Table of contents | |
Introduction | |
How Does P2P (Peer-to-Peer) Work? | |
P2P Architecture | |
P2P File Sharing Security Concerns |
In computer networking, P2P (Peer-to-Peer) is a file-sharing technology that allows users to access multimedia files like videos, music, e-books, games, and more. Users in this network are called peers, who request files from each other by establishing TCP or UDP connections.
A P2P network enables communication between computer hardware and software without the need for a server. Unlike client-server architecture, a P2P network lacks a central server for processing requests. Instead, peers directly interact without a central server.
When a peer requests a file, multiple peers may have copies of that file. The underlying architecture of the P2P system determines how to obtain the IP addresses of these peers. Using specific methods, the requesting peer identifies peers that have the requested file, and the file transfer occurs directly between them.
A centralized directory is similar to client-server architecture, where a central server provides directory services. Peers inform this server of their IP addresses and the files they share. The server periodically queries peers to check their connectivity and maintain a database of file locations. Napster, which distributed MP3 files, used this method.
Working:
Centralized Directory
Disadvantages:
Unlike the centralized approach, this method utilizes distributed systems. Peers connect to an overlay network, meaning any existing connection/path between peers forms part of this network. In this context, peers are referred to as nodes, and the connections between them are called edges, creating a graph-like structure. Gnutella was the first decentralized peer-to-peer network to implement this method.
Working:
Gnutella:
Query Flooding
This architecture combines centralized and distributed systems. It features supernodes (high-priority peers with higher bandwidth and connectivity) and regular peers assigned to these supernodes. Supernodes interconnect, and peers inform their respective leaders about their connectivity, IP address, and shared files. KaZaA used this hybrid approach.
Working:
Exploiting heterogeneity
To secure sensitive information on the network, consider the following steps:
21 videos|113 docs|66 tests
|
1. What is P2P file sharing? |
2. How does P2P technology work? |
3. What are the security concerns associated with P2P file sharing? |
4. Are there any legal implications of using P2P file sharing? |
5. What are some popular P2P file sharing platforms? |
|
Explore Courses for Computer Science Engineering (CSE) exam
|