Peer To Peer Network Security

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
Line 1: Line 1:
-
P2P network security - UNDER CONSTRUCTION-
+
[[Image:Peer_to_peer.gif|thumb|250px|right| The different between Client-Server and P2P model.[2]]]
 +
'''Peer-to-Peer''' (or '''P2P''') networking is a fairly popular networking concept. Networks such as BitTorrent and eMule make it easy for people to find what they want and share what they have. P2P networks are used primarily to exchange pirated audio, video, software, and other inappropriate content. [5, 6]
 +
 
 +
 
__TOC__
__TOC__
 +
==What is Peer To Peer Network==
==What is Peer To Peer Network==
 +
A pure peer-to-peer network does not have the notion of clients or servers, but only equal peer nodes that simultaneously function as both "clients" and "servers" to the other nodes on the network. A typical example for a non peer-to-peer file transfer is an FTP server where the client and server programs are quite distinct, and the clients initiate the download/uploads and the servers react to and satisfy these requests. [3]
==Architecture==
==Architecture==
 +
[[Image:Architecture.png|thumb|300px|right| Typical hybrid decentralized peer-to-peer architecture. A central directory server maintains an index of the metadata for all files in the network.[1]]]
 +
 +
===Unstructured P2P networks===
 +
 +
===Structured P2P networks===
-
==Applications==
 
==Security Problem==  
==Security Problem==  
 +
 +
 +
==Applications==
 +
An important goal in peer-to-peer networks is that all clients provide resources, including bandwidth, storage space, and computing power. Thus, as nodes arrive and demand on the system increases, the total capacity of the system also increases. [3]
 +
 +
Peer-to-peer can be used for:
 +
<ul>
 +
<li> [http://en.wikipedia.org/wiki/File_sharing File sharing]
 +
<li> [http://en.wikipedia.org/wiki/Telephony Telephony]
 +
<li> [http://en.wikipedia.org/wiki/Streaming_media Streaming media]
 +
<li> Software publication and distribution
 +
</ul>
 +
==References==
==References==
 +
*[1]http://www.spinellis.gr/pubs/jrnl/2004-ACMCS-p2p/html/AS04.html
 +
*[2]http://www.ibiblio.org/team/intro/search/search.html
 +
*[3]http://en.wikipedia.org/wiki/Peer-to-peer
 +
*[4]http://www.ibm.com/developerworks/java/library/j-p2ptrust/
 +
*[5]http://netsecurity.about.com/od/newsandeditorial1/a/p2psecurity.htm
 +
*[6]http://www.websense.com/global/en/ResourceCenter/p2p_security.php
==See Also==
==See Also==
==External Links==
==External Links==
 +
*[http://www.ibm.com/developerworks/java/library/j-p2ptrust/ The practice of peer-to-peer computing: Trust and security in peer-to-peer networks]
--[[User:Chowkw|Chowkw]] 00:12, 5 April 2008 (EDT)
--[[User:Chowkw|Chowkw]] 00:12, 5 April 2008 (EDT)

Revision as of 03:16, 6 April 2008

The different between Client-Server and P2P model.[2]

Peer-to-Peer (or P2P) networking is a fairly popular networking concept. Networks such as BitTorrent and eMule make it easy for people to find what they want and share what they have. P2P networks are used primarily to exchange pirated audio, video, software, and other inappropriate content. [5, 6]


Contents


What is Peer To Peer Network

A pure peer-to-peer network does not have the notion of clients or servers, but only equal peer nodes that simultaneously function as both "clients" and "servers" to the other nodes on the network. A typical example for a non peer-to-peer file transfer is an FTP server where the client and server programs are quite distinct, and the clients initiate the download/uploads and the servers react to and satisfy these requests. [3]

Architecture

Typical hybrid decentralized peer-to-peer architecture. A central directory server maintains an index of the metadata for all files in the network.[1]

Unstructured P2P networks

Structured P2P networks

Security Problem

Applications

An important goal in peer-to-peer networks is that all clients provide resources, including bandwidth, storage space, and computing power. Thus, as nodes arrive and demand on the system increases, the total capacity of the system also increases. [3]

Peer-to-peer can be used for:


References

See Also

External Links

--Chowkw 00:12, 5 April 2008 (EDT)

Personal tools