Note that there are some explanatory texts on larger screens.

plurals
  1. PO
    primarykey
    data
    text
    <p>It is possible. I see at least <strong>2 parts</strong> to your question. (It is not going to be HTTP packet. It is a lot more complex than that.)</p> <p><strong>First off</strong>, I believe you might be talking about a concept called decentralized P2P network. The main idea behind a decentralized peer-to-peer network is the fact that nodes conjoint in such a network will not require central server or group of servers. </p> <p>As you might already know, most common centralized peer-to-peer networks require such centralized system to exchange and maintain interconnectivity among nodes. The basic concept is such, a new node will connect to one of the main servers to retrieve information about other nodes on the network to maintain its connectivity and availability. The central system gets maintained through servers constantly synchronizing network state, relevant information, and central coordination among each other. </p> <p>Decentralized network, on the other hand, does not have any structure or predetermined core. This peer-to-peer model is also called unstructured P2P networks. Any new node will copy or inherit original links from the "parent" node and will form its own list over time. There are several categories of decentralization of such unstructured networks. </p> <p>Interestingly enough, the absence of central command and control system makes it solution of choice for modern malware botnets. A great example could be Storm botnet, which employed so-called Passive P2P Monitor (PPM). PPM was able to locate the infected hosts and build peer list regardless whether or not infected hosts are behind a firewall or NAT. Wikipedia's article <b><a href="http://en.wikipedia.org/wiki/Storm_botnet" rel="nofollow noreferrer">Storm botnet</a></b> is an interesting read. There is also great collaborative study called <b><a href="http://www-users.cs.umn.edu/~hopper/p2pbot_asiaccs09.pdf" rel="nofollow noreferrer">Towards Complete Node Enumeration in a Peer-to-Peer Botnet</a></b>, which provides excellent conceptual analysis and techniques employed by Storm botnet network.</p> <p><strong>Second of all</strong>, you might be talking about UDP hole punching. This is a technique or algorithm used to maintain connectivity between 2 hosts behind NATed router/gateway using 3rd comment host by means of a third rendezvous server. </p> <p>There is a great paper by Bryan Ford, Pyda Srisuresh, and Dan Kegel called <b><a href="http://www.brynosaurus.com/pub/net/p2pnat/" rel="nofollow noreferrer">Peer-to-Peer Communication Across Network Address Translators</a></b>.</p>
    singulars
    1. This table or related slice is empty.
    plurals
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    1. VO
      singulars
      1. This table or related slice is empty.
    2. VO
      singulars
      1. This table or related slice is empty.
 

Querying!

 
Guidance

SQuiL has stopped working due to an internal error.

If you are curious you may find further information in the browser console, which is accessible through the devtools (F12).

Reload