SlideShare ist ein Scribd-Unternehmen logo
1 von 9
• P2P Stands for Peer to Peer
• A network of personal computers, each of which acts as both
client and sever, so that each can exchange files and email
directly with every other computer on the network.
• Each computer can access any of the others, although access
can be restricted to those files that a computer's user chooses
to make available.
• P2P networking has generated tremendous interest
worldwide among both Internet surfers and computer
networking professionals. P2P software systems like Kazaa
and Napster rank amongst the most popular software
applications ever. Numerous businesses and Web sites have
promoted "peer to peer" technology as the future of Internet
networking.
• Computers in a peer to peer network are typically
situated physically near to each other and run similar
networking protocols and software. Before home
networking became popular, only small businesses
and schools built peer to peer networks.
• Most home computer networks today are peer to peer
networks. Residential users configure their computers in peer
workgroups to allow sharing of files, printers and other
resources equally among all of the devices.
• Both wired and wireless home networks qualify as peer to
peer environments.
• When most people hear the term "P2P", they think not of traditional peer
networks, but rather peer to peer file sharing over the Internet. P2P file
sharing systems have become the single most popular class of Internet
applications in this decade.
• A P2P network implements search and data transfer protocols above the
Internet Protocol (IP). To access a P2P network, users simply download
and install a suitable P2P client application.
• Numerous P2P networks and P2P software applications exist. Some P2P
applications work only with one P2P network, while others operate crossnetwork. Likewise, some P2P networks support only one application, while
others support multiple applications.
• You can configure computers in peer to peer workgroups to
allow sharing of files, printers and other resources across all
of the devices. Peer networks allow data to be shared easily in
both directions, whether for downloads to your computer or
uploads from your computer.
• On the Internet, peer to peer networks handle a very high
volume of file sharing traffic by distributing the load across
many computers.
• Essentially P2P Networks are a great way to connect and send
resources to people in an easy way.
• Unfortunately sometimes these information-sharing systems have been
used to engage in illegal activity. Some of the most common crimes
associated with Peer-to-Peer networks are the following:
• Copyright Infringement: It is a violation of federal law to distribute
copyrighted music, movies, software, games, and other works without
authorization. There are important national economic consequences
associated with such theft.
• Computer Hacking: Peer-to-Peer networks also have been abused by
hackers. Because these systems potentially expose your computer and
files to millions of other users on the network, they also expose your
computer to viruses. Also, if Peer-to-Peer software is not properly
configured, you may be unknowingly opening up the contents of your
entire hard drive for others to see and download your private information.
• In the years ahead, expect the concept of P2P to
continue evolving. The networking industry will
introduce a wider range of peer to peer
applications that should compete for attention
with traditional desktop and client / server
systems. P2P protocol standards will be adopted
to a greater extent. Finally, the ramifications of
free P2P application information sharing on
copyright and intellectual property law will slowly
be settled through the process of public debate.

Weitere ähnliche Inhalte

Was ist angesagt?

Internet and WWW
Internet and WWWInternet and WWW
Internet and WWW
iqra_chaudry
 
Internet ppt
Internet pptInternet ppt
Internet ppt
tej_vish
 
09 The Information Super Highway Lesson
09 The Information Super Highway Lesson09 The Information Super Highway Lesson
09 The Information Super Highway Lesson
Buffalo Seminary
 
Internet and its working (manu)
Internet and its working (manu)Internet and its working (manu)
Internet and its working (manu)
Manu Nair
 

Was ist angesagt? (20)

Internet and WWW
Internet and WWWInternet and WWW
Internet and WWW
 
internet world, computer ppt
internet world, computer pptinternet world, computer ppt
internet world, computer ppt
 
Uses Of Internet In A Day To Day Life
Uses Of Internet In A Day To Day LifeUses Of Internet In A Day To Day Life
Uses Of Internet In A Day To Day Life
 
The Internet and Its Importance
The Internet and Its ImportanceThe Internet and Its Importance
The Internet and Its Importance
 
Internet ppt
Internet pptInternet ppt
Internet ppt
 
Internet and its uses
Internet and its usesInternet and its uses
Internet and its uses
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To Internet
 
