Free Essay

Peer-to-Peer

In:

Submitted By saeidvafai
Words 3969
Pages 16
On Exploiting Agent Technology in the design of Peer-to-Peer Applications
Steven Willmott, Josep M. Pujol and Ulises Cort´s e
Universitat Polit`cnica de Catalunya e a Llenguatges i Sistemes Inform`tics Campus Nord, M´dul C5-C6, C/Jordi Girona 1-3, Barcelona (08034), Spain o {steve, jmpujol, ia}@lsi.upc.es

Abstract. Peer-to-peer (P2P) architectures exhibit attractive properties for a wide range of real world systems. As a result they are increasingly being applied in the design of applications ranging from highcapacity file sharing and global scale distributed computing to business team-ware. The objective of this paper is to outline a number of areas in which Agent techniques for the management of social problems such as decision making or fair trading amongst autonomous agents could be used to help structure P2P actions. In particular we focus on approaches from mechanism design, argumentation theory and norms / rules and electronic institutions.

1

Introduction

Peer-to-peer (P2P) architectures exhibit attractive properties for a wide range of real world systems. As a result they are increasingly being applied in the design of applications ranging from high-capacity file sharing and global scale distributed computing to business team-ware. In addition their benefits however, P2P systems also fundamentally change the networking paradigm used in an application often causing tensions with other application goals such as security, predictability, performance guarantees, billing and so forth. Some of these issues in particular arise due to the nature of control, authority and ownership typical found in peer-to-peer systems: – It is no longer possible to know exactly who is participating in the system. – Participants in the system may change over time appearing and disappearing without trace. – There are generally no centrally controlled ’arbiters’ available to make authoritative decisions. – Nodes may not only fail - they may be actively trying to subvert the system. – Nodes may not only behave maliciously by themselves - subgroups of them may do so in a coordinated manner.

Each of these problems is not only technical but also social in nature [12] springing from the new found autonomy and decision making power of the peers (actors) in the system. Whilst standard distributed systems engineering provides some of the answers, much work relevant work can also be found in the Agent and Multi-Agent Systems literature. The objective of this paper is to explore how some of these more ’social’ P2P network issues could be addressed using various paradigms / approaches from the Agent research community. While there are already many good examples of the application of Agent technology to P2P systems (such as many of the papers in previous editions of the Agents and Peer-to-Peer Computing workshop itself), with the exception of studies in the area of reputation and coordination [3] and others) the majority of this work to date has focused primarily on algorithmic or infrastructural concerns. In order to broaden this debate, in this paper we look at a number of other areas of Agent technology which could also bring significant benefits but have not been extensively applied to P2P systems as yet, these are mechanism design, argumentation theory and notions of norms / laws and electronic institutions. The paper is organised as follows: – Section 2 briefly outlines some often positively and negatively perceived properties of P2P architectures. – Section 3 characterises typical P2P systems in terms of different potential types of agent systems. – Section 4 provides a number of example potential areas in which different types of Agent technology might benefit P2P application design. – Section 5 concludes the paper. The paper is discursive in nature and is intended to act as a discussion starter rather than an in-depth analysis of the issues involved.

2

The Good, the Bad and the Anti-Social

While a certain amount of the interest in using P2P architectures in application development might be attributable to hype or buzz, they clearly also present key technical advantages beyond traditional client-server approaches for some applications. Some of the most visible of these advantages include: – Virtualised / transparent access to large-scale of distributed resources - in particular computing resources. The SETI@Home search for extraterrestrial life program being one of the best known examples. 1 – Low configuration / low maintenance application deployment through Self organisation - such as the easy to install and maintain teamware applications targeted by Groove Networks. 2
1 2

http://setiathome.ssl.berkeley.edu/ http://www.groove.net/

– High availability and fault tolerance through replication, distribution or the extreme resilience of of power-law / scale-free topologies 3 such as the highcapacity content caching achieved by services such as AKAMAI and BitTorrent. 4 – Anonymity for users and providers - such as the information sharing services provided by the Freenet system which obfuscates the provider of information by sharing it between many hosts. 5 – Explosive deployment and growth through peer download and installation such as the extremely rapid user growth exhibited by new services such as Skype (a new-entrant global P2P voice-over-IP telephony service). 6 Each of these advantages could provide a d ecisive business advantage in certain types of applications - allowing an enterprise to exploit a market and/or establish itself in a way that would be impossible with conventional client server approaches. Inevitably however, adopting a P2P paradigm may also subject the subsequent application to a number of less desirable properties. Specific, well documented issues include: – Management challenges - the deployed application can no-longer be directly managed as a global whole (raising issues on how to guarantee Quality of Service, perform maintenance / updates or even monitor its size). – Network fragmentation - the network may become accidentally or deliberately subdivided parts which are not interconnected causing fragmentation of a service. Although service may degrade gracefully (showing robustness) by functioning in the remaining sub-parts, a service provider may loose control or contact with some parts of the network. – Identity issues - the identity of users or systems connecting to the system may not be known (potentially raising issues of accountability for actions, fraud, trust and - in non-free services - of billing). – Security / Subversion - malicious users or systems may be able to connect to system and subvert it by exploiting the lack of centralised authorities to monitor or control actions by its users. – User/Provider conflict - the objectives of individual users / nodes may conflict with the global objectives of the network (e.g. users of file-sharing systems such as Gnutella benefit when finding files they would like, however there is no obvious motivation other than altruism / reputation for serving files).
3

