You are on page 1of 46

Seminar By:

Sanket Mhaiskar
Guided By:
Mr.G.Arsalwad
INTRODUCTION
INTRODUCTION
What is P2P?
What does a Peer mean in P2P?
Client-Server Model
Difference in Their Structures
Peer-to-Peer Architecture
Peer-to-Peer Architecture
Architecture

Based on File Listing Based on Node Connections

Centralized Decentralized Unstructured Structured


Peer-to-Peer Architecture
 Depending upon the listing of files:
 Centralized (Hybrid)
 Decentralized

 Depending upon how the nodes are connected:


 Unstructured
 Structured
Peer-to-Peer Architecture
 Centralized (Hybrid)

 File listing exists on central server


 All peers connect to this central server
 Examples: Napster, ICQ
Peer-to-Peer Architecture
 Decentralized

 No Central Server
 Each node connected to many other nodes
 May be pure Peer-to-Peer or with Super Peers
 Examples: Gnutella, BitTorrent
Peer-to-Peer Architecture
 Unstructured

 Nodes created arbitrarily


 Each node copies link information from other connected
nodes
 Simple, however not efficient
 Examples: FastTrack, Gnutella
Peer-to-Peer Architecture
 Structured

 Implements algorithms to ensure connection between


nodes.
 Efficient, however complex algorithms involved
 Examples: DHT and HyperCuP
P2P APPLICATIONS
P2P APPLICATIONS
 Napster
 Gnutella
BitTorrent
Napster
 Introduction
 Peers connect to the Central Server
 File request sent to the server
 Server responds with the ID of the sharing peer
 Peers are directly connected for file transfers
 Control messages used to ignoring spam users, sending
private messages, creating favorites list, etc
Napster:The Cycle
Napster:The Cycle
Napster:The Cycle
Napster:The Cycle
Gnutella
 Peers connected to each other in flat ad-hoc topology
 Each peers – acts as client and server
 Dynamic network – Peers can connect and disconnect as
they wish without affecting the network
Gnutella
 Connection procedure in Gnutella network
Gnutella
 File Query and Response in Gnutella
Gnutella
 Gnutella Clients

 BearShare
 LimeWire
 Cabos
 Shareaza
Gnutella
 Gnutella – Analysis and Improvement

 Flexibility
 Performance & Stability
 Reliability
 Anonymity
BitTorrent

 Based on decentralized network


 Files are divided into pieces or blocks
 Pieces can be of size from 64 kB to 4 MB
 Pieces can be further fragmented into blocks of 16 kB
BitTorrent
 Trackers – tracks seeders, leechers and file pieces from
different users
 Seeders – Hold complete files and shares with other peers
 Leechers – Download files from other peers
BitTorrent

 Users download .torrent files which includes meta-data


information
 Torrent files can have one or multiple trackers
 Files are downloaded in pieces or blocks
 Implements file sharing fairness
BitTorrent: Overall
Architecture
BitTorrent: Overall
Architecture
BitTorrent: Overall
Architecture
BitTorrent: Overall
Architecture
BitTorrent: Overall
Architecture
BitTorrent: Overall
Architecture
BitTorrent: Overall
Architecture
BitTorrent: Overall
Architecture
Types of P2P Networks
 BitTorrent Clients

 Azureus
 BitComet
 µTorrent
 BitTorrent
Other Applications Using P2P
Other Applications Using P2P
Skype-P2P over VOIP

Peer2ME
Challenges in P2P
Challenges in P2P
 Challenges faced in P2P networks

 Distribution of copyrighted files


 Security Issues
 Bandwidth Consumption
Challenges in P2P
 Distribution of Copyrighted Files

 Several P2P networks sued by music companies and


private organizations (RIAA, MPAA, ARIA)
 Users are also targeted
 Copyright laws limited to few countries
Challenges in P2P
 Security Issues

 Spread of virus, malware, spyware, adware, etc


 Use of Steganography
 Spread of null files
Peers can be assigned reputation values
 Pseudospoofing & Shilling attacks
Challenges in P2P
 Bandwidth Consumption

 Bandwidth for existing Internet traffic (2007)


CONCLUSION
Why P2P??
Eliminating the risk of a single point of failure
Eliminating single source bottleneck and load balancing.
Remote Maintanence
Potential of P2P networks are vast and still being
discovered and developed
 Can be used, not only for file transfer, but also real time
media streaming, VOIP, distributed computing, etc
THANK YOU

You might also like