130 likes | 262 Views
Peer-to-Peer Networking By: Peter Diggs Ken Arrant. P2P VIRTUALPrivate COMMUNITY (VPC). Virtual Private Community, enables information in Peer-to-Peer services to act as an agent. VPC provides a mechanism that defines an agent behavior, authenticate users, and executes agents.
E N D
Peer-to-Peer Networking By: Peter Diggs Ken Arrant
P2P VIRTUALPrivate COMMUNITY (VPC) • Virtual Private Community, enables information in Peer-to-Peer services to act as an agent. VPC provides a mechanism that defines an agent behavior, authenticate users, and executes agents. • Agents for a peer-to-peer service are defined in a policy package that consists of a condition rule to decide active agents according to user. • A set of agents (Called roles), and necessary information (Contents) for the service. • Agents communicate with each other through communities that are created by agents who have accepted the policy packages. • Services are offered by interaction among agents in communities. • For example, in a music retail service, a policy package defines contain two agent • An authorized agent which can play the • complete music file. • And a trial agent which can play only part of • the music file.
OVERALL Peer-To-Peer Architecture: • The agents for the system fall into two categories. • Those that send and receive the search requests. • And those that service them against the resource and their ontology • description. • Agent send out the created search request, marked ‘RequestsAgent’ • which is defined as the endpoint for the results being returned,as either an array of results or individual result from the peers hosting the resources. • A search agent receives requests and passes them onto the peers it knows about, while at the same time performing the search on all the agents for each of the resources being shared on that user. • SearchAgent communicates both with other peers on the network and other agents running on the local peer. • The other agents found in the system, marked as Resource SearchAgent are designed and built to match any search query to the • resource they know about, whether that is a set of files on the system or other resources available to users. • The results are passed back to the SearchAgent on the same peer, which then get passed on back to the originator.
ResultsAgent LOCALT Peer Resource SearchAgent SearchAgent Resource SearchAgent OTHER Peers ResultsAgent ResultsAgent ResultsAgent
LACK OF CONTROL: • Assimilating P2P systems within large corporations • IT people live to centralize data • To centralize application usage • Most importantly to centralize their control. • P2P data is distributed among multiple computers • Not on a single hyper-secure server. • P2P is too insecure • P2P encourages employees to visit unacceptable • sites on company time.
UNRELIABLE ACCESS: Finding the file you want is a problem Maybe the user who had the file deleted it, or moved it to another folder Disconnected their internet connection and turned off their PC. A big downside about decentralized file storage across a P2P network. Problem of file swapping services.
Peer-to-Peer Uses • File Sharing • Instant Messaging • Distributed Search Engines • Group Collaboration • Distributed Computing
File Sharing -Allowing files on one computer to available for others to download. • Examples • Napster • Gnutella • -Similar to Napster, but uses third party clients to connect to their network • -http://en.wikipedia.org/wiki/Gnutella a list of Gnutella clients • KaZaA • Mojo Nation • -First file-sharing application to use distributed load balancing. • Freenet • -An open-source file sharing program • Pointera • -The first legal “Napster type” file sharing software
Instant Messaging - Communicating with another person on a network in real time using text. • Examples • AIM • -Combined with AOL’s buddy list there are over 65 million users • ICQ • -The first instant messaging program, developed in 1996 • Windows Messenger • Yahoo! Messenger • Jabber • -An open-source instant messaging provider • Downside • Most IM providers are not compatible. • Because of this some providers have joined to form IMunified, and organization trying to develop open standards for instant messaging. • Windows Messenger and Yahoo! Messenger are members of IMunified.
Distributed Search Engines - Rather than searching content on public web sites, distributed search engines search individual computers. - One computer queries an x amount of other computers, which then query the same amount of computers. This continues until the query is canceled. • Examples • JXTA Search • Pandango • Copernic
Group Collaboration - Allows multiple users to take part in group projects in real time. - Uses IM, telephony, video, and file sharing. • Examples • Groove Networks • -Current leading provider • NetMeeting • -Microsoft’s version • IntraLinks
Distributed Computing • Sharing your computer • Software installed on the computer processes activities when the computer is idle. Then it uploads the results to the distributed computing network • Allows for processing power similar to large mainframes and supercomputers. • Example Projects • SETI@home • - Over 3 million participants, analyzes radio waves looking for intelligent life in outer space. • United Devices • - Includes projects for genetic and cancer research.
Security • Blocking access on your computer to a single folder • Access Control – restricting access to certain files and folders (Windows XP sharing and security option) • Viruses - Worries are more with the speed a virus can spread than the ease of it, it’s just as easy to get a virus through email. • Providing similar file names to trick downloader’s, if someone is looking for YMCA.mp3 the virus may be named YMCA.exe • Wrapping – Disguising a file type as a different type, such as disguising an .exe file and an .mp3 file. • File sharing can be used to stop viruses by spreading virus updates (MyCIO.com)