SlideShare une entreprise Scribd logo
1  sur  38
Télécharger pour lire hors ligne
SEMINAR ON P2P (NAPSTER) ,[object Object],[object Object],14 th  July 2008
www.freenapster.com NAPSTER 4.0
P2P(PEER to PEER) Technology ,[object Object],[object Object],[object Object],[object Object],[object Object]
P2P continued……… ,[object Object],[object Object],[object Object],[object Object],Centralized System In a centralized system a server maintains directories of what is stored in each peer computer.  The central server directs the connections between peers.  Thus, while the connection is made directly from peer to peer, a server is still necessary
Server User User User User User User User User Search Request Search Response Download Centralized Model
P2P continued…… Decentralized System With a decentralized program each peer connect directly to other peers without being directed by a server.  These connections are repeated making the resulting network, in theory, infinitely large.  In reality this size of a network is constrained by the number of layers of computers a message has to travel through.
Search Request  Search Relay Search Response Download User User User User User User User User User User Decentralized Model
 
[object Object],[object Object],[object Object],[object Object],Boston Students !!
Napster continued…. Napster is a centralized or server-based P2P network.  With a server-based network, there is a central list of information that is accessed by all the users of the system.  Here is what happened when you decided to look for the song:  1.You opened the Napster utility.  2.Napster checked for an  Internet connection.  3.If it found a connection, Napster logged you onto the central server. The main purpose of this central server was to keep  an index of all the Napster users currently online  and connect them to each other. It did not contain any of the MP3 files.  4.You typed in the title or artist of the song you were looking for.  5.The Napster utility on your computer  queried   the index server  for other Napster computers online that had the song you requested.
Napster Continued…. 6.Whenever a match was found, the Napster server informed your computer where to find the requested file.  7.When the server replied, Napster built a list of these systems in the results window.  8.You clicked on the file(s) that interested you and then chose  Download .  9.Your copy of Napster attempted to establish a connection with the system hosting the file you selected.  10.If a connection wa successfully made, the file began downloading.  11.Once the file wa downloaded, the host computer broke the connection with your system.  12.You opened up your MP3 player software and listened to the song.
 
Comparisons of Centralized and Distributed Model ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
 
Points to Ponder…. ,[object Object],[object Object],[object Object],[object Object],[object Object]
Hybrid P2P Technology  ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
It’s Hybrid P2P Technology !!!
Research on P2P… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Research cloud….
News on P2P….
 
 
Popular P2P Clients…
 
 
 
 
Common Terms Used in P2P Peer A peer is anyone who is downloading or uploading the file Client The software that allows you to download and upload (share) files using Torrent. The Torrent client opens the .torrent file and allows connections from your peers. Tracker A tracker is a server that keeps track of which seeds and peers are in the swarm. Clients report information to the tracker periodically and in exchange receive information about other clients to which they can connect Seeder A seeder is a peer that has a complete copy of the torrent and still offers it for upload. The more seeders there are, the better the chances are for completion of the file. Leech A leech is usually a peer who has a negative effect on the swarm by having a very poor share ratio, however it can also refer to any peer without 100% of the data Swarm Together, all peers (including seeders) sharing a torrent are called a swarm.
 
 
Queries?
Mail your Feedback to venkatesh.stud@gmail.com
Thank You…

Contenu connexe

Tendances

QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006Kalman Graffi
 
P2P Seminar
P2P SeminarP2P Seminar
P2P SeminarCoRehab
 
Citcism on Peer to peer networking
Citcism on Peer to peer networkingCitcism on Peer to peer networking
Citcism on Peer to peer networkingWebix.pk
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networkingicanhasfay
 
Peer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By AhnafPeer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By Ahnafahnarokz
 
P2P Lookup Protocols
P2P Lookup ProtocolsP2P Lookup Protocols
P2P Lookup ProtocolsZubin Bhuyan
 
Peer to peer data management
Peer to peer data managementPeer to peer data management
Peer to peer data managementJunaid Lodhi
 
peer to peer and client server model
peer to peer and client server modelpeer to peer and client server model
peer to peer and client server modelBharath Nair
 