4 5 6

Power law topologies are highly resistant to random errors (failures) for example, although they can be more sensitive against directed errors (attacks). The high clustering coefficient of power-law networks also favours the redundancy of connections while improving communication: network diameter and average path length grow as the log function of the size (number of nodes). http://bittorrent.com/ http://freenet.sourceforge.net http://www.skype.com/

While the first two issues might be considered standard networking or distributed systems issues the later issues are increasingly social in nature - since they depend on the nature, objectives and eventual actions of individuals using the application. Such problems arise in many classes of systems which are distributed (in ownership and/or space) and open - both of which hold in many P2P systems. These issues therefore raise important questions about the design of P2P application that are generally not be present in their client-server approach. In some cases the issues may also make the choice of a P2P approach inappropriate. The remainder of this paper is dedicated to looking at how we might use Agent technologies to help exploit some of the benefits of P2P systems whilst mitigating or managing the downsides.

3

Peer-to-Peer Systems as Agent Systems

Before addressing which areas of Agent technology might be applicable to P2P systems it seems worth spending some time examining the properties of P2P systems in terms of typical Agent characterisations. Informally, nodes in a P2P network can be characterised as fulfilling many current definitions of Agenthood (see [14] for an overview) to a greater or lesser degree. Arguably more important than the properties of each peer as an agent however, are considerations of what type of Multi Agent System the application corresponds to. In the general case one would expect that: – Peers are entirely autonomous: each individual peer could act in any way conceivably any code provided could have been entirely re-engineered by its owner/user. – However, peers are bound to a specific limited set of actions, protocols or messages specified in the protocols defined for the application - that is they are limited to an agreed set of social conventions which may be broad or narrow. – Rational behaviour cannot be guaranteed: an owner/user may have any number of external motivations for particular actions - some of which may not correspond to rational actions in the system itself. On the other hand rational action can be made more likely if: • Significant participation costs are involved (or in particular if irrational actions have direct costs). • Commitments made during participation can be enforced. – Cooperative behaviour cannot be assumed: the motivations for actions of an individual user/peers are unlikely to be primarily for the social good but primarily for that user/peers’ own good. Obvious examples include the

phenomenon that systems such as Gnutella are dominated by so called free riders [1] - the assumption of benevolence cannot be made. – Out-of-band coalition formation and/or collusion is possible and likely: in other words users/systems are likely to use additional communication channels invisible to application to coordinate their actions in groups when and where this is of benefit. – False name / identity participation is possible: in other words users may create multiple identities (new P2P nodes) to participate in the system if this could lead to financial/other benefits - such as influencing market prices or manipulating trust/other social properties. These properties unfortunately correspond to problems recognised as some of the most complex and difficult to deal with in the Multi-Agent research literature. An analysis of the Multi-Agent Systems literature would show that only a relatively small percentage of known results are directly valid for these conditions. Hence for applications which fit the above profile, engineering coherent behaviour amongst users of the P2P application is likely to be very challenging. On the more positive side in some cases it might be possible to make some additional assumptions on average over the whole population: – Average rationality: that on average nodes/users act rationality, although an individual may not (this could be justified for example in large market scenarios with many users). – Verifiable identity: that false name / fake identity problems can either be excluded or at least made very rare (this could be justified in applications which directly tie application participation to some other verified identity mechanism such as digital certificates and/or corporate employee registrations). In other applications it may be possible to reduce the impact of other characteristics. However in each application case it is important to capture the assumptions which do and do not hold since they may fundamentally affect the correct functioning of the system.

4

Where can Agent Technologies Help?

In order to illustrate how Agent technologies might help in P2P application design this section presents application examples coupled with a description of how particular techniques from the Agent literature might be used. The descriptions are intended to be examples only; however we hope that they will be useful as food for thought for other potential domains / technology application. The examples are:

1. Mechanism Design applied to P2P trading systems. 2. Argumentation / Negotiation schemas applied to P2P-Social Choice problems. 3. Electronic Institutions, Norms, Rules, Policy Languages applied to context management in P2P ubiquitous computing problems. Other diverse examples could include reputation and trust applied to social networking systems or Agent Communication Language semantics applied to interoperability amongst peers.

