SlideShare a Scribd company logo
1 of 17
Prepared by:
Khane Luqman
Hewa Omer
Hanan Siyamand
Amer Jabar
Supervised by Ass. Lecturer:
Omar Shirko
Peer to Peer Networks
Erbil Polytechnic University
College of engineering
Information System Engineering
2 DEC 2021
OUTLINE
Introduction
History
What is Peer to Peer Network
Why to Use P2P Network
How to Work Peer to Peer Network?
Peer to Peer Architecture
Applications of Peer to Peer Architecture
Types of Peer to Peer Network
P2P Networking Pros and Cons
P2P Network Safety Hints
P2P Network Example – Torrents
Peer-to-Peer
Client/Server
The Difference between Client/Server and Peer-to-Peer Network.
Introduction
The "peers" in a peer-to-peer network are
computer systems that are connected to each
other over the Internet.
Without the use of a central server, files can
be shared directly between systems on the
network.
In 1979, the world was introduced to the first P2P network in the form of Usenet, a system
that allowed users to post and exchange messages and news in a manner similar to today's
online forums and message boards; the only difference was that Usenet did not operate
under the control of a central server or administrator.
By 1999, the internet had become commonplace, and many businesses and households in
North America had internet connection (although the slow dial-up version!).
Now, 20 years later, P2P remains one of the most popular technologies for sharing files over
the internet- in both legal and illegal circumstances.
History
What is Peer to Peer Network
All "Peers" in a peer-to-peer network refer to all computers that are
connected to each other via the internet. Because there is no central
server in a peer-to-peer network, each user can exchange any type
of file with any other peer.
How Peer to Peer Networks Work?
When consumers want to download a file from the internet, they
must first open a web browser and navigate to the right website. In
this case, the website serves as the server, while the user's PC
serves as the client, receiving all files. This concept works as a
one-way road, moving downloaded data from point 1 (the
website) to point 2 (the user's PC system).
Peer to Peer Architecture
peer to peer (P2P) architecture is generally implemented over
computer networking architecture. Because each computer in
this network acts as an independent workstation and may save
all data on its own hard disk, P2P architecture is best suited
for small areas such as a house or a small office.
Types of Peer to Peer Network
Pure Peer to Peer Network
All peers play the role equally because this P2P network does not contain
centralized dedicated server.
Unstructured P2P Networks
All devices have to make same contribution, but due to lack of structure,
users can face some difficulties for searching rare content.
Structured P2P Networks
Structured peer to peer networks are more difficult to set up than
unstructured peer to peer networks, but they give consumers better access
to rare content on the network.
Hybrid Peer to Peer Network
Peer-to-peer hybrid Because it comprises one centralized peer that
performs all actions as a server, such as keeping all information about the
peers and responding to requests for that information
The client-server model structure is a centralized
network in which the server hosts, provides, and
maintains the majority of the client’s data and
services. In this network model, a central server is a
must and all the clients (computers) are connected
to the central server for retrieving data or using its
services.
Client/Server
In a peer to peer network, there is no specific
client or a server. A device can send and
receive data directly with each other. Each
node can either be a client or a server. It can
request or provide services accordingly. A
node is also called a peer.
Peer-to-Peer
o Services…
o Data Transmission….
o Prime Focus…
o Cost….
The Difference between Client/Server and
Peer-to-Peer Network.
Disadvantages
Scalability —challenging to add more peers to the network
Security – more vulnerable to malwares
DOS - each node can route traffic
Advantages
Low latency - faster response times
High bandwidth — many nodes
Low cost – no central server
Fault tolerance —no single point of failure
users govern their own data
P2P Networking Pros and Cons
Control what you share: be certain that you don't share everything on your
computer by accident
Install a good antivirus program: Even with good antivirus software, there's
no guarantee you'll detect every malware
Make sure your firewall is set up correctly for the P2P service: Set up
firewall rules and port forwarding to allow minimum of access required by
the P2P network.
P2P Network Safety Hints
Torrents are a type of file sharing that takes place through the internet. They use
the BitTorrent protocol to enable peer-to-peer (P2P) file sharing
Used to distribute files to a large number of people at once
Torrents are accessed using a file with the .TORRENT extension
In Torrent, nodes act like servers that provide different portions of the file that the
user wants to download
Depending on who's currently sharing the file and which servers have the section
of the file that you need, torrent program will pick and choose which node to take
the file from
P2P Network Example - Torrents
Seed: Making files available to others. The seed count of a torrent refers to how many
individuals are sharing the entire file.
Peer: A peer is a person who has downloaded a file from a seeder but does not yet have
the entire file.
Leecher: A leecher is a person who downloads more than uploads.
Other P2P Networks
Napster: file sharing (music) by people all around the globe.
Kazaa: Same as Napster, also allowed sharing movies on larger scale.
P2P Network Example – Torrents - Terminologies
THANK YOU!
Codespot. (2021). Introduction to Peer to Peer (P2P) Network. [Online]. [Accessed by 1 Dec 2021]. Available from : https://www.codespot.org/introduction-to-peer-to-
peer-network/
Cope.J. (2002). What is Peer to Peer Network? [Online]. [Accessed by 1 Dec 2021]. Available from : https://www.computerworld.com/article/2588287/networking-peer-
to-peer-network.html
Techterms. (Unknown). Peer to Peer Definition. [Online]. [Accessed by 1 Dec 2021]. Available from : https://techterms.com/definition/p2p
Peterson.M. (2020). The History of P2P Networks-and why They Remain So Important Now. [Online]. [Accessed by 1 Dec 2021]. Available from :
https://apaylo.com/2020/08/12/the-history-of-p2p-networks-and-why-they-remain-so-important-now/
Hayes.A. (2021). Peer to Peer Service. [Online]. [Accessed by 1 Dec 2021]. Available from : https://www.investopedia.com/terms/p/peertopeer-p2p-service.asp
Naomi J. Alpern, Robert J. Shimonski. 2010. Peer to Peer Networks.
Shane, A. 2021. Advantages and Disadvantages of a Peer-to-Peer Network. [Online]. [Available on: https://flevy.com/blog/advantages-and-disadvantages-of-a-peer-to-
peer-network/].
Jon, G. 2019. What is a torrent? Here’s all that you need to know. [Online]. [Available on: https://www.my-private-network.co.uk/what-is-a-torrent/].
Philips, G. 2020. Torrent Defined: What's a Torrent and How Do You Use It? [Online]. [Available on: https://www.makeuseof.com/tag/torrent-definition/].
Sarangam, Ajay. 2020. Difference Between Peer to Peer and Client Server Network. https://www.jigsawacademy.com/.
Lithmee. 2018. Between Peer to Peer and Client Server Network. [Online]. [Available on: https://pediaa.com/]
Konstantin.2018. What’s the difference between peer-to-peer (P2P) networks and client-server? [Online]. [Available on: https://www.resilio.com/].
REFERENCE

