SlideShare uma empresa Scribd logo
1 de 24
PEER TO PEER
SYSTEM
Author : Jahanzaib Niazi
What is Peer to Peer Architecture?
 Peer to peer is a type of architecture in which nodes are
interconnected with each other and share resources with
each other without the central controlling server.
 P2P system allows us to construct such a distributed system
or a application in which all resources and data is contributed
by the hosts over the network.
 P2P system allows us to sharing of data at very large scale
without the use of any server whose job is to manage the
scaling it means that scaling of data can be done without a
server.
 P2P are used in Filesharing,webcaching and providing
information to user , Bittorrent and etc are examples of P2P
applications which use P2P architecture.
Difference b/w P2P and Client
Server Architecture
 Server is a basically a point of difference
between the P2P and client server
architecture.In c/s architecture there is a
central server which is managing all the
resources across the network but in p2p there
is no server which is completely handling the
complete network all nodes can connect and
share resources with each other.
Advantages of Peer to Peer
 It is easy to install.
 All resources are shared by all nodes with
each other without a server.
 Central dependency is eliminated.
 It is more reliable.
 Cost of building and maintaining this p2p
network is less as compared to other network.
Disadvantages of Peer to Peer
 As we no there is not central server so that
network cannot be administrated for example we
cannot filter the files being shared by the nodes
with each other.
 Security is an other issue in this network as
malware can easily be transmitted across the
network.
 Because of no centralized server we cannot make
a backup of system every node has to make
backup of its own data in his system.
 Transferring of sensitive data through the p2p is
not recommended.
Distributed Nodes location and
Routing
 Distributed nodes are the nodes which are
connected in the p2p network.
 Efficiency of the a peer to system depends
upon the location of nodes and there
interconnection.
Peer to Peer Models
 Purely Decentralized System
 Centralized System
 Hybird System
Purely Decentralized Model:
It is a type of model in which there is not central sever all nodes are acting as both client and server all are getting
and sending data to each other no server is managing them.
Advantages:
i.) High Performance
ii.) Failure of single node doesn’t fails whole network.
iii.) Easily scalable and robustness.
Disadvantages:
i.) We cannot administrate the network.
ii.) Cannot filter the network traffic that what files are being shared.
iii.) Locating peers and offering services is a challenging tasks.
Example:
Gnutella 0.4
 Centralized P2P Model:
In this model which there is a central server whose job is that
it is maintaining all the records of files which each node have.
When a node needs a file its requests to the server makes
the lookup in its database and redirects the requesting node
to that node which has file.
So then this requesting node makes the direct connection
with that node which has file.
Note Server only searches file it doesnot transfer files.
For transfering of files nodes make direct connection
With each other.
Continued….
Continued….
 Advantages:
i.) Quick searches.
ii.) Low bandwidth required.
iii.) Searches can be filtered to some extent.
iv.) Main advantage of this system is faster resource sharing.
 Disadvantages:
i.) Failure of server fails down whole network.
ii.) This model is more easily be attacked.
iii.) There limitation is that scalabilty of network is affected by
use of server.
Example:
Napster, BitTorent.
Hybird P2P Model:
 Main advantage of Centralized model is faster and reliable resource
sharing.But there limitation is that scalabiilty of system is affected by
use of servers.
 Main advantage of Decentralized model is that they take less time
in locating the resource as compared to the Centralized Model.
 Hybird Model is a type of Model which is introduced to take
advantage of both centralized and decentralized system this model
doesn’t uses the server hence scalability issue got resolved.
 This model introduced the new concept of SUPERNODES.Hybird
model uses Super nodes,they are the more powerful nodes then the
other nodes they are dynamically choosen.By use of super nodes
Resource locating become faster. By using supernodes we can take
advantage of both decentralized search techniques and centralized
search techniques.
 Continued….
Continued….
 Advantages of Hybird Model:
I.) Issue of scalability in centralized model
resolved.
ii.) We can fastly locate the resource by use of
supernodes.
 Disadvantages:
i.) Searching is still based upon the flooding.
ii.) Loss of Distribution , more centralized control.
Example:
Gnutella v0.6
Skype Case Study:
 Skype has basically a hybird peer to peer architecture such
as Kazza or Gnutella v0.6.
 There are three types of nodes in Skype Network.
i.) Ordinary peers
ii.) Super Nodes
iii.) Central Login Server
The login server stores all the usernames and
All passwords and ensures that usernames are
Unique across the skype namespace this node
Authenticates the users.
Continued…
Continued….
 Skype used TCP for signalling and both UDP
and TCP for data transferring.
 All users communication are encrypted using
AES 256-bit.
 Normal Login:
i.) Skype client connects with the supernode.
ii.) Skype client is authenticated using skype
login server.
Some important terminologies:
 Seeder: Seeder is a one whose file is completely downloaded but its
uploading.
 Leecher: Some one who is downloading file.
 Peer: Collective term for seeder and leecher.
 Swarm : A group of peers sending or receiving simultaneously the same
file.
 Torrent file: A file contains information(Address/hostname) about Tracker.
 Tracker : A server that manages the bit torrent transfer process. tracker is
computer which acts as a server, and maintains a list of nodes which are
participating in the system (ie. computers that are currently downloading or
uploading file data). For a new node to join a Bittorrent network, it sends a
message to the tracker requesting the IPs of some of the other participating
nodes, so that it can connect to them and begin downloading. No actual file
data is downloaded from the tracker; its job is simply to facilitate node
discovery.
Bit Torrent Architecture
 Bit torrent is a centralized peer to peer
Application.
 Bit torrent uses a central server to maintain the
records of all shared files of all nodes.
 Below are four steps in Bit torrent.
 Join (Torrent is created)
 Publish (Torrent is published over internet)
 Search (File is searched across the nodes)
 Fetch (File is download)
Overall Architecture
A
B
C
Peer
[Leech]
Downloader
“US”
Peer
[Seed]
Peer
[Leech]
TrackerWeb Server
Overall Architecture
A
B
C
Peer
[Leech]
Downloader
“US”
Peer
[Seed]
Peer
[Leech]
TrackerWeb Server
Overall Architecture
A
B
C
Peer
[Leech]
Downloader
“US”
Peer
[Seed]
Peer
[Leech]
TrackerWeb Server
Overall Architecture
A
B
C
Peer
[Leech]
Downloader
“US”
Peer
[Seed]
Peer
[Leech]
TrackerWeb Server
Overall Architecture
A
B
C
Peer
[Leech]
Downloader
“US”
Peer
[Seed]
Peer
[Leech]
TrackerWeb Server
Overall Architecture
A
B
C
Peer
[Leech]
Downloader
“US”
Peer
[Seed]
Peer
[Leech]
TrackerWeb Server
Overall Architecture
A
B
C
Peer
[Leech]
Downloader
“US”
Peer
[Seed]
Peer
[Leech]
TrackerWeb Server
Query Flooding:
 Query flooding is an old technique of file searching across the
P2P network.
 Gnutella v0.4 used that technique.
 In this technique file is searched across the neighbours , if
they don’t have file these neighbours search file around there
neighbours hence whole network is searched.
 In this technique we can limit the range of search.
 Query flooding use is very poor it is not easily scalable hence
now a days it is not used.
 Now a days it is replaced by Query Routing such as Gnutella
v6.0 is using Query Routing.
 Distributed hashtables are also an alternative.
 Thanks for learning:
For Queries and Feedback email me at :
Jahanzaib.niazi001@gmail.com
Also you can download lecture notes from:
http://www.bscsf11b.blogspot.com

