SlideShare ist ein Scribd-Unternehmen logo
1 von 14
PEER TO PEER(P2P)
• What is a peer to peer network?
• What is a peer to peer network architecture?
• What are the advantages of peer to peer network?
• What is disadvantages of peer to peer network?
• What is a peer to peer file sharing?
• What is BitTorrent ?
• How BitTorrent works ?
• Problems with BitTorrent ?
What is a peer to peer network?
• In its simplest form, a peer-to-peer (P2P) network is created
when two or more PCs are connected and share resources without
going through a separate server computer.
• In other words, each computer on a P2P network becomes a
file server as well as a client.
• Used largely for sharing of content files such as audio, video, data
or anything in a digital format.
• There are many p2p protocols such as Ares, Bittorrent, or
eDonkey(eD2k).
What is a peer to peer network?
A PEER
• Peers are both suppliers and consumers while in the traditional
client-server model, the server supplies while the client only
consumes.
PEER-TO-PEER VS CLIENT-SERVER
What is a peer to peer network architecture?
Overlay network diagram for an unstructured
P2P network, illustrating the ad hoc nature of
the connections between nodes
overlay network diagram for a structured P2P
network, using a distributed hash table (DHT) to
identify and locate nodes/resources
Structured Vs. Unstructured
• Structured-
• In structured peer-to-peer
networks the overlay is
organized into a specific
topology, and the protocol
ensures that any node can
efficiently search the network for
a file/resource, even if the
resource is extremely rare.
• Connections in the overlay are
fixed
• DHT Indexing(distributed hash
table).
• Unstructured-
• No algorithm for organization.
• Connections in the overlay are
created arbitrarily.
Centralized
•Central server is
used for indexing
functions
•Bittorrent
Hybrid
•Two groups of
clients: client and
overlay
•eMule, Kazaa
Pure
•Equipotent
peers, all peers
have equal
amount of power
•Gnutella,
Freenet
What are the advantages of peer to peer network?
• The peer to peer network is less expensive.
• One of the major advantage to P2P network is that each time a
new node is connected to the network the total capacity of the
system increases.
• Failure of one peer doesn’t affect the functioning of other peers.
In case of Client –Server network, if server goes down whole
network gets affected.
• it is easy to install and configure.
What is disadvantages of peer to peer network?
• Security is a major concern, not all shared files are from benign
sources. Attackers may add malware to p2p files as an attempt to
take control of other nodes in the network.
• Data recovery or backup is very difficult. Each computer should
have its own back-up system.
• Copyright issues.
What is a peer to peer file sharing?
• Peer-to-peer file sharing is different from traditional file downloading. In
peer-to-peer sharing, you use a software program (rather than your Web
browser) to locate computers that have the file you want. Because these
are ordinary computers like yours, as opposed to servers, they are
called peers.
• You run peer-to-peer file-sharing software on your computer and send
out a request for the file you want to download.
• To locate the file, the software queries other computers that are
connected to the Internet and running the file-sharing software.
• When the software finds a computer that has the file you want on its
hard drive, the download begin
What is BitTorrent ?
• a peer-to-peer file sharing protocol used for distributing large
amounts of data.
• Invented By Bram Cohen.
• Released July 2001
It is now maintained by Cohen's company,
BitTorrent Inc.
How BitTorrent works ?
Seeds: Seeder is someone from whom you can download a piece
of file. Hence they affect the overall availability of file on P2P
network.
Peers:Peer is someone who is involved in file sharing activity. It
is a generic term.
Leecher:Leecher is someone who has downloaded a file but is
not sharing it back to P2P network. Hence, overall availablity of file
decreases.
Problems with BitTorrent ?
Copyright:
- Many things not legally distributed
- Movie and Music industries very mad
- Unsuspecting users targeted
for lawsuits.
Security:
-virus,SET attack
Thank you

Weitere ähnliche Inhalte

Was ist angesagt?

Computer Network
Computer NetworkComputer Network
Computer Network
Cma Mohd
 
Networking devices
Networking devicesNetworking devices
Networking devices
rupinderj
 
Networking Chapter 6
Networking Chapter 6Networking Chapter 6
Networking Chapter 6
mlrbrown
 

Was ist angesagt? (20)

How the-internet-works
How the-internet-worksHow the-internet-works
How the-internet-works
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
 
Presentation on router
Presentation on routerPresentation on router
Presentation on router
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Network Troubleshooting - Part 2
Network Troubleshooting - Part 2Network Troubleshooting - Part 2
Network Troubleshooting - Part 2
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORK
 
CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101
 
Internet as the network infrastructure
Internet as the  network infrastructureInternet as the  network infrastructure
Internet as the network infrastructure
 
Introduction to router
Introduction to routerIntroduction to router
Introduction to router
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
 
Peer-to-Peer Systems
Peer-to-Peer SystemsPeer-to-Peer Systems
Peer-to-Peer Systems
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Network and types of network
Network and types of networkNetwork and types of network
Network and types of network
 