4.1

Peer-to-Peer Trading Systems and Mechanisms Design

P2P applications show great potential for trading or bargaining systems in which users are able to purchase / exchange goods, services, information or other items. Currently most well known Internet market applications such as EBAY for consumers and a myriad of Business-to-Business trading systems are strongly centralised in nature; however there are strong reasons why P2P approaches might be attractive: dis-intermediation of middle-players (potentially cutting out fees), privacy (since no one entity knows about all transactions), robustness and speed (reducing dependency on a single site) and others. Unfortunately however, unlike in file-sharing systems where goods/services are provided at near zero loss to the provider, trading systems require real economic exchange. The subsequent potential for financial loss raises the obvious question: how do we ensure that the rules in the application cannot be violated or abused by one or more parties to defraud other parties? Standard responses to this such as requiring users to register their identities or the appointment of arbiters to regulate disputes quickly become unmanageable, can themselves be defrauded (e.g. by identity theft) or begin to recreate centralised elements that the application aimed to removed. Although still in its infancy for strongly distributed systems the research area of mechanism design [8] which brings together theories from economics and multi-agent systems is extremely relevant here. Work by researchers such as Toumas Sandholm and David Parkes traces the boundaries of: – Which properties market systems conforming to a particular combination of rules and protocols exhibit. – Which strategies dominate under which conditions (and whether they are desirable strategies such as telling the truth about valuations for goods or not). – The impact of potential market elements such as side payments (additional financial exchange occurring between agents in a market which is not openly carried out using the market itself).

4.2

Argumentation based Negotiation applied to Social Choice Problems

A specific example of mechanism design which does not necessarily involve financial exchange is in the solution of social-choice problems. In these applications, peers are required to provide opinions on a question such as the passing of a law, the truth of a statement, the election of a particular agent to a social role or something similar. This social choice generally needs to be made in such as a way as to respect various definitions of fairness, speed (termination) and proof against manipulation. Mechanism design provides tools which analyse the properties of different types of voting systems (see [4, 5] for example). However, in cases where the full mechanism cannot be analysed, the decisions cannot be made by simply weight of opinion or the choices are not simple to enumerate (e.g. in deciding an arbitrary set of facts that is true) other techniques may also help. The challenge in such applications becomes: how can I structure interactions between peers in order to reach a fair compromise? An emerging area which could be applied here is that of Argumentation theory [15, 10, 17] which provide methods and formalisms to structure dialogues and conversation rules amongst agents in order to ensure properties such as: – Valid deduction of facts, commitments or other statements from assertions made by agents. – Termination of the interaction. – Allowing all agents to have their say - but preventing a vocal few drowning out discussion. Papers range of different ways of formalising conversation rules [18] to applications in choice problems such as systems for guiding democratic debate.

4.3

Ubiquitous Computing: Institutions, Organizations, Policies, Rules and Norms

A further often cited application of P2P networked is the growing trend of viewing everyday objects (household appliances, mobile devices, clothes, vehicles or almost anything) as augmented communicating devices - each with its own identity and networked functionality. Generically known as Ubiquitous Computing, this vision relies on objects being fitted with small computational devices, network capability and behaviour patterns which provide their owners with additional benefits such as information, control, remote activation and so forth [11]. The potential explosion in such devices and the complexity of their interactions means that client-server architectures are generally expected to be overwhelmed and unable to provide reasonable management of such systems. In

particular challenges arise such as: given so many devices - how can we ensure they do not clash with one another? How can we manage behavioural changes between (for example) home, office and street? How can ensure particular behaviour is enabled/disabled in situations when it may be dangerous? A concrete example might be visiting a neighbour’s house bringing a wireless enabled device - and having it automatically interact with the house systems / objects 7 - changing its status to avoid clashes and being treated with care by the local network as a potential security threat (e.g. unbeknown to the owner it may have been infected with a computer virus). The resulting interactions are highly non-trivial and in particular dependent on the context of the interaction (home, office, street), the current world state (time, weather, malicious 3rd party network activity), the device owners’ relationship and many other factors. Whilst some relationships, rules and heuristics could be hard coded (such as a process for deciding whether a new device is permitted to access the network), as the number of rules and interactions grows the management problem looks set to explode. Several areas of Multi-Agent Systems research can provide useful tools in this respect: – Techniques for modelling Norms, Rules, Laws an Electronic Institutions [9, 16]. – Coordination techniques based on declarative rules such as Shoham’s Social Laws [20]. – Work on policy languages and models ([7] for example). Each of these techniques describes collections of rules (from abstract to concrete), properties and other constraints on populations of agents: creating a tangible social context which systems are governed by. Most importantly the approaches are primarily declarative - allowing easy management of the rules and the derivation of guaranteed properties for certain combinations of rules. In a Ubiquitous Computing P2P system the approaches could be used to assign contextual roles to peers, tracking their obligations and rights over time as they change context (through motion or changes in the owner’s attitude for example). Hence all devices are peers at one level (objects all have an identity and the ability to act) but are dynamically structured into organisational structures according to need. This last scenario can also be seen as a superset of the previous two in that market mechanism rules and/or argumentation schemas are often seen as defining an institutional context (or applied in the context of a particular institution).
7

See [6] for an office example.