Mais conteúdo relacionado

Mais procurados

Communication in Distributed Systems
Communication in Distributed SystemsCommunication in Distributed Systems
Communication in Distributed SystemsDilum Bandara
 
Consistency protocols
Consistency protocolsConsistency protocols
Consistency protocolsZongYing Lyu
 
Optimistic concurrency control in Distributed Systems
Optimistic concurrency control in Distributed SystemsOptimistic concurrency control in Distributed Systems
Optimistic concurrency control in Distributed Systemsmridul mishra
 
Distributed file system
Distributed file systemDistributed file system
Distributed file systemAnamika Singh
 
remote procedure calls
  remote procedure calls  remote procedure calls
remote procedure callsAshish Kumar
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed SystemSunita Sahu
 
Directory and discovery services
Directory and discovery servicesDirectory and discovery services
Directory and discovery servicesRamchandraRegmi
 
File replication
File replicationFile replication
File replicationKlawal13
 
Design issues of dos
Design issues of dosDesign issues of dos
Design issues of dosvanamali_vanu
 
Networking issues for distributed systems
Networking issues for distributed systemsNetworking issues for distributed systems
Networking issues for distributed systemskingGovindi
 
Chapter 8 distributed file systems
Chapter 8 distributed file systemsChapter 8 distributed file systems
Chapter 8 distributed file systemsAbDul ThaYyal
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systemssumitjain2013
 
Distributed objects & components of corba
Distributed objects & components of corbaDistributed objects & components of corba
Distributed objects & components of corbaMayuresh Wadekar
 
