SlideShare a Scribd company logo
1 of 20
INTERCOM PROGRAMMING
AND MANUFACTURING
COMPANY(IPMC)
PROJECT TITLE:
DESIGN AND IMPLEMENTATION OF PEER TO
PEER NETWORK FOR FILE SHARING
BY: ISAAC KWADWO AMPOFO
SUPERVISED BY:MR. KWAME DARKO
OUTLINE
CHAPTER ONE
 Background Of Study
 Objective Of Study
 Importance Of Study
CHAPTER TWO(LITERATURE REVIEW)
 The History of a Peer to Peer Network
 Characteristics of peer to peer network
 Classification of peer to peer network
 CHAPTER THREE( DESIGNING)
 LAN Equipment
 Laptops interconnecting with a hub
Background of Study
 Peer To Peer Network
 File Sharing
OBJECTIVES OF STUDY
 To enable network computers to communicate without the need for a
centralized server.
 To allow communication between two or more network computers.
IMPORTANCE OF STUDY
 To provide a way for transmitting files (data / video) from one system to
another, or from one system to a group of systems connected to a hub or via
an Ethernet straight-through cable.
The History of a Peer to Peer Network
 The majority of file transfers took place over landline telephones, with FTP
and USENET gaining popularity along the way, and the IRC being invented in
1988
 It's safe to say that peer-to-peer networks forever altered the internet. P2P
networks were estimated to account for more than 70% of all traffic flowing
across the internet at their peak in 2006.
Characteristics of peer to peer network
 Peer-to-peer networks are typically comprised of groups of a dozen or fewer
computers.
 Peer-to-peer networks have nodes that both consume and provide resources.
 P2P networks were created primarily to share data such as videos, music,
software, and so on.
Classification of peer to peer network
 Structured peer to peer network
 Unstructured peer to peer network
LAN Equipment
 A local area network (LAN) is a network of computers connected by cable
within a specific geographic area. Local area networks (LANs) are proprietary
systems with a limited number of users.
 Bridge
 Hub
 Router
 Switch
Laptops interconnecting with a hub
 The image above shows Laptops 0 and 1 connecting to a hub with IP addresses
already assigned to them. Because they are all connected to the same
network, the two laptops can communicate and share information with one
another
Component Description
 TCP/IP (Transmission Control Protocol / Internet Protocol) is the primary
protocol used by computers to connect and communicate with one another.
 Devices must be connected to the same network by sharing IP addresses, a
subnet mask, and a gateway.
Training of staff
 Before installing the new method, it is critical to create a training routine for
the staff.
 Understanding new software is essential for system implementation, whether
you will be working with it or not.
System Testing
 Information for live testing should be prepared for the suggested system's
design presentation.
 It is also necessary to develop the suggested system's procedure in order to
examine means and ability of the staff to manage the suggested system's
function.
System Change Over
 This is referred to as a parallel change over, and it involves both the new and
old systems operating synchronously until you are certain that the new system
is operating effectively or without risk
System Review and Maintenance
 The system should be reviewed and maintained on a regular basis to provide a
sustainable business .
Documentation
 Security should be prioritized in all aspects of a system administrator's work.
The System Admins must perform all actions in a secure manner.
Conclusion
 It validates security connectivity, provides sufficient security to data
generated, and is highly dependable and reliable.
 Over many generations, countless companies have used secure wire networks
to leverage the power of computers
Recommendation
 Staff handling the system should receive extensive training to ensure
efficiency and letter work performance in order to capture the facilities
provided by the system to achieve desired results.
THANK YOU

More Related Content

What's hot

Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentalsjpprakash
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking FundamentalsUMA MAHESWARI
 
1 introduction to-networking
1 introduction to-networking1 introduction to-networking
1 introduction to-networkingNor Zailani
 
Computer network Report
Computer network ReportComputer network Report
Computer network ReportAmitoj Kaur
 
