SlideShare uma empresa Scribd logo
1 de 17
Prepared by:
Khane Luqman
Hewa Omer
Hanan Siyamand
Amer Jabar
Supervised by Ass. Lecturer:
Omar Shirko
Peer to Peer Networks
Erbil Polytechnic University
College of engineering
Information System Engineering
2 DEC 2021
OUTLINE
Introduction
History
What is Peer to Peer Network
Why to Use P2P Network
How to Work Peer to Peer Network?
Peer to Peer Architecture
Applications of Peer to Peer Architecture
Types of Peer to Peer Network
P2P Networking Pros and Cons
P2P Network Safety Hints
P2P Network Example – Torrents
Peer-to-Peer
Client/Server
The Difference between Client/Server and Peer-to-Peer Network.
Introduction
The "peers" in a peer-to-peer network are
computer systems that are connected to each
other over the Internet.
Without the use of a central server, files can
be shared directly between systems on the
network.
In 1979, the world was introduced to the first P2P network in the form of Usenet, a system
that allowed users to post and exchange messages and news in a manner similar to today's
online forums and message boards; the only difference was that Usenet did not operate
under the control of a central server or administrator.
By 1999, the internet had become commonplace, and many businesses and households in
North America had internet connection (although the slow dial-up version!).
Now, 20 years later, P2P remains one of the most popular technologies for sharing files over
the internet- in both legal and illegal circumstances.
History
What is Peer to Peer Network
All "Peers" in a peer-to-peer network refer to all computers that are
connected to each other via the internet. Because there is no central
server in a peer-to-peer network, each user can exchange any type
of file with any other peer.
How Peer to Peer Networks Work?
When consumers want to download a file from the internet, they
must first open a web browser and navigate to the right website. In
this case, the website serves as the server, while the user's PC
serves as the client, receiving all files. This concept works as a
one-way road, moving downloaded data from point 1 (the
website) to point 2 (the user's PC system).
Peer to Peer Architecture
peer to peer (P2P) architecture is generally implemented over
computer networking architecture. Because each computer in
this network acts as an independent workstation and may save
all data on its own hard disk, P2P architecture is best suited
for small areas such as a house or a small office.
Types of Peer to Peer Network
Pure Peer to Peer Network
All peers play the role equally because this P2P network does not contain
centralized dedicated server.
Unstructured P2P Networks
All devices have to make same contribution, but due to lack of structure,
users can face some difficulties for searching rare content.
Structured P2P Networks
Structured peer to peer networks are more difficult to set up than
unstructured peer to peer networks, but they give consumers better access
to rare content on the network.
Hybrid Peer to Peer Network
Peer-to-peer hybrid Because it comprises one centralized peer that
performs all actions as a server, such as keeping all information about the
peers and responding to requests for that information
The client-server model structure is a centralized
network in which the server hosts, provides, and
maintains the majority of the client’s data and
services. In this network model, a central server is a
must and all the clients (computers) are connected
to the central server for retrieving data or using its
services.
Client/Server
In a peer to peer network, there is no specific
client or a server. A device can send and
receive data directly with each other. Each
node can either be a client or a server. It can
request or provide services accordingly. A
node is also called a peer.
