1 / 13

Peer-to-Peer Uses

Virtual Private Community, enables information in Peer-to-Peer services to act as an ... Windows Messenger and Yahoo! Messenger are members of IMunified. ...

DoraAna
Download Presentation

Peer-to-Peer Uses

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    Peer-to-Peer Networking By: Peter Diggs Ken Arrant P2P VIRTUALPrivate COMMUNITY (VPC) Virtual Private Community, enables information in Peer-to-Peer services to act as an agent. VPC provides a mechanism that defines an agent behavior, authenticate users, and executes agents. Agents for a peer-to-peer service are defined in a policy package that consists of a condition rule to decide active agents according to user. A set of agents (Called roles), and necessary information (Contents) for the service. Agents communicate with each other through communities that are created by agents who have accepted the policy packages. Services are offered by interaction among agents in communities. For example, in a music retail service, a policy package defines contain two agent An authorized agent which can play the complete music file. And a trial agent which can play only part of the music file. OVERALL Peer-To-Peer Architecture: The agents for the system fall into two categories. Those that send and receive the search requests. And those that service them against the resource and their ontology description. Agent send out the created search request, marked ‘RequestsAgent’ which is defined as the endpoint for the results being returned,as either an array of results or individual result from the peers hosting the resources. A search agent receives requests and passes them onto the peers it knows about, while at the same time performing the search on all the agents for each of the resources being shared on that user. SearchAgent communicates both with other peers on the network and other agents running on the local peer. The other agents found in the system, marked as Resource SearchAgent are designed and built to match any search query to the resource they know about, whether that is a set of files on the system or other resources available to users. The results are passed back to the SearchAgent on the same peer, which then get passed on back to the originator. ResultsAgent SearchAgent Resource SearchAgent Resource SearchAgent ResultsAgent ResultsAgent ResultsAgent LOCALT Peer OTHER Peers LACK OF CONTROL: Assimilating P2P systems within large corporations IT people live to centralize data To centralize application usage Most importantly to centralize their control. P2P data is distributed among multiple computers Not on a single hyper-secure server. P2P is too insecure P2P encourages employees to visit unacceptable sites on company time. UNRELIABLE ACCESS: Finding the file you want is a problem Maybe the user who had the file deleted it, or moved it to another folder Disconnected their internet connection and turned off their PC. A big downside about decentralized file storage across a P2P network. Problem of file swapping services.

    Slide 7:Peer-to-Peer Uses

    File Sharing Instant Messaging Distributed Search Engines Group Collaboration Distributed Computing

    Slide 8:File Sharing

    -Allowing files on one computer to available for others to download. Examples Napster Gnutella -Similar to Napster, but uses third party clients to connect to their network -http://en.wikipedia.org/wiki/Gnutella a list of Gnutella clients KaZaA Mojo Nation -First file-sharing application to use distributed load balancing. Freenet -An open-source file sharing program Pointera -The first legal “Napster type” file sharing software

    Slide 9:Instant Messaging

    - Communicating with another person on a network in real time using text. Examples AIM -Combined with AOL’s buddy list there are over 65 million users ICQ -The first instant messaging program, developed in 1996 Windows Messenger Yahoo! Messenger Jabber -An open-source instant messaging provider Downside Most IM providers are not compatible. Because of this some providers have joined to form IMunified, and organization trying to develop open standards for instant messaging. Windows Messenger and Yahoo! Messenger are members of IMunified.

    Slide 10:Distributed Search Engines

    - Rather than searching content on public web sites, distributed search engines search individual computers. - One computer queries an x amount of other computers, which then query the same amount of computers. This continues until the query is canceled. Examples JXTA Search Pandango Copernic

    Slide 11:Group Collaboration

    - Allows multiple users to take part in group projects in real time. - Uses IM, telephony, video, and file sharing. Examples Groove Networks -Current leading provider NetMeeting -Microsoft’s version IntraLinks

    Slide 12:Distributed Computing

    Sharing your computer Software installed on the computer processes activities when the computer is idle. Then it uploads the results to the distributed computing network Allows for processing power similar to large mainframes and supercomputers. Example Projects SETI@home - Over 3 million participants, analyzes radio waves looking for intelligent life in outer space. United Devices - Includes projects for genetic and cancer research.

    Slide 13:Security

    Blocking access on your computer to a single folder Access Control – restricting access to certain files and folders (Windows XP sharing and security option) Viruses - Worries are more with the speed a virus can spread than the ease of it, it’s just as easy to get a virus through email. Providing similar file names to trick downloader’s, if someone is looking for YMCA.mp3 the virus may be named YMCA.exe Wrapping – Disguising a file type as a different type, such as disguising an .exe file and an .mp3 file. File sharing can be used to stop viruses by spreading virus updates (MyCIO.com)

More Related