Monday, December 23, 2019

Essay about Security in peer to peer networks - 1808 Words

Thesis statement: Users of Peer to Peer networks must be aware of the security and how to deal with the attacks. Introduction Technologies are getting more advance each day, in this assignment will be sharing and discuss about the security in peer to peer networks. Security run an important role in every network applications because this is the place where people and the systems are all link up together and can access each other data and also programs. According to Madron (1992) points out that: One of the primary objectives of computer networks (and especially of local area networks) is to provide easy and convenient access to computer systems within an organizations, and it is that same ease of use that can sometimes conflict with†¦show more content†¦When everyone is accessible to remote peers, the host becomes more open for all kinds of attacks. In addition, as clients, peers may download different forms of files or get their process executed by different remote systems, which may prove to be hostile. The best things to do to prevent all this things to happen, is to stay out from peer to peer network. But with this kind of solution will depose us of all P2P computing or network privileges. P2P systems example like Gnutella, Wired:P2P pages and Groove Networks are here to stay. â€Å"Gnutella A free software application using peer-to-peer technology for sharing MP3 and video files. Wired: P2P Pages This global file-sharing guide lists 240-plus downloads, services, and information resources - most of them free - designed for experienced P2Pers and novices alike. Technical specs are provided for software developers to build many of these services. Groove Networks Develops Internet-based software for people to collaborate with one another.† ( http://www.business2.com/webguide/0,,26518,00.html ) If P2P are going to be used widely or commercially, the requirements of security of the hosts should make their transactions secure and applications endanger the security of the host. The Peer-to-Peer networks threat nbsp;nbsp;nbsp;nbsp;nbsp;Peer-to-peer networks software or files are available for free in the network itself, because of this there are threats in P2P networks. During transferring files or loadingShow MoreRelatedComputer Network Platforms And Network Operating Systems935 Words   |  4 Pagesbetween two or more computers is called a computer network. The most common computer network architectures are peer-to-peer, client-server, and virtualisation. As programming and software, advancement has enhanced in the course of recent decades, so have computers turned out to be better at communicating on a network system. Network operating systems are designed primarily to support user administration, security of all resources in the network, system maintenance activities and tasks related withRead MoreComparison Between P2p, Client And Server And Virtualization Networks1088 Words   |  5 PagesVirtualization Networks A comparison is made between the three models comparing different attributes to show which setup would be best feasible for a small business unit. The network models that are compared are, Peer to Peer network, Client/Server Model and Virtualization Models. The comparison between P2P, Client/server and Virtualization is tabulated below. P2P Client/Server Virtualization Administration No Cost Less expensive when compared to virtualization Very Expensive Security Less secureRead MoreA Brief Note On P2p Vs. P2p1651 Words   |  7 PagesDescription: A peer-to-peer (P2P) network is created when two or more PCs are connected and share resources without going through a separate server computer. A P2P network can be an ad hoc connection—a couple of computers connected via a Universal Serial Bus to transfer files. Peer-to-peer (P2P) networking is the networking between the same type of devices. Peers are equally privileged. P2P is an alternative network model to that provided by traditional client-server architecture. In a P2P network, everyRead MoreA Brief Note On Peer And Peer Networks994 Words   |  4 Pages Peer to Peer networks are one of the most popular of all social media platforms. A peer to peer network also called p2p, which we will use throughout this investigation, â€Å"is a distributed application architecture that partitions tasks or workloads between peers† (Peer-to-peer, 2014.)[2] The interest in p2p has steadily been growing since the introduction of Napster in 1999. There are several different types of p2p networks, platforms and architectures which we will discuss. The p2p networks whileRead MoreHow Lan Can Use A Specific Lan For Essay1563 Words   |  7 Pages Describe what the user will mainly use a specific LAN for: LAN is a local-area network which covers a relatively small area. Most LAN’s are restricted to a single building or groups of buildings. One LAN can be connected to other LANs for any distance through telephone lines and radio waves. LAN connects the computer hardware in a localized area for example in an office or home. Furthermore, LANs use wired connections to link the computers to each other and to a variety of peripheral devices suchRead MoreHow The Implementation Of A Client Server743 Words   |  3 PagesCollege† is very challenging . I will have to implement their system based on one of the following architecture : Client server or peer to peer.In my decision I will have to keep in mind the following Client server is based on a powerful computer , a central network and less powerful computers which are called clients. One of the options we have is client server or peer to peer. Client server is centralisation of control and the resources the will be controlled by a dedicated server. In client base serverRead MoreApplication Of Structured Query Language1251 Words   |  6 Pagesaspects and also transparency in network services depict that similar data is being shared among users. †¢ Integration of Services: Every client is given the opportunity to access corporate information via the desktop interface eliminating the necessity to log into a terminal mode or another processor. Desktop tools like spreadsheet, power point presentations etc can be used to deal with corporate data with the help of database and application servers resident on the network to produce meaningful informationRead MoreIt 240 Week 3 Checkpoint Essay626 Words   |  3 PagesGuide to Networking Essentials. After determining if a client-based or client/server model will be used, substantively justify your choice in 200 to 300 words. Case Project 3-1 What changes in equipment are required to bring this company’s network up to date to solve the shared-bandwidth problem? The star topology would change to an extended star topology; I would upgrade the cables to Cat 5e or Cat 6 UTP. I would upgrade the Hubs to 1000 BaseT Switches, upgrade the 5 extra computers withRead MoreNetwork Operating Systems (NOS) Essay827 Words   |  4 PagesNetwork Operating Systems, abbreviated NOS, are programs that are designed to work with numerous computers on a network, allowing for communication amongst them, but â€Å"the term network operating system, however, is generally reserved for software that enhances a basic operating system by adding networking features† [5]. The NOS provides structure to the network as it controls the hardware and software within a network. The network operating system allows for the ability to include all the componentsRead MoreAccounting Case Study744 Words   |  3 Pagesemployees to help you, I would like to give you some advices on choosing a network. There are two main network choices. First one is Peer to Peer networking , and second one is Client/Server. They are both networks that connects computers so that files and document can be shared. The pros of Peer to Peer are, low cost, easy setup, little training, you will not need a server and it’s ideal for small business. In this network, each user on a computer is the administrator of that computer. Each user

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.