Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.

Slides:



Advertisements
Similar presentations
Personal Info 1 Prepared by: Mr. NHEAN Sophan  Presenter: Mr. NHEAN Sophan  Position: Desktop Support  Company: Khalibre Co,. Ltd 
Advertisements

Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Peer-to-Peer Technology and Security Issues By Raul Rodriguez, Arash Zarrinbakhsh, Cynthia Roger and Phillip Shires College of Business Administration.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
An Introduction to Firewalls By: David Moss, NUIT Technology Support Services Vince Celindro, NUIT Telecommunications and Network Services Robert Vance,
P2P Network is good or bad? Sang-Hyun Park. P2P Network is good or bad? - Definition of P2P - History of P2P - Economic Impact - Benefits of P2P - Legal.
Presented by Stephen Kozy. Presentation Outline Definition and explanation Comparison and Examples Advantages and Disadvantages Illegal and Legal uses.
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
Firewalls As Presented by Brian Dunn. Definition General Protects computer(s) from unauthorized access Types Hardware devices Software programs.
P2P WeeSan Lee
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
Computer Networks IGCSE ICT Section 4.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
The Internet, World Wide Web, and Computer Communication.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
P EER - TO -P EER N ETWORKS Michael Fine 1. W HAT ARE P EER -T O -P EER N ETWORKS ? Napster Social networking spawned from this concept. Emerged in the.
Open up Evernote, mini whiteboards.  2 minutes – write down as many as you can think of.
BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.
Peer to Peer Network Anas Hardan. What is a Network? What is a Network? A network is a group of computers and other devices (such as printers) that are.
Chapter 1 Intro to Routing & Switching.  Networks have changed how we communicate  Everyone can connect & share  How have networks changed the way…
BitTorrent How it applies to networking. What is BitTorrent P2P file sharing protocol Allows users to distribute large amounts of data without placing.
Introductionto Networking Basics By Avinash Kulkarni.
 Computer Networking Computer Networking  Networking terminology Networking terminology  Client Server Model Client Server Model  Types of Networks.
What is a Network?. Definition of a computer network A computer network is a system in which computers are connected to share information and resources.
Peer-to-Peer Networking. Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer.
P2P Web Standard IS3734/19/10 Michael Radzin. What is P2P? Peer to Peer Networking (P2P) is a “direct communications initiations session.” Modern uses.
Computer Networks S3 Prepared by May Lau
Jamel Callands Austin Chaet Carson Gallimore. Downloading
Network Operating Systems versus Operating Systems Computer Networks.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
NETWORKS.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Bit Torrent A good or a bad?. Common methods of transferring files in the internet: Client-Server Model Peer-to-Peer Network.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Security at NCAR David Mitchell February 20th, 2007.
Networks CS105. What is a computer network? A computer network is a collection of computing devices that are connected in various ways so that they can.
Computers Are Your Future Eleventh Edition
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
Networking Classification A network is two or more computers that are connected 1 There size 2 Their Servers.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Computer Networks part II 1. Network Types Defined Local area networks Metropolitan area networks Wide area networks 2.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Bit Torrent Nirav A. Vasa. Topics What is BitTorrent? Related Terms How BitTorrent works Steps involved in the working Advantages and Disadvantages.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Woodland Hills School District Computer Network Acceptable Use Policy.
Chapter 3.  The advantages and disadvantages of: ◦ Client-Server Networks & ◦ Peer-to-Peer Networks.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Innovations in P2P Communications David A. Bryan College of William and Mary April 11, 2006 Advisor: Bruce B. Lowekamp.
Unit Communication Hardware
Computer Networks Part 1
Providing Network Services
Comparison of LAN, MAN, WAN
Department of Computer Science Course : Pre Computer Skills
PEER TO PEER BitTorrent.
Network Devices Hub Definition:
King Saud University- College OF Applied Studies
King Saud University- College OF Applied Studies
Client/Server and Peer to Peer
Woodland Hills School District
Presentation transcript:

Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize

Outline Definition of P2P P2P vs. Client/server Sharing Large Files Security and Risks Applications Discussion: current P2P issues Survey results

Peer to Peer Networks (P2P) “A method of file sharing over a network in which individual computers are linked via the Internet or a private network to share programs/files. Users download files directly from other users' computers, rather than from a central server.” -Harvard information technology Department

P2P structure  Nodes ( computers )communicating to each other through with out dedicated servers or hierarchy  Nodes work as both clients and servers to the other nodes in the network  Users decide what can and can’t be accessed

VS. P2P vs. Client/Server Networks

Using P2P to share /large files To share large files from one node to another would use too much bandwidth and take to long. To solve that BitTorrent is a method of distributing large amounts of data widely without the original distributor incurring the entire costs of hardware, hosting and bandwidth resources The more nodes in a network the quicker and more efficient the file will travel

Risks of P2P poisoning attacks polluting attacks freeloaders insertion of viruses to carried data malware in the peer-to-peer network software itself denial of service attacks filtering identity attacks spamming

How to Protect Yourself Don't Use P2P On a Corporate Network Beware The Client Software Don't Share Everything Scan Everything

How to protect your Business Attempt to control your desktops to prevent P2P software from being installed Limit the traffic at the firewall Educate your users!!! Ex: Japanese PolicemanJapanese Policeman

Applications Limewire - File Sharing Limewire BitTorrent – File Sharing BitTorrent Joost - P2P TV Joost Skype - P2P Phone Skype

Discussion: current P2P issues Comcast Sued for Blocking P2P Sites Anti-P2P college bill advances in House

Survey Results Any specific questions that you want answered from the readings? Nope I'd like to know more about JoostJoost

Peer to Peer Networks What is it? Current issues Applications Risks? How does it work? Small connections Large files, BIT Torrent Protect your business Protect yourself File sharing Legal P2P sites? Phone, TV, media Large Networks Basic