Your SlideShare is downloading. ×
0
Peer topeer
Peer topeer
Peer topeer
Peer topeer
Peer topeer
Peer topeer
Peer topeer
Peer topeer
Peer topeer
Peer topeer
Peer topeer
Peer topeer
Peer topeer
Peer topeer
Peer topeer
Peer topeer
Peer topeer
Peer topeer
Peer topeer
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Peer topeer

409

Published on

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
409
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
29
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. 1Peer ToPeer 2009/2010
  • 2. 2 1 Introduction 2 Architecture 3 Characteristic of P2P 4 The eMule application 5 P2P File-sharing Protocols 6 Conclusion
  • 3. 3  Direct system exchange of resources between linked peers in network  The most used in the world  Basically different from the Client-server architecture
  • 4. 4 Peer to peer is a type of network infrastructure where each computer is both server and client. In this case, the computers connected to the network share their resources . • Distributed Architecture • Decentralized architecture
  • 5. 5 In a typical peer-to-peer, there is no administrator .So, each user manages his own post. On the other hand all users can share their resources as they wish. If we consider one of the posts as a server, it is intended to share resources, if not it consumes resources from other posts
  • 6. 6 For the P2P there are problems that are related to the system itself and other software. The files on these networks in addition to their potentially illegal distribution come from unverifiable sources and can contain all kinds of additives: spyware, viruses and other .. Anyway download any file whatever it is, should lead to a systematic virus verification. Also put passwords to the data, even if they are not in shared directories.
  • 7. 7  A reduced cost  Simplicity of implementation and use  Robust network,  Self-organization  Dynamism 7
  • 8. 8  This system is not centralized at all, which makes it very difficult to administer  Security is less easy to achieve  The network maintenance is difficult.  Limited change  Trafficking is most important and searching files take much longer 8
  • 9. 9 It has emerged as a software developed in Java by the exchange and sharing creators of Winamp based on essential the distributed network Gnutella. Shareaza client is a peer-to- Is based on the distributed peer for Windows that will network Fasttrack allow you to download files of any type on several popular P2P networks.
  • 10. 10 Definition : eMule is a P2P file sharing network • Based on an extended eDonkey protocol • Uses both TCP and UDP • Client Server architecture
  • 11. 11 The eMule Network :
  • 12. 12 1- Connection establishment : High ID login sequence Rejection session
  • 13. 13 2- Connection startup :  This scenario assumes that the client has a requested file list  The client sends his files  The server replies with status information  The client asks for sources for his files  The server replies with his available sources
  • 14. 14 3- File search : • A search request is sent to the server which is then answered by a search result • The user chooses to download one or more files, the client then requests sources for the chosen files and the server replies with a list of sources for each of the requested files. • An optional server status message
  • 15. 15 4- Callback mechanism: 1- A can send the server a callback request to ask B to call him back. 2- The server, which already has an open TCP connection to B, sends B a callback requested message, providing him with A’s IP and port. 3- B can then connect to A and send him the file without further overhead on the server.
  • 16. 16  UDP is used for: ◦ periodic status checks ◦ File search enhancement ◦ Source search enhancement  UDP is optional
  • 17. 17 UDP is used for verifying A’s position in B’s upload queue
  • 18. 18 The importance and the the future of P2P is to provide a role in network security and continuity.
  • 19. 19

×