pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

P2P Networking

By early 2000 a revolution was underway in an entirely new form of peer-to-peer computing. Sparked by the phenomenal success of a number of highly publicised applications, P2P computing – as it is commonly referred to – heralded a new computing model for the Internet age and had achieved considerable traction with mainstream computer users and members of the PC industry in a very short space of time:

  • the Napster MP3 music file sharing application went live in September 1999, and attracted more than 20 million users by mid-2000
  • by the end of 2000, over 100 companies and numerous research projects were engaged in P2P computing
  • by early the following year, the SETI@home program, which uses distributed processing to analyse radio telescope data, had attracted more than 2.6 million users who had donated over 500,000 years of CPU time to the hunt for extraterrestrial intelligence.

P2P computing provides an alternative to the traditional client-server architecture and can be simply defined as the sharing of computer resources and services by direct exchange. While employing the existing network, servers, and clients infrastructure, P2P offers a computing model that is orthogonal to the client-server model. The two models coexist, intersect, and complement each other.

In a client-server model, the client makes requests of the server with which it is networked. The server, typically an unattended system, responds to the requests and acts on them. With P2P computing, each participating computer – referred to as peer – functions as a client with a layer of server functionality. This allows the peer to act both as a client and as a server within the context of a given application. A peer can initiate requests, and it can respond to requests from other peers in the network. The ability to make direct exchanges with other users offers a number of compelling advantages – both technical and social – to individual users and large organisations alike.

Technically, P2P provides the opportunity to make use of vast untapped resources that go unused without it. These resources include processing power for large-scale computations and enormous storage potential. P2P allows the elimination of the single-source bottleneck. P2P can be used to distribute data and control and load-balance requests across the Internet. In addition to helping optimise performance, the P2P mechanism also may be used to eliminate the risk of a single point of failure. When P2P is used within the enterprise, it may be able to replace some costly data centre functions with distributed services between clients. Storage, for data retrieval and backup, can be placed on clients. In addition, the P2P infrastructure allows direct access and shared space, and this can enable remote maintenance capability.

Much of the wide appeal of P2P is due to social and psychological factors. For example, users can easily form their own autonomous online Internet communities and run them as they collectively choose. Many of these P2P communities will be ever changing and dynamic in that users can come and go, or be active or not. Other users will enjoy the ability to bypass centralised control. Effectively, P2P has the power to make users autonomous.

Filed Under: Networking

Latest Articles

Website Usage and Disclaimer – pctechguide.com

The purpose of the PC Technology Guide web site is to provide a free information resource for the benefit of the Internet community at large. To this end the site's content is licensed to the public under the GNU Free Documentation License (GFDL). This effectively allows PCTechGuide content to … [Read More...]

Driver Scanner Review

Driver Scanner Review

[starreviewmulti id=6 tpl=20] The installation of Driver Scanner 2012 as with previous versions went very smooth. The interface was easy to use, and there were no conflicts with new driver installations. It found all the drives on 2 custom built computers as well as ones buily buy HP, Dell and … [Read More...]

Findamo.com Virus Removal Guide

  The Findamo.com virus belongs to a type of malware that has the sole purpose of redirecting and leading to a browser hijacker infection. This will make the user surfing experience prone to redirecting virus online and compromise the internet security. The Method of Infiltration Every … [Read More...]

Tips on How to Land a Remote Job in Cyber Security

The demand for skilled cyber security professionals is growing as well as a number of threats and risks. Any company needs an expert or team to … [Read More...]

Video Tutorials for Anyone Wanting to Learn About Big Data

Did you know that we create about 2.5 quintillion bytes of data every single day? There is no denying the fact that big data is changing our world in … [Read More...]

Video Tutorials to Help Canva Users Shorten their Learning Curve

Canva is a very popular design software that is used by over 55 million designers. It is a robust application, but it can be tricky for beginners to … [Read More...]

Great Videos to Learn About Cricut Design Space

Cricut Design Space is one of the best digital design applications for people trying to create projects for Cricut projects. You can create a lot of … [Read More...]

Great Videos on Dangerous Computer Viruses

Computer viruses are obnoxious programs that can wreak havoc on even the most sophisticated machines. The good news is that people will be better … [Read More...]

Best Creative Commons Videos on Learning Adobe Illustrator

Adobe Illustrator is one of the most popular design tools available. The tool has been around since 1987 and is used by over 90% of the world's … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Dual Independent Bus (DIB) – frontside and backside data bus CPU architecture

The Dual Independent Bus (DIB) architecture - first implemented in the Pentium Pro processor - was created to aid processor bus bandwidth. Having … [Read More...]

Graphics Card Driver Un-Installation

It's important to uninstall your existing drivers so as to avoid any potential conflict with those for your new card. If the drivers in question … [Read More...]

Intel Mobile Pentium II technology guide

The natural progression of the low-power Deschutes family of Pentium II processors to the portable PC market took place … [Read More...]

[footer_backtotop]

Copyright © 2022 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors