SlideShare una empresa de Scribd logo
1 de 38
SEMINAR ON P2P (NAPSTER) ,[object Object],[object Object],14 th  July 2008
www.freenapster.com NAPSTER 4.0
P2P(PEER to PEER) Technology ,[object Object],[object Object],[object Object],[object Object],[object Object]
P2P continued……… ,[object Object],[object Object],[object Object],[object Object],Centralized System In a centralized system a server maintains directories of what is stored in each peer computer.  The central server directs the connections between peers.  Thus, while the connection is made directly from peer to peer, a server is still necessary
Server User User User User User User User User Search Request Search Response Download Centralized Model
P2P continued…… Decentralized System With a decentralized program each peer connect directly to other peers without being directed by a server.  These connections are repeated making the resulting network, in theory, infinitely large.  In reality this size of a network is constrained by the number of layers of computers a message has to travel through.
Search Request  Search Relay Search Response Download User User User User User User User User User User Decentralized Model
 
[object Object],[object Object],[object Object],[object Object],Boston Students !!
Napster continued…. Napster is a centralized or server-based P2P network.  With a server-based network, there is a central list of information that is accessed by all the users of the system.  Here is what happened when you decided to look for the song:  1.You opened the Napster utility.  2.Napster checked for an  Internet connection.  3.If it found a connection, Napster logged you onto the central server. The main purpose of this central server was to keep  an index of all the Napster users currently online  and connect them to each other. It did not contain any of the MP3 files.  4.You typed in the title or artist of the song you were looking for.  5.The Napster utility on your computer  queried   the index server  for other Napster computers online that had the song you requested.
Napster Continued…. 6.Whenever a match was found, the Napster server informed your computer where to find the requested file.  7.When the server replied, Napster built a list of these systems in the results window.  8.You clicked on the file(s) that interested you and then chose  Download .  9.Your copy of Napster attempted to establish a connection with the system hosting the file you selected.  10.If a connection wa successfully made, the file began downloading.  11.Once the file wa downloaded, the host computer broke the connection with your system.  12.You opened up your MP3 player software and listened to the song.
 
Comparisons of Centralized and Distributed Model ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
 
Points to Ponder…. ,[object Object],[object Object],[object Object],[object Object],[object Object]
Hybrid P2P Technology  ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
It’s Hybrid P2P Technology !!!
Research on P2P… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Research cloud….
News on P2P….
 
 
Popular P2P Clients…
 
 
 
 
Common Terms Used in P2P Peer A peer is anyone who is downloading or uploading the file Client The software that allows you to download and upload (share) files using Torrent. The Torrent client opens the .torrent file and allows connections from your peers. Tracker A tracker is a server that keeps track of which seeds and peers are in the swarm. Clients report information to the tracker periodically and in exchange receive information about other clients to which they can connect Seeder A seeder is a peer that has a complete copy of the torrent and still offers it for upload. The more seeders there are, the better the chances are for completion of the file. Leech A leech is usually a peer who has a negative effect on the swarm by having a very poor share ratio, however it can also refer to any peer without 100% of the data Swarm Together, all peers (including seeders) sharing a torrent are called a swarm.
 
 
Queries?
Mail your Feedback to venkatesh.stud@gmail.com
Thank You…

Más contenido relacionado

La actualidad más candente

QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006
Kalman Graffi
 
P2P Seminar
P2P SeminarP2P Seminar
P2P Seminar
CoRehab
 
peer to peer and client server model
peer to peer and client server modelpeer to peer and client server model
peer to peer and client server model
Bharath Nair
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
GLIM Digital
 
Types of network
Types of networkTypes of network
Types of network
ishjari
 

La actualidad más candente (20)

Peer to peer
Peer to peerPeer to peer
Peer to peer
 
QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006
 
P2P Seminar
P2P SeminarP2P Seminar
P2P Seminar
 
Citcism on Peer to peer networking
Citcism on Peer to peer networkingCitcism on Peer to peer networking
Citcism on Peer to peer networking
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 
Peer to peer system
Peer to peer systemPeer to peer system
Peer to peer system
 
Peer to peer(p2 p)
Peer to peer(p2 p)Peer to peer(p2 p)
Peer to peer(p2 p)
 
Peer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By AhnafPeer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By Ahnaf
 
P2P Lookup Protocols
P2P Lookup ProtocolsP2P Lookup Protocols
P2P Lookup Protocols
 
Peer to peer data management
Peer to peer data managementPeer to peer data management
Peer to peer data management
 
Peer to-peer network
Peer to-peer networkPeer to-peer network
Peer to-peer network
 
peer to peer and client server model
peer to peer and client server modelpeer to peer and client server model
peer to peer and client server model
 
Computer networks : intro to networking, pros and cons, uses, network edges :...
Computer networks : intro to networking, pros and cons, uses, network edges :...Computer networks : intro to networking, pros and cons, uses, network edges :...
Computer networks : intro to networking, pros and cons, uses, network edges :...
 
Client Server Network By Usman Ihsan
Client Server Network By Usman IhsanClient Server Network By Usman Ihsan
Client Server Network By Usman Ihsan
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basic
 
Introduction to computer networks
Introduction to computer networks Introduction to computer networks
Introduction to computer networks
 
Networks
NetworksNetworks
Networks
 
Internet Architecture and Design Philosophy
Internet Architecture and Design PhilosophyInternet Architecture and Design Philosophy
Internet Architecture and Design Philosophy
 
Types of network
Types of networkTypes of network
Types of network
 

Destacado

Napster and Mp3: Redefining the music industry
Napster and Mp3: Redefining the music industryNapster and Mp3: Redefining the music industry
Napster and Mp3: Redefining the music industry
Puneet Arora
 
eBook piracy - Waiting for a napster moment
eBook piracy - Waiting for anapster momenteBook piracy - Waiting for anapster moment
eBook piracy - Waiting for a napster moment
Mathias Klang
 
Sinnreich Henry Johnston Alan Pt 3
Sinnreich Henry Johnston Alan   Pt 3Sinnreich Henry Johnston Alan   Pt 3
Sinnreich Henry Johnston Alan Pt 3
Carl Ford
 
Vulnerabilities in SaaS layer of cloud computing
Vulnerabilities in SaaS layer of cloud computingVulnerabilities in SaaS layer of cloud computing
Vulnerabilities in SaaS layer of cloud computing
Clinton DSouza
 
Linus Lee: Napster And Inequality
Linus Lee: Napster And InequalityLinus Lee: Napster And Inequality
Linus Lee: Napster And Inequality
merlyna
 

Destacado (20)

Case study 4
Case study 4Case study 4
Case study 4
 
Napster
NapsterNapster
Napster
 
Napster and Mp3: Redefining the music industry
Napster and Mp3: Redefining the music industryNapster and Mp3: Redefining the music industry
Napster and Mp3: Redefining the music industry
 
Ww Napster Mobile
Ww Napster MobileWw Napster Mobile
Ww Napster Mobile
 
Legal ethics & cloud computing
Legal ethics & cloud computingLegal ethics & cloud computing
Legal ethics & cloud computing
 
eBook piracy - Waiting for a napster moment
eBook piracy - Waiting for anapster momenteBook piracy - Waiting for anapster moment
eBook piracy - Waiting for a napster moment
 
Tech Talks @NSU: Архитектура Skype
Tech Talks @NSU: Архитектура SkypeTech Talks @NSU: Архитектура Skype
Tech Talks @NSU: Архитектура Skype
 
LAJUG Napster REST API
LAJUG Napster REST APILAJUG Napster REST API
LAJUG Napster REST API
 
P2P Multiplayer Gaming
P2P Multiplayer GamingP2P Multiplayer Gaming
P2P Multiplayer Gaming
 
p2p通信之nat
p2p通信之natp2p通信之nat
p2p通信之nat
 
History of Internet
History of InternetHistory of Internet
History of Internet
 
A&M Records Inc v Napster
A&M Records Inc v NapsterA&M Records Inc v Napster
A&M Records Inc v Napster
 
Sinnreich Henry Johnston Alan Pt 3
Sinnreich Henry Johnston Alan   Pt 3Sinnreich Henry Johnston Alan   Pt 3
Sinnreich Henry Johnston Alan Pt 3
 
Vulnerabilities in SaaS layer of cloud computing
Vulnerabilities in SaaS layer of cloud computingVulnerabilities in SaaS layer of cloud computing
Vulnerabilities in SaaS layer of cloud computing
 
Network Centric Warfare - An Introduction
Network Centric Warfare - An IntroductionNetwork Centric Warfare - An Introduction
Network Centric Warfare - An Introduction
 
