Post on 19-Jan-2015
description
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
www.cyberoam.com
Our Products
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Network Security Appliances - UTM, NGFW (Hardware & Virtual)
Modem Router Integrated Security appliance
Presenter: Ravindra KrishnaManager - Pre Sales
DNA of Peer-to-Peer Communication
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Agenda of presentation
Client – Server architecture P2P-Overview, advantages & Utilization P2P architecture and types Protocols used in P2P Advantages and disadvantages of P2P Next Thursday
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Client-Server ArchitectureClient-Server Architecture
Resources
Number of nodes
Server Cluster
More Reliable
Client Server
Centralized Authority
Scalability
Setup and Maintenance
Cost
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
P2P - IntroductionP2P - Introduction
Decentralized Distributed architecture
NodesSupplier/Receiver Receiver/Supplier
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
P2P communicationP2P communication
Autonomity Dynamic Discovery of Information Least Maintenance Scalability Load Distribution Every one can share and receive data
at same time Unreliable Resistant to DOS attack But More security Concerns
Utilization of Edge resources- CPU cycles - Bandwidth- Storage Space - Data - People- Camera, Microphone, Sensor, Service
Resources
Number of nodes
MobilePager
Server
Laptop
Desktop
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Utilization of P2P communicationUtilization of P2P communication
Bioinformatics
Education and academic
Military
Business
Television
Telecommunication
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Importance of P2P todayImportance of P2P today
Project
The new Web Real-Time Communications Working Group responsible for developing standards like HTML and HTTP that drive the Web—has set up a new working group that, among other things, currently developing capabilities / APIs / standards for peer-to-peer (P2P) communications between browsers.
The technology would enable P2P applications to run inside a Web browser without plug-ins or additional downloads.
from
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Importance of P2P todayImportance of P2P today
New America Foundation—recently received a US $2 million grant from the Department of State to help coordinate its MANET development effort, called Commotion Wireless.
Aimed at enabling P2P-based Mobile Social Media Delivery Methodology. Commotion aims to build a new type of tool for democratic organizing: an open source “device-as-infrastructure” distributed communications platform that integrates users’ existing cell phones, WiFi-enabled computers, and other WiFi-capable personal devices to create a metro-scale peer-to-peer (mesh) communications network.
Mobile Ad-Hoc Network | MANET initiative
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Classification of P2P communicationClassification of P2P communication
Centralized - NAPSTER
Decentralized - Gnutella
Structured Overlay
Unstructured Overlay
Hybrid
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Centralized - NapsterCentralized - Napster
Title User Speed
song1 User1 DSL
song2 user1 T1
song3 user2 28.8
song4 user3 28.8
song 5 user4 DSL
song 6 User5 T1
song6 User6 28.8
Server ( broker ) runs on port 8888 or 7777.
User1song1.mp3song2.mp3song3.mp3
User5song4.mp3song5.mp3song6.mp3
User6song5.mp3Song6.mp3song7.mp3
Query for song 5
List of users with speed
Direct P2P Connection
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Decentralized - Gnutella Decentralized - Gnutella
Search
Results
SearchResults
Search
Results
Search
Results
Connection Handler Coordination Instance
Download Instance
Upload Instance
Gnutella PeerSix states: offline, waiting for ack, ping, online, search, and connection request
Initially the Coordination ping, search, pong, client push request search result
1 Search message =
21845 Similar messages
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Centralized Vs DecentralizedCentralized Vs Decentralized
Flooding Bottleneck: Communication Overhead False negatives
Central Server
Bottleneck: Memory, CPU, Network Availability
?Scalable solution
between both extremes?
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Network Communications Layer
Overlay Nodes Management Layer
Features Management layer
Application-level Layer
Services-specific Layer
Structured and Unstructured OverlayStructured and Unstructured Overlay
Robust
Wide-area routing architecture
efficient search of data items
Selection of nearby peers
redundant storage
Permanence
hierarchical
trust and authentication
Anonymity
Massive scalability
fault tolerance.
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Points to discuss:Points to discuss:
Geography Distance Number of peers in the routing table
Number of peers in the routing table Efficiency in search
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Bit-TorrentBit-Torrent
Tracker
.Tor File details and the source – file name is x1(file name, size, format and other details)
X1 {1,2,3,4,5,6,7,8,9,10}
{8,9,10}
{1,2,3,4}
X1
X1
{8,9,10} {1,2,3,4}
SEEDER
LEECHER
X1
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Protocols Used in P2PProtocols Used in P2P
Most used protocols
Bit Torrentbit torrent plain
encryption
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Advantages of P2P applicationsAdvantages of P2P applications
Scalability, Efficiency and Performance quality over emerging high-speed networks makes P2P a highly sought after technology for content sharing & distribution.
Emerging P2P networks are decentralized, self-organized, and dynamic; an alternative to the traditional client-server model of computing
Has important role in High Performance Computing - Grid Computing; Sharing of resources like computation power, network bandwidth, and disk space will benefit from P2P
Next generation tech projects such as Google Wallet are applying P2P networking concepts for customer acquisitions & retention and revenue generation;
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Security issues with P2PSecurity issues with P2P
Poisoning Polluting
Defection Insertion of viruses
Malware Denial of Service
Filtering Identity attacks
Spam
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. www.cyberoam.com
Thank you