1 “Commonly Used P2P Communications methods & Program” By Farhan Afzal Saifee 090301067 Instructor : Dr. Ezgi Deniz Ulker
Jun 27, 2015
1
“Commonly Used P2P Communications
methods & Program”
By Farhan Afzal Saifee 090301067
Instructor : Dr. Ezgi Deniz Ulker
2
CONTENTS
• What is Peer to Peer?- Properties of Peer to Peer
• Knowledge of Client – Server Architecture.
• How does Internet P2P works?
• Peer to Peer Systems Modes- Centralized, Decentralized or Hierarchical
• Types of Peer 2 Peer Network.
• Commonly Used Peer to Peer Programs.
3
What is Peer to Peer?
• The term Peer refers to a user computer
• Peer to Peer defines a communication (exchange of information) that takes place between two or more nodes at a particular time without a dedicated server.
• In that case a Peer can be Client and a Server at the same time (Servant)
• Many P2P networks (including the original Napster) are not pure peer networks as they somehow utilize central servers for some functions
4
Properties of Peer to Peer Systems
1. Unreliable, uncoordinated, unmanaged
- No central authority, peers are completely independent
- Increases flexibility of individual peers.
2. Large collection of resources
-Voluntary participation, global reach
-Millions of simultaneous users
3. Network is dynamic: nodes enter and leave the network
“frequently” and Nodes are Anonymous.
5
Knowledge of Client - Server
• It is a system that includes a client and a server, and the client-server model works as a series of transactions between the two.
1. The client initiates the transaction by sending a request to the server,
2. And the server, which is always in a state of readiness to accept requests, responds by providing a service or resource to the client.
6
How does Internet P2P Works.
1. User downloads and executes a peer-to-peer networking program (Gnutellanet )
2. User enters the IP address of another computer belonging to the network. (Must know 3 - 5 Addresses)
3. Once the computer finds another network member on-line, it will connect to that user's connection (who has gotten their IP address from another user's connection and so on).
4. Users can choose how many member connections to seek at one time and determine which files they wish to share or password protect.
7
Peer to Peer System Modes.
Peer to Peer System
Centralized Architecture
Brokered Architecture
Napster
De-Centralized Architecture
Freenet, Gnutella
Hierarchical
Kazaa , Skype
8
Centralized model
Global index held by a central authority
(single point of failure)
Brokered Architecture
direct contact between requestors and providers
Example: Napster
P2P System models (1)
9
How Napster Works
0 – Every Servant is registering to the broker
1 – Servant contacts the broker that has the information of the resources held by other servants who are registered to the broker
2 - Broker responds to the servant, sends the IP address of a servant that has the desired file.
3 – The downloading process takes place.
10
P2P System models (2)
Decentralized model
Examples: Gnutella
no global index, no central coordination, Interaction takes place between the nodes
Direct contact between requestors and providers (Gnutella)
0 - Starts to search servant that keeps the resource. When it finds the data, it’s private address is given back.
1 - Resource and address known, they started to communicate (file transmission).
11
P2P System models (3)
Hierarchical model
Introduction of “super-peers” or “Super-Nodes”
Mix of centralized and decentralized model
Example: FastTrack Protocol,Kazaa
12
Types of Peer to Peer Network
Peer-to-peer networks come in three flavors. The category
classification is based on the network and application.
• Collaborative Computing Also referred to as distributed computing, it combines
the idle or unused CPU processing power and/or free disk space of many computers in the network.
• Instant Messaging where software applications, such as MSN Messenger
or AOL Instant Messenger, for example, allow users to chat via text messages in real-time
• Affinity Communities One of the group of P2P networks that is based
around file-sharing
13
Commonly Used Peer to Peer Programs.
1. BitTorrent
2. Ares
3. Limewire
4. Skype
5. Yahoo Messenger
6. Ebay Web Application
7. Viber
8. Tango
9. FrostWire
14
Commonly Used Peer to Peer Programs. “SKYPE”
Skype is a peer-to-peer (p2p) VoIP client developed by the organization that created Kazaa.
It is very similar to the MSN and Yahoo IM applications, as it has capabilities for voice-calls, instant messaging
The underlying protocols and techniques it employs are quite different
Two types of nodes in this overlay network, ordinary hosts and super nodes (SN).
• An ordinary host is a Skype application that can be used to place voice calls and send text messages.
• A super node is an ordinary host’s end-point on the
Skype network.
15
“SKYPE” Cont…
16
“SKYPE” Cont…
17
“SKYPE” Cont…
• Skype clearly has both peer-to-peer components as well as client-server components
• Account data is stored in central servers. But audio streams from peer to peer.
• The contact list, as well as the authentication, as you noticed, goes through Skype's servers
18
Thank you for your Attention