StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cons and Pros of Peer to Peer Networking - Essay Example

Cite this document
Summary
The essay "Cons and Pros of Peer to Peer Networking" discusses such benefits as lack of a centralized administration and centralized server that reduces bottlenecks that would rather cause a clog up in communication. The disadvantage is users have to ensure no virus is introduced to the network…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.7% of users find it useful
Cons and Pros of Peer to Peer Networking
Read Text Preview

Extract of sample "Cons and Pros of Peer to Peer Networking"

PEER TO PEER NETWORKING Foundation Dept. Peer to peer networking is also called peer networking, it allows for each computer to act as both client and server. It typically allows for the exchange of data and service with every computer on the network. It is an approach to the computer where all computers share equivalent responsibility for processing data. This form of networking is made when two or more PCs are connected without necessarily going through a separate server computer. Several computers are connected via a universal serial bus to transfer files. It can also link different computers in a small office. This type of networking is usually common on small local area networks to be particular home systems (Subramanian & Goodman 2005). A good example of peer to peer network is where two computers are connected to each other at your house via the LAN port. Home networks such as wired and wireless can configure as peer to peer environments. Computers in this type of networking do share the same networking protocols as well as software. They are usually situated next to each other physically either in homes, small businesses or schools. The use of peer to peer networking began in the early 1990s, mainly in the form of application sharing exchange of multimedia files among others. An excellent example of the most popular and high-profile file-sharing protocols was free net, BitTorrent, Direct Connect with others. The most recent research done came from the peer to peer networking’s popularity of file sharing system (Verma 2004). Napster was the most common way of sharing data, especially in 1999, and it paved the way to more advanced approaches of file sharing. Peer networking can be more important because every computer on the network is given equal responsibility to communicate with each other, unlike the client-server networking. This kind of networking allows one to create applications that use the decentralized power to great effect. That is to say, all your computers can work on a computing task without necessarily waiting for input from the server. The above process helps speed up processing. Peer to peer networking has a lot of benefits. For instance, your computer can share data with other connected computers effortlessly. They can also share devices like printers and CD-ROMs and hard drives. This medium allows for quick sharing of data in both directions without the need for routing through another computer (Subramanian & Goodman 2005). Peer to peer networking allows for configuration of computers in the same work setting to allow sharing of files, printers and other useful resources across all devices. This medium is of great importance since it saves time and resources. It also allows for data sharing whether it is for downloads to your computer or uploads from the same computers. Another benefit of peer to peer networking is that the absence of a centralized server reduces bottlenecks that could rather cause a clog up in communication. Clog up of information would result due to too many data send to the server, therefore, leads to a slow down making the system crawl. It does not occur to this kind of networking since individuals communicate directly with each other. Even when a lump sum of information is sent to the peer to peer networking, it keeps running efficiently. If bottlenecks happen to form, they can be easily removed or rather resolved (Leuf 2002). To add on, peer to peer networking is the lack of a centralized administration. Centralized management is sometimes more of a benefit since it allows you to monitor any computer that has access to any information or files. To a home-based peer networking, this is more of a hindrance than a help. Peer to peer networks is cost efficient than any server-client networks. Server systems need a specialized bit of hardware that is very expensive to acquire. It also requires a skilled professional to install. In addition, it requires maintenance and regular upgrade that is hectic and not easy to do. Peer to peer networks on the other side is easily installed with the necessary knowledge. For example, an LAN network can be quickly set up automatically in Windows or Linux (Verma 2004). If one computer fails, when it comes to peer to peer networking, any other available work will not be disrupted neither any part of the network. This medium clearly indicates that those files are not available to other users at that time. Every other system has its benefits as well as weaknesses. For peer to peer networking, there are several weaknesses linked to it. One of the weaknesses is that there is little or no security besides the permission. A user does not need to log onto their workstations most often. The above is a security threat since anybody can login yet they are not users provided they have access to the workstations. Another disadvantage is that each user has to ensure that no virus is introduced to the network. It can be a bit tricky since it is the responsibility of all members and not one specific person. Other people may be careless and mess up the network system. Since it relies on the dependence of peers with each other, some may abuse the trust and compromise to destroy the files. Files on peer to peer networking are not easily backed up (Verma 2004). It means that when the files are lost it becomes a challenge to restore them thus disadvantageous. If the owner of a computer does not have a reasonable filing system, then it is hard to access some files. It is because data and resources are not centrally organized into a particular shared area but rather on individual computers. Several activities can be done to destroy the peer to peer networking system and below are some activities and a solution to the same. Network poisoning This kind of activity works towards attacking the peer to peer networking system. The enemy injects useless data what we call poison to the system. The above information may slow down the query processor yield invalid query results. Poisoning is also be accomplished when used as fodder for Distributed Denial-of-Service (DDoS).it can be achieved in two different ways, by index poisoning or route table poisoning. Fake records of files are inserted into the index pointing to a target port number. It can be tackled by removing artificial peers from the route table and update it regularly. It is done so that in case the burst of traffic to the target, and the target is automatically removed from the route tables connecting the peers (Verma 2004). System Privacy and identity These issues are presented in peer to peer networking. There can be compromising of data especially by fellow peers who help in data transmission. The issue of privacy and identity can be solved by ensuring they come up with the system that does provide the anonymous address of every peer in the working system in order to protect data from attackers (Verma 2004). By anonymizing peers, the peer networking can protect the identity nodes and users on the network. It makes it difficult to find the sources or destination of streaming data. Fairness in sharing of resources Peer to peer networking calls for cooperation among peers and all of them should participate in the resource distribution process. However, there being no particular administrator, some peers may introduce to their friends hence considered as cheating also called leeching. Encryption of data should be done to ensure blocking of attackers. In conclusion, peer to peer networking is the best if all the condition are met and the above recommendations. That is to say by use of encryption and anonymous systems. References LEUF, B. (2002). Peer to peer: Collaboration and sharing over the Internet. Boston: Addison-Wesley. OBAIDAT, M. S., & MISRA, S. (2011). Cooperative networking. Chichester, West Sussex: Wiley. SUBRAMANIAN, R., & GOODMAN, B. D. (2005). Peer to peer computing: The evolution of a disruptive technology. Hershey, PA: Idea Group Pub. VERMA, D. C. (2004). Legitimate applications of peer to peer networks. Hoboken, NJ: Wiley-Interscience. WOODCOCK, J. A. (1999). Step up to networking. Redmond, WA: Microsoft Press. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Cons and Pros of Peer to Peer Networking Essay Example | Topics and Well Written Essays - 1250 words, n.d.)
Cons and Pros of Peer to Peer Networking Essay Example | Topics and Well Written Essays - 1250 words. https://studentshare.org/engineering-and-construction/1875749-network-engineering
(Cons and Pros of Peer to Peer Networking Essay Example | Topics and Well Written Essays - 1250 Words)
Cons and Pros of Peer to Peer Networking Essay Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/engineering-and-construction/1875749-network-engineering.
“Cons and Pros of Peer to Peer Networking Essay Example | Topics and Well Written Essays - 1250 Words”. https://studentshare.org/engineering-and-construction/1875749-network-engineering.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cons and Pros of Peer to Peer Networking

