yyyp2pharsh

download yyyp2pharsh

of 19

Transcript of yyyp2pharsh

  • 8/2/2019 yyyp2pharsh

    1/19

    BE COMPUTER SEMINAR

    September 8th 2003 Wankhede Yogesh k. 1/19

    Seminar Presentation

    on

    PEER TO PEER NETWORKS

    Under the Guidance ofMR. B. R. MANDRE

    Submitted ByWANKHEDE YOGESH K.

    DEPARTMENT OF COMPUTER ENGINEERING

    S.S.V.P.S.s B.S. DEORE COLLEGE OF ENGINEERING, DHULE.

    2003 - 2004

    BE COMPUTER SEMINAR

  • 8/2/2019 yyyp2pharsh

    2/19

    BE COMPUTER SEMINAR

    September 8th 2003 Wankhede Yogesh k. 2/19

    1.INTRODUCTION

    2.PEER-TO-PEER NETWORKS

    3. P2P MODELS

    4. GNUTELLA

    5.FREENET

    6.MOBILE P2P

    7.P2P SECURITY

    8.P2P APPLICATIONS

    9.CONCLUSION

    BIBLIOGRAPHY

  • 8/2/2019 yyyp2pharsh

    3/19

    BE COMPUTER SEMINAR

    September 8th 2003 Wankhede Yogesh k. 3/19

    INTRODUCTION Introduction to P2P.

    Workstations having equivalent capabilities &responsibilities.

    Each node is both consumer & provider.

    Offers opportunities for real time communication.

    BE COMPUTER SEMINAR

  • 8/2/2019 yyyp2pharsh

    4/19

  • 8/2/2019 yyyp2pharsh

    5/19

    BE COMPUTER SEMINAR

    September 8th 2003 Wankhede Yogesh k. 5/19

    Peer To Peer Networks

    What is P2P?

    Decentralized approach.

    Each computer functions as client as

    well as server.Definition of P2P by Webopodia.

  • 8/2/2019 yyyp2pharsh

    6/19

    BE COMPUTER SEMINAR

    September 8th 2003 Wankhede Yogesh k. 6/19

    Peer To Peer Networks

    P2P & Client/Server networks. Advantages and Disadvantages

    of client/server networks.

    Advantages and Disadvantagesof P2P networks.

    P2P and client/server networks

    Client/Server Network

    P2P Network

  • 8/2/2019 yyyp2pharsh

    7/19

    BE COMPUTER SEMINAR

    September 8th 2003 Wankhede Yogesh k. 7/19

    P2P Models

    Five Models of P2P communication.

    1. PureP2P:Two devices talk w/o

    any central device.

    2. P2P with simple Discovery server:Server used to discover location of

    peers.

  • 8/2/2019 yyyp2pharsh

    8/19

    BE COMPUTER SEMINAR

    September 8th 2003 Wankhede Yogesh k. 8/19

    P2P Models

    P2P with Discovery & Lookup Server.

    Server also functions as Lookupserver.

    P2P with Discovery, Lookup &Content Server.

    P2P model can be reduced back toclient/server model if we rely moreand more on the server.

    Federated P2P

    Recently evolved communicationmodel.

  • 8/2/2019 yyyp2pharsh

    9/19

    BE COMPUTER SEMINAR

    September 8th 2003 Wankhede Yogesh k. 9/19

    Gnutella What is Gnutella?

    Technical Overview of Gnutella v.4.

    Runs over TCP/IP connection. Used in hybrid networks.

    Gnutella Packets.

    Message ID (16bytes)

    Function ID (1byte)

    TTL (1 byte) Hops (1 byte)Payload length(4 bytes)

  • 8/2/2019 yyyp2pharsh

    10/19

    BE COMPUTER SEMINAR

    September 8th 2003 Wankhede Yogesh k. 10/19

    What is Freenet?

    Completely distributed decentralized system.

    Communication is handled at global level

    Operates at application layer.

    Main design goals.

    Anonymity for both producer & consumer.

