SlideShare a Scribd company logo
1 of 14
PEER TO PEER(P2P)
• What is a peer to peer network?
• What is a peer to peer network architecture?
• What are the advantages of peer to peer network?
• What is disadvantages of peer to peer network?
• What is a peer to peer file sharing?
• What is BitTorrent ?
• How BitTorrent works ?
• Problems with BitTorrent ?
What is a peer to peer network?
• In its simplest form, a peer-to-peer (P2P) network is created
when two or more PCs are connected and share resources without
going through a separate server computer.
• In other words, each computer on a P2P network becomes a
file server as well as a client.
• Used largely for sharing of content files such as audio, video, data
or anything in a digital format.
• There are many p2p protocols such as Ares, Bittorrent, or
eDonkey(eD2k).
What is a peer to peer network?
A PEER
• Peers are both suppliers and consumers while in the traditional
client-server model, the server supplies while the client only
consumes.
PEER-TO-PEER VS CLIENT-SERVER
What is a peer to peer network architecture?
Overlay network diagram for an unstructured
P2P network, illustrating the ad hoc nature of
the connections between nodes
overlay network diagram for a structured P2P
network, using a distributed hash table (DHT) to
identify and locate nodes/resources
Structured Vs. Unstructured
• Structured-
• In structured peer-to-peer
networks the overlay is
organized into a specific
topology, and the protocol
ensures that any node can
efficiently search the network for
a file/resource, even if the
resource is extremely rare.
• Connections in the overlay are
fixed
• DHT Indexing(distributed hash
table).
• Unstructured-
• No algorithm for organization.
• Connections in the overlay are
created arbitrarily.
Centralized
•Central server is
used for indexing
functions
•Bittorrent
Hybrid
•Two groups of
clients: client and
overlay
•eMule, Kazaa
Pure
•Equipotent
peers, all peers
have equal
amount of power
•Gnutella,
Freenet
What are the advantages of peer to peer network?
• The peer to peer network is less expensive.
• One of the major advantage to P2P network is that each time a
new node is connected to the network the total capacity of the
system increases.
• Failure of one peer doesn’t affect the functioning of other peers.
In case of Client –Server network, if server goes down whole
network gets affected.
• it is easy to install and configure.
What is disadvantages of peer to peer network?
• Security is a major concern, not all shared files are from benign
sources. Attackers may add malware to p2p files as an attempt to
take control of other nodes in the network.
• Data recovery or backup is very difficult. Each computer should
have its own back-up system.
• Copyright issues.
What is a peer to peer file sharing?
• Peer-to-peer file sharing is different from traditional file downloading. In
peer-to-peer sharing, you use a software program (rather than your Web
browser) to locate computers that have the file you want. Because these
are ordinary computers like yours, as opposed to servers, they are
called peers.
• You run peer-to-peer file-sharing software on your computer and send
out a request for the file you want to download.
• To locate the file, the software queries other computers that are
connected to the Internet and running the file-sharing software.
• When the software finds a computer that has the file you want on its
hard drive, the download begin
What is BitTorrent ?
• a peer-to-peer file sharing protocol used for distributing large
amounts of data.
• Invented By Bram Cohen.
• Released July 2001
It is now maintained by Cohen's company,
BitTorrent Inc.
How BitTorrent works ?
Seeds: Seeder is someone from whom you can download a piece
of file. Hence they affect the overall availability of file on P2P
network.
Peers:Peer is someone who is involved in file sharing activity. It
is a generic term.
Leecher:Leecher is someone who has downloaded a file but is
not sharing it back to P2P network. Hence, overall availablity of file
decreases.
Problems with BitTorrent ?
Copyright:
- Many things not legally distributed
- Movie and Music industries very mad
- Unsuspecting users targeted
for lawsuits.
Security:
-virus,SET attack
Thank you

More Related Content

What's hot

Computer communications and networks
Computer communications and networksComputer communications and networks
Computer communications and networksVarun Jain
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)ashiesh0007
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networksHaider Ali Malik
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKINGKiran Buriro
 
