StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Peer-to-Peer File Sharing Technology - Research Paper Example

Cite this document
Summary
In the paper “Peer-to-Peer File Sharing Technology” the author analyzes the concept behind the technology and issues that revolve around it, such as social, security, legal and ethical. Therefore, the author shall be looking at Peer-to-Peer technology and its machinations, as well as development…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97% of users find it useful
Peer-to-Peer File Sharing Technology
Read Text Preview

Extract of sample "Peer-to-Peer File Sharing Technology"

Introduction Peer-to-Peer file sharing technology has been in existence for a long period, and continues to evolve, gradually as change demands. In this light it is crucial to analyze the concept behind the technology and issues that revolve around it, such as social, security, legal and ethical. Therefore, we shall be looking at Peer-to-Peer technology and its machinations, as well as development. Background Peer-to-Peer technology, also known as P2P, refers to computing software that allows individual computers to connect and communicate directly with other computers. The above occurs with little or no human input or interference. Computer users, known as peers, share communications, processing power, and even files with one another (Steinmetz and Wehrle, 2005). The above is also known as decentralized sharing, where files and computers share data and information directly rather than having files stored in a single location or a server (Rodrigues and Druschel, 2010). The files, however, are stored in the participating individuals’ computers. P2p programs do not copy or share files between computers, but rather facilitate the process of communication. This occurs through employment of sharing protocols between the said peers. With this, peers can share a large variety of files between and among themselves including photos, video, audio, software, and other document files. Working P2P file sharing works in different ways based on the employment of the protocol, such as file querying from server based services to respond on the presence or existence of a file. With this use, the response prompts the owner of the given file to provide the file to the peer who needs it. In fast track protocol, files are based on nodes on a two-tier basis: super nodes and ordinary nodes. Individual computers form nodes, while super nodes are the act as directories for the centralized servers as used above. With p2p software, ordinary nodes connect to super nodes, which query the directory and respond with a list of matches for the user to create a direct peer-to-peer connection. This is aimed at fetching the desired file directly from the selected peer. The bitTorrent program is the last protocol of p2p file sharing and is based on a simple concept of sharing. In this program, files are not shared, but rather bits of files are broken down to bits and distributed by different peers at equal sizes to different peers (Federal Trade Commission, 2005). A single copy of the file piece is distributed to different peers and then the peers with the different pieces provide them to one another. The peer with the original, complete file is known as a seed. In order to make use of the bitTorrent protocol of file sharing, peers do not need to search directly for files from their peers’ computers. Instead, there exists torrent file, which is associated with the desired file and is hosted on a website for users to download. The torrent file contains data on trackers and location of the computer with the file. Trackers in this case refer to servers that coordinate the exchange of pieces of the desired files amongst peers. By executing the torrent file, users join the network of file-pieces exchange, and once the download of the pieces is complete, they are assembled into the desired file, and the bitTorrent client automatically begins the upload process for other users interested in the file. Benefits Peer-to-peer file sharing is highly beneficial to all users and other potential users based on the intent of use. In this regard, installation of bitTorrent clients is simple, as so is the configuration of all computers on the sharing network. With this in mind, time is saved for purposes that are more constructive rather than spending extended periods working on it. In addition, all resources required for file transfer are shared amongst peers making the file transfer process efficient. This is due to the elimination of servers that store content and are more susceptible to failure, which inconveniences users (I Answer for U, n.d.). For this reason, p2p allows users to continue functionally without influencing other users thus; is more reliable as compared to server based sharing. In addition, it is relatively cheap as compared to other networks due to the few resources required and elimination of additional hardware. Maintenance and administration is barely required, making it an easily efficient system as each user manages his or her computer/ node thus controlling resource use at no additional cost of inconvenience. Commercially, p2p can be used for distribution of premium content to consumers, such as games, movies, music and software among others (Federal Trade Commission, 2005). This facilitates easy trade in digital content, especially legally licensed content. It can also be used for more services such as video on demand and leasing of copyrighted content by artists and private or independent content producers. In regard to business, p2p sharing can be used for intra-business collaborative project management, where participants in project share documents and personal files with one another. Non-commercially, it can be used for academic purposes to publish research works between and amongst scholars as is seen in the LionShare Project in the Pennsylvania State University (Federal Trade Commission, 2005). In addition, persons or users who do not wish to charge for their