pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

P2P Networking

By early 2000 a revolution was underway in an entirely new form of peer-to-peer computing. Sparked by the phenomenal success of a number of highly publicised applications, P2P computing – as it is commonly referred to – heralded a new computing model for the Internet age and had achieved considerable traction with mainstream computer users and members of the PC industry in a very short space of time:

  • the Napster MP3 music file sharing application went live in September 1999, and attracted more than 20 million users by mid-2000
  • by the end of 2000, over 100 companies and numerous research projects were engaged in P2P computing
  • by early the following year, the SETI@home program, which uses distributed processing to analyse radio telescope data, had attracted more than 2.6 million users who had donated over 500,000 years of CPU time to the hunt for extraterrestrial intelligence.

P2P computing provides an alternative to the traditional client-server architecture and can be simply defined as the sharing of computer resources and services by direct exchange. While employing the existing network, servers, and clients infrastructure, P2P offers a computing model that is orthogonal to the client-server model. The two models coexist, intersect, and complement each other.

In a client-server model, the client makes requests of the server with which it is networked. The server, typically an unattended system, responds to the requests and acts on them. With P2P computing, each participating computer – referred to as peer – functions as a client with a layer of server functionality. This allows the peer to act both as a client and as a server within the context of a given application. A peer can initiate requests, and it can respond to requests from other peers in the network. The ability to make direct exchanges with other users offers a number of compelling advantages – both technical and social – to individual users and large organisations alike.

Technically, P2P provides the opportunity to make use of vast untapped resources that go unused without it. These resources include processing power for large-scale computations and enormous storage potential. P2P allows the elimination of the single-source bottleneck. P2P can be used to distribute data and control and load-balance requests across the Internet. In addition to helping optimise performance, the P2P mechanism also may be used to eliminate the risk of a single point of failure. When P2P is used within the enterprise, it may be able to replace some costly data centre functions with distributed services between clients. Storage, for data retrieval and backup, can be placed on clients. In addition, the P2P infrastructure allows direct access and shared space, and this can enable remote maintenance capability.

Much of the wide appeal of P2P is due to social and psychological factors. For example, users can easily form their own autonomous online Internet communities and run them as they collectively choose. Many of these P2P communities will be ever changing and dynamic in that users can come and go, or be active or not. Other users will enjoy the ability to bypass centralised control. Effectively, P2P has the power to make users autonomous.

Filed Under: Networking

Latest Articles

How To Remove DollarSaver Adware From Your PC

The DollarSaver application promises to save you money when you shop online. However, it proves to be a bunch of empty promises while loading your computer up with a bunch of junk that you do not want on there. You may find a discount here and there, but it will not be worth all the trouble you are … [Read More...]

New Transfer Feature in Dropbox Enable Sharing files with Third Parties

Dropbox has been a popular P2P sharing platform for many years. They don't announce new features as often as other applications, since they have a good track record with creating great services already. However, Dropbox did recently announce the development of a new feature - known as "Transfer." … [Read More...]

Pentium 4

In early 2000, Intel unveiled details of its first new IA-32 core since the Pentium Pro - introduced in 1995. Previously codenamed Willamette - after a river that runs through Oregon - it was announced a few months later that the new generation … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Graphic Designers on Reddit Share their Views of AI

There are clearly a lot of positive things about AI. However, it is not a good thing for everyone. One of the things that many people are worried … [Read More...]

Redditors Talk About the Impact of AI on Freelance Writers

AI technology has had a huge impact on our lives. A 2023 survey by Pew Research found that 56% of people use AI at least once a day or once a week. … [Read More...]

11 Most Popular Books on Perl Programming

Perl is not the most popular programming language. It has only one million users, compared to 12 million that use Python. However, it has a lot of … [Read More...]

10 Exceptional Books on ChatGPT that Will Blow Your Mind

ChatGPT is a powerful new AI tool that is taking the world by storm. You are going to find a lot of amazing books that will teach you how to make the … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

AMD 750 Chipset

The AMD 750 chipset consists of two physical devices: the AMD-751 system controller and the AMD-756 peripheral bus … [Read More...]

RAID tutorial – preparing for the installation

You'll need first to complete a couple of preparatory steps: 1. Create a floppy disc containing the relevant RAID Controller drivers Locate the … [Read More...]

How to Remove Antivirus Antispyware 2011

What is Antivirus Antispyware 2011? Antivirus Antispyware 2011 is a false security client.  This program is a scam and attempts to trick users … [Read More...]

[footer_backtotop]

Copyright © 2025 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors