SlideShare a Scribd company logo
Peer-to-Peer
Networks
A brief Overview of Creating a Simple
Peer-to-Peer network
What is a Peer-to-Peer Network?
•A peer-to-peer network is a network of computers that
are of the same capacity and there is no dedicated
server.
•All computers are equal hence the term peers and each
computer can act as a client and a server
•They are convenient for easy sharing of resources
4/23/2014 Prepared by Nkosinathi Lungu 2
Advantages of a Peer-to-Peer Network
•Contents and resources on computer can be equally
shared
•Efficient for multipoint communication
•More reliable than a single server
•Easy access to all resources on the network
4/23/2014 Prepared by Nkosinathi Lungu 3
Creating a simple Peer-to-Peer
Network
There are several steps that are involved in
creating a simple peer-to-peer network as
shown below.
Installing Network Cards
• Some computers will come with network ports but if not you
need to install network interface cards on the computers.
• You first install the drivers then restart the machine
• Turn off the computer and open it then put the network card
on one of the Peripheral Component Interconnect (PCI) slots
• When you power the computer on the BIOS should
automatically detect the new hardware
4/23/2014 Prepared by Nkosinathi Lungu 5
Link to the Switch
• A Switch is used to connect all the devices as they will work
as peers and feed off each other.
• To connect the devices to the switch Straight Through cables
are used since the devices are not similar
• Straight Through cables have similar color combinations all
the way e.g. 568A or 568B
4/23/2014 Prepared by Nkosinathi Lungu 6
Assigning Internet Protocol (I.P) Addresses
• When the devices are connected then its time to assign
Internet Protocol (IP) addresses
• IP addresses are assigned to each device on the network so
that its easier to send messages between devices.
• When you enter the IP address the subnet mask will be
entered automatically.
4/23/2014 Prepared by Nkosinathi Lungu 7
Creating a Work Group
• After successful assignment of IP addresses then you can
name the workgroup
• Workgroup names are a way to distinguish the peer-to-peer
network from other peer-to-peer networks on the same
network.
• Workgroups provide easy sharing of files and resources
• Workgroups are used in smaller networks like homes or small
businesses, bigger organizations are better using domains.
4/23/2014 Prepared by Nkosinathi Lungu 8
Adding a Printer to the network
• A printer can be connected to any of the computers on the
network.
• Then right click on the printer and under properties select
share this device
• You should now be able to see the printer on any of the
computers in the workgroup
4/23/2014 Prepared by Nkosinathi Lungu 9
Conclusion
•A Peer-to-Peer network is ideal for home use or small
businesses.
•They are cheaper to set up than client server networks
•They are better for data retention since all computers
will share the same data if one machine fails the other
machines will still retain the data.
4/23/2014 Prepared by Nkosinathi Lungu 10

More Related Content

What's hot

TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
Ramesh Giri
 
NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTS
bwire sedrick
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
Ankur Kumar
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
Manjit Chavda
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
Atharaw Deshmukh
 
Introduction to Data Communication
Introduction to Data CommunicationIntroduction to Data Communication
Introduction to Data Communication
Kamal Acharya
 
Network components
Network componentsNetwork components
Network componentsAnas Karzoun
 
Cable crimping
Cable crimpingCable crimping
Cable crimping
Pratik Vyas
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcast
NetProtocol Xpert
 
Network Interface Card
Network Interface CardNetwork Interface Card
Network Interface Card
sourabh4u07
 
Computer Network
Computer NetworkComputer Network
Computer Network
Coky Fauzi Alfi
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and router
Akmal Cikmat
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
Dineesha Suraweera
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
vasanthimuniasamy
 
Internet protocol
Internet protocol Internet protocol
Internet protocol
Bint Javed
 
TCP/IP and UDP protocols
TCP/IP and UDP protocolsTCP/IP and UDP protocols
TCP/IP and UDP protocols
Dawood Faheem Abbasi
 
Computer networks chapter1
Computer networks chapter1Computer networks chapter1
Computer networks chapter1
kirankumar boidhapu
 