Peer-to-Peer
o Services…
o Data Transmission….
o Prime Focus…
o Cost….
The Difference between Client/Server and
Peer-to-Peer Network.
Disadvantages
Scalability —challenging to add more peers to the network
Security – more vulnerable to malwares
DOS - each node can route traffic
Advantages
Low latency - faster response times
High bandwidth — many nodes
Low cost – no central server
Fault tolerance —no single point of failure
users govern their own data
P2P Networking Pros and Cons
Control what you share: be certain that you don't share everything on your
computer by accident
Install a good antivirus program: Even with good antivirus software, there's
no guarantee you'll detect every malware
Make sure your firewall is set up correctly for the P2P service: Set up
firewall rules and port forwarding to allow minimum of access required by
the P2P network.
P2P Network Safety Hints
Torrents are a type of file sharing that takes place through the internet. They use
the BitTorrent protocol to enable peer-to-peer (P2P) file sharing
Used to distribute files to a large number of people at once
Torrents are accessed using a file with the .TORRENT extension
In Torrent, nodes act like servers that provide different portions of the file that the
user wants to download
Depending on who's currently sharing the file and which servers have the section
of the file that you need, torrent program will pick and choose which node to take
the file from
P2P Network Example - Torrents
Seed: Making files available to others. The seed count of a torrent refers to how many
individuals are sharing the entire file.
Peer: A peer is a person who has downloaded a file from a seeder but does not yet have
the entire file.
Leecher: A leecher is a person who downloads more than uploads.
Other P2P Networks
Napster: file sharing (music) by people all around the globe.
Kazaa: Same as Napster, also allowed sharing movies on larger scale.
P2P Network Example – Torrents - Terminologies
THANK YOU!
Codespot. (2021). Introduction to Peer to Peer (P2P) Network. [Online]. [Accessed by 1 Dec 2021]. Available from : https://www.codespot.org/introduction-to-peer-to-
peer-network/
Cope.J. (2002). What is Peer to Peer Network? [Online]. [Accessed by 1 Dec 2021]. Available from : https://www.computerworld.com/article/2588287/networking-peer-
to-peer-network.html
Techterms. (Unknown). Peer to Peer Definition. [Online]. [Accessed by 1 Dec 2021]. Available from : https://techterms.com/definition/p2p
Peterson.M. (2020). The History of P2P Networks-and why They Remain So Important Now. [Online]. [Accessed by 1 Dec 2021]. Available from :
https://apaylo.com/2020/08/12/the-history-of-p2p-networks-and-why-they-remain-so-important-now/
Hayes.A. (2021). Peer to Peer Service. [Online]. [Accessed by 1 Dec 2021]. Available from : https://www.investopedia.com/terms/p/peertopeer-p2p-service.asp
Naomi J. Alpern, Robert J. Shimonski. 2010. Peer to Peer Networks.
Shane, A. 2021. Advantages and Disadvantages of a Peer-to-Peer Network. [Online]. [Available on: https://flevy.com/blog/advantages-and-disadvantages-of-a-peer-to-
peer-network/].
Jon, G. 2019. What is a torrent? Here’s all that you need to know. [Online]. [Available on: https://www.my-private-network.co.uk/what-is-a-torrent/].
Philips, G. 2020. Torrent Defined: What's a Torrent and How Do You Use It? [Online]. [Available on: https://www.makeuseof.com/tag/torrent-definition/].
Sarangam, Ajay. 2020. Difference Between Peer to Peer and Client Server Network. https://www.jigsawacademy.com/.
Lithmee. 2018. Between Peer to Peer and Client Server Network. [Online]. [Available on: https://pediaa.com/]
Konstantin.2018. What’s the difference between peer-to-peer (P2P) networks and client-server? [Online]. [Available on: https://www.resilio.com/].
REFERENCE

