Peer-to-peer networking

Slides:



Advertisements
Similar presentations
Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
Advertisements

Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
DirectAccess Infrastructure Planning and Design Published: October 2009 Updated: November 2011.
5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
2.1 Installing the DNS Server Role Overview of the Domain Name System Role Overview of the DNS Namespace DNS Improvements for Windows Server 2008 Considerations.
Saul Greenberg Groupware Infrastructures Saul Greenberg Professor Department of Computer Science University of Calgary.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Services Working at a Small-to-Medium Business or ISP – Chapter 7.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Developing P2P Applications Using Windows Vista And The Windows Communication Foundation (“Indigo”) PeerChannel Sandeep K. Singhal COM311 Product Unit.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
Configuring Name Resolution and Additional Services Lesson 12.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Peer-to-Peer Programming with.NET 3.5 Dean Fiala Very Practical Software vpsw.com.
Chapter 7: Consistency & Replication IV - REPLICATION MANAGEMENT By Jyothsna Natarajan Instructor: Prof. Yanqing Zhang Course: Advanced Operating Systems.
Fall 2006CS 395: Computer Security1 Key Management.
Amazon Web Services. Amazon Web Services (AWS) - robust, scalable and affordable infrastructure for cloud computing. This session is about:
AMSA TO 4 Advanced Technology for Sensor Clouds 09 May 2012 Anabas Inc. Indiana University.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Network - definition A network is defined as a collection of computers and peripheral devices (such as printers) connected together. A local area network.
1 Implementation of IMS-based S-CSCF with Presence Service Jenq-Muh Hsu and Yi-Han Lin National Chung Cheng University Department of Computer Science &
Virtualization of Infrastructure as a Service (IaaS): Redundancy Mechanism of the Controller Node in OpenStack Cloud Computing Platform BY Shahed murshed.
INTERNET PROTOCOL TELEVISION (IP-TV)
Grow organise main features and benefits communicate.
Sensors Journal, IEEE, Issue Date: May 2013,
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CLOUD COMPUTING
Resource subscription using DDS in oneM2M
Introduction Wireless devices offering IP connectivity
Microsoft Windows NT 4.0 Authentication Protocols
Introduction to Distributed Platforms
Module 8: Networking Services
Computer Networks Part 1
Connected Maintenance Solution
Edited by : Noor Al-Hareqi
Ad-hoc Networks.
Connected Maintenance Solution
Software Design and Architecture
Grid Computing.
CHAPTER 3 Architectures for Distributed Systems
Algorithms for Big Data Delivery over the Internet of Things
CHAPTER 2 Application Layer.
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Chapter 16: Distributed System Structures
SECURITY IN DISTRIBUTED FILE SYSTEMS
Tailor slide to customer industry/pain points
Using Groove Philip S. Vavalides Professor - IT/Networking Guilford Technical Community College Jamestown, NC.
Chapter 7: Consistency & Replication IV - REPLICATION MANAGEMENT -Sumanth Kandagatla Instructor: Prof. Yanqing Zhang Advanced Operating Systems (CSC 8320)
Choosing the Discovery Model Martin Forsberg
Network Virtualization
Chat Refs: RFC 1459 (IRC).
Distributed Peer-to-peer Name Resolution
Working at a Small-to-Medium Business or ISP – Chapter 7
Goals Introduce the Windows Server 2003 family of operating systems
AWS Cloud Computing Masaki.
Chapter 2: Operating-System Structures
UNIT No: IV IDENTITY MANAGEMENT MODELS IN IoT
Allocating IP Addressing by Using Dynamic Host Configuration Protocol
Indirect Communication Paradigms (or Messaging Methods)
Indirect Communication Paradigms (or Messaging Methods)
WEB SERVICES From Chapter 19, Distributed Systems
Peer-to-peer networking
Windows Name Resolution
Network Diagnostics Framework
Chapter 2: Operating-System Structures
10th International Conference on Telecommunication, ICT’2003,
SCCM in hybrid world Predrag Jelesijević Microsoft 7/6/ :17 AM
Presentation transcript:

Peer-to-peer networking Tautvydas Versockas

What is peer networking? Peer-to-peer networking is a serverless networking technology that allows several network devices to share resources and communicate directly with each other. The Peer-to-Peer Infrastructure is a set of networking APIs to help you develop decentralized networking applications that use the collective power of computers on a network. For example, peer-to-peer applications can be collaborative communications, content distribution technologies, and so on. The Peer-to-Peer Infrastructure provides a solid networking infrastructure so that you can concentrate on developing applications, because the infrastructure is developed for you.

Scalable and Secure Peer Name Resolution The Peer Name Resolution Protocol (PNRP) Namespace Provider API is a name-to-IP resolution protocol. The IPv6 scope or context that includes all participating peers is called a cloud. PNRP allows peers to interact with each other within a cloud.

