SlideShare ist ein Scribd-Unternehmen logo
1 von 38
SEMINAR ON P2P (NAPSTER) ,[object Object],[object Object],14 th  July 2008
www.freenapster.com NAPSTER 4.0
P2P(PEER to PEER) Technology ,[object Object],[object Object],[object Object],[object Object],[object Object]
P2P continued……… ,[object Object],[object Object],[object Object],[object Object],Centralized System In a centralized system a server maintains directories of what is stored in each peer computer.  The central server directs the connections between peers.  Thus, while the connection is made directly from peer to peer, a server is still necessary
Server User User User User User User User User Search Request Search Response Download Centralized Model
P2P continued…… Decentralized System With a decentralized program each peer connect directly to other peers without being directed by a server.  These connections are repeated making the resulting network, in theory, infinitely large.  In reality this size of a network is constrained by the number of layers of computers a message has to travel through.
Search Request  Search Relay Search Response Download User User User User User User User User User User Decentralized Model
 
[object Object],[object Object],[object Object],[object Object],Boston Students !!
Napster continued…. Napster is a centralized or server-based P2P network.  With a server-based network, there is a central list of information that is accessed by all the users of the system.  Here is what happened when you decided to look for the song:  1.You opened the Napster utility.  2.Napster checked for an  Internet connection.  3.If it found a connection, Napster logged you onto the central server. The main purpose of this central server was to keep  an index of all the Napster users currently online  and connect them to each other. It did not contain any of the MP3 files.  4.You typed in the title or artist of the song you were looking for.  5.The Napster utility on your computer  queried   the index server  for other Napster computers online that had the song you requested.
Napster Continued…. 6.Whenever a match was found, the Napster server informed your computer where to find the requested file.  7.When the server replied, Napster built a list of these systems in the results window.  8.You clicked on the file(s) that interested you and then chose  Download .  9.Your copy of Napster attempted to establish a connection with the system hosting the file you selected.  10.If a connection wa successfully made, the file began downloading.  11.Once the file wa downloaded, the host computer broke the connection with your system.  12.You opened up your MP3 player software and listened to the song.
 
Comparisons of Centralized and Distributed Model ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
 
Points to Ponder…. ,[object Object],[object Object],[object Object],[object Object],[object Object]
Hybrid P2P Technology  ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
It’s Hybrid P2P Technology !!!
Research on P2P… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Research cloud….
News on P2P….
 
 
Popular P2P Clients…
 
 
 
 
Common Terms Used in P2P Peer A peer is anyone who is downloading or uploading the file Client The software that allows you to download and upload (share) files using Torrent. The Torrent client opens the .torrent file and allows connections from your peers. Tracker A tracker is a server that keeps track of which seeds and peers are in the swarm. Clients report information to the tracker periodically and in exchange receive information about other clients to which they can connect Seeder A seeder is a peer that has a complete copy of the torrent and still offers it for upload. The more seeders there are, the better the chances are for completion of the file. Leech A leech is usually a peer who has a negative effect on the swarm by having a very poor share ratio, however it can also refer to any peer without 100% of the data Swarm Together, all peers (including seeders) sharing a torrent are called a swarm.
 
 
Queries?
Mail your Feedback to venkatesh.stud@gmail.com
Thank You…

Weitere ähnliche Inhalte

Was ist angesagt?

QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006Kalman Graffi
 
P2P Seminar
P2P SeminarP2P Seminar
P2P SeminarCoRehab
 
Citcism on Peer to peer networking
Citcism on Peer to peer networkingCitcism on Peer to peer networking
Citcism on Peer to peer networkingWebix.pk
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networkingicanhasfay
 
Peer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By AhnafPeer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By Ahnafahnarokz
 
P2P Lookup Protocols
P2P Lookup ProtocolsP2P Lookup Protocols
P2P Lookup ProtocolsZubin Bhuyan
 
Peer to peer data management
Peer to peer data managementPeer to peer data management
Peer to peer data managementJunaid Lodhi
 
peer to peer and client server model
peer to peer and client server modelpeer to peer and client server model
peer to peer and client server modelBharath Nair
 
