Peer to peer networks (P2P)

Peer to peer networks (P2P) received more and more requests from users and, for the moment, are standard as a standard way of distributing information, because its architecture allows scalability, efficiency and performance as key principles . A peer-to-peer network is decentralized, self-prepared and dynamic in its purest sense, and offers an opportunity for the traditional version of buyer-server computing. The buyer-server structure allows people to connect to a server, but although the servers are scalable, there may be a restriction on what they could do. P2P networks are almost unlimited in their scalability. For example: torrent, Webrtc.

The extraordinary programs of P2P networks allow users to calculate the percentage of electricity calculated (distributed structures), information (exchange of documents) and bandwidth (the use of many nodes to move statistics). P2P uses the energy and sources of a person's PC, unlike powerful centralized servers. Shared sources ensure high availability among peers. P2P is certainly a crucial area to investigate, because it has great potential in scattered computing. It is also important for the company, since new business models are being created around P2P.

P2P Standards

The key factor for the structure of P2P networks is to obtain reliability, performance, scalability and portability. At the moment, there are no standards for improving the P2P application, but requirements are required to allow interoperability. Solar has tried to implement a framework called JXTA, which is a computing and community programming platform for scattered computing. Solar was the main organization to try to extend the standards for P2P, but clearly the different agencies can even try to implement their own requirements. Microsoft, Intel and IBM are investing and operating in their research laboratories in systems or software frameworks compatible with P2P. It is miles an open place where there are still no universal standards.

Security Concerns

Like client-server networks, peer-to-peer networks are vulnerable to security attacks.

Benefits of a Peer-to-Peer Network