SlideShare a Scribd company logo
1 of 19
1




Peer To
Peer
          2009/2010
2


    1   Introduction

    2   Architecture

    3   Characteristic of P2P

    4   The eMule application

    5   P2P File-sharing Protocols

    6   Conclusion
3




       Direct system exchange of resources between
        linked peers in network

       The most used in the world

       Basically different from the Client-server
        architecture
4
     Peer to peer is a type of network infrastructure where each computer is both server
     and client. In this case, the computers connected to the network share their resources .



    • Distributed Architecture                   • Decentralized architecture
5




        In a typical peer-to-peer, there is no administrator .So, each

    user manages his own post. On the other hand all users can

    share their resources as they wish. If we consider one of the

    posts as a server, it is intended to share resources, if not it

    consumes resources from other posts
6




              For the P2P there are problems that are related to the system itself and
    other software.
              The files on these networks in addition to their potentially illegal
    distribution come from unverifiable sources and can contain all kinds of additives:
    spyware, viruses and other .. Anyway download any file whatever it is, should lead
    to a systematic virus verification.
    Also put passwords to the data, even if they are not in shared directories.
7




       A reduced cost
       Simplicity of implementation and use
       Robust network,

       Self-organization
        Dynamism




                                               7
8




       This system is not centralized at all, which makes it very difficult to administer

       Security is less easy to achieve

       The network maintenance is difficult.

       Limited change

       Trafficking is most important and searching files take much longer




                                                                                     8
9



    It has emerged as a software      developed in Java by the

    exchange and sharing              creators of Winamp based on

    essential                         the distributed network
                                      Gnutella.




                                   Shareaza client is a peer-to-
    Is based on the distributed
                                   peer for Windows that will
    network Fasttrack
                                   allow you to download files
                                   of any type on several
                                   popular P2P networks.
10


     Definition :

                    eMule is a P2P file sharing network
                        • Based on an extended eDonkey protocol
                        • Uses both TCP and UDP
                        • Client Server architecture
11

     The eMule Network :
12
     1- Connection establishment :
         High ID login sequence      Rejection session
13

     2- Connection startup :

       This scenario assumes that the
        client has a requested file list
       The client sends his files
       The server replies with status
        information
       The client asks for sources for his
        files
       The server replies with his
        available sources
14

       3- File search :


     • A search request is sent to the server which is then answered
     by a search result
     • The user chooses to download one or more files, the client then
     requests sources for the chosen files and the server replies with a
     list of sources for each of the requested files.
     • An optional server status message
15

     4- Callback mechanism:




      1- A can send the server a callback request to ask B to call him back.
      2- The server, which already has an open TCP connection to B, sends B a
      callback requested message, providing him with A’s IP and port.
      3- B can then connect to A and send him the file without further overhead on
      the server.
16




        UDP is used for:

         ◦ periodic status checks

         ◦ File search enhancement

         ◦ Source search enhancement

        UDP is optional
17




     UDP is used for verifying A’s position in B’s upload queue
18




     The importance and the the future
     of P2P is to provide a role in
     network security and continuity.
19

More Related Content

What's hot

Project: Designing a Secure Network
Project: Designing a Secure NetworkProject: Designing a Secure Network
Project: Designing a Secure Networkvictor okoth
 
Linux Inter Process Communication
Linux Inter Process CommunicationLinux Inter Process Communication
Linux Inter Process CommunicationAbhishek Sagar
 
Network servers
Network serversNetwork servers
Network serversOnline
 
Distributed Computing Environment
Distributed Computing EnvironmentDistributed Computing Environment
Distributed Computing EnvironmentPurushottam Dahal
 
Lecture - Network Technologies: Peer-to-Peer Networks
Lecture - Network Technologies: Peer-to-Peer NetworksLecture - Network Technologies: Peer-to-Peer Networks
Lecture - Network Technologies: Peer-to-Peer NetworksJames Salter
 
Peer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By AhnafPeer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By Ahnafahnarokz
 
Distributed web based systems
Distributed web based systemsDistributed web based systems
Distributed web based systemsReza Gh
 
client server protocol
client server protocolclient server protocol
client server protocolbmuhire
 
Communication in Distributed Systems
Communication in Distributed SystemsCommunication in Distributed Systems
Communication in Distributed SystemsDilum Bandara
 
Chapter 03
Chapter 03Chapter 03
Chapter 03cclay3
 
W14webposter
W14webposterW14webposter
W14webposters1150245
 
Filesharing using bittorrent protocol
Filesharing using bittorrent protocolFilesharing using bittorrent protocol
Filesharing using bittorrent protocolNishan Shetty
 
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENTMODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENTIJCSEA Journal
 
Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminarbalu0503
 

What's hot (20)

Network layer
Network layerNetwork layer
Network layer
 
Peer Sim & P2P
Peer Sim & P2PPeer Sim & P2P
Peer Sim & P2P
 
Project: Designing a Secure Network
Project: Designing a Secure NetworkProject: Designing a Secure Network
Project: Designing a Secure Network
 
Linux Inter Process Communication
Linux Inter Process CommunicationLinux Inter Process Communication
Linux Inter Process Communication
 
3. challenges
3. challenges3. challenges
3. challenges
 
Client server model
Client server modelClient server model
Client server model
 
Network servers
Network serversNetwork servers
Network servers
 
Distributed Computing Environment
Distributed Computing EnvironmentDistributed Computing Environment
Distributed Computing Environment
 
Lecture - Network Technologies: Peer-to-Peer Networks
Lecture - Network Technologies: Peer-to-Peer NetworksLecture - Network Technologies: Peer-to-Peer Networks
Lecture - Network Technologies: Peer-to-Peer Networks
 
Overlay networks
Overlay networksOverlay networks
Overlay networks
 
Peer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By AhnafPeer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By Ahnaf
 
Distributed web based systems
Distributed web based systemsDistributed web based systems
Distributed web based systems
 
client server protocol
client server protocolclient server protocol
client server protocol
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Communication in Distributed Systems
Communication in Distributed SystemsCommunication in Distributed Systems
Communication in Distributed Systems
 
Chapter 03
Chapter 03Chapter 03
Chapter 03
 
W14webposter
W14webposterW14webposter
W14webposter
 
Filesharing using bittorrent protocol
Filesharing using bittorrent protocolFilesharing using bittorrent protocol
Filesharing using bittorrent protocol
 
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENTMODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT
 
Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminar
 

Viewers also liked (20)

Land Trust Ranching in Their Hands by Anne Muller
Land Trust Ranching in Their Hands by Anne MullerLand Trust Ranching in Their Hands by Anne Muller
Land Trust Ranching in Their Hands by Anne Muller
 
Save Water
Save WaterSave Water
Save Water
 
before upload
before uploadbefore upload
before upload
 
El Arte De La Panificacion
El Arte De La PanificacionEl Arte De La Panificacion
El Arte De La Panificacion
 
test
testtest
test
 
ttttt
tttttttttt
ttttt
 
Semiología respiratoria imágenes
Semiología respiratoria imágenesSemiología respiratoria imágenes
Semiología respiratoria imágenes
 
before upload
before uploadbefore upload
before upload
 
Virtualization
VirtualizationVirtualization
Virtualization
 
latest slide
latest slidelatest slide
latest slide
 
Natural Disasters
Natural DisastersNatural Disasters
Natural Disasters
 
Progetto etwinning: va' dove ti porta..il mouse
Progetto etwinning: va' dove ti porta..il mouseProgetto etwinning: va' dove ti porta..il mouse
Progetto etwinning: va' dove ti porta..il mouse
 
Global Recycling
Global RecyclingGlobal Recycling
Global Recycling
 
كيفية تعديل خصوصية صفحتك في موقع جيران ؟
كيفية تعديل خصوصية صفحتك في موقع جيران ؟كيفية تعديل خصوصية صفحتك في موقع جيران ؟
كيفية تعديل خصوصية صفحتك في موقع جيران ؟
 
Syllabus: 8th grade science
Syllabus: 8th grade scienceSyllabus: 8th grade science
Syllabus: 8th grade science
 
Sistemas de informacion diseño de si
Sistemas de informacion   diseño de siSistemas de informacion   diseño de si
Sistemas de informacion diseño de si
 
What Is E Commerce
What Is E CommerceWhat Is E Commerce
What Is E Commerce
 
Epic Weekend
Epic WeekendEpic Weekend
Epic Weekend
 
Ed 451 lesson plan 1
Ed 451 lesson plan 1Ed 451 lesson plan 1
Ed 451 lesson plan 1
 
Ha
HaHa
Ha
 

Similar to Peer topeer

Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!DigitalThinkerHelp
 
Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptxHananShk
 
P2P Seminar
P2P SeminarP2P Seminar
P2P SeminarCoRehab
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...Brenda Thomas
 
Peer To Peer File Sharing
Peer To Peer File SharingPeer To Peer File Sharing
Peer To Peer File Sharingsyifa nurjanah
 
App for peer-to-peer file transfer
App for peer-to-peer file transferApp for peer-to-peer file transfer
App for peer-to-peer file transferIRJET Journal
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTSudhansu Dash
 
P2P file sharing over GPRS network using Motorola RAZR2
P2P file sharing over GPRS network using Motorola RAZR2P2P file sharing over GPRS network using Motorola RAZR2
P2P file sharing over GPRS network using Motorola RAZR2Ritul Sonania
 
Peer to peer (p2p)
Peer to peer (p2p)Peer to peer (p2p)
Peer to peer (p2p)Harshini
 
The NFS Version 4 Protocol
The NFS Version 4 ProtocolThe NFS Version 4 Protocol
The NFS Version 4 ProtocolKelum Senanayake
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Mumbai Academisc
 
Peer to peer system - Mạng ngang hàng.
Peer to peer system - Mạng ngang hàng.Peer to peer system - Mạng ngang hàng.
Peer to peer system - Mạng ngang hàng.ThaiLeHuy1
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer ProtocolVinh Nguyen
 

Similar to Peer topeer (20)

Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!
 
Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptx
 
gampong.pptx
gampong.pptxgampong.pptx
gampong.pptx
 
P2P Seminar
P2P SeminarP2P Seminar
P2P Seminar
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
 
Peer To Peer File Sharing
Peer To Peer File SharingPeer To Peer File Sharing
Peer To Peer File Sharing
 
App for peer-to-peer file transfer
App for peer-to-peer file transferApp for peer-to-peer file transfer
App for peer-to-peer file transfer
 
P2P-Network.ppt
P2P-Network.pptP2P-Network.ppt
P2P-Network.ppt
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENT
 
P2P file sharing over GPRS network using Motorola RAZR2
P2P file sharing over GPRS network using Motorola RAZR2P2P file sharing over GPRS network using Motorola RAZR2
P2P file sharing over GPRS network using Motorola RAZR2
 
Peer to peer (p2p)
Peer to peer (p2p)Peer to peer (p2p)
Peer to peer (p2p)
 
Peer to peer
Peer to peerPeer to peer
Peer to peer
 
The NFS Version 4 Protocol
The NFS Version 4 ProtocolThe NFS Version 4 Protocol
The NFS Version 4 Protocol
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)
 
Peer to peer system - Mạng ngang hàng.
Peer to peer system - Mạng ngang hàng.Peer to peer system - Mạng ngang hàng.
Peer to peer system - Mạng ngang hàng.
 
Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
 
3rd edition chapter2
3rd edition chapter23rd edition chapter2
3rd edition chapter2
 
applayer.pptx
applayer.pptxapplayer.pptx
applayer.pptx
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
COMPUTER NW2 (1).pptx
COMPUTER NW2 (1).pptxCOMPUTER NW2 (1).pptx
COMPUTER NW2 (1).pptx
 

More from Higher Private School of Engineering and Technology (13)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
VOIP
VOIPVOIP
VOIP
 
Unified communication
Unified communicationUnified communication
Unified communication
 
Streaming
StreamingStreaming
Streaming
 
Sensor networks
Sensor networksSensor networks
Sensor networks
 
Qo s
Qo sQo s
Qo s
 
Mobile applications
Mobile applicationsMobile applications
Mobile applications
 
Ldap
LdapLdap
Ldap
 
I pv6
I pv6I pv6
I pv6
 
Intenet of things
Intenet of thingsIntenet of things
Intenet of things
 
Help desk
Help deskHelp desk
Help desk
 
Geolocalisation
GeolocalisationGeolocalisation
Geolocalisation
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Recently uploaded

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 

Recently uploaded (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 

Peer topeer

  • 1. 1 Peer To Peer 2009/2010
  • 2. 2 1 Introduction 2 Architecture 3 Characteristic of P2P 4 The eMule application 5 P2P File-sharing Protocols 6 Conclusion
  • 3. 3  Direct system exchange of resources between linked peers in network  The most used in the world  Basically different from the Client-server architecture
  • 4. 4 Peer to peer is a type of network infrastructure where each computer is both server and client. In this case, the computers connected to the network share their resources . • Distributed Architecture • Decentralized architecture
  • 5. 5 In a typical peer-to-peer, there is no administrator .So, each user manages his own post. On the other hand all users can share their resources as they wish. If we consider one of the posts as a server, it is intended to share resources, if not it consumes resources from other posts
  • 6. 6 For the P2P there are problems that are related to the system itself and other software. The files on these networks in addition to their potentially illegal distribution come from unverifiable sources and can contain all kinds of additives: spyware, viruses and other .. Anyway download any file whatever it is, should lead to a systematic virus verification. Also put passwords to the data, even if they are not in shared directories.
  • 7. 7  A reduced cost  Simplicity of implementation and use  Robust network,  Self-organization  Dynamism 7
  • 8. 8  This system is not centralized at all, which makes it very difficult to administer  Security is less easy to achieve  The network maintenance is difficult.  Limited change  Trafficking is most important and searching files take much longer 8
  • 9. 9 It has emerged as a software developed in Java by the exchange and sharing creators of Winamp based on essential the distributed network Gnutella. Shareaza client is a peer-to- Is based on the distributed peer for Windows that will network Fasttrack allow you to download files of any type on several popular P2P networks.
  • 10. 10 Definition : eMule is a P2P file sharing network • Based on an extended eDonkey protocol • Uses both TCP and UDP • Client Server architecture
  • 11. 11 The eMule Network :
  • 12. 12 1- Connection establishment : High ID login sequence Rejection session
  • 13. 13 2- Connection startup :  This scenario assumes that the client has a requested file list  The client sends his files  The server replies with status information  The client asks for sources for his files  The server replies with his available sources
  • 14. 14 3- File search : • A search request is sent to the server which is then answered by a search result • The user chooses to download one or more files, the client then requests sources for the chosen files and the server replies with a list of sources for each of the requested files. • An optional server status message
  • 15. 15 4- Callback mechanism: 1- A can send the server a callback request to ask B to call him back. 2- The server, which already has an open TCP connection to B, sends B a callback requested message, providing him with A’s IP and port. 3- B can then connect to A and send him the file without further overhead on the server.
  • 16. 16  UDP is used for: ◦ periodic status checks ◦ File search enhancement ◦ Source search enhancement  UDP is optional
  • 17. 17 UDP is used for verifying A’s position in B’s upload queue
  • 18. 18 The importance and the the future of P2P is to provide a role in network security and continuity.
  • 19. 19