Importance of Online Privacy

Social networking has created more challenge to privacy (36) because anyone who takes part in it has their information availably through search engines.... Many people think that if they stay away from the social networking sites they are safe.... Every time we go onto the Internet, we are risking people taking our identity or finding out more about us than we want strangers to know. According to… e article, "Online Privacy: Do Americans Need Better Protection?...
4 Pages (1000 words) Essay

Forms of Peer Pressure

People with weak personalities are more susceptible to peer pressure.... We want attention and this is another reason why we feel prey to peer pressure.... After a few times the person gets used to smoking and this is one of dangers of peer pressure.... The dangers of peer pressure also extend to other forms of addictions and attitudes or actions.... The fact that we give in to any form of perceived authority or pressure… Researches on peer pressure has elucidated upon how easily people can succumb to pressure and can act without thinking rationally about it. peer pressure is defined as pressure or influence of a group or a sub group on a person who This pressure is not physical pressure or coercion....
4 Pages (1000 words) Assignment

The Importance of Legal Privilege in Peer Counselling

onclusionIt can be inferred that the importance of legal privilege must be addressed by the universities in the aspect of peer counseling.... For this reason, the lack of confidentiality often time deters the victims to seek the help of peer counselors.... In the essay “The Importance of Legal Privilege in peer Counselling” the author analyzes peer counseling, which was established in order to create a more trustworthy environment for sexually abused students....
2 Pages (500 words) Essay

The Peer Review Process

The following essay "The peer Review Process" deals with valuable feedback during the peer review process.... t this time, I cannot see that I would change much about the peer review process.... As the author puts it, I do understand that there are some issues with my grammar that I am working on and it is helpful to have another student read my work and help me with that....
1 Pages (250 words) Essay

Issues Connected with Working in Facebook

The well-known social networking platform provided by Facebook has become much of a success.... The author examines the issues that are vital for the employees of Facebook, which is the most important asset of the company.... As the company is operational 24 hours a day and seven days a week the pressure upon the employees maintains so as to make them get the operations of the company run....
8 Pages (2000 words) Term Paper

Business peer review

Say what you like about it and/or suggest improvements. He arranges his Business peer review Project 5 peer Review Sheet Please answer the following questions when reviewing your peers' work, and post your completed review to the Final Report Workshop discussion forum.... oc, substituting your own last name for Smith and the name of the peer you're reviewing for Jones....
2 Pages (500 words) Essay

Thiel Fellowships Innovation Development Opportunity

The foundation issues grant of $100,000 for more two years to 20 young individuals each year… Given a chance, I would accept Thiel Fellowship's innovation development opportunity. In my opinion, I do believe that Thiel Fellowship is an excellent opportunity for the young people since it gives a networking opportunity.... In my opinion, I do believe that Thiel Fellowship is an excellent opportunity for the young people since it gives a networking opportunity....
1 Pages (250 words) Assignment

The Value of Peer Support Groups

"The Value of peer Support Groups" paper argues that peer support groups make individuals be willing to share as the ones they are sharing with have gone through the same ordeal and they would feel identifying with them rather than speculating that they would be judged.... hellip; peer support groups have so much value attached to it that is incomparable to other forms of support groups.... One of the values is that peer support groups reduce a victim's sense of isolation, and this is so because peer support groups would have undergone similar circumstances....
5 Pages (1250 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us