P2P Network

P2P is an efficient method of transferring data over the Internet. The best-known example of a P2P network is torrent.

In peer-to-peer networks, the term “peer” refers to a separate computer or device that is connected to other devices over the Internet. Peer-to-peer networks are abbreviated as P2P. A distinctive feature of a peer-to-peer network is that it does not require a separate server to maintain communication. With P2P, you can exchange any data between any devices within the network. Moreover, each device can act as a server and a client, depending on its role.

Connection Methods

There are three methods to connect peers in a P2P network:

  1. USB
  2. Wires or wireless connection
  3. Protocols

USB is used to connect two computers for data exchange. However, for a larger number of systems, cables are a more efficient means of data transfer. The purpose of the protocols is to connect and manage different types of devices that are connected to the Internet.

How does it work?

Basically, the purpose of P2P networks is to share resources and jointly maintain the functioning of systems, provide certain services, or perform certain tasks. However, P2P is most commonly used for data exchange on the Internet. Peer-to-peer networks are well suited for file sharing because they allow simultaneous reception and transfer of files to connected computers.

When a client wants to download a file or application over the Internet, it opens the corresponding website. In this case, the website acts as a server, while the operator of the website is the client. This structure works like a one-way street where data is transferred from point A (website) to point B (client device).

However, in the case of a P2P network, when clients need to download data of a similar nature, the scheme is completely different. Here, a virtual network is created based on the P2P application installed on the PC. When a user issues a command to download a file, it is received by all devices connected to the network that contain the desired file. In this case, the process can be represented as a two-way street, where data is converted into small fragments coming from the user’s device.

P2P architecture

P2P is often used in addition to data networks because each device and other peers in this structure have the same capabilities. For small networks, such as a private home or a small office, a P2P network is very suitable because each device serves as an autonomous working environment and can store all data on its hard disk.

The P2P platform is built to use a single software application, where each part of the program performs certain actions both as a client and as a server with the same capabilities.

Types of P2P 

1. Pure P2P network:

This type of P2P network is used instead of a dedicated server and implies that all peers have the same role.

2. Unstructured P2P network:

An unstructured P2P network facilitates users to connect to other devices. In this type of P2P network, all systems have their own role, but due to the lack of structure, it can be difficult to find a specific file.

3. Structured P2P network:

Unlike an unstructured P2P network, a structured network is difficult to set up. However, this network provides users with effective access to search rare contents in the network.

4. Hybrid P2P network:

The operation of a hybrid P2P network is similar to that of a client-server network. In this type of network, a central peer is defined to perform various actions that are normally performed by the server. It stores all the information about the connected system and responds to queries requesting this specific information.

Pros & Cons

The main advantages and disadvantages of P2P are briefly presented in the table below:

Advantages (+)Disadvantages (-)
No special operating system requiredThe network is decentralized
No well-trained personnel are required to manage the networkLack of a central storage medium
There are no requirements for a specific administratorPerformance problems may occur
Simple configurationSince data may be stored on multiple devices, it may be difficult to back it up
No expensive server requiredA large amount of copyrighted content is distributed without any permission
ScalableUsers can access any kind of files from another computer without any permission
Constant availabilitySpecial software, such as torrent, is required to access or download files
Simplified search processThere is no possibility to preview the file before the full download