SlideShare une entreprise Scribd logo
1  sur  9
• P2P Stands for Peer to Peer
• A network of personal computers, each of which acts as both
client and sever, so that each can exchange files and email
directly with every other computer on the network.
• Each computer can access any of the others, although access
can be restricted to those files that a computer's user chooses
to make available.
• P2P networking has generated tremendous interest
worldwide among both Internet surfers and computer
networking professionals. P2P software systems like Kazaa
and Napster rank amongst the most popular software
applications ever. Numerous businesses and Web sites have
promoted "peer to peer" technology as the future of Internet
networking.
• Computers in a peer to peer network are typically
situated physically near to each other and run similar
networking protocols and software. Before home
networking became popular, only small businesses
and schools built peer to peer networks.
• Most home computer networks today are peer to peer
networks. Residential users configure their computers in peer
workgroups to allow sharing of files, printers and other
resources equally among all of the devices.
• Both wired and wireless home networks qualify as peer to
peer environments.
• When most people hear the term "P2P", they think not of traditional peer
networks, but rather peer to peer file sharing over the Internet. P2P file
sharing systems have become the single most popular class of Internet
applications in this decade.
• A P2P network implements search and data transfer protocols above the
Internet Protocol (IP). To access a P2P network, users simply download
and install a suitable P2P client application.
• Numerous P2P networks and P2P software applications exist. Some P2P
applications work only with one P2P network, while others operate crossnetwork. Likewise, some P2P networks support only one application, while
others support multiple applications.
• You can configure computers in peer to peer workgroups to
allow sharing of files, printers and other resources across all
of the devices. Peer networks allow data to be shared easily in
both directions, whether for downloads to your computer or
uploads from your computer.
• On the Internet, peer to peer networks handle a very high
volume of file sharing traffic by distributing the load across
many computers.
• Essentially P2P Networks are a great way to connect and send
resources to people in an easy way.
• Unfortunately sometimes these information-sharing systems have been
used to engage in illegal activity. Some of the most common crimes
associated with Peer-to-Peer networks are the following:
• Copyright Infringement: It is a violation of federal law to distribute
copyrighted music, movies, software, games, and other works without
authorization. There are important national economic consequences
associated with such theft.
• Computer Hacking: Peer-to-Peer networks also have been abused by
hackers. Because these systems potentially expose your computer and
files to millions of other users on the network, they also expose your
computer to viruses. Also, if Peer-to-Peer software is not properly
configured, you may be unknowingly opening up the contents of your
entire hard drive for others to see and download your private information.
• In the years ahead, expect the concept of P2P to
continue evolving. The networking industry will
introduce a wider range of peer to peer
applications that should compete for attention
with traditional desktop and client / server
systems. P2P protocol standards will be adopted
to a greater extent. Finally, the ramifications of
free P2P application information sharing on
copyright and intellectual property law will slowly
be settled through the process of public debate.

Contenu connexe

Tendances

Uses Of Internet In A Day To Day Life
Uses Of Internet In A Day To Day LifeUses Of Internet In A Day To Day Life
Uses Of Internet In A Day To Day LifeSundeep Malik
 
The Internet and Its Importance
The Internet and Its ImportanceThe Internet and Its Importance
The Internet and Its ImportanceChuchi Dilao
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To InternetPallavi Gupte
 
Introduction to Internet By Anamika
Introduction to Internet By AnamikaIntroduction to Internet By Anamika
Introduction to Internet By AnamikaGisha Mathyari
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to InternetPravinGhosekar
 
Internet ppt
Internet pptInternet ppt
Internet ppttej_vish
 
09 The Information Super Highway Lesson
09 The Information Super Highway Lesson09 The Information Super Highway Lesson
09 The Information Super Highway LessonBuffalo Seminary
 
ITFT- Basic internet concept
ITFT- Basic internet conceptITFT- Basic internet concept
ITFT- Basic internet conceptNavneet Kaur
 
Internet and its working (manu)
Internet and its working (manu)Internet and its working (manu)
Internet and its working (manu)Manu Nair
 
The internet and its function
The internet and its functionThe internet and its function
The internet and its functionTallat Satti
 

Tendances (20)

Internet and WWW
Internet and WWWInternet and WWW
Internet and WWW
 
internet world, computer ppt
internet world, computer pptinternet world, computer ppt
internet world, computer ppt
 
Uses Of Internet In A Day To Day Life
Uses Of Internet In A Day To Day LifeUses Of Internet In A Day To Day Life
Uses Of Internet In A Day To Day Life
 
The Internet and Its Importance
The Internet and Its ImportanceThe Internet and Its Importance
The Internet and Its Importance
 
Internet ppt
Internet pptInternet ppt
Internet ppt
 
Internet and its uses
Internet and its usesInternet and its uses
Internet and its uses
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To Internet
 
Introduction to Internet By Anamika
Introduction to Internet By AnamikaIntroduction to Internet By Anamika
Introduction to Internet By Anamika
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Internet & www
Internet & wwwInternet & www
Internet & www
 
