SlideShare a Scribd company logo
1 of 19
1




Peer To
Peer
          2009/2010
2


    1   Introduction

    2   Architecture

    3   Characteristic of P2P

    4   The eMule application

    5   P2P File-sharing Protocols

    6   Conclusion
3




       Direct system exchange of resources between
        linked peers in network

       The most used in the world

       Basically different from the Client-server
        architecture
4
     Peer to peer is a type of network infrastructure where each computer is both server
     and client. In this case, the computers connected to the network share their resources .



    • Distributed Architecture                   • Decentralized architecture
5




        In a typical peer-to-peer, there is no administrator .So, each

    user manages his own post. On the other hand all users can

    share their resources as they wish. If we consider one of the

    posts as a server, it is intended to share resources, if not it

    consumes resources from other posts
6




              For the P2P there are problems that are related to the system itself and
    other software.
              The files on these networks in addition to their potentially illegal
    distribution come from unverifiable sources and can contain all kinds of additives:
    spyware, viruses and other .. Anyway download any file whatever it is, should lead
    to a systematic virus verification.
    Also put passwords to the data, even if they are not in shared directories.
7




       A reduced cost
       Simplicity of implementation and use
       Robust network,

       Self-organization
        Dynamism




                                               7
8




       This system is not centralized at all, which makes it very difficult to administer

       Security is less easy to achieve

       The network maintenance is difficult.

       Limited change

       Trafficking is most important and searching files take much longer




                                                                                     8
9



    It has emerged as a software      developed in Java by the

    exchange and sharing              creators of Winamp based on

    essential                         the distributed network
                                      Gnutella.




                                   Shareaza client is a peer-to-
    Is based on the distributed
                                   peer for Windows that will
    network Fasttrack
                                   allow you to download files
                                   of any type on several
                                   popular P2P networks.
10


     Definition :

                    eMule is a P2P file sharing network
                        • Based on an extended eDonkey protocol
                        • Uses both TCP and UDP
                        • Client Server architecture
11

     The eMule Network :
12
     1- Connection establishment :
         High ID login sequence      Rejection session
13

     2- Connection startup :

       This scenario assumes that the
        client has a requested file list
       The client sends his files
       The server replies with status
        information
       The client asks for sources for his
        files
       The server replies with his
        available sources
14

       3- File search :


     • A search request is sent to the server which is then answered
     by a search result
     • The user chooses to download one or more files, the client then
     requests sources for the chosen files and the server replies with a
     list of sources for each of the requested files.
     • An optional server status message
15

     4- Callback mechanism:




      1- A can send the server a callback request to ask B to call him back.
      2- The server, which already has an open TCP connection to B, sends B a
      callback requested message, providing him with A’s IP and port.
      3- B can then connect to A and send him the file without further overhead on
      the server.
16




        UDP is used for:

         ◦ periodic status checks

         ◦ File search enhancement

         ◦ Source search enhancement

        UDP is optional
17




     UDP is used for verifying A’s position in B’s upload queue
18




     The importance and the the future
     of P2P is to provide a role in
     network security and continuity.
19

More Related Content

What's hot

Project: Designing a Secure Network
Project: Designing a Secure NetworkProject: Designing a Secure Network
Project: Designing a Secure Network
victor okoth
 
Distributed Computing Environment
Distributed Computing EnvironmentDistributed Computing Environment
Distributed Computing Environment
Purushottam Dahal
 
Distributed web based systems
Distributed web based systemsDistributed web based systems
Distributed web based systems
Reza Gh
 
W14webposter
W14webposterW14webposter
W14webposter
s1150245
 
Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminar
balu0503
 

What's hot (20)

Network layer
Network layerNetwork layer
Network layer
 
Peer Sim & P2P
Peer Sim & P2PPeer Sim & P2P
Peer Sim & P2P
 
Project: Designing a Secure Network
Project: Designing a Secure NetworkProject: Designing a Secure Network
Project: Designing a Secure Network
 
Linux Inter Process Communication
Linux Inter Process CommunicationLinux Inter Process Communication
Linux Inter Process Communication
 
3. challenges
3. challenges3. challenges
3. challenges
 
Client server model
Client server modelClient server model
Client server model
 
Network servers
Network serversNetwork servers
Network servers
 
Distributed Computing Environment
Distributed Computing EnvironmentDistributed Computing Environment
Distributed Computing Environment
 
Lecture - Network Technologies: Peer-to-Peer Networks
Lecture - Network Technologies: Peer-to-Peer NetworksLecture - Network Technologies: Peer-to-Peer Networks
Lecture - Network Technologies: Peer-to-Peer Networks
 
Overlay networks
Overlay networksOverlay networks
Overlay networks
 
Peer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By AhnafPeer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By Ahnaf
 