More Related Content

Similar to Peer To Peer.pptx

P2P Seminar
P2P SeminarP2P Seminar
P2P Seminar
CoRehab
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
guestc67adeb
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)
Mumbai Academisc
 

Similar to Peer To Peer.pptx (20)

Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks
 
U torrent as a P2P application.pdf
U torrent as a P2P application.pdfU torrent as a P2P application.pdf
U torrent as a P2P application.pdf
 
P2P Seminar
P2P SeminarP2P Seminar
P2P Seminar
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
 
Bit torrent a revolution in p2p
Bit torrent a revolution in p2pBit torrent a revolution in p2p
Bit torrent a revolution in p2p
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
 
Internet and its uses
Internet and its usesInternet and its uses
Internet and its uses
 
computer networks
computer networks computer networks
computer networks
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Adaptive Sliding Piece Selection Window for BitTorrent Systems
Adaptive Sliding Piece Selection Window for BitTorrent SystemsAdaptive Sliding Piece Selection Window for BitTorrent Systems
Adaptive Sliding Piece Selection Window for BitTorrent Systems
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENT
 
Week10
Week10Week10
Week10
 
p2p
p2pp2p
p2p
 
Week10
Week10Week10
Week10
 
App for peer-to-peer file transfer
App for peer-to-peer file transferApp for peer-to-peer file transfer
App for peer-to-peer file transfer
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)
 
Chapter 3 network
Chapter 3 networkChapter 3 network
Chapter 3 network
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 