Présentation ubuntu 12.10 PDF
Présentation ubuntu  12.10 PDFPrésentation ubuntu  12.10 PDF
Présentation ubuntu 12.10 PDFMohamed Ben Bouzid
 
Internet And How It Works
Internet And How It WorksInternet And How It Works
Internet And How It Worksftz 420
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPTAIRTEL
 
Presentation on networking
Presentation on networking Presentation on networking
Presentation on networking HoneyKumar34
 
Computer network ppt communication
Computer network ppt communicationComputer network ppt communication
Computer network ppt communicationKajal Sharma
 
Linux Linux Traffic Control
Linux Linux Traffic ControlLinux Linux Traffic Control
Linux Linux Traffic ControlSUSE Labs Taipei
 
Basic concept of computer network
Basic concept of computer networkBasic concept of computer network
Basic concept of computer networkkabtanxiray
 
Network Interface Card
Network Interface CardNetwork Interface Card
Network Interface Cardsourabh4u07
 
A Network Of Networks For Slide Share
A Network Of Networks For Slide ShareA Network Of Networks For Slide Share
A Network Of Networks For Slide Shareitsvineeth209
 
Router & functionality
Router & functionalityRouter & functionality
Router & functionalityAmzadKhn
 

What's hot (20)

Computer communications and networks
Computer communications and networksComputer communications and networks
Computer communications and networks
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)
 
IP Address
IP AddressIP Address
IP Address
 
Router and types
Router and types Router and types
Router and types
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Présentation ubuntu 12.10 PDF
Présentation ubuntu  12.10 PDFPrésentation ubuntu  12.10 PDF
Présentation ubuntu 12.10 PDF
 
Internet And How It Works
Internet And How It WorksInternet And How It Works
Internet And How It Works
 
TCP Model
TCP ModelTCP Model
TCP Model
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Presentation on networking
Presentation on networking Presentation on networking
Presentation on networking
 
Computer network ppt communication
Computer network ppt communicationComputer network ppt communication
Computer network ppt communication
 
Linux Linux Traffic Control
Linux Linux Traffic ControlLinux Linux Traffic Control
Linux Linux Traffic Control
 
Wide Area Network (WAN)
Wide Area Network (WAN)Wide Area Network (WAN)
Wide Area Network (WAN)
 
Basic concept of computer network
Basic concept of computer networkBasic concept of computer network
Basic concept of computer network
 
Network Interface Card
Network Interface CardNetwork Interface Card
Network Interface Card
 
A Network Of Networks For Slide Share
A Network Of Networks For Slide ShareA Network Of Networks For Slide Share
A Network Of Networks For Slide Share
 
Gateway and firewall
Gateway and firewallGateway and firewall
Gateway and firewall
 
Router & functionality
Router & functionalityRouter & functionality
Router & functionality
 

Similar to Peer to peer(p2 p)

Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptxHananShk
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technologyabhipesit
 
Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminarbalu0503
 
Filesharing using bittorrent protocol
Filesharing using bittorrent protocolFilesharing using bittorrent protocol
Filesharing using bittorrent protocolNishan Shetty
 
P2p networks slides for show
P2p networks slides for showP2p networks slides for show
P2p networks slides for showShane Farrell
 
Peer to peer_v2pptx
Peer to peer_v2pptxPeer to peer_v2pptx
Peer to peer_v2pptxMac Pat
 
Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!DigitalThinkerHelp
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technologyguestc67adeb
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTSudhansu Dash
 
Torrent Protocol
Torrent ProtocolTorrent Protocol
Torrent ProtocolHarsht2888
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocolD bipul lomga
 
Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshidhananjaypardeshi13
 

Similar to Peer to peer(p2 p) (20)

P2 p
P2 pP2 p
P2 p
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
BitTorrent
BitTorrent BitTorrent
BitTorrent
 
Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptx
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technology
 
Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminar
 
Filesharing using bittorrent protocol
Filesharing using bittorrent protocolFilesharing using bittorrent protocol
Filesharing using bittorrent protocol
 
P2p networks slides for show
P2p networks slides for showP2p networks slides for show
P2p networks slides for show
 
