SlideShare a Scribd company logo
1 of 19
1




Peer To
Peer
          2009/2010
2


    1   Introduction

    2   Architecture

    3   Characteristic of P2P

    4   The eMule application

    5   P2P File-sharing Protocols

    6   Conclusion
3




       Direct system exchange of resources between
        linked peers in network

       The most used in the world

       Basically different from the Client-server
        architecture
4
     Peer to peer is a type of network infrastructure where each computer is both server
     and client. In this case, the computers connected to the network share their resources .



    • Distributed Architecture                   • Decentralized architecture
5




        In a typical peer-to-peer, there is no administrator .So, each

    user manages his own post. On the other hand all users can

    share their resources as they wish. If we consider one of the

    posts as a server, it is intended to share resources, if not it

    consumes resources from other posts
6




              For the P2P there are problems that are related to the system itself and
    other software.
              The files on these networks in addition to their potentially illegal
    distribution come from unverifiable sources and can contain all kinds of additives:
    spyware, viruses and other .. Anyway download any file whatever it is, should lead
    to a systematic virus verification.
    Also put passwords to the data, even if they are not in shared directories.
7




       A reduced cost
       Simplicity of implementation and use
       Robust network,

       Self-organization
        Dynamism




                                               7
8




       This system is not centralized at all, which makes it very difficult to administer

       Security is less easy to achieve

       The network maintenance is difficult.

       Limited change

       Trafficking is most important and searching files take much longer




                                                                                     8
9



    It has emerged as a software      developed in Java by the

    exchange and sharing              creators of Winamp based on

    essential                         the distributed network
                                      Gnutella.




                                   Shareaza client is a peer-to-
    Is based on the distributed
                                   peer for Windows that will
    network Fasttrack
                                   allow you to download files
                                   of any type on several
                                   popular P2P networks.
10


     Definition :

                    eMule is a P2P file sharing network
                        • Based on an extended eDonkey protocol
                        • Uses both TCP and UDP
                        • Client Server architecture
11

     The eMule Network :
12
     1- Connection establishment :
         High ID login sequence      Rejection session
13

     2- Connection startup :

       This scenario assumes that the
        client has a requested file list
       The client sends his files
       The server replies with status
        information
       The client asks for sources for his
        files
       The server replies with his
        available sources
14

       3- File search :


     • A search request is sent to the server which is then answered
     by a search result
     • The user chooses to download one or more files, the client then
     requests sources for the chosen files and the server replies with a
     list of sources for each of the requested files.
     • An optional server status message
15

     4- Callback mechanism:




      1- A can send the server a callback request to ask B to call him back.
      2- The server, which already has an open TCP connection to B, sends B a
      callback requested message, providing him with A’s IP and port.
      3- B can then connect to A and send him the file without further overhead on
      the server.
16




        UDP is used for:

         ◦ periodic status checks

         ◦ File search enhancement

         ◦ Source search enhancement

        UDP is optional
17




     UDP is used for verifying A’s position in B’s upload queue
18




     The importance and the the future
     of P2P is to provide a role in
     network security and continuity.
19

More Related Content

What's hot

Project: Designing a Secure Network
Project: Designing a Secure NetworkProject: Designing a Secure Network
Project: Designing a Secure Network
victor okoth
 
Distributed Computing Environment
Distributed Computing EnvironmentDistributed Computing Environment
Distributed Computing Environment
Purushottam Dahal
 
Distributed web based systems
Distributed web based systemsDistributed web based systems
Distributed web based systems
Reza Gh
 
W14webposter
W14webposterW14webposter
W14webposter
s1150245
 
Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminar
balu0503
 

What's hot (20)

Network layer
Network layerNetwork layer
Network layer
 
Peer Sim & P2P
Peer Sim & P2PPeer Sim & P2P
Peer Sim & P2P
 
Project: Designing a Secure Network
Project: Designing a Secure NetworkProject: Designing a Secure Network
Project: Designing a Secure Network
 
Linux Inter Process Communication
Linux Inter Process CommunicationLinux Inter Process Communication
Linux Inter Process Communication
 
3. challenges
3. challenges3. challenges
3. challenges
 
Client server model
Client server modelClient server model
Client server model
 
Network servers
Network serversNetwork servers
Network servers
 
Distributed Computing Environment
Distributed Computing EnvironmentDistributed Computing Environment
Distributed Computing Environment
 
Lecture - Network Technologies: Peer-to-Peer Networks
Lecture - Network Technologies: Peer-to-Peer NetworksLecture - Network Technologies: Peer-to-Peer Networks
Lecture - Network Technologies: Peer-to-Peer Networks
 
Overlay networks
Overlay networksOverlay networks
Overlay networks
 
Peer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By AhnafPeer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By Ahnaf
 