content, such as musicians providing free, legal downloads or artists providing writing, art photography and other electronic content may use it. Legal and Ethical Issues Legal and ethical implications of peer-to-peer file sharing work hand in hand for the good and the bad of the society and all parties involved in the utilization of this protocol. Legally, the issue of copyright infringement is common in the use of p2p file sharing protocols. Copyrights allow owners of copyrighted works to receive their dues from consumers. Copyrighted works include works of art, literary compositions and music among others. Since copyright laws declare it illegal to reproduce and distribute, in any way, copyrighted materials, p2p file sharing leads to reproduction and distribution on a massive scale of such materials resulting in infringement (Lohmann, n.d.). Unless the content transmitted is authorized by the owner, end users or peers violate the law meaning that p2p leads to the increase of illegal sharing of information and content. The above occurs both commercially and none commercially, in which case, commercial leads to loss of revenue for content owners. This issue is equivalent to theft, an offence punishable by the law, either under economic sabotage or criminal law. Infringement of copyrights falls on multiple categories such as contributory and vicarious thus its legal implications are numerous (Lohmann, n.d.). Ethically, p2p implications arise over the use of the internet for communication via any manner without implications. This is due to the belief that the internet is a place with freedom and legal and moral issues are thrown to the wind. The utter disregard for the law in such cases is due to its potential to destroy the freedom created by the internet. As a result, those that attempt to curb the p2p technology are believed to be on the wrong side of technology due to violation of its potential benefits (Smith, 2009). Social implications Socially, p2p has brought together people from all over the world to share knowledge and information across and beyond borders due to the capability to include chat services, in the form of instant messaging and voice over internet protocol. These help the world to communicate easily at lower cost as compared to making local or international calls. In addition, p2p file sharing creates links between the different users all over the world and unites them under a single network. Security and Challenges P2p networks are difficult to secure due to the numerous hops made by the network to reach the required files and pieces. The security issue is also one of the main hurdles that the technology faces. Since p2p is widely implemented over the internet, it is relatively easy to break into through the use of erroneous code responses at the application and network levels leading to denial of service (Krebs, 2009). In addition, attacks on the network could occur through where certain users would like to store information, maliciously on available nodes/ user computers against what is allowed. With this, p2p is vulnerable, and trustworthiness of files shared remains in question. In order to create a stable network of p2p file sharing and advance its use, it is crucial to overcome security vulnerabilities and generate laws that favor technological advancement. This is through creating legal terms defining copyright infringements and seeking means to legalize its usage and implementation. In addition to ease moral and ethical issues, large scale adoption could ease the issue and avoid social and economical standoffs over piracy and copyrights. The implementation of the above measure could see the creation of a secure p2p network that deals with legal and valid content, without subjecting users to risk of fraud or network attacks (Wallach, n.d.). Conclusion In conclusion, the development of p2p has been in progress for a long time and is yet to achieve its ultimate intended goal. As a result, it is crucial to understand its working and problems behind it. Therefore, through overcoming the above challenges, the p2p technology could advance greatly for large-scale legal use. References Federal Trade Commission (2005). Peer-to-Peer File Sharing Technology: Consumer Protection and Competition Issues. Retrieved from http://www.ftc.gov/reports/p2p05/050623p2prpt.pdf I Answer for U (n.d.). Peer-to-Peer (P2P): Advantages and Disadvantages. Retrieved from http://www.ianswer4u.com/2011/05/peer-to-peer-network-p2p-advantages-and.html#axzz283Xsmuf7 Krebs, B. (April 22, 2009). Congress Investigating P2P Data Breaches. The Washington Post. Lohmann, F. (n.d.). Peer-to-Peer File Sharing and Copyright Law: A Primer for Developers. Retrieved from http://iptps03.cs.berkeley.edu/final-papers/copyright.pdf Rodrigues, R and Druschel, P. (2010). Peer-to-Peer Systems. Review Articles. Retrieved from http://content.ebscohost.com/pdf25_26/pdf/2010/ACM/01Oct10/55028305.pdf?T=P&P=AN&K=55028305&S=R&D=bsh&EbscoContent=dGJyMMvl7ESepq84zdnyOLCmr0qep7NSr6e4SLWWxWXS&ContentCustomer=dGJyMPGqtk2zqbBNuePfgeyx44Dt6fIA Smith, B. (2009). Ethical Issues Behind P2P File Sharing. Ezine @rticles. Retrieved from http://ezinearticles.com/?Ethical-Issues-Behind-P2P-File-Sharing&id=2962460 Steinmetz, R. and Wehrle, K. (2005). Peer-to-Peer Systems and Applications. Berlin, Germany: Springer Books. Wallach, D. (n.d.). A Survey of Peer-to-Peer Security Issues. Retrieved from http://www.eecs.harvard.edu/~mema/courses/cs264/papers/securitySurvey-swSecurity2002.pdf Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Peer-to-Peer File Sharing Technology Research Paper - 1, n.d.)
Peer-to-Peer File Sharing Technology Research Paper - 1. https://studentshare.org/information-technology/1782868-it
(Peer-to-Peer File Sharing Technology Research Paper - 1)
Peer-to-Peer File Sharing Technology Research Paper - 1. https://studentshare.org/information-technology/1782868-it.
“Peer-to-Peer File Sharing Technology Research Paper - 1”. https://studentshare.org/information-technology/1782868-it.
  • Cited: 0 times