5

Conclusions

The abstract for the panel discussion held at the P2P-Agents workshop in New York stated a number of challenges which the P2P systems (in particular for business) faced including security, trust and reputation, representing business protocols, checking compliance, bootstrapping systems, and performance. On closer analysis, P2P systems can arguably be recognised as having similar characteristics as some of the hostile environments described in the Multi-Agent Systems literature: peers are entirely autonomous, individual autonomy cannot be assumed, out-of band collusion between peers is possible and so forth. However even under these conditions work in areas such as Mechanism Design and Norms/Institutions or structured Negotiation can potentially provide tools for engineering predictable applications by analysing: – – – – The motivations of actors. The implicit and explicit social rules and properties of the systems. Which types of behaviour can monitored/guaranteed and which not. The relationship between in-band actions/interactions (those which form part of the application) and those which might take place out-of-band (externalities or group collusion for example).

Work on reputation in Agent based P2P systems already follows these lines ([3, 13] and others) but we hope that the contents of the paper helps illustrate that there may also be other elements of Multi-Agent system’s theory which can address these more social P2P application issues.

Acknowledgements
This work was partly supported by the European Projects ASPIC 8 , Provenance (IST FP6-511085) and @lis technology net 9 . The work also owes much to discussions with colleagues in the Agentcities and openNet Initiatives. Notwithstanding this the opinions expressed in the paper are those of the authors and do not necessarily reflect those of other project participants. Particular thanks go to the other panellists in the session (Sonia Bergamaschi, Sandip Sen, Hector Garcia Molina) and the panel chair Munindar Singh.

8 9

http://www.argumentation.org/ http://www.alis-technet.org

References
1. Adar, E. and Huberman, B. A.: Free Riding on Gnutella Technical Report Xerox Laboratories, 2000, Internet Ecologies Area. http://www.hpl.hp.com/research/idl/papers/gnutella/gnutella.pdf 2. Atkinson, K., Bench-Capon, T. and McBurney, P.: PARMENIDES: Facilitating democratic debate. Third e-Government Conference (EGOV04), DEXA 2004, Zaragoza, Spain, September 2004. Published in: R. Traunmuller (Editor): Lecture Notes in Computer Science. Berlin, Germany: Springer. 3. Biswas, A., Sen, S. and Debnath, S.: Limiting Deception in a Group of Social Agents Applied Artificial Intelligence, 14:785–797, 2000. 4. Conitzer, V. and Sandholm, T.: Complexity of Manipulating Elections with Few Candidates. Applied Artificial Intelligence, 14:785–797, 2000. In Proceedings of the National Conference on Artificial Intelligence (AAAI), 2003. 5. Conitzer, V., Lang, J, and Sandholm, T.: How Many Candidates Are Needed to Make Elections Hard to Manipulate? Applied Artificial Intelligence, 14:785–797, 2000. In Proceedings of the Conference on Theoretical Aspects of Rationality and Knowledge (TARK), Bloomington, Indiana, 2003. 6. Chen, H., Finin, T., Joshi, A., Perich, F., Chakraborty, D. and Kagal, L.: Intelligent Agents Meet the Semantic Web in Smart Spaces IEEE Internet Computing, to appear, 2004. 7. Damianou, N., Dulay, N., Lupu, E. and Sloman, M.: The Ponder Policy Specification Language Lecture Notes in Computer Science, 1995. 8. Dash, R., Jennings, N., and Parkes, D.: Mechanism Design: A Call to Arms Computational, IEEE Intelligent Systems, November 2003, pages 40-47 (Special Issue on Agents and Markets). 9. Dignum, F.: Autonomous Agents with Norms Artificial Intelligence and Law 7:6979, 1999. 10. Dung, P.: On the acceptability of Arguments and its fundamental role in the Nonmonotonic Reasoning, Logic Programming and N-Person Games Artificial Intelligence 77, 2, pp 321-358, 1995. 11. Fitzmaurice, G.W., Ishii, H. and Buxton, W.: Bricks: Laying the Foundations for Graspable User Interfaces CHI, pp 442-449, 1995. 12. Jennings, N. R.: Controlling Cooperative Problem Solving in Industrial MultiAgent Systems using Joint Intentions Artificial Intelligence 75, pp 195-240, 1995. 13. Jurca, R. and Faltings, B.: Towards Incentive-Compatible Reputation Management. Trust, Reputation and Security: Theories and Practice, Lecture Notes in AI 2631, 2003, pp. 138-147. 14. Luck, M., McBurney, P. and Preist, C.: Agent Technology: Enabling Next Generation Computing January 2003, ISBN 0854 327886. http://www.agentlink.org/roadmap/index.html 15. Kraus, S., Nirkhe M. and Sycara, K.P.: Reaching agreements through argumentation: a logical model (Preliminary report) Proceedings of the 12th International Workshop on Distributed Artificial Intelligence, Hidden Valley, Pennsylvania, pp 233–247, 1993. 16. Panchoco, O and Carmo, O.: A role based model for normative specification of organised collective agency and agent interaction JAAMAS 6(2):145-183, 2003. 17. Parsons, S., Sierra, C. and Jennings, N.: Agents that Reason and Negotiate by Arguing Journal of Logic and Computation, 8, 3, pp 261–292, 1998.

