<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="http://wiki.cas.mcmaster.ca/skins/common/feed.css?207"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>http://wiki.cas.mcmaster.ca/index.php?feed=atom&amp;target=Chowkw&amp;title=Special%3AContributions</id>
		<title>Computing and Software Wiki - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="http://wiki.cas.mcmaster.ca/index.php?feed=atom&amp;target=Chowkw&amp;title=Special%3AContributions"/>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Special:Contributions/Chowkw"/>
		<updated>2026-05-23T07:55:30Z</updated>
		<subtitle>From Computing and Software Wiki</subtitle>
		<generator>MediaWiki 1.15.1</generator>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Peer_To_Peer_Network_Security</id>
		<title>Peer To Peer Network Security</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Peer_To_Peer_Network_Security"/>
				<updated>2008-04-08T21:29:52Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Peer-to-Peer''' (or '''P2P''') networking is a fairly popular networking concept. Networks software such as BitTorrent and eMule make it easy for people to find what they want and share what they have. The first idea for using P2P networks are to exchange pirated audio, video, software, and other inappropriate content. An important thing should be noticed that share thing files on your computer with anonymous and unknown users on the public Internet could be dangerous and lead to security problem. [4,5]&lt;br /&gt;
[[Image:Peer_to_peer.gif|thumb|250px|right| The different between Client-Server and P2P model.[1]]]&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
==What is Peer to Peer Network==&lt;br /&gt;
A pure peer-to-peer network does not have the notion of clients or servers, but only equal peer nodes that simultaneously function as both &amp;quot;clients&amp;quot; and &amp;quot;servers&amp;quot; to the other nodes on the network. An example for a non P2P file transfer is an FTP server where the client and server programs are quite distinct. P2P networks are generally simpler but they usually do not offer the same performance under heavy loads. The P2P network itself relies on computing power at the ends of a connection rather than from within the network itself. Besides file sharing, P2P networks are also used for Distributed Computation or Instant messaging. [2,7]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Network Structure==&lt;br /&gt;
Peer-to-peer file sharing networks are transient Internet networks that allow computer users within the same P2P networking program to connect with each other computers and use sophisticated searching techniques to directly access and download files from one another's hard drives. The P2P overlay network consists of all the participating peers as network nodes. There are links between any two nodes that know each other. Based on how nodes link to each other, P2P networks can classify as '''Unstructured''' and '''Structured'''. [6,2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Unstructured P2P networks===&lt;br /&gt;
An unstructured P2P network is formed when the overlay links are established arbitrarily. Such networks can be easily constructed as a new peer that wants to join the network can copy existing links of another node and then form its own links over time. In an unstructured P2P network, if a peer wants to find a desired piece of data in the network, the query has to be flooded through the network to find as many peers as possible that share the data. The main disadvantage with such networks is that the queries may not always be resolved. Popular content is likely to be available at several peers and any peer searching for it is likely to find the same thing, but if a peer is looking for rare data shared by only a few other peers, then it is highly unlikely that search will be successful. [2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Structured P2P networks===&lt;br /&gt;
Structured P2P network employ a globally consistent protocol to ensure that any node can efficiently route a search to some peer that has the desired file, even if the file is extremely rare. Such a guarantee necessitates a more structured pattern of overlay links. By far the most common type of structured P2P network is the distributed hash table (DHT), in which a variant of consistent hashing is used to assign ownership of each file to a particular peer, in a way analogous to a traditional hash table's assignment of each key to a particular array slot. [2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Security Concern==&lt;br /&gt;
One major concern of using P2P architecture in the workplace is, of course, network security. Security concerns stem from the architecture itself. Today we find most blocking and routing handles by a specific server within network, but the P2P architecture has no single fixed server responsible for routing and requests. There are many kind of P2P networking attacks that cause the security problem and we have some example below. On the other hand, most of the security mechanisms using today are based on secret key, public key or combination of them. below has some introduction of the basic aspects of them. [7,1]&lt;br /&gt;
&lt;br /&gt;
The picture below shows the weakness of security when using P2P applications. It shows that these applications are allow to go though the network and the network is now not secure. [1]&lt;br /&gt;
&lt;br /&gt;
[[Image:Security.gif]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Attacks===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*'''TCP port''' - To share files on the computer within a P2P network such as BitTorrent, a specific TCP port must be opened for the P2P software to communicate. In effect, once you open the port you are no longer protected from malicious traffic coming through it. [4]&lt;br /&gt;
&lt;br /&gt;
*'''Trojans, Viruses''' - When files are downloading from other peer, there are no guarantee that the files being transfered are the one that you want. Also, when you double-click the EXE file, you can not sure that it has not installed a Trojans or bring viruses to the computer. [4]&lt;br /&gt;
&lt;br /&gt;
*'''Malware''' - The P2P network software itself may contain [http://en.wikipedia.org/wiki/Malware malware] or [http://en.wikipedia.org/wiki/Spyware spyware]. [2]&lt;br /&gt;
&lt;br /&gt;
*'''Bandwidth Clogging and File Sharing''' - P2P applications such as BitTorrent make it possible for one computer to share files with another computer located somewhere else on the Internet. A major problem with P2P file-sharing programs is that they result in heavy traffic, which clogs the institution networks. The rich audio and video files that P2P users share are very big. This affects response times for internal users as well as e-business customers and that results in lost income. [1]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Security Mechanisms===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*'''Secret Key''' - Secret key techniques are based on the fact that the sender and recipient share a secret, which is used for various cryptographic operations, such as encryption and decryption of messages and the creation and verification of message authentication data. This secret key must be exchanged in a separate out of bound procedure prior to the intended communication (using a PKI for example). [1]&lt;br /&gt;
&lt;br /&gt;
*'''Public Key''' - Public Key Techniques are based on the use of asymmetric key pairs. Usually each user is in possession of just one key pair. One of the pair is made publicly available, while the other is kept private. Because one is available there is no need for an out of band key exchange, however there is a need for an infrastructure to distribute the public key authentically. Because there is no need for pre-shared secrets prior to a communication, public key techniques are ideal for supporting security between previously unknown parties. [1]&lt;br /&gt;
&lt;br /&gt;
*'''Trust''' - Trust is necessary in any distributed application -- P2P applications included. Trust can become a serious issue for P2P applications that distribute processing work to distributed computing nodes and then collect the results. If you trust a node within the network, you might be tempted to trust the content it provides. In some cases, this assumption is reasonable, but not always. '''Trust''' can established by these three standard elements. [3]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*'''Authentication''' - This process determine which node is in fact who or what that node declares itself to be. [3]&lt;br /&gt;
&lt;br /&gt;
*'''Authorization''' - It gives an authentication to other node to access some subset of the resource s on another peer. [3]&lt;br /&gt;
&lt;br /&gt;
*'''Encryption''' - This process coverts understandable information (plaintext) into a form difficult to understand by unauthorized individuals and systems. One use of encryption is to protect the information that flows between peers on an unsecured network such as Internet. [3]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Applications==&lt;br /&gt;
An important goal in peer-to-peer networks is that all clients provide resources, including bandwidth, storage space, and computing power. Thus, as nodes arrive and demand on the system increases, the total capacity of the system also increases. [2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===General Usage===&lt;br /&gt;
Peer-to-peer can be used for:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[http://en.wikipedia.org/wiki/File_sharing File sharing] - Files are stored and served by personal computers of the users.&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/VoIP VoIP] - A protocol optimized for the transmission of voice through the Internet or other packet switched networks.&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Telephony Telephony] - Provide voice communication over distances, specifically by connecting telephones to each other.&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Streaming_media Streaming media] - A kind of multimedia that is constantly received by, and normally displayed to, the end-user while it is being delivered by the provider.&lt;br /&gt;
&lt;br /&gt;
*Software publication and distribution - Giving out a big software product with P2P networks and therefore peer can get the latest updated of the software.&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Instant_Messaging Instant Messaging] - A real-time communication tool between two or more people based on typed text.&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Outside Computer Science===&lt;br /&gt;
Peer-to-peer networks have also begun to attract attention outside computer science point of view, especially those deal with large data-sets. [2]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Bioinformatics Bioinformatics] - P2P networks can used to run large programs designed to carry out tests to identify drug candidates. A program called [http://www.proteomecommons.org/dev/dfs/ Tranche] was developed to solve the bioinformatics data sharing problem in a secure and scalable fashion. [2]&lt;br /&gt;
&lt;br /&gt;
*'''Education and Academia''' - Because P2P networks have fast distribution and large storage space features, many organizations are trying to apply it for educational and academic purposes. [2]&lt;br /&gt;
&lt;br /&gt;
*'''Military''' - The U.S. Department of Defense has already started research on P2P networks as part of its modern network warfare strategy. However, due to security reasons, details are kept classified. [2]&lt;br /&gt;
&lt;br /&gt;
*'''Business''' - It is still in the beginning states of using P2P networks in business areas. There are several reasons why companies prefer P2P networks, such as: Real-time collaboration, a process which requires strong computing power, etc.&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[1] Declan, Jarlath, Keith, John, Dan, ''P2P Security'', TCD 4BA2 Project 2002/03, http://ntrg.cs.tcd.ie/undergrad/4ba2.02-03/p10.html&lt;br /&gt;
&lt;br /&gt;
[2]''Peer-to-peer'', March 2008, http://en.wikipedia.org/wiki/Peer-to-peer&lt;br /&gt;
&lt;br /&gt;
[3]Todd Sundsted, ''The practice of peer-to-peer computing: Trust and security in peer-to-peer networks'', 19 Jun 2002, http://www.ibm.com/developerworks/java/library/j-p2ptrust/&lt;br /&gt;
&lt;br /&gt;
[4] Tony Bradley, ''Peer-to-Peer (P2P) Network Security'', Four Steps To Sharing and Swapping Files Without Becoming a Victim, About.com, http://netsecurity.about.com/od/newsandeditorial1/a/p2psecurity.htm&lt;br /&gt;
&lt;br /&gt;
[5]''PEER-TO-PEER SECURITY: The Dangers of P2P'', Websense, Inc., http://www.websense.com/global/en/ResourceCenter/p2p_security.php&lt;br /&gt;
&lt;br /&gt;
[6]''Those aren’t just files you’re swapping – the dangers of Peer-to-Peer File Sharing'', Websense, Inc., Thttp://www.websense.com/docs/WhitePapers/PeertoPeer.pdf&lt;br /&gt;
&lt;br /&gt;
[7]Vangie 'Aurora' Beal, ''All About Peer-To-Peer Architecture'', May 20, 2005, http://www.webopedia.com/DidYouKnow/Internet/2005/peer_to_peer.asp&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
[[Streaming Media Technology]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.ibm.com/developerworks/java/library/j-p2ptrust/ The practice of peer-to-peer computing: Trust and security in peer-to-peer networks]&lt;br /&gt;
*[http://ntrg.cs.tcd.ie/undergrad/4ba2.02-03/p10.html P2P Security]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Chowkw|Chowkw]] 17:29, 8 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Peer_To_Peer_Network_Security</id>
		<title>Peer To Peer Network Security</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Peer_To_Peer_Network_Security"/>
				<updated>2008-04-08T21:29:04Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;‘‘‘Peer-to-Peer‘‘‘ (or ‘‘‘P2P‘‘‘) networking is a fairly popular networking concept. Networks software such as BitTorrent and eMule make it easy for people to find what they want and share what they have. The first idea for using P2P networks are to exchange pirated audio, video, software, and other inappropriate content. An important thing should be noticed that share thing files on your computer with anonymous and unknown users on the public Internet could be dangerous and lead to security problem. [4,5]&lt;br /&gt;
[[Image:Peer_to_peer.gif|thumb|250px|right| The different between Client-Server and P2P model.[1]]]&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
==What is Peer to Peer Network==&lt;br /&gt;
A pure peer-to-peer network does not have the notion of clients or servers, but only equal peer nodes that simultaneously function as both &amp;quot;clients&amp;quot; and &amp;quot;servers&amp;quot; to the other nodes on the network. An example for a non P2P file transfer is an FTP server where the client and server programs are quite distinct. P2P networks are generally simpler but they usually do not offer the same performance under heavy loads. The P2P network itself relies on computing power at the ends of a connection rather than from within the network itself. Besides file sharing, P2P networks are also used for Distributed Computation or Instant messaging. [2,7]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Network Structure==&lt;br /&gt;
Peer-to-peer file sharing networks are transient Internet networks that allow computer users within the same P2P networking program to connect with each other computers and use sophisticated searching techniques to directly access and download files from one another's hard drives. The P2P overlay network consists of all the participating peers as network nodes. There are links between any two nodes that know each other. Based on how nodes link to each other, P2P networks can classify as '''Unstructured''' and '''Structured'''. [6,2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Unstructured P2P networks===&lt;br /&gt;
An unstructured P2P network is formed when the overlay links are established arbitrarily. Such networks can be easily constructed as a new peer that wants to join the network can copy existing links of another node and then form its own links over time. In an unstructured P2P network, if a peer wants to find a desired piece of data in the network, the query has to be flooded through the network to find as many peers as possible that share the data. The main disadvantage with such networks is that the queries may not always be resolved. Popular content is likely to be available at several peers and any peer searching for it is likely to find the same thing, but if a peer is looking for rare data shared by only a few other peers, then it is highly unlikely that search will be successful. [2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Structured P2P networks===&lt;br /&gt;
Structured P2P network employ a globally consistent protocol to ensure that any node can efficiently route a search to some peer that has the desired file, even if the file is extremely rare. Such a guarantee necessitates a more structured pattern of overlay links. By far the most common type of structured P2P network is the distributed hash table (DHT), in which a variant of consistent hashing is used to assign ownership of each file to a particular peer, in a way analogous to a traditional hash table's assignment of each key to a particular array slot. [2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Security Concern==&lt;br /&gt;
One major concern of using P2P architecture in the workplace is, of course, network security. Security concerns stem from the architecture itself. Today we find most blocking and routing handles by a specific server within network, but the P2P architecture has no single fixed server responsible for routing and requests. There are many kind of P2P networking attacks that cause the security problem and we have some example below. On the other hand, most of the security mechanisms using today are based on secret key, public key or combination of them. below has some introduction of the basic aspects of them. [7,1]&lt;br /&gt;
&lt;br /&gt;
The picture below shows the weakness of security when using P2P applications. It shows that these applications are allow to go though the network and the network is now not secure. [1]&lt;br /&gt;
&lt;br /&gt;
[[Image:Security.gif]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Attacks===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*'''TCP port''' - To share files on the computer within a P2P network such as BitTorrent, a specific TCP port must be opened for the P2P software to communicate. In effect, once you open the port you are no longer protected from malicious traffic coming through it. [4]&lt;br /&gt;
&lt;br /&gt;
*'''Trojans, Viruses''' - When files are downloading from other peer, there are no guarantee that the files being transfered are the one that you want. Also, when you double-click the EXE file, you can not sure that it has not installed a Trojans or bring viruses to the computer. [4]&lt;br /&gt;
&lt;br /&gt;
*'''Malware''' - The P2P network software itself may contain [http://en.wikipedia.org/wiki/Malware malware] or [http://en.wikipedia.org/wiki/Spyware spyware]. [2]&lt;br /&gt;
&lt;br /&gt;
*'''Bandwidth Clogging and File Sharing''' - P2P applications such as BitTorrent make it possible for one computer to share files with another computer located somewhere else on the Internet. A major problem with P2P file-sharing programs is that they result in heavy traffic, which clogs the institution networks. The rich audio and video files that P2P users share are very big. This affects response times for internal users as well as e-business customers and that results in lost income. [1]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Security Mechanisms===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*'''Secret Key''' - Secret key techniques are based on the fact that the sender and recipient share a secret, which is used for various cryptographic operations, such as encryption and decryption of messages and the creation and verification of message authentication data. This secret key must be exchanged in a separate out of bound procedure prior to the intended communication (using a PKI for example). [1]&lt;br /&gt;
&lt;br /&gt;
