p2p presentation

Upload: pravin-lanke

Post on 03-Jun-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/12/2019 p2p Presentation

    1/15

    ContentsAbstractIntroductionProblem statementScopeComputational Models

    Hardware & Software requirementsConclusionReferences

    IOK COE Comp. Engg. Dept.

  • 8/12/2019 p2p Presentation

    2/15

    Abstract

    This Project presents distributed algorithm that enable apeer to reason about trustworthiness of other peers based

    on past interactions and recommendation.

    Peerscreatetheir own trust network in their proximity.Trust, service and recommendation contexts are defined to

    measure trustworthiness.

    Recommenders trustworthiness and confidence are

    considered while evaluating recommendation.

    IOK COE Comp. Engg. Dept.

  • 8/12/2019 p2p Presentation

    3/15

    Introduction

    A central server is a preferred way to store andmanage trust information, e.g., eBay.

    There is no central server in most P2P systems.

    IOK COE Comp. Engg. Dept.

  • 8/12/2019 p2p Presentation

    4/15

    Introduction

    A central server is a preferred way to store andmanage trust information, e.g., eBay.

    Yet, P2P is the oldest architecture in the world of

    communications

    Telephones are peer-to-peer

    Usenet implementation of UUCP

    Routing in the Internet

    Internet endpoints have historically been peers

    IOK COE Comp. Engg. Dept.

  • 8/12/2019 p2p Presentation

    5/15

    Problem Statement

    General overviewDefinitionOverlay networks

    Goals

    Classification of P2P systems

    P2P research activities

    Case Studies

    Future research directionsIOK COE Comp. Engg. Dept.

  • 8/12/2019 p2p Presentation

    6/15

    Scope

    Case Studies

    Future research directions

    Computer field shocks:

    Napster, SETI@home, Freenet, Gnutella, Jabber,

    many early P2P projects have an overtly political mission

    Emergence of sporadically connected Internet nodes (laptops,

    handhelds, cell phones, appliances, )IOK COE Comp. Engg. Dept.

  • 8/12/2019 p2p Presentation

    7/15

    Computational Model

    Trust metricsService Trust MetricReputation Metric

    Recommendation Trust Metric

    Fading effect

    IOK COE Comp. Engg. Dept.

  • 8/12/2019 p2p Presentation

    8/15

    Service Trust Metric

    IOK COE Comp. Engg. Dept.

  • 8/12/2019 p2p Presentation

    9/15

    Reputation Metric

    IOK COE Comp. Engg. Dept.

  • 8/12/2019 p2p Presentation

    10/15

    Reputation Metric

    IOK COE Comp. Engg. Dept.

  • 8/12/2019 p2p Presentation

    11/15

    Recommendation Trust Metric

    IOK COE Comp. Engg. Dept.

  • 8/12/2019 p2p Presentation

    12/15

    Diagram

    IOK COE Comp. Engg. Dept.

  • 8/12/2019 p2p Presentation

    13/15

    Hardware & Software requirements

    Hardware ConfigurationProcessor > Pentium IVSpeed > 1.1 Ghz

    Ram > 256 MB (min)

    Software ConfigurationOperating System > Windows XP

    Programming Language > Java

    Database > SQL Server 2005Tool > Net bean

    IOK COE Comp. Engg. Dept.

  • 8/12/2019 p2p Presentation

    14/15

    ConclusionA recommendation contains the recommenders ownexperience, information from its acquaintances, andlevel of confidence in the recommendation. Theseparameters provided us a better assessment oftrustworthiness.

    It can be adapted to various P2P applications, e.g.,CPU sharing, storage networks, and P2P gaming.

    Defining application specific context of trust andrelated metrics can help to assess trustworthiness in

    various tasks.

    IOK COE Comp. Engg. Dept.

  • 8/12/2019 p2p Presentation

    15/15