18. Parsons, S., McBurney, P. and Wooldridge, M.: The mechanics of some formal interagent dialogues F. Dignum (Editor): Advances in Agent Communication. Lecture Notes in Artificial Intelligence 2922. pp 329–348. Berlin, Springer. g 19. Sandholm, T.: Automated mechanism design: A New Application Area for Search Algorithms In Proceedings of the International Conference on Principles and Practice of Constraint Programming (CP), 2003. 20. Shoham, Y. and Tenneholz, M.: On the synthesis of useful Social Laws for Agent Societies. In proceedings AAAI-92, pp 276-281, 1992

Similar Documents

Free Essay

Peer to Peer Server

...Peer-to-Peer VS. Client Server Trevor Crews Strayer University Networks are used to offer advantages that cannot be obtained through the sole use of a standalone computer. There are two common types of network, Peer-to-Peer and Client/Server. Peer-to-Peer is the simpler of the two while client server remains the more complex. Both types offer advantages and disadvantages over the others. “In a peer-to-peer network, every computer can communicate directly with every other computer.” (Dean, 2010) This set-up allows for all computers to have access to each other and the same level of authority. Because of this fact no one computer can do more or less than any other computer on the network. They do, however; each have the ability to limit and share only a portion of their resources and the ability to prevent access to certain data. As they are set up directly to each other every computer has the ability to send and receive information to and from every other computer on the network. Using Peer-to-Peer networks though however does have its advantages and disadvantages. First let’s look at the advantages. The main advantage to a Peer-to-Peer network is how simple it is to configure. This allows them to be deployed in areas where high-end technical expertise may be limited. Due to this fact they can be seen in areas from local home networks to small businesses and at times even larger companies may implement them. Another advantage is that they are less expensive to both set...

Words: 616 - Pages: 3

Premium Essay

Peer to Peer Shopping

...Ted Bundy Theodore Robert “Ted” was born on November 24, 1946. His mother lived with her parents, which created a confusing perception in Ted as a kid. He believed his grandparents were his parents and his mother was his older sister. As Ted grew his mom move out and married Johnny Culpepper Bundy. Ted took his stepfather’s last name and so his new name came out to be “Ted Bundy”. Ted Bundy was known for his smartness, charisma, and good persona personality. Many believed he would make it far based how much he was improving in his academic fields, but many did not know what the obscure side of Ted was capable of. Ted Bundy while growing up would live with confused believes about his own family structure, after his mother married Johnny Bundy; Ted Bundy isolated from his family and did not spend much time with them. In school people knew him as a shy kid. When Ted made it college he met a wealthy girl named “Stephanie Brook”, the reason of why Ted picked victims with similar characteristics to her. Stephanie graduated and terminated her relationship with Ted Bundy abruptly leaving a man with a heart broken and also with a thirst for revenge. Ted Bundy began his revenge by improving in academic fields and making a name for himself. He expanded his knowledge by learning Chinese, enrolling in politics, and studied law. Ted Bundy began a new relationship with Stephanie Brooks and broke up with her after having proposed, it was a revenge done by Ted Bundy for what Stephanie...

Words: 653 - Pages: 3

Premium Essay

Peer to Peer Online Shopping

...Ray F, Maryana K, Kangi J, Brittany M 10/2/14 Management Information Systems Jia Shen Peer to Peer Online Shopping Peer to Peer online shopping is a high tech version of old fashioned bartering systems. Peer to Peer online shopping connects people all over the world by facilitating online sharing. Typically, an online peer-to-peer marketplace brings people and/or businesses together online to deal with each other directly without having to go through a slow, expensive middle man. Peer to Peer online shopping can be convenient, it can save time by having everything in one place, and save money by cutting out the middle man which will reduce the overall cost for the consumer and increases the profits for the provider/business. Peer to Peer online shopping can also be fun, and highly specialized. During the recession people had less money which caused them to spend less which eventually led to Collaborative consumption. Collaborative consumption which is consumers selling or renting to each other is encouraged by all of the Peer to Peer online sights. For example E Bay is a online auction and shopping website that provides peer to peer and business to consumer sales service via internet. According to our text book "one of the most surprising benefits of collaborative consumption however, turns out to be social. This is true because it allows for sharing between strangers and allows us to make meaningful connections. "Collaborative consumption is an economic model based on...