Computer networks : intro to networking, pros and cons, uses, network edges :...
Computer networks : intro to networking, pros and cons, uses, network edges :...Computer networks : intro to networking, pros and cons, uses, network edges :...
Computer networks : intro to networking, pros and cons, uses, network edges :...Kaushik Panta
 
Client Server Network By Usman Ihsan
Client Server Network By Usman IhsanClient Server Network By Usman Ihsan
Client Server Network By Usman IhsanSubhan_Virk_UAF
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocolGLIM Digital
 
Introduction to computer networks
Introduction to computer networks Introduction to computer networks
Introduction to computer networks Basma Gamal
 
Internet Architecture and Design Philosophy
Internet Architecture and Design PhilosophyInternet Architecture and Design Philosophy
Internet Architecture and Design PhilosophyDilum Bandara
 
Types of network
Types of networkTypes of network
Types of networkishjari
 

Was ist angesagt? (20)

Peer to peer
Peer to peerPeer to peer
Peer to peer
 
QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006
 
P2P Seminar
P2P SeminarP2P Seminar
P2P Seminar
 
Citcism on Peer to peer networking
Citcism on Peer to peer networkingCitcism on Peer to peer networking
Citcism on Peer to peer networking
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 
Peer to peer system
Peer to peer systemPeer to peer system
Peer to peer system
 
Peer to peer(p2 p)
Peer to peer(p2 p)Peer to peer(p2 p)
Peer to peer(p2 p)
 
Peer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By AhnafPeer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By Ahnaf
 
P2P Lookup Protocols
P2P Lookup ProtocolsP2P Lookup Protocols
P2P Lookup Protocols
 
Peer to peer data management
Peer to peer data managementPeer to peer data management
Peer to peer data management
 
Peer to-peer network
Peer to-peer networkPeer to-peer network
Peer to-peer network
 
peer to peer and client server model
peer to peer and client server modelpeer to peer and client server model
peer to peer and client server model
 
Computer networks : intro to networking, pros and cons, uses, network edges :...
Computer networks : intro to networking, pros and cons, uses, network edges :...Computer networks : intro to networking, pros and cons, uses, network edges :...
Computer networks : intro to networking, pros and cons, uses, network edges :...
 
Client Server Network By Usman Ihsan
Client Server Network By Usman IhsanClient Server Network By Usman Ihsan
Client Server Network By Usman Ihsan
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basic
 
Introduction to computer networks
Introduction to computer networks Introduction to computer networks
Introduction to computer networks
 
Networks
NetworksNetworks
Networks
 
Internet Architecture and Design Philosophy
Internet Architecture and Design PhilosophyInternet Architecture and Design Philosophy
Internet Architecture and Design Philosophy
 
Types of network
Types of networkTypes of network
Types of network
 

Andere mochten auch

Case study 4
Case study 4Case study 4
Case study 4av_cuby
 
Napster and Mp3: Redefining the music industry
Napster and Mp3: Redefining the music industryNapster and Mp3: Redefining the music industry
Napster and Mp3: Redefining the music industryPuneet Arora
 
Legal ethics & cloud computing
Legal ethics & cloud computingLegal ethics & cloud computing
Legal ethics & cloud computingPatrick Fowler
 
eBook piracy - Waiting for a napster moment
eBook piracy - Waiting for anapster momenteBook piracy - Waiting for anapster moment
eBook piracy - Waiting for a napster momentMathias Klang
 
Tech Talks @NSU: Архитектура Skype
Tech Talks @NSU: Архитектура SkypeTech Talks @NSU: Архитектура Skype
Tech Talks @NSU: Архитектура SkypeTech Talks @NSU
 
LAJUG Napster REST API
LAJUG Napster REST APILAJUG Napster REST API
LAJUG Napster REST APIstephenbhadran
 
P2P Multiplayer Gaming
P2P Multiplayer GamingP2P Multiplayer Gaming
P2P Multiplayer GamingJohn Wilker
 
History of Internet
History of InternetHistory of Internet
History of InternetOsama05
 
A&M Records Inc v Napster
A&M Records Inc v NapsterA&M Records Inc v Napster
A&M Records Inc v NapsterBhaumik Oza
 
