How Peer to Peer (P2P) Works


Peer to Peer (P2P) Technology- How it works:

Ever wondered how P2P works? This guide will run down most of the major P2P services and how they work. Peer to Peer technology lets people share files over a network on the internet. Most people now use what is known as the second generation of P2P, which is unlike its predecessors like such as Napter, the second generation has no centralized server, making it harder for it to shut down.

How first generation P2P services worked:

A connection is established by a peer finding another peer to connect to. Each peer exchanges active peer and their addresses. When a connection has been established, the user can then search for files. When a search has been submitted, it connects to all nodes on its connection list. The results are then displayed and a connection is made.

How second generation P2P services worked:

Gnutella2: Hubs are used to quickly search for files, eliminating the original "find peer and search" method. Instead, they store a list of files on all the "Leaves" (A peer) that are connected to it, thus dramatically reducing search time.Advantages: Unlike Napster, if a hub crashes, it's network stays alive.Disadvantages: Doesn't make network any more durable than the first generation of P2P.Gnutella2: www.gnutella.com

FastTrack: Programs such as Kazaa and iMesh use the FastTrack protocol. Normal peers connect to a supernode which acts jsut like a hub. Supernodes also connect to other supernodes, allowing search requests to move through the network very quickly. Peers then establish a direct connection to a client after a file has been found.Advantages: Any client can become a supernode.Disadvantages: Corruption of files occur.Clients include: Kazaa (www.kazaa.com), iMesh (www.imesh.com)

BitTorrent: .torrent files are used to store information about the file being shared. Once a torrent file is opened, the client connects to the tracker which tells the client where the file is located and what other peers/seeders there are. BitTorrent works by chunks of small files being transferred (even through multiple connections), while you are downloading. The files are checked for corruption as the download continues. Leechers are people who download and don't upload, and are highly frowned upon on some sites, disallowing them from downloading any further.Advantages: Very fast for popular, new files.Disadvantages: Trackers are unreliable and if it goes down, the file is lost.Clients include: Azureus (www.azureus.com), Shareaza (www.shareaza.com).

EDonkey Network: Edonkey runs on the same principle as first generation P2P, only anybody can become a server. Clients communicate with the server to download files, and random chunks can be downloaded in any order then put together in the end.Advantages: No file corruption, leech penalization.Disadvantages: It can penalize users unfairly.EDonkey: www.edonkey2000.com

Infinitive!, Copyright 2005.All Rights Reserved.

Infinitive! http://www.infinate.x10hosting.comThis article may be reproduced so long as your remain a link down the bottom.-Admin, Nigel.

More Resources

Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 404, exiting

More Broadband Internet Information:

Related Articles

A Cheap Alternative To Broadband?
Are you a dial-up user looking for a faster connection,but don't like Broadband prices? If so, you should take a look at a new service called OnSpeed, which has received rave reviews in Internet technology publications.What OnSpeed does is to re-route web pages and email viaits own servers, compressing the data on the fly prior to sending it onwards to your PC.
Long Arm of the Law Reaches New Internet (RIAA, Internet-2, i2hub Lawsuit)
Have you heard of the new Internet? It's called Internet 2 and this time they're not fooling around. The Abilene Network , begun in 1999 provides the main backbone and they're a pure optical network wired for speed.
Understanding Broadband - Are You Ready To Upgrade?
Are you ready to upgrade your residential service to DSL or business service to real broadband or T1? Well, the answer lies in what you need. Before you can realize your needs, you must understand more of what the word broadband really means.
Whois Protocol - TCP/IP Suite
The Whois protocol is an information service not unlike the finger service. The Whois protocol provides the client or user with information about the owner of a domain or specific IP address.
ICMP Protocol - Internet Control Message Protocol
The Internet Control Message Protocol communicates errors messages between systems that require attention. This error is not usually at the user level, the error is handled by the application layer.
Wifi Hotspot Locations for Sale..is that a Good Thing?
Recent companies have been advertising wifi hotspot locations that are 'turnkey' (they can run themselves), and only cost between $13,000 and $20,000 to start. Is that good?First of all, if it's so turnkey then why aren't they just popping off wifi hotspot locations left and right for themselves, is it their newfound generosity that has them 'sharing' the opportunities they have available.
Wi-Fi Hotspot Security
You've set up your Boingo account, you're hanging out at the Home Turf sports bar in LAX and you figure you'll do a little business or check your e-mail while sipping a Chardonnay. Well, that's the point of Wi-Fi hotspots; being able to take care of a few things while in a relaxing atmosphere.
Beta Testing First Mobile Internet Satellite Broadband, Part III
Back in 1999 when we beta tested the first wireless mobile office with satellite broadband Internet we had something that no one lese had. Today you can buy these systems for $5,500 fully installed on any RV.
3G EV-DO or How the Internet Got Its Wings!
The Internet, as most people know it, is history.It just seems like yesterday the Internet was just onebig mass of wires and cables; a glorified file sharing warehouse with more than a few too many lines sticking out.
Webmail - What are the Benefits?
There are so many different webmail services on the internet, from the huge ones like Yahoo, Gmail, Hotmail, to the much smaller ones from private websites and ISPs. There is a lot to worry about with e-mail these days but some of these front line webmail services are really a great way of helping to protect your system.
Finger Protocol - TCP/IP Suite
The "finger" protocol is used to return information on users on a specific host. Information that can be gained by using the finger is to see if someone is actively logged on to a server, or find a valid username.
Broadband Satellite Antenna Pizza Box Size
Thanks to the transfer technologies and governments spending on military needs, soon the public will have Broadband Satellite antennas no larger than the dimensions of a Pizza Box. Lightening fast Internet from the heavens.
DSL Internet is a Simple and Easy Way to Get Fast Internet Service
DSL - which stands for Digital Subscriber Line - is a great way to get high-speed internet service, without having to get a cable modem, or live in an area that has cable lines. DSL providers have very fast and comparatively cheap internet connectivity.
How to Choose Best ISP for Your Needs
Well, the Internet access industry is starting to shake its way out. The much-anticipated consolidation of access providers is nearing its end.
Broadband is State-of-the-Art Internet Access: How Can a Broadband Cable Benefit You?
We are now well ensconced in a time when the Web is riddled with graphics, animations, sounds, and videos, bringing about a necessity for superior internet access such as that which broadband can provide. The fact is that anything less than the speed supplied by a broadband cable has become inadequate for today's Web users.
Chat-less
Are you suddenly chat-less now that Yahoo has shut down many chat sites, due to complaints? One complaint was that people where using chat rooms to lure under age kids for sex. While others say the chat rooms were used to promote underage sex.
Searching for the Right ISP
When searching for the right ISP there are a number of items to look at. How much is it going to cost me? What is the connection like? What are the Features? Is it available in my area? You will soon find that there are many ISP's to choose from.
Two Enter Internet Battle
Consumers understand that when there is more competition in a market, there are lower prices. This is especially true in the computer industry where it is reported that 68% of households have a computer.
Cheap Internet Access
For anyone trying to get the cheapest internet available, there are tons of options available. Some providers offer completely free service.
Time to Redefine Telecom
Telecommunication, according to Wikipedia, is the extension of communication over a distance. In practice, it also recognizes that something may be lost in the process; hence the term 'telecommunication' covers all forms of distance and/or conversion of the original communications, including radio, telegraphy, television, telephony, data communication and computer networking.