Chapter03 Creating And Managing User Accounts
Chapter03      Creating And  Managing  User  AccountsChapter03      Creating And  Managing  User  Accounts
Chapter03 Creating And Managing User AccountsRaja Waseem Akhtar
 
peer to peer and client server model
peer to peer and client server modelpeer to peer and client server model
peer to peer and client server model
Bharath Nair
 
Network servers
Network serversNetwork servers
Network servers
Online
 

What's hot (20)

TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTS
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Introduction to Data Communication
Introduction to Data CommunicationIntroduction to Data Communication
Introduction to Data Communication
 
Network components
Network componentsNetwork components
Network components
 
Cable crimping
Cable crimpingCable crimping
Cable crimping
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcast
 
Network Interface Card
Network Interface CardNetwork Interface Card
Network Interface Card
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and router
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
 
Internet protocol
Internet protocol Internet protocol
Internet protocol
 
TCP/IP and UDP protocols
TCP/IP and UDP protocolsTCP/IP and UDP protocols
TCP/IP and UDP protocols
 
Computer networks chapter1
Computer networks chapter1Computer networks chapter1
Computer networks chapter1
 
Chapter03 Creating And Managing User Accounts
Chapter03      Creating And  Managing  User  AccountsChapter03      Creating And  Managing  User  Accounts
Chapter03 Creating And Managing User Accounts
 
peer to peer and client server model
peer to peer and client server modelpeer to peer and client server model
peer to peer and client server model
 
Network servers
Network serversNetwork servers
Network servers
 

Viewers also liked

Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks
Nicola Cerami
 
Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Venkatesh Iyer
 
Peer to peer network schemes and finding algorithms
Peer to peer network schemes and finding algorithmsPeer to peer network schemes and finding algorithms
Peer to peer network schemes and finding algorithms
Mohamed El Sharnoby
 
Online Peer Influence and Social Networking Site Usage
Online Peer Influence and Social Networking Site UsageOnline Peer Influence and Social Networking Site Usage
Online Peer Influence and Social Networking Site UsageElisa H
 
Creating peer to peer network nadia perandos bisnar
Creating peer to peer network nadia perandos bisnarCreating peer to peer network nadia perandos bisnar
Creating peer to peer network nadia perandos bisnar
Perla Pelicano Corpez
 
P2p Peer To Peer Introduction
P2p Peer To Peer IntroductionP2p Peer To Peer Introduction
P2p Peer To Peer Introduction
venkatesh munirathinam
 
Ch 8 Client Server
Ch 8  Client  ServerCh 8  Client  Server
Ch 8 Client Serverguest8fdbdd
 
Peer-to-Peer Systems
Peer-to-Peer SystemsPeer-to-Peer Systems
Peer-to-Peer Systems
Uwe Schmidt
 
Peer to peer system
Peer to peer systemPeer to peer system
Peer to peer system
Jahanzaib Niazi
 
Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver PresentationTuhin_Das
 
Human body systems for kids
Human body systems for kidsHuman body systems for kids
Human body systems for kidsMake Megenius
 
P2 p
P2 pP2 p

Viewers also liked (12)

Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks
 
Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks
 
Peer to peer network schemes and finding algorithms
Peer to peer network schemes and finding algorithmsPeer to peer network schemes and finding algorithms
Peer to peer network schemes and finding algorithms
 
Online Peer Influence and Social Networking Site Usage
Online Peer Influence and Social Networking Site UsageOnline Peer Influence and Social Networking Site Usage
Online Peer Influence and Social Networking Site Usage
 
Creating peer to peer network nadia perandos bisnar
Creating peer to peer network nadia perandos bisnarCreating peer to peer network nadia perandos bisnar
Creating peer to peer network nadia perandos bisnar
 
P2p Peer To Peer Introduction
P2p Peer To Peer IntroductionP2p Peer To Peer Introduction
P2p Peer To Peer Introduction
 
Ch 8 Client Server
Ch 8  Client  ServerCh 8  Client  Server
Ch 8 Client Server
 
Peer-to-Peer Systems
Peer-to-Peer SystemsPeer-to-Peer Systems
Peer-to-Peer Systems
 
Peer to peer system
Peer to peer systemPeer to peer system
Peer to peer system
 
Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver Presentation
 
Human body systems for kids
Human body systems for kidsHuman body systems for kids
Human body systems for kids
 
P2 p
P2 pP2 p
P2 p
 

Similar to Peer to-peer networks

NComputing - A brief overview
NComputing - A brief overviewNComputing - A brief overview
NComputing - A brief overview
Nkosinathi Lungu
 
1 - Introduction to Networks.pdf
1 - Introduction to Networks.pdf1 - Introduction to Networks.pdf
1 - Introduction to Networks.pdf
AbeerAlkhwaldi
 
Networks and the effects of using them
Networks and the effects of using themNetworks and the effects of using them
Networks and the effects of using them
Anjan Mahanta
 
P2p networks slides for show
P2p networks slides for showP2p networks slides for show
P2p networks slides for show
Shane Farrell
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking System
Vaughan Olufemi ACIB, AICEN, ANIM
 
CNE CHP1.pdf
CNE CHP1.pdfCNE CHP1.pdf
CNE CHP1.pdf
Nehaam3
 
Unit 1 web technology uptu slide
Unit 1 web technology uptu slideUnit 1 web technology uptu slide
Unit 1 web technology uptu slide
Abhishek Kesharwani
 
Ch01 ce
Ch01 ceCh01 ce
Ch01 ce
khamisseif
 
Computer networks
Computer networksComputer networks
Computer networks
Shamima Akther
 
PCTA 2019: How to obtain Internet resources to join the IXP
PCTA 2019: How to obtain Internet resources to join the IXPPCTA 2019: How to obtain Internet resources to join the IXP
PCTA 2019: How to obtain Internet resources to join the IXP
APNIC
 
Chapter 1 one html
Chapter 1 one htmlChapter 1 one html
Chapter 1 one html
nobel mujuji
 
Chapter 1 html
Chapter 1 htmlChapter 1 html
Chapter 1 html
nobel mujuji
 
chapter 4 2014 (1).pptx
chapter 4 2014 (1).pptxchapter 4 2014 (1).pptx
chapter 4 2014 (1).pptx
FerasGhdora
 
Cloud00000000000000000000Computing1.pptx
Cloud00000000000000000000Computing1.pptxCloud00000000000000000000Computing1.pptx
Cloud00000000000000000000Computing1.pptx
atul190389
 
Bcc comp4 ppt2
Bcc comp4 ppt2Bcc comp4 ppt2
Bcc comp4 ppt2ifrieshe
 
Basic of computers
Basic of computers Basic of computers
Basic of computers
Harsh Porwal
 
Introduction to computer networking chapter 2
Introduction to computer networking chapter 2Introduction to computer networking chapter 2
Introduction to computer networking chapter 2
binakasehun2026
 
Unit III
Unit IIIUnit III
Unit III
APARNA P
 
An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networking
Jafar Nesargi
 
Networking
Networking Networking

Similar to Peer to-peer networks (20)

NComputing - A brief overview
NComputing - A brief overviewNComputing - A brief overview
NComputing - A brief overview
 
1 - Introduction to Networks.pdf
1 - Introduction to Networks.pdf1 - Introduction to Networks.pdf
1 - Introduction to Networks.pdf
 
Networks and the effects of using them
Networks and the effects of using themNetworks and the effects of using them
Networks and the effects of using them
 
P2p networks slides for show
P2p networks slides for showP2p networks slides for show
P2p networks slides for show
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking System
 
CNE CHP1.pdf
CNE CHP1.pdfCNE CHP1.pdf
CNE CHP1.pdf
 
Unit 1 web technology uptu slide
Unit 1 web technology uptu slideUnit 1 web technology uptu slide
Unit 1 web technology uptu slide
 
