Scaling API-first – The story of a global engineering organization
Peer to peer(p2 p)
1. PEER TO PEER(P2P)
• What is a peer to peer network?
• What is a peer to peer network architecture?
• What are the advantages of peer to peer network?
• What is disadvantages of peer to peer network?
• What is a peer to peer file sharing?
• What is BitTorrent ?
• How BitTorrent works ?
• Problems with BitTorrent ?
2. What is a peer to peer network?
• In its simplest form, a peer-to-peer (P2P) network is created
when two or more PCs are connected and share resources without
going through a separate server computer.
• In other words, each computer on a P2P network becomes a
file server as well as a client.
• Used largely for sharing of content files such as audio, video, data
or anything in a digital format.
• There are many p2p protocols such as Ares, Bittorrent, or
eDonkey(eD2k).
6. What is a peer to peer network architecture?
Overlay network diagram for an unstructured
P2P network, illustrating the ad hoc nature of
the connections between nodes
overlay network diagram for a structured P2P
network, using a distributed hash table (DHT) to
identify and locate nodes/resources
7. Structured Vs. Unstructured
• Structured-
• In structured peer-to-peer
networks the overlay is
organized into a specific
topology, and the protocol
ensures that any node can
efficiently search the network for
a file/resource, even if the
resource is extremely rare.
• Connections in the overlay are
fixed
• DHT Indexing(distributed hash
table).
• Unstructured-
• No algorithm for organization.
• Connections in the overlay are
created arbitrarily.
Centralized
•Central server is
used for indexing
functions
•Bittorrent
Hybrid
•Two groups of
clients: client and
overlay
•eMule, Kazaa
Pure
•Equipotent
peers, all peers
have equal
amount of power
•Gnutella,
Freenet
8. What are the advantages of peer to peer network?
• The peer to peer network is less expensive.
• One of the major advantage to P2P network is that each time a
new node is connected to the network the total capacity of the
system increases.
• Failure of one peer doesn’t affect the functioning of other peers.
In case of Client –Server network, if server goes down whole
network gets affected.
• it is easy to install and configure.
9. What is disadvantages of peer to peer network?
• Security is a major concern, not all shared files are from benign
sources. Attackers may add malware to p2p files as an attempt to
take control of other nodes in the network.
• Data recovery or backup is very difficult. Each computer should
have its own back-up system.
• Copyright issues.
10. What is a peer to peer file sharing?
• Peer-to-peer file sharing is different from traditional file downloading. In
peer-to-peer sharing, you use a software program (rather than your Web
browser) to locate computers that have the file you want. Because these
are ordinary computers like yours, as opposed to servers, they are
called peers.
• You run peer-to-peer file-sharing software on your computer and send
out a request for the file you want to download.
• To locate the file, the software queries other computers that are
connected to the Internet and running the file-sharing software.
• When the software finds a computer that has the file you want on its
hard drive, the download begin
11. What is BitTorrent ?
• a peer-to-peer file sharing protocol used for distributing large
amounts of data.
• Invented By Bram Cohen.
• Released July 2001
It is now maintained by Cohen's company,
BitTorrent Inc.
12. How BitTorrent works ?
Seeds: Seeder is someone from whom you can download a piece
of file. Hence they affect the overall availability of file on P2P
network.
Peers:Peer is someone who is involved in file sharing activity. It
is a generic term.
Leecher:Leecher is someone who has downloaded a file but is
not sharing it back to P2P network. Hence, overall availablity of file
decreases.
13. Problems with BitTorrent ?
Copyright:
- Many things not legally distributed
- Movie and Music industries very mad
- Unsuspecting users targeted
for lawsuits.
Security:
-virus,SET attack