Chapter 1 computer networking Class 12th
Chapter 1 computer networking Class 12thChapter 1 computer networking Class 12th
Chapter 1 computer networking Class 12thHarsh Mathur
 
Networking Basics and Cisco
Networking Basics and CiscoNetworking Basics and Cisco
Networking Basics and CiscoShoaib Iqbal
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking FundamentalsManjit Chavda
 
Basics Of Comuter Networking
Basics Of Comuter NetworkingBasics Of Comuter Networking
Basics Of Comuter Networkinganishgoel
 
Presentation On Computer Network
Presentation On Computer NetworkPresentation On Computer Network
Presentation On Computer NetworkAvinash Ranjan
 
TLE 10 (ICT): Basic Concepts on Computer Networks
TLE 10 (ICT): Basic Concepts on Computer NetworksTLE 10 (ICT): Basic Concepts on Computer Networks
TLE 10 (ICT): Basic Concepts on Computer NetworksRomne Ryan Portacion
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies Shamima Akther
 
Computer Networking 101
Computer Networking 101Computer Networking 101
Computer Networking 101Sameer Mahajan
 

What's hot (20)

Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
1 introduction to-networking
1 introduction to-networking1 introduction to-networking
1 introduction to-networking
 
Computer network Report
Computer network ReportComputer network Report
Computer network Report
 
Chapter 1 computer networking Class 12th
Chapter 1 computer networking Class 12thChapter 1 computer networking Class 12th
Chapter 1 computer networking Class 12th
 
Networking Basics and Cisco
Networking Basics and CiscoNetworking Basics and Cisco
Networking Basics and Cisco
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 
Basics Of Comuter Networking
Basics Of Comuter NetworkingBasics Of Comuter Networking
Basics Of Comuter Networking
 
Networking
NetworkingNetworking
Networking
 
Presentation On Computer Network
Presentation On Computer NetworkPresentation On Computer Network
Presentation On Computer Network
 
Firewall
FirewallFirewall
Firewall
 
Networking Basic and Cisco History
Networking Basic and Cisco History Networking Basic and Cisco History
Networking Basic and Cisco History
 
Advance Networking Course Details PPT
Advance Networking Course Details PPTAdvance Networking Course Details PPT
Advance Networking Course Details PPT
 
The basics of computer networking
The basics of computer networkingThe basics of computer networking
The basics of computer networking
 
TLE 10 (ICT): Basic Concepts on Computer Networks
TLE 10 (ICT): Basic Concepts on Computer NetworksTLE 10 (ICT): Basic Concepts on Computer Networks
TLE 10 (ICT): Basic Concepts on Computer Networks
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies
 
Computer Networking 101
Computer Networking 101Computer Networking 101
Computer Networking 101
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Computer network
Computer networkComputer network
Computer network
 

Similar to DESIGN AND IMPLEMENTATION OF PEER TO PEER NETWORK FOR FILE SHARING.pptx

Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XIIDeepak Singh
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And TelecommunicationsUMaine
 
DCN notes adi
DCN notes adiDCN notes adi
DCN notes adiAdiseshaK
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkammulu99
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialRodel Morales
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorialajaymane22
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networkingshankars73
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networkingisma ishak
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialreddydivakara
 
541ferdon networktutorial
541ferdon networktutorial541ferdon networktutorial
541ferdon networktutorialSusan Ferdon
 

Similar to DESIGN AND IMPLEMENTATION OF PEER TO PEER NETWORK FOR FILE SHARING.pptx (20)

Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
DCN notes adi
DCN notes adiDCN notes adi
DCN notes adi
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Cn
CnCn
Cn
 
Cnetworks
CnetworksCnetworks
Cnetworks
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
 
Networking fundamentalsss
Networking fundamentalsssNetworking fundamentalsss
Networking fundamentalsss
 
Ccna report
Ccna reportCcna report
Ccna report
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
 
Computer networks
Computer networks   Computer networks
Computer networks
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
 
Networking
NetworkingNetworking
Networking
 
Hardware1
Hardware1Hardware1
Hardware1
 
Hardware1
Hardware1Hardware1
Hardware1
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
541ferdon networktutorial
541ferdon networktutorial541ferdon networktutorial
541ferdon networktutorial
 

Recently uploaded

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

DESIGN AND IMPLEMENTATION OF PEER TO PEER NETWORK FOR FILE SHARING.pptx

  • 2. PROJECT TITLE: DESIGN AND IMPLEMENTATION OF PEER TO PEER NETWORK FOR FILE SHARING BY: ISAAC KWADWO AMPOFO SUPERVISED BY:MR. KWAME DARKO
  • 3. OUTLINE CHAPTER ONE  Background Of Study  Objective Of Study  Importance Of Study CHAPTER TWO(LITERATURE REVIEW)  The History of a Peer to Peer Network  Characteristics of peer to peer network  Classification of peer to peer network  CHAPTER THREE( DESIGNING)  LAN Equipment  Laptops interconnecting with a hub
  • 4. Background of Study  Peer To Peer Network  File Sharing
  • 5. OBJECTIVES OF STUDY  To enable network computers to communicate without the need for a centralized server.  To allow communication between two or more network computers.
  • 6. IMPORTANCE OF STUDY  To provide a way for transmitting files (data / video) from one system to another, or from one system to a group of systems connected to a hub or via an Ethernet straight-through cable.
  • 7. The History of a Peer to Peer Network  The majority of file transfers took place over landline telephones, with FTP and USENET gaining popularity along the way, and the IRC being invented in 1988  It's safe to say that peer-to-peer networks forever altered the internet. P2P networks were estimated to account for more than 70% of all traffic flowing across the internet at their peak in 2006.
  • 8. Characteristics of peer to peer network  Peer-to-peer networks are typically comprised of groups of a dozen or fewer computers.  Peer-to-peer networks have nodes that both consume and provide resources.  P2P networks were created primarily to share data such as videos, music, software, and so on.
  • 9. Classification of peer to peer network  Structured peer to peer network  Unstructured peer to peer network
  • 10. LAN Equipment  A local area network (LAN) is a network of computers connected by cable within a specific geographic area. Local area networks (LANs) are proprietary systems with a limited number of users.  Bridge  Hub  Router  Switch
  • 11. Laptops interconnecting with a hub  The image above shows Laptops 0 and 1 connecting to a hub with IP addresses already assigned to them. Because they are all connected to the same network, the two laptops can communicate and share information with one another
  • 12. Component Description  TCP/IP (Transmission Control Protocol / Internet Protocol) is the primary protocol used by computers to connect and communicate with one another.  Devices must be connected to the same network by sharing IP addresses, a subnet mask, and a gateway.
  • 13. Training of staff  Before installing the new method, it is critical to create a training routine for the staff.  Understanding new software is essential for system implementation, whether you will be working with it or not.
  • 14. System Testing  Information for live testing should be prepared for the suggested system's design presentation.  It is also necessary to develop the suggested system's procedure in order to examine means and ability of the staff to manage the suggested system's function.
  • 15. System Change Over  This is referred to as a parallel change over, and it involves both the new and old systems operating synchronously until you are certain that the new system is operating effectively or without risk
  • 16. System Review and Maintenance  The system should be reviewed and maintained on a regular basis to provide a sustainable business .
  • 17. Documentation  Security should be prioritized in all aspects of a system administrator's work. The System Admins must perform all actions in a secure manner.
  • 18. Conclusion  It validates security connectivity, provides sufficient security to data generated, and is highly dependable and reliable.  Over many generations, countless companies have used secure wire networks to leverage the power of computers
  • 19. Recommendation  Staff handling the system should receive extensive training to ensure efficiency and letter work performance in order to capture the facilities provided by the system to achieve desired results.