*'''Public Key''' - Public Key Techniques are based on the use of asymmetric key pairs. Usually each user is in possession of just one key pair. One of the pair is made publicly available, while the other is kept private. Because one is available there is no need for an out of band key exchange, however there is a need for an infrastructure to distribute the public key authentically. Because there is no need for pre-shared secrets prior to a communication, public key techniques are ideal for supporting security between previously unknown parties. [1]&lt;br /&gt;
&lt;br /&gt;
*'''Trust''' - Trust is necessary in any distributed application -- P2P applications included. Trust can become a serious issue for P2P applications that distribute processing work to distributed computing nodes and then collect the results. If you trust a node within the network, you might be tempted to trust the content it provides. In some cases, this assumption is reasonable, but not always. '''Trust''' can established by these three standard elements. [3]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*'''Authentication''' - This process determine which node is in fact who or what that node declares itself to be. [3]&lt;br /&gt;
&lt;br /&gt;
*'''Authorization''' - It gives an authentication to other node to access some subset of the resource s on another peer. [3]&lt;br /&gt;
&lt;br /&gt;
*'''Encryption''' - This process coverts understandable information (plaintext) into a form difficult to understand by unauthorized individuals and systems. One use of encryption is to protect the information that flows between peers on an unsecured network such as Internet. [3]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Applications==&lt;br /&gt;
An important goal in peer-to-peer networks is that all clients provide resources, including bandwidth, storage space, and computing power. Thus, as nodes arrive and demand on the system increases, the total capacity of the system also increases. [2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===General Usage===&lt;br /&gt;
Peer-to-peer can be used for:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[http://en.wikipedia.org/wiki/File_sharing File sharing] - Files are stored and served by personal computers of the users.&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/VoIP VoIP] - A protocol optimized for the transmission of voice through the Internet or other packet switched networks.&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Telephony Telephony] - Provide voice communication over distances, specifically by connecting telephones to each other.&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Streaming_media Streaming media] - A kind of multimedia that is constantly received by, and normally displayed to, the end-user while it is being delivered by the provider.&lt;br /&gt;
&lt;br /&gt;
*Software publication and distribution - Giving out a big software product with P2P networks and therefore peer can get the latest updated of the software.&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Instant_Messaging Instant Messaging] - A real-time communication tool between two or more people based on typed text.&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Outside Computer Science===&lt;br /&gt;
Peer-to-peer networks have also begun to attract attention outside computer science point of view, especially those deal with large data-sets. [2]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Bioinformatics Bioinformatics] - P2P networks can used to run large programs designed to carry out tests to identify drug candidates. A program called [http://www.proteomecommons.org/dev/dfs/ Tranche] was developed to solve the bioinformatics data sharing problem in a secure and scalable fashion. [2]&lt;br /&gt;
&lt;br /&gt;
*'''Education and Academia''' - Because P2P networks have fast distribution and large storage space features, many organizations are trying to apply it for educational and academic purposes. [2]&lt;br /&gt;
&lt;br /&gt;
*'''Military''' - The U.S. Department of Defense has already started research on P2P networks as part of its modern network warfare strategy. However, due to security reasons, details are kept classified. [2]&lt;br /&gt;
&lt;br /&gt;
*'''Business''' - It is still in the beginning states of using P2P networks in business areas. There are several reasons why companies prefer P2P networks, such as: Real-time collaboration, a process which requires strong computing power, etc.&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[1] Declan, Jarlath, Keith, John, Dan, ''P2P Security'', TCD 4BA2 Project 2002/03, http://ntrg.cs.tcd.ie/undergrad/4ba2.02-03/p10.html&lt;br /&gt;
&lt;br /&gt;
[2]''Peer-to-peer'', March 2008, http://en.wikipedia.org/wiki/Peer-to-peer&lt;br /&gt;
&lt;br /&gt;
[3]Todd Sundsted, ''The practice of peer-to-peer computing: Trust and security in peer-to-peer networks'', 19 Jun 2002, http://www.ibm.com/developerworks/java/library/j-p2ptrust/&lt;br /&gt;
&lt;br /&gt;
[4] Tony Bradley, ''Peer-to-Peer (P2P) Network Security'', Four Steps To Sharing and Swapping Files Without Becoming a Victim, About.com, http://netsecurity.about.com/od/newsandeditorial1/a/p2psecurity.htm&lt;br /&gt;
&lt;br /&gt;
[5]''PEER-TO-PEER SECURITY: The Dangers of P2P'', Websense, Inc., http://www.websense.com/global/en/ResourceCenter/p2p_security.php&lt;br /&gt;
&lt;br /&gt;
[6]''Those aren’t just files you’re swapping – the dangers of Peer-to-Peer File Sharing'', Websense, Inc., Thttp://www.websense.com/docs/WhitePapers/PeertoPeer.pdf&lt;br /&gt;
&lt;br /&gt;
[7]Vangie 'Aurora' Beal, ''All About Peer-To-Peer Architecture'', May 20, 2005, http://www.webopedia.com/DidYouKnow/Internet/2005/peer_to_peer.asp&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
[[Streaming Media Technology]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.ibm.com/developerworks/java/library/j-p2ptrust/ The practice of peer-to-peer computing: Trust and security in peer-to-peer networks]&lt;br /&gt;
*[http://ntrg.cs.tcd.ie/undergrad/4ba2.02-03/p10.html P2P Security]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Chowkw|Chowkw]] 17:29, 8 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Peer_To_Peer_Network_Security</id>
		<title>Peer To Peer Network Security</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Peer_To_Peer_Network_Security"/>
				<updated>2008-04-08T20:08:13Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Peer-to-Peer''' (or '''P2P''') networking is a fairly popular networking concept. Network softwares such as BitTorrent and eMule make it easy for people to find what they want and share what they have. P2P networks are used primarily to exchange pirated audio, video, software, and other inappropriate content. An important thing should be noticed that share thing files on your computer with anonymous and unknown users on the public Internet could be dangerous and lead to security problem. [4,5]&lt;br /&gt;
[[Image:Peer_to_peer.gif|thumb|250px|right| The different between Client-Server and P2P model.[1]]]&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
==What is Peer to Peer Network==&lt;br /&gt;
A pure peer-to-peer network does not have the notion of clients or servers, but only equal peer nodes that simultaneously function as both &amp;quot;clients&amp;quot; and &amp;quot;servers&amp;quot; to the other nodes on the network. An example for a non P2P file transfer is an FTP server where the client and server programs are quite distinct. P2P networks are generally simpler but they usually do not offer the same performance under heavy loads. The P2P network itself relies on computing power at the ends of a connection rather than from within the network itself. Besides file sharing, P2P networks are also used for Distributed Computation or Instant messaging. [2,7]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Network Structure==&lt;br /&gt;
Peer-to-peer file sharing networks are transient Internet networks that allow computer users within the same P2P networking program to connect with each other computers and use sophisticated searching techniques to directly access and download files from one another's hard drives. The P2P overlay network consists of all the participating peers as network nodes. There are links between any two nodes that know each other. Based on how nodes link to each other, P2P networks can classify as '''Unstructured''' and '''Structured'''. [6,2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Unstructured P2P networks===&lt;br /&gt;
An unstructured P2P network is formed when the overlay links are established arbitrarily. Such networks can be easily constructed as a new peer that wants to join the network can copy existing links of another node and then form its own links over time. In an unstructured P2P network, if a peer wants to find a desired piece of data in the network, the query has to be flooded through the network to find as many peers as possible that share the data. The main disadvantage with such networks is that the queries may not always be resolved. Popular content is likely to be available at several peers and any peer searching for it is likely to find the same thing, but if a peer is looking for rare data shared by only a few other peers, then it is highly unlikely that search will be successful. [2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Structured P2P networks===&lt;br /&gt;
Structured P2P network employ a globally consistent protocol to ensure that any node can efficiently route a search to some peer that has the desired file, even if the file is extremely rare. Such a guarantee necessitates a more structured pattern of overlay links. By far the most common type of structured P2P network is the distributed hash table (DHT), in which a variant of consistent hashing is used to assign ownership of each file to a particular peer, in a way analogous to a traditional hash table's assignment of each key to a particular array slot. [2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Security Concern==&lt;br /&gt;
One major concern of using P2P architecture in the workplace is, of course, network security. Security concerns stem from the architecture itself. Today we find most blocking and routing handles by a specific server within network, but the P2P architecture has no single fixed server responsible for routing and requests. There are many kind of P2P networking attacks that cause the security problem and we have some example below. On the other hand, most of the security mechanisms using today are based on secret key, public key or combination of them. below has some introduction of the basic aspects of them. [7,1]&lt;br /&gt;
&lt;br /&gt;
The picture below shows the weakness of security when using P2P applications. It shows that these applications are allow to go though the network and the network is now not secure. [1]&lt;br /&gt;
&lt;br /&gt;
[[Image:Security.gif]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Attacks===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*'''TCP port''' - To share files on the computer within a P2P network such as BitTorrent, a specific TCP port must be opened for the P2P software to communicate. In effect, once you open the port you are no longer protected from malicious traffic coming through it. [4]&lt;br /&gt;
&lt;br /&gt;
*'''Trojans, Viruses''' - When files are downloading from other peer, there are no guarantee that the files being transfered are the one that you want. Also, when you double-click the EXE file, you can not sure that it has not installed a Trojans or bring viruses to the computer. [4]&lt;br /&gt;
&lt;br /&gt;
*'''Malware''' - The P2P network software itself may contain [http://en.wikipedia.org/wiki/Malware malware] or [http://en.wikipedia.org/wiki/Spyware spyware]. [2]&lt;br /&gt;
&lt;br /&gt;
*'''Bandwidth Clogging and File Sharing''' - P2P applications such as BitTorrent make it possible for one computer to share files with another computer located somewhere else on the Internet. A major problem with P2P file-sharing programs is that they result in heavy traffic, which clogs the institution networks. The rich audio and video files that P2P users share are very big. This affects response times for internal users as well as e-business customers and that results in lost income. [1]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Security Mechanisms===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*'''Secret Key''' - Secret key techniques are based on the fact that the sender and recipient share a secret, which is used for various cryptographic operations, such as encryption and decryption of messages and the creation and verification of message authentication data. This secret key must be exchanged in a separate out of bound procedure prior to the intended communication (using a PKI for example). [1]&lt;br /&gt;
&lt;br /&gt;
*'''Public Key''' - Public Key Techniques are based on the use of asymmetric key pairs. Usually each user is in possession of just one key pair. One of the pair is made publicly available, while the other is kept private. Because one is available there is no need for an out of band key exchange, however there is a need for an infrastructure to distribute the public key authentically. Because there is no need for pre-shared secrets prior to a communication, public key techniques are ideal for supporting security between previously unknown parties. [1]&lt;br /&gt;
&lt;br /&gt;
*'''Trust''' - Trust is necessary in any distributed application -- P2P applications included. Trust can become a serious issue for P2P applications that distribute processing work to distributed computing nodes and then collect the results. If you trust a node within the network, you might be tempted to trust the content it provides. In some cases, this assumption is reasonable, but not always. '''Trust''' can established by these three standard elements. [3]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*'''Authentication''' - This process determine which node is in fact who or what that node declares itself to be. [3]&lt;br /&gt;
&lt;br /&gt;
*'''Authorization''' - It gives an authentication to other node to access some subset of the resource s on another peer. [3]&lt;br /&gt;
&lt;br /&gt;
*'''Encryption''' - This process coverts understandable information (plaintext) into a form difficult to understand by unauthorized individuals and systems. One use of encryption is to protect the information that flows between peers on an unsecured network such as Internet. [3]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Applications==&lt;br /&gt;
An important goal in peer-to-peer networks is that all clients provide resources, including bandwidth, storage space, and computing power. Thus, as nodes arrive and demand on the system increases, the total capacity of the system also increases. [2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===General Usage===&lt;br /&gt;
Peer-to-peer can be used for:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[http://en.wikipedia.org/wiki/File_sharing File sharing] - Files are stored and served by personal computers of the users.&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/VoIP VoIP] - A protocol optimized for the transmission of voice through the Internet or other packet switched networks.&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Telephony Telephony] - Provide voice communication over distances, specifically by connecting telephones to each other.&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Streaming_media Streaming media] - A kind of multimedia that is constantly received by, and normally displayed to, the end-user while it is being delivered by the provider.&lt;br /&gt;
&lt;br /&gt;
*Software publication and distribution - Giving out a big software product with P2P networks and therefore peer can get the latest updated of the software.&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Instant_Messaging Instant Messaging] - A real-time communication tool between two or more people based on typed text.&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Outside Computer Science===&lt;br /&gt;
Peer-to-peer networks have also begun to attract attention outside computer science point of view, especially those deal with large data-sets. [2]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Bioinformatics Bioinformatics] - P2P networks can used to run large programs designed to carry out tests to identify drug candidates. A program called [http://www.proteomecommons.org/dev/dfs/ Tranche] was developed to solve the bioinformatics data sharing problem in a secure and scalable fashion. [2]&lt;br /&gt;
&lt;br /&gt;
*'''Education and Academia''' - Because P2P networks have fast distribution and large storage space features, many organizations are trying to apply it for educational and academic purposes. [2]&lt;br /&gt;
&lt;br /&gt;
*'''Military''' - The U.S. Department of Defense has already started research on P2P networks as part of its modern network warfare strategy. However, due to security reasons, details are kept classified. [2]&lt;br /&gt;
&lt;br /&gt;
*'''Business''' - It is still in the beginning states of using P2P networks in business areas. There are several reasons why companies prefer P2P networks, such as: Real-time collaboration, a process which requires strong computing power, etc.&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[1] Declan, Jarlath, Keith, John, Dan, ''P2P Security'', TCD 4BA2 Project 2002/03, http://ntrg.cs.tcd.ie/undergrad/4ba2.02-03/p10.html&lt;br /&gt;
&lt;br /&gt;
[2]''Peer-to-peer'', March 2008, http://en.wikipedia.org/wiki/Peer-to-peer&lt;br /&gt;
&lt;br /&gt;
[3]Todd Sundsted, ''The practice of peer-to-peer computing: Trust and security in peer-to-peer networks'', 19 Jun 2002, http://www.ibm.com/developerworks/java/library/j-p2ptrust/&lt;br /&gt;
&lt;br /&gt;
[4] Tony Bradley, ''Peer-to-Peer (P2P) Network Security'', Four Steps To Sharing and Swapping Files Without Becoming a Victim, About.com, http://netsecurity.about.com/od/newsandeditorial1/a/p2psecurity.htm&lt;br /&gt;
&lt;br /&gt;
[5]''PEER-TO-PEER SECURITY: The Dangers of P2P'', Websense, Inc., http://www.websense.com/global/en/ResourceCenter/p2p_security.php&lt;br /&gt;
&lt;br /&gt;
[6]''Those aren’t just files you’re swapping – the dangers of Peer-to-Peer File Sharing'', Websense, Inc., Thttp://www.websense.com/docs/WhitePapers/PeertoPeer.pdf&lt;br /&gt;
&lt;br /&gt;
[7]Vangie 'Aurora' Beal, ''All About Peer-To-Peer Architecture'', May 20, 2005, http://www.webopedia.com/DidYouKnow/Internet/2005/peer_to_peer.asp&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
[[Streaming Media Technology]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.ibm.com/developerworks/java/library/j-p2ptrust/ The practice of peer-to-peer computing: Trust and security in peer-to-peer networks]&lt;br /&gt;
*[http://ntrg.cs.tcd.ie/undergrad/4ba2.02-03/p10.html P2P Security]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Chowkw|Chowkw]] 16:08, 8 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Peer_To_Peer_Network_Security</id>
		<title>Peer To Peer Network Security</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Peer_To_Peer_Network_Security"/>
				<updated>2008-04-08T18:59:43Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Peer-to-Peer''' (or '''P2P''') networking is a fairly popular networking concept. Network softwares such as BitTorrent and eMule make it easy for people to find what they want and share what they have. P2P networks are used primarily to exchange pirated audio, video, software, and other inappropriate content. An important thing should be noticed that share thing files on your computer with anonymous and unknown users on the public Internet could be dangerous and lead to security problem. [4,5]&lt;br /&gt;
[[Image:Peer_to_peer.gif|thumb|250px|right| The different between Client-Server and P2P model.[1]]]&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
==What is Peer to Peer Network==&lt;br /&gt;
A pure peer-to-peer network does not have the notion of clients or servers, but only equal peer nodes that simultaneously function as both &amp;quot;clients&amp;quot; and &amp;quot;servers&amp;quot; to the other nodes on the network. An example for a non P2P file transfer is an FTP server where the client and server programs are quite distinct. P2P networks are generally simpler but they usually do not offer the same performance under heavy loads. The P2P network itself relies on computing power at the ends of a connection rather than from within the network itself. Besides file sharing, P2P networks are also used for Distributed Computation or Instant messaging. [2,7]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Network Structure==&lt;br /&gt;
