PEER-TO-PEER Is a type of network in which each workstation has equivalent capabilities and responsibilities. This differs from client/server architectures,

Slides:



Advertisements
Similar presentations
Incentives Build Robustness in BitTorrent Bram Cohen.
Advertisements

Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
Peer-to-Peer Technology and Security Issues By Raul Rodriguez, Arash Zarrinbakhsh, Cynthia Roger and Phillip Shires College of Business Administration.
Other File Systems: AFS, Napster. 2 Recap NFS: –Server exposes one or more directories Client accesses them by mounting the directories –Stateless server.
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
Basic Computer Networks Configurations (cont.) School of Business Eastern Illinois University © Abdou Illia, Spring 2006 Week 2, Thursday 1/19/2006)
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
1 Client-Server versus P2P  Client-server Computing  Purpose, definition, characteristics  Relationship to the GRID  Research issues  P2P Computing.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
‘SECURITY ISSUES OF P2P COMPUTING’ Presented By Sravan K Abbaraju CS
Introduction to client/server architecture
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
1 Enabling Secure Internet Access with ISA Server.
Internet GIS. A vast network connecting computers throughout the world Computers on the Internet are physically connected Computers on the Internet use.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Application Layer Functionality and Protocols Network Fundamentals – Chapter 3.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Introduction Widespread unstructured P2P network
P EER - TO -P EER N ETWORKS Michael Fine 1. W HAT ARE P EER -T O -P EER N ETWORKS ? Napster Social networking spawned from this concept. Emerged in the.
Human-Computer Interface Course 5. ISPs and Internet connection.
BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 12 Slide 1 Distributed Systems Architectures.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
思科网络技术学院理事会. 1 Application Layer Functionality and Protocols Network Fundamentals – Chapter 3.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
Peer-to-Peer Networking. Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
1 A P2P Collaborative System Using JXTA Hosei Graduation School ITPC 02R3315 Katsuhiro CHIBA.
Peer-to-Peer Networks University of Jordan. Server/Client Model What?
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Application Layer Functionality and Protocols Network Fundamentals.
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
The Start Shawn Fanning (19-yr-old student nicknamed Napster) developed the original Napster application and service in January 1999 while a freshman.
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
FastTrack Network & Applications (KaZaA & Morpheus)
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Networking Classification A network is two or more computers that are connected 1 There size 2 Their Servers.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
Kemal Baykal Rasim Ismayilov
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Web Server.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Unit 2 - Hardware Networking. What is a network? A computer network is essentially a connection between two or more computers. This connection can be.
Communications & Networks National 4 & 5 Computing Science.
© 1stworks Corp. The Connected Community 85% of US corporations have a PC 75% of these PCs have an Internet connection 50% of US households have a PC 80%
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
Bit Torrent Nirav A. Vasa. Topics What is BitTorrent? Related Terms How BitTorrent works Steps involved in the working Advantages and Disadvantages.
The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier.
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
Electronic mail News File transfer protocol Chat Instant messaging Online services Online shopping.
SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings.
August 2001Copyright UserLand Software 2001 Next Generation Internet Software How Broadband will be used John Robb, President and COO UserLand Software.
6/28/ A global mesh of interconnected networks (internetworks) meets these human communication needs. Some of these interconnected networks are.
Peer 2 Peer & Client Server
CONNECTING TO THE INTERNET
Web Development Web Servers.
Introduction to client/server architecture
File Transfer Protocol
Goals Introduce the Windows Server 2003 family of operating systems
Presentation transcript:

PEER-TO-PEER Is a type of network in which each workstation has equivalent capabilities and responsibilities. This differs from client/server architectures, in which some computers are dedicated to serving the others. A peer-to-peer application is different from the traditional client/server model because the applications involved act as both clients and servers. That is to say, while they are able to request information from other servers, they also have the ability to act as a server and respond to requests for information from other clients at the same time.

