Sunteți pe pagina 1din 51

m  m 


   
m
  
Computer Network means that
there are interconnected collection of two
or more autonomous Computers.
The connection need not be via a
copper wire, fiber optics,microwaves ,and
communication satellites can also be used.
Two computers are said to be
interconnected if they are able to exchange
information.

  
— esource Sharing
— igh eliability
— Saving Money
— Scalability
— Communication Medium
— emote Access
— nteractive Entertainment
m   
— Star
— ing
— Tree
— Complete
— ntersecting ing
— rregular
Client Server
vs
Peer to Peer
 m  

A typical example for a Client ±Server
file transfer is an FTP server where the client
and server programs are quite distinct, and
the clients initiate the download / uploads and
the servers react to and satisfy these
requests.
ë ë  
A    (or "ë ë") computer
Network exploits diverse connectivity
between participants in a network and the
cumulative bandwidth of network
participants rather than conventional
centralized resources where a relatively
low number of server provide the core
value to a service or application.
A pure peer-to-peer network does
not have the notion of clients or servers,
but only equal   nodes that
simultaneously function as both "clients"
and "servers" to the other nodes on the
network.
This model of network arrangement
differs from the client-server model where
communication is usually to and from a
central server.
Peer to Peer Connection
Classification of P2P Network
— Pure peer-to-peer
— Centralized P2P network
— ecentralized P2P network
— Structured P2P network
— nstructured P2P network
— ybrid P2P network (Centralized and
ecentralized)
4 ë   

— Peers act as equals, merging the roles of


clients and server
— There is no central server managing the
network
— There is no central router
— ybrid peer-to-peer

— as a central server that keeps information on peers and


responds to requests for that information.

— Peers are responsible for hosting available resources (as


the central server does not have them), for letting the
central server know what resources they want to share,
and for making its shareable resources available to
peers that request it.

— oute terminals are used addresses, which are


referenced by a set of indices to obtain an absolute
address.
A Peer-to-peer capable network
operating system, such as Windows 95, Windows 98
and Windows for Workgroups are usually the best
choices for home and small office networks.

They do an excellent job of sharing


applications, data, printers, and other local resources
across a handful of computers.

ndividual resources such as disk


drives, C- M drives, scanners and even printers
are transformed into shared resources that are
accessible from each of the computers.
Peer-to-peer networks come in
three flavors

è   




  

 
 
 
  

j  



   

 
ë   

 
 
   
  
   

   !    
    "



  

ne very common form of P2P
networking is nstant Messaging (M)
where software applications, allow users
to chat via text messages in real-time.

MSN Messenger or Yahoo nstant


Messenger

 
 
Affinity communities is the group
of P2P networks that is based around file-
sharing and became widely known and
talked about due to the public legal issues
surrounding the direct file sharing group,
Napster.
Affinity Communities are based on
users collaborating and searching other
user's computers for information and files.
D    ë ë
Peer-to-peer networks work remarkably well in certain
circumstances; however there are a few things to consider before setting
one up.

— m!
Peer-to-peer networks are designed for connecting small
numbers of computers. They tend to run into problems at around 5-10
computers or more.

— m 
Security on a peer-to-peer network is not very powerful. So if
you have security concerns go for something you can control (read server!)
Since on a peer to peer network the users give access to folders, they can
choose not to require passwords. This lack of consistency has a tremendous
impact on the security of your network and you will need adequate training
for your users to prevent problems.

— #
f your organization is growing rapidly, it will usually out grow a
peer-to-peer network very quickly. While a peer-to-peer network may work
fine for up to around ten computers, it almost certainly won't for twenty.
— 
n a peer-to-peer network, the users handle
administration. This means that all the users need to be
trained in how to share files, folders, and printers. n a
peer-to-peer network, suddenly shutting down your
computer can cause one of your colleagues to be unable
to print or worse still corrupt your shared database if you
have one«
— $ %  
The last concern is that each computer that
attaches to another computer, whether for printing or for
file sharing, takes up system resources on the hosting
computer. f the drain becomes dramatic enough to slow
down the host computer (which someone else is working
on) then perhaps it is time to start thinking about a
dedicated server.
 &

Three Ways

'( ')D 


( *
+(* ')D ,*

')D  

When 10BaseT cabling is used, a strand of


cabling is inserted between each computer and a hub. f
you have 5 computers, you'll need 5 cables. No cable can
exceed 325 feet in length. Because the cables from all of
the computers converge at a common point (normally a
hub), a 10BaseT network forms a M 
 , or
geometric design, when viewed from above.
10BaseT Category What t's sed For
--------------------------------------------------------------------------------------------
5 Fast Ethernet (and everything below)
4 Networks other than Ethernet
3 10Mbps 10BaseT
2 Alarms, telephone voice lines
1 nknown (not rated for anything specific)
 *