Peer-to-peer file sharing networks are transient Internet networks that allow computer users within the same P2P networking program to connect with each other computers and use sophisticated searching techniques to directly access and download files from one another's hard drives. The P2P overlay network consists of all the participating peers as network nodes. There are links between any two nodes that know each other. Based on how nodes link to each other, P2P networks can classify as '''Unstructured''' and '''Structured'''. [6,2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Unstructured P2P networks===&lt;br /&gt;
An unstructured P2P network is formed when the overlay links are established arbitrarily. Such networks can be easily constructed as a new peer that wants to join the network can copy existing links of another node and then form its own links over time. In an unstructured P2P network, if a peer wants to find a desired piece of data in the network, the query has to be flooded through the network to find as many peers as possible that share the data. The main disadvantage with such networks is that the queries may not always be resolved. Popular content is likely to be available at several peers and any peer searching for it is likely to find the same thing, but if a peer is looking for rare data shared by only a few other peers, then it is highly unlikely that search will be successful. [2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Structured P2P networks===&lt;br /&gt;
Structured P2P network employ a globally consistent protocol to ensure that any node can efficiently route a search to some peer that has the desired file, even if the file is extremely rare. Such a guarantee necessitates a more structured pattern of overlay links. By far the most common type of structured P2P network is the distributed hash table (DHT), in which a variant of consistent hashing is used to assign ownership of each file to a particular peer, in a way analogous to a traditional hash table's assignment of each key to a particular array slot. [2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Security Concern==&lt;br /&gt;
One major concern of using P2P architecture in the workplace is, of course, network security. Security concerns stem from the architecture itself. Today we find most blocking and routing handles by a specific server within network, but the P2P architecture has no single fixed server responsible for routing and requests. There are many kind of P2P networking attacks that cause the security problem and we have some example below. On the other hand, most of the security mechanisms using today are based on secret key, public key or combination of them. below has some introduction of the basic aspects of them. [7,1]&lt;br /&gt;
&lt;br /&gt;
The picture below shows the weakness of security when using P2P applications. It shows that these applications are allow to go though the network and the network is now not secure. [1]&lt;br /&gt;
&lt;br /&gt;
[[Image:Security.gif]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Attack===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*'''TCP port''' - To share files on the computer within a P2P network such as BitTorrent, a specific TCP port must be opened for the P2P software to communicate. In effect, once you open the port you are no longer protected from malicious traffic coming through it. [4]&lt;br /&gt;
&lt;br /&gt;
*'''Trojans, Viruses''' - When files are downloading from other peer, there are no guarantee that the files being transfered are the one that you want. Also, when you double-click the EXE file, you can not sure that it has not installed a Trojans or bring viruses to the computer. [4]&lt;br /&gt;
&lt;br /&gt;
*'''Malware''' - The P2P network software itself may contain [http://en.wikipedia.org/wiki/Malware malware] or [http://en.wikipedia.org/wiki/Spyware spyware]. [2]&lt;br /&gt;
&lt;br /&gt;
*'''Bandwidth Clogging and File Sharing''' - P2P applications such as BitTorrent make it possible for one computer to share files with another computer located somewhere else on the Internet. A major problem with P2P file-sharing programs is that they result in heavy traffic, which clogs the institution networks. The rich audio and video files that P2P users share are very big. This affects response times for internal users as well as e-business customers and that results in lost income. [1]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Security Mechanisms===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*'''Secret Key''' - Secret key techniques are based on the fact that the sender and recipient share a secret, which is used for various cryptographic operations, such as encryption and decryption of messages and the creation and verification of message authentication data. This secret key must be exchanged in a separate out of bound procedure prior to the intended communication (using a PKI for example). [1]&lt;br /&gt;
&lt;br /&gt;
*'''Public Key''' - Public Key Techniques are based on the use of asymmetric key pairs. Usually each user is in possession of just one key pair. One of the pair is made publicly available, while the other is kept private. Because one is available there is no need for an out of band key exchange, however there is a need for an infrastructure to distribute the public key authentically. Because there is no need for pre-shared secrets prior to a communication, public key techniques are ideal for supporting security between previously unknown parties. [1]&lt;br /&gt;
&lt;br /&gt;
*'''Trust''' - Trust is necessary in any distributed application -- P2P applications included. Trust can become a serious issue for P2P applications that distribute processing work to distributed computing nodes and then collect the results. If you trust a node within the network, you might be tempted to trust the content it provides. In some cases, this assumption is reasonable, but not always. '''Trust''' can established by these three standard elements. [3]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*'''Authentication''' - This process determine which node is in fact who or what that node declares itself to be. [3]&lt;br /&gt;
&lt;br /&gt;
*'''Authorization''' - It gives an authentication to other node to access some subset of the resource s on another peer. [3]&lt;br /&gt;
&lt;br /&gt;
*'''Encryption''' - This process coverts understandable information (plaintext) into a form difficult to understand by unauthorized individuals and systems. One use of encryption is to protect the information that flows between peers on an unsecured network such as Internet. [3]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Applications==&lt;br /&gt;
An important goal in peer-to-peer networks is that all clients provide resources, including bandwidth, storage space, and computing power. Thus, as nodes arrive and demand on the system increases, the total capacity of the system also increases. [2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===General Use===&lt;br /&gt;
Peer-to-peer can be used for:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[http://en.wikipedia.org/wiki/File_sharing File sharing] - Files are stored and served by personal computers of the users.&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/VoIP VoIP] - A protocol optimized for the transmission of voice through the Internet or other packet switched networks.&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Telephony Telephony] - Provide voice communication over distances, specifically by connecting telephones to each other.&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Streaming_media Streaming media] - A kind of multimedia that is constantly received by, and normally displayed to, the end-user while it is being delivered by the provider.&lt;br /&gt;
&lt;br /&gt;
*Software publication and distribution - Giving out a big software product with P2P networks and therefore peer can get the latest updated of the software.&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Instant_Messaging Instant Messaging] - A real-time communication tool between two or more people based on typed text.&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Outside Computer Science===&lt;br /&gt;
Peer-to-peer networks have also begun to attract attention outside computer science point of view, especially those deal with large data-sets. [2]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Bioinformatics Bioinformatics] - P2P networks can used to run large programs designed to carry out tests to identify drug candidates. A program called [http://www.proteomecommons.org/dev/dfs/ Tranche] was developed to solve the bioinformatics data sharing problem in a secure and scalable fashion. [2]&lt;br /&gt;
&lt;br /&gt;
*'''Education and Academia''' - Because P2P networks have fast distribution and large storage space features, many organizations are trying to apply it for educational and academic purposes. [2]&lt;br /&gt;
&lt;br /&gt;
*'''Military''' - The U.S. Department of Defense has already started research on P2P networks as part of its modern network warfare strategy. However, due to security reasons, details are kept classified. [2]&lt;br /&gt;
&lt;br /&gt;
*'''Business''' - It is still in the beginning states of using P2P networks in business areas. There are several reasons why companies prefer P2P networks, such as: Real-time collaboration, a process which requires strong computing power, etc.&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[1] Declan, Jarlath, Keith, John, Dan, ''P2P Security'', TCD 4BA2 Project 2002/03, http://ntrg.cs.tcd.ie/undergrad/4ba2.02-03/p10.html&lt;br /&gt;
&lt;br /&gt;
[2]''Peer-to-peer'', March 2008, http://en.wikipedia.org/wiki/Peer-to-peer&lt;br /&gt;
&lt;br /&gt;
[3]Todd Sundsted, ''The practice of peer-to-peer computing: Trust and security in peer-to-peer networks'', 19 Jun 2002, http://www.ibm.com/developerworks/java/library/j-p2ptrust/&lt;br /&gt;
&lt;br /&gt;
[4] Tony Bradley, ''Peer-to-Peer (P2P) Network Security'', Four Steps To Sharing and Swapping Files Without Becoming a Victim, About.com, http://netsecurity.about.com/od/newsandeditorial1/a/p2psecurity.htm&lt;br /&gt;
&lt;br /&gt;
[5]''PEER-TO-PEER SECURITY: The Dangers of P2P'', Websense, Inc., http://www.websense.com/global/en/ResourceCenter/p2p_security.php&lt;br /&gt;
&lt;br /&gt;
[6]''Those aren’t just files you’re swapping – the dangers of Peer-to-Peer File Sharing'', Websense, Inc., Thttp://www.websense.com/docs/WhitePapers/PeertoPeer.pdf&lt;br /&gt;
&lt;br /&gt;
[7]Vangie 'Aurora' Beal, ''All About Peer-To-Peer Architecture'', May 20, 2005, http://www.webopedia.com/DidYouKnow/Internet/2005/peer_to_peer.asp&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
[[Streaming Media Technology]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.ibm.com/developerworks/java/library/j-p2ptrust/ The practice of peer-to-peer computing: Trust and security in peer-to-peer networks]&lt;br /&gt;
*[http://ntrg.cs.tcd.ie/undergrad/4ba2.02-03/p10.html P2P Security]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Chowkw|Chowkw]] 14:59, 8 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Peer_To_Peer_Network_Security</id>
		<title>Peer To Peer Network Security</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Peer_To_Peer_Network_Security"/>
				<updated>2008-04-08T18:59:20Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Peer-to-Peer''' (or '''P2P''') networking is a fairly popular networking concept. Networks such as BitTorrent and eMule make it easy for people to find what they want and share what they have. P2P networks are used primarily to exchange pirated audio, video, software, and other inappropriate content. An important thing should be noticed that share thing files on your computer with anonymous and unknown users on the public Internet could be dangerous and lead to security problem. [4,5]&lt;br /&gt;
[[Image:Peer_to_peer.gif|thumb|250px|right| The different between Client-Server and P2P model.[1]]]&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
==What is Peer to Peer Network==&lt;br /&gt;
A pure peer-to-peer network does not have the notion of clients or servers, but only equal peer nodes that simultaneously function as both &amp;quot;clients&amp;quot; and &amp;quot;servers&amp;quot; to the other nodes on the network. An example for a non P2P file transfer is an FTP server where the client and server programs are quite distinct. P2P networks are generally simpler but they usually do not offer the same performance under heavy loads. The P2P network itself relies on computing power at the ends of a connection rather than from within the network itself. Besides file sharing, P2P networks are also used for Distributed Computation or Instant messaging. [2,7]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Network Structure==&lt;br /&gt;
Peer-to-peer file sharing networks are transient Internet networks that allow computer users within the same P2P networking program to connect with each other computers and use sophisticated searching techniques to directly access and download files from one another's hard drives. The P2P overlay network consists of all the participating peers as network nodes. There are links between any two nodes that know each other. Based on how nodes link to each other, P2P networks can classify as '''Unstructured''' and '''Structured'''. [6,2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Unstructured P2P networks===&lt;br /&gt;
An unstructured P2P network is formed when the overlay links are established arbitrarily. Such networks can be easily constructed as a new peer that wants to join the network can copy existing links of another node and then form its own links over time. In an unstructured P2P network, if a peer wants to find a desired piece of data in the network, the query has to be flooded through the network to find as many peers as possible that share the data. The main disadvantage with such networks is that the queries may not always be resolved. Popular content is likely to be available at several peers and any peer searching for it is likely to find the same thing, but if a peer is looking for rare data shared by only a few other peers, then it is highly unlikely that search will be successful. [2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Structured P2P networks===&lt;br /&gt;
Structured P2P network employ a globally consistent protocol to ensure that any node can efficiently route a search to some peer that has the desired file, even if the file is extremely rare. Such a guarantee necessitates a more structured pattern of overlay links. By far the most common type of structured P2P network is the distributed hash table (DHT), in which a variant of consistent hashing is used to assign ownership of each file to a particular peer, in a way analogous to a traditional hash table's assignment of each key to a particular array slot. [2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Security Concern==&lt;br /&gt;
One major concern of using P2P architecture in the workplace is, of course, network security. Security concerns stem from the architecture itself. Today we find most blocking and routing handles by a specific server within network, but the P2P architecture has no single fixed server responsible for routing and requests. There are many kind of P2P networking attacks that cause the security problem and we have some example below. On the other hand, most of the security mechanisms using today are based on secret key, public key or combination of them. below has some introduction of the basic aspects of them. [7,1]&lt;br /&gt;
&lt;br /&gt;
The picture below shows the weakness of security when using P2P applications. It shows that these applications are allow to go though the network and the network is now not secure. [1]&lt;br /&gt;
&lt;br /&gt;
[[Image:Security.gif]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Attack===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*'''TCP port''' - To share files on the computer within a P2P network such as BitTorrent, a specific TCP port must be opened for the P2P software to communicate. In effect, once you open the port you are no longer protected from malicious traffic coming through it. [4]&lt;br /&gt;
&lt;br /&gt;
*'''Trojans, Viruses''' - When files are downloading from other peer, there are no guarantee that the files being transfered are the one that you want. Also, when you double-click the EXE file, you can not sure that it has not installed a Trojans or bring viruses to the computer. [4]&lt;br /&gt;
&lt;br /&gt;
*'''Malware''' - The P2P network software itself may contain [http://en.wikipedia.org/wiki/Malware malware] or [http://en.wikipedia.org/wiki/Spyware spyware]. [2]&lt;br /&gt;
&lt;br /&gt;
*'''Bandwidth Clogging and File Sharing''' - P2P applications such as BitTorrent make it possible for one computer to share files with another computer located somewhere else on the Internet. A major problem with P2P file-sharing programs is that they result in heavy traffic, which clogs the institution networks. The rich audio and video files that P2P users share are very big. This affects response times for internal users as well as e-business customers and that results in lost income. [1]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Security Mechanisms===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*'''Secret Key''' - Secret key techniques are based on the fact that the sender and recipient share a secret, which is used for various cryptographic operations, such as encryption and decryption of messages and the creation and verification of message authentication data. This secret key must be exchanged in a separate out of bound procedure prior to the intended communication (using a PKI for example). [1]&lt;br /&gt;
&lt;br /&gt;
*'''Public Key''' - Public Key Techniques are based on the use of asymmetric key pairs. Usually each user is in possession of just one key pair. One of the pair is made publicly available, while the other is kept private. Because one is available there is no need for an out of band key exchange, however there is a need for an infrastructure to distribute the public key authentically. Because there is no need for pre-shared secrets prior to a communication, public key techniques are ideal for supporting security between previously unknown parties. [1]&lt;br /&gt;
&lt;br /&gt;
*'''Trust''' - Trust is necessary in any distributed application -- P2P applications included. Trust can become a serious issue for P2P applications that distribute processing work to distributed computing nodes and then collect the results. If you trust a node within the network, you might be tempted to trust the content it provides. In some cases, this assumption is reasonable, but not always. '''Trust''' can established by these three standard elements. [3]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*'''Authentication''' - This process determine which node is in fact who or what that node declares itself to be. [3]&lt;br /&gt;
&lt;br /&gt;
*'''Authorization''' - It gives an authentication to other node to access some subset of the resource s on another peer. [3]&lt;br /&gt;
&lt;br /&gt;
*'''Encryption''' - This process coverts understandable information (plaintext) into a form difficult to understand by unauthorized individuals and systems. One use of encryption is to protect the information that flows between peers on an unsecured network such as Internet. [3]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Applications==&lt;br /&gt;
An important goal in peer-to-peer networks is that all clients provide resources, including bandwidth, storage space, and computing power. Thus, as nodes arrive and demand on the system increases, the total capacity of the system also increases. [2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===General Use===&lt;br /&gt;
Peer-to-peer can be used for:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[http://en.wikipedia.org/wiki/File_sharing File sharing] - Files are stored and served by personal computers of the users.&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/VoIP VoIP] - A protocol optimized for the transmission of voice through the Internet or other packet switched networks.&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Telephony Telephony] - Provide voice communication over distances, specifically by connecting telephones to each other.&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Streaming_media Streaming media] - A kind of multimedia that is constantly received by, and normally displayed to, the end-user while it is being delivered by the provider.&lt;br /&gt;
&lt;br /&gt;
*Software publication and distribution - Giving out a big software product with P2P networks and therefore peer can get the latest updated of the software.&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Instant_Messaging Instant Messaging] - A real-time communication tool between two or more people based on typed text.&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Outside Computer Science===&lt;br /&gt;
Peer-to-peer networks have also begun to attract attention outside computer science point of view, especially those deal with large data-sets. [2]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Bioinformatics Bioinformatics] - P2P networks can used to run large programs designed to carry out tests to identify drug candidates. A program called [http://www.proteomecommons.org/dev/dfs/ Tranche] was developed to solve the bioinformatics data sharing problem in a secure and scalable fashion. [2]&lt;br /&gt;
&lt;br /&gt;
*'''Education and Academia''' - Because P2P networks have fast distribution and large storage space features, many organizations are trying to apply it for educational and academic purposes. [2]&lt;br /&gt;
&lt;br /&gt;
*'''Military''' - The U.S. Department of Defense has already started research on P2P networks as part of its modern network warfare strategy. However, due to security reasons, details are kept classified. [2]&lt;br /&gt;
&lt;br /&gt;
*'''Business''' - It is still in the beginning states of using P2P networks in business areas. There are several reasons why companies prefer P2P networks, such as: Real-time collaboration, a process which requires strong computing power, etc.&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[1] Declan, Jarlath, Keith, John, Dan, ''P2P Security'', TCD 4BA2 Project 2002/03, http://ntrg.cs.tcd.ie/undergrad/4ba2.02-03/p10.html&lt;br /&gt;
&lt;br /&gt;
[2]''Peer-to-peer'', March 2008, http://en.wikipedia.org/wiki/Peer-to-peer&lt;br /&gt;
&lt;br /&gt;
[3]Todd Sundsted, ''The practice of peer-to-peer computing: Trust and security in peer-to-peer networks'', 19 Jun 2002, http://www.ibm.com/developerworks/java/library/j-p2ptrust/&lt;br /&gt;
&lt;br /&gt;
[4] Tony Bradley, ''Peer-to-Peer (P2P) Network Security'', Four Steps To Sharing and Swapping Files Without Becoming a Victim, About.com, http://netsecurity.about.com/od/newsandeditorial1/a/p2psecurity.htm&lt;br /&gt;
&lt;br /&gt;
[5]''PEER-TO-PEER SECURITY: The Dangers of P2P'', Websense, Inc., http://www.websense.com/global/en/ResourceCenter/p2p_security.php&lt;br /&gt;
&lt;br /&gt;
[6]''Those aren’t just files you’re swapping – the dangers of Peer-to-Peer File Sharing'', Websense, Inc., Thttp://www.websense.com/docs/WhitePapers/PeertoPeer.pdf&lt;br /&gt;
&lt;br /&gt;
[7]Vangie 'Aurora' Beal, ''All About Peer-To-Peer Architecture'', May 20, 2005, http://www.webopedia.com/DidYouKnow/Internet/2005/peer_to_peer.asp&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
[[Streaming Media Technology]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.ibm.com/developerworks/java/library/j-p2ptrust/ The practice of peer-to-peer computing: Trust and security in peer-to-peer networks]&lt;br /&gt;
*[http://ntrg.cs.tcd.ie/undergrad/4ba2.02-03/p10.html P2P Security]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Chowkw|Chowkw]] 14:59, 8 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Peer_To_Peer_Network_Security</id>
		<title>Peer To Peer Network Security</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Peer_To_Peer_Network_Security"/>
				<updated>2008-04-08T00:07:24Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Peer-to-Peer''' (or '''P2P''') networking is a fairly popular networking concept. Networks such as BitTorrent and eMule make it easy for people to find what they want and share what they have. P2P networks are used primarily to exchange pirated audio, video, software, and other inappropriate content. [4,5]&lt;br /&gt;
[[Image:Peer_to_peer.gif|thumb|250px|right| The different between Client-Server and P2P model.[1]]]&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
==What is Peer to Peer Network==&lt;br /&gt;
A pure peer-to-peer network does not have the notion of clients or servers, but only equal peer nodes that simultaneously function as both &amp;quot;clients&amp;quot; and &amp;quot;servers&amp;quot; to the other nodes on the network. An example for a non P2P file transfer is an FTP server where the client and server programs are quite distinct. P2P networks are generally simpler but they usually do not offer the same performance under heavy loads. The P2P network itself relies on computing power at the ends of a connection rather than from within the network itself. Besides file sharing, P2P networks are also used for Distributed Computation or Instant messaging. [2,7]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Network Structure==&lt;br /&gt;
Peer-to-peer file sharing networks are transient Internet networks that allow computer users within the same P2P networking program to connect with each other computers and use sophisticated searching techniques to directly access and download files from one another's hard drives. The P2P overlay network consists of all the participating peers as network nodes. There are links between any two nodes that know each other. Based on how nodes link to each other, P2P networks can classify as '''Unstructured''' and '''Structured'''. [6,2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Unstructured P2P networks===&lt;br /&gt;
An unstructured P2P network is formed when the overlay links are established arbitrarily. Such networks can be easily constructed as a new peer that wants to join the network can copy existing links of another node and then form its own links over time. In an unstructured P2P network, if a peer wants to find a desired piece of data in the network, the query has to be flooded through the network to find as many peers as possible that share the data. The main disadvantage with such networks is that the queries may not always be resolved. Popular content is likely to be available at several peers and any peer searching for it is likely to find the same thing, but if a peer is looking for rare data shared by only a few other peers, then it is highly unlikely that search will be successful. [2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Structured P2P networks===&lt;br /&gt;
Structured P2P network employ a globally consistent protocol to ensure that any node can efficiently route a search to some peer that has the desired file, even if the file is extremely rare. Such a guarantee necessitates a more structured pattern of overlay links. By far the most common type of structured P2P network is the distributed hash table (DHT), in which a variant of consistent hashing is used to assign ownership of each file to a particular peer, in a way analogous to a traditional hash table's assignment of each key to a particular array slot. [2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Security Concern==&lt;br /&gt;
One major concern of using P2P architecture in the workplace is, of course, network security. Security concerns stem from the architecture itself. Today we find most blocking and routing handles by a specific server within network, but the P2P architecture has no single fixed server responsible for routing and requests. There are many kind of P2P networking attacks that cause the security problem and we have some example below. On the other hand, most of the security mechanisms using today are based on secret key, public key or combination of them. below has some introduction of the basic aspects of them. [7,1]&lt;br /&gt;
&lt;br /&gt;
The picture below shows the weakness of security when using P2P applications. It shows that these applications are allow to go though the network and the network is now not secure. [1]&lt;br /&gt;
&lt;br /&gt;
[[Image:Security.gif]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Attack===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*'''TCP port''' - To share files on the computer within a P2P network such as BitTorrent, a specific TCP port must be opened for the P2P software to communicate. In effect, once you open the port you are no longer protected from malicious traffic coming through it. [4]&lt;br /&gt;
&lt;br /&gt;
*'''Trojans, Viruses''' - When files are downloading from other peer, there are no guarantee that the files being transfered are the one that you want. Also, when you double-click the EXE file, you can not sure that it has not installed a Trojans or bring viruses to the computer. [4]&lt;br /&gt;
&lt;br /&gt;
*'''Malware''' - The P2P network software itself may contain [http://en.wikipedia.org/wiki/Malware malware] or [http://en.wikipedia.org/wiki/Spyware spyware]. [2]&lt;br /&gt;
&lt;br /&gt;
*'''Bandwidth Clogging and File Sharing''' - P2P applications such as BitTorrent make it possible for one computer to share files with another computer located somewhere else on the Internet. A major problem with P2P file-sharing programs is that they result in heavy traffic, which clogs the institution networks. The rich audio and video files that P2P users share are very big. This affects response times for internal users as well as e-business customers and that results in lost income. [1]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Security Mechanisms===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*'''Secret Key''' - Secret key techniques are based on the fact that the sender and recipient share a secret, which is used for various cryptographic operations, such as encryption and decryption of messages and the creation and verification of message authentication data. This secret key must be exchanged in a separate out of bound procedure prior to the intended communication (using a PKI for example). [1]&lt;br /&gt;
&lt;br /&gt;
*'''Public Key''' - Public Key Techniques are based on the use of asymmetric key pairs. Usually each user is in possession of just one key pair. One of the pair is made publicly available, while the other is kept private. Because one is available there is no need for an out of band key exchange, however there is a need for an infrastructure to distribute the public key authentically. Because there is no need for pre-shared secrets prior to a communication, public key techniques are ideal for supporting security between previously unknown parties. [1]&lt;br /&gt;
&lt;br /&gt;
*'''Trust''' - Trust is necessary in any distributed application -- P2P applications included. Trust can become a serious issue for P2P applications that distribute processing work to distributed computing nodes and then collect the results. If you trust a node within the network, you might be tempted to trust the content it provides. In some cases, this assumption is reasonable, but not always. '''Trust''' can established by these three standard elements. [3]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*'''Authentication''' - This process determine which node is in fact who or what that node declares itself to be. [3]&lt;br /&gt;
&lt;br /&gt;
*'''Authorization''' - It gives an authentication to other node to access some subset of the resource s on another peer. [3]&lt;br /&gt;
&lt;br /&gt;
*'''Encryption''' - This process coverts understandable information (plaintext) into a form difficult to understand by unauthorized individuals and systems. One use of encryption is to protect the information that flows between peers on an unsecured network such as Internet. [3]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Applications==&lt;br /&gt;
An important goal in peer-to-peer networks is that all clients provide resources, including bandwidth, storage space, and computing power. Thus, as nodes arrive and demand on the system increases, the total capacity of the system also increases. [2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===General Use===&lt;br /&gt;
Peer-to-peer can be used for:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[http://en.wikipedia.org/wiki/File_sharing File sharing] - Files are stored and served by personal computers of the users.&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/VoIP VoIP] - A protocol optimized for the transmission of voice through the Internet or other packet switched networks.&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Telephony Telephony] - Provide voice communication over distances, specifically by connecting telephones to each other.&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Streaming_media Streaming media] - A kind of multimedia that is constantly received by, and normally displayed to, the end-user while it is being delivered by the provider.&lt;br /&gt;
&lt;br /&gt;
*Software publication and distribution - Giving out a big software product with P2P networks and therefore peer can get the latest updated of the software.&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Instant_Messaging Instant Messaging] - A real-time communication tool between two or more people based on typed text.&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Outside Computer Science===&lt;br /&gt;
Peer-to-peer networks have also begun to attract attention outside computer science point of view, especially those deal with large data-sets. [2]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Bioinformatics Bioinformatics] - P2P networks can used to run large programs designed to carry out tests to identify drug candidates. A program called [http://www.proteomecommons.org/dev/dfs/ Tranche] was developed to solve the bioinformatics data sharing problem in a secure and scalable fashion. [2]&lt;br /&gt;
&lt;br /&gt;
*'''Education and Academia''' - Because P2P networks have fast distribution and large storage space features, many organizations are trying to apply it for educational and academic purposes. [2]&lt;br /&gt;
&lt;br /&gt;
*'''Military''' - The U.S. Department of Defense has already started research on P2P networks as part of its modern network warfare strategy. However, due to security reasons, details are kept classified. [2]&lt;br /&gt;
&lt;br /&gt;
*'''Business''' - It is still in the beginning states of using P2P networks in business areas. There are several reasons why companies prefer P2P networks, such as: Real-time collaboration, a process which requires strong computing power, etc.&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[1] Declan, Jarlath, Keith, John, Dan, ''P2P Security'', TCD 4BA2 Project 2002/03, http://ntrg.cs.tcd.ie/undergrad/4ba2.02-03/p10.html&lt;br /&gt;
&lt;br /&gt;
[2]''Peer-to-peer'', March 2008, http://en.wikipedia.org/wiki/Peer-to-peer&lt;br /&gt;
&lt;br /&gt;
[3]Todd Sundsted, ''The practice of peer-to-peer computing: Trust and security in peer-to-peer networks'', 19 Jun 2002, http://www.ibm.com/developerworks/java/library/j-p2ptrust/&lt;br /&gt;
&lt;br /&gt;
[4] Tony Bradley, ''Peer-to-Peer (P2P) Network Security'', Four Steps To Sharing and Swapping Files Without Becoming a Victim, About.com, http://netsecurity.about.com/od/newsandeditorial1/a/p2psecurity.htm&lt;br /&gt;
&lt;br /&gt;
[5]''PEER-TO-PEER SECURITY: The Dangers of P2P'', Websense, Inc., http://www.websense.com/global/en/ResourceCenter/p2p_security.php&lt;br /&gt;
&lt;br /&gt;
[6]''Those aren’t just files you’re swapping – the dangers of Peer-to-Peer File Sharing'', Websense, Inc., Thttp://www.websense.com/docs/WhitePapers/PeertoPeer.pdf&lt;br /&gt;
&lt;br /&gt;
[7]Vangie 'Aurora' Beal, ''All About Peer-To-Peer Architecture'', May 20, 2005, http://www.webopedia.com/DidYouKnow/Internet/2005/peer_to_peer.asp&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
[[Streaming Media Technology]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.ibm.com/developerworks/java/library/j-p2ptrust/ The practice of peer-to-peer computing: Trust and security in peer-to-peer networks]&lt;br /&gt;
*[http://ntrg.cs.tcd.ie/undergrad/4ba2.02-03/p10.html P2P Security]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Chowkw|Chowkw]] 20:07, 7 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Peer_To_Peer_Network_Security</id>
		<title>Peer To Peer Network Security</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Peer_To_Peer_Network_Security"/>
				<updated>2008-04-07T21:16:32Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Peer-to-Peer''' (or '''P2P''') networking is a fairly popular networking concept. Networks such as BitTorrent and eMule make it easy for people to find what they want and share what they have. P2P networks are used primarily to exchange pirated audio, video, software, and other inappropriate content. [5,6]&lt;br /&gt;
[[Image:Peer_to_peer.gif|thumb|250px|right| The different between Client-Server and P2P model.[2]]]&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
==What is Peer to Peer Network==&lt;br /&gt;
A pure peer-to-peer network does not have the notion of clients or servers, but only equal peer nodes that simultaneously function as both &amp;quot;clients&amp;quot; and &amp;quot;servers&amp;quot; to the other nodes on the network. An example for a non P2P file transfer is an FTP server where the client and server programs are quite distinct. P2P networks are generally simpler but they usually do not offer the same performance under heavy loads. The P2P network itself relies on computing power at the ends of a connection rather than from within the network itself. Besides file sharing, P2P networks are also used for Distributed Computation or Instant messaging. [3,8]&lt;br /&gt;
&lt;br /&gt;
==Network Structure==&lt;br /&gt;
Peer-to-peer file sharing networks are transient Internet networks that allow computer users within the same P2P networking program to connect with each other computers and use sophisticated searching techniques to directly access and download files from one another's hard drives. The P2P overlay network consists of all the participating peers as network nodes. There are links between any two nodes that know each other. Based on how nodes link to each other, P2P networks can classify as '''Unstructured''' and '''Structured'''. [7,3]&lt;br /&gt;
&lt;br /&gt;
===Unstructured P2P networks===&lt;br /&gt;
An unstructured P2P network is formed when the overlay links are established arbitrarily. Such networks can be easily constructed as a new peer that wants to join the network can copy existing links of another node and then form its own links over time. In an unstructured P2P network, if a peer wants to find a desired piece of data in the network, the query has to be flooded through the network to find as many peers as possible that share the data. The main disadvantage with such networks is that the queries may not always be resolved. Popular content is likely to be available at several peers and any peer searching for it is likely to find the same thing, but if a peer is looking for rare data shared by only a few other peers, then it is highly unlikely that search will be successful. [3]&lt;br /&gt;
&lt;br /&gt;
===Structured P2P networks===&lt;br /&gt;
Structured P2P network employ a globally consistent protocol to ensure that any node can efficiently route a search to some peer that has the desired file, even if the file is extremely rare. Such a guarantee necessitates a more structured pattern of overlay links. By far the most common type of structured P2P network is the distributed hash table (DHT), in which a variant of consistent hashing is used to assign ownership of each file to a particular peer, in a way analogous to a traditional hash table's assignment of each key to a particular array slot. [3]&lt;br /&gt;
&lt;br /&gt;
==Security Concern==&lt;br /&gt;
One major concern of using P2P architecture in the workplace is, of course, network security. Security concerns stem from the architecture itself. Today we find most blocking and routing handles by a specific server within network, but the P2P architecture has no single fixed server responsible for routing and requests. There are many kind of P2P networking attacks that cause the security problem and we have some example below. On the other hand, most of the security mechanisms using today are based on secret key, public key or combination of them. below has some introduction of the basic aspects of them. [8,9]&lt;br /&gt;
&lt;br /&gt;
The picture below shows the weakness of security when using P2P applications. It shows that these applications are allow to go though the network and the network is now not secure. [9]&lt;br /&gt;
&lt;br /&gt;
[[Image:Security.gif]]&lt;br /&gt;
