You are on page 1of 12

PEER-TO-PEER NET

WORKING
INTRODUCTION
Peer-to-peer networks are appropriate only for very
small business or for house use.A peer-to-peer net
work can support about ten clients(workstations) b
efore it begins to suffer from some serious perform
ance and managemaent problems.Usually peer-to-
peer networks are composed of clients that run eit
her Windows NT workstations or Windows 98.
OVERVIEW
Peers act as both client and server
Centralized/decentralized models
Issues: volatility, scalability, legality
Network built and sustained by resources of each participant
WHAT IS P2P SYSTEM
Multiple sites (at edge)
Distributed resources
Sites are autonomous (different owners)
Sites are both clients and servers ("servent")
Sites have equal functionality
CLASSIFICATION TO P2P
Unstructured P2P systems
Napster (Centralized)
Gnutella (Distributed)
Kazaa/Fasttrack (Super-node)
Structured P2P systems (DHTs):
Chord
NAPSTER
Was used primarily for file sharing
Not a pure P2P network=> hybrid system
Ways of action:
Client sends server the query, server ask every
one and responds to client.
Client gets list of clients from server.

GNUTELLA
>Pure peer-to-peer.
>Very simple protocol.
>Hit rates are high.
>High fault tolerance.
>Adopts well and dynamically to changing peer p
opulations.
>High network traffic.
>No estimates on duration of queries.
>No probability for successful queries.
DHT DESIRABLE PROPERTIES
Keys mapped evenly to all nodes in the network
Each node maintains information about only a few
other nodes
Messages can be routed to a node efficiently
PEER-TO-PEER NETWORK PROP
ERTIES
>Proportion of total internet traffic;growth patterns.
>Protocol split;content trends.
>Location of entities;grouping/performance.
>Access of methods;search efficiency.
>Response latency;performance.
>Leeching;network health.
>Node availability;performance.


P2P BENEFITS
Efficient use of resources
Scalability:
Reliability:
Ease of administration:

DISADVANTAGES
> In this network, the whole system is decentralized t
hus it is difficult to administer. That is one person c
annot determine the whole accessibility setting of
whole network.
>Security in this system is very less viruses, spywar
es,trojans, etc malwares can easily transmitted ove
r this P-2-P architecture.
> Data recovery or backup is very difficult. Each com
puter should have its own back-up system

,
THANK YOU

You might also like