Ch01 ce
Ch01 ceCh01 ce
Ch01 ce
 
Computer networks
Computer networksComputer networks
Computer networks
 
PCTA 2019: How to obtain Internet resources to join the IXP
PCTA 2019: How to obtain Internet resources to join the IXPPCTA 2019: How to obtain Internet resources to join the IXP
PCTA 2019: How to obtain Internet resources to join the IXP
 
Chapter 1 one html
Chapter 1 one htmlChapter 1 one html
Chapter 1 one html
 
Chapter 1 html
Chapter 1 htmlChapter 1 html
Chapter 1 html
 
chapter 4 2014 (1).pptx
chapter 4 2014 (1).pptxchapter 4 2014 (1).pptx
chapter 4 2014 (1).pptx
 
Cloud00000000000000000000Computing1.pptx
Cloud00000000000000000000Computing1.pptxCloud00000000000000000000Computing1.pptx
Cloud00000000000000000000Computing1.pptx
 
Bcc comp4 ppt2
Bcc comp4 ppt2Bcc comp4 ppt2
Bcc comp4 ppt2
 
Basic of computers
Basic of computers Basic of computers
Basic of computers
 
Introduction to computer networking chapter 2
Introduction to computer networking chapter 2Introduction to computer networking chapter 2
Introduction to computer networking chapter 2
 
Unit III
Unit IIIUnit III
Unit III
 
An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networking
 
Networking
Networking Networking
Networking
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 

Peer to-peer networks

  • 1. Peer-to-Peer Networks A brief Overview of Creating a Simple Peer-to-Peer network
  • 2. What is a Peer-to-Peer Network? •A peer-to-peer network is a network of computers that are of the same capacity and there is no dedicated server. •All computers are equal hence the term peers and each computer can act as a client and a server •They are convenient for easy sharing of resources 4/23/2014 Prepared by Nkosinathi Lungu 2
  • 3. Advantages of a Peer-to-Peer Network •Contents and resources on computer can be equally shared •Efficient for multipoint communication •More reliable than a single server •Easy access to all resources on the network 4/23/2014 Prepared by Nkosinathi Lungu 3
  • 4. Creating a simple Peer-to-Peer Network There are several steps that are involved in creating a simple peer-to-peer network as shown below.
  • 5. Installing Network Cards • Some computers will come with network ports but if not you need to install network interface cards on the computers. • You first install the drivers then restart the machine • Turn off the computer and open it then put the network card on one of the Peripheral Component Interconnect (PCI) slots • When you power the computer on the BIOS should automatically detect the new hardware 4/23/2014 Prepared by Nkosinathi Lungu 5
  • 6. Link to the Switch • A Switch is used to connect all the devices as they will work as peers and feed off each other. • To connect the devices to the switch Straight Through cables are used since the devices are not similar • Straight Through cables have similar color combinations all the way e.g. 568A or 568B 4/23/2014 Prepared by Nkosinathi Lungu 6
  • 7. Assigning Internet Protocol (I.P) Addresses • When the devices are connected then its time to assign Internet Protocol (IP) addresses • IP addresses are assigned to each device on the network so that its easier to send messages between devices. • When you enter the IP address the subnet mask will be entered automatically. 4/23/2014 Prepared by Nkosinathi Lungu 7
  • 8. Creating a Work Group • After successful assignment of IP addresses then you can name the workgroup • Workgroup names are a way to distinguish the peer-to-peer network from other peer-to-peer networks on the same network. • Workgroups provide easy sharing of files and resources • Workgroups are used in smaller networks like homes or small businesses, bigger organizations are better using domains. 4/23/2014 Prepared by Nkosinathi Lungu 8
  • 9. Adding a Printer to the network • A printer can be connected to any of the computers on the network. • Then right click on the printer and under properties select share this device • You should now be able to see the printer on any of the computers in the workgroup 4/23/2014 Prepared by Nkosinathi Lungu 9
  • 10. Conclusion •A Peer-to-Peer network is ideal for home use or small businesses. •They are cheaper to set up than client server networks •They are better for data retention since all computers will share the same data if one machine fails the other machines will still retain the data. 4/23/2014 Prepared by Nkosinathi Lungu 10