&lt;br /&gt;
===Attack===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*'''TCP port''' - To share files on the computer within a P2P network such as BitTorrent, a specific TCP port must be opened for the P2P software to communicate. In effect, once you open the port you are no longer protected from malicious traffic coming through it. [5]&lt;br /&gt;
&lt;br /&gt;
*'''Trojans, Viruses''' - When files are downloading from other peer, there are no guarantee that the files being transfered are the one that you want. Also, when you double-click the EXE file, you can not sure that it has not installed a Trojans or bring viruses to the computer. [5]&lt;br /&gt;
&lt;br /&gt;
*'''Malware''' - The P2P network software itself may contain [http://en.wikipedia.org/wiki/Malware malware] or [http://en.wikipedia.org/wiki/Spyware spyware]. [3]&lt;br /&gt;
&lt;br /&gt;
*'''Bandwidth Clogging and File Sharing''' - P2P applications such as BitTorrent make it possible for one computer to share files with another computer located somewhere else on the Internet. A major problem with P2P file-sharing programs is that they result in heavy traffic, which clogs the institution networks. The rich audio and video files that P2P users share are very big. This affects response times for internal users as well as e-business customers and that results in lost income. [9]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Security Mechanisms===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*'''Secret Key''' - Secret key techniques are based on the fact that the sender and recipient share a secret, which is used for various cryptographic operations, such as encryption and decryption of messages and the creation and verification of message authentication data. This secret key must be exchanged in a separate out of bound procedure prior to the intended communication (using a PKI for example). [9]&lt;br /&gt;
&lt;br /&gt;
*'''Public Key''' - Public Key Techniques are based on the use of asymmetric key pairs. Usually each user is in possession of just one key pair. One of the pair is made publicly available, while the other is kept private. Because one is available there is no need for an out of band key exchange, however there is a need for an infrastructure to distribute the public key authentically. Because there is no need for pre-shared secrets prior to a communication, public key techniques are ideal for supporting security between previously unknown parties. [9]&lt;br /&gt;
&lt;br /&gt;
*'''Trust''' - Trust is necessary in any distributed application -- P2P applications included. Trust can become a serious issue for P2P applications that distribute processing work to distributed computing nodes and then collect the results. If you trust a node within the network, you might be tempted to trust the content it provides. In some cases, this assumption is reasonable, but not always. '''Trust''' can established by these three standard elements. [4]&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*'''Authentication''' - This process determine which node is in fact who or what that node declares itself to be. [4]&lt;br /&gt;
&lt;br /&gt;
*'''Authorization''' - It gives an authentication to other node to access some subset of the resource s on another peer. [4]&lt;br /&gt;
&lt;br /&gt;
*'''Encryption''' - This process coverts understandable information (plaintext) into a form difficult to understand by unauthorized individuals and systems. One use of encryption is to protect the information that flows between peers on an unsecured network such as Internet. [4]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Applications==&lt;br /&gt;
An important goal in peer-to-peer networks is that all clients provide resources, including bandwidth, storage space, and computing power. Thus, as nodes arrive and demand on the system increases, the total capacity of the system also increases. [3]&lt;br /&gt;
&lt;br /&gt;
===General Use===&lt;br /&gt;
Peer-to-peer can be used for:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[http://en.wikipedia.org/wiki/File_sharing File sharing]&lt;br /&gt;
&lt;br /&gt;
*VoIP&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Telephony Telephony]&lt;br /&gt;
&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Streaming_media Streaming media]&lt;br /&gt;
&lt;br /&gt;
*Software publication and distribution&lt;br /&gt;
&lt;br /&gt;
*Instant Messaging&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Outside Computer Science===&lt;br /&gt;
Peer-to-peer networks have also begun to attract attention outside computer science point of view, especially those deal with large data-sets. [3]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Bioinformatics Bioinformatics] - P2P networks can used to run large programs designed to carry out tests to identify drug candidates. A program called [[http://www.proteomecommons.org/dev/dfs/ Tranche] was developed to solve the bioinformatics data sharing problem in a secure and scalable fashion. [3]&lt;br /&gt;
&lt;br /&gt;
*'''Education and Academia'' - Because P2P networks have fast distribution and large storage space features, many organizations are trying to apply it for educational and academic purposes. [3]&lt;br /&gt;
&lt;br /&gt;
*'''Military''' - The U.S. Department of Defense has already started research on P2P networks as part of its modern network warfare strategy. However, due to security reasons, details are kept classified. [3]&lt;br /&gt;
&lt;br /&gt;
*'''Business''' - It is still in the beginning states of using P2P networks in business areas. There are several reasons why companies prefer P2P networks, such as: Real-time collaboration, a process which requires strong computing power, etc.&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[1]http://www.spinellis.gr/pubs/jrnl/2004-ACMCS-p2p/html/AS04.html&lt;br /&gt;
&lt;br /&gt;
[2]http://www.ibiblio.org/team/intro/search/search.html&lt;br /&gt;
&lt;br /&gt;
[3]http://en.wikipedia.org/wiki/Peer-to-peer&lt;br /&gt;
&lt;br /&gt;
[4]http://www.ibm.com/developerworks/java/library/j-p2ptrust/&lt;br /&gt;
&lt;br /&gt;
[5]http://netsecurity.about.com/od/newsandeditorial1/a/p2psecurity.htm&lt;br /&gt;
&lt;br /&gt;
[6]http://www.websense.com/global/en/ResourceCenter/p2p_security.php&lt;br /&gt;
&lt;br /&gt;
[7]http://www.websense.com/docs/WhitePapers/PeertoPeer.pdf&lt;br /&gt;
&lt;br /&gt;
[8]http://www.webopedia.com/DidYouKnow/Internet/2005/peer_to_peer.asp&lt;br /&gt;
&lt;br /&gt;
[9]http://ntrg.cs.tcd.ie/undergrad/4ba2.02-03/p10.html&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
[[Streaming Media Technology]]&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.ibm.com/developerworks/java/library/j-p2ptrust/ The practice of peer-to-peer computing: Trust and security in peer-to-peer networks]&lt;br /&gt;
*[http://ntrg.cs.tcd.ie/undergrad/4ba2.02-03/p10.html P2P Security]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Image:Architecture.png&lt;br /&gt;
&lt;br /&gt;
--[[User:Chowkw|Chowkw]] 17:16, 7 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Peer_To_Peer_Network_Security</id>
		<title>Peer To Peer Network Security</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Peer_To_Peer_Network_Security"/>
				<updated>2008-04-07T19:01:26Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Peer-to-Peer''' (or '''P2P''') networking is a fairly popular networking concept. Networks such as BitTorrent and eMule make it easy for people to find what they want and share what they have. P2P networks are used primarily to exchange pirated audio, video, software, and other inappropriate content. [5,6]&lt;br /&gt;
[[Image:Peer_to_peer.gif|thumb|250px|right| The different between Client-Server and P2P model.[2]]]&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
==What is Peer to Peer Network==&lt;br /&gt;
A pure peer-to-peer network does not have the notion of clients or servers, but only equal peer nodes that simultaneously function as both &amp;quot;clients&amp;quot; and &amp;quot;servers&amp;quot; to the other nodes on the network. An example for a non P2P file transfer is an FTP server where the client and server programs are quite distinct. P2P networks are generally simpler but they usually do not offer the same performance under heavy loads. The P2P network itself relies on computing power at the ends of a connection rather than from within the network itself. Besides file sharing, P2P networks are also used for Distributed Computation or Instant messaging. [3,8]&lt;br /&gt;
&lt;br /&gt;
==Network Structure==&lt;br /&gt;
Peer-to-peer file sharing networks are transient Internet networks that allow computer users within the same P2P networking program to connect with each other computers and use sophisticated searching techniques to directly access and download files from one another's hard drives. The P2P overlay network consists of all the participating peers as network nodes. There are links between any two nodes that know each other. Based on how nodes link to each other, P2P networks can classify as '''Unstructured''' and '''Structured'''. [7,3]&lt;br /&gt;
&lt;br /&gt;
===Unstructured P2P networks===&lt;br /&gt;
An unstructured P2P network is formed when the overlay links are established arbitrarily. Such networks can be easily constructed as a new peer that wants to join the network can copy existing links of another node and then form its own links over time. In an unstructured P2P network, if a peer wants to find a desired piece of data in the network, the query has to be flooded through the network to find as many peers as possible that share the data. The main disadvantage with such networks is that the queries may not always be resolved. Popular content is likely to be available at several peers and any peer searching for it is likely to find the same thing, but if a peer is looking for rare data shared by only a few other peers, then it is highly unlikely that search will be successful. [3]&lt;br /&gt;
&lt;br /&gt;
===Structured P2P networks===&lt;br /&gt;
Structured P2P network employ a globally consistent protocol to ensure that any node can efficiently route a search to some peer that has the desired file, even if the file is extremely rare. Such a guarantee necessitates a more structured pattern of overlay links. By far the most common type of structured P2P network is the distributed hash table (DHT), in which a variant of consistent hashing is used to assign ownership of each file to a particular peer, in a way analogous to a traditional hash table's assignment of each key to a particular array slot. [3]&lt;br /&gt;
&lt;br /&gt;
==Security Concern==&lt;br /&gt;
One major concern of using P2P architecture in the workplace is, of course, network security. Security concerns stem from the architecture itself. Today we find most blocking and routing handles by a specific server within network, but the P2P architecture has no single fixed server responsible for routing and requests. There are many kind of P2P networking attacks that cause the security problem and we have some example below. On the other hand, most of the security mechanisms using today are based on secret key, public key or combination of them. below has some introduction of the basic aspects of them. [8,9]&lt;br /&gt;
&lt;br /&gt;
The picture below shows the weakness of security when using P2P applications. It shows that these applications are allow to go though the network and the network is now not secure. [9]&lt;br /&gt;
&lt;br /&gt;
[[Image:Security.gif]]&lt;br /&gt;
&lt;br /&gt;
===Attack===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''TCP port''' - To share files on the computer within a P2P network such as BitTorrent, a specific TCP port must be opened for the P2P software to communicate. In effect, once you open the port you are no longer protected from malicious traffic coming through it. [5]&lt;br /&gt;
&amp;lt;li&amp;gt;'''Trojans, Viruses''' - When files are downloading from other peer, there are no guarantee that the files being transfered are the one that you want. Also, when you double-click the EXE file, you can not sure that it has not installed a Trojans or bring viruses to the computer. [5]&lt;br /&gt;
&amp;lt;li&amp;gt;'''Malware''' - The P2P network software itself may contain [http://en.wikipedia.org/wiki/Malware malware] or [http://en.wikipedia.org/wiki/Spyware spyware]. [3]&lt;br /&gt;
&amp;lt;li&amp;gt;'''Bandwidth Clogging and File Sharing''' - P2P applications such as BitTorrent make it possible for one computer to share files with another computer located somewhere else on the Internet. A major problem with P2P file-sharing programs is that they result in heavy traffic, which clogs the institution networks. The rich audio and video files that P2P users share are very big. This affects response times for internal users as well as e-business customers and that results in lost income. [9]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Security Mechanisms===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Secret Key''' - Secret key techniques are based on the fact that the sender and recipient share a secret, which is used for various cryptographic operations, such as encryption and decryption of messages and the creation and verification of message authentication data. This secret key must be exchanged in a separate out of bound procedure prior to the intended communication (using a PKI for example). [9]&lt;br /&gt;
&amp;lt;li&amp;gt;'''Public Key''' - Public Key Techniques are based on the use of asymmetric key pairs. Usually each user is in possession of just one key pair. One of the pair is made publicly available, while the other is kept private. Because one is available there is no need for an out of band key exchange, however there is a need for an infrastructure to distribute the public key authentically. Because there is no need for pre-shared secrets prior to a communication, public key techniques are ideal for supporting security between previously unknown parties. [9]&lt;br /&gt;
&amp;lt;li&amp;gt;'''Trust''' - &lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Applications==&lt;br /&gt;
An important goal in peer-to-peer networks is that all clients provide resources, including bandwidth, storage space, and computing power. Thus, as nodes arrive and demand on the system increases, the total capacity of the system also increases. [3]&lt;br /&gt;
&lt;br /&gt;
Peer-to-peer can be used for:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; [http://en.wikipedia.org/wiki/File_sharing File sharing]&lt;br /&gt;
&amp;lt;li&amp;gt; [http://en.wikipedia.org/wiki/Telephony Telephony]&lt;br /&gt;
&amp;lt;li&amp;gt; [http://en.wikipedia.org/wiki/Streaming_media Streaming media]&lt;br /&gt;
&amp;lt;li&amp;gt; Software publication and distribution&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[1]http://www.spinellis.gr/pubs/jrnl/2004-ACMCS-p2p/html/AS04.html&lt;br /&gt;
*[2]http://www.ibiblio.org/team/intro/search/search.html&lt;br /&gt;
*[3]http://en.wikipedia.org/wiki/Peer-to-peer&lt;br /&gt;
*[4]http://www.ibm.com/developerworks/java/library/j-p2ptrust/&lt;br /&gt;
*[5]http://netsecurity.about.com/od/newsandeditorial1/a/p2psecurity.htm&lt;br /&gt;
*[6]http://www.websense.com/global/en/ResourceCenter/p2p_security.php&lt;br /&gt;
*[7]http://www.websense.com/docs/WhitePapers/PeertoPeer.pdf&lt;br /&gt;
*[8]http://www.webopedia.com/DidYouKnow/Internet/2005/peer_to_peer.asp&lt;br /&gt;
*[9]http://ntrg.cs.tcd.ie/undergrad/4ba2.02-03/p10.html&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.ibm.com/developerworks/java/library/j-p2ptrust/ The practice of peer-to-peer computing: Trust and security in peer-to-peer networks]&lt;br /&gt;
*[http://ntrg.cs.tcd.ie/undergrad/4ba2.02-03/p10.html P2P Security]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Image:Architecture.png&lt;br /&gt;
&lt;br /&gt;
--[[User:Chowkw|Chowkw]] 15:01, 6 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Peer_To_Peer_Network_Security</id>
		<title>Peer To Peer Network Security</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Peer_To_Peer_Network_Security"/>
				<updated>2008-04-07T18:55:49Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Peer-to-Peer''' (or '''P2P''') networking is a fairly popular networking concept. Networks such as BitTorrent and eMule make it easy for people to find what they want and share what they have. P2P networks are used primarily to exchange pirated audio, video, software, and other inappropriate content. [5,6]&lt;br /&gt;
[[Image:Peer_to_peer.gif|thumb|250px|right| The different between Client-Server and P2P model.[2]]]&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
==What is Peer to Peer Network==&lt;br /&gt;
A pure peer-to-peer network does not have the notion of clients or servers, but only equal peer nodes that simultaneously function as both &amp;quot;clients&amp;quot; and &amp;quot;servers&amp;quot; to the other nodes on the network. An example for a non P2P file transfer is an FTP server where the client and server programs are quite distinct. P2P networks are generally simpler but they usually do not offer the same performance under heavy loads. The P2P network itself relies on computing power at the ends of a connection rather than from within the network itself. Besides file sharing, P2P networks are also used for Distributed Computation or Instant messaging. [3,8]&lt;br /&gt;
&lt;br /&gt;
==Network Structure==&lt;br /&gt;
Peer-to-peer file sharing networks are transient Internet networks that allow computer users within the same P2P networking program to connect with each other computers and use sophisticated searching techniques to directly access and download files from one another's hard drives. The P2P overlay network consists of all the participating peers as network nodes. There are links between any two nodes that know each other. Based on how nodes link to each other, P2P networks can classify as '''Unstructured''' and '''Structured'''. [7,3]&lt;br /&gt;
&lt;br /&gt;
===Unstructured P2P networks===&lt;br /&gt;
An unstructured P2P network is formed when the overlay links are established arbitrarily. Such networks can be easily constructed as a new peer that wants to join the network can copy existing links of another node and then form its own links over time. In an unstructured P2P network, if a peer wants to find a desired piece of data in the network, the query has to be flooded through the network to find as many peers as possible that share the data. The main disadvantage with such networks is that the queries may not always be resolved. Popular content is likely to be available at several peers and any peer searching for it is likely to find the same thing, but if a peer is looking for rare data shared by only a few other peers, then it is highly unlikely that search will be successful. [3]&lt;br /&gt;
&lt;br /&gt;
===Structured P2P networks===&lt;br /&gt;
Structured P2P network employ a globally consistent protocol to ensure that any node can efficiently route a search to some peer that has the desired file, even if the file is extremely rare. Such a guarantee necessitates a more structured pattern of overlay links. By far the most common type of structured P2P network is the distributed hash table (DHT), in which a variant of consistent hashing is used to assign ownership of each file to a particular peer, in a way analogous to a traditional hash table's assignment of each key to a particular array slot. [3]&lt;br /&gt;
The picture below shows the weakness of security when using P2P applications. The picture shows that these applications are allow to go though the network and the network is now not secure. [9]&lt;br /&gt;
[[Image:Security.gif]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Security Concern==&lt;br /&gt;
One major concern of using P2P architecture in the workplace is, of course, network security. Security concerns stem from the architecture itself. Today we find most blocking and routing handles by a specific server within network, but the P2P architecture has no single fixed server responsible for routing and requests. There are many kind of P2P networking attacks that cause the security problem and we have some example below. On the other hand, most of the security mechanisms using today are based on secret key, public key or combination of them. below has some introduction of the basic aspects of them. [8,9]&lt;br /&gt;
&lt;br /&gt;