Client Centric Consistency Model
Client Centric Consistency ModelClient Centric Consistency Model
Client Centric Consistency ModelRajat Kumar
 
Distributed Systems Real Life Applications
Distributed Systems Real Life ApplicationsDistributed Systems Real Life Applications
Distributed Systems Real Life ApplicationsAman Srivastava
 
Inter-Process Communication in distributed systems
Inter-Process Communication in distributed systemsInter-Process Communication in distributed systems
Inter-Process Communication in distributed systemsAya Mahmoud
 

Mais procurados (20)

Communication in Distributed Systems
Communication in Distributed SystemsCommunication in Distributed Systems
Communication in Distributed Systems
 
Consistency protocols
Consistency protocolsConsistency protocols
Consistency protocols
 
Optimistic concurrency control in Distributed Systems
Optimistic concurrency control in Distributed SystemsOptimistic concurrency control in Distributed Systems
Optimistic concurrency control in Distributed Systems
 
Distributed file system
Distributed file systemDistributed file system
Distributed file system
 
remote procedure calls
  remote procedure calls  remote procedure calls
remote procedure calls
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed System
 
Directory and discovery services
Directory and discovery servicesDirectory and discovery services
Directory and discovery services
 
File replication
File replicationFile replication
File replication
 
Design issues of dos
Design issues of dosDesign issues of dos
Design issues of dos
 
Networking issues for distributed systems
Networking issues for distributed systemsNetworking issues for distributed systems
Networking issues for distributed systems
 
Chapter 8 distributed file systems
Chapter 8 distributed file systemsChapter 8 distributed file systems
Chapter 8 distributed file systems
 
Distributed DBMS - Unit 6 - Query Processing
Distributed DBMS - Unit 6 - Query ProcessingDistributed DBMS - Unit 6 - Query Processing
Distributed DBMS - Unit 6 - Query Processing
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systems
 
Distributed objects & components of corba
Distributed objects & components of corbaDistributed objects & components of corba
Distributed objects & components of corba
 
Client Centric Consistency Model
Client Centric Consistency ModelClient Centric Consistency Model
Client Centric Consistency Model
 
20CS2021 DISTRIBUTED COMPUTING
20CS2021 DISTRIBUTED COMPUTING20CS2021 DISTRIBUTED COMPUTING
20CS2021 DISTRIBUTED COMPUTING
 
Message passing in Distributed Computing Systems
Message passing in Distributed Computing SystemsMessage passing in Distributed Computing Systems
Message passing in Distributed Computing Systems
 
Cloud computing architectures
Cloud computing architecturesCloud computing architectures
Cloud computing architectures
 
Distributed Systems Real Life Applications
Distributed Systems Real Life ApplicationsDistributed Systems Real Life Applications
Distributed Systems Real Life Applications
 
Inter-Process Communication in distributed systems
Inter-Process Communication in distributed systemsInter-Process Communication in distributed systems
Inter-Process Communication in distributed systems
 

Destaque

Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks Nicola Cerami
 
peer to peer and client server model
peer to peer and client server modelpeer to peer and client server model
peer to peer and client server modelBharath Nair
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networkingicanhasfay
 
Fundamental counting principle powerpoint
Fundamental counting principle powerpointFundamental counting principle powerpoint
Fundamental counting principle powerpointmesmith1
 
Counting Technique, Permutation, Combination
Counting Technique, Permutation, CombinationCounting Technique, Permutation, Combination
Counting Technique, Permutation, CombinationChie Pegollo
 

Destaque (6)

Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks
 
peer to peer and client server model
peer to peer and client server modelpeer to peer and client server model
peer to peer and client server model
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 
Fundamental counting principle powerpoint
Fundamental counting principle powerpointFundamental counting principle powerpoint
Fundamental counting principle powerpoint
 
Counting Technique, Permutation, Combination
Counting Technique, Permutation, CombinationCounting Technique, Permutation, Combination
Counting Technique, Permutation, Combination
 
Network security
Network securityNetwork security
Network security
 

Semelhante a Peer to peer system

Peer to peer data management
Peer to peer data managementPeer to peer data management
Peer to peer data managementJunaid Lodhi
 
Network archetecture
Network archetectureNetwork archetecture
Network archetectureshah fahad
 
App for peer-to-peer file transfer
App for peer-to-peer file transferApp for peer-to-peer file transfer
App for peer-to-peer file transferIRJET Journal
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...Brenda Thomas
 
Peer to peer (p2p)
Peer to peer (p2p)Peer to peer (p2p)
Peer to peer (p2p)Harshini
 
Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptxHananShk
 
Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!DigitalThinkerHelp
 
Commonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & ApplicationsCommonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & Applications905426
 