Bit torrent ppt
Bit torrent pptBit torrent ppt
Bit torrent ppt
 
P2p networks
P2p networksP2p networks
P2p networks
 
Peer to peer_v2pptx
Peer to peer_v2pptxPeer to peer_v2pptx
Peer to peer_v2pptx
 
Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENT
 
Torrent Protocol
Torrent ProtocolTorrent Protocol
Torrent Protocol
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
 
Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshi
 
Torrent technology
Torrent technologyTorrent technology
Torrent technology
 

Recently uploaded

A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 

Recently uploaded (20)

A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 

Peer to peer(p2 p)

  • 1. PEER TO PEER(P2P) • What is a peer to peer network? • What is a peer to peer network architecture? • What are the advantages of peer to peer network? • What is disadvantages of peer to peer network? • What is a peer to peer file sharing? • What is BitTorrent ? • How BitTorrent works ? • Problems with BitTorrent ?
  • 2. What is a peer to peer network? • In its simplest form, a peer-to-peer (P2P) network is created when two or more PCs are connected and share resources without going through a separate server computer. • In other words, each computer on a P2P network becomes a file server as well as a client. • Used largely for sharing of content files such as audio, video, data or anything in a digital format. • There are many p2p protocols such as Ares, Bittorrent, or eDonkey(eD2k).
  • 3. What is a peer to peer network?
  • 4. A PEER • Peers are both suppliers and consumers while in the traditional client-server model, the server supplies while the client only consumes.
  • 6. What is a peer to peer network architecture? Overlay network diagram for an unstructured P2P network, illustrating the ad hoc nature of the connections between nodes overlay network diagram for a structured P2P network, using a distributed hash table (DHT) to identify and locate nodes/resources
  • 7. Structured Vs. Unstructured • Structured- • In structured peer-to-peer networks the overlay is organized into a specific topology, and the protocol ensures that any node can efficiently search the network for a file/resource, even if the resource is extremely rare. • Connections in the overlay are fixed • DHT Indexing(distributed hash table). • Unstructured- • No algorithm for organization. • Connections in the overlay are created arbitrarily. Centralized •Central server is used for indexing functions •Bittorrent Hybrid •Two groups of clients: client and overlay •eMule, Kazaa Pure •Equipotent peers, all peers have equal amount of power •Gnutella, Freenet
  • 8. What are the advantages of peer to peer network? • The peer to peer network is less expensive. • One of the major advantage to P2P network is that each time a new node is connected to the network the total capacity of the system increases. • Failure of one peer doesn’t affect the functioning of other peers. In case of Client –Server network, if server goes down whole network gets affected. • it is easy to install and configure.
  • 9. What is disadvantages of peer to peer network? • Security is a major concern, not all shared files are from benign sources. Attackers may add malware to p2p files as an attempt to take control of other nodes in the network. • Data recovery or backup is very difficult. Each computer should have its own back-up system. • Copyright issues.
  • 10. What is a peer to peer file sharing? • Peer-to-peer file sharing is different from traditional file downloading. In peer-to-peer sharing, you use a software program (rather than your Web browser) to locate computers that have the file you want. Because these are ordinary computers like yours, as opposed to servers, they are called peers. • You run peer-to-peer file-sharing software on your computer and send out a request for the file you want to download. • To locate the file, the software queries other computers that are connected to the Internet and running the file-sharing software. • When the software finds a computer that has the file you want on its hard drive, the download begin
  • 11. What is BitTorrent ? • a peer-to-peer file sharing protocol used for distributing large amounts of data. • Invented By Bram Cohen. • Released July 2001 It is now maintained by Cohen's company, BitTorrent Inc.
  • 12. How BitTorrent works ? Seeds: Seeder is someone from whom you can download a piece of file. Hence they affect the overall availability of file on P2P network. Peers:Peer is someone who is involved in file sharing activity. It is a generic term. Leecher:Leecher is someone who has downloaded a file but is not sharing it back to P2P network. Hence, overall availablity of file decreases.
  • 13. Problems with BitTorrent ? Copyright: - Many things not legally distributed - Movie and Music industries very mad - Unsuspecting users targeted for lawsuits. Security: -virus,SET attack