===Attack===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''TCP port''' - To share files on the computer within a P2P network such as BitTorrent, a specific TCP port must be opened for the P2P software to communicate. In effect, once you open the port you are no longer protected from malicious traffic coming through it. [5]&lt;br /&gt;
&amp;lt;li&amp;gt;'''Trojans, Viruses''' - When files are downloading from other peer, there are no guarantee that the files being transfered are the one that you want. Also, when you double-click the EXE file, you can not sure that it has not installed a Trojans or bring viruses to the computer. [5]&lt;br /&gt;
&amp;lt;li&amp;gt;'''Malware''' - The P2P network software itself may contain [http://en.wikipedia.org/wiki/Malware malware] or [http://en.wikipedia.org/wiki/Spyware spyware]. [3]&lt;br /&gt;
&amp;lt;li&amp;gt;'''Bandwidth Clogging and File Sharing''' - P2P applications such as BitTorrent make it possible for one computer to share files with another computer located somewhere else on the Internet. A major problem with P2P file-sharing programs is that they result in heavy traffic, which clogs the institution networks. The rich audio and video files that P2P users share are very big. This affects response times for internal users as well as e-business customers and that results in lost income. [9]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Security Mechanisms===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Secret Key''' - Secret key techniques are based on the fact that the sender and recipient share a secret, which is used for various cryptographic operations, such as encryption and decryption of messages and the creation and verification of message authentication data. This secret key must be exchanged in a separate out of bound procedure prior to the intended communication (using a PKI for example). [9]&lt;br /&gt;
&amp;lt;li&amp;gt;'''Public Key''' - Public Key Techniques are based on the use of asymmetric key pairs. Usually each user is in possession of just one key pair. One of the pair is made publicly available, while the other is kept private. Because one is available there is no need for an out of band key exchange, however there is a need for an infrastructure to distribute the public key authentically. Because there is no need for pre-shared secrets prior to a communication, public key techniques are ideal for supporting security between previously unknown parties. [9]&lt;br /&gt;
&amp;lt;li&amp;gt;'''Trust''' - &lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Applications==&lt;br /&gt;
An important goal in peer-to-peer networks is that all clients provide resources, including bandwidth, storage space, and computing power. Thus, as nodes arrive and demand on the system increases, the total capacity of the system also increases. [3]&lt;br /&gt;
&lt;br /&gt;
Peer-to-peer can be used for:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; [http://en.wikipedia.org/wiki/File_sharing File sharing]&lt;br /&gt;
&amp;lt;li&amp;gt; [http://en.wikipedia.org/wiki/Telephony Telephony]&lt;br /&gt;
&amp;lt;li&amp;gt; [http://en.wikipedia.org/wiki/Streaming_media Streaming media]&lt;br /&gt;
&amp;lt;li&amp;gt; Software publication and distribution&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[1]http://www.spinellis.gr/pubs/jrnl/2004-ACMCS-p2p/html/AS04.html&lt;br /&gt;
*[2]http://www.ibiblio.org/team/intro/search/search.html&lt;br /&gt;
*[3]http://en.wikipedia.org/wiki/Peer-to-peer&lt;br /&gt;
*[4]http://www.ibm.com/developerworks/java/library/j-p2ptrust/&lt;br /&gt;
*[5]http://netsecurity.about.com/od/newsandeditorial1/a/p2psecurity.htm&lt;br /&gt;
*[6]http://www.websense.com/global/en/ResourceCenter/p2p_security.php&lt;br /&gt;
*[7]http://www.websense.com/docs/WhitePapers/PeertoPeer.pdf&lt;br /&gt;
*[8]http://www.webopedia.com/DidYouKnow/Internet/2005/peer_to_peer.asp&lt;br /&gt;
*[9]http://ntrg.cs.tcd.ie/undergrad/4ba2.02-03/p10.html&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.ibm.com/developerworks/java/library/j-p2ptrust/ The practice of peer-to-peer computing: Trust and security in peer-to-peer networks]&lt;br /&gt;
*[http://ntrg.cs.tcd.ie/undergrad/4ba2.02-03/p10.html P2P Security]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Image:Architecture.png&lt;br /&gt;
&lt;br /&gt;
--[[User:Chowkw|Chowkw]] 14:54, 6 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Security.gif</id>
		<title>File:Security.gif</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Security.gif"/>
				<updated>2008-04-07T18:53:43Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Peer_To_Peer_Network_Security</id>
		<title>Peer To Peer Network Security</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Peer_To_Peer_Network_Security"/>
				<updated>2008-04-07T03:46:40Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Peer-to-Peer''' (or '''P2P''') networking is a fairly popular networking concept. Networks such as BitTorrent and eMule make it easy for people to find what they want and share what they have. P2P networks are used primarily to exchange pirated audio, video, software, and other inappropriate content. [5,6]&lt;br /&gt;
[[Image:Peer_to_peer.gif|thumb|250px|right| The different between Client-Server and P2P model.[2]]]&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
==What is Peer to Peer Network==&lt;br /&gt;
A pure peer-to-peer network does not have the notion of clients or servers, but only equal peer nodes that simultaneously function as both &amp;quot;clients&amp;quot; and &amp;quot;servers&amp;quot; to the other nodes on the network. An example for a non P2P file transfer is an FTP server where the client and server programs are quite distinct. [3] P2P networks are generally simpler but they usually do not offer the same performance under heavy loads. The P2P network itself relies on computing power at the ends of a connection rather than from within the network itself. [8] Besides file sharing, P2P networks are also used for Distributed Computation or Instant messaging. &lt;br /&gt;
&lt;br /&gt;
==Network Structure==&lt;br /&gt;
Peer-to-peer file sharing networks are transient Internet networks that allow computer users within the same P2P networking program to connect with each other computers and use sophisticated searching techniques to directly access and download files from one another's hard drives. [7]&lt;br /&gt;
The P2P overlay network consists of all the participating peers as network nodes. There are links between any two nodes that know each other. Based on how nodes link to each other, P2P networks can classify as '''Unstructured''' and '''Structured'''. [3]&lt;br /&gt;
&lt;br /&gt;
===Unstructured P2P networks===&lt;br /&gt;
An unstructured P2P network is formed when the overlay links are established arbitrarily. Such networks can be easily constructed as a new peer that wants to join the network can copy existing links of another node and then form its own links over time. In an unstructured P2P network, if a peer wants to find a desired piece of data in the network, the query has to be flooded through the network to find as many peers as possible that share the data. The main disadvantage with such networks is that the queries may not always be resolved. Popular content is likely to be available at several peers and any peer searching for it is likely to find the same thing, but if a peer is looking for rare data shared by only a few other peers, then it is highly unlikely that search will be successful. [3]&lt;br /&gt;
&lt;br /&gt;
===Structured P2P networks===&lt;br /&gt;
Structured P2P network employ a globally consistent protocol to ensure that any node can efficiently route a search to some peer that has the desired file, even if the file is extremely rare. Such a guarantee necessitates a more structured pattern of overlay links. By far the most common type of structured P2P network is the distributed hash table (DHT), in which a variant of consistent hashing is used to assign ownership of each file to a particular peer, in a way analogous to a traditional hash table's assignment of each key to a particular array slot. [3]&lt;br /&gt;
&lt;br /&gt;
==Security Concern==&lt;br /&gt;
One major concern of using P2P architecture in the workplace is, of course, network security. Security concerns stem from the architecture itself. Today we find most blocking and routing handles by a specific server within network, but the P2P architecture has no single fixed server responsible for routing and requests. There are many kind of P2P networking attacks that cause the security problem and we have some example below. On the other hand, most of the security mechanisms using today are based on secret key, public key or combination of them. below has some introduction of the basic aspects of them. [8,9]&lt;br /&gt;
&lt;br /&gt;
===Attack===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''TCP port''' - To share files on the computer within a P2P network such as BitTorrent, a specific TCP port must be opened for the P2P software to communicate. In effect, once you open the port you are no longer protected from malicious traffic coming through it. [5]&lt;br /&gt;
&amp;lt;li&amp;gt;'''Trojans, Viruses''' - When files are downloading from other peer, there are no guarantee that the files being transfered are the one that you want. Also, when you double-click the EXE file, you can not sure that it has not installed a Trojans or bring viruses to the computer. [5]&lt;br /&gt;
&amp;lt;li&amp;gt;'''Malware''' - The P2P network software itself may contain [http://en.wikipedia.org/wiki/Malware malware] or [http://en.wikipedia.org/wiki/Spyware spyware]. [3]&lt;br /&gt;
&amp;lt;li&amp;gt;'''Bandwidth Clogging and File Sharing''' - P2P applications such as BitTorrent make it possible for one computer to share files with another computer located somewhere else on the Internet. A major problem with P2P file-sharing programs is that they result in heavy traffic, which clogs the institution networks. The rich audio and video files that P2P users share are very big. This affects response times for internal users as well as e-business customers and that results in lost income. [9]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Security Mechanisms===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Secret Key''' - Secret key techniques are based on the fact that the sender and recipient share a secret, which is used for various cryptographic operations, such as encryption and decryption of messages and the creation and verification of message authentication data. This secret key must be exchanged in a separate out of bound procedure prior to the intended communication (using a PKI for example). [9]&lt;br /&gt;
&amp;lt;li&amp;gt;'''Public Key''' - Public Key Techniques are based on the use of asymmetric key pairs. Usually each user is in possession of just one key pair. One of the pair is made publicly available, while the other is kept private. Because one is available there is no need for an out of band key exchange, however there is a need for an infrastructure to distribute the public key authentically. Because there is no need for pre-shared secrets prior to a communication, public key techniques are ideal for supporting security between previously unknown parties. [9]&lt;br /&gt;
&amp;lt;li&amp;gt;'''Trust''' - &lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Applications==&lt;br /&gt;
An important goal in peer-to-peer networks is that all clients provide resources, including bandwidth, storage space, and computing power. Thus, as nodes arrive and demand on the system increases, the total capacity of the system also increases. [3]&lt;br /&gt;
&lt;br /&gt;
Peer-to-peer can be used for:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; [http://en.wikipedia.org/wiki/File_sharing File sharing]&lt;br /&gt;
&amp;lt;li&amp;gt; [http://en.wikipedia.org/wiki/Telephony Telephony]&lt;br /&gt;
&amp;lt;li&amp;gt; [http://en.wikipedia.org/wiki/Streaming_media Streaming media]&lt;br /&gt;
&amp;lt;li&amp;gt; Software publication and distribution&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[1]http://www.spinellis.gr/pubs/jrnl/2004-ACMCS-p2p/html/AS04.html&lt;br /&gt;
*[2]http://www.ibiblio.org/team/intro/search/search.html&lt;br /&gt;
*[3]http://en.wikipedia.org/wiki/Peer-to-peer&lt;br /&gt;
*[4]http://www.ibm.com/developerworks/java/library/j-p2ptrust/&lt;br /&gt;
*[5]http://netsecurity.about.com/od/newsandeditorial1/a/p2psecurity.htm&lt;br /&gt;
*[6]http://www.websense.com/global/en/ResourceCenter/p2p_security.php&lt;br /&gt;
*[7]http://www.websense.com/docs/WhitePapers/PeertoPeer.pdf&lt;br /&gt;
*[8]http://www.webopedia.com/DidYouKnow/Internet/2005/peer_to_peer.asp&lt;br /&gt;
*[9]http://ntrg.cs.tcd.ie/undergrad/4ba2.02-03/p10.html&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.ibm.com/developerworks/java/library/j-p2ptrust/ The practice of peer-to-peer computing: Trust and security in peer-to-peer networks]&lt;br /&gt;
*[http://ntrg.cs.tcd.ie/undergrad/4ba2.02-03/p10.html P2P Security]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Image:Architecture.png&lt;br /&gt;
&lt;br /&gt;
--[[User:Chowkw|Chowkw]] 23:46, 6 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Peer_To_Peer_Network_Security</id>
		<title>Peer To Peer Network Security</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Peer_To_Peer_Network_Security"/>
				<updated>2008-04-07T03:46:17Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Peer-to-Peer''' (or '''P2P''') networking is a fairly popular networking concept. Networks such as BitTorrent and eMule make it easy for people to find what they want and share what they have. P2P networks are used primarily to exchange pirated audio, video, software, and other inappropriate content. [5,6]&lt;br /&gt;
[[Image:Peer_to_peer.gif|thumb|250px|right| The different between Client-Server and P2P model.[2]]]&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
==What is Peer to Peer Network==&lt;br /&gt;
A pure peer-to-peer network does not have the notion of clients or servers, but only equal peer nodes that simultaneously function as both &amp;quot;clients&amp;quot; and &amp;quot;servers&amp;quot; to the other nodes on the network. An example for a non P2P file transfer is an FTP server where the client and server programs are quite distinct. [3] P2P networks are generally simpler but they usually do not offer the same performance under heavy loads. The P2P network itself relies on computing power at the ends of a connection rather than from within the network itself. [8] Besides file sharing, P2P networks are also used for Distributed Computation or Instant messaging. &lt;br /&gt;
&lt;br /&gt;
==Network Structure==&lt;br /&gt;
Peer-to-peer file sharing networks are transient Internet networks that allow computer users within the same P2P networking program to connect with each other computers and use sophisticated searching techniques to directly access and download files from one another's hard drives. [7]&lt;br /&gt;
The P2P overlay network consists of all the participating peers as network nodes. There are links between any two nodes that know each other. Based on how nodes link to each other, P2P networks can classify as '''Unstructured''' and '''Structured'''. [3]&lt;br /&gt;
&lt;br /&gt;
===Unstructured P2P networks===&lt;br /&gt;
An unstructured P2P network is formed when the overlay links are established arbitrarily. Such networks can be easily constructed as a new peer that wants to join the network can copy existing links of another node and then form its own links over time. In an unstructured P2P network, if a peer wants to find a desired piece of data in the network, the query has to be flooded through the network to find as many peers as possible that share the data. The main disadvantage with such networks is that the queries may not always be resolved. Popular content is likely to be available at several peers and any peer searching for it is likely to find the same thing, but if a peer is looking for rare data shared by only a few other peers, then it is highly unlikely that search will be successful. [3]&lt;br /&gt;
&lt;br /&gt;
===Structured P2P networks===&lt;br /&gt;
Structured P2P network employ a globally consistent protocol to ensure that any node can efficiently route a search to some peer that has the desired file, even if the file is extremely rare. Such a guarantee necessitates a more structured pattern of overlay links. By far the most common type of structured P2P network is the distributed hash table (DHT), in which a variant of consistent hashing is used to assign ownership of each file to a particular peer, in a way analogous to a traditional hash table's assignment of each key to a particular array slot. [3]&lt;br /&gt;
&lt;br /&gt;
==Security Concern==&lt;br /&gt;
One major concern of using P2P architecture in the workplace is, of course, network security. Security concerns stem from the architecture itself. Today we find most blocking and routing handles by a specific server within network, but the P2P architecture has no single fixed server responsible for routing and requests. There are many kind of P2P networking attacks that cause the security problem and we have some example below. On the other hand, most of the security mechanisms using today are based on secret key, public key or combination of them. below has some introduction of the basic aspects of them. [8,9]&lt;br /&gt;
&lt;br /&gt;
===Attack===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''TCP port''' - To share files on the computer within a P2P network such as BitTorrent, a specific TCP port must be opened for the P2P software to communicate. In effect, once you open the port you are no longer protected from malicious traffic coming through it. [5]&lt;br /&gt;
&amp;lt;li&amp;gt;'''Trojans, Viruses''' - When files are downloading from other peer, there are no guarantee that the files being transfered are the one that you want. Also, when you double-click the EXE file, you can not sure that it has not installed a Trojans or bring viruses to the computer. [5]&lt;br /&gt;
&amp;lt;li&amp;gt;'''Malware''' - The P2P network software itself may contain [http://en.wikipedia.org/wiki/Malware malware] or [http://en.wikipedia.org/wiki/Spyware spyware]. [3]&lt;br /&gt;
&amp;lt;li&amp;gt;'''Bandwidth Clogging and File Sharing''' - P2P applications such as BitTorrent make it possible for one computer to share files with another computer located somewhere else on the Internet. A major problem with P2P file-sharing programs is that they result in heavy traffic, which clogs the institution networks. The rich audio and video files that P2P users share are very big. This affects response times for internal users as well as e-business customers and that results in lost income. [9]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Security Mechanisms===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''Secret Key''' - Secret key techniques are based on the fact that the sender and recipient share a secret, which is used for various cryptographic operations, such as encryption and decryption of messages and the creation and verification of message authentication data. This secret key must be exchanged in a separate out of bound procedure prior to the intended communication (using a PKI for example). [9]&lt;br /&gt;
&amp;lt;li&amp;gt;'''Public Key''' - Public Key Techniques are based on the use of asymmetric key pairs. Usually each user is in possession of just one key pair. One of the pair is made publicly available, while the other is kept private. Because one is available there is no need for an out of band key exchange, however there is a need for an infrastructure to distribute the public key authentically. Because there is no need for pre-shared secrets prior to a communication, public key techniques are ideal for supporting security between previously unknown parties. [9]&lt;br /&gt;
&amp;lt;li&amp;gt;'''Trust''' - &lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Applications==&lt;br /&gt;
An important goal in peer-to-peer networks is that all clients provide resources, including bandwidth, storage space, and computing power. Thus, as nodes arrive and demand on the system increases, the total capacity of the system also increases. [3]&lt;br /&gt;
&lt;br /&gt;
Peer-to-peer can be used for:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; [http://en.wikipedia.org/wiki/File_sharing File sharing]&lt;br /&gt;
&amp;lt;li&amp;gt; [http://en.wikipedia.org/wiki/Telephony Telephony]&lt;br /&gt;
&amp;lt;li&amp;gt; [http://en.wikipedia.org/wiki/Streaming_media Streaming media]&lt;br /&gt;