Words: 2155 - Pages: 9

Free Essay

Peer to Peer and Client/Server Networks

...Peer-to-Peer and Client/Server Networks Darsheen Smith Strayer University Peer-to-Peer and Client/Server Networks A network is a group of computers and other devices, such as a printer, that are connected by some type of transmission media (i.e. fiber optic cables or radio waves) (Dean, 2010, p.2). Originally “sneakernet” was the only means of electronic source sharing. It involved the transfer of electronic information by physically couriering removable media, such as floppy disks, from one computer to the next (Wikipedia, 2011, para 1). With the advancement of computer technology so is the modernization of computer networking. Analysis There are two types of networks, peer-to-peer and client/server networks. Both have the capability to communicate with other computers on the network. They also have the capability to protect files from unauthorized users. There are also distinct differences between the two types of networks. In a peer-to-peer network every computer can communicate directly with every other computer. No computer has more authority than another. A Typical peer-to-peer network consists of two or more personal computers (Dean, 2010, p.3). In contrast, a client/server network consists of a central computer, called a server, which is designed to permit communication and information sharing between computers, known as clients, on the network. The clients do not share their resources directly with each other...

Words: 642 - Pages: 3

Free Essay

Peer-to-Peer Lending in the United States

...同行对同行贷款在美国 (Peer-to-Peer Lending in the United States) | 摘要 (Abstract) 互联网已经彻底改变了我们思考,生活的方式,并互相交流;这种进步还可以扩展到我们如何做生意。消费者和生产者的传统模式已永远地改变或取代有更好的东西,而在本文中,我们探讨这样一个例子:点对点点对点贷款。The Internet has revolutionized the way we think, live, and interact with each other; this progress can also be extended to how we do business. Traditional models of consumer and producer have been forever changed or supplanted with something better, and in this paper, we examine one such example: peer-to-peer lending. 2014年7月25日 | 同行对同行贷款在美国 (Peer-to-Peer Lending in the United States) | 摘要 (Abstract) 互联网已经彻底改变了我们思考,生活的方式,并互相交流;这种进步还可以扩展到我们如何做生意。消费者和生产者的传统模式已永远地改变或取代有更好的东西,而在本文中,我们探讨这样一个例子:点对点点对点贷款。The Internet has revolutionized the way we think, live, and interact with each other; this progress can also be extended to how we do business. Traditional models of consumer and producer have been forever changed or supplanted with something better, and in this paper, we examine one such example: peer-to-peer lending. 2014年7月25日 | TABLE OF CONTENTS 概观 (Overview) 隐私和匿名 (Privacy and Anonymity) P2P贷款 (P2P Lending) 公司简介 (Company Profile) 减轻风险 (Mitigating Risk) 行业成功 (Industry Success) 国际比较 (International Comparison) 参考文献 (References) 概观 (Overview) “同行对等(P2P)计算或网络是一种分布式应用程序体系结构划分同行之间的任务或工作负载。同龄人同样的特权,在应用程序等效的参与者。它们被认为形成一个对等网络中的节点。” (“Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally...

Words: 2234 - Pages: 9

Premium Essay

Security Aspects of Peer-to-Peer Computing

...Security Aspects of Peer-to-Peer Computing Shayla J. Brock INSY 4900.51 May 9, 2014 It is important to enable peers to represent and update their trust in other peers in open networks for sharing files, and especially services. A trust model and a method for building reputation based on recommendations in peer-to-peer networks. Since trust is multifaceted, peers need to develop differentiated trust in aspects of other peers’ capability. The peer’s needs are different in different situations. Depending on the situation, a peer may need to consider it’s trust in a specific aspect of another peer’s capability or in multiple aspects. There are networks that provide a flexible method to present differentiated trust and combine different aspects of trust. The evaluation of the model using a simulation shows that the system where peers communicate their experiences outperforms the system where peers do not share recommendations with each other and that a differentiated trust adds to the performance in terms of percentage of successful interactions. Currently, a new and highly interesting paradigm for communication on the Internet, known as Peer-to-Peer (P2P), is emerging...

Words: 2656 - Pages: 11

Premium Essay

Business Technology (Peer to Peer Payment Systems)

...Peer-to-Peer Payment Applications History Payment systems have existed throughout time. From the ancient days where merchants exchanged goods for other goods in a barter system, to the days when the concept of currency was developed, to the modern day checkbook and wire transfer of funds, there has always been a way for one person to give money to another. However, all of these methods are cumbersome, and require either a physical activity (writing a check or completing a wire transfer), or exchanging physical currency. This complicates the process, requiring two people to meet in person, one to have physical currency (or to have and write a check), and then the eventual deposit of the recipient’s funds into a bank account. However, with the rise of the internet and the proliferation of smartphones, a major innovation has been made in the way that people exchange money. To clarify, this is not talking about a person paying an established business, but rather paying someone for babysitting, mowing a lawn, splitting the cost of gas, or paying back a friend for a meal. This innovation is Image from WashingtonPost.com Image from WashingtonPost.com known as peer-to-peer payment systems. The need for a quick, easy way to pay someone, split a bill, share utilities payments, or contribute to a fundraiser became apparent in a society that carries less and less cash. Most millenialls do not even carry cash on their person anymore, and thus, if they needed to pay a friend...