PEER_TO_PEER SHARING PRESENTATION
PEER_TO_PEER SHARING PRESENTATIONPEER_TO_PEER SHARING PRESENTATION
PEER_TO_PEER SHARING PRESENTATIONAseem Chakrabarthy
 
Peer to peer system - Mạng ngang hàng.
Peer to peer system - Mạng ngang hàng.Peer to peer system - Mạng ngang hàng.
Peer to peer system - Mạng ngang hàng.ThaiLeHuy1
 
Peer to peer_v2pptx
Peer to peer_v2pptxPeer to peer_v2pptx
Peer to peer_v2pptxMac Pat
 
Textual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networksTextual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networksUvaraj Shan
 
Lecture - Network Technologies: Peer-to-Peer Networks
Lecture - Network Technologies: Peer-to-Peer NetworksLecture - Network Technologies: Peer-to-Peer Networks
Lecture - Network Technologies: Peer-to-Peer NetworksJames Salter
 

Semelhante a Peer to peer system (20)

Peer to peer data management
Peer to peer data managementPeer to peer data management
Peer to peer data management
 
Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
 
Network archetecture
Network archetectureNetwork archetecture
Network archetecture
 
Peer Sim & P2P
Peer Sim & P2PPeer Sim & P2P
Peer Sim & P2P
 
Final peersimp pt
Final peersimp ptFinal peersimp pt
Final peersimp pt
 
App for peer-to-peer file transfer
App for peer-to-peer file transferApp for peer-to-peer file transfer
App for peer-to-peer file transfer
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
 
computer networks
computer networkscomputer networks
computer networks
 
Peer to peer (p2p)
Peer to peer (p2p)Peer to peer (p2p)
Peer to peer (p2p)
 
Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptx
 
Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!
 
Commonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & ApplicationsCommonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & Applications
 
Peer to peer
Peer to peerPeer to peer
Peer to peer
 
Peer to peer(p2 p)
Peer to peer(p2 p)Peer to peer(p2 p)
Peer to peer(p2 p)
 
PEER_TO_PEER SHARING PRESENTATION
PEER_TO_PEER SHARING PRESENTATIONPEER_TO_PEER SHARING PRESENTATION
PEER_TO_PEER SHARING PRESENTATION
 
Peer to peer system - Mạng ngang hàng.
Peer to peer system - Mạng ngang hàng.Peer to peer system - Mạng ngang hàng.
Peer to peer system - Mạng ngang hàng.
 
Peer to peer_v2pptx
Peer to peer_v2pptxPeer to peer_v2pptx
Peer to peer_v2pptx
 
Peer topeer
Peer topeerPeer topeer
Peer topeer
 
Textual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networksTextual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networks
 
Lecture - Network Technologies: Peer-to-Peer Networks
Lecture - Network Technologies: Peer-to-Peer NetworksLecture - Network Technologies: Peer-to-Peer Networks
Lecture - Network Technologies: Peer-to-Peer Networks
 

Último

भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 

Último (20)

भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 

Peer to peer system

  • 1. PEER TO PEER SYSTEM Author : Jahanzaib Niazi
  • 2. What is Peer to Peer Architecture?  Peer to peer is a type of architecture in which nodes are interconnected with each other and share resources with each other without the central controlling server.  P2P system allows us to construct such a distributed system or a application in which all resources and data is contributed by the hosts over the network.  P2P system allows us to sharing of data at very large scale without the use of any server whose job is to manage the scaling it means that scaling of data can be done without a server.  P2P are used in Filesharing,webcaching and providing information to user , Bittorrent and etc are examples of P2P applications which use P2P architecture.
  • 3. Difference b/w P2P and Client Server Architecture  Server is a basically a point of difference between the P2P and client server architecture.In c/s architecture there is a central server which is managing all the resources across the network but in p2p there is no server which is completely handling the complete network all nodes can connect and share resources with each other.
  • 4. Advantages of Peer to Peer  It is easy to install.  All resources are shared by all nodes with each other without a server.  Central dependency is eliminated.  It is more reliable.  Cost of building and maintaining this p2p network is less as compared to other network.
  • 5. Disadvantages of Peer to Peer  As we no there is not central server so that network cannot be administrated for example we cannot filter the files being shared by the nodes with each other.  Security is an other issue in this network as malware can easily be transmitted across the network.  Because of no centralized server we cannot make a backup of system every node has to make backup of its own data in his system.  Transferring of sensitive data through the p2p is not recommended.
  • 6. Distributed Nodes location and Routing  Distributed nodes are the nodes which are connected in the p2p network.  Efficiency of the a peer to system depends upon the location of nodes and there interconnection.
  • 7. Peer to Peer Models  Purely Decentralized System  Centralized System  Hybird System Purely Decentralized Model: It is a type of model in which there is not central sever all nodes are acting as both client and server all are getting and sending data to each other no server is managing them. Advantages: i.) High Performance ii.) Failure of single node doesn’t fails whole network. iii.) Easily scalable and robustness. Disadvantages: i.) We cannot administrate the network. ii.) Cannot filter the network traffic that what files are being shared. iii.) Locating peers and offering services is a challenging tasks. Example: Gnutella 0.4
  • 8.  Centralized P2P Model: In this model which there is a central server whose job is that it is maintaining all the records of files which each node have. When a node needs a file its requests to the server makes the lookup in its database and redirects the requesting node to that node which has file. So then this requesting node makes the direct connection with that node which has file. Note Server only searches file it doesnot transfer files. For transfering of files nodes make direct connection With each other. Continued….
  • 9. Continued….  Advantages: i.) Quick searches. ii.) Low bandwidth required. iii.) Searches can be filtered to some extent. iv.) Main advantage of this system is faster resource sharing.  Disadvantages: i.) Failure of server fails down whole network. ii.) This model is more easily be attacked. iii.) There limitation is that scalabilty of network is affected by use of server. Example: Napster, BitTorent.
  • 10. Hybird P2P Model:  Main advantage of Centralized model is faster and reliable resource sharing.But there limitation is that scalabiilty of system is affected by use of servers.  Main advantage of Decentralized model is that they take less time in locating the resource as compared to the Centralized Model.  Hybird Model is a type of Model which is introduced to take advantage of both centralized and decentralized system this model doesn’t uses the server hence scalability issue got resolved.  This model introduced the new concept of SUPERNODES.Hybird model uses Super nodes,they are the more powerful nodes then the other nodes they are dynamically choosen.By use of super nodes Resource locating become faster. By using supernodes we can take advantage of both decentralized search techniques and centralized search techniques.  Continued….
  • 11. Continued….  Advantages of Hybird Model: I.) Issue of scalability in centralized model resolved. ii.) We can fastly locate the resource by use of supernodes.  Disadvantages: i.) Searching is still based upon the flooding. ii.) Loss of Distribution , more centralized control. Example: Gnutella v0.6
  • 12. Skype Case Study:  Skype has basically a hybird peer to peer architecture such as Kazza or Gnutella v0.6.  There are three types of nodes in Skype Network. i.) Ordinary peers ii.) Super Nodes iii.) Central Login Server The login server stores all the usernames and All passwords and ensures that usernames are Unique across the skype namespace this node Authenticates the users. Continued…
  • 13. Continued….  Skype used TCP for signalling and both UDP and TCP for data transferring.  All users communication are encrypted using AES 256-bit.  Normal Login: i.) Skype client connects with the supernode. ii.) Skype client is authenticated using skype login server.
  • 14. Some important terminologies:  Seeder: Seeder is a one whose file is completely downloaded but its uploading.  Leecher: Some one who is downloading file.  Peer: Collective term for seeder and leecher.  Swarm : A group of peers sending or receiving simultaneously the same file.  Torrent file: A file contains information(Address/hostname) about Tracker.  Tracker : A server that manages the bit torrent transfer process. tracker is computer which acts as a server, and maintains a list of nodes which are participating in the system (ie. computers that are currently downloading or uploading file data). For a new node to join a Bittorrent network, it sends a message to the tracker requesting the IPs of some of the other participating nodes, so that it can connect to them and begin downloading. No actual file data is downloaded from the tracker; its job is simply to facilitate node discovery.
  • 15. Bit Torrent Architecture  Bit torrent is a centralized peer to peer Application.  Bit torrent uses a central server to maintain the records of all shared files of all nodes.  Below are four steps in Bit torrent.  Join (Torrent is created)  Publish (Torrent is published over internet)  Search (File is searched across the nodes)  Fetch (File is download)
  • 23. Query Flooding:  Query flooding is an old technique of file searching across the P2P network.  Gnutella v0.4 used that technique.  In this technique file is searched across the neighbours , if they don’t have file these neighbours search file around there neighbours hence whole network is searched.  In this technique we can limit the range of search.  Query flooding use is very poor it is not easily scalable hence now a days it is not used.  Now a days it is replaced by Query Routing such as Gnutella v6.0 is using Query Routing.  Distributed hashtables are also an alternative.
  • 24.  Thanks for learning: For Queries and Feedback email me at : Jahanzaib.niazi001@gmail.com Also you can download lecture notes from: http://www.bscsf11b.blogspot.com