Mais conteúdo relacionado

Semelhante a Peer To Peer.pptx

Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks IJECEIAES
 
U torrent as a P2P application.pdf
U torrent as a P2P application.pdfU torrent as a P2P application.pdf
U torrent as a P2P application.pdfSamuel Medeludo
 
P2P Seminar
P2P SeminarP2P Seminar
P2P SeminarCoRehab
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networkingshankars73
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGijp2p
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGijp2p
 
computer networks
computer networks computer networks
computer networks MiXvideos
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technologyguestc67adeb
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Adaptive Sliding Piece Selection Window for BitTorrent Systems
Adaptive Sliding Piece Selection Window for BitTorrent SystemsAdaptive Sliding Piece Selection Window for BitTorrent Systems
Adaptive Sliding Piece Selection Window for BitTorrent SystemsWaqas Tariq
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTSudhansu Dash
 
App for peer-to-peer file transfer
App for peer-to-peer file transferApp for peer-to-peer file transfer
App for peer-to-peer file transferIRJET Journal
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Mumbai Academisc
 

Semelhante a Peer To Peer.pptx (20)

Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks
 
U torrent as a P2P application.pdf
U torrent as a P2P application.pdfU torrent as a P2P application.pdf
U torrent as a P2P application.pdf
 
P2P Seminar
P2P SeminarP2P Seminar
P2P Seminar
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
 
Bit torrent a revolution in p2p
Bit torrent a revolution in p2pBit torrent a revolution in p2p
Bit torrent a revolution in p2p
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
 
Internet and its uses
Internet and its usesInternet and its uses
Internet and its uses
 
computer networks
computer networks computer networks
computer networks
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Adaptive Sliding Piece Selection Window for BitTorrent Systems
Adaptive Sliding Piece Selection Window for BitTorrent SystemsAdaptive Sliding Piece Selection Window for BitTorrent Systems
Adaptive Sliding Piece Selection Window for BitTorrent Systems
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENT
 
Week10
Week10Week10
Week10
 
p2p
p2pp2p
p2p
 
Week10
Week10Week10
Week10
 
App for peer-to-peer file transfer
App for peer-to-peer file transferApp for peer-to-peer file transfer
App for peer-to-peer file transfer
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)
 
Chapter 3 network
Chapter 3 networkChapter 3 network
Chapter 3 network
 

Último

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 

Último (20)