Napster killed itil
Napster killed itilNapster killed itil
Napster killed itil
 
A Brief History of the Internet
A Brief History of the InternetA Brief History of the Internet
A Brief History of the Internet
 
Service provided by internet
Service provided by internetService provided by internet
Service provided by internet
 
Linus Lee: Napster And Inequality
Linus Lee: Napster And InequalityLinus Lee: Napster And Inequality
Linus Lee: Napster And Inequality
 
P2P Supernodes
P2P SupernodesP2P Supernodes
P2P Supernodes
 

Similar a P2p Peer To Peer Introduction

A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
Brenda Thomas
 
Commonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & ApplicationsCommonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & Applications
905426
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
guestc67adeb
 

Similar a P2p Peer To Peer Introduction (20)

Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptx
 
Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
 
Textual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networksTextual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networks
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
 
Peer to peer_v2pptx
Peer to peer_v2pptxPeer to peer_v2pptx
Peer to peer_v2pptx
 
Commonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & ApplicationsCommonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & Applications
 
Bittorrent final seminar
Bittorrent final seminarBittorrent final seminar
Bittorrent final seminar
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
 
Peer to peer (p2p)
Peer to peer (p2p)Peer to peer (p2p)
Peer to peer (p2p)
 
Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
 
BitTorrent Seminar Report
BitTorrent Seminar ReportBitTorrent Seminar Report
BitTorrent Seminar Report
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
P2p networks
P2p networksP2p networks
P2p networks
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technology
 
Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks
 
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSEFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
 
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSEFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

P2p Peer To Peer Introduction

  • 1.
  • 3.
  • 4.
  • 5. Server User User User User User User User User Search Request Search Response Download Centralized Model
  • 6. P2P continued…… Decentralized System With a decentralized program each peer connect directly to other peers without being directed by a server. These connections are repeated making the resulting network, in theory, infinitely large. In reality this size of a network is constrained by the number of layers of computers a message has to travel through.
  • 7. Search Request Search Relay Search Response Download User User User User User User User User User User Decentralized Model
  • 8.  
  • 9.
  • 10. Napster continued…. Napster is a centralized or server-based P2P network. With a server-based network, there is a central list of information that is accessed by all the users of the system. Here is what happened when you decided to look for the song: 1.You opened the Napster utility. 2.Napster checked for an Internet connection. 3.If it found a connection, Napster logged you onto the central server. The main purpose of this central server was to keep an index of all the Napster users currently online and connect them to each other. It did not contain any of the MP3 files. 4.You typed in the title or artist of the song you were looking for. 5.The Napster utility on your computer queried the index server for other Napster computers online that had the song you requested.
  • 11. Napster Continued…. 6.Whenever a match was found, the Napster server informed your computer where to find the requested file. 7.When the server replied, Napster built a list of these systems in the results window. 8.You clicked on the file(s) that interested you and then chose Download . 9.Your copy of Napster attempted to establish a connection with the system hosting the file you selected. 10.If a connection wa successfully made, the file began downloading. 11.Once the file wa downloaded, the host computer broke the connection with your system. 12.You opened up your MP3 player software and listened to the song.
  • 12.  
  • 13.
  • 14.  
  • 15.  
  • 16.  
  • 17.
  • 18.
  • 19.  
  • 20.  
  • 21. It’s Hybrid P2P Technology !!!
  • 22.
  • 23.  
  • 24.
  • 26.  
  • 27.  
  • 29.  
  • 30.  
  • 31.  
  • 32.  
  • 33. Common Terms Used in P2P Peer A peer is anyone who is downloading or uploading the file Client The software that allows you to download and upload (share) files using Torrent. The Torrent client opens the .torrent file and allows connections from your peers. Tracker A tracker is a server that keeps track of which seeds and peers are in the swarm. Clients report information to the tracker periodically and in exchange receive information about other clients to which they can connect Seeder A seeder is a peer that has a complete copy of the torrent and still offers it for upload. The more seeders there are, the better the chances are for completion of the file. Leech A leech is usually a peer who has a negative effect on the swarm by having a very poor share ratio, however it can also refer to any peer without 100% of the data Swarm Together, all peers (including seeders) sharing a torrent are called a swarm.
  • 34.  
  • 35.  
  • 37. Mail your Feedback to venkatesh.stud@gmail.com