P2P systems involve these seven key characteristics: user computers can act as both clients and servers the overall system is easy to use and well-integrated the system includes tools to support users wanting to create content or add functionality the system provides connections with other users the system does something new or exciting the system supports "cross-network" protocols like SOAP or XML-RPC

A typical peer-to-peer application has the following key features that help define it : Discovering other peers: The application must be able to find other applications that are willing to share information. The application finds these peers by registering with a central server. Querying peers for content:Once these peers have been discovered, the application can ask them for the content that is desired by the application. Sharing content with other peers: In the same way that the peer can ask others for content, it can also share content after it has been discovered.

ARCHITECTURE Pure Peer-toPeer A pure peer-to-peer application has no central server whatsoever, as you can see in Figure. It dynamically discovers other peers on the network and interacts with each of them for sending and receiving content. Advantages:It does not rely on any one server to be available for registration of its location in order for other peers to find it. Disadvantages:the lack of a central discovery server poses a problem because a relatively low number of clients can be discovered, thereby limiting the application's reach.

ARCHITECTURE Peer-to-peer with a Simple Discovery Server Works just like the pure peer-to-peer architecture except that it relies on a central server for discovery of the other peers. It uses this server to download a list of the other peers participating. It goes through the list and contacts each peer individually with its request. Advantages:it circumvents the issues of discovery by requiring only one request to the central server. Disadvantages:If the central server is not available, the peer-to-peer application will not be able to find other peers.

ARCHITECTURE Peer-to-peer with a Discovery and Lookup Server In this case, the peer application not only registers with a discovery server, but it also uploads a list of its contents at regular intervals. When an application is looking for some particular content, it queries the central server rather than sending a query to each client. The central server then responds with a list of the clients that contain the requested content, and the peer application can contact those clients directly to retrieve the content. Examples: NAPSTER, MORPHEUS.

ARCHITECTURE P2P with a Discovery, Lookup, and Content Server This approach effectively becomes the client/server model because the peers are no longer contacting other peers for content. Each peer registers with a server, queries it for information, and transfers any desired content down from the server. Disadvantage:The server quickly becomes the bottleneck and is easily overwhelmed by the peers.

IMPLEMENTATION Some protocols used are: SOAP:Simple Object Access Protocol. BEEP:Blocks Extensible Exchange Protocol BEEP permits simultaneous and independent exchanges within the context of a single application user-identity, supporting both textual and binary messages. Refer RFC3080 at ftp://ftp.imag.fr/pub/archive/IETF/rfc/ rfc3080.txt ODCP:Open Direct Connect Protocol.

Application model Web Services: Web Services technology provides an excellent way to handle registration, discovery, and content lookup for your peer- to-peer application. Windows Forms: GUI applications that help to make the peer- to-peer experience much more exciting. Web Forms: makes it very easy to return HTML content to a peer application. This can be useful if you want to spice up your peer-to-peer application with general content about the service or advertisements about using the service.

Towards the Networking side Some of them available are: System.web.Services Namespace: Uses SOAP. Provides classes for interacting with the service, storage of peer file info(IP addr, connection, file name and its size etc). System.Net Namespace: Contains classes that provide support for creating aaplications that use IP’s to send and receive data. Provides classes for transfer of file from one peer to another, etc.

Some Points FIREWALLS AND PORTS The selection of ports and the protocol used by the peers should be taken into account when designing the application because firewalls are often designed to allow communication only over a particular port. In most cases, applications intended for general use over the Internet should use a port in the dynamic or private range or register. SCALABILITY Network bandwidth is often the scarcest resource (hence the bottleneck) in a peer-to- peer application. Ability to scale up to hundreds of thousands of clients.

SECURITY Threats to the network, such as worm and virus attacks, and Denial of Service (DoS) attacks that flood the network with data and incapacitate computers. Other threats are password and data theft, violating intellectual property laws, using the corporate network for personal or illegal activities, and violating corporate security policies. Some solutions: Enhanced authentication, authorization, access control, and encryption. To know more about security issues and solutions visit S0005

CONCLUSION The peer-to-peer application model applied to large networks such as the Internet offers an exciting opportunity to share information and content over a network on a scale that has never been seen before.

WEBSITES 01/02/NetPeers/NetPeers.asp ary/weekly/aa093000a.htm m kazaa.shtm