* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Peer-to-Peer Networks
Survey
Document related concepts
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Wireless security wikipedia , lookup
Computer security wikipedia , lookup
Distributed firewall wikipedia , lookup
Computer network wikipedia , lookup
Network tap wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Transcript
Executive Briefing Topic #2 – Information Communications Peer-to-Peer Networks Michael Fine ISYM-540 –Summer Session 2 Current Topics in ISYM July 9th, 2009 1 When dealing with peer-to-peer networks, the typical mind set is to believe that this type of network infrastructure was to enable users the capability of file sharing which emerged in the 1990’s with applications such as Napster. The peer-to-peer network design is more than just file sharing. Peer to peer is the methodology of computer networking where all computers share a corresponding responsibility for processing data. Also, peer-to-peer networking differs from client and server networking, where certain devices have responsibility for providing a distribution function. Peer-topeer networks are typically used with small businesses and home users, despite the many different types of networks, it is important that you implement the right one so you don’t waste your time and money on a system that is beyond the small network threshold. In a peer-to-peer network there are no dedicated servers or hierarchy among the system of computers. To keep the small business or home network design simple, you can use peer-to-peer networks to share files, printers and an Internet connection. Now to take peer-to-peer networking further, email needs to implemented to fulfill small business needs with electronic communications. As long as a small business shares an Internet connection by using peer-to-peer networking, the email service can simply be hosted by an outside web hosting company. Being these peer networks are in the home or small business environment, traditional networks are typically used in a medium/ enterprise business that uses computers, client software, servers, and other devices for data communications. When peer-to-peer networks first transpired from the impulse of Napster, it started as an Internet based peer network, which technically can be considered a hybrid 2 design because it uses computers from the surrounding local area network and also uses a central server infrastructure for a search and storage function. That being said the peer network does not rely entirely on the methodology of the hybrid design, only when central servers are used. As mentioned earlier the peer-to-peer network can be used in a home or small business setting, conversely, you will find that the characteristics of peerto-peer networking will be complimented and can be used in any small business or home environment. So it is safe to state that peer networking is common in a small local network, particularly home networks. For home users the peer-to-peer network would be considered a hybrid peer network and a client server environment. Here a router provides the Internet connection sharing, however, the file, printer and other resource sharing is managed directly among the local computers involved with the connection. Peer-to-peer networks for small business can operate using the same protocols and software that a home user would implement. In the small office environment, these peer-to-peer networks are physically near each other across the company local area network. Having the use an Internet atmosphere to compliment peer-to-peer networks, enables the network environment to handle a very high volume of file sharing traffic by distributing the sharing load across the small local area network of computers. Sharing the data load across the small network of computers is a beneficial feature of the peer-to-peer networks. This group of independent users of computers on this peer network can handle their own security and administration by making decisions to secure their system by deciding the incoming and outgoing shares being accessed. You 3 can configure computers by setting them in peer-to-peer workgroups and allow the sharing of files, printers and other resources across the devices which would be in this workgroup. The purpose of peer networks is for end-users to gain mobility and to simplify data being shared in both directions, whether it is going to be for downloads to your computer or uploads from your computer. On a positive breakdown of peer-to-peer networks, they scale more flexible than a client server network in the case of hardware failure or traffic bottlenecks. Aside from the many benefits that the peer-to-peer networks offer, you have to consider some things before decisions are made on the peer-to-peer path. Since there isn't a server, all of the computers on the network are responsible to handle their own security and administration on their own. In the computing realm we do not live in a perfect world where everyone follows the same technology principles, so by using peerto-peer we leave ourselves open to malicious attack when make decisions on the files and directories we decide to share over the network. Essentially awareness of malicious attacks need to reviewed before implementing peer-to-peer. These attacks can damage your computer, steal your identity, and even pirate software off your own computer. Another risk that you will come across is that some peer networks can be utilized geographically by using the Internet, when our location is dispersed worldwide you are running into the risk of retrieving information from unknown international sources. These international sources could unleash a malicious attack on your computer, so to avoid disadvantage it would be fundamental for home users to connect on the peer networks 4 within their physical local network location and for the small business to connect to the peer network of which they create as a company. Beyond the characteristics, advantages and disadvantages within peer-topeer networks the end-user needs to have awareness of the necessity, features and best practices when it comes to security computer networking. There are similarities between the types of network infrastructure than differences. Those similarities is hardware like all of the computers must have network cards, whether it would be for wireless or wired connections to link with network devices and file shares. You also use the same cables, the same hubs and switches, and the same protocols as you would with a client-server model. The only difference is that there isn't a server and you using a public environment. In my personal opinion I do not recommend peer-to-peer network because of the fact that you allow the sharing of computer resources such as; bandwidth, processor speeds, printers, files, and other devices. Having all this free networking mobility enables the vulnerability of attack on your computer and shared resources. With that said it is necessary to be aware of your computing necessity, the features of the hardware that you are using so you know your computing capability, and the best practices to administer when securing your Peer-to-peer network. In the event you absolutely have to use the non-solution. 5 Sources “Understanding Peer-to-Peer Networking” isafe.org 07 June 2005. 07 July 2009 <http://www.isafe.org/imgs/pdf/education/P2PNetworking.pdf> “Introduction to Peer to Peer (P2P) Networks and Software Systems” compnetworking.about.com 2009. 07 July 2009 <http://compnetworking.about.com/od/p2ppeertopeer/a/p2pintroduction.htm> “Sufficiently Secure Peer-To-Peer Networks” pubs.doc.ic.ac.uk 13-14 May 2004. 07 July 2009 <http://pubs.doc.ic.ac.uk/sufficiently-secure-p2p/sufficiently-secure-p2p.pdf> 6