SlideShare a Scribd company logo
1 of 6
What is P2P? Two types of P2P Example of hybrid P2P Example of pure P2P P2P network Group C Takaaki hukasawa Saori Endo Kazuhiro Matsumoto Eichrou Miyamoto
What is P2P? P2P is communication method which render to communicate computer and computer equally.  Specifically it connects between terminals directly mutually and sent an d received data.  In addition, P2P in LAN is basically located as a functionality expansion of OS. The advantage of P2P is that the network design is easy and the introduction cost is cheap.  On the other hand, fault of P2P is that security and the network offer can not be raised.  It is said that the delivery of the file of a large capacity is a substantial cost, and the P2P delivery is attractive as the means to r educe the cost simply. Server based network P2P network
P2P with server First, a client PC access to the central server which has a list that has IP address of client computeres. Next the client asks a IP address of another client that has a data that its looking for. Then it can connect to another computere with that IP address. This is called hybrid P2P. Client computer needs IP address to connect to another computer. P2P without server All information and data are transported directly between client computers. They do not need to access to the server for IP address, because it is on the P2P network. This is called pure P2P. Two types of P2P
There is Skype as an example of server type P2P. Skype is abbreviation of "Sky peer-to-peer".  Skype is Internet phone using the P2P technology service, and it communicates by the following flows.  1. It is registered in the Skype server when Skype is downloaded, and a digital certificate is issued.  2.When you will log node in next time,it is connected with a super-node that is the server of the list of the node logged in.  3. Internet Protocol address of the node is acquired from a super-node, and the node makes the communication possible directly.  4. The packet is transmitted whenever it communicates from the inside of the firewall. Moreover, it relays it with the machine of the third party who has the global address when both are in the firewall.  The communication without a complex setting is enabled by this.  Example of hybrid P2P
Example of pure P2P Pure P2P is hardly break, because it do not depend on one particular path, but can use any path to reach to the computer which it want to connect. Therefore, in Japan, it is used for P2P Earthquake information. P2P earthquake information. All node get earthquake information from a server of Japan Meteorological Agency and share it on the network. Also they can send earthquake information The information can go through any path, so all nodes can get information surely. For example, if one path was disconnected by an accident, data can go through other paths and nodes.
References ,[object Object],http://ja.wikipedia.org/wiki/ ,[object Object],http://e-words.jp/

More Related Content

What's hot

Comparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet CommunicationComparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet Communicationijtsrd
 
web communication protocols in IoT
web communication protocols in IoTweb communication protocols in IoT
web communication protocols in IoTFabMinds
 
Internet layer security protocol & IPsec
Internet layer security protocol & IPsecInternet layer security protocol & IPsec
Internet layer security protocol & IPsecKirti Ahirrao
 
p2p project report
p2p project reportp2p project report
p2p project reportYuming Guo
 
How to know my ip address with iplogger.org
How to know my ip address with iplogger.orgHow to know my ip address with iplogger.org
How to know my ip address with iplogger.orgiploggers
 
Internet protocol
Internet protocol Internet protocol
Internet protocol Bint Javed
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityManishKumarH
 
Network protocols
Network protocolsNetwork protocols
Network protocolsAbiud Orina
 
Internet protocols
Internet protocolsInternet protocols
Internet protocolsReilen
 
Interledger Protocol Stack Deep Dive @ Boston Interledger Meetup
Interledger Protocol Stack Deep Dive @ Boston Interledger MeetupInterledger Protocol Stack Deep Dive @ Boston Interledger Meetup
Interledger Protocol Stack Deep Dive @ Boston Interledger MeetupInterledger
 
Best lookup algorithm for 100+gbps ipv6 packet
Best lookup algorithm for 100+gbps ipv6 packetBest lookup algorithm for 100+gbps ipv6 packet
Best lookup algorithm for 100+gbps ipv6 packeteSAT Publishing House
 

What's hot (19)

Tcp protocols
Tcp protocolsTcp protocols
Tcp protocols
 
Comparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet CommunicationComparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet Communication
 
web communication protocols in IoT
web communication protocols in IoTweb communication protocols in IoT
web communication protocols in IoT
 
