Peer-to-peer networking

Slides:



Advertisements
Similar presentations
DirectAccess Infrastructure Planning and Design Published: October 2009 Updated: November 2011.
Advertisements

5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
2.1 Installing the DNS Server Role Overview of the Domain Name System Role Overview of the DNS Namespace DNS Improvements for Windows Server 2008 Considerations.
Overview Distributed vs. decentralized Why distributed databases
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Chapter 3 : Distributed Data Processing
Data Security in Local Networks using Distributed Firewalls
Multicast DNS Draft-aboba-dnsext-mdns-00.txt. Outline Goals and objectives Scope of the multicast DNS DNS server discovery Non-zeroconf behavior Zeroconf.
Understanding Active Directory
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Session 6 Windows Platform Dina Alkhoudari. Learning Objectives What is Active Directory Logical components of active directory Physical components of.
11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP.
P2P Systems Meet Mobile Computing A Community-Oriented Software Infrastructure for Mobile Social Applications Cristian Borcea *, Adriana Iamnitchi + *
 Cloud computing  Workflow  Workflow lifecycle  Workflow design  Workflow tools : xcp, eucalyptus, open nebula.
Module 3: Designing IP Addressing. Module Overview Designing an IPv4 Addressing Scheme Designing DHCP Implementation Designing DHCP Configuration Options.
Translate tech terms into plain English. ?
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Peer-to-Peer Programming with.NET 3.5 Dean Fiala Very Practical Software vpsw.com.
Client/Server Model: A Business View The different Client/server implementations differ according to: 1.Where the processing for the presentation of information.
6.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 6: Designing.
Introduction to Active Directory
SQL Server 2012 Session: 1 Session: 4 SQL Azure Data Management Using Microsoft SQL Server.
AMSA TO 4 Advanced Technology for Sensor Clouds 09 May 2012 Anabas Inc. Indiana University.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
System Administration(SAD622S) Name of Presenter: Shadreck Chitauro Lecturer 18 July 2016 Faculty of Computing and Informatics.
Sensors Journal, IEEE, Issue Date: May 2013,
Resource subscription using DDS in oneM2M
Chapter 5 Network and Transport Layers
Issues need harmonization
Introduction Wireless devices offering IP connectivity
Module 8: Networking Services
Computer Networks Part 1
Ad-hoc Networks.
Overview of Data Communications and Networking
Instructor Materials Chapter 9: NAT for IPv4
Peer-to-peer networking
Instructor Materials Chapter 10: OSPF Tuning and Troubleshooting
Routing and Switching Essentials v6.0
CHAPTER 3 Architectures for Distributed Systems
Firewalls.
Single-Area OSPF (Open Shortest Path First Protocol)
OpenStack Ani Bicaku 18/04/ © (SG)² Konsortium.
Chapter 9 Objectives Understand TCP/IP Protocol.
Net 431 D: ADVANCED COMPUTER NETWORKS
Grid Computing B.Ramamurthy 9/22/2018 B.Ramamurthy.
Tailor slide to customer industry/pain points
Choosing the Discovery Model Martin Forsberg
Network Virtualization
An Introduction to Computer Networking
Chat Refs: RFC 1459 (IRC).
Distributed Peer-to-peer Name Resolution
Goals Introduce the Windows Server 2003 family of operating systems
Instructor Materials Chapter 9: NAT for IPv4
Getting Started.
Overview of Data Communications and Networking
Getting Started.
Overview of Data Communications and Networking
RM3G: Next Generation Recovery Manager
AWS Cloud Computing Masaki.
Software models - Software Architecture Design Patterns
Data Security in Local Networks using Distributed Firewalls
Lesson 8: Configuring IP Settings MOAC : Configuring Windows Devices.
Allocating IP Addressing by Using Dynamic Host Configuration Protocol
Cloud Computing LegalRun Solutions Why It’s Right for You!
PKI (Public Key Infrastructure)
Overview Multimedia: The Role of WINS in the Network Infrastructure
Network Diagnostics Framework
Kostas Kolomvatsos, Christos Anagnostopoulos
SCCM in hybrid world Predrag Jelesijević Microsoft 7/6/ :17 AM
Chapter 15 - IP: Software To Create A Virtual Network
Presentation transcript:

Peer-to-peer networking Antanas katilauskas

What is that? Peer-to-peer networking is a serverless networking technology that allows several network devices to share resources and communicate directly with each other.  The Peer-to-Peer Infrastructure is a set of networking APIs to help you develop decentralized networking applications that use the collective power of computers on a network.

Scalable and Secure Peer Name Resolution The Peer Name Resolution Protocol (PNRP) Namespace Provider API is a name- to-IP resolution protocol. The IPv6 scope or context that includes all participating peers is called a cloud. PNRP allows peers to interact with each other within a cloud.

Efficient Multipoint Communication The Peer-to-Peer Infrastructure includes the Graphing API that provides efficient multipoint communication. Like PNRP, peer-to-peer graphing allows a set of nodes to interact, and pass data to and from each other in the form of a record. Each record that a peer generates or updates is sent to all nodes in a graph.

Distributed Data Management Distributed data management automatically stores all records sent to a peer- to-peer graph until the specified expiration time for each record. Peer-to-peer networking ensures that each node in a peer-to-peer graph has a similar view of the record database. If a peer-to-peer graph has a security model associated with it, the graph contains the following information: Who can and cannot connect to a graph Who can secure and validate records based on externally defined criteria

Secure Peer Identities The Peer-to-Peer Infrastructure provides a Peer-to-Peer Identity Manager API that allows you to create, manage, and manipulate the peer identities. Peer identities are used to define names for secure endpoints in PNRP, and can represent any resource that participates in a peer-to-peer network, including secure peer-to-peer groups and services.

Secure Peer-to-Peer Groups The Peer-to-Peer Grouping API combines the Peer-to-Peer Graphing, Identity Manager, and PNRP APIs to form a cohesive and convenient solution for peer- to-peer networking application development. The Peer-to-Peer Grouping API uses the Peer-to-Peer Identity Manager API and a self-signed certificate scheme to ensure security within the graphing infrastructure. Each group can be resolved and registered through PNRP, which allows for the name resolution of random peers within a registered peer-to-peer group.

What is the Peer Infrastructure? The Peer Infrastructure is a set of several APIs that are powerful and flexible. The major components include the following: Peer Graphing API Peer Grouping API Peer Identity Manager API PNRP (Peer Name Resolution Protocol) Namespace Provider API

Benefits of Peer Networking Difficult to take down - You have to close down all the peers for the network to stop working. Scalable - scalability from simple LANs to the entire Internet. Serverless - no central point of failure Self-tuning - adapts to changes within the infrastructure. Self-repairing - automatically repairs and corrects itself. Sharing - enables sharing from edge-of-network endpoints.

Thank you!