Introduction to Internet By Anamika
Introduction to Internet By AnamikaIntroduction to Internet By Anamika
Introduction to Internet By Anamika
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Internet & www
Internet & wwwInternet & www
Internet & www
 
Internet and www
Internet and wwwInternet and www
Internet and www
 
Lab 3 internet & www
Lab 3   internet & wwwLab 3   internet & www
Lab 3 internet & www
 
Internet ppt
Internet pptInternet ppt
Internet ppt
 
09 The Information Super Highway Lesson
09 The Information Super Highway Lesson09 The Information Super Highway Lesson
09 The Information Super Highway Lesson
 
ITFT- Basic internet concept
ITFT- Basic internet conceptITFT- Basic internet concept
ITFT- Basic internet concept
 
Internet and its working (manu)
Internet and its working (manu)Internet and its working (manu)
Internet and its working (manu)
 
The internet and its function
The internet and its functionThe internet and its function
The internet and its function
 
Networking and internet
Networking and internetNetworking and internet
Networking and internet
 
E content internet
E   content internetE   content internet
E content internet
 
Internet & WWW
Internet & WWW Internet & WWW
Internet & WWW
 

Andere mochten auch (13)

Peer Sim (P2P network)
Peer Sim (P2P network)Peer Sim (P2P network)
Peer Sim (P2P network)
 
Ports of Mother Board
Ports of Mother BoardPorts of Mother Board
Ports of Mother Board
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
English presentation (listening and speaking skills)
English presentation (listening and speaking skills)English presentation (listening and speaking skills)
English presentation (listening and speaking skills)
 
Presentation speaking and listening
Presentation  speaking and listeningPresentation  speaking and listening
Presentation speaking and listening
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Listening and speaking skills
Listening and speaking skillsListening and speaking skills
Listening and speaking skills
 
IP addressing
IP addressingIP addressing
IP addressing
 
Internal parts of a computer and their functions
Internal parts of a computer and their functionsInternal parts of a computer and their functions
Internal parts of a computer and their functions
 
Switch mode power supply
Switch mode power supplySwitch mode power supply
Switch mode power supply
 
Computer Hardware
Computer HardwareComputer Hardware
Computer Hardware
 
Internal components of the computer
Internal components of the computerInternal components of the computer
Internal components of the computer
 
Ip address
Ip addressIp address
Ip address
 

Ähnlich wie P2p networks

Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptx
HananShk
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
Brenda Thomas
 
OttawaSubmission.072809
OttawaSubmission.072809OttawaSubmission.072809
OttawaSubmission.072809
Eric Klinker
 
Chapter 3 network
Chapter 3 networkChapter 3 network
Chapter 3 network
francesco1993
 
Legal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorentLegal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorent
Altacit Global
 
web world wide defination introduction.pptx
web world wide defination introduction.pptxweb world wide defination introduction.pptx
web world wide defination introduction.pptx
ubaidullah75790
 

Ähnlich wie P2p networks (20)

Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptx
 
Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!
 
Peer to peer(p2 p)
Peer to peer(p2 p)Peer to peer(p2 p)
Peer to peer(p2 p)
 
gampong.pptx
gampong.pptxgampong.pptx
gampong.pptx
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
 
Computer Networks Module 1-part 1.pdf
Computer Networks Module 1-part 1.pdfComputer Networks Module 1-part 1.pdf
Computer Networks Module 1-part 1.pdf
 
OttawaSubmission.072809
OttawaSubmission.072809OttawaSubmission.072809
OttawaSubmission.072809
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
 
Computer networks
Computer networksComputer networks
Computer networks
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Chapter 3 network
Chapter 3 networkChapter 3 network
Chapter 3 network
 
Legal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorentLegal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorent
 
Internet &web technology
 Internet &web technology Internet &web technology
Internet &web technology
 
Peer to peer_v2pptx
Peer to peer_v2pptxPeer to peer_v2pptx
Peer to peer_v2pptx
 
web world wide defination introduction.pptx
web world wide defination introduction.pptxweb world wide defination introduction.pptx
web world wide defination introduction.pptx
 
