SlideShare a Scribd company logo
1 of 9
• P2P Stands for Peer to Peer
• A network of personal computers, each of which acts as both
client and sever, so that each can exchange files and email
directly with every other computer on the network.
• Each computer can access any of the others, although access
can be restricted to those files that a computer's user chooses
to make available.
• P2P networking has generated tremendous interest
worldwide among both Internet surfers and computer
networking professionals. P2P software systems like Kazaa
and Napster rank amongst the most popular software
applications ever. Numerous businesses and Web sites have
promoted "peer to peer" technology as the future of Internet
networking.
• Computers in a peer to peer network are typically
situated physically near to each other and run similar
networking protocols and software. Before home
networking became popular, only small businesses
and schools built peer to peer networks.
• Most home computer networks today are peer to peer
networks. Residential users configure their computers in peer
workgroups to allow sharing of files, printers and other
resources equally among all of the devices.
• Both wired and wireless home networks qualify as peer to
peer environments.
• When most people hear the term "P2P", they think not of traditional peer
networks, but rather peer to peer file sharing over the Internet. P2P file
sharing systems have become the single most popular class of Internet
applications in this decade.
• A P2P network implements search and data transfer protocols above the
Internet Protocol (IP). To access a P2P network, users simply download
and install a suitable P2P client application.
• Numerous P2P networks and P2P software applications exist. Some P2P
applications work only with one P2P network, while others operate crossnetwork. Likewise, some P2P networks support only one application, while
others support multiple applications.
• You can configure computers in peer to peer workgroups to
allow sharing of files, printers and other resources across all
of the devices. Peer networks allow data to be shared easily in
both directions, whether for downloads to your computer or
uploads from your computer.
• On the Internet, peer to peer networks handle a very high
volume of file sharing traffic by distributing the load across
many computers.
• Essentially P2P Networks are a great way to connect and send
resources to people in an easy way.
• Unfortunately sometimes these information-sharing systems have been
used to engage in illegal activity. Some of the most common crimes
associated with Peer-to-Peer networks are the following:
• Copyright Infringement: It is a violation of federal law to distribute
copyrighted music, movies, software, games, and other works without
authorization. There are important national economic consequences
associated with such theft.
• Computer Hacking: Peer-to-Peer networks also have been abused by
hackers. Because these systems potentially expose your computer and
files to millions of other users on the network, they also expose your
computer to viruses. Also, if Peer-to-Peer software is not properly
configured, you may be unknowingly opening up the contents of your
entire hard drive for others to see and download your private information.
• In the years ahead, expect the concept of P2P to
continue evolving. The networking industry will
introduce a wider range of peer to peer
applications that should compete for attention
with traditional desktop and client / server
systems. P2P protocol standards will be adopted
to a greater extent. Finally, the ramifications of
free P2P application information sharing on
copyright and intellectual property law will slowly
be settled through the process of public debate.

More Related Content

What's hot

Internet ppt
Internet pptInternet ppt
Internet ppt
tej_vish
 
09 The Information Super Highway Lesson
09 The Information Super Highway Lesson09 The Information Super Highway Lesson
09 The Information Super Highway Lesson
Buffalo Seminary
 
Internet and its working (manu)
Internet and its working (manu)Internet and its working (manu)
Internet and its working (manu)
Manu Nair
 

What's hot (20)

Internet and WWW
Internet and WWWInternet and WWW
Internet and WWW
 
internet world, computer ppt
internet world, computer pptinternet world, computer ppt
internet world, computer ppt
 
Uses Of Internet In A Day To Day Life
Uses Of Internet In A Day To Day LifeUses Of Internet In A Day To Day Life
Uses Of Internet In A Day To Day Life
 
The Internet and Its Importance
The Internet and Its ImportanceThe Internet and Its Importance
The Internet and Its Importance
 
Internet ppt
Internet pptInternet ppt
Internet ppt
 
Internet and its uses
Internet and its usesInternet and its uses
Internet and its uses
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To Internet
 
