Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.

13
Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize

Transcript of Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.

Page 1: Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.

Peer to Peer Networks

November 28, 2007Jenni AakerDavid Mize

Page 2: Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.

Outline

• Definition of P2P• P2P vs. Client/server• Sharing Large Files• Security and Risks• Applications• Discussion: current P2P issues• Survey results

Page 3: Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.

Peer to Peer Networks (P2P)

“A method of file sharing over a network in which individual computers are linked via the

Internet or a private network to share programs/files. Users download files directly

from other users' computers, rather than from a central server.”

-Harvard information technology Department

Page 4: Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.

P2P structure

Nodes ( computers )communicating to each other through with out dedicated servers or hierarchy

Nodes work as both clients and servers to the other nodes in the network

Users decide what can and can’t be accessed

Page 5: Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.

VS.

P2P vs. Client/Server Networks

Page 6: Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.

Using P2P to share /large files

• To share large files from one node to another would use too much bandwidth and take to long. To solve that BitTorrent is a method of distributing large amounts of data widely without the original distributor incurring the entire costs of hardware, hosting and bandwidth resources

• The more nodes in a network the quicker and more efficient the file will travel

Page 7: Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.

Risks of P2P

• poisoning attacks• polluting attacks• freeloaders• insertion of viruses to carried data• malware in the peer-to-peer network software itself• denial of service attacks• filtering• identity attacks• spamming

Page 8: Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.

How to Protect Yourself

• Don't Use P2P On a Corporate Network

• Beware The Client Software

• Don't Share Everything

• Scan Everything

Page 9: Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.

How to protect your Business

• Attempt to control your desktops to prevent P2P software from being installed

• Limit the traffic at the firewall

• Educate your users!!!

Ex: Japanese Policeman

Page 10: Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.

Applications

• Limewire - File Sharing • BitTorrent – File Sharing• Joost - P2P TV• Skype - P2P Phone

Page 11: Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.

Discussion: current P2P issues

• Comcast Sued for Blocking P2P Sites

• Anti-P2P college bill advances in House

Page 12: Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.

Survey ResultsAny specific questions that you want answered

from the readings?

• Nope

• I'd like to know more about Joost

Page 13: Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.

Peer to Peer Networks

What is it? Current issues

Applications

Risks?

How does it work?

Small connections

Large files, BIT Torrent Protect your

business

Protect yourself

File sharingLegal P2P

sites?

Phone, TV, media

Large Networks

Basic