Computer networks : intro to networking, pros and cons, uses, network edges :...
Computer networks : intro to networking, pros and cons, uses, network edges :...Computer networks : intro to networking, pros and cons, uses, network edges :...
Computer networks : intro to networking, pros and cons, uses, network edges :...Kaushik Panta
 
Client Server Network By Usman Ihsan
Client Server Network By Usman IhsanClient Server Network By Usman Ihsan
Client Server Network By Usman IhsanSubhan_Virk_UAF
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocolGLIM Digital
 
Introduction to computer networks
Introduction to computer networks Introduction to computer networks
Introduction to computer networks Basma Gamal
 
Internet Architecture and Design Philosophy
Internet Architecture and Design PhilosophyInternet Architecture and Design Philosophy
Internet Architecture and Design PhilosophyDilum Bandara
 
Types of network
Types of networkTypes of network
Types of networkishjari
 

Tendances (20)

Peer to peer
Peer to peerPeer to peer
Peer to peer
 
QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006
 
P2P Seminar
P2P SeminarP2P Seminar
P2P Seminar
 
Citcism on Peer to peer networking
Citcism on Peer to peer networkingCitcism on Peer to peer networking
Citcism on Peer to peer networking
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 
Peer to peer system
Peer to peer systemPeer to peer system
Peer to peer system
 
Peer to peer(p2 p)
Peer to peer(p2 p)Peer to peer(p2 p)
Peer to peer(p2 p)
 
Peer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By AhnafPeer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By Ahnaf
 
P2P Lookup Protocols
P2P Lookup ProtocolsP2P Lookup Protocols
P2P Lookup Protocols
 
Peer to peer data management
Peer to peer data managementPeer to peer data management
Peer to peer data management
 
Peer to-peer network
Peer to-peer networkPeer to-peer network
Peer to-peer network
 
peer to peer and client server model
peer to peer and client server modelpeer to peer and client server model
peer to peer and client server model
 
Computer networks : intro to networking, pros and cons, uses, network edges :...
Computer networks : intro to networking, pros and cons, uses, network edges :...Computer networks : intro to networking, pros and cons, uses, network edges :...
Computer networks : intro to networking, pros and cons, uses, network edges :...
 
Client Server Network By Usman Ihsan
Client Server Network By Usman IhsanClient Server Network By Usman Ihsan
Client Server Network By Usman Ihsan
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basic
 
Introduction to computer networks
Introduction to computer networks Introduction to computer networks
Introduction to computer networks
 
Networks
NetworksNetworks
Networks
 
Internet Architecture and Design Philosophy
Internet Architecture and Design PhilosophyInternet Architecture and Design Philosophy
Internet Architecture and Design Philosophy
 
Types of network
Types of networkTypes of network
Types of network
 

En vedette

Case study 4
Case study 4Case study 4
Case study 4av_cuby
 
Napster and Mp3: Redefining the music industry
Napster and Mp3: Redefining the music industryNapster and Mp3: Redefining the music industry
Napster and Mp3: Redefining the music industryPuneet Arora
 
Legal ethics & cloud computing
Legal ethics & cloud computingLegal ethics & cloud computing
Legal ethics & cloud computingPatrick Fowler
 
eBook piracy - Waiting for a napster moment
eBook piracy - Waiting for anapster momenteBook piracy - Waiting for anapster moment
eBook piracy - Waiting for a napster momentMathias Klang
 
Tech Talks @NSU: Архитектура Skype
Tech Talks @NSU: Архитектура SkypeTech Talks @NSU: Архитектура Skype
Tech Talks @NSU: Архитектура SkypeTech Talks @NSU
 
LAJUG Napster REST API
LAJUG Napster REST APILAJUG Napster REST API
LAJUG Napster REST APIstephenbhadran
 
P2P Multiplayer Gaming
P2P Multiplayer GamingP2P Multiplayer Gaming
P2P Multiplayer GamingJohn Wilker
 
History of Internet
History of InternetHistory of Internet
History of InternetOsama05
 
A&M Records Inc v Napster
A&M Records Inc v NapsterA&M Records Inc v Napster
A&M Records Inc v NapsterBhaumik Oza
 