Introduction to Internet By Anamika
Introduction to Internet By AnamikaIntroduction to Internet By Anamika
Introduction to Internet By Anamika
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Internet & www
Internet & wwwInternet & www
Internet & www
 
Internet and www
Internet and wwwInternet and www
Internet and www
 
Lab 3 internet & www
Lab 3   internet & wwwLab 3   internet & www
Lab 3 internet & www
 
Internet ppt
Internet pptInternet ppt
Internet ppt
 
09 The Information Super Highway Lesson
09 The Information Super Highway Lesson09 The Information Super Highway Lesson
09 The Information Super Highway Lesson
 
ITFT- Basic internet concept
ITFT- Basic internet conceptITFT- Basic internet concept
ITFT- Basic internet concept
 
Internet and its working (manu)
Internet and its working (manu)Internet and its working (manu)
Internet and its working (manu)
 
The internet and its function
The internet and its functionThe internet and its function
The internet and its function
 
Networking and internet
Networking and internetNetworking and internet
Networking and internet
 
E content internet
E   content internetE   content internet
E content internet
 
Internet & WWW
Internet & WWW Internet & WWW
Internet & WWW
 

Viewers also liked (13)

Peer Sim (P2P network)
Peer Sim (P2P network)Peer Sim (P2P network)
Peer Sim (P2P network)
 
Ports of Mother Board
Ports of Mother BoardPorts of Mother Board
Ports of Mother Board
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
English presentation (listening and speaking skills)
English presentation (listening and speaking skills)English presentation (listening and speaking skills)
English presentation (listening and speaking skills)
 
Presentation speaking and listening
Presentation  speaking and listeningPresentation  speaking and listening
Presentation speaking and listening
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Listening and speaking skills
Listening and speaking skillsListening and speaking skills
Listening and speaking skills
 
IP addressing
IP addressingIP addressing
IP addressing
 
Internal parts of a computer and their functions
Internal parts of a computer and their functionsInternal parts of a computer and their functions
Internal parts of a computer and their functions
 
Switch mode power supply
Switch mode power supplySwitch mode power supply
Switch mode power supply
 
Computer Hardware
Computer HardwareComputer Hardware
Computer Hardware
 
Internal components of the computer
Internal components of the computerInternal components of the computer
Internal components of the computer
 
Ip address
Ip addressIp address
Ip address
 

Similar to P2p networks

A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
Brenda Thomas
 
OttawaSubmission.072809
OttawaSubmission.072809OttawaSubmission.072809
OttawaSubmission.072809
Eric Klinker
 
Legal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorentLegal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorent
Altacit Global
 

Similar to P2p networks (20)

Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptx
 
Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!
 
Peer to peer(p2 p)
Peer to peer(p2 p)Peer to peer(p2 p)
Peer to peer(p2 p)
 
gampong.pptx
gampong.pptxgampong.pptx
gampong.pptx
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
 
Computer Networks Module 1-part 1.pdf
Computer Networks Module 1-part 1.pdfComputer Networks Module 1-part 1.pdf
Computer Networks Module 1-part 1.pdf
 
OttawaSubmission.072809
OttawaSubmission.072809OttawaSubmission.072809
OttawaSubmission.072809
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
 
Computer networks
Computer networksComputer networks
Computer networks
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Chapter 3 network
Chapter 3 networkChapter 3 network
Chapter 3 network
 
Legal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorentLegal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorent
 
Internet &web technology
 Internet &web technology Internet &web technology
Internet &web technology
 
Peer to peer_v2pptx
Peer to peer_v2pptxPeer to peer_v2pptx
Peer to peer_v2pptx
 
web world wide defination introduction.pptx
web world wide defination introduction.pptxweb world wide defination introduction.pptx
web world wide defination introduction.pptx
 
Internet
InternetInternet
Internet
 
Peer to peer
Peer to peer Peer to peer
Peer to peer
 
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
CS8651   Internet Programming - Basics of HTML, HTML5, CSSCS8651   Internet Programming - Basics of HTML, HTML5, CSS
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH  THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
 