Sinnreich Henry Johnston Alan Pt 3
Sinnreich Henry Johnston Alan   Pt 3Sinnreich Henry Johnston Alan   Pt 3
Sinnreich Henry Johnston Alan Pt 3Carl Ford
 
Vulnerabilities in SaaS layer of cloud computing
Vulnerabilities in SaaS layer of cloud computingVulnerabilities in SaaS layer of cloud computing
Vulnerabilities in SaaS layer of cloud computingClinton DSouza
 
Network Centric Warfare - An Introduction
Network Centric Warfare - An IntroductionNetwork Centric Warfare - An Introduction
Network Centric Warfare - An IntroductionD.A. Mohan
 
Napster killed itil
Napster killed itilNapster killed itil
Napster killed itilcraggles10
 
A Brief History of the Internet
A Brief History of the InternetA Brief History of the Internet
A Brief History of the InternetCharles Severance
 
Service provided by internet
Service provided by internetService provided by internet
Service provided by internetHardik Patel
 
Linus Lee: Napster And Inequality
Linus Lee: Napster And InequalityLinus Lee: Napster And Inequality
Linus Lee: Napster And Inequalitymerlyna
 

Andere mochten auch (20)

Case study 4
Case study 4Case study 4
Case study 4
 
Napster
NapsterNapster
Napster
 
Napster and Mp3: Redefining the music industry
Napster and Mp3: Redefining the music industryNapster and Mp3: Redefining the music industry
Napster and Mp3: Redefining the music industry
 
Ww Napster Mobile
Ww Napster MobileWw Napster Mobile
Ww Napster Mobile
 
Legal ethics & cloud computing
Legal ethics & cloud computingLegal ethics & cloud computing
Legal ethics & cloud computing
 
eBook piracy - Waiting for a napster moment
eBook piracy - Waiting for anapster momenteBook piracy - Waiting for anapster moment
eBook piracy - Waiting for a napster moment
 
Tech Talks @NSU: Архитектура Skype
Tech Talks @NSU: Архитектура SkypeTech Talks @NSU: Архитектура Skype
Tech Talks @NSU: Архитектура Skype
 
LAJUG Napster REST API
LAJUG Napster REST APILAJUG Napster REST API
LAJUG Napster REST API
 
P2P Multiplayer Gaming
P2P Multiplayer GamingP2P Multiplayer Gaming
P2P Multiplayer Gaming
 
p2p通信之nat
p2p通信之natp2p通信之nat
p2p通信之nat
 
History of Internet
History of InternetHistory of Internet
History of Internet
 
A&M Records Inc v Napster
A&M Records Inc v NapsterA&M Records Inc v Napster
A&M Records Inc v Napster
 
Sinnreich Henry Johnston Alan Pt 3
Sinnreich Henry Johnston Alan   Pt 3Sinnreich Henry Johnston Alan   Pt 3
Sinnreich Henry Johnston Alan Pt 3
 
Vulnerabilities in SaaS layer of cloud computing
Vulnerabilities in SaaS layer of cloud computingVulnerabilities in SaaS layer of cloud computing
Vulnerabilities in SaaS layer of cloud computing
 
Network Centric Warfare - An Introduction
Network Centric Warfare - An IntroductionNetwork Centric Warfare - An Introduction
Network Centric Warfare - An Introduction
 
Napster killed itil
Napster killed itilNapster killed itil
Napster killed itil
 
A Brief History of the Internet
A Brief History of the InternetA Brief History of the Internet
A Brief History of the Internet
 
Service provided by internet
Service provided by internetService provided by internet
Service provided by internet
 
Linus Lee: Napster And Inequality
Linus Lee: Napster And InequalityLinus Lee: Napster And Inequality
Linus Lee: Napster And Inequality
 
P2P Supernodes
P2P SupernodesP2P Supernodes
P2P Supernodes
 

Ähnlich wie P2p Peer To Peer Introduction

Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptxHananShk
 
Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!DigitalThinkerHelp
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...Brenda Thomas
 
Textual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networksTextual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networksUvaraj Shan
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGijp2p
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGijp2p
 
Peer to peer_v2pptx
Peer to peer_v2pptxPeer to peer_v2pptx
Peer to peer_v2pptxMac Pat
 
Commonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & ApplicationsCommonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & Applications905426
 
Bittorrent final seminar
Bittorrent final seminarBittorrent final seminar
Bittorrent final seminarChirodeep Das
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocolD bipul lomga
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technologyguestc67adeb
 
Peer to peer (p2p)
Peer to peer (p2p)Peer to peer (p2p)
Peer to peer (p2p)Harshini
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technologyabhipesit
 
Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks IJECEIAES
 
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSEFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSijp2p
 
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSEFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSijp2p
 

Ähnlich wie P2p Peer To Peer Introduction (20)

Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptx
 
Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
 
Textual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networksTextual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networks
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
 
Peer to peer_v2pptx
Peer to peer_v2pptxPeer to peer_v2pptx
Peer to peer_v2pptx
 
Commonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & ApplicationsCommonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & Applications
 
Bittorrent final seminar
Bittorrent final seminarBittorrent final seminar
Bittorrent final seminar
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
 
Peer to peer (p2p)
Peer to peer (p2p)Peer to peer (p2p)
Peer to peer (p2p)
 
Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
 
BitTorrent Seminar Report
BitTorrent Seminar ReportBitTorrent Seminar Report
BitTorrent Seminar Report
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
P2p networks
P2p networksP2p networks
P2p networks
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technology
 
Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks
 
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSEFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
 
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSEFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
 

Kürzlich hochgeladen

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

P2p Peer To Peer Introduction

  • 1.
  • 3.
  • 4.
  • 5. Server User User User User User User User User Search Request Search Response Download Centralized Model
  • 6. P2P continued…… Decentralized System With a decentralized program each peer connect directly to other peers without being directed by a server. These connections are repeated making the resulting network, in theory, infinitely large. In reality this size of a network is constrained by the number of layers of computers a message has to travel through.
  • 7. Search Request Search Relay Search Response Download User User User User User User User User User User Decentralized Model
  • 8.  
  • 9.
  • 10. Napster continued…. Napster is a centralized or server-based P2P network. With a server-based network, there is a central list of information that is accessed by all the users of the system. Here is what happened when you decided to look for the song: 1.You opened the Napster utility. 2.Napster checked for an Internet connection. 3.If it found a connection, Napster logged you onto the central server. The main purpose of this central server was to keep an index of all the Napster users currently online and connect them to each other. It did not contain any of the MP3 files. 4.You typed in the title or artist of the song you were looking for. 5.The Napster utility on your computer queried the index server for other Napster computers online that had the song you requested.
  • 11. Napster Continued…. 6.Whenever a match was found, the Napster server informed your computer where to find the requested file. 7.When the server replied, Napster built a list of these systems in the results window. 8.You clicked on the file(s) that interested you and then chose Download . 9.Your copy of Napster attempted to establish a connection with the system hosting the file you selected. 10.If a connection wa successfully made, the file began downloading. 11.Once the file wa downloaded, the host computer broke the connection with your system. 12.You opened up your MP3 player software and listened to the song.
  • 12.  
  • 13.
  • 14.  
  • 15.  
  • 16.  
  • 17.
  • 18.
  • 19.  
  • 20.  
  • 21. It’s Hybrid P2P Technology !!!
  • 22.
  • 23.  
  • 24.
  • 26.  
  • 27.  
  • 29.  
  • 30.  
  • 31.  
  • 32.  
  • 33. Common Terms Used in P2P Peer A peer is anyone who is downloading or uploading the file Client The software that allows you to download and upload (share) files using Torrent. The Torrent client opens the .torrent file and allows connections from your peers. Tracker A tracker is a server that keeps track of which seeds and peers are in the swarm. Clients report information to the tracker periodically and in exchange receive information about other clients to which they can connect Seeder A seeder is a peer that has a complete copy of the torrent and still offers it for upload. The more seeders there are, the better the chances are for completion of the file. Leech A leech is usually a peer who has a negative effect on the swarm by having a very poor share ratio, however it can also refer to any peer without 100% of the data Swarm Together, all peers (including seeders) sharing a torrent are called a swarm.
  • 34.  
  • 35.  
  • 37. Mail your Feedback to venkatesh.stud@gmail.com