Internet
InternetInternet
Internet
 
Peer to peer
Peer to peer Peer to peer
Peer to peer
 
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
CS8651   Internet Programming - Basics of HTML, HTML5, CSSCS8651   Internet Programming - Basics of HTML, HTML5, CSS
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
 

Mehr von Shane Farrell (10)

Gold dofe presentation to show
Gold dofe presentation  to showGold dofe presentation  to show
Gold dofe presentation to show
 
Questionnaire
QuestionnaireQuestionnaire
Questionnaire
 
Evaluation Q 1
Evaluation Q 1Evaluation Q 1
Evaluation Q 1
 
Genre analysis
Genre analysisGenre analysis
Genre analysis
 
Media poster number 2
Media poster number 2Media poster number 2
Media poster number 2
 
Kendrick
Kendrick Kendrick
Kendrick
 
Digipaks media hw finished draft
Digipaks media hw finished draftDigipaks media hw finished draft
Digipaks media hw finished draft
 
Thriller of my Choice
Thriller of my ChoiceThriller of my Choice
Thriller of my Choice
 
Conventions of Thrillers
Conventions of ThrillersConventions of Thrillers
Conventions of Thrillers
 
Networking cadets
Networking cadetsNetworking cadets
Networking cadets
 

KĂźrzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

KĂźrzlich hochgeladen (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

P2p networks

  • 1.
  • 2. • P2P Stands for Peer to Peer • A network of personal computers, each of which acts as both client and sever, so that each can exchange files and email directly with every other computer on the network. • Each computer can access any of the others, although access can be restricted to those files that a computer's user chooses to make available. • P2P networking has generated tremendous interest worldwide among both Internet surfers and computer networking professionals. P2P software systems like Kazaa and Napster rank amongst the most popular software applications ever. Numerous businesses and Web sites have promoted "peer to peer" technology as the future of Internet networking.
  • 3.
  • 4. • Computers in a peer to peer network are typically situated physically near to each other and run similar networking protocols and software. Before home networking became popular, only small businesses and schools built peer to peer networks.
  • 5. • Most home computer networks today are peer to peer networks. Residential users configure their computers in peer workgroups to allow sharing of files, printers and other resources equally among all of the devices. • Both wired and wireless home networks qualify as peer to peer environments.
  • 6. • When most people hear the term "P2P", they think not of traditional peer networks, but rather peer to peer file sharing over the Internet. P2P file sharing systems have become the single most popular class of Internet applications in this decade. • A P2P network implements search and data transfer protocols above the Internet Protocol (IP). To access a P2P network, users simply download and install a suitable P2P client application. • Numerous P2P networks and P2P software applications exist. Some P2P applications work only with one P2P network, while others operate crossnetwork. Likewise, some P2P networks support only one application, while others support multiple applications.
  • 7. • You can configure computers in peer to peer workgroups to allow sharing of files, printers and other resources across all of the devices. Peer networks allow data to be shared easily in both directions, whether for downloads to your computer or uploads from your computer. • On the Internet, peer to peer networks handle a very high volume of file sharing traffic by distributing the load across many computers. • Essentially P2P Networks are a great way to connect and send resources to people in an easy way.
  • 8. • Unfortunately sometimes these information-sharing systems have been used to engage in illegal activity. Some of the most common crimes associated with Peer-to-Peer networks are the following: • Copyright Infringement: It is a violation of federal law to distribute copyrighted music, movies, software, games, and other works without authorization. There are important national economic consequences associated with such theft. • Computer Hacking: Peer-to-Peer networks also have been abused by hackers. Because these systems potentially expose your computer and files to millions of other users on the network, they also expose your computer to viruses. Also, if Peer-to-Peer software is not properly configured, you may be unknowingly opening up the contents of your entire hard drive for others to see and download your private information.
  • 9. • In the years ahead, expect the concept of P2P to continue evolving. The networking industry will introduce a wider range of peer to peer applications that should compete for attention with traditional desktop and client / server systems. P2P protocol standards will be adopted to a greater extent. Finally, the ramifications of free P2P application information sharing on copyright and intellectual property law will slowly be settled through the process of public debate.