The p2p networks are new real deal for savvy and modern people looking for cool networks. The concept for this type of networking started in 1999 as file sharing systems like the music-sharing app, Napster. It can also be an ad hoc connection; a group of computers connected via a universal serial bus to transfer files. A good example is this, a chat session between computer A and computer B will not hinder a file transfer from computer D to computer E. Furthermore, if computer D does not have the file needed, the user of computer E is able to start a search to find another computer on the network with the required file. However, depending on the search algorithm, the amount of bandwidth used for a small network varies from a network of many attached devices. This means that the search has to go through all the computers before locating the file. Therefore, it would take a lot time for a network of many devices. However, the P2P applications are a mixed breed where the server has all the search tools and file location information whereas the file transfers are completed directly from device to device.
One of benefits of p2p networks is that the resources of all the computers spread the load thus increasing the strength of the network. Transferring files from one computer to different computers is easier and faster without the resource computer bogging. This networking enables the ability to access internet wherever one is around the world. A mobile phone p2p network is a great way to search and share ringtones, music, videos or photos. When applied within a work environment it enables instant messaging among colleagues. P2p networks running costs are also small for the innovative content distributor. You will also benefit from streaming media using applications such as PP Live, Cybersky-tv, JOOST and many others..
All networking systems encounter security problems. The p2p networks use authorization, encryption and authentication as the primary areas of security concerns. Authorization means that the user has the entity permission to use resources or perform an action. Authentication is where by the online user is trusted to be who they claim to be. Moreover, encryption is the method of rendering a message hard to read unless the online user possesses the appropriate method or decipher key. To enjoy p2p networking, security has to be entirely upon the user. Network security should be studied before any file sharing application is set up for all the files and areas left open for sharing