Networking Chapter 6
Networking Chapter 6Networking Chapter 6
Networking Chapter 6
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
Growth of the Internet
Growth of the InternetGrowth of the Internet
Growth of the Internet
 
OSI Model
OSI ModelOSI Model
OSI Model
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Network Interface Card
Network Interface CardNetwork Interface Card
Network Interface Card
 

Ähnlich wie Peer to peer(p2 p)

Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminar
balu0503
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
guestc67adeb
 
Torrent Protocol
Torrent ProtocolTorrent Protocol
Torrent Protocol
Harsht2888
 

Ähnlich wie Peer to peer(p2 p) (20)

P2 p
P2 pP2 p
P2 p
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
BitTorrent
BitTorrent BitTorrent
BitTorrent
 
Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptx
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technology
 
Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminar
 
Filesharing using bittorrent protocol
Filesharing using bittorrent protocolFilesharing using bittorrent protocol
Filesharing using bittorrent protocol
 
P2p networks slides for show
P2p networks slides for showP2p networks slides for show
P2p networks slides for show
 
Bit torrent ppt
Bit torrent pptBit torrent ppt
Bit torrent ppt
 
P2p networks
P2p networksP2p networks
P2p networks
 
Peer to peer_v2pptx
Peer to peer_v2pptxPeer to peer_v2pptx
Peer to peer_v2pptx
 
Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENT
 
Torrent Protocol
Torrent ProtocolTorrent Protocol
Torrent Protocol
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
 
Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshi
 
Torrent technology
Torrent technologyTorrent technology
Torrent technology
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Peer to peer(p2 p)

  • 1. PEER TO PEER(P2P) • What is a peer to peer network? • What is a peer to peer network architecture? • What are the advantages of peer to peer network? • What is disadvantages of peer to peer network? • What is a peer to peer file sharing? • What is BitTorrent ? • How BitTorrent works ? • Problems with BitTorrent ?
  • 2. What is a peer to peer network? • In its simplest form, a peer-to-peer (P2P) network is created when two or more PCs are connected and share resources without going through a separate server computer. • In other words, each computer on a P2P network becomes a file server as well as a client. • Used largely for sharing of content files such as audio, video, data or anything in a digital format. • There are many p2p protocols such as Ares, Bittorrent, or eDonkey(eD2k).
  • 3. What is a peer to peer network?
  • 4. A PEER • Peers are both suppliers and consumers while in the traditional client-server model, the server supplies while the client only consumes.
  • 6. What is a peer to peer network architecture? Overlay network diagram for an unstructured P2P network, illustrating the ad hoc nature of the connections between nodes overlay network diagram for a structured P2P network, using a distributed hash table (DHT) to identify and locate nodes/resources
  • 7. Structured Vs. Unstructured • Structured- • In structured peer-to-peer networks the overlay is organized into a specific topology, and the protocol ensures that any node can efficiently search the network for a file/resource, even if the resource is extremely rare. • Connections in the overlay are fixed • DHT Indexing(distributed hash table). • Unstructured- • No algorithm for organization. • Connections in the overlay are created arbitrarily. Centralized •Central server is used for indexing functions •Bittorrent Hybrid •Two groups of clients: client and overlay •eMule, Kazaa Pure •Equipotent peers, all peers have equal amount of power •Gnutella, Freenet
  • 8. What are the advantages of peer to peer network? • The peer to peer network is less expensive. • One of the major advantage to P2P network is that each time a new node is connected to the network the total capacity of the system increases. • Failure of one peer doesn’t affect the functioning of other peers. In case of Client –Server network, if server goes down whole network gets affected. • it is easy to install and configure.
  • 9. What is disadvantages of peer to peer network? • Security is a major concern, not all shared files are from benign sources. Attackers may add malware to p2p files as an attempt to take control of other nodes in the network. • Data recovery or backup is very difficult. Each computer should have its own back-up system. • Copyright issues.
  • 10. What is a peer to peer file sharing? • Peer-to-peer file sharing is different from traditional file downloading. In peer-to-peer sharing, you use a software program (rather than your Web browser) to locate computers that have the file you want. Because these are ordinary computers like yours, as opposed to servers, they are called peers. • You run peer-to-peer file-sharing software on your computer and send out a request for the file you want to download. • To locate the file, the software queries other computers that are connected to the Internet and running the file-sharing software. • When the software finds a computer that has the file you want on its hard drive, the download begin
  • 11. What is BitTorrent ? • a peer-to-peer file sharing protocol used for distributing large amounts of data. • Invented By Bram Cohen. • Released July 2001 It is now maintained by Cohen's company, BitTorrent Inc.
  • 12. How BitTorrent works ? Seeds: Seeder is someone from whom you can download a piece of file. Hence they affect the overall availability of file on P2P network. Peers:Peer is someone who is involved in file sharing activity. It is a generic term. Leecher:Leecher is someone who has downloaded a file but is not sharing it back to P2P network. Hence, overall availablity of file decreases.
  • 13. Problems with BitTorrent ? Copyright: - Many things not legally distributed - Movie and Music industries very mad - Unsuspecting users targeted for lawsuits. Security: -virus,SET attack