P2P is a disseminated application architecture that partitions duties among peers.
P2P is a disseminated application architecture that partitions duties among peers. A typical P2P application has three main components. First is the Web Portal, the second is the tracker, and the third is the peers (Kwok, 2011). A Web portal component of the application is commonly known as a login server, which allows access to the P2P service. This login server provides authentication and obtains peer information for a Skype client. For access, the first user must first connect to this server to check out the peers and the availability of services.
The Web Portal can function both offline and online. The tracker is an essential directory server that furnishes peer information availability to another new peer. The tracker is also responsible for free matching in an unstructured P2P network. The peers are autonomous client machines that join and leave the system at will. The various functions include helping each other to obtain data packets, determine multiple pieces of meta-data about the service, and obtaining lists of peers from the corresponding trackers to make data transfer connections (Kwok, 2011). Initially, server logins and trackers would function in a single system. However, with growth in population and diversification of services, the peer tracking system is overloaded to a separate server. Distribution of roles among the components of a P2P system also follows the biblical concept of division of labor. As captured in Roman 12:4, “For we are many members in one body, and as members, we do not all have the same function but are one body in Christ, and individual members of one another” (Trevino, 2019). This verse tries to expound on unity in working together towards a common goal. Deviation of any member from the intended function impacts the entire process negatively. Therefore, the effectiveness of the P2P system significantly depends on the ability of its three main components to perform their various tasks in unison.
Question 2
Essential Components of a Typical Hybrid Network Architecture Design
Network Architecture designs have a crucial function in the behaviors and performance of a P2P system. Hybrid network architecture designs form unstructured network designs that are robust and resilient to peer dynamics. However, informal models lack an unpredictable performance. Essential components of a typical hybrid network design include a Chord, which is an example of a DHT ring. The chord contains load balancing clusters, which are small unstructured networks (Kwok, 2011). Another essential feature is a set of Supernodes
A Utility-Based Clustering Architecture consists of three component layers; data, decision logic, and communication. The data layer collects and manages information used for cluster decisions. The information collected is about the cost and qualities of various resources. The decision logic level applies service functions to explore cluster alternatives and choose proper information stuff for fetching. Communication facilitates information exchange among peers. The Bristle hybrid network architecture design has two essential components: the statutory and mobile levels. The machines in the regulatory layers contain fixed IP addresses and are, therefore, immobile (Kwok, 2011). While the itinerant level functions on an indiscriminate system with no fixed IP address. A good network architectural design is a cornerstone of any reliable P2P system. From a biblical perspective, Matthew 7:24 captures the theme on strong foundations, “where everyone who hears the Lord’s words and obeys them will be like a wise man who builds his house on a rock. And the rains fall, floods come, winds blow and beat the house, but it does not fall because it is on a rock” (Trevino, 2019). This verse is a reflection of the importance of a good foundation that is essential in an efficient P2P hybrid network architecture design. The performance of the P2P system entirely depends on the architecture design applied to it.
Question 3
Describe the Sybil Attack, and the Reasons It is a Serious Problem
Sybil attack is an online system security threat where one individual attempts to take over the network by creating more user accounts, nodes, or computers. A malevolent client in the P2P network may control a vast quantity of peers. The user may run an enormous P2P amount of user programs on the system whereby various peers are showing one physical client behind the scene. If a user can pull that through, they can alter and control operations of the P2P system. Sybil attack is a result of the mapping of peer identities to physical users. Preventing Sybill attacks involves establishing mechanisms to avoid assigning multiple peers to identify one physical user (Baza et al., 2020). Another measure that applies to prevent Sybil attack is using a centralized entity such as a server to assign identities to each P2P client based on their physical characteristics. The use of network coordinates is also another way to prevent Sybil attacks. This strategy allows ingenuous peers to decide if new peers represent discrete physical features. If a malicious new user appears, an intersection has been a legitimate peer, and the malicious peer occurs. The validation mechanism is the best method to prevent Sybil attacks. Sybil attack attacks are dangerous as they cause unnecessary resource allocations, making it challenging to identify and collect data packets, data aggregation, routing, which negatively impacts the functionality of the network, and the establishment of hidden nodes, which reduces the credibility of the system (Kwok, 2011).
Question 4
Why Launching DDoS Attack Using A P2P Network Is Possible
Launching a DDoS attack using a P2P system is easy owing to the decentralization character of the system. Lack of a central administration makes it difficult to control and combat security attacks (Prasad et al., 2020). Another aspect that makes the P2P network vulnerable to DDoS attacks is that it is difficult to verify if the files installing are from a trustworthy source. The DDoS attack is a cyber-attack why the invader works towards making a device or network system unavailable for the projected users by disturbing services of a host linked to the internet either momentarily or indefinitely. DDoS can occur in two forms. One form involves crashing services by overwhelming a machine’s network with false data requests, and the other way requires flooding services.
If file poisoning occurs, index tables of peers are modified, and the keys matched to the victim peers’ address, thereby overwhelming it. DDoS attacks reduce through establishing defiance of service reply plan, securing the network systems, establishing robust network design Architecture, leveraging the cloud, and understanding warning signs (Prasad et al., 2020). It is possible to create a more robust P2P system that is less susceptible to attack. In the Bible, Isaiah captures the importance of protection in Isaiah 40:29, “God through Isaiah says he will give power to the weak and strength to the powerless” (Trevino, 2019). The verse guides on the essence of providing security to all entities to reduce their vulnerability to attack. P2P systems are, therefore, not an exception and should be secured to avoid attack from malware and other possible threats. DDoS attacks result in unavailable online platforms, interference, and loss of confidential data decline in turnover, and damaged brand reputation.