2. PROJECT TITLE:
DESIGN AND IMPLEMENTATION OF PEER TO
PEER NETWORK FOR FILE SHARING
BY: ISAAC KWADWO AMPOFO
SUPERVISED BY:MR. KWAME DARKO
3. OUTLINE
CHAPTER ONE
Background Of Study
Objective Of Study
Importance Of Study
CHAPTER TWO(LITERATURE REVIEW)
The History of a Peer to Peer Network
Characteristics of peer to peer network
Classification of peer to peer network
CHAPTER THREE( DESIGNING)
LAN Equipment
Laptops interconnecting with a hub
5. OBJECTIVES OF STUDY
To enable network computers to communicate without the need for a
centralized server.
To allow communication between two or more network computers.
6. IMPORTANCE OF STUDY
To provide a way for transmitting files (data / video) from one system to
another, or from one system to a group of systems connected to a hub or via
an Ethernet straight-through cable.
7. The History of a Peer to Peer Network
The majority of file transfers took place over landline telephones, with FTP
and USENET gaining popularity along the way, and the IRC being invented in
1988
It's safe to say that peer-to-peer networks forever altered the internet. P2P
networks were estimated to account for more than 70% of all traffic flowing
across the internet at their peak in 2006.
8. Characteristics of peer to peer network
Peer-to-peer networks are typically comprised of groups of a dozen or fewer
computers.
Peer-to-peer networks have nodes that both consume and provide resources.
P2P networks were created primarily to share data such as videos, music,
software, and so on.
9. Classification of peer to peer network
Structured peer to peer network
Unstructured peer to peer network
10. LAN Equipment
A local area network (LAN) is a network of computers connected by cable
within a specific geographic area. Local area networks (LANs) are proprietary
systems with a limited number of users.
Bridge
Hub
Router
Switch
11. Laptops interconnecting with a hub
The image above shows Laptops 0 and 1 connecting to a hub with IP addresses
already assigned to them. Because they are all connected to the same
network, the two laptops can communicate and share information with one
another
12. Component Description
TCP/IP (Transmission Control Protocol / Internet Protocol) is the primary
protocol used by computers to connect and communicate with one another.
Devices must be connected to the same network by sharing IP addresses, a
subnet mask, and a gateway.
13. Training of staff
Before installing the new method, it is critical to create a training routine for
the staff.
Understanding new software is essential for system implementation, whether
you will be working with it or not.
14. System Testing
Information for live testing should be prepared for the suggested system's
design presentation.
It is also necessary to develop the suggested system's procedure in order to
examine means and ability of the staff to manage the suggested system's
function.
15. System Change Over
This is referred to as a parallel change over, and it involves both the new and
old systems operating synchronously until you are certain that the new system
is operating effectively or without risk
16. System Review and Maintenance
The system should be reviewed and maintained on a regular basis to provide a
sustainable business .
17. Documentation
Security should be prioritized in all aspects of a system administrator's work.
The System Admins must perform all actions in a secure manner.
18. Conclusion
It validates security connectivity, provides sufficient security to data
generated, and is highly dependable and reliable.
Over many generations, countless companies have used secure wire networks
to leverage the power of computers
19. Recommendation
Staff handling the system should receive extensive training to ensure
efficiency and letter work performance in order to capture the facilities
provided by the system to achieve desired results.