Distributed web based systems
Distributed web based systemsDistributed web based systems
Distributed web based systems
 
client server protocol
client server protocolclient server protocol
client server protocol
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Communication in Distributed Systems
Communication in Distributed SystemsCommunication in Distributed Systems
Communication in Distributed Systems
 
Chapter 03
Chapter 03Chapter 03
Chapter 03
 
W14webposter
W14webposterW14webposter
W14webposter
 
Filesharing using bittorrent protocol
Filesharing using bittorrent protocolFilesharing using bittorrent protocol
Filesharing using bittorrent protocol
 
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENTMODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT
 
Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminar
 

Viewers also liked

El Arte De La Panificacion
El Arte De La PanificacionEl Arte De La Panificacion
El Arte De La Panificacion
stellaprado
 
Natural Disasters
Natural DisastersNatural Disasters
Natural Disasters
natydiaz
 
Progetto etwinning: va' dove ti porta..il mouse
Progetto etwinning: va' dove ti porta..il mouseProgetto etwinning: va' dove ti porta..il mouse
Progetto etwinning: va' dove ti porta..il mouse
angela
 
Ed 451 lesson plan 1
Ed 451 lesson plan 1Ed 451 lesson plan 1
Ed 451 lesson plan 1
santaana1
 

Viewers also liked (20)

Land Trust Ranching in Their Hands by Anne Muller
Land Trust Ranching in Their Hands by Anne MullerLand Trust Ranching in Their Hands by Anne Muller
Land Trust Ranching in Their Hands by Anne Muller
 
Save Water
Save WaterSave Water
Save Water
 
before upload
before uploadbefore upload
before upload
 
El Arte De La Panificacion
El Arte De La PanificacionEl Arte De La Panificacion
El Arte De La Panificacion
 
test
testtest
test
 
ttttt
tttttttttt
ttttt
 
Semiología respiratoria imágenes
Semiología respiratoria imágenesSemiología respiratoria imágenes
Semiología respiratoria imágenes
 
before upload
before uploadbefore upload
before upload
 
Virtualization
VirtualizationVirtualization
Virtualization
 
latest slide
latest slidelatest slide
latest slide
 
Natural Disasters
Natural DisastersNatural Disasters
Natural Disasters
 
Progetto etwinning: va' dove ti porta..il mouse
Progetto etwinning: va' dove ti porta..il mouseProgetto etwinning: va' dove ti porta..il mouse
Progetto etwinning: va' dove ti porta..il mouse
 
Global Recycling
Global RecyclingGlobal Recycling
Global Recycling
 
كيفية تعديل خصوصية صفحتك في موقع جيران ؟
كيفية تعديل خصوصية صفحتك في موقع جيران ؟كيفية تعديل خصوصية صفحتك في موقع جيران ؟
كيفية تعديل خصوصية صفحتك في موقع جيران ؟
 
Syllabus: 8th grade science
Syllabus: 8th grade scienceSyllabus: 8th grade science
Syllabus: 8th grade science
 
Sistemas de informacion diseño de si
Sistemas de informacion   diseño de siSistemas de informacion   diseño de si
Sistemas de informacion diseño de si
 
What Is E Commerce
What Is E CommerceWhat Is E Commerce
What Is E Commerce
 
Epic Weekend
Epic WeekendEpic Weekend
Epic Weekend
 
Ed 451 lesson plan 1
Ed 451 lesson plan 1Ed 451 lesson plan 1
Ed 451 lesson plan 1
 
Ha
HaHa
Ha
 

Similar to Peer topeer

P2P Seminar
P2P SeminarP2P Seminar
P2P Seminar
CoRehab
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
Brenda Thomas
 
P2P file sharing over GPRS network using Motorola RAZR2
P2P file sharing over GPRS network using Motorola RAZR2P2P file sharing over GPRS network using Motorola RAZR2
P2P file sharing over GPRS network using Motorola RAZR2
Ritul Sonania
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)
Mumbai Academisc
 

Similar to Peer topeer (20)

Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!
 
Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptx
 
gampong.pptx
gampong.pptxgampong.pptx
gampong.pptx
 
P2P Seminar
P2P SeminarP2P Seminar
P2P Seminar
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
 
Peer To Peer File Sharing
Peer To Peer File SharingPeer To Peer File Sharing
Peer To Peer File Sharing
 
App for peer-to-peer file transfer
App for peer-to-peer file transferApp for peer-to-peer file transfer
App for peer-to-peer file transfer
 
P2P-Network.ppt
P2P-Network.pptP2P-Network.ppt
P2P-Network.ppt
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENT
 
P2P file sharing over GPRS network using Motorola RAZR2
P2P file sharing over GPRS network using Motorola RAZR2P2P file sharing over GPRS network using Motorola RAZR2
P2P file sharing over GPRS network using Motorola RAZR2
 
Peer to peer (p2p)
Peer to peer (p2p)Peer to peer (p2p)
Peer to peer (p2p)
 
Peer to peer
Peer to peerPeer to peer
Peer to peer
 
The NFS Version 4 Protocol
The NFS Version 4 ProtocolThe NFS Version 4 Protocol
The NFS Version 4 Protocol
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)
 
Peer to peer system - Mạng ngang hàng.
Peer to peer system - Mạng ngang hàng.Peer to peer system - Mạng ngang hàng.
Peer to peer system - Mạng ngang hàng.
 
Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
 
3rd edition chapter2
3rd edition chapter23rd edition chapter2
3rd edition chapter2
 
applayer.pptx
applayer.pptxapplayer.pptx
applayer.pptx
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
COMPUTER NW2 (1).pptx
COMPUTER NW2 (1).pptxCOMPUTER NW2 (1).pptx
COMPUTER NW2 (1).pptx
 

More from Higher Private School of Engineering and Technology (13)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
VOIP
VOIPVOIP
VOIP
 
Unified communication
Unified communicationUnified communication
Unified communication
 
Streaming
StreamingStreaming
Streaming
 
Sensor networks
Sensor networksSensor networks
Sensor networks
 
Qo s
Qo sQo s
Qo s
 
Mobile applications
Mobile applicationsMobile applications
Mobile applications
 
Ldap
LdapLdap
Ldap
 
I pv6
I pv6I pv6
I pv6
 
Intenet of things
Intenet of thingsIntenet of things
Intenet of things
 
Help desk
Help deskHelp desk
Help desk
 
Geolocalisation
GeolocalisationGeolocalisation
Geolocalisation
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 

Peer topeer

  • 1. 1 Peer To Peer 2009/2010
  • 2. 2 1 Introduction 2 Architecture 3 Characteristic of P2P 4 The eMule application 5 P2P File-sharing Protocols 6 Conclusion
  • 3. 3  Direct system exchange of resources between linked peers in network  The most used in the world  Basically different from the Client-server architecture
  • 4. 4 Peer to peer is a type of network infrastructure where each computer is both server and client. In this case, the computers connected to the network share their resources . • Distributed Architecture • Decentralized architecture
  • 5. 5 In a typical peer-to-peer, there is no administrator .So, each user manages his own post. On the other hand all users can share their resources as they wish. If we consider one of the posts as a server, it is intended to share resources, if not it consumes resources from other posts
  • 6. 6 For the P2P there are problems that are related to the system itself and other software. The files on these networks in addition to their potentially illegal distribution come from unverifiable sources and can contain all kinds of additives: spyware, viruses and other .. Anyway download any file whatever it is, should lead to a systematic virus verification. Also put passwords to the data, even if they are not in shared directories.
  • 7. 7  A reduced cost  Simplicity of implementation and use  Robust network,  Self-organization  Dynamism 7
  • 8. 8  This system is not centralized at all, which makes it very difficult to administer  Security is less easy to achieve  The network maintenance is difficult.  Limited change  Trafficking is most important and searching files take much longer 8
  • 9. 9 It has emerged as a software developed in Java by the exchange and sharing creators of Winamp based on essential the distributed network Gnutella. Shareaza client is a peer-to- Is based on the distributed peer for Windows that will network Fasttrack allow you to download files of any type on several popular P2P networks.
  • 10. 10 Definition : eMule is a P2P file sharing network • Based on an extended eDonkey protocol • Uses both TCP and UDP • Client Server architecture
  • 11. 11 The eMule Network :
  • 12. 12 1- Connection establishment : High ID login sequence Rejection session
  • 13. 13 2- Connection startup :  This scenario assumes that the client has a requested file list  The client sends his files  The server replies with status information  The client asks for sources for his files  The server replies with his available sources
  • 14. 14 3- File search : • A search request is sent to the server which is then answered by a search result • The user chooses to download one or more files, the client then requests sources for the chosen files and the server replies with a list of sources for each of the requested files. • An optional server status message
  • 15. 15 4- Callback mechanism: 1- A can send the server a callback request to ask B to call him back. 2- The server, which already has an open TCP connection to B, sends B a callback requested message, providing him with A’s IP and port. 3- B can then connect to A and send him the file without further overhead on the server.
  • 16. 16  UDP is used for: ◦ periodic status checks ◦ File search enhancement ◦ Source search enhancement  UDP is optional
  • 17. 17 UDP is used for verifying A’s position in B’s upload queue
  • 18. 18 The importance and the the future of P2P is to provide a role in network security and continuity.
  • 19. 19