Protocols By Rakesh Chukkapalli CS 484.  Peer-to-Peer = P2P  The term peer-to-peer was coined as far as back in the mid-1980s by LAN vendors to describe.

Slides:



Advertisements
Similar presentations
Peer-to-peer and agent-based computing Peer-to-Peer Computing: Introduction.
Advertisements

The Start of Digital Anarchy Shawn Fanning (19-yr-old student nicknamed Napster) developed the original Napster application and service in January 1999.
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
Peer-to-Peer Networking By: Peter Diggs Ken Arrant.
Presented by Stephen Kozy. Presentation Outline Definition and explanation Comparison and Examples Advantages and Disadvantages Illegal and Legal uses.
Peer-to-Peer (or P2P) From user to user. Peer-to-peer implies that either side can initiate a session and has equal responsibility. Corey Chan Andrew Merfeld.
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
P2P WeeSan Lee
Chapter 2 Network Models.
The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.
Free Powerpoint Templates Page 1 Free Powerpoint Templates Peer-2-Peer File Sharing Kenie Moses TECH621Social Internet Spring 2011.
Peer-to-Peer network systems Distributed Data Processing Paulina Pasek.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
In The Name Of Allah Whose Blessings Are Uncountable.
1 Telecommunications, the Internet, Intranets, and Extranets CSC101 SECTIONS 01 & 02.
Basic Data Communication
CHAPTER 5 : COMMUNICATIONS AND THE INTERNET (PART 1) INFORMATION TECHNOLOGY AND ITS APPLICATIONS SSK3000 Faculty of Computer Science and Information Technology,
Your Interactive Guide to the Digital World Discovering Computers 2012 Edited by : Noor Al-Hareqi.
1 NETWORKS AND COMMUNICATIONS Chapter Four. Communications Computer communication describes a process in which two or more computers or devices transfer.
? INTERNET WHAT, WHY, HOW. DEFINITION The Internet is a massive public spiderweb of computer connections. It connects personal computers, laptops, tablets,
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.

1 WHY NEED NETWORKING? - Access to remote information - Person-to-person communication - Cooperative work online - Resource sharing.
Netwrok and the internet Part two Introduction to computer, 2nd semester, 2009/2010 Mr.Nael Aburas Faculty of Information.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
1 P2P Computing. 2 What is P2P? Server-Client model.
Chapter 7 Networking: Computer Connections. Networks n Network - a computer system that uses communications equipment to connect two or more computers.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
徐晨桓 李柏穎.  Definition  Introduction  History  Example - Napster  Example - Gnutella 徐晨桓 李柏穎 2/27.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 38 How Music Sharing and File Sharing Work.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Okay, here’s a scenario… You’re sitting at a computer…. Type in www. yourcompany.com As soon as you click on search your browser will ask your Operation.
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
UNESCO ICTLIP Module 1. Lesson 61 Introduction to Information and Communication Technologies Lesson 6. What is the Internet?
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B5 Networks and Telecommunications.
The Start Shawn Fanning (19-yr-old student nicknamed Napster) developed the original Napster application and service in January 1999 while a freshman.
INTERNET. Objectives Explain the origin of the Internet and describe how the Internet works. Explain the difference between the World Wide Web and the.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Networking Classification A network is two or more computers that are connected 1 There size 2 Their Servers.
Toshiba Confidential 1 Presented by: Philipe BC Da’Silva SESSION INITIATION PROTOCOL.
D. Beecroft Fremont High School Networks.
Department of Industrial Engineering Sharif University of Technology Session# 10.
What is Data Communication? Data communication is the process of collecting and distributing data(text, voice, graphics, video, etc) electrically from.
Networks Am I hooked up?. Networks definition sizes of networks types advantages and disadvantages how data is sent transmission media business uses.
Chapter 2 Network Models
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Peer-to-Peer (P2P) Networks By Bongju Yu. Contents  What is P2P?  Features of P2P systems  P2P Architecture  P2P Protocols  P2P Projects  Reference.
Bit Torrent Nirav A. Vasa. Topics What is BitTorrent? Related Terms How BitTorrent works Steps involved in the working Advantages and Disadvantages.
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
COM: 111 Introduction to Computer Applications Department of Information & Communication Technology Panayiotis Christodoulou.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
Billy Ripple Dr. Oblitey COSC  File-Sharing ◦ What is it? ◦ Uses ◦ History ◦ Types ◦ Dangers  Case Study  Summary  Works Cited.
G063 - Intranets, the Internet and Extranet. Learning Objectives: At the end of this topic you should be able to: describe the characteristics and purpose.
Fundamentals of Information Systems, Sixth Edition
The Internet and Multimedia
Edited by : Noor Al-Hareqi
McGraw-Hill Technology Education
The Internet and the World Wide Web
Edited by : Noor Al-Hareqi
The Internet and the World Wide Web
Unexpected Peer-to-Peer
Edited by : Noor Al-Hareqi
Computer Terms 1 Terms Internet Terms 1 Internet Terms 2 Computer
The Internet and Electronic mail
By Hussein Alhashimi.
Presentation transcript:

Protocols By Rakesh Chukkapalli CS 484

 Peer-to-Peer = P2P  The term peer-to-peer was coined as far as back in the mid-1980s by LAN vendors to describe their connectivity architecture.  Equal communicating with equal.  Directory and Indexing services on one or few servers  In most p2p networks, Servers cease to exist.

Napster was an online music file sharing service created by Shawn Fanning while he was attending Northeastern University in Boston and operating between June 1999 and July Technology allowed people to easily copy and distribute MP3 files among each other, bypassing the established market for such songs and thus leading to the music industry's accusations of massive copyright violations. The original service was shut down by court order. Highly Increased the use of decentralized P2P file distribution programs.

Cheap Easy Highly Extended Phone

Virus Magnet Legal controversy over Copyrights

“Protocol is the “glue” that holds a network together by defining how nodes communicate with each other to achieve network functionality.” “protocol is a convention or standard that controls or enables the connection, communication, and data transfer between two computing endpoints. In its simplest form, a protocol can be defined as the rules governing the syntax, semantics, and synchronization of communication.”

Message-based protocol: Here the focus is on sending and receiving discrete, packaged and addresses messages. How the messages are carried between 2 parties is delegated to an autonomous agent Which is like a conversation with messages exchanged by courier, carrier pigeon, or mail. Connection-based protocol: Here the focus is on establishing connections over which messages are sent. This situation is more like a telephone conversation, where a dial-up connection allows “raw” messages (unpackaged and unaddressed) to be exchanged in real time.

Bit Torrent – File sharing / Software Distribution / Media Distribution Vuze (formerly Azureus), Bit Lord, Utorrent Napster – File Sharing P2PTV – Live video streaming/ file sharing Joost, Live Station GNUnet – File Sharing, Chat

1.Messaging 2.File sharing and data sharing 3.Content publishing 4.Content retrieval (including search and distribution) 5.Distributed storage 6.Distributed network services 7.Distributed processing (and presentation) 8.Decentralized collaboration 9.Content Management/control 10.General Resource Sharing

Any Questions?