Distributed web based systems
Distributed web based systemsDistributed web based systems
Distributed web based systems
 
client server protocol
client server protocolclient server protocol
client server protocol
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Communication in Distributed Systems
Communication in Distributed SystemsCommunication in Distributed Systems
Communication in Distributed Systems
 
Chapter 03
Chapter 03Chapter 03
Chapter 03
 
W14webposter
W14webposterW14webposter
W14webposter
 
Filesharing using bittorrent protocol
Filesharing using bittorrent protocolFilesharing using bittorrent protocol
Filesharing using bittorrent protocol
 
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENTMODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT
 
Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminar
 

Viewers also liked

El Arte De La Panificacion
El Arte De La PanificacionEl Arte De La Panificacion
El Arte De La Panificacion
stellaprado
 
Natural Disasters
Natural DisastersNatural Disasters
Natural Disasters
natydiaz
 
Progetto etwinning: va' dove ti porta..il mouse
Progetto etwinning: va' dove ti porta..il mouseProgetto etwinning: va' dove ti porta..il mouse
Progetto etwinning: va' dove ti porta..il mouse
angela
 
Ed 451 lesson plan 1
Ed 451 lesson plan 1Ed 451 lesson plan 1
Ed 451 lesson plan 1
santaana1
 

Viewers also liked (20)

Land Trust Ranching in Their Hands by Anne Muller
Land Trust Ranching in Their Hands by Anne MullerLand Trust Ranching in Their Hands by Anne Muller
Land Trust Ranching in Their Hands by Anne Muller
 
Save Water
Save WaterSave Water
Save Water
 
before upload
before uploadbefore upload
before upload
 
El Arte De La Panificacion
El Arte De La PanificacionEl Arte De La Panificacion
El Arte De La Panificacion
 
test
testtest
test
 
ttttt
tttttttttt
ttttt
 
Semiología respiratoria imágenes
Semiología respiratoria imágenesSemiología respiratoria imágenes
Semiología respiratoria imágenes
 
before upload
before uploadbefore upload
before upload
 
Virtualization
VirtualizationVirtualization
Virtualization
 
latest slide
latest slidelatest slide
latest slide
 
Natural Disasters
Natural DisastersNatural Disasters
Natural Disasters
 
Progetto etwinning: va' dove ti porta..il mouse
Progetto etwinning: va' dove ti porta..il mouseProgetto etwinning: va' dove ti porta..il mouse
Progetto etwinning: va' dove ti porta..il mouse
 
Global Recycling
Global RecyclingGlobal Recycling
Global Recycling
 
كيفية تعديل خصوصية صفحتك في موقع جيران ؟
كيفية تعديل خصوصية صفحتك في موقع جيران ؟كيفية تعديل خصوصية صفحتك في موقع جيران ؟
كيفية تعديل خصوصية صفحتك في موقع جيران ؟
 
Syllabus: 8th grade science
Syllabus: 8th grade scienceSyllabus: 8th grade science
Syllabus: 8th grade science
 
Sistemas de informacion diseño de si
Sistemas de informacion   diseño de siSistemas de informacion   diseño de si
Sistemas de informacion diseño de si
 
What Is E Commerce
What Is E CommerceWhat Is E Commerce
What Is E Commerce
 
Epic Weekend
Epic WeekendEpic Weekend
Epic Weekend
 
Ed 451 lesson plan 1
Ed 451 lesson plan 1Ed 451 lesson plan 1
Ed 451 lesson plan 1
 
Ha
HaHa
Ha
 

Similar to Peer topeer

P2P Seminar
P2P SeminarP2P Seminar
P2P Seminar
CoRehab
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
Brenda Thomas
 
P2P file sharing over GPRS network using Motorola RAZR2
P2P file sharing over GPRS network using Motorola RAZR2P2P file sharing over GPRS network using Motorola RAZR2
P2P file sharing over GPRS network using Motorola RAZR2
Ritul Sonania
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)
Mumbai Academisc
 

Similar to Peer topeer (20)

Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!
 
Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptx
 
gampong.pptx
gampong.pptxgampong.pptx
gampong.pptx
 
P2P Seminar
P2P SeminarP2P Seminar
P2P Seminar
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
 
Peer To Peer File Sharing
Peer To Peer File SharingPeer To Peer File Sharing
Peer To Peer File Sharing
 
App for peer-to-peer file transfer
App for peer-to-peer file transferApp for peer-to-peer file transfer
App for peer-to-peer file transfer
 
P2P-Network.ppt
P2P-Network.pptP2P-Network.ppt
P2P-Network.ppt
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENT
 
P2P file sharing over GPRS network using Motorola RAZR2
P2P file sharing over GPRS network using Motorola RAZR2P2P file sharing over GPRS network using Motorola RAZR2
P2P file sharing over GPRS network using Motorola RAZR2
 
Peer to peer (p2p)
Peer to peer (p2p)Peer to peer (p2p)
Peer to peer (p2p)
 
Peer to peer
Peer to peerPeer to peer
Peer to peer
 
The NFS Version 4 Protocol
The NFS Version 4 ProtocolThe NFS Version 4 Protocol
The NFS Version 4 Protocol
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)
 
Peer to peer system - Mạng ngang hàng.
Peer to peer system - Mạng ngang hàng.Peer to peer system - Mạng ngang hàng.
Peer to peer system - Mạng ngang hàng.
 
Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
 
3rd edition chapter2
3rd edition chapter23rd edition chapter2
3rd edition chapter2
 
applayer.pptx
applayer.pptxapplayer.pptx
applayer.pptx
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
COMPUTER NW2 (1).pptx
COMPUTER NW2 (1).pptxCOMPUTER NW2 (1).pptx
COMPUTER NW2 (1).pptx
 

More from Higher Private School of Engineering and Technology (13)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
VOIP
VOIPVOIP
VOIP
 
Unified communication
Unified communicationUnified communication
Unified communication
 
Streaming
StreamingStreaming
Streaming
 
Sensor networks
Sensor networksSensor networks
Sensor networks
 
Qo s
Qo sQo s
Qo s
 
Mobile applications
Mobile applicationsMobile applications
Mobile applications
 
Ldap
LdapLdap
Ldap
 
I pv6
I pv6I pv6
I pv6
 
Intenet of things
Intenet of thingsIntenet of things
Intenet of things
 
Help desk
Help deskHelp desk
Help desk
 
Geolocalisation
GeolocalisationGeolocalisation
Geolocalisation
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Recently uploaded

Recently uploaded (20)

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 

Peer topeer

  • 1. 1 Peer To Peer 2009/2010
  • 2. 2 1 Introduction 2 Architecture 3 Characteristic of P2P 4 The eMule application 5 P2P File-sharing Protocols 6 Conclusion
  • 3. 3  Direct system exchange of resources between linked peers in network  The most used in the world  Basically different from the Client-server architecture
  • 4. 4 Peer to peer is a type of network infrastructure where each computer is both server and client. In this case, the computers connected to the network share their resources . • Distributed Architecture • Decentralized architecture
  • 5. 5 In a typical peer-to-peer, there is no administrator .So, each user manages his own post. On the other hand all users can share their resources as they wish. If we consider one of the posts as a server, it is intended to share resources, if not it consumes resources from other posts
  • 6. 6 For the P2P there are problems that are related to the system itself and other software. The files on these networks in addition to their potentially illegal distribution come from unverifiable sources and can contain all kinds of additives: spyware, viruses and other .. Anyway download any file whatever it is, should lead to a systematic virus verification. Also put passwords to the data, even if they are not in shared directories.
  • 7. 7  A reduced cost  Simplicity of implementation and use  Robust network,  Self-organization  Dynamism 7
  • 8. 8  This system is not centralized at all, which makes it very difficult to administer  Security is less easy to achieve  The network maintenance is difficult.  Limited change  Trafficking is most important and searching files take much longer 8
  • 9. 9 It has emerged as a software developed in Java by the exchange and sharing creators of Winamp based on essential the distributed network Gnutella. Shareaza client is a peer-to- Is based on the distributed peer for Windows that will network Fasttrack allow you to download files of any type on several popular P2P networks.
  • 10. 10 Definition : eMule is a P2P file sharing network • Based on an extended eDonkey protocol • Uses both TCP and UDP • Client Server architecture
  • 11. 11 The eMule Network :
  • 12. 12 1- Connection establishment : High ID login sequence Rejection session
  • 13. 13 2- Connection startup :  This scenario assumes that the client has a requested file list  The client sends his files  The server replies with status information  The client asks for sources for his files  The server replies with his available sources
  • 14. 14 3- File search : • A search request is sent to the server which is then answered by a search result • The user chooses to download one or more files, the client then requests sources for the chosen files and the server replies with a list of sources for each of the requested files. • An optional server status message
  • 15. 15 4- Callback mechanism: 1- A can send the server a callback request to ask B to call him back. 2- The server, which already has an open TCP connection to B, sends B a callback requested message, providing him with A’s IP and port. 3- B can then connect to A and send him the file without further overhead on the server.
  • 16. 16  UDP is used for: ◦ periodic status checks ◦ File search enhancement ◦ Source search enhancement  UDP is optional
  • 17. 17 UDP is used for verifying A’s position in B’s upload queue
  • 18. 18 The importance and the the future of P2P is to provide a role in network security and continuity.
  • 19. 19