P2P network

What is P2P?

Two types of P2P

Example of hybrid P2P

Example of pure P2P

                          Group C

                           Takaaki hukasawa
                           Saori Endo
                           Kazuhiro Matsumoto
                           Eichrou Miyamoto
What is P2P?

P2P is communication method which render to communicate computer
and computer equally. Specifically it connects between terminals
directly mutually and sent an d received data. In addition, P2P in LAN
is basically located as a functionality expansion of OS.

The advantage of P2P is that the network design is easy and the
introduction cost is cheap. On the other hand, fault of P2P is that
security and the network offer can not be raised. It is said that the
delivery of the file of a large capacity is a substantial cost, and the P2P
delivery is attractive as the means to r
educe the cost simply.

          Server based network                          P2P network
Two types of P2P



         Client computer needs IP address to connect to another computer.

P2P with server                              P2P without server

  First, a client PC access to the central         All information and data are
  server which has a list that has IP              transported directly between client
  address of client computeres.                    computers.
  Next the client asks a IP address of             They do not need to access to the
  another client that has a data that its          server for IP address, because it is on
  looking for.                                     the P2P network.
  Then it can connect to another
  computere with that IP address.

  This is called hybrid P2P.                       This is called pure P2P.
Example of hybrid P2P



There is Skype as an example of server type P2P.
Skype is abbreviation of "Sky peer-to-peer".
Skype is Internet phone using the P2P technology service, and it
communicates by the following flows.

1. It is registered in the Skype server when Skype is downloaded, and
a digital certificate is issued.

2.When you will log node in next time,it is connected with a super-node
that is the server of the list of the node logged in.

3. Internet Protocol address of the node is acquired from a super-node,
and the node makes the communication possible directly.

4. The packet is transmitted whenever it communicates from the inside
of the firewall. Moreover, it relays it with the machine of the third party
who has the global address when both are in the firewall.
The communication without a complex setting is enabled by this.
Example of pure P2P



Pure P2P is hardly break, because it do not depend
on one particular path, but can use any path to reach
to the computer which it want to connect.
Therefore, in Japan, it is used for P2P Earthquake
information.




                                    P2P earthquake information.
                                    All node get earthquake information from a server
                                    of Japan Meteorological Agency and share it on
                                    the network. Also they can send earthquake
                                    information
                                    The information can go through any path, so all
                                    nodes can get information surely.
                                    For example, if one path was disconnected by an
                                    accident, data can go through other paths and
                                    nodes.
References

Wikipedia
●



    http://ja.wikipedia.org/wiki/


e-Words
●



    http://e-words.jp/

More Related Content

ODP
p2p
PPT
Week10
PDF
How Does The Internet Work? : Notes
DOC
Controlling ip spoofing through inter domain packet filters(synopsis)
PDF
How to know my ip address with iplogger.org
PDF
BasepaperControlling IP Spoofing through Interdomain Packet Filters
PDF
Measurement and diagnosis of address
PDF
Interledger @ Boston Layer 2 Summit
p2p
Week10
How Does The Internet Work? : Notes
Controlling ip spoofing through inter domain packet filters(synopsis)
How to know my ip address with iplogger.org
BasepaperControlling IP Spoofing through Interdomain Packet Filters
Measurement and diagnosis of address
Interledger @ Boston Layer 2 Summit

What's hot (13)

PDF
AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOS
PDF
34C3 Interledger Presentation - Background, Streaming Payments, and Implications
PDF
Best lookup algorithm for 100+gbps ipv6 packet
PPTX
Denial of-service (do s) attack
PDF
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
PPTX
Networking infrastructure
DOCX
Tcp protocols
DOCX
Example
PPTX
Ip packet delivery
PPT
1 Network Intro
PDF
Traffic types in internet
PPTX
Tor Tracer
AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOS
34C3 Interledger Presentation - Background, Streaming Payments, and Implications
Best lookup algorithm for 100+gbps ipv6 packet
Denial of-service (do s) attack
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMS
Networking infrastructure
Tcp protocols
Example
Ip packet delivery
1 Network Intro
Traffic types in internet
Tor Tracer
Ad

Viewers also liked (6)

PPTX
The Future Of Technology In Education by Tara Humber
 
PPT
The Future of Telecommunications and Information Technology
PPTX
Technology and education
PDF
Learn BEM: CSS Naming Convention
PDF
SEO: Getting Personal
The Future Of Technology In Education by Tara Humber
 
The Future of Telecommunications and Information Technology
Technology and education
Learn BEM: CSS Naming Convention
SEO: Getting Personal
Ad

Similar to Wk10 (20)