A017510102
A017510102A017510102
A017510102
 
Internet layer security protocol & IPsec
Internet layer security protocol & IPsecInternet layer security protocol & IPsec
Internet layer security protocol & IPsec
 
p2p project report
p2p project reportp2p project report
p2p project report
 
How to know my ip address with iplogger.org
How to know my ip address with iplogger.orgHow to know my ip address with iplogger.org
How to know my ip address with iplogger.org
 
Tcp
TcpTcp
Tcp
 
Internet protocol
Internet protocol Internet protocol
Internet protocol
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber Security
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Carnivore
CarnivoreCarnivore
Carnivore
 
Unit v
Unit v Unit v
Unit v
 
Carnivore
CarnivoreCarnivore
Carnivore
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Internet protocols
Internet protocolsInternet protocols
Internet protocols
 
Internet protocols
Internet protocolsInternet protocols
Internet protocols
 
Interledger Protocol Stack Deep Dive @ Boston Interledger Meetup
Interledger Protocol Stack Deep Dive @ Boston Interledger MeetupInterledger Protocol Stack Deep Dive @ Boston Interledger Meetup
Interledger Protocol Stack Deep Dive @ Boston Interledger Meetup
 
Best lookup algorithm for 100+gbps ipv6 packet
Best lookup algorithm for 100+gbps ipv6 packetBest lookup algorithm for 100+gbps ipv6 packet
Best lookup algorithm for 100+gbps ipv6 packet
 

Similar to Week10

Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptxHananShk
 
Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!DigitalThinkerHelp
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...Brenda Thomas
 
On the Impact of Mobile Hosts in Peer-to-Peer Data Networks
On the Impact of Mobile Hosts in Peer-to-Peer Data NetworksOn the Impact of Mobile Hosts in Peer-to-Peer Data Networks
On the Impact of Mobile Hosts in Peer-to-Peer Data NetworksZhenyun Zhuang
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Mumbai Academisc
 
Introduction of tcp, ip & udp
Introduction of tcp, ip & udpIntroduction of tcp, ip & udp
Introduction of tcp, ip & udprahul kundu
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerceS S
 
P2P Seminar
P2P SeminarP2P Seminar
P2P SeminarCoRehab
 
Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...
Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...
Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...Zhenyun Zhuang
 
Peer to peer (p2p)
Peer to peer (p2p)Peer to peer (p2p)
Peer to peer (p2p)Harshini
 
story 1what is fiber opticFiber optic refers to the medium and.pdf
story 1what is fiber opticFiber optic refers to the medium and.pdfstory 1what is fiber opticFiber optic refers to the medium and.pdf
story 1what is fiber opticFiber optic refers to the medium and.pdfANJANEYAINTERIOURGAL
 
Networking-basics
Networking-basicsNetworking-basics
Networking-basicsRaj Alam
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applicationsjajinekkanti
 
Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocolKirti Ahirrao
 
Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks IJECEIAES
 
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Lakeisha Jones
 

Similar to Week10 (20)

Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptx
 
Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
 
Peer to peer connection
Peer to peer connectionPeer to peer connection
Peer to peer connection
 
On the Impact of Mobile Hosts in Peer-to-Peer Data Networks
On the Impact of Mobile Hosts in Peer-to-Peer Data NetworksOn the Impact of Mobile Hosts in Peer-to-Peer Data Networks
On the Impact of Mobile Hosts in Peer-to-Peer Data Networks
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)
 
Introduction of tcp, ip & udp
Introduction of tcp, ip & udpIntroduction of tcp, ip & udp
Introduction of tcp, ip & udp
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerce
 
P2P Seminar
P2P SeminarP2P Seminar
P2P Seminar
 
Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
 
Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...
Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...
Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...
 