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGFUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
 

More from Shane Farrell (10)

Gold dofe presentation to show
Gold dofe presentation  to showGold dofe presentation  to show
Gold dofe presentation to show
 
Questionnaire
QuestionnaireQuestionnaire
Questionnaire
 
Evaluation Q 1
Evaluation Q 1Evaluation Q 1
Evaluation Q 1
 
Genre analysis
Genre analysisGenre analysis
Genre analysis
 
Media poster number 2
Media poster number 2Media poster number 2
Media poster number 2
 
Kendrick
Kendrick Kendrick
Kendrick
 
Digipaks media hw finished draft
Digipaks media hw finished draftDigipaks media hw finished draft
Digipaks media hw finished draft
 
Thriller of my Choice
Thriller of my ChoiceThriller of my Choice
Thriller of my Choice
 
Conventions of Thrillers
Conventions of ThrillersConventions of Thrillers
Conventions of Thrillers
 
Networking cadets
Networking cadetsNetworking cadets
Networking cadets
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

P2p networks

  • 1.
  • 2. • P2P Stands for Peer to Peer • A network of personal computers, each of which acts as both client and sever, so that each can exchange files and email directly with every other computer on the network. • Each computer can access any of the others, although access can be restricted to those files that a computer's user chooses to make available. • P2P networking has generated tremendous interest worldwide among both Internet surfers and computer networking professionals. P2P software systems like Kazaa and Napster rank amongst the most popular software applications ever. Numerous businesses and Web sites have promoted "peer to peer" technology as the future of Internet networking.
  • 3.
  • 4. • Computers in a peer to peer network are typically situated physically near to each other and run similar networking protocols and software. Before home networking became popular, only small businesses and schools built peer to peer networks.
  • 5. • Most home computer networks today are peer to peer networks. Residential users configure their computers in peer workgroups to allow sharing of files, printers and other resources equally among all of the devices. • Both wired and wireless home networks qualify as peer to peer environments.
  • 6. • When most people hear the term "P2P", they think not of traditional peer networks, but rather peer to peer file sharing over the Internet. P2P file sharing systems have become the single most popular class of Internet applications in this decade. • A P2P network implements search and data transfer protocols above the Internet Protocol (IP). To access a P2P network, users simply download and install a suitable P2P client application. • Numerous P2P networks and P2P software applications exist. Some P2P applications work only with one P2P network, while others operate crossnetwork. Likewise, some P2P networks support only one application, while others support multiple applications.
  • 7. • You can configure computers in peer to peer workgroups to allow sharing of files, printers and other resources across all of the devices. Peer networks allow data to be shared easily in both directions, whether for downloads to your computer or uploads from your computer. • On the Internet, peer to peer networks handle a very high volume of file sharing traffic by distributing the load across many computers. • Essentially P2P Networks are a great way to connect and send resources to people in an easy way.
  • 8. • Unfortunately sometimes these information-sharing systems have been used to engage in illegal activity. Some of the most common crimes associated with Peer-to-Peer networks are the following: • Copyright Infringement: It is a violation of federal law to distribute copyrighted music, movies, software, games, and other works without authorization. There are important national economic consequences associated with such theft. • Computer Hacking: Peer-to-Peer networks also have been abused by hackers. Because these systems potentially expose your computer and files to millions of other users on the network, they also expose your computer to viruses. Also, if Peer-to-Peer software is not properly configured, you may be unknowingly opening up the contents of your entire hard drive for others to see and download your private information.
  • 9. • In the years ahead, expect the concept of P2P to continue evolving. The networking industry will introduce a wider range of peer to peer applications that should compete for attention with traditional desktop and client / server systems. P2P protocol standards will be adopted to a greater extent. Finally, the ramifications of free P2P application information sharing on copyright and intellectual property law will slowly be settled through the process of public debate.