SlideShare a Scribd company logo
1 of 6
Download to read offline
P2P network

What is P2P?

Two types of P2P

Example of hybrid P2P

Example of pure P2P

                          Group C

                           Takaaki hukasawa
                           Saori Endo
                           Kazuhiro Matsumoto
                           Eichrou Miyamoto
What is P2P?

P2P is communication method which render to communicate computer
and computer equally. Specifically it connects between terminals
directly mutually and sent an d received data. In addition, P2P in LAN
is basically located as a functionality expansion of OS.

The advantage of P2P is that the network design is easy and the
introduction cost is cheap. On the other hand, fault of P2P is that
security and the network offer can not be raised. It is said that the
delivery of the file of a large capacity is a substantial cost, and the P2P
delivery is attractive as the means to r
educe the cost simply.

          Server based network                          P2P network
Two types of P2P



         Client computer needs IP address to connect to another computer.

P2P with server                              P2P without server

  First, a client PC access to the central         All information and data are
  server which has a list that has IP              transported directly between client
  address of client computeres.                    computers.
  Next the client asks a IP address of             They do not need to access to the
  another client that has a data that its          server for IP address, because it is on
  looking for.                                     the P2P network.
  Then it can connect to another
  computere with that IP address.

  This is called hybrid P2P.                       This is called pure P2P.
Example of hybrid P2P



There is Skype as an example of server type P2P.
Skype is abbreviation of "Sky peer-to-peer".
Skype is Internet phone using the P2P technology service, and it
communicates by the following flows.

1. It is registered in the Skype server when Skype is downloaded, and
a digital certificate is issued.

2.When you will log node in next time,it is connected with a super-node
that is the server of the list of the node logged in.

3. Internet Protocol address of the node is acquired from a super-node,
and the node makes the communication possible directly.

4. The packet is transmitted whenever it communicates from the inside
of the firewall. Moreover, it relays it with the machine of the third party
who has the global address when both are in the firewall.
The communication without a complex setting is enabled by this.
Example of pure P2P



Pure P2P is hardly break, because it do not depend
on one particular path, but can use any path to reach
to the computer which it want to connect.
Therefore, in Japan, it is used for P2P Earthquake
information.




                                    P2P earthquake information.
                                    All node get earthquake information from a server
                                    of Japan Meteorological Agency and share it on
                                    the network. Also they can send earthquake
                                    information
                                    The information can go through any path, so all
                                    nodes can get information surely.
                                    For example, if one path was disconnected by an
                                    accident, data can go through other paths and
                                    nodes.
References

Wikipedia
●



    http://ja.wikipedia.org/wiki/


e-Words
●



    http://e-words.jp/

More Related Content

What's hot

AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOS
AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOSAN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOS
AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOSIJNSA Journal
 
34C3 Interledger Presentation - Background, Streaming Payments, and Implications
34C3 Interledger Presentation - Background, Streaming Payments, and Implications34C3 Interledger Presentation - Background, Streaming Payments, and Implications
34C3 Interledger Presentation - Background, Streaming Payments, and ImplicationsInterledger
 
Best lookup algorithm for 100+gbps ipv6 packet
Best lookup algorithm for 100+gbps ipv6 packetBest lookup algorithm for 100+gbps ipv6 packet
Best lookup algorithm for 100+gbps ipv6 packeteSAT Publishing House
 
Denial of-service (do s) attack
Denial of-service (do s) attackDenial of-service (do s) attack
Denial of-service (do s) attackHTS Hosting
 
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSEFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSijp2p
 
Ip packet delivery
Ip packet deliveryIp packet delivery
Ip packet deliveryrajisri2
 

What's hot (13)

Mcse question
Mcse questionMcse question
Mcse question
 
AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOS
AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOSAN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOS
AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOS
 
34C3 Interledger Presentation - Background, Streaming Payments, and Implications
34C3 Interledger Presentation - Background, Streaming Payments, and Implications34C3 Interledger Presentation - Background, Streaming Payments, and Implications
34C3 Interledger Presentation - Background, Streaming Payments, and Implications
 
Best lookup algorithm for 100+gbps ipv6 packet
Best lookup algorithm for 100+gbps ipv6 packetBest lookup algorithm for 100+gbps ipv6 packet
Best lookup algorithm for 100+gbps ipv6 packet
 
