Peer to Peer Network Anas Hardan. What is a Network? What is a Network? A network is a group of computers and other devices (such as printers) that are.

Slides:



Advertisements
Similar presentations
Data Communications and Networking
Advertisements

Networking Some of the basics. What is a Network Simply put, its two or more computer connected together through a communication medium. A communication.
LANs and WANs Network size, vary from –simple office system (few PCs) to –complex global system(thousands PCs) Distinguish by the distances that the network.
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Spotlighting Decentralized P2P File Sharing Archie Kuo and Ethan Le Department of Computer Science San Jose State University.
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
Principles of Information Technology
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
Copyright©2008 N.AlJaffan®KSU1 Chapter 8 Communications and Networks.
Core 3: Communication Systems. On any network there are two types of computers present – servers and clients. By definition Client-Server architecture.
By: Aarman Tarapore 10cc.  a network is a series of points or nodes interconnected by communication paths. Networks can interconnect with other networks.
Network Done by: Athra sultan.
CPMT 1449 Computer Networking Technology – Lesson 1
NETWORK CHONGSEOK PARK 10DD MRS. VEENA MONY Content.
Chapter 5 Networks Communicating and Sharing Resources
Chapter 1 An Introduction to Networking
Networks. What is a Network? Two or more computers linked together so they can send and receive data. We use them for sending s, downloading files,
LECTURE 9 CT1303 LAN. LAN DEVICES Network: Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and.
NETWORK Topologies An Introduction.
Open up Evernote, mini whiteboards.  2 minutes – write down as many as you can think of.
What Is A Network A network is a group of computers interconnected with communication lines which allows users to share information and resources.
Network+ Guide to Networks, Fourth Edition
BitTorrent Internet Technologies and Applications.
Networks Types & Topologies. Objectives  To understand the two different setup of networks and their characteristics  Know the 3 different types of.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
What is a Topology? The physical topology of a network refers to the configuration of cables, computers, and other peripherals. Physical topology should.
Understanding Networks. What is a Network?  A network consists of two or more computers that are linked in order to share resources (such as printers.
Networked Information Systems 1 Advantages of and classified by their size & architecture or design.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 38 How Music Sharing and File Sharing Work.
Without reference, identify principles relating to Computer Networks with at least 70 percent accuracy.
Basic Concepts of a Computer Network
Bit Torrent A good or a bad?. Common methods of transferring files in the internet: Client-Server Model Peer-to-Peer Network.
Networking By Nachiket Agrawal 10DD Contents Network Stand Alone LAN Advantages and Disadvantages of LAN Advantages and Disadvantages of LAN Cabled LAN.
$100 $200 $300 $400 $500 Network topologies Client Architecture Physical Transmission Media Uses of Tele communications Misc. Network Misc. Network.
BASIC NETWORKS. What is a Network? A network consists of two or more computers that are linked in order to share resources exchange files, or allow electronic.
Networking Classification A network is two or more computers that are connected 1 There size 2 Their Servers.
PEER TO PEER (P2P) NETWORK By: Linda Rockson 11/28/06.
Understand the Components of a Network Mrs. Whaley.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Networks Am I hooked up?. Networks definition sizes of networks types advantages and disadvantages how data is sent transmission media business uses.
Networking Basics 8th Grade
Networking  Networking is of linking two or more computing devices together for the purpose of sharing data.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
WEEK 11 – TOPOLOGIES, TCP/IP, SHARING & SECURITY IT1001- Personal Computer Hardware System & Operations.
Communications & Networks National 4 & 5 Computing Science.
Introduction TO Network Administration
What Is A Network A network is a group of computers interconnected with communication lines which allows users to share information and resources.
Bit Torrent Nirav A. Vasa. Topics What is BitTorrent? Related Terms How BitTorrent works Steps involved in the working Advantages and Disadvantages.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
Activity 1 5 minutes to discuss and feedback on the following:
Computer Network Architecture Lecture 2: Fundamental of Network.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.
Introduction to Networking. What is a Network? Discuss in groups.
Computer Networks – the basics Week 1 Lesson 1. In this project, you will be learning about the computer networks which we use every day – when we log.
Chapter 3.  The advantages and disadvantages of: ◦ Client-Server Networks & ◦ Peer-to-Peer Networks.
By Mr Mohammed. Objectives Describe what a client/server network is Some students will be able to explain the difference between the two networks along.
COMPUTER NETWORKS Quizzes 5% First practical exam 5% Final practical exam 10% LANGUAGE.
Introduction Chapter 1. Introduction  A computer network is two or more computers connected together so they can communicate with one another.  Two.
An Introduction to Local Area Networks An Overview of Peer-to-Peer and Server-Based Models.
Computer Networks CSC September 23,
Network - definition A network is defined as a collection of computers and peripheral devices (such as printers) connected together. A local area network.
An example of peer-to-peer application
Computer Networks Part 1
Designing a local area network
An Introduction to Computer Networking
Computer communications
Unit 11- Computer Networks
Presentation transcript:

Peer to Peer Network Anas Hardan

What is a Network? What is a Network? A network is a group of computers and other devices (such as printers) that are connected by some type of transmission media. A network is a group of computers and other devices (such as printers) that are connected by some type of transmission media. Networks may be as small as two computers connected by a cable in a home office or as large as several thousand computers connected across the world via a combination of cable, phone lines, and satellite links. Networks may be as small as two computers connected by a cable in a home office or as large as several thousand computers connected across the world via a combination of cable, phone lines, and satellite links.

