Presentation is loading. Please wait.

Presentation is loading. Please wait.

Peer-to-Peer Networking By: Peter Diggs Ken Arrant.

Similar presentations


Presentation on theme: "Peer-to-Peer Networking By: Peter Diggs Ken Arrant."— Presentation transcript:

1 Peer-to-Peer Networking By: Peter Diggs Ken Arrant

2 P2P VIRTUALPrivate COMMUNITY (VPC) Virtual Private Community, enables information in Peer-to-Peer services to act as an agent. VPC provides a mechanism that defines an agent behavior, authenticate users, and executes agents. Agents for a peer-to-peer service are defined in a policy package that consists of a condition rule to decide active agents according to user. A set of agents (Called roles), and necessary information (Contents) for the service. Agents communicate with each other through communities that are created by agents who have accepted the policy packages. Services are offered by interaction among agents in communities. For example, in a music retail service, a policy package defines contain two agent An authorized agent which can play the complete music file. And a trial agent which can play only part of the music file.

3 OVERALL Peer-To-Peer Architecture: The agents for the system fall into two categories. Those that send and receive the search requests. And those that service them against the resource and their ontology description. Agent send out the created search request, marked ‘RequestsAgent’ which is defined as the endpoint for the results being returned,as either an array of results or individual result from the peers hosting the resources. A search agent receives requests and passes them onto the peers it knows about, while at the same time performing the search on all the agents for each of the resources being shared on that user. SearchAgent communicates both with other peers on the network and other agents running on the local peer. The other agents found in the system, marked as Resource SearchAgent are designed and built to match any search query to the resource they know about, whether that is a set of files on the system or other resources available to users. The results are passed back to the SearchAgent on the same peer, which then get passed on back to the originator.

4 ResultsAgent SearchAgent Resource SearchAgent Resource SearchAgent ResultsAgent LOCALT Peer OTHER Peers

5 LACK OF CONTROL: Assimilating P2P systems within large corporations IT people live to centralize data To centralize application usage Most importantly to centralize their control. P2P data is distributed among multiple computers Not on a single hyper-secure server. P2P is too insecure P2P encourages employees to visit unacceptable sites on company time.

6 UNRELIABLE ACCESS: Finding the file you want is a problem Maybe the user who had the file deleted it, or moved it to another folder Disconnected their internet connection and turned off their PC. A big downside about decentralized file storage across a P2P network. Problem of file swapping services.

7 Peer-to-Peer Uses 1.File Sharing 2.Instant Messaging 3.Distributed Search Engines 4.Group Collaboration 5.Distributed Computing

8 File Sharing -Allowing files on one computer to available for others to download. Examples Napster Gnutella -Similar to Napster, but uses third party clients to connect to their network -http://en.wikipedia.org/wiki/Gnutella a list of Gnutella clients KaZaA Mojo Nation -First file-sharing application to use distributed load balancing. Freenet -An open-source file sharing program Pointera -The first legal “Napster type” file sharing software

9 Instant Messaging - Communicating with another person on a network in real time using text. Examples AIM -Combined with AOL’s buddy list there are over 65 million users ICQ -The first instant messaging program, developed in 1996 Windows Messenger Yahoo! Messenger Jabber -An open-source instant messaging provider Downside -Most IM providers are not compatible. -Because of this some providers have joined to form IMunified, and organization trying to develop open standards for instant messaging. -Windows Messenger and Yahoo! Messenger are members of IMunified.

10 Distributed Search Engines - Rather than searching content on public web sites, distributed search engines search individual computers. - One computer queries an x amount of other computers, which then query the same amount of computers. This continues until the query is canceled. Examples JXTA Search Pandango Copernic

11 Group Collaboration - Allows multiple users to take part in group projects in real time. - Uses IM, telephony, video, and file sharing. Examples Groove Networks -Current leading provider NetMeeting -Microsoft’s version IntraLinks

12 Distributed Computing - Sharing your computer - Software installed on the computer processes activities when the computer is idle. Then it uploads the results to the distributed computing network - Allows for processing power similar to large mainframes and supercomputers. Example Projects SETI@home - Over 3 million participants, analyzes radio waves looking for intelligent life in outer space. United Devices - Includes projects for genetic and cancer research.

13 Security Blocking access on your computer to a single folder Blocking access on your computer to a single folder Access Control – restricting access to certain files and folders (Windows XP sharing and security option) Access Control – restricting access to certain files and folders (Windows XP sharing and security option) Viruses - Worries are more with the speed a virus can spread than the ease of it, it’s just as easy to get a virus through email. Viruses - Worries are more with the speed a virus can spread than the ease of it, it’s just as easy to get a virus through email. Providing similar file names to trick downloader’s, if someone is looking for YMCA.mp3 the virus may be named YMCA.exe Providing similar file names to trick downloader’s, if someone is looking for YMCA.mp3 the virus may be named YMCA.exe Wrapping – Disguising a file type as a different type, such as disguising an.exe file and an.mp3 file. Wrapping – Disguising a file type as a different type, such as disguising an.exe file and an.mp3 file. File sharing can be used to stop viruses by spreading virus updates (MyCIO.com) File sharing can be used to stop viruses by spreading virus updates (MyCIO.com)


Download ppt "Peer-to-Peer Networking By: Peter Diggs Ken Arrant."

Similar presentations


Ads by Google