Sinnreich Henry Johnston Alan Pt 3
Sinnreich Henry Johnston Alan   Pt 3Sinnreich Henry Johnston Alan   Pt 3
Sinnreich Henry Johnston Alan Pt 3Carl Ford
 
Vulnerabilities in SaaS layer of cloud computing
Vulnerabilities in SaaS layer of cloud computingVulnerabilities in SaaS layer of cloud computing
Vulnerabilities in SaaS layer of cloud computingClinton DSouza
 
Network Centric Warfare - An Introduction
Network Centric Warfare - An IntroductionNetwork Centric Warfare - An Introduction
Network Centric Warfare - An IntroductionD.A. Mohan
 
Napster killed itil
Napster killed itilNapster killed itil
Napster killed itilcraggles10
 
A Brief History of the Internet
A Brief History of the InternetA Brief History of the Internet
A Brief History of the InternetCharles Severance
 
Service provided by internet
Service provided by internetService provided by internet
Service provided by internetHardik Patel
 
Linus Lee: Napster And Inequality
Linus Lee: Napster And InequalityLinus Lee: Napster And Inequality
Linus Lee: Napster And Inequalitymerlyna
 

En vedette (20)

Case study 4
Case study 4Case study 4
Case study 4
 
Napster
NapsterNapster
Napster
 
Napster and Mp3: Redefining the music industry
Napster and Mp3: Redefining the music industryNapster and Mp3: Redefining the music industry
Napster and Mp3: Redefining the music industry
 
Ww Napster Mobile
Ww Napster MobileWw Napster Mobile
Ww Napster Mobile
 
Legal ethics & cloud computing
Legal ethics & cloud computingLegal ethics & cloud computing
Legal ethics & cloud computing
 
eBook piracy - Waiting for a napster moment
eBook piracy - Waiting for anapster momenteBook piracy - Waiting for anapster moment
eBook piracy - Waiting for a napster moment
 
Tech Talks @NSU: Архитектура Skype
Tech Talks @NSU: Архитектура SkypeTech Talks @NSU: Архитектура Skype
Tech Talks @NSU: Архитектура Skype
 
LAJUG Napster REST API
LAJUG Napster REST APILAJUG Napster REST API
LAJUG Napster REST API
 
P2P Multiplayer Gaming
P2P Multiplayer GamingP2P Multiplayer Gaming
P2P Multiplayer Gaming
 
p2p通信之nat
p2p通信之natp2p通信之nat
p2p通信之nat
 
History of Internet
History of InternetHistory of Internet
History of Internet
 
A&M Records Inc v Napster
A&M Records Inc v NapsterA&M Records Inc v Napster
A&M Records Inc v Napster
 
Sinnreich Henry Johnston Alan Pt 3
Sinnreich Henry Johnston Alan   Pt 3Sinnreich Henry Johnston Alan   Pt 3
Sinnreich Henry Johnston Alan Pt 3
 
Vulnerabilities in SaaS layer of cloud computing
Vulnerabilities in SaaS layer of cloud computingVulnerabilities in SaaS layer of cloud computing
Vulnerabilities in SaaS layer of cloud computing
 
Network Centric Warfare - An Introduction
Network Centric Warfare - An IntroductionNetwork Centric Warfare - An Introduction
Network Centric Warfare - An Introduction
 
Napster killed itil
Napster killed itilNapster killed itil
Napster killed itil
 
A Brief History of the Internet
A Brief History of the InternetA Brief History of the Internet
A Brief History of the Internet
 
Service provided by internet
Service provided by internetService provided by internet
Service provided by internet
 
Linus Lee: Napster And Inequality
Linus Lee: Napster And InequalityLinus Lee: Napster And Inequality
Linus Lee: Napster And Inequality
 
P2P Supernodes
P2P SupernodesP2P Supernodes
P2P Supernodes
 

Similaire à P2p Peer To Peer Introduction

Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptxHananShk
 
Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!DigitalThinkerHelp
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...Brenda Thomas
 
Textual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networksTextual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networksUvaraj Shan
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGijp2p
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGijp2p
 
Peer to peer_v2pptx
Peer to peer_v2pptxPeer to peer_v2pptx
Peer to peer_v2pptxMac Pat
 
Commonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & ApplicationsCommonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & Applications905426
 
Bittorrent final seminar
Bittorrent final seminarBittorrent final seminar
Bittorrent final seminarChirodeep Das
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocolD bipul lomga
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technologyguestc67adeb
 
Peer to peer (p2p)
Peer to peer (p2p)Peer to peer (p2p)
Peer to peer (p2p)Harshini
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technologyabhipesit
 
Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks IJECEIAES
 
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSEFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSijp2p
 
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS ijp2p
 

Similaire à P2p Peer To Peer Introduction (20)

Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptx
 
Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
 
Textual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networksTextual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networks
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
 
Peer to peer_v2pptx
Peer to peer_v2pptxPeer to peer_v2pptx
Peer to peer_v2pptx
 
Commonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & ApplicationsCommonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & Applications
 
Bittorrent final seminar
Bittorrent final seminarBittorrent final seminar
Bittorrent final seminar
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
 
Peer to peer (p2p)
Peer to peer (p2p)Peer to peer (p2p)
Peer to peer (p2p)
 
Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
 
BitTorrent Seminar Report
BitTorrent Seminar ReportBitTorrent Seminar Report
BitTorrent Seminar Report
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
P2p networks
P2p networksP2p networks
P2p networks
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technology
 
Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks
 
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSEFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
 
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
 

Dernier

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 

Dernier (20)

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 

P2p Peer To Peer Introduction

  • 1.
  • 3.
  • 4.
  • 5. Server User User User User User User User User Search Request Search Response Download Centralized Model
  • 6. P2P continued…… Decentralized System With a decentralized program each peer connect directly to other peers without being directed by a server. These connections are repeated making the resulting network, in theory, infinitely large. In reality this size of a network is constrained by the number of layers of computers a message has to travel through.
  • 7. Search Request Search Relay Search Response Download User User User User User User User User User User Decentralized Model
  • 8.  
  • 9.
  • 10. Napster continued…. Napster is a centralized or server-based P2P network. With a server-based network, there is a central list of information that is accessed by all the users of the system. Here is what happened when you decided to look for the song: 1.You opened the Napster utility. 2.Napster checked for an Internet connection. 3.If it found a connection, Napster logged you onto the central server. The main purpose of this central server was to keep an index of all the Napster users currently online and connect them to each other. It did not contain any of the MP3 files. 4.You typed in the title or artist of the song you were looking for. 5.The Napster utility on your computer queried the index server for other Napster computers online that had the song you requested.
  • 11. Napster Continued…. 6.Whenever a match was found, the Napster server informed your computer where to find the requested file. 7.When the server replied, Napster built a list of these systems in the results window. 8.You clicked on the file(s) that interested you and then chose Download . 9.Your copy of Napster attempted to establish a connection with the system hosting the file you selected. 10.If a connection wa successfully made, the file began downloading. 11.Once the file wa downloaded, the host computer broke the connection with your system. 12.You opened up your MP3 player software and listened to the song.
  • 12.  
  • 13.
  • 14.  
  • 15.  
  • 16.  
  • 17.
  • 18.
  • 19.  
  • 20.  
  • 21. It’s Hybrid P2P Technology !!!
  • 22.
  • 23.  
  • 24.
  • 26.  
  • 27.  
  • 29.  
  • 30.  
  • 31.  
  • 32.  
  • 33. Common Terms Used in P2P Peer A peer is anyone who is downloading or uploading the file Client The software that allows you to download and upload (share) files using Torrent. The Torrent client opens the .torrent file and allows connections from your peers. Tracker A tracker is a server that keeps track of which seeds and peers are in the swarm. Clients report information to the tracker periodically and in exchange receive information about other clients to which they can connect Seeder A seeder is a peer that has a complete copy of the torrent and still offers it for upload. The more seeders there are, the better the chances are for completion of the file. Leech A leech is usually a peer who has a negative effect on the swarm by having a very poor share ratio, however it can also refer to any peer without 100% of the data Swarm Together, all peers (including seeders) sharing a torrent are called a swarm.
  • 34.  
  • 35.  
  • 37. Mail your Feedback to venkatesh.stud@gmail.com