&amp;lt;li&amp;gt; Software publication and distribution&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[1]http://www.spinellis.gr/pubs/jrnl/2004-ACMCS-p2p/html/AS04.html&lt;br /&gt;
*[2]http://www.ibiblio.org/team/intro/search/search.html&lt;br /&gt;
*[3]http://en.wikipedia.org/wiki/Peer-to-peer&lt;br /&gt;
*[4]http://www.ibm.com/developerworks/java/library/j-p2ptrust/&lt;br /&gt;
*[5]http://netsecurity.about.com/od/newsandeditorial1/a/p2psecurity.htm&lt;br /&gt;
*[6]http://www.websense.com/global/en/ResourceCenter/p2p_security.php&lt;br /&gt;
*[7]http://www.websense.com/docs/WhitePapers/PeertoPeer.pdf&lt;br /&gt;
*[8]http://www.webopedia.com/DidYouKnow/Internet/2005/peer_to_peer.asp&lt;br /&gt;
*[9]http://ntrg.cs.tcd.ie/undergrad/4ba2.02-03/p10.html&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.ibm.com/developerworks/java/library/j-p2ptrust/ The practice of peer-to-peer computing: Trust and security in peer-to-peer networks]&lt;br /&gt;
*[http://ntrg.cs.tcd.ie/undergrad/4ba2.02-03/p10.html P2P Security]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Image:Architecture.png&lt;br /&gt;
&lt;br /&gt;
--[[User:Chowkw|Chowkw]] 23:46, 7 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Peer_To_Peer_Network_Security</id>
		<title>Peer To Peer Network Security</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Peer_To_Peer_Network_Security"/>
				<updated>2008-04-07T02:55:44Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Peer-to-Peer''' (or '''P2P''') networking is a fairly popular networking concept. Networks such as BitTorrent and eMule make it easy for people to find what they want and share what they have. P2P networks are used primarily to exchange pirated audio, video, software, and other inappropriate content. [5,6]&lt;br /&gt;
[[Image:Peer_to_peer.gif|thumb|250px|right| The different between Client-Server and P2P model.[2]]]&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
==What is Peer to Peer Network==&lt;br /&gt;
A pure peer-to-peer network does not have the notion of clients or servers, but only equal peer nodes that simultaneously function as both &amp;quot;clients&amp;quot; and &amp;quot;servers&amp;quot; to the other nodes on the network. A typical example for a non peer-to-peer file transfer is an FTP server where the client and server programs are quite distinct, and the clients initiate the download/uploads and the servers react to and satisfy these requests. [3] Besides file sharing, P2P networks are also used for Distributed Computation or Instant messaging. &lt;br /&gt;
&lt;br /&gt;
==Network Structure==&lt;br /&gt;
Peer-to-peer file sharing networks are transient Internet networks that allow computer users with the same P2P networking program to connect with each other and use sophisticated searching techniques to directly access and download files from one another's hard drives. [7]&lt;br /&gt;
The P2P overlay network consists of all the participating peers as network nodes. There are links between any two nodes that know each other. Based on how nodes link to each other, P2P networks can classify as '''Unstructured''' and '''Structured'''. [3]&lt;br /&gt;
&lt;br /&gt;
===Unstructured P2P networks===&lt;br /&gt;
An unstructured P2P network is formed when the overlay links are established arbitrarily. Such networks can be easily constructed as a new peer that wants to join the network can copy existing links of another node and then form its own links over time. In an unstructured P2P network, if a peer wants to find a desired piece of data in the network, the query has to be flooded through the network to find as many peers as possible that share the data. The main disadvantage with such networks is that the queries may not always be resolved. Popular content is likely to be available at several peers and any peer searching for it is likely to find the same thing, but if a peer is looking for rare data shared by only a few other peers, then it is highly unlikely that search will be successful. [3]&lt;br /&gt;
&lt;br /&gt;
===Structured P2P networks===&lt;br /&gt;
Structured P2P network employ a globally consistent protocol to ensure that any node can efficiently route a search to some peer that has the desired file, even if the file is extremely rare. Such a guarantee necessitates a more structured pattern of overlay links. By far the most common type of structured P2P network is the distributed hash table (DHT), in which a variant of consistent hashing is used to assign ownership of each file to a particular peer, in a way analogous to a traditional hash table's assignment of each key to a particular array slot. [3]&lt;br /&gt;
&lt;br /&gt;
==Security Concern==&lt;br /&gt;
One major concern of using P2P architecture in the workplace is, of course, network security. Security concerns stem from the architecture itself. Today we find most blocking and routing handles by a specific server within network, but the P2P architecture has no single fixed server responsible for routing and requests. [8]&lt;br /&gt;
&lt;br /&gt;
There are many kind of attack on P2P networking and here is some example.&lt;br /&gt;
===Attack===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''TCP port''' - To share files on the computer within a P2P network such as BitTorrent, a specific TCP port must be opened for the P2P software to communicate. In effect, once you open the port you are no longer protected from malicious traffic coming through it. [5]&lt;br /&gt;
&amp;lt;li&amp;gt;'''Trojans, Viruses''' - When files are downloading from other peer, there are no guarantee that the files being transfered are the one that you want. Also, when you double-click the EXE file, you can not sure that it has not installed a Trojans or bring viruses to the computer. [5]&lt;br /&gt;
&amp;lt;li&amp;gt;'''Malware''' - The P2P network software itself may contain [http://en.wikipedia.org/wiki/Malware malware] or [http://en.wikipedia.org/wiki/Spyware spyware]. [3]&lt;br /&gt;
&amp;lt;li&amp;gt;'''Bandwidth Clogging and File Sharing''' - P2P applications such as BitTorrent make it possible for one computer to share files with another computer located somewhere else on the Internet. A major problem with P2P file-sharing programs is that they result in heavy traffic, which clogs the institution networks. The rich audio and video files that P2P users share are very big. This affects response times for internal users as well as e-business customers and that results in lost income. [9]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Security Mechanisms===&lt;br /&gt;
&lt;br /&gt;
==Applications==&lt;br /&gt;
An important goal in peer-to-peer networks is that all clients provide resources, including bandwidth, storage space, and computing power. Thus, as nodes arrive and demand on the system increases, the total capacity of the system also increases. [3]&lt;br /&gt;
&lt;br /&gt;
Peer-to-peer can be used for:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; [http://en.wikipedia.org/wiki/File_sharing File sharing]&lt;br /&gt;
&amp;lt;li&amp;gt; [http://en.wikipedia.org/wiki/Telephony Telephony]&lt;br /&gt;
&amp;lt;li&amp;gt; [http://en.wikipedia.org/wiki/Streaming_media Streaming media]&lt;br /&gt;
&amp;lt;li&amp;gt; Software publication and distribution&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[1]http://www.spinellis.gr/pubs/jrnl/2004-ACMCS-p2p/html/AS04.html&lt;br /&gt;
*[2]http://www.ibiblio.org/team/intro/search/search.html&lt;br /&gt;
*[3]http://en.wikipedia.org/wiki/Peer-to-peer&lt;br /&gt;
*[4]http://www.ibm.com/developerworks/java/library/j-p2ptrust/&lt;br /&gt;
*[5]http://netsecurity.about.com/od/newsandeditorial1/a/p2psecurity.htm&lt;br /&gt;
*[6]http://www.websense.com/global/en/ResourceCenter/p2p_security.php&lt;br /&gt;
*[7]http://www.websense.com/docs/WhitePapers/PeertoPeer.pdf&lt;br /&gt;
*[8]http://www.webopedia.com/DidYouKnow/Internet/2005/peer_to_peer.asp&lt;br /&gt;
*[9]http://ntrg.cs.tcd.ie/undergrad/4ba2.02-03/p10.html&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.ibm.com/developerworks/java/library/j-p2ptrust/ The practice of peer-to-peer computing: Trust and security in peer-to-peer networks]&lt;br /&gt;
*[http://ntrg.cs.tcd.ie/undergrad/4ba2.02-03/p10.html P2P Security]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Image:Architecture.png&lt;br /&gt;
&lt;br /&gt;
--[[User:Chowkw|Chowkw]] 22:55, 7 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Peer_To_Peer_Network_Security</id>
		<title>Peer To Peer Network Security</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Peer_To_Peer_Network_Security"/>
				<updated>2008-04-06T03:16:18Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Peer_to_peer.gif|thumb|250px|right| The different between Client-Server and P2P model.[2]]]&lt;br /&gt;
'''Peer-to-Peer''' (or '''P2P''') networking is a fairly popular networking concept. Networks such as BitTorrent and eMule make it easy for people to find what they want and share what they have. P2P networks are used primarily to exchange pirated audio, video, software, and other inappropriate content. [5, 6]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
==What is Peer To Peer Network==&lt;br /&gt;
A pure peer-to-peer network does not have the notion of clients or servers, but only equal peer nodes that simultaneously function as both &amp;quot;clients&amp;quot; and &amp;quot;servers&amp;quot; to the other nodes on the network. A typical example for a non peer-to-peer file transfer is an FTP server where the client and server programs are quite distinct, and the clients initiate the download/uploads and the servers react to and satisfy these requests. [3] &lt;br /&gt;
&lt;br /&gt;
==Architecture==&lt;br /&gt;
[[Image:Architecture.png|thumb|300px|right| Typical hybrid decentralized peer-to-peer architecture. A central directory server maintains an index of the metadata for all files in the network.[1]]]&lt;br /&gt;
&lt;br /&gt;
===Unstructured P2P networks===&lt;br /&gt;
&lt;br /&gt;
===Structured P2P networks===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Security Problem== &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Applications==&lt;br /&gt;
An important goal in peer-to-peer networks is that all clients provide resources, including bandwidth, storage space, and computing power. Thus, as nodes arrive and demand on the system increases, the total capacity of the system also increases. [3]&lt;br /&gt;
&lt;br /&gt;
Peer-to-peer can be used for:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; [http://en.wikipedia.org/wiki/File_sharing File sharing]&lt;br /&gt;
&amp;lt;li&amp;gt; [http://en.wikipedia.org/wiki/Telephony Telephony]&lt;br /&gt;
&amp;lt;li&amp;gt; [http://en.wikipedia.org/wiki/Streaming_media Streaming media]&lt;br /&gt;
&amp;lt;li&amp;gt; Software publication and distribution&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[1]http://www.spinellis.gr/pubs/jrnl/2004-ACMCS-p2p/html/AS04.html&lt;br /&gt;
*[2]http://www.ibiblio.org/team/intro/search/search.html&lt;br /&gt;
*[3]http://en.wikipedia.org/wiki/Peer-to-peer&lt;br /&gt;
*[4]http://www.ibm.com/developerworks/java/library/j-p2ptrust/&lt;br /&gt;
*[5]http://netsecurity.about.com/od/newsandeditorial1/a/p2psecurity.htm&lt;br /&gt;
*[6]http://www.websense.com/global/en/ResourceCenter/p2p_security.php&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*[http://www.ibm.com/developerworks/java/library/j-p2ptrust/ The practice of peer-to-peer computing: Trust and security in peer-to-peer networks]&lt;br /&gt;
&lt;br /&gt;
--[[User:Chowkw|Chowkw]] 00:12, 5 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Architecture.png</id>
		<title>File:Architecture.png</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Architecture.png"/>
				<updated>2008-04-06T02:04:24Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Peer_to_peer.gif</id>
		<title>File:Peer to peer.gif</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Peer_to_peer.gif"/>
				<updated>2008-04-06T02:00:42Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Peer_To_Peer_Network_Security</id>
		<title>Peer To Peer Network Security</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Peer_To_Peer_Network_Security"/>
				<updated>2008-04-05T04:12:32Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;P2P network security - UNDER CONSTRUCTION-&lt;br /&gt;
__TOC__&lt;br /&gt;
==What is Peer To Peer Network==&lt;br /&gt;
&lt;br /&gt;
==Architecture==&lt;br /&gt;
&lt;br /&gt;
==Applications==&lt;br /&gt;
&lt;br /&gt;
==Security Problem== &lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
--[[User:Chowkw|Chowkw]] 00:12, 5 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Importing_Models</id>
		<title>Importing Models</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Importing_Models"/>
				<updated>2008-03-20T03:48:18Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
A model (.mdl) resource is created by exporting a model from the World Editor.&lt;br /&gt;
&amp;lt;br&amp;gt;The model to be imported MUST be a COLLADA (*.dae) file.&lt;br /&gt;
&amp;lt;br&amp;gt;There are different way to export to collada file depend on the software you use to create the model. In this tutorial, we use [http://usa.autodesk.com/adsk/servlet/index?siteID=123112&amp;amp;id=7635018 Audodesk Maya] as an example&lt;br /&gt;
&lt;br /&gt;
==Importing Scene Data==&lt;br /&gt;
&amp;lt;br&amp;gt;Export the model to COLLADA (*.dae) file. After exported to a collada file, put it in the directory &amp;quot;..\C4\Import&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Import1.jpg]]&lt;br /&gt;
&amp;lt;br&amp;gt;Start C4 and select Tool and New World. Select Import Scene from World menu&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Import2.jpg]]&lt;br /&gt;
&amp;lt;br&amp;gt;Import Scene dialog displays and choose the collada file that is importing. Click OK&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Import3.jpg]]&lt;br /&gt;
&amp;lt;br&amp;gt;After selecting a Collada file, the imported geometry (as well as lights and materials) will appear in the World Editor. At this point, you may make any changes that you need to.&lt;br /&gt;
&amp;lt;br&amp;gt;Note that during the import process, the World Editor will keep track of the materials used by the imported geometry. The texture maps are correctly assigned to each geometry, but the images themselves still need to be imported using the [http://www.cas.mcmaster.ca/wiki/index.php/Importing_Textures Importing Textures]&lt;br /&gt;
[[Image:Import4.jpg]]&lt;br /&gt;
&lt;br /&gt;
==Exporting to a Model==&lt;br /&gt;
After you make the change, select World - Save as Model&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Import5.jpg]]&lt;br /&gt;
&amp;lt;br&amp;gt;Export Model dialog shows up. Give the model a name and choose the location that you want to save at. Click OK&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Import6.jpg]]&lt;br /&gt;
&amp;lt;br&amp;gt;Now, you can close the world and the collada file has covert to a model file&lt;br /&gt;
&lt;br /&gt;
==Insert Model to a world==&lt;br /&gt;
To insert the model that you just import, open the world that you work on and from the menu, select World - Insert Model&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Import7.jpg]]&lt;br /&gt;
&amp;lt;br&amp;gt;Import Model dialog display and you should see the model that you just import. Click OK&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Import8.jpg]]&lt;br /&gt;
&amp;lt;br&amp;gt;In the viewports&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Import9.jpg]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Return to [http://www.cas.mcmaster.ca/wiki/index.php/RCaragogo RCaragogo]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''References'''&lt;br /&gt;
&amp;lt;br&amp;gt;http://www.terathon.com/wiki/index.php?title=Creating_an_Entity_Model&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Import9.jpg</id>
		<title>File:Import9.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Import9.jpg"/>
				<updated>2008-03-20T03:47:44Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Import8.jpg</id>
		<title>File:Import8.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Import8.jpg"/>
				<updated>2008-03-20T03:43:59Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Import7.jpg</id>
		<title>File:Import7.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Import7.jpg"/>
				<updated>2008-03-20T03:41:33Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Import6.jpg</id>
		<title>File:Import6.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Import6.jpg"/>
				<updated>2008-03-20T03:35:10Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Import5.jpg</id>
		<title>File:Import5.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Import5.jpg"/>
				<updated>2008-03-20T03:31:08Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Import4.jpg</id>
		<title>File:Import4.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Import4.jpg"/>
				<updated>2008-03-20T03:29:11Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Import3.jpg</id>
		<title>File:Import3.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Import3.jpg"/>
				<updated>2008-03-20T03:26:27Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Import2.jpg</id>
		<title>File:Import2.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Import2.jpg"/>
				<updated>2008-03-20T03:25:03Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Import1.jpg</id>
		<title>File:Import1.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Import1.jpg"/>
				<updated>2008-03-20T03:19:51Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Adding_lighting</id>
		<title>Adding lighting</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Adding_lighting"/>
				<updated>2008-03-20T03:03:52Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Create a new world or load the world you would like to add lighting on&lt;br /&gt;
&amp;lt;br&amp;gt;From the page menu, select Lights. Lights page show up on the left panel&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Light1.jpg]]&lt;br /&gt;
&amp;lt;br&amp;gt;Choose the light style that you want. Here we use &amp;quot;Infinite Light&amp;quot; as an example.&lt;br /&gt;
Click on the Infinite Light button and add it to the scene. Use the top left viewport and click somewhere in the bottom right as seen in the image below. Once the node has been added it is made active, but it is always a good idea to click 1 on the keypad to enable the Select Nodes button.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
After adding the light, you could use Move Tool to move the light to the position you want and use Rotate Tool to turn where the light coming from. Looking closer at the light, notice that apart from the usual three axis manipulators there is an extra one, a yellow single line, this is the light direction. You might need to rotate it so the light direction is pointing to the direction you want.&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Light2.jpg]]&lt;br /&gt;
&amp;lt;br&amp;gt;You could change the light property by selecting it and Node - Get Info or Ctrl-i&lt;br /&gt;
[[Image:Lightifo.jpg]]&lt;br /&gt;
&amp;lt;br&amp;gt;Before adding a light&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Lightbefore.jpg]]&lt;br /&gt;
&amp;lt;br&amp;gt;After adding a light&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Lightafter.jpg]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
'''References'''&lt;br /&gt;
&amp;lt;br&amp;gt;http://www.terathon.com/wiki/index.php?title=Creating_a_Basic_World&lt;br /&gt;
&amp;lt;br&amp;gt;http://www.terathon.com/wiki/index.php?title=Lights_and_Shadows&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Lightifo.jpg</id>
		<title>File:Lightifo.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Lightifo.jpg"/>
				<updated>2008-03-20T02:58:43Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Lightafter.jpg</id>
		<title>File:Lightafter.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Lightafter.jpg"/>
				<updated>2008-03-20T02:56:48Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Lightbefore.jpg</id>
		<title>File:Lightbefore.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Lightbefore.jpg"/>
				<updated>2008-03-20T02:55:57Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Light2.jpg</id>
		<title>File:Light2.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Light2.jpg"/>
				<updated>2008-03-20T02:51:02Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Light1.jpg</id>
		<title>File:Light1.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Light1.jpg"/>
				<updated>2008-03-20T02:39:03Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Basic_Commands</id>