Internet and www
Internet and wwwInternet and www
Internet and www
 
Lab 3 internet & www
Lab 3   internet & wwwLab 3   internet & www
Lab 3 internet & www
 
Internet ppt
Internet pptInternet ppt
Internet ppt
 
09 The Information Super Highway Lesson
09 The Information Super Highway Lesson09 The Information Super Highway Lesson
09 The Information Super Highway Lesson
 
ITFT- Basic internet concept
ITFT- Basic internet conceptITFT- Basic internet concept
ITFT- Basic internet concept
 
Internet and its working (manu)
Internet and its working (manu)Internet and its working (manu)
Internet and its working (manu)
 
The internet and its function
The internet and its functionThe internet and its function
The internet and its function
 
Networking and internet
Networking and internetNetworking and internet
Networking and internet
 
E content internet
E   content internetE   content internet
E content internet
 
Internet & WWW
Internet & WWW Internet & WWW
Internet & WWW
 

En vedette

Peer Sim (P2P network)
Peer Sim (P2P network)Peer Sim (P2P network)
Peer Sim (P2P network)Sijo Emmanuel
 
English presentation (listening and speaking skills)
English presentation (listening and speaking skills)English presentation (listening and speaking skills)
English presentation (listening and speaking skills)Hijab Zahra
 
Presentation speaking and listening
Presentation  speaking and listeningPresentation  speaking and listening
Presentation speaking and listeningEdgar Lucero
 
Ip addressing
Ip addressingIp addressing
Ip addressingOnline
 
Listening and speaking skills
Listening and speaking skillsListening and speaking skills
Listening and speaking skillsanandlihinar
 
Internal parts of a computer and their functions
Internal parts of a computer and their functionsInternal parts of a computer and their functions
Internal parts of a computer and their functionsEmily-scamell
 
Switch mode power supply
Switch mode power supplySwitch mode power supply
Switch mode power supplyAnish Das
 
Computer Hardware
Computer HardwareComputer Hardware
Computer Hardwaredheeraj87
 
Internal components of the computer
Internal components of the computerInternal components of the computer
Internal components of the computerDanielAtkinson96
 

En vedette (13)

Peer Sim (P2P network)
Peer Sim (P2P network)Peer Sim (P2P network)
Peer Sim (P2P network)
 
Ports of Mother Board
Ports of Mother BoardPorts of Mother Board
Ports of Mother Board
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
English presentation (listening and speaking skills)
English presentation (listening and speaking skills)English presentation (listening and speaking skills)
English presentation (listening and speaking skills)
 
Presentation speaking and listening
Presentation  speaking and listeningPresentation  speaking and listening
Presentation speaking and listening
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Listening and speaking skills
Listening and speaking skillsListening and speaking skills
Listening and speaking skills
 
IP addressing
IP addressingIP addressing
IP addressing
 
Internal parts of a computer and their functions
Internal parts of a computer and their functionsInternal parts of a computer and their functions
Internal parts of a computer and their functions
 
Switch mode power supply
Switch mode power supplySwitch mode power supply
Switch mode power supply
 
Computer Hardware
Computer HardwareComputer Hardware
Computer Hardware
 
Internal components of the computer
Internal components of the computerInternal components of the computer
Internal components of the computer
 
Ip address
Ip addressIp address
Ip address
 

Similaire à P2p networks

Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptxHananShk
 
Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!DigitalThinkerHelp
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...Brenda Thomas
 
Computer Networks Module 1-part 1.pdf
Computer Networks Module 1-part 1.pdfComputer Networks Module 1-part 1.pdf
Computer Networks Module 1-part 1.pdfShanthalaKV
 
OttawaSubmission.072809
OttawaSubmission.072809OttawaSubmission.072809
OttawaSubmission.072809Eric Klinker
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internetTallat Satti
 
Legal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorentLegal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorentAltacit Global
 
Internet &web technology
 Internet &web technology Internet &web technology
Internet &web technologySharmila Devi
 
Peer to peer_v2pptx
Peer to peer_v2pptxPeer to peer_v2pptx
Peer to peer_v2pptxMac Pat
 
web world wide defination introduction.pptx
web world wide defination introduction.pptxweb world wide defination introduction.pptx
web world wide defination introduction.pptxubaidullah75790
 
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
CS8651   Internet Programming - Basics of HTML, HTML5, CSSCS8651   Internet Programming - Basics of HTML, HTML5, CSS
CS8651 Internet Programming - Basics of HTML, HTML5, CSSVigneshkumar Ponnusamy
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGijp2p
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGijp2p
 

Similaire à P2p networks (20)

Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptx
 
Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!
 