Why Use Networks? Why Use Networks? Networks enable multiple users to: Networks enable multiple users to: Share devices like printers. Share devices like printers. Data like spreadsheet files. Data like spreadsheet files. Sharing devices saves money. Sharing devices saves money. Sharing devices also saves time. Sharing devices also saves time. Another advantage to networks is that they allow you to manage, or administer, resources on multiple Another advantage to networks is that they allow you to manage, or administer, resources on multiple computers from a central location. computers from a central location.

network models: network models: Peer-to-Peer Peer-to-Peer Client/Server Client/Server

Peer-to-Peer Networks Peer-to-Peer Networks The simplest form of a network is a peer-to-peer The simplest form of a network is a peer-to-peer network. network. In a peer-to-peer network, every computer can In a peer-to-peer network, every computer can communicate directly with every other computer. communicate directly with every other computer. Each computer can be configured to share only Each computer can be configured to share only some of its resources and keep other resources some of its resources and keep other resources inaccessible to the network. inaccessible to the network. Every computer has the ability to send and receive Every computer has the ability to send and receive information from every other computer. information from every other computer.

Peer-to-Peer Networks

P2P File Sharing Networks P2P file sharing systems have become the single most popular class of Internet applications in this decade. P2P file sharing systems have become the single most popular class of Internet applications in this decade. A P2P network implements search and data transfer protocols above the Internet Protocol (IP). To access a P2P network, users simply download and install a suitable P2P client application. A P2P network implements search and data transfer protocols above the Internet Protocol (IP). To access a P2P network, users simply download and install a suitable P2P client application.

How second generation P2P services worked Gnutella2: Hubs are used to quickly search for files, eliminating the original "find peer and search" method. Instead, they store a list of files on all the "Leaves" (A peer) that are connected to it, thus dramatically reducing search time. Advantages: if a hub crashes, it's network stays alive. Disadvantages: Doesn't make network any more durable than the first generation of P2P. Gnutella2: Gnutella2: Hubs are used to quickly search for files, eliminating the original "find peer and search" method. Instead, they store a list of files on all the "Leaves" (A peer) that are connected to it, thus dramatically reducing search time. Advantages: if a hub crashes, it's network stays alive. Disadvantages: Doesn't make network any more durable than the first generation of P2P. Gnutella2:

FastTrack: Programs such as Kazaa and iMesh use the FastTrack protocol. Normal peers connect to a super node which acts just like a hub. Super nodes also connect to other super nodes, allowing search requests to move through the network very quickly. Peers then establish a direct connection to a client after a file has been found. Advantages: Any client can become a super node. Disadvantages: Corruption of files occur. Clients include: Kazaa ( iMesh ( FastTrack: Programs such as Kazaa and iMesh use the FastTrack protocol. Normal peers connect to a super node which acts just like a hub. Super nodes also connect to other super nodes, allowing search requests to move through the network very quickly. Peers then establish a direct connection to a client after a file has been found. Advantages: Any client can become a super node. Disadvantages: Corruption of files occur. Clients include: Kazaa ( iMesh (

BitTorrent:.torrent files are used to store information about the file being shared. Once a torrent file is opened, the client connects to the tracker which tells the client where the file is located and what other peers/seeders there are. BitTorrent works by chunks of small files being transferred (even through multiple connections), while you are downloading. The files are checked for corruption as the download continues. Leeches are people who download and don't upload, and are highly frowned upon on some sites, disallowing them from downloading any further. Advantages: Very fast. Disadvantages: Trackers are unreliable and if it goes down, the file is lost. BitTorrent:.torrent files are used to store information about the file being shared. Once a torrent file is opened, the client connects to the tracker which tells the client where the file is located and what other peers/seeders there are. BitTorrent works by chunks of small files being transferred (even through multiple connections), while you are downloading. The files are checked for corruption as the download continues. Leeches are people who download and don't upload, and are highly frowned upon on some sites, disallowing them from downloading any further. Advantages: Very fast. Disadvantages: Trackers are unreliable and if it goes down, the file is lost.

EDonkey Network: Edonkey runs on the same principle as first generation P2P, only anybody can become a server. Clients communicate with the server to download files, and random chunks can be downloaded in any order then put together in the end. Advantages: No file corruption, leech penalization. Disadvantages: It can penalize users unfairly. EDonkey: EDonkey Network: Edonkey runs on the same principle as first generation P2P, only anybody can become a server. Clients communicate with the server to download files, and random chunks can be downloaded in any order then put together in the end. Advantages: No file corruption, leech penalization. Disadvantages: It can penalize users unfairly. EDonkey:

The advantages They are simple to configure. They are simple to configure. They are typically less expensive to set up and maintain than other They are typically less expensive to set up and maintain than other types of networks. types of networks. Users control individual shared resources. Users control individual shared resources. No need of a network administrator. No need of a network administrator.

disadvantages They are not very flexible - As a peer-to- peer network grows larger, adding or changing significant elements of the network may be difficult. They are not very flexible - As a peer-to- peer network grows larger, adding or changing significant elements of the network may be difficult. They are also not necessarily secure - meaning that in simple installations, data and other resources shared by network users can be easily discovered and used by unauthorized people They are also not necessarily secure - meaning that in simple installations, data and other resources shared by network users can be easily discovered and used by unauthorized people They are not practical for connecting more than a handful of computers, because they do not always centralize resources. They are not practical for connecting more than a handful of computers, because they do not always centralize resources.