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Peer To Peer.pptx

  • 1. Prepared by: Khane Luqman Hewa Omer Hanan Siyamand Amer Jabar Supervised by Ass. Lecturer: Omar Shirko Peer to Peer Networks Erbil Polytechnic University College of engineering Information System Engineering 2 DEC 2021
  • 2. OUTLINE Introduction History What is Peer to Peer Network Why to Use P2P Network How to Work Peer to Peer Network? Peer to Peer Architecture Applications of Peer to Peer Architecture Types of Peer to Peer Network P2P Networking Pros and Cons P2P Network Safety Hints P2P Network Example – Torrents Peer-to-Peer Client/Server The Difference between Client/Server and Peer-to-Peer Network.
  • 3. Introduction The "peers" in a peer-to-peer network are computer systems that are connected to each other over the Internet. Without the use of a central server, files can be shared directly between systems on the network.
  • 4. In 1979, the world was introduced to the first P2P network in the form of Usenet, a system that allowed users to post and exchange messages and news in a manner similar to today's online forums and message boards; the only difference was that Usenet did not operate under the control of a central server or administrator. By 1999, the internet had become commonplace, and many businesses and households in North America had internet connection (although the slow dial-up version!). Now, 20 years later, P2P remains one of the most popular technologies for sharing files over the internet- in both legal and illegal circumstances. History
  • 5. What is Peer to Peer Network All "Peers" in a peer-to-peer network refer to all computers that are connected to each other via the internet. Because there is no central server in a peer-to-peer network, each user can exchange any type of file with any other peer.
  • 6. How Peer to Peer Networks Work? When consumers want to download a file from the internet, they must first open a web browser and navigate to the right website. In this case, the website serves as the server, while the user's PC serves as the client, receiving all files. This concept works as a one-way road, moving downloaded data from point 1 (the website) to point 2 (the user's PC system).
  • 7. Peer to Peer Architecture peer to peer (P2P) architecture is generally implemented over computer networking architecture. Because each computer in this network acts as an independent workstation and may save all data on its own hard disk, P2P architecture is best suited for small areas such as a house or a small office.
  • 8. Types of Peer to Peer Network Pure Peer to Peer Network All peers play the role equally because this P2P network does not contain centralized dedicated server. Unstructured P2P Networks All devices have to make same contribution, but due to lack of structure, users can face some difficulties for searching rare content. Structured P2P Networks Structured peer to peer networks are more difficult to set up than unstructured peer to peer networks, but they give consumers better access to rare content on the network. Hybrid Peer to Peer Network Peer-to-peer hybrid Because it comprises one centralized peer that performs all actions as a server, such as keeping all information about the peers and responding to requests for that information
  • 9. The client-server model structure is a centralized network in which the server hosts, provides, and maintains the majority of the client’s data and services. In this network model, a central server is a must and all the clients (computers) are connected to the central server for retrieving data or using its services. Client/Server
  • 10. In a peer to peer network, there is no specific client or a server. A device can send and receive data directly with each other. Each node can either be a client or a server. It can request or provide services accordingly. A node is also called a peer. Peer-to-Peer
  • 11. o Services… o Data Transmission…. o Prime Focus… o Cost…. The Difference between Client/Server and Peer-to-Peer Network.
  • 12. Disadvantages Scalability —challenging to add more peers to the network Security – more vulnerable to malwares DOS - each node can route traffic Advantages Low latency - faster response times High bandwidth — many nodes Low cost – no central server Fault tolerance —no single point of failure users govern their own data P2P Networking Pros and Cons
  • 13. Control what you share: be certain that you don't share everything on your computer by accident Install a good antivirus program: Even with good antivirus software, there's no guarantee you'll detect every malware Make sure your firewall is set up correctly for the P2P service: Set up firewall rules and port forwarding to allow minimum of access required by the P2P network. P2P Network Safety Hints
  • 14. Torrents are a type of file sharing that takes place through the internet. They use the BitTorrent protocol to enable peer-to-peer (P2P) file sharing Used to distribute files to a large number of people at once Torrents are accessed using a file with the .TORRENT extension In Torrent, nodes act like servers that provide different portions of the file that the user wants to download Depending on who's currently sharing the file and which servers have the section of the file that you need, torrent program will pick and choose which node to take the file from P2P Network Example - Torrents
  • 15. Seed: Making files available to others. The seed count of a torrent refers to how many individuals are sharing the entire file. Peer: A peer is a person who has downloaded a file from a seeder but does not yet have the entire file. Leecher: A leecher is a person who downloads more than uploads. Other P2P Networks Napster: file sharing (music) by people all around the globe. Kazaa: Same as Napster, also allowed sharing movies on larger scale. P2P Network Example – Torrents - Terminologies
  • 17. Codespot. (2021). Introduction to Peer to Peer (P2P) Network. [Online]. [Accessed by 1 Dec 2021]. Available from : https://www.codespot.org/introduction-to-peer-to- peer-network/ Cope.J. (2002). What is Peer to Peer Network? [Online]. [Accessed by 1 Dec 2021]. Available from : https://www.computerworld.com/article/2588287/networking-peer- to-peer-network.html Techterms. (Unknown). Peer to Peer Definition. [Online]. [Accessed by 1 Dec 2021]. Available from : https://techterms.com/definition/p2p Peterson.M. (2020). The History of P2P Networks-and why They Remain So Important Now. [Online]. [Accessed by 1 Dec 2021]. Available from : https://apaylo.com/2020/08/12/the-history-of-p2p-networks-and-why-they-remain-so-important-now/ Hayes.A. (2021). Peer to Peer Service. [Online]. [Accessed by 1 Dec 2021]. Available from : https://www.investopedia.com/terms/p/peertopeer-p2p-service.asp Naomi J. Alpern, Robert J. Shimonski. 2010. Peer to Peer Networks. Shane, A. 2021. Advantages and Disadvantages of a Peer-to-Peer Network. [Online]. [Available on: https://flevy.com/blog/advantages-and-disadvantages-of-a-peer-to- peer-network/]. Jon, G. 2019. What is a torrent? Here’s all that you need to know. [Online]. [Available on: https://www.my-private-network.co.uk/what-is-a-torrent/]. Philips, G. 2020. Torrent Defined: What's a Torrent and How Do You Use It? [Online]. [Available on: https://www.makeuseof.com/tag/torrent-definition/]. Sarangam, Ajay. 2020. Difference Between Peer to Peer and Client Server Network. https://www.jigsawacademy.com/. Lithmee. 2018. Between Peer to Peer and Client Server Network. [Online]. [Available on: https://pediaa.com/] Konstantin.2018. What’s the difference between peer-to-peer (P2P) networks and client-server? [Online]. [Available on: https://www.resilio.com/]. REFERENCE