Denial of-service (do s) attack
Denial of-service (do s) attackDenial of-service (do s) attack
Denial of-service (do s) attack
 
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSEFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
 
Tcp protocols
Tcp protocolsTcp protocols
Tcp protocols
 
Example
ExampleExample
Example
 
Ip packet delivery
Ip packet deliveryIp packet delivery
Ip packet delivery
 
1 Network Intro
1 Network Intro1 Network Intro
1 Network Intro
 
Traffic types in internet
Traffic types in internetTraffic types in internet
Traffic types in internet
 
Tor Tracer
Tor TracerTor Tracer
Tor Tracer
 

Viewers also liked

The Future Of Technology In Education by Tara Humber
The Future Of Technology In Education by Tara HumberThe Future Of Technology In Education by Tara Humber
The Future Of Technology In Education by Tara HumberMUN
 
The Future of Telecommunications and Information Technology
The Future of Telecommunications and Information TechnologyThe Future of Telecommunications and Information Technology
The Future of Telecommunications and Information TechnologyLarry Smarr
 
Technology and education
Technology and educationTechnology and education
Technology and educationguest3652aa
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionIn a Rocket
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 

Viewers also liked (6)

Wk12
Wk12Wk12
Wk12
 
The Future Of Technology In Education by Tara Humber
The Future Of Technology In Education by Tara HumberThe Future Of Technology In Education by Tara Humber
The Future Of Technology In Education by Tara Humber
 
The Future of Telecommunications and Information Technology
The Future of Telecommunications and Information TechnologyThe Future of Telecommunications and Information Technology
The Future of Telecommunications and Information Technology
 
Technology and education
Technology and educationTechnology and education
Technology and education
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 

Similar to Wk10

Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptxHananShk
 
Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!DigitalThinkerHelp
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...Brenda Thomas
 
Peer to peer (p2p)
Peer to peer (p2p)Peer to peer (p2p)
Peer to peer (p2p)Harshini
 
On the Impact of Mobile Hosts in Peer-to-Peer Data Networks
On the Impact of Mobile Hosts in Peer-to-Peer Data NetworksOn the Impact of Mobile Hosts in Peer-to-Peer Data Networks
On the Impact of Mobile Hosts in Peer-to-Peer Data NetworksZhenyun Zhuang
 
Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks IJECEIAES
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Mumbai Academisc
 
story 1what is fiber opticFiber optic refers to the medium and.pdf
story 1what is fiber opticFiber optic refers to the medium and.pdfstory 1what is fiber opticFiber optic refers to the medium and.pdf
story 1what is fiber opticFiber optic refers to the medium and.pdfANJANEYAINTERIOURGAL
 
Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...
Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...
Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...Zhenyun Zhuang
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
Bluetooth UDP Performance over Bluetooth
Bluetooth UDP Performance over BluetoothBluetooth UDP Performance over Bluetooth
Bluetooth UDP Performance over BluetoothVertoda System
 
P2P Seminar
P2P SeminarP2P Seminar
P2P SeminarCoRehab
 

Similar to Wk10 (20)

Week10
Week10Week10
Week10
 
Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptx
 
Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
 
Peer to peer (p2p)
Peer to peer (p2p)Peer to peer (p2p)
Peer to peer (p2p)
 
Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
 
On the Impact of Mobile Hosts in Peer-to-Peer Data Networks
On the Impact of Mobile Hosts in Peer-to-Peer Data NetworksOn the Impact of Mobile Hosts in Peer-to-Peer Data Networks
On the Impact of Mobile Hosts in Peer-to-Peer Data Networks
 
Peer to peer connection
Peer to peer connectionPeer to peer connection
Peer to peer connection
 
Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)
 
P2p Peer To Peer Introduction
P2p Peer To Peer IntroductionP2p Peer To Peer Introduction
P2p Peer To Peer Introduction
 
story 1what is fiber opticFiber optic refers to the medium and.pdf
story 1what is fiber opticFiber optic refers to the medium and.pdfstory 1what is fiber opticFiber optic refers to the medium and.pdf
story 1what is fiber opticFiber optic refers to the medium and.pdf
 
P2p networks
P2p networksP2p networks
P2p networks
 
Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...
Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...
Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
Vpn
VpnVpn
Vpn
 
Bluetooth UDP Performance over Bluetooth
Bluetooth UDP Performance over BluetoothBluetooth UDP Performance over Bluetooth
Bluetooth UDP Performance over Bluetooth
 