Words: 1165 - Pages: 5

Free Essay

Peer-to-Peer vs Client Server Network

...What's the difference between client/server and peer-to-peer networks? There’s quite a bit, although most of the differences are in two areas – security and cost. Beyond that, your consideration for what you need is largely dependent on budget and the size of your organization. So, what’s the difference? A peer-to-peer network has no central server. Every workstation on the network shares files equally with everyone else on the network. This also means there is no authentication of users and no central storage. This model is considered a decentralized form of networking. Conversely, the client/server network provides a central pool of data and resources, with user profiles established with localized restriction on which data can be accessed. This model is commonly referred to as a centralized form of networking. Both are good! There’s an old saying, ‘wisdom is what works’. Well, the same is true for your network. Peer-to-peer networks are great for use in homes or in small businesses where employees interact regularly and share all information and files. They don’t cost much to setup, nor are they difficult to manage. The downside is there’s almost no security (pretty much controlled at an individual ‘share’ level). Once you get more than 8-10 workstations connected, there would likely be an impact to performance and management since each station functions as both client and server at the same time. As each employee manages the sharing of their workstation...

Words: 452 - Pages: 2

Premium Essay

Peer Pressure

...please make sure he can receive the counseling that he really needs to keep him on the right track mentally. If you could see him when he comes to church all the young men loves hanging around him, because they love hearing him playing the drums and rapping his music. Since he has been in jail this time he is already trying to improve himself. He asked his dad to send him self help books by Robert Greene, 48 Laws of Power, and The Art of Seduction. If Michael could be given probation, mandatory counseling for depression, community service and steady work to keep his mind occupied he will again be a model citizen. He has so much talent and ability, where he can teach and encourage other young men to take the right road, and not adhere to peer...

Words: 300 - Pages: 2

Premium Essay

Peer Influence

...PEER INFLUENCE IN RELATION TO ACADEMIC PERFORMANCE AND SOCIALIZATION AMONG ADOLESCENTS: A LITERATURE REVIEW by Nicole Marie Howard A Research Paper Submitted in Partial Fulfillment of the Requirements for the Master of Science Degree With a Major in School Psychology Approved Two Semester Credits _____________________________ Investigation Advisor The Graduate School University of Wisconsin-Stout May, 2004 ii The Graduate School University of Wisconsin-Stout Menomonie, WI 54751 ABSTRACT _________Howard__________Nicole_______M._________________________ (Writer) (Last Name) (First) (Initial) Peer Influence In Relation To Academic Performance and Socialization Among__ (Title) Adolescents: A Literature Review______________________________________ School Psychology (Graduate Major) Dr. Helen Swanson (Research Advisor) May/2004_____ 30__________ (Month/Year) (No. of Pages) Publication Manual of the American Psychological Association, Fifth Edition___ (Name of Style Manual Used in This Study) Adolescents have always been exposed to peer influence, but the kinds of peer influence that they encounter have changed tremendously in the past years. Peers can influence everything from what an adolescent chooses to wear to whether or not an adolescent engages in drug related or other delinquent behavior. This is an important topic because if society and education related professionals understand the issues surrounding negative peer influence, they are more likely...

Words: 6955 - Pages: 28

Premium Essay

Peer Pressure

...Peer Pressure Peer pressure is one of the most difficult issues facing youth today. Peer pressure is the pressure to conform, to act against your will or judgment for social reasons. It forces you to do things you are not comfortable with. Think about it. Your teenager spends much more time with peers than with family members. The communication is direct, and much more powerful than the influence of teachers and other authority figures. Peer pressure can lead to testing drugs and alcohol, skipping school, and various high-risk behaviors. If you notice a sudden change in your child's appearance, clothing, and attitude, especially if accompanied by secretive behavior, he or she may be give in to the influences of peers. Youths: Have you ever felt like you had to act the way your friends did. You may think to yourself even then “this isn’t me”. Or you were given a cigarette or some alcohol and felt you had to try it so that everyone could see that you are cool, or at least, not “un” cool. Peer pressure comes at you in many forms, from many directions and can affect you on daily basis. Think: “What pressure did I face today?” But peer pressure is not always negative. There are negative and positive effects of peer pressure. Peer pressure can be positive if the peers help change the person for the better. However youths are not the only ones who feel peer pressure. Adults feel it too, even though they don’t admit it. In fact, most advertising on radio and television takes advantage...

