Harnessing the power of Peer-to-Peer technology to create a secure and low-cost distributed Filing System Pablo www. Carballude.es González.

Slides:



Advertisements
Similar presentations
IT: Communication and Impacts
Advertisements

Presentation. Contemporary Communication Fast – connects us quickly without delays Reliable – works always Global – connects us with the whole world Low.
Networking Some of the basics. What is a Network Simply put, its two or more computer connected together through a communication medium. A communication.
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
NETWORKING CLASSIFICATION OF COMPUTERS * Size *Cost *#of users *Storage capacity.
E-business Infrastructure
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Andrew Schroeder Networking Aspects of Cloud Computing.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Coliseo Calzados S.L. The advantages of internet and intranet uses Characteristics of a specific company.
Course 2150A: Designing a Secure Microsoft Windows 2000 Network.
A global, public network of computer networks. The largest computer network in the world. Computer Network A collection of computing devices connected.
Online Banking Security Magdalena Padyasek. Why Security?  Computer-based businesses  Advances in technology  Internet crimes  September 11 th attacks.
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
Cloud Computing الحوسبة السحابية. subject History of Cloud Before the cloud Cloud Conditions Definition of Cloud Computing Cloud Anatomy Type of Cloud.
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
P EER - TO -P EER N ETWORKS Michael Fine 1. W HAT ARE P EER -T O -P EER N ETWORKS ? Napster Social networking spawned from this concept. Emerged in the.
Making the Internet a Better Place for Business NIST PKI Steering Committee March 14, 2002.
Peer to Peer Network Anas Hardan. What is a Network? What is a Network? A network is a group of computers and other devices (such as printers) that are.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
Networked Information Systems 1 Advantages of and classified by their size & architecture or design.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
Networking Basics Lesson 1 Introduction to Networks.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Portable SSH Brian Minton EKU, Dept. of Technology, CEN/CET)‏
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Elimination Day 2. When the two equations don’t have an opposite, what do you have to do? 1.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Network Access Technology: Secure Remote Access S Prasanna Bhaskaran.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Remote Conferencing Keegan Francis and Lindsay Warner.
Module 5: Configuring Access for Remote Clients and Networks.
Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.
Computers Are Your Future Eleventh Edition
A few notes. First - What is the Cloud ? * Any number of blogs / articles and definitions * Accessing information services and software over the internet.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Networks Network topologies. Networks Network topology Is the way the devices are arranged in a network In a wired network, it shows how the computers.
Remote Controller & Presenter Make education more efficiently
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
BASIC NETWORKS. What is a Network? A network consists of two or more computers that are linked in order to share resources exchange files, or allow electronic.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
E a s y S h a r e Jung Son Ky Le. Operational Concepts Recent years, huge number of growth in Internet users and broadband usage File-sharing become extremely.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Communications & Networks National 4 & 5 Computing Science.
Virtual Private Network and Customer Relationship Management By: Saeed Baayoun.
Microsoft System Center Deployment At The Shepherd Color Company A Presentation By: Ian Iliff.
Understand Internet Security LESSON Security Fundamentals.
Introduction to Networking
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
STORAGE LOCAL OR ONLINE. DATA STORAGE: DATA YOU STORE ONLINE FILES SUCH AS IMAGES, SPREADSHEETS, VIDEO OR MUSIC. ONLINE DATA STORAGE: WHEN FILES ARE STORES.
Activity 1 5 minutes to discuss and feedback on the following:
©Richard L. Goldman Public Key Policies for Windows 2000 ©Richard Goldman December 5, 2001.
Submitted To: Submitted By: Seminar On Parasitic Computing.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Networking Revision. Advantages:  Communication (remotely)  Sharing hardware (saves on cost, eg. Printers)  Sharing of data and info (eg. Databases.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Virtual Private Network
Understand Wide Area Networks (WANs)
Virtual Private Networks (VPN)
3.2 Virtualisation.
An Introduction to Cloud Computing
MetTel Cloud Connect Seamlessly Secure Your Path to Cloud Providers
Virtual Private Network
Presentation transcript:

Harnessing the power of Peer-to-Peer technology to create a secure and low-cost distributed Filing System Pablo www. Carballude.es González

Do we have a problem?

How do we work?  Central servers (Saturation)  High capacity networks (Expensive)  Work from everywhere (High risk)  Remote access (Expensive)

Saturation Problem Central Server Client

Work from everywhere Central Server

Privacy issues  We don’t want to allow everyone on the Internet to get access to our company files.

Saturation Solution Central Server Client Server Client Server Client

Files can be shared to EVERYONE (public) or just with SOME OF THEM (private) This prototype is using GnuPG. Sharing files

Transferring files

To sum up  We’ve increased network speed by solving saturation.  Workers can access files from everywhere, safely.  We’ve saved money eliminating the expensive central server.  Communications can be established by unsecure (and cheap) channels, because all the information would be encrypted.

Pablo Carballude González Questions?