Peer topeer
Peer topeerPeer topeer
Peer topeer
 
P2P Seminar
P2P SeminarP2P Seminar
P2P Seminar
 
Week3 applications
Week3 applicationsWeek3 applications
Week3 applications
 

More from kazuhiroMatsumoto (20)

Thesis writingpres
Thesis writingpresThesis writingpres
Thesis writingpres
 
Review05.prn
Review05.prnReview05.prn
Review05.prn
 
Review04.prn
Review04.prnReview04.prn
Review04.prn
 
Review02.prn
Review02.prnReview02.prn
Review02.prn
 
Presen04.prn
Presen04.prnPresen04.prn
Presen04.prn
 
Indivi05.prn
Indivi05.prnIndivi05.prn
Indivi05.prn
 
Indivi04.prn
Indivi04.prnIndivi04.prn
Indivi04.prn
 
Indivi03.prn
Indivi03.prnIndivi03.prn
Indivi03.prn
 
Indivi02.prn
Indivi02.prnIndivi02.prn
Indivi02.prn
 
Indivi01.prn
Indivi01.prnIndivi01.prn
Indivi01.prn
 
Comp d04.prn
Comp d04.prnComp d04.prn
Comp d04.prn
 
Comp d03.prn
Comp d03.prnComp d03.prn
Comp d03.prn
 
Comp d01.prn
Comp d01.prnComp d01.prn
Comp d01.prn
 
Pres
PresPres
Pres
 
pres4-2
pres4-2pres4-2
pres4-2
 
Wsweek8 2
Wsweek8 2Wsweek8 2
Wsweek8 2
 
Wsweek8 1
Wsweek8 1Wsweek8 1
Wsweek8 1
 
Wsweek8
Wsweek8Wsweek8
Wsweek8
 
Week2
Week2Week2
Week2
 
Sw1 edit
Sw1 editSw1 edit
Sw1 edit
 

Recently uploaded

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Wk10

  • 1. P2P network What is P2P? Two types of P2P Example of hybrid P2P Example of pure P2P Group C Takaaki hukasawa Saori Endo Kazuhiro Matsumoto Eichrou Miyamoto
  • 2. What is P2P? P2P is communication method which render to communicate computer and computer equally. Specifically it connects between terminals directly mutually and sent an d received data. In addition, P2P in LAN is basically located as a functionality expansion of OS. The advantage of P2P is that the network design is easy and the introduction cost is cheap. On the other hand, fault of P2P is that security and the network offer can not be raised. It is said that the delivery of the file of a large capacity is a substantial cost, and the P2P delivery is attractive as the means to r educe the cost simply. Server based network P2P network
  • 3. Two types of P2P Client computer needs IP address to connect to another computer. P2P with server P2P without server First, a client PC access to the central All information and data are server which has a list that has IP transported directly between client address of client computeres. computers. Next the client asks a IP address of They do not need to access to the another client that has a data that its server for IP address, because it is on looking for. the P2P network. Then it can connect to another computere with that IP address. This is called hybrid P2P. This is called pure P2P.
  • 4. Example of hybrid P2P There is Skype as an example of server type P2P. Skype is abbreviation of "Sky peer-to-peer". Skype is Internet phone using the P2P technology service, and it communicates by the following flows. 1. It is registered in the Skype server when Skype is downloaded, and a digital certificate is issued. 2.When you will log node in next time,it is connected with a super-node that is the server of the list of the node logged in. 3. Internet Protocol address of the node is acquired from a super-node, and the node makes the communication possible directly. 4. The packet is transmitted whenever it communicates from the inside of the firewall. Moreover, it relays it with the machine of the third party who has the global address when both are in the firewall. The communication without a complex setting is enabled by this.
  • 5. Example of pure P2P Pure P2P is hardly break, because it do not depend on one particular path, but can use any path to reach to the computer which it want to connect. Therefore, in Japan, it is used for P2P Earthquake information. P2P earthquake information. All node get earthquake information from a server of Japan Meteorological Agency and share it on the network. Also they can send earthquake information The information can go through any path, so all nodes can get information surely. For example, if one path was disconnected by an accident, data can go through other paths and nodes.
  • 6. References Wikipedia ● http://ja.wikipedia.org/wiki/ e-Words ● http://e-words.jp/