Words: 736 - Pages: 3

Free Essay

Peers and Gangs

...Peers and delinquency: Juvenile Gangs, Groups and Fraternities 12/03/2010 Juvenile Delinquency Dr. Ibe By Shantrevia Jordan Nowadays we often hear about peer groups and how peers influence people. Everyone in the world belongs to a peer group. They are not only for kids. Peer groups are social groups consisting of people who are equal in such respects as age, education or social class. Members of a particular peer group often have similar interests and backgrounds bonded by the premise of sameness. Studies have shown that kids and young adults join peer groups to find a place in a valued group that gives them a sense of belonging; to identify and master tasks that are generally recognized as having value and therefore can earn respect by acquiring skill to cope with them; to acquire a sense of worth as a person; and to develop reliable and predictable relationships with other people, especially a few close friends and loved ones. Peer groups can have a negative or positive influence when it comes to their purposes. Gangs have been known to be negative peer groups that usually perform delinquent activities. On the other hand, fraternities are known to be positive educational groups that help nurture the community. A gang is a perfect example of a delinquent peer group. A gang is a group of people, through the organization, formation, and establishment of an assemblage, that share a common identity. In current usage it typically denotes...

Words: 1744 - Pages: 7

Premium Essay

Peer Pressure

...Peer pressure is something that everyone has to face at one point or another. For a lot of people, it takes the form of a re-occurring crucible. For others, it’s just a catalyst that sets them back a little. Peer pressure can be overcome, but there’s never a point where it completely stops. From the time you’re born, you are influenced by the people and things around you. Even in kindergarten, you soon learn that in order to ‘fit in’, you have to conform yourself to the atmosphere. This means that when a friend of yours wants your peanut-butter and jelly sandwich instead of their corn-dog that you will give it to them for fear of being rejected. By the end of the school year though, you realize that you don’t have to give into this pressure, so you make a trade for their pizza instead. By middle school, however, you’ve wised up and know everything there is to know about peer pressure do to millions of conversations in Health class about it. And now that you’ve reached this new level of maturity, you no longer give up your favorite foods to fit in. You’ve learned that loaning your favorite clothes and CDs works a WHOLE lot better. High school is slightly different. You’re less likely to give in to material things. Now it’s about emotions and relationships. The famous phrase, “But, I love you” soon comes to mean nothing. Oh but don’t worry, by the time you reach college you’re practically grown, right? Not hardly. Now with the pressures of having a job and going to school...

Words: 453 - Pages: 2

Premium Essay

Peer Pressure

...The influence of peer pressure in adolescence In our young days we all might have tried it. Maybe we didn’t notice it, but it still had an influence on us. Peer pressure happens every day, and some cases are worse than others. A lot of teenagers might feel very unsecure, and need something to hold on to. Because of that, teenagers join a group of friends, in some cases; “friends”, and to keep their status in the group, they might do things to be respected and accepted in the group. These things can be negative and positive. The negative influence could be if a group of friends start to smoke. Let’s pretend there are five boys in this group, four of them start to smoke, and one of the boys doesn’t do things like that, or rather; he doesn’t smoke. The four smoking boys feel some kind of unity by smoking together, and that exclude the non-smoking boy from the group, and the boy will maybe not be accepted in the group anymore. To avoid getting excluded by the group, he starts to smoke, despite his own will. This example is described as a negative influence. Even worse cases could be if a group of boys want to commit a robbery or break into a store for example. One of the boys in the group doesn’t really want to do these things, maybe because he knows better than the rest of the group. But he follows the group, so in the end he really doesn’t’ know better, because giving in to peer pressure, is not so clever and especially not, when it has such a negative influence...

Words: 372 - Pages: 2

Premium Essay

Peer Pressure

...Introduction The Good and Bad Effects of Peer Pressure to Teenagers Peer pressure is commonly applied to younger people especially to us teenagers. Responding to peer pressure is a part of growing up that some teenagers more likely to give in. Peer pressure is the only thing that all teens have in common and some of them can't escape it because it’s almost everywhere. Peer pressure is the way that people influence another individual to take an action or adopt certain values to be one of their social groups. Teenagers are very quick in making their own decisions and judgements. When communication is lacking at home, teens may seek it among their peers instead to their parents for them they know that their peers are always right because they're feeling what you also feel. You think all of you have a lot in common. This outcome indicates that teens may find it more difficult to control their behaviors when their friends are around. They are visible and expressive when it comes to their peers but when it comes to their own parents they are invisible. They always keep in their minds that their parents will never understand them as their peers do. In the bright side, it can also have a positive effect. Peer influence is not necessarily bad at all times. Fellowship with other youths can also sharpen our personality and make us a better person. They can also be a good instrument for us teenagers if those peers have mature and healthy attitudes. They often...

Words: 3176 - Pages: 13