PPTX
Peer To Peer.pptx
PPTX
Peer to Peer Network with its Architecture, Types, and Examples!!
PDF
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
PDF
Peer to peer (p2p)
PPT
Peer to Peer services and File systems
PDF
On the Impact of Mobile Hosts in Peer-to-Peer Data Networks
PDF
Peer to peer connection
PDF
Analysis of threats and security issues evaluation in mobile P2P networks
PPTX
Peer-to-Peer-P2P-Networks-A-Simple-Guide.pptx
DOC
Peer peer messaging system (synopsis)
PPT
P2p Peer To Peer Introduction
PDF
story 1what is fiber opticFiber optic refers to the medium and.pdf
PPTX
P2p networks
PDF
Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...
PDF
The International Journal of Engineering and Science (IJES)
DOC
PDF
Bluetooth UDP Performance over Bluetooth
PPT
P2P Seminar
Peer To Peer.pptx
Peer to Peer Network with its Architecture, Types, and Examples!!
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
Peer to peer (p2p)
Peer to Peer services and File systems
On the Impact of Mobile Hosts in Peer-to-Peer Data Networks
Peer to peer connection
Analysis of threats and security issues evaluation in mobile P2P networks
Peer-to-Peer-P2P-Networks-A-Simple-Guide.pptx
Peer peer messaging system (synopsis)
P2p Peer To Peer Introduction
story 1what is fiber opticFiber optic refers to the medium and.pdf
P2p networks
Mobile Hosts Participating in Peer-to-Peer Data Networks: Challenges and Solu...
The International Journal of Engineering and Science (IJES)
Bluetooth UDP Performance over Bluetooth
P2P Seminar

More from kazuhiroMatsumoto (20)

PDF
Thesis writingpres
PDF
Review05.prn
PDF
Review04.prn
PDF
Review02.prn
PDF
Presen04.prn
PDF
Indivi05.prn
PDF
Indivi04.prn
PDF
Indivi03.prn
PDF
Indivi02.prn
PDF
Indivi01.prn
PDF
Comp d04.prn
PDF
Comp d03.prn
PDF
Comp d01.prn
PDF
PDF
PDF
PDF
PDF
Thesis writingpres
Review05.prn
Review04.prn
Review02.prn
Presen04.prn
Indivi05.prn
Indivi04.prn
Indivi03.prn
Indivi02.prn
Indivi01.prn
Comp d04.prn
Comp d03.prn
Comp d01.prn

Recently uploaded (20)

PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
Architecture types and enterprise applications.pdf
PPTX
2018-HIPAA-Renewal-Training for executives
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
Chapter 5: Probability Theory and Statistics
PDF
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPT
Geologic Time for studying geology for geologist
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PPTX
Configure Apache Mutual Authentication
PDF
Flame analysis and combustion estimation using large language and vision assi...
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PPTX
Modernising the Digital Integration Hub
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
TEXTILE technology diploma scope and career opportunities
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Custom Battery Pack Design Considerations for Performance and Safety
Architecture types and enterprise applications.pdf
2018-HIPAA-Renewal-Training for executives
Developing a website for English-speaking practice to English as a foreign la...
Chapter 5: Probability Theory and Statistics
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
sustainability-14-14877-v2.pddhzftheheeeee
Geologic Time for studying geology for geologist
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Configure Apache Mutual Authentication
Flame analysis and combustion estimation using large language and vision assi...
Benefits of Physical activity for teenagers.pptx
Enhancing plagiarism detection using data pre-processing and machine learning...
Module 1.ppt Iot fundamentals and Architecture
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
Modernising the Digital Integration Hub
Final SEM Unit 1 for mit wpu at pune .pptx
TEXTILE technology diploma scope and career opportunities

Wk10

  • 1. P2P network What is P2P? Two types of P2P Example of hybrid P2P Example of pure P2P Group C Takaaki hukasawa Saori Endo Kazuhiro Matsumoto Eichrou Miyamoto
  • 2. What is P2P? P2P is communication method which render to communicate computer and computer equally. Specifically it connects between terminals directly mutually and sent an d received data. In addition, P2P in LAN is basically located as a functionality expansion of OS. The advantage of P2P is that the network design is easy and the introduction cost is cheap. On the other hand, fault of P2P is that security and the network offer can not be raised. It is said that the delivery of the file of a large capacity is a substantial cost, and the P2P delivery is attractive as the means to r educe the cost simply. Server based network P2P network
  • 3. Two types of P2P Client computer needs IP address to connect to another computer. P2P with server P2P without server First, a client PC access to the central All information and data are server which has a list that has IP transported directly between client address of client computeres. computers. Next the client asks a IP address of They do not need to access to the another client that has a data that its server for IP address, because it is on looking for. the P2P network. Then it can connect to another computere with that IP address. This is called hybrid P2P. This is called pure P2P.
  • 4. Example of hybrid P2P There is Skype as an example of server type P2P. Skype is abbreviation of "Sky peer-to-peer". Skype is Internet phone using the P2P technology service, and it communicates by the following flows. 1. It is registered in the Skype server when Skype is downloaded, and a digital certificate is issued. 2.When you will log node in next time,it is connected with a super-node that is the server of the list of the node logged in. 3. Internet Protocol address of the node is acquired from a super-node, and the node makes the communication possible directly. 4. The packet is transmitted whenever it communicates from the inside of the firewall. Moreover, it relays it with the machine of the third party who has the global address when both are in the firewall. The communication without a complex setting is enabled by this.
  • 5. Example of pure P2P Pure P2P is hardly break, because it do not depend on one particular path, but can use any path to reach to the computer which it want to connect. Therefore, in Japan, it is used for P2P Earthquake information. P2P earthquake information. All node get earthquake information from a server of Japan Meteorological Agency and share it on the network. Also they can send earthquake information The information can go through any path, so all nodes can get information surely. For example, if one path was disconnected by an accident, data can go through other paths and nodes.
  • 6. References Wikipedia ● http://ja.wikipedia.org/wiki/ e-Words ● http://e-words.jp/