Peer to peer(p2 p)
Peer to peer(p2 p)Peer to peer(p2 p)
Peer to peer(p2 p)
 
gampong.pptx
gampong.pptxgampong.pptx
gampong.pptx
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
 
Computer Networks Module 1-part 1.pdf
Computer Networks Module 1-part 1.pdfComputer Networks Module 1-part 1.pdf
Computer Networks Module 1-part 1.pdf
 
OttawaSubmission.072809
OttawaSubmission.072809OttawaSubmission.072809
OttawaSubmission.072809
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
 
Computer networks
Computer networksComputer networks
Computer networks
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Chapter 3 network
Chapter 3 networkChapter 3 network
Chapter 3 network
 
Legal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorentLegal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorent
 
Internet &web technology
 Internet &web technology Internet &web technology
Internet &web technology
 
Peer to peer_v2pptx
Peer to peer_v2pptxPeer to peer_v2pptx
Peer to peer_v2pptx
 
web world wide defination introduction.pptx
web world wide defination introduction.pptxweb world wide defination introduction.pptx
web world wide defination introduction.pptx
 
Internet
InternetInternet
Internet
 
Peer to peer
Peer to peer Peer to peer
Peer to peer
 
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
CS8651   Internet Programming - Basics of HTML, HTML5, CSSCS8651   Internet Programming - Basics of HTML, HTML5, CSS
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
 

Plus de Shane Farrell

Plus de Shane Farrell (10)

Gold dofe presentation to show
Gold dofe presentation  to showGold dofe presentation  to show
Gold dofe presentation to show
 
Questionnaire
QuestionnaireQuestionnaire
Questionnaire
 
Evaluation Q 1
Evaluation Q 1Evaluation Q 1
Evaluation Q 1
 
Genre analysis
Genre analysisGenre analysis
Genre analysis
 
Media poster number 2
Media poster number 2Media poster number 2
Media poster number 2
 
Kendrick
Kendrick Kendrick
Kendrick
 
Digipaks media hw finished draft
Digipaks media hw finished draftDigipaks media hw finished draft
Digipaks media hw finished draft
 
Thriller of my Choice
Thriller of my ChoiceThriller of my Choice
Thriller of my Choice
 
Conventions of Thrillers
Conventions of ThrillersConventions of Thrillers
Conventions of Thrillers
 
Networking cadets
Networking cadetsNetworking cadets
Networking cadets
 

Dernier

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

P2p networks

  • 1.
  • 2. • P2P Stands for Peer to Peer • A network of personal computers, each of which acts as both client and sever, so that each can exchange files and email directly with every other computer on the network. • Each computer can access any of the others, although access can be restricted to those files that a computer's user chooses to make available. • P2P networking has generated tremendous interest worldwide among both Internet surfers and computer networking professionals. P2P software systems like Kazaa and Napster rank amongst the most popular software applications ever. Numerous businesses and Web sites have promoted "peer to peer" technology as the future of Internet networking.
  • 3.
  • 4. • Computers in a peer to peer network are typically situated physically near to each other and run similar networking protocols and software. Before home networking became popular, only small businesses and schools built peer to peer networks.
  • 5. • Most home computer networks today are peer to peer networks. Residential users configure their computers in peer workgroups to allow sharing of files, printers and other resources equally among all of the devices. • Both wired and wireless home networks qualify as peer to peer environments.
  • 6. • When most people hear the term "P2P", they think not of traditional peer networks, but rather peer to peer file sharing over the Internet. P2P file sharing systems have become the single most popular class of Internet applications in this decade. • A P2P network implements search and data transfer protocols above the Internet Protocol (IP). To access a P2P network, users simply download and install a suitable P2P client application. • Numerous P2P networks and P2P software applications exist. Some P2P applications work only with one P2P network, while others operate crossnetwork. Likewise, some P2P networks support only one application, while others support multiple applications.
  • 7. • You can configure computers in peer to peer workgroups to allow sharing of files, printers and other resources across all of the devices. Peer networks allow data to be shared easily in both directions, whether for downloads to your computer or uploads from your computer. • On the Internet, peer to peer networks handle a very high volume of file sharing traffic by distributing the load across many computers. • Essentially P2P Networks are a great way to connect and send resources to people in an easy way.
  • 8. • Unfortunately sometimes these information-sharing systems have been used to engage in illegal activity. Some of the most common crimes associated with Peer-to-Peer networks are the following: • Copyright Infringement: It is a violation of federal law to distribute copyrighted music, movies, software, games, and other works without authorization. There are important national economic consequences associated with such theft. • Computer Hacking: Peer-to-Peer networks also have been abused by hackers. Because these systems potentially expose your computer and files to millions of other users on the network, they also expose your computer to viruses. Also, if Peer-to-Peer software is not properly configured, you may be unknowingly opening up the contents of your entire hard drive for others to see and download your private information.
  • 9. • In the years ahead, expect the concept of P2P to continue evolving. The networking industry will introduce a wider range of peer to peer applications that should compete for attention with traditional desktop and client / server systems. P2P protocol standards will be adopted to a greater extent. Finally, the ramifications of free P2P application information sharing on copyright and intellectual property law will slowly be settled through the process of public debate.