Download Peer-to-Peer Networks

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

AppleTalk wikipedia , lookup

Net bias wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Wireless security wikipedia , lookup

Computer security wikipedia , lookup

Distributed firewall wikipedia , lookup

Computer network wikipedia , lookup

Network tap wikipedia , lookup

Peering wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Airborne Networking wikipedia , lookup

Peer-to-peer wikipedia , lookup

Transcript
Executive Briefing
Topic #2 – Information Communications
Peer-to-Peer Networks
Michael Fine
ISYM-540 –Summer Session 2
Current Topics in ISYM
July 9th, 2009
1
When dealing with peer-to-peer networks, the typical mind set is to
believe that this type of network infrastructure was to enable users the capability of file
sharing which emerged in the 1990’s with applications such as Napster. The peer-to-peer
network design is more than just file sharing. Peer to peer is the methodology of
computer networking where all computers share a corresponding responsibility for
processing data. Also, peer-to-peer networking differs from client and server networking,
where certain devices have responsibility for providing a distribution function. Peer-topeer networks are typically used with small businesses and home users, despite the many
different types of networks, it is important that you implement the right one so you don’t
waste your time and money on a system that is beyond the small network threshold.
In a peer-to-peer network there are no dedicated servers or hierarchy
among the system of computers. To keep the small business or home network design
simple, you can use peer-to-peer networks to share files, printers and an Internet
connection. Now to take peer-to-peer networking further, email needs to implemented to
fulfill small business needs with electronic communications. As long as a small business
shares an Internet connection by using peer-to-peer networking, the email service can
simply be hosted by an outside web hosting company. Being these peer networks are in
the home or small business environment, traditional networks are typically used in a
medium/ enterprise business that uses computers, client software, servers, and other
devices for data communications.
When peer-to-peer networks first transpired from the impulse of Napster,
it started as an Internet based peer network, which technically can be considered a hybrid
2
design because it uses computers from the surrounding local area network and also uses a
central server infrastructure for a search and storage function. That being said the peer
network does not rely entirely on the methodology of the hybrid design, only when
central servers are used. As mentioned earlier the peer-to-peer network can be used in a
home or small business setting, conversely, you will find that the characteristics of peerto-peer networking will be complimented and can be used in any small business or home
environment. So it is safe to state that peer networking is common in a small local
network, particularly home networks.
For home users the peer-to-peer network would be considered a hybrid
peer network and a client server environment. Here a router provides the Internet
connection sharing, however, the file, printer and other resource sharing is managed
directly among the local computers involved with the connection. Peer-to-peer networks
for small business can operate using the same protocols and software that a home user
would implement. In the small office environment, these peer-to-peer networks are
physically near each other across the company local area network. Having the use an
Internet atmosphere to compliment peer-to-peer networks, enables the network
environment to handle a very high volume of file sharing traffic by distributing the
sharing load across the small local area network of computers.
Sharing the data load across the small network of computers is a beneficial
feature of the peer-to-peer networks. This group of independent users of computers on
this peer network can handle their own security and administration by making decisions
to secure their system by deciding the incoming and outgoing shares being accessed. You
3
can configure computers by setting them in peer-to-peer workgroups and allow the
sharing of files, printers and other resources across the devices which would be in this
workgroup. The purpose of peer networks is for end-users to gain mobility and to
simplify data being shared in both directions, whether it is going to be for downloads to
your computer or uploads from your computer. On a positive breakdown of peer-to-peer
networks, they scale more flexible than a client server network in the case of hardware
failure or traffic bottlenecks.
Aside from the many benefits that the peer-to-peer networks offer, you
have to consider some things before decisions are made on the peer-to-peer path. Since
there isn't a server, all of the computers on the network are responsible to handle their
own security and administration on their own. In the computing realm we do not live in a
perfect world where everyone follows the same technology principles, so by using peerto-peer we leave ourselves open to malicious attack when make decisions on the files and
directories we decide to share over the network. Essentially awareness of malicious
attacks need to reviewed before implementing peer-to-peer. These attacks can damage
your computer, steal your identity, and even pirate software off your own computer.
Another risk that you will come across is that some peer networks can be utilized
geographically by using the Internet, when our location is dispersed worldwide you are
running into the risk of retrieving information from unknown international sources. These
international sources could unleash a malicious attack on your computer, so to avoid
disadvantage it would be fundamental for home users to connect on the peer networks
4
within their physical local network location and for the small business to connect to the
peer network of which they create as a company.
Beyond the characteristics, advantages and disadvantages within peer-topeer networks the end-user needs to have awareness of the necessity, features and best
practices when it comes to security computer networking. There are similarities between
the types of network infrastructure than differences. Those similarities is hardware like
all of the computers must have network cards, whether it would be for wireless or wired
connections to link with network devices and file shares. You also use the same cables,
the same hubs and switches, and the same protocols as you would with a client-server
model. The only difference is that there isn't a server and you using a public environment.
In my personal opinion I do not recommend peer-to-peer network because of the fact that
you allow the sharing of computer resources such as; bandwidth, processor speeds,
printers, files, and other devices. Having all this free networking mobility enables the
vulnerability of attack on your computer and shared resources. With that said it is
necessary to be aware of your computing necessity, the features of the hardware that you
are using so you know your computing capability, and the best practices to administer
when securing your Peer-to-peer network. In the event you absolutely have to use the
non-solution.
5
Sources
“Understanding Peer-to-Peer Networking” isafe.org 07 June 2005. 07 July 2009
<http://www.isafe.org/imgs/pdf/education/P2PNetworking.pdf>
“Introduction to Peer to Peer (P2P) Networks and Software Systems”
compnetworking.about.com 2009. 07 July 2009
<http://compnetworking.about.com/od/p2ppeertopeer/a/p2pintroduction.htm>
“Sufficiently Secure Peer-To-Peer Networks” pubs.doc.ic.ac.uk 13-14 May 2004.
07 July 2009
<http://pubs.doc.ic.ac.uk/sufficiently-secure-p2p/sufficiently-secure-p2p.pdf>
6