P2P Networks Connecting Businesses, Individuals, and the World By: Katie Solie.

Slides:



Advertisements
Similar presentations
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Advertisements

New Developments in E- Commerce: Legal Issues Professor Nancy King Oregon State University Aarhus School of Business.
Massively Distributed Database Systems Distributed Hash Spring 2014 Ki-Joune Li Pusan National University.
Robin Hood and the 40 Million Thieves David Evans
Internet, Intranet and Extranets
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
Peer-to-Peer Networks João Guerreiro Truong Cong Thanh Department of Information Technology Uppsala University.
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
Protocols By Rakesh Chukkapalli CS 484.  Peer-to-Peer = P2P  The term peer-to-peer was coined as far as back in the mid-1980s by LAN vendors to describe.
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Basic Computer Networks Configurations (cont.) School of Business Eastern Illinois University © Abdou Illia, Spring 2006 Week 2, Thursday 1/19/2006)
Peer-to-Peer (or P2P) From user to user. Peer-to-peer implies that either side can initiate a session and has equal responsibility. Corey Chan Andrew Merfeld.
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Peer-to-Peer Networks & JXTA by Madhurasmitha Chakravarthy & Priti Sabadra.
P2P NETWORKS Legal Risks. Who’s On First Identity crisis Each computer can be client Each computer can be server “Servent”
Comparing Hybrid Peer-to-Peer Systems Beverly Yang and Hector Garcia-Molina Presented by Marco Barreno November 3, 2003 CS 294-4: Peer-to-peer systems.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
Client-Server vs P2P or, HTTP vs Bittorrent. Client-Server Architecture SERVER client.
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
Securing Information Systems
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Cmpe 494 Peer-to-Peer Computing Anıl Gürsel Didem Unat.

BitTorrent How it applies to networking. What is BitTorrent P2P file sharing protocol Allows users to distribute large amounts of data without placing.
Survey of Peer to Peer Technologies Authors: Bratislav Milić, Jelena Krunić, Veljko Milutinović,
1 P2P Computing. 2 What is P2P? Server-Client model.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
Peer-to-Peer Networking. Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer.
Chongseok Park 1.  It is a global system of interconnected computer networks that use the standard Internet protocol suite and it serves billions.
Peer-to-Peer Networks University of Jordan. Server/Client Model What?
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Chapter 2: Application layer
Intellectual Property in Peer-to-Peer Networks Artsiom Yautsiukhin Natallia Kokash Intellectual Property Law, 18 October 2005.
File Sharing Networks: Sony, Napster, Grokster, Bit Torrent Richard Warner.
PSI Peer Search Infrastructure. Introduction What are P2P Networks? The term "peer-to-peer" refers to a class of systems and applications that employ.
Super-peer Network. Motivation: Search in P2P Centralised (Napster) Flooding (Gnutella)  Essentially a breadth-first search using TTLs Distributed Hash.
The Start Shawn Fanning (19-yr-old student nicknamed Napster) developed the original Napster application and service in January 1999 while a freshman.
1 Peer-to-Peer Systems r Application-layer architectures r Case study: BitTorrent r P2P Search and Distributed Hash Table (DHT)
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications  app architectures  app requirements r 2.2 Web and HTTP r.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
FastTrack Network & Applications (KaZaA & Morpheus)
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
PEER TO PEER (P2P) NETWORK By: Linda Rockson 11/28/06.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
A Utility-based Approach to Scheduling Multimedia Streams in P2P Systems Fang Chen Computer Science Dept. University of California, Riverside
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
Peer-to-Peer Modeling: Expanding and Specifying the Model Mike Kissinger and Jeremy Tout.
Polytechnic University Introduction1 CS 393/682: Network Security Professor Keith W. Ross.
A Hybrid Search Engine -- Combining Google and P2P Xuanhui Wang.
Security in many layers  Application Layer –  Transport Layer - Secure Socket Layer  Network Layer – IPsec (VPN)  Link Layer – Wireless Communication.
Understand Internet Security LESSON Security Fundamentals.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
Copyright © 2011, Oxford University Press, Inc. Converging Media A New Introduction to Mass Communication.
Peer-to-Peer (P2P) Networks By Bongju Yu. Contents  What is P2P?  Features of P2P systems  P2P Architecture  P2P Protocols  P2P Projects  Reference.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
Peer-to-peer systems ”Sharing is caring”. Why P2P? Client-server systems limited by management and bandwidth P2P uses network resources at the edges.
Peer to Peer Information Retrieval
DATA RETRIEVAL IN ADHOC NETWORKS
File Sharing Networks: Sony, Napster, Grokster, Bit Torrent
INTERNET SECURITY.
Presentation transcript:

P2P Networks Connecting Businesses, Individuals, and the World By: Katie Solie

What is a P2P Network? P2P stands for peer-to-peer Direct communication between 2 or more computers Napster caused the technology to explode Business use of P2P

P2P Search Engines 6 different types of search engines: Flooding broadcast of queries Selective forwarding system Decentralized hash table Centralized indexes and repositories Distributed indexes and repositories Relevance driven crawlers

Main Models of P2P Networking Centralized server-client model Decentralized networks

Security Bandwidth clogging Theft Viruses, Trojans, and Bugs

Security Protocols Secure Sockets Layer (SSL) IPSec Public Key Infrastructure (PKI)

Academic P2P Used to bring together students, professors, and researchers in a secure, private network LionShare (Penn State) LionShare

Legal Controversy Sony Corp. v. Universal Studios BetaMax case MGM Studios v. Grokster, Ltd. RIAA Court Cases Verizon Pacific Bell

P2P networks connect the world and offer endless possibilities for the future of networking and file sharing.