Brief Introduction to P2P network encryption protocol

Source: Internet
Author: User

In network security, encryption protocols have always been an important barrier for network security. Therefore, research and learning in this area are also essential for network administrators. Now let's take a look at the consultation on P2P network encryption protocol, hoping to help you understand some of this content.

BreakingPoint Systems, an industry-leading network application and Security Testing Company, has launched the industry's first test solution that supports P2P network encryption protocols, this solution also continues to support more than 60 protocols, including eDonkey, BitTorrent, Gnutella, and other protocols, to further enhance the testing capability of network equipment manufacturers and service providers for next-generation network devices, so that it can accurately test P2P network encryption protocol devices that run at a high speed of 10 Gbps/second or even faster.

The traffic of P2P networks is astonishing. According to the latest report, more than 0.1 billion of files are exchanged through P2P networks every day. Currently, P2P network traffic accounts for 61% of the total network traffic, accounting for 22% of all bandwidth consumption, and such massive P2P Traffic data is still growing rapidly, this requires that the network equipment manufacturers and service providers must test the devices under the actual traffic of the P2P network, therefore, we must adopt a better way to ensure that the network traffic will not be affected by malware or inappropriate P2P Traffic. At present, network equipment manufacturing is expected to provide users with a high-quality network environment by deploying network equipment (such as optimizing network traffic, managing or restricting the use of P2P Traffic.

BreakingPoint is the only vendor in the industry that provides P2P network encryption protocol test solutions. It also supports BitTorrent, encrypted BitTorrent, eDonkey, and Gnutella. With this BreakingPoint testing tool, network equipment manufacturers and service providers can run at a high speed of 10 Gbps/second or even faster) and hybrid P2P Traffic, with more than 3600 attacks on the network devices for accurate performance and security testing.

Dennis Cox, chief technology officer of BreakingPoint, said: "P2P networks are constantly changing, which puts higher requirements on network equipment manufacturers that manage and restrict P2P networks, network device manufacturers must use the latest test tools to test network devices to meet the development needs of P2P networks. BreakingPoint supports more than 60 network protocols, not to mention more than 3600 security attacks. Every week, we update applications for our users. No matter how network traffic or real-time attacks change, we have only one goal: to ensure the security of the user's network. Even if a major security event occurs, we can easily face it ."

P2P seems to be a brand new concept. From the perspective of application, in real life, we communicate and communicate face to face every day based on the P2P network encryption protocol or by phone. Even from the network perspective, p2P is not a new concept. P2P technology originated in the middle of 1970s and is a file sharing technology in LAN. The TCP/IP protocol stack, which is currently the basis of the Internet architecture, does not define the concept of a client and a server. All devices are equal in communication. However, due to the limitations of network bandwidth, host processing capability and cost control at that time, P2P technology was not widely used, but the network structure of the C/S model became the mainstream of Internet technology. From the perspective of local C/S applications, the software based on TCP/IP indeed adopts the Client/Server structure: browser and Web server, mail client and mail server. However, for servers, they are still on the Internet. Taking E-mail as an example, there is no unique and huge email server on the Internet to process all emails. Instead, the peer-to-peer email server cooperates to send E-mail to the peer server. Therefore, the popular P2P application is not a new technology, but the development of the original technology.
 
First, the Napster music sharing tool brought P2P back to people's field of view and became the leading role of the internet stage. Napster was developed by Shawn Fanning, who is still studying at Northeastern University in the United States, using P2P technology and quickly spread among many MP3 digital music fans, people use Napster to search for MP3 music files they need on the Internet and download them from any networked computer that uses Napster. This method is free and convenient. In a year, 50 million users were gathered and finally received a complaint from the American Association of recording artist industry.

Napster can be called the first generation of P2P applications: hybrid P2P applications with servers. A completely distributed P2P network encryption protocol application represented by Gnutella emerged in a short time. This is the second generation protocol. A completely "peer-to-peer" network structure represented by Gnutella, that is, all the Peer Points in the network are in full equality. To find resources on other peer points, you need to find the peer point directly, generally, this query is performed through message Flooding. In order to solve the problem of low network pressure and efficiency caused by the "completely equal" search mechanism, the third-generation Protocol introduces the concept of SuperNode in the network, select a user with better network performance to directly connect to the Internet as a super node. The super node is used to process queries on common nodes. This not only relieves the pressure on low-performance peers, but also solves the problem of P2P sharing and resource searching for hosts that cannot be directly connected to the network due to FW/NAT. Gnutella2 and KaZaa are both representatives of third-generation P2P network encryption protocols.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.