PeertoPeer Networking - PowerPoint PPT Presentation

About This Presentation
Title:

PeertoPeer Networking

Description:

Windows Messenger. Yahoo! Messenger. Jabber -An open-source ... Windows Messenger and Yahoo! Messenger are members of IMunified. Distributed Search Engines ... – PowerPoint PPT presentation

Number of Views:73
Avg rating:3.0/5.0
Slides: 14
Provided by: CSV96
Category:

less

Transcript and Presenter's Notes

Title: PeertoPeer Networking


1
Peer-to-Peer Networking By Peter Diggs Ken Arrant
2
P2P VIRTUALPrivate COMMUNITY (VPC)
  • Virtual Private Community, enables information in
    Peer-to-Peer services to act as an agent. VPC
    provides a mechanism that defines an agent
    behavior, authenticate users, and executes
    agents.
  • Agents for a peer-to-peer service are defined in
    a policy package that consists of a condition
    rule to decide active agents according to user.
  • A set of agents (Called roles), and necessary
    information (Contents) for the service.
  • Agents communicate with each other through
    communities that are created by agents who have
    accepted the policy packages.
  • Services are offered by interaction among agents
    in communities.
  • For example, in a music retail service, a
    policy package defines contain two agent
  • An authorized agent which can play the
  • complete music file.
  • And a trial agent which can play only part of
  • the music file.

3
OVERALL Peer-To-Peer Architecture
  • The agents for the system fall into two
    categories.
  • Those that send and receive the search
    requests.
  • And those that service them against the
    resource and their ontology
  • description.
  • Agent send out the created search request, marked
    RequestsAgent
  • which is defined as the endpoint for
    the results being returned,as either an array of
    results or individual result from the peers
    hosting the resources.
  • A search agent receives requests and passes them
    onto the peers it knows about, while at the same
    time performing the search on all the agents for
    each of the resources being shared on that user.
  • SearchAgent communicates both with other peers on
    the network and other agents running on the local
    peer.
  • The other agents found in the system, marked as
    Resource SearchAgent are designed and built to
    match any search query to the
  • resource they know about, whether that
    is a set of files on the system or other
    resources available to users.
  • The results are passed back to the SearchAgent on
    the same peer, which then get passed on back to
    the originator.

4
ResultsAgent
LOCALT Peer
Resource SearchAgent
SearchAgent
Resource SearchAgent
OTHER Peers
ResultsAgent
ResultsAgent
ResultsAgent
5
  • LACK OF CONTROL
  • Assimilating P2P systems within large
    corporations
  • IT people live to centralize data
  • To centralize application usage
  • Most importantly to centralize their control.
  • P2P data is distributed among multiple computers
  • Not on a single hyper-secure server.
  • P2P is too insecure
  • P2P encourages employees to visit unacceptable
  • sites on company time.

6
UNRELIABLE ACCESS Finding the file you want is
a problem Maybe the user who had the file deleted
it, or moved it to another folder Disconnected
their internet connection and turned off their
PC. A big downside about decentralized file
storage across a P2P network. Problem of file
swapping services.
7
Peer-to-Peer Uses
  • File Sharing
  • Instant Messaging
  • Distributed Search Engines
  • Group Collaboration
  • Distributed Computing

8
File Sharing
-Allowing files on one computer to available for
others to download.
  • Examples
  • Napster
  • Gnutella
  • -Similar to Napster, but uses third party
    clients to connect to their network
  • -http//en.wikipedia.org/wiki/Gnutella a
    list of Gnutella clients
  • KaZaA
  • Mojo Nation
  • -First file-sharing application to use
    distributed load balancing.
  • Freenet
  • -An open-source file sharing program
  • Pointera
  • -The first legal Napster type file sharing
    software

9
Instant Messaging
- Communicating with another person on a network
in real time using text.
  • Examples
  • AIM
  • -Combined with AOLs buddy list there are over 65
    million users
  • ICQ
  • -The first instant messaging
    program, developed in 1996
  • Windows Messenger
  • Yahoo! Messenger
  • Jabber
  • -An open-source instant messaging provider
  • Downside
  • Most IM providers are not compatible.
  • Because of this some providers have joined to
    form IMunified, and organization trying to
    develop open standards for instant messaging.
  • Windows Messenger and Yahoo! Messenger are
    members of IMunified.

10
Distributed Search Engines
  • - Rather than searching content on public web
    sites, distributed search engines search
    individual computers.
  • - One computer queries an x amount of other
    computers, which then query the same amount of
    computers. This continues until the query is
    canceled.
  • Examples
  • JXTA Search
  • Pandango
  • Copernic

11
Group Collaboration
  • - Allows multiple users to take part in group
    projects in real time.
  • - Uses IM, telephony, video, and file sharing.
  • Examples
  • Groove Networks
  • -Current leading provider
  • NetMeeting
  • -Microsofts version
  • IntraLinks

12
Distributed Computing
  • Sharing your computer
  • Software installed on the computer processes
    activities when the computer is idle. Then it
    uploads the results to the distributed computing
    network
  • Allows for processing power similar to large
    mainframes and supercomputers.
  • Example Projects
  • SETI_at_home
  • - Over 3 million participants, analyzes radio
    waves looking for intelligent life in outer
    space.
  • United Devices
  • - Includes projects for genetic and cancer
    research.

13
Security
  • Blocking access on your computer to a single
    folder
  • Access Control restricting access to certain
    files and folders (Windows XP sharing and
    security option)
  • Viruses - Worries are more with the speed a virus
    can spread than the ease of it, its just as easy
    to get a virus through email.
  • Providing similar file names to trick
    downloaders, if someone is looking for YMCA.mp3
    the virus may be named YMCA.exe
  • Wrapping Disguising a file type as a different
    type, such as disguising an .exe file and an .mp3
    file.
  • File sharing can be used to stop viruses by
    spreading virus updates (MyCIO.com)
Write a Comment
User Comments (0)
About PowerShow.com