pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

P2P Networking

By early 2000 a revolution was underway in an entirely new form of peer-to-peer computing. Sparked by the phenomenal success of a number of highly publicised applications, P2P computing – as it is commonly referred to – heralded a new computing model for the Internet age and had achieved considerable traction with mainstream computer users and members of the PC industry in a very short space of time:

  • the Napster MP3 music file sharing application went live in September 1999, and attracted more than 20 million users by mid-2000
  • by the end of 2000, over 100 companies and numerous research projects were engaged in P2P computing
  • by early the following year, the SETI@home program, which uses distributed processing to analyse radio telescope data, had attracted more than 2.6 million users who had donated over 500,000 years of CPU time to the hunt for extraterrestrial intelligence.

P2P computing provides an alternative to the traditional client-server architecture and can be simply defined as the sharing of computer resources and services by direct exchange. While employing the existing network, servers, and clients infrastructure, P2P offers a computing model that is orthogonal to the client-server model. The two models coexist, intersect, and complement each other.

In a client-server model, the client makes requests of the server with which it is networked. The server, typically an unattended system, responds to the requests and acts on them. With P2P computing, each participating computer – referred to as peer – functions as a client with a layer of server functionality. This allows the peer to act both as a client and as a server within the context of a given application. A peer can initiate requests, and it can respond to requests from other peers in the network. The ability to make direct exchanges with other users offers a number of compelling advantages – both technical and social – to individual users and large organisations alike.

Technically, P2P provides the opportunity to make use of vast untapped resources that go unused without it. These resources include processing power for large-scale computations and enormous storage potential. P2P allows the elimination of the single-source bottleneck. P2P can be used to distribute data and control and load-balance requests across the Internet. In addition to helping optimise performance, the P2P mechanism also may be used to eliminate the risk of a single point of failure. When P2P is used within the enterprise, it may be able to replace some costly data centre functions with distributed services between clients. Storage, for data retrieval and backup, can be placed on clients. In addition, the P2P infrastructure allows direct access and shared space, and this can enable remote maintenance capability.

Much of the wide appeal of P2P is due to social and psychological factors. For example, users can easily form their own autonomous online Internet communities and run them as they collectively choose. Many of these P2P communities will be ever changing and dynamic in that users can come and go, or be active or not. Other users will enjoy the ability to bypass centralised control. Effectively, P2P has the power to make users autonomous.

Filed Under: Networking

Latest Articles

Laser printer Consumables

Most lasers use cartridge technology based on an organic photoconductive (OPC) drum, coated in light-sensitive material. During the lifetime of the printer, the drum needs to be periodically replaced as its surface wears out and print quality … [Read More...]

system protection tools

How to Remove System Protection Tools

System Protection Tools System Protection Tools is a false antivirus client that is made to look like the real antivirus client from Microsoft. The skin or graphic user interface is very similar and even has several trademarks from Microsoft in it. The program however is fake and is used to scare … [Read More...]

Differences Between Spyware, Malware and Others

There are countless ways that your computer can be infected by harmful elements but the vast majority of them come down to the four usual suspects: Viruses, spam, malware, and spyware. Consider them the Four Horsemen of computer problems and keep in mind that some of them can overlap … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Graphic Designers on Reddit Share their Views of AI

There are clearly a lot of positive things about AI. However, it is not a good thing for everyone. One of the things that many people are worried … [Read More...]

Redditors Talk About the Impact of AI on Freelance Writers

AI technology has had a huge impact on our lives. A 2023 survey by Pew Research found that 56% of people use AI at least once a day or once a week. … [Read More...]

11 Most Popular Books on Perl Programming

Perl is not the most popular programming language. It has only one million users, compared to 12 million that use Python. However, it has a lot of … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Phone-line Networks

Phoneline networking takes advantage of unused transmission capacity to transmit data over existing telephone wires. They … [Read More...]

Replacing your BIOS chip – how to update your system BIOS

Modern-day motherboards have EEPROM BIOS chips that can be reprogrammed by software. These are also referred to as flash PROM or flash ROM, the … [Read More...]

Remove InstantRadioPlay Toolbar

InstantRadioPlay Toolbar is another problematic toolbar that promises to offer useful features. It will allow you to listen to the radio online … [Read More...]

[footer_backtotop]

Copyright © 2025 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors