Title: PeertoPeer Networking
1Peer-to-Peer Networking By Peter Diggs Ken Arrant
2P2P VIRTUALPrivate COMMUNITY (VPC)
- Virtual Private Community, enables information in
Peer-to-Peer services to act as an agent. VPC
provides a mechanism that defines an agent
behavior, authenticate users, and executes
agents. - Agents for a peer-to-peer service are defined in
a policy package that consists of a condition
rule to decide active agents according to user. - A set of agents (Called roles), and necessary
information (Contents) for the service. - Agents communicate with each other through
communities that are created by agents who have
accepted the policy packages. - Services are offered by interaction among agents
in communities. - For example, in a music retail service, a
policy package defines contain two agent - An authorized agent which can play the
- complete music file.
- And a trial agent which can play only part of
- the music file.
-
3OVERALL Peer-To-Peer Architecture
- The agents for the system fall into two
categories. - Those that send and receive the search
requests. - And those that service them against the
resource and their ontology - description.
- Agent send out the created search request, marked
RequestsAgent - which is defined as the endpoint for
the results being returned,as either an array of
results or individual result from the peers
hosting the resources. - A search agent receives requests and passes them
onto the peers it knows about, while at the same
time performing the search on all the agents for
each of the resources being shared on that user. - SearchAgent communicates both with other peers on
the network and other agents running on the local
peer. - The other agents found in the system, marked as
Resource SearchAgent are designed and built to
match any search query to the - resource they know about, whether that
is a set of files on the system or other
resources available to users. - The results are passed back to the SearchAgent on
the same peer, which then get passed on back to
the originator. -
-
-
4ResultsAgent
LOCALT Peer
Resource SearchAgent
SearchAgent
Resource SearchAgent
OTHER Peers
ResultsAgent
ResultsAgent
ResultsAgent
5- LACK OF CONTROL
- Assimilating P2P systems within large
corporations - IT people live to centralize data
- To centralize application usage
- Most importantly to centralize their control.
- P2P data is distributed among multiple computers
- Not on a single hyper-secure server.
- P2P is too insecure
- P2P encourages employees to visit unacceptable
- sites on company time.
6UNRELIABLE ACCESS Finding the file you want is
a problem Maybe the user who had the file deleted
it, or moved it to another folder Disconnected
their internet connection and turned off their
PC. A big downside about decentralized file
storage across a P2P network. Problem of file
swapping services.
7Peer-to-Peer Uses
- File Sharing
- Instant Messaging
- Distributed Search Engines
- Group Collaboration
- Distributed Computing
8File Sharing
-Allowing files on one computer to available for
others to download.
- Examples
- Napster
- Gnutella
- -Similar to Napster, but uses third party
clients to connect to their network - -http//en.wikipedia.org/wiki/Gnutella a
list of Gnutella clients - KaZaA
- Mojo Nation
- -First file-sharing application to use
distributed load balancing. - Freenet
- -An open-source file sharing program
- Pointera
- -The first legal Napster type file sharing
software
9Instant Messaging
- Communicating with another person on a network
in real time using text.
- Examples
- AIM
- -Combined with AOLs buddy list there are over 65
million users - ICQ
- -The first instant messaging
program, developed in 1996 - Windows Messenger
- Yahoo! Messenger
- Jabber
- -An open-source instant messaging provider
- Downside
- Most IM providers are not compatible.
- Because of this some providers have joined to
form IMunified, and organization trying to
develop open standards for instant messaging. - Windows Messenger and Yahoo! Messenger are
members of IMunified.
10Distributed Search Engines
- - Rather than searching content on public web
sites, distributed search engines search
individual computers. - - One computer queries an x amount of other
computers, which then query the same amount of
computers. This continues until the query is
canceled.
- Examples
- JXTA Search
- Pandango
- Copernic
11Group Collaboration
- - Allows multiple users to take part in group
projects in real time. - - Uses IM, telephony, video, and file sharing.
- Examples
- Groove Networks
- -Current leading provider
- NetMeeting
- -Microsofts version
- IntraLinks
12Distributed Computing
- Sharing your computer
- Software installed on the computer processes
activities when the computer is idle. Then it
uploads the results to the distributed computing
network - Allows for processing power similar to large
mainframes and supercomputers.
- Example Projects
- SETI_at_home
- - Over 3 million participants, analyzes radio
waves looking for intelligent life in outer
space. - United Devices
- - Includes projects for genetic and cancer
research.
13Security
- Blocking access on your computer to a single
folder - Access Control restricting access to certain
files and folders (Windows XP sharing and
security option) - Viruses - Worries are more with the speed a virus
can spread than the ease of it, its just as easy
to get a virus through email. - Providing similar file names to trick
downloaders, if someone is looking for YMCA.mp3
the virus may be named YMCA.exe - Wrapping Disguising a file type as a different
type, such as disguising an .exe file and an .mp3
file. - File sharing can be used to stop viruses by
spreading virus updates (MyCIO.com)