		<title>Basic Commands</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Basic_Commands"/>
				<updated>2008-03-20T02:24:40Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
==World Editor Layout==&lt;br /&gt;
This is the place for edit a existing world. A menu bar on the top give different options while editing the world. &lt;br /&gt;
On the left hand side of the world editor dialog, it shows '''Pages'''. Top of world editor shows '''Tool and Toggle buttons''' and the rest of it is '''Viewports''' of the world&lt;br /&gt;
[[Image:newworld3.jpg]]&lt;br /&gt;
&lt;br /&gt;
==Tool and Toggle Buttons==&lt;br /&gt;
Tool and Toggle buttons locate the top of world editor dialog&lt;br /&gt;
&amp;lt;br&amp;gt;For Tool buttons, from left to right are the following:&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Tool.jpg]]&lt;br /&gt;
*'''Box Select Nodes''' - Selects all nodes that intersect the rectangle that is dragged out&lt;br /&gt;
*'''Select Nodes''' - Selects the one node that is clicked on. The Shift key can be used to add to or subtract from the current selection. &lt;br /&gt;
*'''Move Nodes''' - Works just like the Select Nodes tool, except that dragging the cursor moves the selected nodes&lt;br /&gt;
*'''Rotate Nodes''' - Works just like the Select Nodes tool except that handles appear on selected nodes. Dragging a handle rotates the selected nodes. The Shift key can be used while rotating to enable angle snap&lt;br /&gt;
*'''Scale Nodes''' - Works just like the Select Nodes tool except that handles appear on selected nodes&lt;br /&gt;
*'''Connect Nodes''' - Works just like the Select Nodes tool except that connectors appear on selected nodes (if they have any)&lt;br /&gt;
*'''Scroll Viewport''' - Dragging with this tool pans the viewport&lt;br /&gt;
*'''Zoom Viewport''' - Dragging vertically with this tool zooms in and out of a viewport&lt;br /&gt;
*'''Box Zoom Viewport''' - A viewport is zoomed to the rectangle dragged out by this tool&lt;br /&gt;
*'''Free Camera Move''' - (This tool can only be used in perspective viewports.) When the mouse button is held down with this tool, the WSAD keys can be used to fly the camera around forward, backward, left, and right. The Space and C keys move up and down&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For Toggle buttons, from left to right are the following:&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Toggle.jpg]]&lt;br /&gt;
*'''Toggle Backfaces''' - Shows or hides backfaces for geometries in wireframe display&lt;br /&gt;
*'''Toggle Referenced Worlds''' - Shows or hides worlds that are externally referenced by marker nodes&lt;br /&gt;
*'''Toggle Lighting''' - When active, full lighting is rendered in perspective viewports&lt;br /&gt;
*'''Draw from Center''' - When active, many tools operate in relation to the center of a node instead of the opposite corner&lt;br /&gt;
*'''Cap Geometry''' - When active, new geometries include end caps. When inactive, only lateral surfaces are created&lt;br /&gt;
&lt;br /&gt;
==Pages==&lt;br /&gt;
[[Image:Page.jpg]]&lt;br /&gt;
&amp;lt;br&amp;gt;A page is one of the palette-like subwindows shown on the left side of the World Editor. Most of them are not visible by default when a new world is created. An invisible page can be shown by selecting it from the Page menu. The pages can be rearranged by dragging them upward and downward by their title bars.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Geometries''' - Used to place primitive geometries in the scene&lt;br /&gt;
[[Image:Geometric.jpg]]&lt;br /&gt;
*'''Material''' -  Displays the current material that is applied to new geometries&lt;br /&gt;
[[Image:Material.jpg]]&lt;br /&gt;
*'''Selection Mask''' - Toggle buttons that determine what types of nodes can be selected&lt;br /&gt;
[[Image:Selectionmask.jpg]]&lt;br /&gt;
*'''Viewports''' - Contains buttons that change the viewport layout&lt;br /&gt;
[[Image:Viewports.jpg]]&lt;br /&gt;
*'''Cameras''' - The single tool in this page places a frustum camera in the scene&lt;br /&gt;
[[Image:Cameras.jpg]]&lt;br /&gt;
*'''Effects''' - Used to place various special effects in the scene&lt;br /&gt;
[[Image:Effects.jpg]]&lt;br /&gt;
*'''Entities''' - Shows a list of registered entity type&lt;br /&gt;
[[Image:Entities.jpg]]&lt;br /&gt;
*'''Grid''' - Controls for grid settings&lt;br /&gt;
[[Image:Grid.jpg]]&lt;br /&gt;
*'''Info''' - Displays information about the node to which the gizmo is currently assigned&lt;br /&gt;
[[Image:Info.jpg]]&lt;br /&gt;
*'''Lights''' - Used to place light sources in the scene&lt;br /&gt;
[[Image:Lights.jpg]]&lt;br /&gt;
*'''Markers''' - Used to place marker nodes in the scene&lt;br /&gt;
[[Image:Markers.jpg]]&lt;br /&gt;
*'''Mesh Tools''' - Contains a single tool that selects individual surfaces on a mesh&lt;br /&gt;
[[Image:Meshtools.jpg]]&lt;br /&gt;
*'''Particle Systems''' - Tools for placing emitters in the scene. It also shows a list of registered particle system types. A particle system can be placed in the scene by selecting one from the list and then clicking in a viewport at the location where you want to place it&lt;br /&gt;
[[Image:Particlesystems.jpg]]&lt;br /&gt;
*'''Paths''' - Tools for drawing paths&lt;br /&gt;
[[Image:Paths.jpg]]&lt;br /&gt;
*'''Portals''' - Tools for placing portals in the scene and also contains tools for inserting and removing vertices from portals.&lt;br /&gt;
[[Image:Portals.jpg]]&lt;br /&gt;
*'''Skybox''' -  Tool for placeing a skybox node in the scene&lt;br /&gt;
[[Image:Skybox.jpg]]&lt;br /&gt;
*'''Sources''' - Used to place sound sources in the scene&lt;br /&gt;
[[Image:Sources.jpg]]&lt;br /&gt;
*'''Spaces''' - Used to place various types of spaces in the scene&lt;br /&gt;
[[Image:Spaces.jpg]]&lt;br /&gt;
*'''Texture Mapping''' - Tools for offsetting, rotating, and scaling texture coordinates&lt;br /&gt;
[[Image:Texturemapping.jpg]]&lt;br /&gt;
*'''Transform''' - Lets you change the position, rotation, and size of a node numerically. The transform is shown for the node to which the gizmo is currently assigned&lt;br /&gt;
[[Image:Transform.jpg]]&lt;br /&gt;
*'''Triggers''' - Used to place trigger volumes in the scene&lt;br /&gt;
[[Image:Triggers.jpg]]&lt;br /&gt;
*'''Visibility''' - Contains buttons for showing and hiding nodes by type&lt;br /&gt;
[[Image:Visibility.jpg]]&lt;br /&gt;
*'''Zones''' - Used to place zones in the scene and also contains tools for inserting and removing vertices from polygon zones&lt;br /&gt;
[[Image:Zones.jpg]]&lt;br /&gt;
&lt;br /&gt;
==Viewports==&lt;br /&gt;
The World Editor displays one to four viewports at a time, but manages eight separate viewports internally. The visual configuration of the viewports can be changed using the buttons in the Layout page. The eight viewports are the four quarter-size viewports and the four half-size viewports (two horizontal and two vertical) of which at most four are shown in any multi-viewport configuration. Any viewport can be shown by itself at full size by typing Ctrl-n (or Cmd-n on the Mac), where n is a number between 1 and 8, or by selecting it from the Layout menu. Typing Ctrl-n again when viewport n is shown at full size returns to the previous multi-viewport configuration.&lt;br /&gt;
&lt;br /&gt;
There are three types of viewports: orthographic, perspective, and scene graph. Orthographic viewports can display the scene from one of six directions corresponding to the positive and negative x, y, and z axes. The type of each viewport can be changed by right-clicking in a viewport (or Ctrl-clicking on the Mac) and selecting a new viewport type from the popup menu that appears.&lt;br /&gt;
&lt;br /&gt;
The scene graph viewport is a special viewport that displays the scene hierarchy. All of the nodes in the scene are displayed in a tree that represents the actual structure of the scene. Subtrees can be collapsed or expanded by clicking on the collapse boxes between the various levels of the hierarchy. In a scene graph viewport, the Select and Move tool provides the capability to reparent nodes. The currently selected nodes can be reparented by dragging them to another node that will serve as the new parent. (Nodes cannot be reparented to any of their descendants.) [1]&lt;br /&gt;
&lt;br /&gt;
==Gizmo==&lt;br /&gt;
The gizmo is a control that appears for one of the selected nodes. It shows the orientation of the node's local axes in red, green, and blue for the x, y, and z directions, respectively.&lt;br /&gt;
&amp;lt;br&amp;gt;When the Select and Move tool is in use, the arrowheads on the axes can be dragged in any viewport to move the node along the corresponding direction.&lt;br /&gt;
&lt;br /&gt;
The gizmo assignment can be iterated through the nodes in the current selection by pressing the Tab key. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
'''Reference'''&lt;br /&gt;
&amp;lt;br&amp;gt;[1] http://www.terathon.com/wiki/index.php?title=World_Editor_Overview&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Basic_Commands</id>
		<title>Basic Commands</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Basic_Commands"/>
				<updated>2008-03-20T02:23:25Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
==World Editor Layout==&lt;br /&gt;
This is the place for edit a existing world. A menu bar on the top give different options while editing the world. &lt;br /&gt;
On the left hand side of the world editor dialog, it shows '''Pages'''. Top of world editor shows '''Tool and Toggle buttons''' and the rest of it is '''Viewports''' of the world&lt;br /&gt;
[[Image:newworld3.jpg]]&lt;br /&gt;
&lt;br /&gt;
==Tool and Toggle Buttons==&lt;br /&gt;
Tool and Toggle buttons locate the top of world editor dialog&lt;br /&gt;
&amp;lt;br&amp;gt;For Tool buttons, from left to right are the following:&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Tool.jpg]]&lt;br /&gt;
*'''Box Select Nodes''' - Selects all nodes that intersect the rectangle that is dragged out&lt;br /&gt;
*'''Select Nodes''' - Selects the one node that is clicked on. The Shift key can be used to add to or subtract from the current selection. &lt;br /&gt;
*'''Move Nodes''' - Works just like the Select Nodes tool, except that dragging the cursor moves the selected nodes&lt;br /&gt;
*'''Rotate Nodes''' - Works just like the Select Nodes tool except that handles appear on selected nodes. Dragging a handle rotates the selected nodes. The Shift key can be used while rotating to enable angle snap&lt;br /&gt;
*'''Scale Nodes''' - Works just like the Select Nodes tool except that handles appear on selected nodes&lt;br /&gt;
*'''Connect Nodes''' - Works just like the Select Nodes tool except that connectors appear on selected nodes (if they have any)&lt;br /&gt;
*'''Scroll Viewport''' - Dragging with this tool pans the viewport&lt;br /&gt;
*'''Zoom Viewport''' - Dragging vertically with this tool zooms in and out of a viewport&lt;br /&gt;
*'''Box Zoom Viewport''' - A viewport is zoomed to the rectangle dragged out by this tool&lt;br /&gt;
*'''Free Camera Move''' - (This tool can only be used in perspective viewports.) When the mouse button is held down with this tool, the WSAD keys can be used to fly the camera around forward, backward, left, and right. The Space and C keys move up and down&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For Toggle buttons, from left to right are the following:&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Toggle.jpg]]&lt;br /&gt;
*'''Toggle Backfaces''' - Shows or hides backfaces for geometries in wireframe display&lt;br /&gt;
*'''Toggle Referenced Worlds''' - Shows or hides worlds that are externally referenced by marker nodes&lt;br /&gt;
*'''Toggle Lighting''' - When active, full lighting is rendered in perspective viewports&lt;br /&gt;
*'''Draw from Center''' - When active, many tools operate in relation to the center of a node instead of the opposite corner&lt;br /&gt;
*'''Cap Geometry''' - When active, new geometries include end caps. When inactive, only lateral surfaces are created&lt;br /&gt;
&lt;br /&gt;
==Pages==&lt;br /&gt;
[[Image:Page.jpg]]&lt;br /&gt;
&amp;lt;br&amp;gt;A page is one of the palette-like subwindows shown on the left side of the World Editor. Most of them are not visible by default when a new world is created. An invisible page can be shown by selecting it from the Page menu. The pages can be rearranged by dragging them upward and downward by their title bars.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Geometries''' - Used to place primitive geometries in the scene&lt;br /&gt;
[[Image:Geometric.jpg]]&lt;br /&gt;
*'''Material''' -  Displays the current material that is applied to new geometries&lt;br /&gt;
[[Image:Material.jpg]]&lt;br /&gt;
*'''Selection Mask''' - Toggle buttons that determine what types of nodes can be selected&lt;br /&gt;
[[Image:Selectionmask.jpg]]&lt;br /&gt;
*'''Viewports''' - Contains buttons that change the viewport layout&lt;br /&gt;
[[Image:Viewports.jpg]]&lt;br /&gt;
*'''Cameras''' - The single tool in this page places a frustum camera in the scene&lt;br /&gt;
[[Image:Cameras.jpg]]&lt;br /&gt;
*'''Effects''' - Used to place various special effects in the scene&lt;br /&gt;
[[Image:Effects.jpg]]&lt;br /&gt;
*'''Entities''' - Shows a list of registered entity type&lt;br /&gt;
[[Image:Entities.jpg]]&lt;br /&gt;
*'''Grid''' - Controls for grid settings&lt;br /&gt;
[[Image:Grid.jpg]]&lt;br /&gt;
*'''Info''' - Displays information about the node to which the gizmo is currently assigned&lt;br /&gt;
[[Image:Info.jpg]]&lt;br /&gt;
*'''Lights''' - Used to place light sources in the scene&lt;br /&gt;
[[Image:Lights.jpg]]&lt;br /&gt;
*'''Markers''' - Used to place marker nodes in the scene&lt;br /&gt;
[[Image:Markers.jpg]]&lt;br /&gt;
*'''Mesh Tools''' - Contains a single tool that selects individual surfaces on a mesh&lt;br /&gt;
[[Image:Meshtools.jpg]]&lt;br /&gt;
*'''Particle Systems''' - Tools for placing emitters in the scene. It also shows a list of registered particle system types. A particle system can be placed in the scene by selecting one from the list and then clicking in a viewport at the location where you want to place it&lt;br /&gt;
[[Image:Particlesystems.jpg]]&lt;br /&gt;
*'''Paths''' - Tools for drawing paths&lt;br /&gt;
[[Image:Paths.jpg]]&lt;br /&gt;
*'''Portals''' - Tools for placing portals in the scene and also contains tools for inserting and removing vertices from portals.&lt;br /&gt;
[[Image:Portals.jpg]]&lt;br /&gt;
*'''Skybox''' -  Tool for placeing a skybox node in the scene&lt;br /&gt;
[[Image:Skybox.jpg]]&lt;br /&gt;
*'''Sources''' - Used to place sound sources in the scene&lt;br /&gt;
[[Image:Sources.jpg]]&lt;br /&gt;
*'''Spaces''' - Used to place various types of spaces in the scene&lt;br /&gt;
[[Image:Spaces.jpg]]&lt;br /&gt;
*'''Texture Mapping''' - Tools for offsetting, rotating, and scaling texture coordinates&lt;br /&gt;
[[Image:Texturemapping.jpg]]&lt;br /&gt;
*'''Transform''' - Lets you change the position, rotation, and size of a node numerically. The transform is shown for the node to which the gizmo is currently assigned&lt;br /&gt;
[[Image:Transform.jpg]]&lt;br /&gt;
*'''Triggers''' - Used to place trigger volumes in the scene&lt;br /&gt;
[[Image:Triggers.jpg]]&lt;br /&gt;
*'''Visibility''' - Contains buttons for showing and hiding nodes by type&lt;br /&gt;
[[Image:Visibility.jpg]]&lt;br /&gt;
*'''Zones''' - Used to place zones in the scene and also contains tools for inserting and removing vertices from polygon zones&lt;br /&gt;
[[Image:Zones.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Viewports==&lt;br /&gt;
The World Editor displays one to four viewports at a time, but manages eight separate viewports internally. The visual configuration of the viewports can be changed using the buttons in the Layout page. The eight viewports are the four quarter-size viewports and the four half-size viewports (two horizontal and two vertical) of which at most four are shown in any multi-viewport configuration. Any viewport can be shown by itself at full size by typing Ctrl-n (or Cmd-n on the Mac), where n is a number between 1 and 8, or by selecting it from the Layout menu. Typing Ctrl-n again when viewport n is shown at full size returns to the previous multi-viewport configuration.&lt;br /&gt;
&lt;br /&gt;
There are three types of viewports: orthographic, perspective, and scene graph. Orthographic viewports can display the scene from one of six directions corresponding to the positive and negative x, y, and z axes. The type of each viewport can be changed by right-clicking in a viewport (or Ctrl-clicking on the Mac) and selecting a new viewport type from the popup menu that appears.&lt;br /&gt;
&lt;br /&gt;
The scene graph viewport is a special viewport that displays the scene hierarchy. All of the nodes in the scene are displayed in a tree that represents the actual structure of the scene. Subtrees can be collapsed or expanded by clicking on the collapse boxes between the various levels of the hierarchy. In a scene graph viewport, the Select and Move tool provides the capability to reparent nodes. The currently selected nodes can be reparented by dragging them to another node that will serve as the new parent. (Nodes cannot be reparented to any of their descendants.) [1]&lt;br /&gt;
----&lt;br /&gt;
'''Reference'''&lt;br /&gt;
&amp;lt;br&amp;gt;[1] http://www.terathon.com/wiki/index.php?title=World_Editor_Overview&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Zones.jpg</id>
		<title>File:Zones.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Zones.jpg"/>
				<updated>2008-03-20T02:19:44Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Visibility.jpg</id>
		<title>File:Visibility.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Visibility.jpg"/>
				<updated>2008-03-20T02:19:31Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Triggers.jpg</id>
		<title>File:Triggers.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Triggers.jpg"/>
				<updated>2008-03-20T02:18:41Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Transform.jpg</id>
		<title>File:Transform.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Transform.jpg"/>
				<updated>2008-03-20T02:18:13Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Texturemapping.jpg</id>
		<title>File:Texturemapping.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Texturemapping.jpg"/>
				<updated>2008-03-20T02:13:31Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Spaces.jpg</id>
		<title>File:Spaces.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Spaces.jpg"/>
				<updated>2008-03-20T02:13:15Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Sources.jpg</id>
		<title>File:Sources.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Sources.jpg"/>
				<updated>2008-03-20T02:12:57Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Skybox.jpg</id>
		<title>File:Skybox.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Skybox.jpg"/>
				<updated>2008-03-20T02:12:35Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Portals.jpg</id>
		<title>File:Portals.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Portals.jpg"/>
				<updated>2008-03-20T02:06:49Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Paths.jpg</id>
		<title>File:Paths.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Paths.jpg"/>
				<updated>2008-03-20T02:06:27Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Particlesystems.jpg</id>
		<title>File:Particlesystems.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Particlesystems.jpg"/>
				<updated>2008-03-20T02:06:01Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Meshtools.jpg</id>
		<title>File:Meshtools.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Meshtools.jpg"/>
				<updated>2008-03-20T02:05:31Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Markers.jpg</id>
		<title>File:Markers.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Markers.jpg"/>
				<updated>2008-03-20T02:01:20Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Lights.jpg</id>
		<title>File:Lights.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Lights.jpg"/>
				<updated>2008-03-20T02:01:01Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Info.jpg</id>
		<title>File:Info.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Info.jpg"/>
				<updated>2008-03-20T02:00:39Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Grid.jpg</id>
		<title>File:Grid.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Grid.jpg"/>
				<updated>2008-03-20T02:00:17Z</updated>
		
		<summary type="html">&lt;p&gt;Chowkw:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Chowkw</name></author>	</entry>

	</feed>