Networking Needs and Security 1. “What are the key components of a typical P2P application? Describe their functions.” There are myriad components that play vital roles in typical P2P applications. Perhaps the most salient of these is a server—a file server, in particular. Because of the connected, transferable nature of P2P networks, most...
Networking Needs and Security
1. “What are the key components of a typical P2P application? Describe their functions.”
There are myriad components that play vital roles in typical P2P applications. Perhaps the most salient of these is a server—a file server, in particular. Because of the connected, transferable nature of P2P networks, most applications are designed to exploit this connectivity by sharing data. In this regard, a P2P network functions as a microcosm of the vision of the semantic web. Nonetheless, most applications have some functionality which acts as a file server, enabling the exchange of information between other applications and servers in the network in question. Another integral aspect of the vast majority of applications for P2P networks is their processors, or core processors in several instances. These processors provide vital functionality related to the redundancy which functions at the center of the way most of the machines (and their applications) on these networks operate. These processors are also involved in the failover capabilities (Beaver, 2003) of these applications which helps them to continue functioning properly in the wake of instances in which failure might occur. Additionally, most P2P applications have some sort of capabilities for delivering messages between those on the network. These messages are one of the important ways that information is communicated on these networks. The combination of these components enables some of the critical procedures for file sharing, for which these type of networks are widely renowned.
2. What are the essential features of a typical hybrid network architecture design?
There are multiple essential features of a typical hybrid network architecture design. Still, the most critical of these are the confluence of both on-premise and cloud infrastructure. The tandem of these two architectural types is what make a hybrid architecture a synthesis (Burke, 2017). Such architecture must involve the cloud as well as conventional on-premise infrastructure. Thus, it could involve a combination of VMware accessible through the cloud in addition to physical servers behind an organization’s firewall. Firewalls are typical security manifestations found within the design of these hybrid network architectures. Competitive organizations are able to get some of their cloud assets within their secure firewall with their on-premise applications. In terms of the cloud aspect of such a hybrid network, it is necessary for an organization to have any variety of internet connection (mobile, landline, etc.) in addition to an internet service provider and a cloud service provider. Essential features of this architectural design include both on-premise servers and, oftentimes, those in the cloud. In addition to the example of virtualized servers denoted above, organizations may also frequently utilize some combination of Infrastructure as a Service (IaaS) for cloud servers. Another pivotal component is adequate bandwidth involved to keep data suitably transmitting from the cloud to on-premise locations, and replicated from the latter to the former as need be. Common methods for accounting for such bandwidth include Wide Area Networks (WAN), although in some instances LANs may provide a fair amount of utility in this regard as well.
3. “What is Sybil attack? Why is it a serious problem?”
There are multiple dimensions to a Sybil attack, each of which significantly impacts the seriousness of this particular computing issue. The first dimension involves the identities of various computers, either in a formal network or on the internet. These identities are assumed to be unique. However, it is possible for entities which perpetrate Sybil attacks to forge identities, thereby creating false ones. When a vulnerable computer that is involved in a larger network becomes susceptible it can have its identity assumed by an external entity—perpetrating the Sybil attack. It then becomes possible for that perpetrator to fraudulently assume the identities of others in the network. In this case, it becomes possible for the intruder to actually forge the identities of others in the network and thereby gain a majority control over it (Douceur, 2002). The reason that Sybil attacks are so plausible is because of the lack of a central authority which exists in certain cases—such as in Peer-to-Peer (P2P) networks. The seriousness of this problem is that it enables a subversion of a network to an intruder. Moreover, that intruder then becomes the centralized authority in the network because it is assuming multiple identities in the network. The result is a majority of the share of the decision-making, processing, and resources within that network. The perpetrator of the attack can thus infiltrate the entire network, and gain insight into the resources of individual components or servers within that network as well.
4. “Why is it possible to launch a DDoS attack using a P2P network?”
It is possible to launch a Distributed Denial of Service (DDoS) attack via a P2P network because of the very nature of the former. These type of attacks require multiple servers. Thus, a network of such servers as contained within a P2P network is ideal for DDoS attacks because of the sheer number of parties (or servers) involved. DDoS attacks flood a particular computing system, website or server with an overwhelming amount of information. Such information might contain packets or simple requests for service. Because there is so much of this information requested at one time, the system responsible for servicing those requests becomes overburdened. Consequently, it slows down its response time because its resources are taxed from all of the requests. Eventually, it is not able to respond at all because there are so many requests. When it cannot respond altogether it denies service. Therefore, it is due to the distributed nature of P2P networks that it is possible to launch a DDoS attack via them. The distribution of the network is well suited for the distribution which optimizes DDoS attacks. Granted, a P2P network is not required for DDoS events. However, by virtue of the reality that P2P networks have a multiplicity of servers connected together, they can easily become subjugated to a leading agent in such an attack. The orchestration of P2P networks is optimal for the distribution involved in DDoS efforts.
References
Beaver, K. (2003). Are P2P applications worth the risk? TechTarget. Retrieved from http://searchsecurity.techtarget.com/tip/Are-P2P-applications-worth-the-risk
Burke, J. (2017). The best path to a hybrid cloud architecture. TechTarget. Retrieved from http://searchnetworking.techtarget.com/tip/The-best-path-to-a-hybrid-cloud-network-architecture
Douceur, J. (2002). The Sybil attack. Microsoft Research. www.microsoft.com Retrieved from https://www.microsoft.com/en-us/research/publication/the-sybil-attack/
The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.
Always verify citation format against your institution's current style guide.