Peer to peer (p2p)
Peer to peer (p2p)Peer to peer (p2p)
Peer to peer (p2p)
 
story 1what is fiber opticFiber optic refers to the medium and.pdf
story 1what is fiber opticFiber optic refers to the medium and.pdfstory 1what is fiber opticFiber optic refers to the medium and.pdf
story 1what is fiber opticFiber optic refers to the medium and.pdf
 
Networking-basics
Networking-basicsNetworking-basics
Networking-basics
 
F0322038042
F0322038042F0322038042
F0322038042
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
 
Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocol
 
Skype
SkypeSkype
Skype
 
Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks
 
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1
 

More from kazuhiroMatsumoto (20)

Thesis writingpres
Thesis writingpresThesis writingpres
Thesis writingpres
 
Review05.prn
Review05.prnReview05.prn
Review05.prn
 
Review04.prn
Review04.prnReview04.prn
Review04.prn
 
Review02.prn
Review02.prnReview02.prn
Review02.prn
 
Presen04.prn
Presen04.prnPresen04.prn
Presen04.prn
 
Indivi05.prn
Indivi05.prnIndivi05.prn
Indivi05.prn
 
Indivi04.prn
Indivi04.prnIndivi04.prn
Indivi04.prn
 
Indivi03.prn
Indivi03.prnIndivi03.prn
Indivi03.prn
 
Indivi02.prn
Indivi02.prnIndivi02.prn
Indivi02.prn
 
Indivi01.prn
Indivi01.prnIndivi01.prn
Indivi01.prn
 
Comp d04.prn
Comp d04.prnComp d04.prn
Comp d04.prn
 
Comp d03.prn
Comp d03.prnComp d03.prn
Comp d03.prn
 
Comp d01.prn
Comp d01.prnComp d01.prn
Comp d01.prn
 
Pres
PresPres
Pres
 
pres4-2
pres4-2pres4-2
pres4-2
 
Wsweek8 2
Wsweek8 2Wsweek8 2
Wsweek8 2
 
Wsweek8 1
Wsweek8 1Wsweek8 1
Wsweek8 1
 
Wsweek8
Wsweek8Wsweek8
Wsweek8
 
Week2
Week2Week2
Week2
 
Sw1 edit
Sw1 editSw1 edit
Sw1 edit
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Week10

  • 1. What is P2P? Two types of P2P Example of hybrid P2P Example of pure P2P P2P network Group C Takaaki hukasawa Saori Endo Kazuhiro Matsumoto Eichrou Miyamoto
  • 2. What is P2P? P2P is communication method which render to communicate computer and computer equally. Specifically it connects between terminals directly mutually and sent an d received data. In addition, P2P in LAN is basically located as a functionality expansion of OS. The advantage of P2P is that the network design is easy and the introduction cost is cheap. On the other hand, fault of P2P is that security and the network offer can not be raised. It is said that the delivery of the file of a large capacity is a substantial cost, and the P2P delivery is attractive as the means to r educe the cost simply. Server based network P2P network
  • 3. P2P with server First, a client PC access to the central server which has a list that has IP address of client computeres. Next the client asks a IP address of another client that has a data that its looking for. Then it can connect to another computere with that IP address. This is called hybrid P2P. Client computer needs IP address to connect to another computer. P2P without server All information and data are transported directly between client computers. They do not need to access to the server for IP address, because it is on the P2P network. This is called pure P2P. Two types of P2P
  • 4. There is Skype as an example of server type P2P. Skype is abbreviation of "Sky peer-to-peer". Skype is Internet phone using the P2P technology service, and it communicates by the following flows. 1. It is registered in the Skype server when Skype is downloaded, and a digital certificate is issued. 2.When you will log node in next time,it is connected with a super-node that is the server of the list of the node logged in. 3. Internet Protocol address of the node is acquired from a super-node, and the node makes the communication possible directly. 4. The packet is transmitted whenever it communicates from the inside of the firewall. Moreover, it relays it with the machine of the third party who has the global address when both are in the firewall. The communication without a complex setting is enabled by this. Example of hybrid P2P
  • 5. Example of pure P2P Pure P2P is hardly break, because it do not depend on one particular path, but can use any path to reach to the computer which it want to connect. Therefore, in Japan, it is used for P2P Earthquake information. P2P earthquake information. All node get earthquake information from a server of Japan Meteorological Agency and share it on the network. Also they can send earthquake information The information can go through any path, so all nodes can get information surely. For example, if one path was disconnected by an accident, data can go through other paths and nodes.
  • 6.