How Peer to Peer (P2P) Works


Peer to Peer (P2P) Technology- How it works:

Ever wondered how P2P works? This guide will run down most of the major P2P services and how they work. Peer to Peer technology lets people share files over a network on the internet. Most people now use what is known as the second generation of P2P, which is unlike its predecessors like such as Napter, the second generation has no centralized server, making it harder for it to shut down.

How first generation P2P services worked:

A connection is established by a peer finding another peer to connect to. Each peer exchanges active peer and their addresses. When a connection has been established, the user can then search for files. When a search has been submitted, it connects to all nodes on its connection list. The results are then displayed and a connection is made.

How second generation P2P services worked:

Gnutella2: Hubs are used to quickly search for files, eliminating the original "find peer and search" method. Instead, they store a list of files on all the "Leaves" (A peer) that are connected to it, thus dramatically reducing search time.Advantages: Unlike Napster, if a hub crashes, it's network stays alive.Disadvantages: Doesn't make network any more durable than the first generation of P2P.Gnutella2: www.gnutella.com

FastTrack: Programs such as Kazaa and iMesh use the FastTrack protocol. Normal peers connect to a supernode which acts jsut like a hub. Supernodes also connect to other supernodes, allowing search requests to move through the network very quickly. Peers then establish a direct connection to a client after a file has been found.Advantages: Any client can become a supernode.Disadvantages: Corruption of files occur.Clients include: Kazaa (www.kazaa.com), iMesh (www.imesh.com)

BitTorrent: .torrent files are used to store information about the file being shared. Once a torrent file is opened, the client connects to the tracker which tells the client where the file is located and what other peers/seeders there are. BitTorrent works by chunks of small files being transferred (even through multiple connections), while you are downloading. The files are checked for corruption as the download continues. Leechers are people who download and don't upload, and are highly frowned upon on some sites, disallowing them from downloading any further.Advantages: Very fast for popular, new files.Disadvantages: Trackers are unreliable and if it goes down, the file is lost.Clients include: Azureus (www.azureus.com), Shareaza (www.shareaza.com).

EDonkey Network: Edonkey runs on the same principle as first generation P2P, only anybody can become a server. Clients communicate with the server to download files, and random chunks can be downloaded in any order then put together in the end.Advantages: No file corruption, leech penalization.Disadvantages: It can penalize users unfairly.EDonkey: www.edonkey2000.com

Infinitive!, Copyright 2005.All Rights Reserved.

Infinitive! http://www.infinate.x10hosting.comThis article may be reproduced so long as your remain a link down the bottom.-Admin, Nigel.

More Resources

Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 404, exiting

More Broadband Internet Information:

Related Articles

A Cheap Alternative To Broadband?
Are you a dial-up user looking for a faster connection,but don't like Broadband prices? If so, you should take a look at a new service called OnSpeed, which has received rave reviews in Internet technology publications.What OnSpeed does is to re-route web pages and email viaits own servers, compressing the data on the fly prior to sending it onwards to your PC.
Ka Band -Affordable Satellite Internet On The Way!
Ka Band VSAT* satellite internet technology has enormous possibilities for telecommuters, rural locations and eventually for Motor Home users around the U.S.
ICMP Protocol - Internet Control Message Protocol
The Internet Control Message Protocol communicates errors messages between systems that require attention. This error is not usually at the user level, the error is handled by the application layer.
Wireless Network Hammerin
The wireless network in my house went haywire. It worked on three PCs, one had a horrible connection, and one can't connect.
Beta Testing First Mobile Internet Satellite Broadband, Part I
Being on the road has its advantages; the freedom is the biggest one. One draw back was the Internet Service, but having done much study on the mobile Internet Satellite Systems and future technologies; I was able to become a beta tester of the MotoSat system in 1999.
Whois Protocol - TCP/IP Suite
The Whois protocol is an information service not unlike the finger service. The Whois protocol provides the client or user with information about the owner of a domain or specific IP address.
What is Broadband?
Defining broadband can get complicatedThere are many different takes on how to actually define the word: broadband. The first and most obvious way to define it is a transmission medium that allows for multiple pathways and types of data, far exceeding simple voice communication devices.
How to Secure your DSl / Cable Internet Connection Against Malicious Attacks
Securing your Windows Xp computer is done by achieving two main tasks.The first, is to prevent unauthorized users sitting at your computer and logging in through your keyboard.
Broadband - Will it Affect Your Online Marketing Future?
The coming age of general Broadband use bearing down uponus, minute by minute, is going to leave many changes in its wake. Some will be welcome; others will demand all we can do, just to keep up!Of course, items like high quality graphics, streaming videoand movies on demand will be commonplace.
Wifi Hotspot Locations for Sale..is that a Good Thing?
Recent companies have been advertising wifi hotspot locations that are 'turnkey' (they can run themselves), and only cost between $13,000 and $20,000 to start. Is that good?First of all, if it's so turnkey then why aren't they just popping off wifi hotspot locations left and right for themselves, is it their newfound generosity that has them 'sharing' the opportunities they have available.
Chat-less
Are you suddenly chat-less now that Yahoo has shut down many chat sites, due to complaints? One complaint was that people where using chat rooms to lure under age kids for sex. While others say the chat rooms were used to promote underage sex.
Wanadoo: 17.99 Pounds 1Mbps Service
Wanadoo 17.99 pounds 1 mbps service getting good reviews.
3G EV-DO or How the Internet Got Its Wings!
The Internet, as most people know it, is history.It just seems like yesterday the Internet was just onebig mass of wires and cables; a glorified file sharing warehouse with more than a few too many lines sticking out.
BT Broadband
Approximately 4 million people in the UK use ADSL with an extra 2 million using a cable connection, meaning 6 million people in the UK have an always-on internet connection. Of these over 1.
Unlimited Bandwidth and Overselling
One of the most controversial topics surrounding web hosting is the practice of overselling bandwidth, and rightfully so. The practice of overselling has enormous potential for disaster - ask any webmaster who has ever woken up to a cold, unforgiving "Bandwidth Exceeded" message where his or her site should be.
Its On! (Free Internet TV - Watch TV Online)
Get ready because "there's going to be television out the wazoo!" This according to Jonathan Klein, the president of CNN - U.S.
How Peer to Peer (P2P) Works
Peer to Peer (P2P) Technology- How it works:Ever wondered how P2P works? This guide will run down most of the major P2P services and how they work. Peer to Peer technology lets people share files over a network on the internet.
Finger Protocol - TCP/IP Suite
The "finger" protocol is used to return information on users on a specific host. Information that can be gained by using the finger is to see if someone is actively logged on to a server, or find a valid username.
Broadband
Broadband is the name given to a high-speed Internet connection that provide large bandwidth. It is a quick connection, typically "always-on" and capable of transmitting data at a much faster rate than a standard dialup modem connection.
Mind Machine Interfacing
SQUID:In 1984 I was partnered with a Cable TV engineer and founding father by the name of Ray Osborne. He was working with people developing oscillating noise loop broadband technologies.