Peer To Peer.pptx

  • 1. Prepared by: Khane Luqman Hewa Omer Hanan Siyamand Amer Jabar Supervised by Ass. Lecturer: Omar Shirko Peer to Peer Networks Erbil Polytechnic University College of engineering Information System Engineering 2 DEC 2021
  • 2. OUTLINE Introduction History What is Peer to Peer Network Why to Use P2P Network How to Work Peer to Peer Network? Peer to Peer Architecture Applications of Peer to Peer Architecture Types of Peer to Peer Network P2P Networking Pros and Cons P2P Network Safety Hints P2P Network Example – Torrents Peer-to-Peer Client/Server The Difference between Client/Server and Peer-to-Peer Network.
  • 3. Introduction The "peers" in a peer-to-peer network are computer systems that are connected to each other over the Internet. Without the use of a central server, files can be shared directly between systems on the network.
  • 4. In 1979, the world was introduced to the first P2P network in the form of Usenet, a system that allowed users to post and exchange messages and news in a manner similar to today's online forums and message boards; the only difference was that Usenet did not operate under the control of a central server or administrator. By 1999, the internet had become commonplace, and many businesses and households in North America had internet connection (although the slow dial-up version!). Now, 20 years later, P2P remains one of the most popular technologies for sharing files over the internet- in both legal and illegal circumstances. History
  • 5. What is Peer to Peer Network All "Peers" in a peer-to-peer network refer to all computers that are connected to each other via the internet. Because there is no central server in a peer-to-peer network, each user can exchange any type of file with any other peer.
  • 6. How Peer to Peer Networks Work? When consumers want to download a file from the internet, they must first open a web browser and navigate to the right website. In this case, the website serves as the server, while the user's PC serves as the client, receiving all files. This concept works as a one-way road, moving downloaded data from point 1 (the website) to point 2 (the user's PC system).
  • 7. Peer to Peer Architecture peer to peer (P2P) architecture is generally implemented over computer networking architecture. Because each computer in this network acts as an independent workstation and may save all data on its own hard disk, P2P architecture is best suited for small areas such as a house or a small office.
  • 8. Types of Peer to Peer Network Pure Peer to Peer Network All peers play the role equally because this P2P network does not contain centralized dedicated server. Unstructured P2P Networks All devices have to make same contribution, but due to lack of structure, users can face some difficulties for searching rare content. Structured P2P Networks Structured peer to peer networks are more difficult to set up than unstructured peer to peer networks, but they give consumers better access to rare content on the network. Hybrid Peer to Peer Network Peer-to-peer hybrid Because it comprises one centralized peer that performs all actions as a server, such as keeping all information about the peers and responding to requests for that information
  • 9. The client-server model structure is a centralized network in which the server hosts, provides, and maintains the majority of the client’s data and services. In this network model, a central server is a must and all the clients (computers) are connected to the central server for retrieving data or using its services. Client/Server
  • 10. In a peer to peer network, there is no specific client or a server. A device can send and receive data directly with each other. Each node can either be a client or a server. It can request or provide services accordingly. A node is also called a peer. Peer-to-Peer
  • 11. o Services… o Data Transmission…. o Prime Focus… o Cost…. The Difference between Client/Server and Peer-to-Peer Network.
  • 12. Disadvantages Scalability —challenging to add more peers to the network Security – more vulnerable to malwares DOS - each node can route traffic Advantages Low latency - faster response times High bandwidth — many nodes Low cost – no central server Fault tolerance —no single point of failure users govern their own data P2P Networking Pros and Cons
  • 13. Control what you share: be certain that you don't share everything on your computer by accident Install a good antivirus program: Even with good antivirus software, there's no guarantee you'll detect every malware Make sure your firewall is set up correctly for the P2P service: Set up firewall rules and port forwarding to allow minimum of access required by the P2P network. P2P Network Safety Hints
  • 14. Torrents are a type of file sharing that takes place through the internet. They use the BitTorrent protocol to enable peer-to-peer (P2P) file sharing Used to distribute files to a large number of people at once Torrents are accessed using a file with the .TORRENT extension In Torrent, nodes act like servers that provide different portions of the file that the user wants to download Depending on who's currently sharing the file and which servers have the section of the file that you need, torrent program will pick and choose which node to take the file from P2P Network Example - Torrents
  • 15. Seed: Making files available to others. The seed count of a torrent refers to how many individuals are sharing the entire file. Peer: A peer is a person who has downloaded a file from a seeder but does not yet have the entire file. Leecher: A leecher is a person who downloads more than uploads. Other P2P Networks Napster: file sharing (music) by people all around the globe. Kazaa: Same as Napster, also allowed sharing movies on larger scale. P2P Network Example – Torrents - Terminologies
  • 17. Codespot. (2021). Introduction to Peer to Peer (P2P) Network. [Online]. [Accessed by 1 Dec 2021]. Available from : https://www.codespot.org/introduction-to-peer-to- peer-network/ Cope.J. (2002). What is Peer to Peer Network? [Online]. [Accessed by 1 Dec 2021]. Available from : https://www.computerworld.com/article/2588287/networking-peer- to-peer-network.html Techterms. (Unknown). Peer to Peer Definition. [Online]. [Accessed by 1 Dec 2021]. Available from : https://techterms.com/definition/p2p Peterson.M. (2020). The History of P2P Networks-and why They Remain So Important Now. [Online]. [Accessed by 1 Dec 2021]. Available from : https://apaylo.com/2020/08/12/the-history-of-p2p-networks-and-why-they-remain-so-important-now/ Hayes.A. (2021). Peer to Peer Service. [Online]. [Accessed by 1 Dec 2021]. Available from : https://www.investopedia.com/terms/p/peertopeer-p2p-service.asp Naomi J. Alpern, Robert J. Shimonski. 2010. Peer to Peer Networks. Shane, A. 2021. Advantages and Disadvantages of a Peer-to-Peer Network. [Online]. [Available on: https://flevy.com/blog/advantages-and-disadvantages-of-a-peer-to- peer-network/]. Jon, G. 2019. What is a torrent? Here’s all that you need to know. [Online]. [Available on: https://www.my-private-network.co.uk/what-is-a-torrent/]. Philips, G. 2020. Torrent Defined: What's a Torrent and How Do You Use It? [Online]. [Available on: https://www.makeuseof.com/tag/torrent-definition/]. Sarangam, Ajay. 2020. Difference Between Peer to Peer and Client Server Network. https://www.jigsawacademy.com/. Lithmee. 2018. Between Peer to Peer and Client Server Network. [Online]. [Available on: https://pediaa.com/] Konstantin.2018. What’s the difference between peer-to-peer (P2P) networks and client-server? [Online]. [Available on: https://www.resilio.com/]. REFERENCE