Peer-to-Peer Networking By: Peter Diggs Ken Arrant.

Slides:



Advertisements
Similar presentations
Peer-to-peer and agent-based computing Peer-to-Peer Computing: Introduction.
Advertisements

9 C H A P T E R © 2001 The McGraw-Hill Companies, Inc. All Rights Reserved1 Communicating in Real Time Now it is also possible to converse in real time.
Computer networks Fundamentals of Information Technology Session 6.
CHANGING THE WAY IT WORKS Cloud Computing 4/6/2015 Presented by S.Ganesh ( )
Maninder Kaur COMPUTER NETWORKS Maninder Kaur 14/10/2010
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
TC2-Computer Literacy Mr. Sencer February 4, 2010.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Peer-to-Peer (or P2P) From user to user. Peer-to-peer implies that either side can initiate a session and has equal responsibility. Corey Chan Andrew Merfeld.
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Peer-to-peer: an overview Selo TE P2P is not a new concept P2P is not a new technology P2P is not a new technology Oct : first transmission.
Introduction to client/server architecture
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
P2P File Sharing Systems
What is it? Social networking is the grouping of individuals into specific groups, much like a neighborhood subdivision, if you will. Although social.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
For more notes and topics visit:
Information Systems Today: Managing in the Digital World TB4-1 4 Technology Briefing Networking.
Cli/Serv.: JXTA/151 Client/Server Distributed Systems v Objective –explain JXTA, a support environment for P2P services and applications ,
Cmpe 494 Peer-to-Peer Computing Anıl Gürsel Didem Unat.

Cs423-cotter1 P2P Discovering P2P (Miller) Internet.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
WXET1143 Lecture7: , Chat and Messaging. Introduction  Electronic mail is everywhere.  Now many people in business, government, and education use.
1 INTERNET AND eBUSINESS (I) BUS Abdou Illia, Fall 2012 (October 29, 2012)
Networked Information Systems 1 Advantages of and classified by their size & architecture or design.
Application Layer CHAPTER 2. Announcements and Outline  Administrative Items  Questions? Recap 1.Introduction to Networks 1.Network Type 2.N etwork.
BASIC COMPUTER CONCEPTS What is a computer? An electronic device, operating under the control of instructions stored in its own memory unit, that can.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 38 How Music Sharing and File Sharing Work.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Instant Messaging Alan Parker Robert Callow Brian Kearney Fortunato Macari Daniel Harrington Chang Gong Wang.
1 A P2P Collaborative System Using JXTA Hosei Graduation School ITPC 02R3315 Katsuhiro CHIBA.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Jabber Client Jeevan Varma Anga Distributed Systems(CSC8530) Villanova University.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
The Intranet.
FastTrack Network & Applications (KaZaA & Morpheus)
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
P2P Computing MIRA YUN September 16, Outline What is P2P P2P taxonomies Characteristics Different P2P systems Conclusion.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
Peer-to-Peer and Collective Intelligence A platform for collaboration Andrew Roczniak Collective Intelligence Lab Multimedia Communications Research Lab.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Peer to Peer Computing. What is Peer-to-Peer? A model of communication where every node in the network acts alike. As opposed to the Client-Server model,
Introduction TO Network Administration
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Peer-to-Peer (P2P) Networks By Bongju Yu. Contents  What is P2P?  Features of P2P systems  P2P Architecture  P2P Protocols  P2P Projects  Reference.
2 pt 3 pt 4 pt 5pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2pt 3 pt 4pt 5 pt 1pt 2pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4pt 5 pt 1pt Internet History Computer Networks.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Billy Ripple Dr. Oblitey COSC  File-Sharing ◦ What is it? ◦ Uses ◦ History ◦ Types ◦ Dangers  Case Study  Summary  Works Cited.
PGP Desktop (Client only) By: Courtney Wirtz & Vincent Verner.
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
August 2001Copyright UserLand Software 2001 Next Generation Internet Software How Broadband will be used John Robb, President and COO UserLand Software.
Music Downloads By: Demetria Norman And Jacquelyn Menner.
Composing Web Services and P2P Infrastructure. PRESENTATION FLOW Related Works Paper Idea Our Project Infrastructure.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Web Application.
CHAPTER 2 Application Layer.
Network Services.
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Presentation transcript:

Peer-to-Peer Networking By: Peter Diggs Ken Arrant

P2P VIRTUALPrivate COMMUNITY (VPC) Virtual Private Community, enables information in Peer-to-Peer services to act as an agent. VPC provides a mechanism that defines an agent behavior, authenticate users, and executes agents. Agents for a peer-to-peer service are defined in a policy package that consists of a condition rule to decide active agents according to user. A set of agents (Called roles), and necessary information (Contents) for the service. Agents communicate with each other through communities that are created by agents who have accepted the policy packages. Services are offered by interaction among agents in communities. For example, in a music retail service, a policy package defines contain two agent An authorized agent which can play the complete music file. And a trial agent which can play only part of the music file.

OVERALL Peer-To-Peer Architecture: The agents for the system fall into two categories. Those that send and receive the search requests. And those that service them against the resource and their ontology description. Agent send out the created search request, marked ‘RequestsAgent’ which is defined as the endpoint for the results being returned,as either an array of results or individual result from the peers hosting the resources. A search agent receives requests and passes them onto the peers it knows about, while at the same time performing the search on all the agents for each of the resources being shared on that user. SearchAgent communicates both with other peers on the network and other agents running on the local peer. The other agents found in the system, marked as Resource SearchAgent are designed and built to match any search query to the resource they know about, whether that is a set of files on the system or other resources available to users. The results are passed back to the SearchAgent on the same peer, which then get passed on back to the originator.

ResultsAgent SearchAgent Resource SearchAgent Resource SearchAgent ResultsAgent LOCALT Peer OTHER Peers

LACK OF CONTROL: Assimilating P2P systems within large corporations IT people live to centralize data To centralize application usage Most importantly to centralize their control. P2P data is distributed among multiple computers Not on a single hyper-secure server. P2P is too insecure P2P encourages employees to visit unacceptable sites on company time.

UNRELIABLE ACCESS: Finding the file you want is a problem Maybe the user who had the file deleted it, or moved it to another folder Disconnected their internet connection and turned off their PC. A big downside about decentralized file storage across a P2P network. Problem of file swapping services.

Peer-to-Peer Uses 1.File Sharing 2.Instant Messaging 3.Distributed Search Engines 4.Group Collaboration 5.Distributed Computing

File Sharing -Allowing files on one computer to available for others to download. Examples Napster Gnutella -Similar to Napster, but uses third party clients to connect to their network - a list of Gnutella clients KaZaA Mojo Nation -First file-sharing application to use distributed load balancing. Freenet -An open-source file sharing program Pointera -The first legal “Napster type” file sharing software

Instant Messaging - Communicating with another person on a network in real time using text. Examples AIM -Combined with AOL’s buddy list there are over 65 million users ICQ -The first instant messaging program, developed in 1996 Windows Messenger Yahoo! Messenger Jabber -An open-source instant messaging provider Downside -Most IM providers are not compatible. -Because of this some providers have joined to form IMunified, and organization trying to develop open standards for instant messaging. -Windows Messenger and Yahoo! Messenger are members of IMunified.

Distributed Search Engines - Rather than searching content on public web sites, distributed search engines search individual computers. - One computer queries an x amount of other computers, which then query the same amount of computers. This continues until the query is canceled. Examples JXTA Search Pandango Copernic

Group Collaboration - Allows multiple users to take part in group projects in real time. - Uses IM, telephony, video, and file sharing. Examples Groove Networks -Current leading provider NetMeeting -Microsoft’s version IntraLinks

Distributed Computing - Sharing your computer - Software installed on the computer processes activities when the computer is idle. Then it uploads the results to the distributed computing network - Allows for processing power similar to large mainframes and supercomputers. Example Projects - Over 3 million participants, analyzes radio waves looking for intelligent life in outer space. United Devices - Includes projects for genetic and cancer research.

Security Blocking access on your computer to a single folder Blocking access on your computer to a single folder Access Control – restricting access to certain files and folders (Windows XP sharing and security option) Access Control – restricting access to certain files and folders (Windows XP sharing and security option) Viruses - Worries are more with the speed a virus can spread than the ease of it, it’s just as easy to get a virus through . Viruses - Worries are more with the speed a virus can spread than the ease of it, it’s just as easy to get a virus through . Providing similar file names to trick downloader’s, if someone is looking for YMCA.mp3 the virus may be named YMCA.exe Providing similar file names to trick downloader’s, if someone is looking for YMCA.mp3 the virus may be named YMCA.exe Wrapping – Disguising a file type as a different type, such as disguising an.exe file and an.mp3 file. Wrapping – Disguising a file type as a different type, such as disguising an.exe file and an.mp3 file. File sharing can be used to stop viruses by spreading virus updates (MyCIO.com) File sharing can be used to stop viruses by spreading virus updates (MyCIO.com)