P network defense is in fact closely related to the " Byzantine Generals Problem ". P2P網絡的防禦,其實是密切相關的“ 拜占廷將軍問題 ” 。 However, almost any network will fail when the majority of the peers are trying to damage it, and many protocols may be rendered impotent by far fewer numbers.不過,幾乎所有的網絡將會失敗時,大部分的同行正試圖破壞它,許多協議,可提供的無能,由少得多的數字。


資料引用:[1]