CHECK THESE SAMPLES OF Peer-to-Peer File Sharing Technology

Employees' Access to the Internet

In addition, it must establish suitable use strategies, choosing and implementing security technology, and finding the way to deal with ethical and legal concerns.... This discussion talks that the use of the Internet is critical for carrying out certain business tasks.... Thus, the organizations cannot stop their employees from using the Internet....
5 Pages (1250 words) Essay

BitTorrent as a Peer-To-Peer Based File-Sharing Procedure

BitTorrent DNA which is used by a peer-to-peer file sharing based company namely BitTorrent while transmitting large files through the medium of internet to its several viewers.... Bit Torrent Table of Contents Introduction 3 Thesis Statement 3 Discussion 4 An Overview of BitTorrent DNA 4 Purpose of Introducing BitTorrent DNA 4 The Architecture of BitTorrent DNA 5 Conclusion 7 Works Cited 8 Introduction BitTorrent is regarded to be a peer-to-peer based file sharing procedure which is principally used for allocating huge amount of data over the medium of internet to the viewers....
4 Pages (1000 words) Essay

Controlling Internet Service Users

As such, a prime threat to profitability of intellectual copyrighted information is illegal file sharing.... As such, to better understand the true implications of their respective actions, an empirical analysis must be performed to ascertain the negative attributes that file sharing may or may not have with relation to intellectual material.... Although it would appear to seem a very straightforward answer as to whether illegal file sharing has directly affected music and film profits, the answer is anything but (Goel et al, 2010)....
6 Pages (1500 words) Essay

Emerging Technologies: Peer-to-peer and Cloud Computing

peer-to-peer file sharing is highly beneficial to all users and other potential users based on the intent of use.... This is to mean that the technology is valuable and very important if used in the right way, as it brings with it consequences that are of a legal and security nature.... hellip; Introduction Peer-to-Peer technology, also known as P2P, refers to computing technology that allows computers to connect and communicate directly and individually with other computers, where it occurs with little or no human input or interference....
5 Pages (1250 words) Essay

Downloading Music on the Internet

Peer-to-Peer File Sharing Technology enables internet users to share their resources on a computer through direct exchange.... In the internet era, all an individual has to do is download a peer-to-peer application for file sharing; for example, Bear-share, Blubster, E-donkey, and Kazaa.... When Napster came onto the 4 scene, it used improved internet connections and increased speeds for file sharing.... Modern file-sharing systems can now develop networks for file sharing with swaps for anything ranging from audio to video music files....
3 Pages (750 words) Essay

Open Access, Piracy, and the Public Domain

As Wikstrom (152) says, music producers feel a need to protect their products when they feel that online file-sharing is a threat to their aggregate sales.... Name: University: Course: Tutor: Date: Open Access, Piracy, and the Public Domain Information has a long history in terms of the rights to access....
4 Pages (1000 words) Essay

Peer to Peer File Sharing Networks

In the essay “P2P Networks” the author discusses file sharing via a specific set of networks called Peer to Peer or P2P sharing, which is one such breakthrough in technology, which has become increasingly popular over the years.... rdquo; However, in spite of all this illegality with file sharing, one article expert from about.... hellip; The author states that at present, a majority of these P2P file-sharing networks offer very little limitations as to the kind of files that are being exchanged across this network, especially since this type of sharing is done directly with other computers, meaning, you are downloading from another person's computer and vice versa....
1 Pages (250 words) Essay

Copyright, Patents and Trademarks

The ICE should improve their information technology skills so that they can track the physical address of the servers used to carry out piracy.... billion - in the decade after file-sharing site Napster Copyright, Patents and Trademarks Comment Three I agree that the three strike rule is justified.... billion - in the decade after file-sharing site Napster emerged.... The problem is on peer-to-peer (P2P) sharing sites where privacy is a thorny issue....
1 Pages (250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us