Download presentation
Presentation is loading. Please wait.
Published byPeter Harrell Modified over 8 years ago
1
Peer-to-Peer Networking
2
Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer architectures Statistics
3
Introduction Mass content distribution – Inefficient and costly. Commercialization of internet – Mass medium. – Mostly client/server. – Foundation of peer-to-peer: penetration broadband internet, reliability of connections, capacity of user equipment, evolution compression technology, and etc. – Increasing demand for multimedia content. – Conclusion: traditional distribution models under pressure.
4
Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer architectures Statistics
5
Characteristics and challenges of Peer-to-Peer Peer-to-Peer versus client/server Client/Server: - Easy to manage and control (centralized) - Negative network externalities: a) limited scalability b) expensive distribution model c) danger for bottlenecks and single points of failure
6
Characteristics and challenges of Peer-to-Peer Sharing resources in Peer-to- Peer manner Partial or full decentralization Self organizing systems depending on the level of decentralization
7
Characteristics and challenges of Peer-to-Peer Peer-to-Peer versus client/server Peer-to-Peer: - Scalability, decentralization, transient connectivity, cost efficiency, fault tolerance, self organization, resource sharing - Servents -> SERVer + cliENTS - Positive network externalities: additional users = additional resources - Challenges: transient connectivity, security, availability of resources and scalability
8
Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer architectures Statistics
9
Peer-to-Peer applications Napster Gnutella (Bearshare, Limewire) Kademlia (Overnet, eDonkey) Fasttrack (Kazaa) Bittorrent
10
Peer-to-Peer applications Communication: IM and Telephony Grid computing Collaborative applications File sharing and content distribution Wireless and ubiquitious peer- to-peer
11
Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer architectures Statistics
12
Classification of Peer-to-Peer applications Centralized Flooding Document Routing
13
Classification of Peer-to-Peer applications Centralized structure (e.g. Napster) Degree of decentralization - Centralized - Decentralized - Hybrid Degree of structure - Unstructured - Structured
14
Classification of Peer-to-Peer applications Napster - Central directory server - Search process via server - Exchange of data occurs in peer-to-peer manner BCD E A Serve r Query D ? Download
15
Classification of Peer-to-Peer applications + Efficient search + Limited bandwith usage + No per-node state - Central point of failure - Limited scale BobAlice JaneJudy
16
Classification of Peer-to-Peer applications Gnutella 0.4 (decentralized unstructured) - No centralized component - Node functions: client, server, router, cache and search - Complete self organization
17
Classification of Peer-to-Peer applications A B C D QH
18
Classification of Peer-to-Peer applications + No central point of failure + Limited per-node state -Slow searches -Bandwith intesive Bob Alice Jane Judy Carl
19
Classification of Peer-to-Peer applications Gnutella 0.6 (hybrid unstructured) - Convergence: combining advantages and circumventing the drawbacks of centralized and pure decentralized systems - Introducing hierarchy in the system via super nodes
26
Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer architectures Statistics
27
Measured Bandwith
28
Measured Latency
29
Measured Uptime
30
Number of Shared Files
31
Connectivity
32
Presentation History of p2p networking p2p areas of usage Risks in p2p networking Future of p2p networking
33
History of p2p networking April 7, 1969: Internet Request for Comments Dec.1979: creation of Usenet Dec. 1987: creation of WWIVnet July, 1999: publication of Freenet protocol Sept.1999: creation of Napster Nov.1999: first release of Direct Connect client
34
History of p2p networking March 14 2000: first release of Gnutella September 6, 2000: first release of eDonkey2000 March, 2001: introduction of the FastTrack protocol April, 2001: design of the BitTorrent protocol
35
History of p2p networking May, 2001: first release of WinMX Peer Network Protocol July, 2001: shutdown of Napster Nov 6, 2001: first release of GNUnet March, 2002: publication of the Kademlia DHT August, 2007: the P4P working group is formed
36
Presentation History of p2p networking p2p areas of usage Risks in p2p networking Future of p2p networking
37
p2p areas of usage Home Peer to Peer Networks File sharing Bioinformatics Academic Search engine Military Business P2PTV Telecommunication
38
p2p areas of usage Home Peer to Peer Networks File sharing Bioinformatics Academic Search engine Military Business P2PTV Telecommunication
39
p2p areas of usage Home Peer to Peer Networks File sharing Bioinformatics Academic Search engine Military Business P2PTV Telecommunication
40
p2p areas of usage Home Peer to Peer Networks File sharing Bioinformatics Academic Search engine Military Business P2PTV Telecommunication
41
p2p areas of usage Home Peer to Peer Networks File sharing Bioinformatics Academic Search engine Military Business P2PTV Telecommunication
42
p2p areas of usage Home Peer to Peer Networks File sharing Bioinformatics Academic Search engine Military Business P2PTV Telecommunication
43
p2p areas of usage Home Peer to Peer Networks File sharing Bioinformatics Academic Search engine Military Business P2PTV Telecommunication
44
P2PTV SopCast TVants TVUPlayer Abroadcasting Zattoo Octoshape
45
p2p areas of usage Home Peer to Peer Networks File sharing Bioinformatics Academic Search engine Military Business P2PTV Telecommunication
46
Skype
47
Presentation History of p2p networking p2p areas of usage Risks in p2p networking Future of p2p networking
48
Attacks on peer-to-peer networks Poisoning attacks (e.g. providing files whose contents are different from the description, aka "spoofing") Polluting attacks (e.g. inserting "bad" chunks/packets into an otherwise valid file on the network) Defection attacks (users or software that make use of the network without contributing resources to it) Insertion of viruses to carried data (e.g. downloaded or carried files may be infected with viruses or other malware) Malware in the peer-to-peer network software itself (e.g. distributed software may contain spyware)
49
Attacks on peer-to-peer networks Denial of service attacks (attacks that may make the network run very slowly or break completely) Filtering (network operators may attempt to prevent peer-to-peer network data from being carried) Identity attacks (e.g. tracking down the users of the network and harassing or legally attacking them) Spamming (e.g. sending unsolicited information across the network--not necessarily as a denial of service attack) Distributed Denial of Service (a denial of service that attacks multiple host computers)
50
Legal controversy Napster shutdown The Piratebay case
51
Presentation History of p2p networking p2p areas of usage Risks in p2p networking Future of p2p networking
52
Anonymous P2P P4P File mirroring Encryption
53
References http://compnetworking.about.com/od/p2pp eertopeer/a/p2pintroduction.htmhttp://compnetworking.about.com/od/p2pp eertopeer/a/p2pintroduction.htm http://www.peer-to-peer.info/ http://www.idea- group.com/downloads/excerpts/Subramani an01.pdfhttp://www.idea- group.com/downloads/excerpts/Subramani an01.pdf
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.