The geometric design that is formed when thin


coax cabling is used is called a V  or  
configuration. The reason for this is that thin coax is
always arranged in a straight line of PCs, hubs and/or
other devices.
Thin coax networks always requires
 , which is the act of "plugging" the ends of the
network. nstead of inserting an incoming thin coax cable
directly into a computer, a T-connector is inserted
instead, splitting the network adapter's input port into two
separate ports.
ne port receives an incoming network cable;
the other receives an outgoing network cable. f the PC
is at the end of the network chain, a terminator plug is
connected to the empty side of the T-connector.
* ')D ,*

Thin coax backbones and 10BaseT cabling & hubs can be


connected together to allow for a wide variety of expansion
options. n the example below, a thin coax backbone connects
two 10BaseT hubs together, along with a computer in-between.
Each hub, in turn, branches off to still more computers with
10BaseT cabling. Note that the ends of the thin coax backbone
are terminated.
—   * 
------------------------------------------------
i. have fewer than 10 PCs,
ii. don't have any portable computers,
iii. and don't plan to expand

—  ')D    


------------------------------------------------
i. have 16 or fewer PCs within a 325 foot radius of each
other,
ii. have portable computers,
iii. and/or you plan to expand

—    *
')D   
------------------------------------------------
i. you have more than 16 computers,
ii. or the radius of your workgroup is more than 300 feet
nce the networking hardware has been
installed, a peer-to-peer network software package must
be installed on each of the computers. This software
package allows information to be transferred back and
forth between the computers, hard disks, and other
devices connected to the computers or to the network
when users request it .
ë ëj  
Windows Peer-to-Peer Networking architecture consists of the
following components:

1) Graphing
The Graphing component is responsible for maintaining a set
of connected nodes known as a graph and providing flooding and
replication of data across the graph.

The Graphing component uses the Flood & Synchronization,


Store, and Graph Maintenance subcomponents.

2) Grouping
The Grouping component is the security layer provided
by default on top of a graph. The security layer defines the
security model behind group creation, invitation, and
connection to the group. The Grouping component
uses the Group Security and Group Security Service Provider
(SSP) sub components.
3) NSP
The Name Service Provider (NSP) component provides a
mechanism to access an arbitrary name service provider. n the case
of Windows Peer-to-Peer Networking, peer-to peer applications use
the NSP interface to access PN P.

4) PN P (ë  % ë(

The PN P component provides peer-to-peer name resolution.


dentity manager enables the creation and management of peer-to
peer identities.

5) Microsoft TCP/P version 6 protocol


The Microsoft TCP/P version 6 protocol (Pv6) provides the
transport over which Windows Peer-to-Peer Networking operates.
Most network operating system software (such as
Windows 95 98,XP,and VSTA) allows each peer-to-peer computer
to determine which resources will be available for use by all other
users of the remaining computers on the network. Specific hard and
floppy disk drives, directories, files, printers, and all other resources
can be attached or detached from the network via software.

When one computers disk has been configured so that it


is being shared, it will usually appear as a new or additional drive to
the other computer users.

j *
 j j

   
 D
     
   
 j    D 
 

  j
-
 . j -
  D 
 (-  
    j j,
 
 D   
/01-21m/
/0-2m/
     j    
  

   j-
&
 . j - D 01-21m
& 
D 0-2m(
Because drives can be easily
shared between peer-to-peer computers,
data only needs to be stored on one
computer, not two or three.

As an example, let's say that


three computers have Microsoft Word
installed. nstead of saving documents and
other data on all three machines, you can
save all of the documents on one computer.
1
ë ë  
Windows Peer-to-Peer Networking is a developer
platform to create peer-to-peer applications for computers
running Windows XP with Service Pack 2, Windows XP
Professional x64 Edition, Windows XP with Service Pack 1
and the Advanced Networking Pack for Windows XP, or
Windows VistaŒ. The long-term goal of Windows Peer-to-
Peer Networking is the following
To enable people to communicate securely and
share information with one another without a dependence
on centralized servers, but to work even better when servers
are present. Computers running Windows Vista already
have Windows Peer-to-Peer Networking installed. For
computers running Windows XP with SP2, do the following
to install Windows Peer-to-Peer Networking
1. Click Start, click Control Panel, and then click
Add or emove Programs.

2. Click Add/ emove Windows Components.

3. n Components, click Networking Services (but


do not select its check box), and then click etails.

4. Select the Peer-to-Peer check box, and then click


.

5. Click Next, and then follow the instructions in


the wizard.
#


Grid computing is also called "peer-


to-peer computing" and "distributed computing,"
A parallel processing architecture in which CP
resources are shared across a network, and all
machines function as one large supercomputer.

t allows unused CP capacity in all


participating machines to be allocated to one
application that is extremely computation
intensive and programmed for parallel
processing.
! 
 
n a large enterprise, hundreds or thousands
of desktop machines sit idle at any given moment. Even
when a user is at the computer reading the screen and
not typing or clicking, it constitutes idle time.
These unused cycles can be put to use on large
computational problems. Likewise, the millions of users
on the nternet create a massive amount of wasted
machine cycles that can be harnessed instead.
This is precisely what the Search for Extra
Terrestrial ntelligence program does with nternet users
all over the world.
Naturally, grid computing over the nternet
requires more extensive security than within a single
enterprise,
jë ë
— An ë ë computer network is a particular type of peer-
to-peer network in which the users and their nodes are
pseudonymous by default. The primary difference between regular
and anonymous networks is in the routing method of their respective
network architectures. These networks allow for unfettered free flow
of information, legal or otherwise.

— The P2P community's interest in anonymous P2P has increased


rapidly in recent years for many reasons, including distrust of
government and digital imprimatur. Such a network may also appeal
to those wishing to share copyrighted files illegally - organizations
such as the ecording ndustry Association of America and the
British Phonographic ndustry have successfully tracked and sued
users on non-anonymous P2P networks.
m   
All security mechanisms deployed today are based on either
symmetric/secret key or asymmetric/public key cryptography, or
sometimes a combination of the two. ere we will introduce the basic
aspects of the secret key and public key techniques and compare their
main characteristics.

'(m  3   " 

Secret key techniques are based on the fact that the sender
and recipient share a secret, which is used for various cryptographic
operations, such as encryption and decryption of messages and the
creation and verification of message authentication data. This secret
key must be exchanged in a separate out of bound procedure prior to
the intended communication.
(ë3   " 
Public ey Techniques are based on
the use of asymmetric key pairs. sually each
user is in possession of just one key pair. ne of
the pair is made publicly available, while the other
is kept private.
Because one is available there is no
need for an out of band key exchange, however
there is a need for an infrastructure to distribute
the public key authentically. Because there is no
need for pre-shared secrets prior to a
communication, public key techniques are ideal for
supporting security between previously unknown
parties.
ë ë%
nce a servent is connected to the network it can send
information into the network to find out about other servents in the
system. The other servents can respond to this request by sending
information about their own state, including their P addresses, the
number of files it has decided to share on the network and the total
size of these files.
A servent can then query the network for files meeting
certain search criteria. f a servent has files meeting the criteria, it will
respond with a list of appropriate file details. The servent that made
the initial request can then ask an appropriate servent for a particular
file and have that file routed to it.

- $ 


D 
0 - 15 16 17 18 19 - 22
ë

escriptor Payload
  Time To Live ops Payload Length
 escriptor
escriptor 
This is used to uniquely identify
the particular message on the network. t is
created by the client and must be unique (in
theory) to ensure that certain other servants
can detect when they are seeing a message
from a particular servant that they have
processed before.
Payload escriptor
This defines the type of descriptor
which is following the header.
Time To Live (TTL):
This field outlines the maximum amount of servants
that the message can be routed through before it must be discarded.
Each time the message passes through a servant this field is
decremented.
When the value reaches 0 the message is discarded.
This ensures that a particular message will not be routed continually
around the network. This would cause an immediate degradation of
network performance if all servants were sending out many packets in
succession which were never being removed from the network.

ops:
This is a count of the number of servents through
which the message has been passed. The count is incremented each
time it passes through a new servent.
Payload Length:
The length of the payload immediately following this header.
This header is important because the protocol does not define any
flags to define where one payload ends and the next descriptor
begins.
This means that if the fields in the descriptor header are
invalid then that message cannot be routed. As a result it is impossible
to find the beginning of the next descriptor and the connection must be
terminated
Peer to Peer File sharing Program

´ azaa
´ Napster
´ BitTorrent
´ WinMX
´ Shareaza
´ Ares
´ Bear Share
3!

The azaa software family has


been the single-most popular P2P file
sharing program / system of all time.
azaa is fast and easy to use. owever
azaa software and the FastTrack network
it utilizes appear to be declining rapidly in
popularity and availability of files.
azaa provides a central directory of
shared files, azaa distributes its directories to
"supernodes," which are the users' own
computers. Supernodes communicate with other
supernodes to complete a search.

sers with fast computers and


connections are automatically made supernodes
unless they disallow it. As a supernode, no more
than 10% of the CP power is used.
 3!         
   
 j    
  
  .-%(j  3!       
    
      
 
  is a file sharing service that paved the way
for decentralized P2P file-sharing programs which is now
used for many of the same reasons and can download
music, pictures, and other files.
D 
BitTorrent is another free P2P
software application. t has attracted a loyal
following among those interested in sharing movies
and television programs.
The offical BitTorrent P2P client
generally does not support bandwidth throttling,
meaning that it will tend to monopolize a network
connection and not allow surfing the nternet or
otherwise utilizing the network while files are being
downloaded or uploaded. A freely-available
alternative BitTorrent client overcomes this
limitation.
m  m 


   
m

S-ar putea să vă placă și