    Efficient dynamic storage & routing info.

    Decentralization of all network.

    Freenet

  • 8/2/2019 yyyp2pharsh

    11/19

    BE COMPUTER SEMINAR

    September 8th 2003 Wankhede Yogesh k. 11/19

    Freenet Freenet Architecture.

    Basic model. Keys are passed from node to node & each node takes

    decision for passing req.

    Route vary acc. to key request.

    Decrement hop-to-live limit. Assign pseudo-unique random identifier to each req.

    Continue till satisfy the requests.

    Advantages and Disadvantages of Freenet.

  • 8/2/2019 yyyp2pharsh

    12/19

    BE COMPUTER SEMINAR

    September 8th 2003 Wankhede Yogesh k. 12/19

    MobileP2P Introduction.

    Basic components ofarchitecture.

    Peer to peer node.

    Mobile proxy.

    P2P wireless homecommunication.

    Technologies.

    Bluetooth.

    Wireless LAN.

  • 8/2/2019 yyyp2pharsh

    13/19

    BE COMPUTER SEMINAR

    September 8th 2003 Wankhede Yogesh k. 13/19

    P2P Security

    Requirements Confidentiality, integrity & availability.

    Factors like privacy,DRM & identity management.

    Security advantages.Privacy

    No central point of knowledge.

    Web of trust.

    Locality.

  • 8/2/2019 yyyp2pharsh

    14/19

    BE COMPUTER SEMINAR

    September 8th 2003 Wankhede Yogesh k. 14/19

    P2P Applications

    Important P2P applications. Content distribution for sharing files, photographs, medical

    images etc.

    Distributed search.

    Collaborations for designing auto, planes etc.Home applications.

    Other applications. Sever overlay.

    First responder network.Self organizing network.

    Ad-hoc networks.

  • 8/2/2019 yyyp2pharsh

    15/19

    BE COMPUTER SEMINAR

    September 8th 2003 Wankhede Yogesh k. 15/19

    P2P Applications

    Ideas for future.

    Opportunities offered bi Internet2.

    Enterprise space applications.

  • 8/2/2019 yyyp2pharsh

    16/19

    BE COMPUTER SEMINAR

    September 8th 2003 Wankhede Yogesh k. 16/19

    Conclusion

    P2P Technology is still evolving.

    P2P will replace client/server model in near future. Perfectly fit to the home environment.

  • 8/2/2019 yyyp2pharsh

    17/19

    BE COMPUTER SEMINAR

    September 8th 2003 Wankhede Yogesh k. 17/19

    ANY QUESTIONS?

  • 8/2/2019 yyyp2pharsh

    18/19

    BE COMPUTER SEMINAR

    September 8th 2003 Wankhede Yogesh k. 18/19

    Thank You

  • 8/2/2019 yyyp2pharsh

    19/19

    BE COMPUTER SEMINAR

    September 8th 2003 Wankhede Yogesh k. 19/19

    BIBLIOGRAPHY References

    [Tommo Reti, Yki Kortesniemi and Mikko Vlimki, Broadcasting CommercialData on Mobile Peer-to-Peer Networks Tokyo Mobile Roundtable 2002.

    Jari Sukanen, Peer-to-peer Communication, Helsinki University ofTechnology, Telecommunications Software and Multimedia Laboratory.

    Takeshi Kato, A Platform and Applicationsfor Mobile Peer-to-PeerCommunications,Ericsson Research Torshamnsgatan 23, Kista SE-16480

    Stockholm Sweden.

    Web sites

    http://www.peer-to-peerwg.org/

    http://www.openp2p.com http://www.yahoo.com

    http://www.peer-to-peerwg.org/http://www.openp2p.com/http://www.openp2p.com/http://www.openp2p.com/http://www.openp2p.com/http://www.peer-to-peerwg.org/http://www.peer-to-peerwg.org/http://www.peer-to-peerwg.org/http://www.peer-to-peerwg.org/http://www.peer-to-peerwg.org/