Efficient Multipoint Communication The Peer-to-Peer Infrastructure includes the Graphing API that provides efficient multipoint communication. Like PNRP, peer-to-peer graphing allows a set of nodes to interact, and pass data to and from each other in the form of a record. Each record that a peer generates or updates is sent to all nodes in a graph.

Distributed Data Management Distributed data management automatically stores all records sent to a peer- to-peer graph until the specified expiration time for each record. Peer-to-peer networking ensures that each node in a peer-to-peer graph has a similar view of the record database. If a peer-to-peer graph has a security model associated with it, the graph contains the following information: Who can and cannot connect to a graph Who can secure and validate records based on externally defined criteria

Secure Peer Identities The Peer-to-Peer Infrastructure provides a Peer-to-Peer Identity Manager API that allows you to create, manage, and manipulate the peer identities. Peer identities are used to define names for secure endpoints in PNRP, and can represent any resource that participates in a peer-to-peer network, including secure peer-to-peer groups and services.

Secure Peer-to-Peer Groups The Peer-to-Peer Grouping API combines the Peer-to-Peer Graphing, Identity Manager, and PNRP APIs to form a cohesive and convenient solution for peer-to-peer networking application development. The Peer-to-Peer Grouping API uses the Peer-to-Peer Identity Manager API and a self-signed certificate scheme to ensure security within the graphing infrastructure. Each group can be resolved and registered through PNRP, which allows for the name resolution of random peers within a registered peer-to-peer group.

Benefits of Peer Networking (1) Secure - robustness if there are failures or directed attacks. Scalable - scalability from simple LANs to the entire Internet. Serverless - no central point of failure Self-tuning - adapts to changes within the infrastructure. Self-repairing - automatically repairs and corrects itself. Sharing - enables sharing from edge-of-network endpoints.

Benefits of Peer Networking (2) By using the Peer-to-Peer Infrastructure, you can create the following types of applications: Real-time networking and communication Collaboration Content distribution Distributed processing coordination Internet technologies and protocols

Peer Networking Scenarios (1) Collaborative Applications - you can use the Peer-to-Peer Infrastructure to create collaborative applications for users to interactively share ideas with each other whether they are in the same conference room or across the Internet. For example, you can create a shared whiteboard-like application.

Peer Networking Scenarios (2) Instant Messaging or Chat Applications - instant messaging and chat applications that use central servers can be updated to use the Peer-to-Peer Infrastructure. For example, a chat application can use the Peer-to-Peer Infrastructure as an alternative to a centralized server. The Peer-to-Peer Infrastructure improves scalability, and allows users to participate in chat and messaging activities without a server.

Peer Networking Scenarios (3) Content Distribution Applications - you can use the Peer-to-Peer Infrastructure as a distribution mechanism for content. For example, you can distribute a newsletter to peers who subscribe to a service. Because data in the Peer-to- Peer Infrastructure is synchronized, subscribers receive the newsletter even when the publisher is not online.

What is the Peer Infrastructure? The Peer Infrastructure is a set of several APIs that are powerful and flexible. The major components include the following: Peer Graphing API Peer Grouping API Peer Identity Manager API PNRP (Peer Name Resolution Protocol) Namespace Provider API

Peer Graphing API The Peer Infrastructure provides a graphing technology that can pass information efficiently and reliably between peers in a peer graph. The Peer Graphing API ensures that each node has a consistent view of the data in a graph. You can use the Peer Graphing API to do the following: Create and manage peer graphs Enumerate and interact with other peers in a peer graph Send data in the form of a record to each node in a peer graph

Peer Grouping API The Peer Grouping API combines and enhances the Peer PNRP and Graphing APIs, and adds the following two components: A multiplexing layer that allows multiple applications running on one peer entity to connect to a group A specific security model that ensures only peers invited to a group can connect to the group through the lifetime of the group You can use the Peer Grouping API to do the following: Create and manage secure peer groups Enumerate and interact with other peers in a group Send data in the form of a record to each node in a peer group

Peer Identity Manager API By using the Peer Identity Manager API you can create secure peer names that PNRP can use to ensure that a person publishing a name officially owns the name. Peer names are also called identities, and they are used in the Peer Grouping API to identify the individuals in a group. You can use the Peer Identity Manager API to do the following: Create, enumerate, and manage peer identities.

PNRP Namespace Provider API The Peer Infrastructure provides a serverless name resolution technology called the PNRP Namespace Provider API. By using the Winsock 2 PNRP Namespace Provider API, a peer, service, computing device, and peer group endpoint can manage, register, unregister, and resolve another endpoint in a PNRP cloud.

Thank You for Your attention!