This website uses cookies to ensure you have the best experience. Learn more

Peer To Peer Technologies In Distance Learning Essay

2432 words - 10 pages

Brief Introduction of Peer-to-Peer Technologies
What Is Peer-to-Peer?
The term “peer-to-peer” has various meanings under different circumstances, when mentioned in the context of digital and network settings, especially nowadays with the popularity of Internet usage, this term is often used to describe a type of decentralized and distributed network architecture, in which individual nodes in the network act as both suppliers and consumers of data resources (ref.); these nodes, i.e. the “peers”, are actually end-user devices, such as personal computers, PDAs, iPads, and mobile devices with accessibility to Internet.
Initially, when different kinds of end-user devices become common in people’s daily life, they are often connected together through the local area networks to certain central servers to get access to files, videos, audios, and other information. These central servers are typically more powerful than the personal computers, so any large data processing can take place on these central servers, allowing the end-users to download files onto their personal computers.
In contrast to the centralized client–server network architecture, where the clients request access to resources provided by central servers, the peer-to-peer network will “share” the computing power among multiple inter-connected peers, who each make a portion of their resources, such as data computing, disk storage, or network bandwidth etc., directly available to other network participants without the need for any coordination by the central servers (ref.). Under the peer-to-peer network architecture, various end-user devices become much more powerful; they are now able to process the data locally rather than on central servers. As a result, the peer-to-peer network architecture and related technologies allow individual end-user devices to bypass the central servers to connect and collaborate directly with each other (ref.).
For example, in a centralized network architecture, when an end-user downloads a file from a website, an HTTP GET request is sent out first. This request will use one TCP socket and then communicate with one server which will transfer the entire file (ref.). The same request will be performed in a different way in a peer-to-peer network. The peer-to-peer protocol will create TCP connections with multiple hosts and make many small data requests to each. The peer-to-peer client then combines the chunks to recreate the file. Any single host only has limited upload capacity, but connecting to many hosts at the same time can allow for faster file transfers, and spread out the costs related to data transfers. In addition, a client mid-way will act as a server and host together the data that has already been downloaded. As a result, the peer-to-peer architecture can lead to lower costs and higher redundancy of network computing power (ref.).
Because of the above mentioned differences between the centralized client-server and peer-to-peer network...

Find Another Essay On Peer-to-Peer Technologies in Distance Learning

Peer Pressure In "Blackrock" Essay

1235 words - 5 pages Discuss how peer pressure influences the actions and behavior of the characters represented in the play, "Blackrock". What is the influence of adult role models that are available to these young people.In the play, blackrock by Nick Enright, peer pressure plays a major part in the horrific crimes that these otherwise ordinary boys commit. When Ricko first comes to town he begins to assert himself over the rest of the group, then when he knows he

Peer to Peer Piracy and the Film Industry

928 words - 4 pages Peer to Peer Piracy and the Film Industry Introduction Each day an estimated 400,000 films exchange hands through the Internet. Movie piracy, once reserved to pirate syndicates and illegal duplication factories, has become a common staple among college students with high-speed internet access. With advanced compression technology, movie files can be transferred across continents in hours and across campus networks in under ten minutes

An Ethical Evaluation of Peer-to-Peer File Swapping

3323 words - 13 pages An Ethical Evaluation of Peer-to-Peer File Swapping Abstract The last few years has seen an explosion in the use of the Internet as a means for exchanging, free of charge, digital media by way of Peer-to-Peer (P2P) file sharing technologies. Initially, the practice was primarily limited to the swapping of music, in the form of MP3 files. The pervasiveness of broadband, the advent of newer file types, and the creation of more

Peer-to-Peer File Sharing Hurting Music and Movie Industries

607 words - 2 pages People who download music and videos using peer-to-peer file sharing don't think that what they are doing is illegal, but according to the government, it is. Downloading files on the internet by anyone, including children, should not be tolerated. Millions of people are doing it and it's hurting the music and movie industry by the billions. The government should make more of an effort to put an end to file sharing between computer

Peer Pressure in The Crucible

824 words - 4 pages In 1692 many people died during the Salem witch trials; which were in effected greatly by peer pressure. It started off when the girls of Salem ran off into the night and went dancing in the forest. Then when the girls were caught some of the older girls threatened others and some just had great influence on others. For instance, Abigail started accusing random women of witchcraft and the other girls did it to, just for the excitement. Peer

How to Deal with Peer Pressure

865 words - 4 pages Peer pressure it’s all around us every day, every waking moment and we all have to deal with it. It’s how we deal with the pressure that may differ from everybody else. A great example of having to deal with peer pressure is George Orwell’s story Shooting an Elephant. As the British has come in and has taken over Burma many of the natives dislike the military place that are put in to keep the peace. One of these police or MP’s is challenged

History of peer-to-peer file sharing. Technology to prevent it, and the future of it

981 words - 4 pages Peer-To-Peer File SharingThe rise and fall of Napster in the late 90's brought file sharing over the Internet, and peer-to-peer technology, to the attention of the world. Napster's demise led to the creation of companies such as KaZaA, Morpheus, and Audio Galaxy, whom all learned a valuable lesson from Napster. Avoid copyright infringement and elude record companies. So far they have been pretty successful, but record companies are getting

Describe and Discuss Psychological research relating to development in Peer Relationships

1607 words - 6 pages ; Richards, 1991).This essay will begin by defining the word peers, before going on to discuss what is so special about peer relationships and describe the difference between friends and non-friends, and then outline and evaluate the research relating to development in peer relationships.By definition, peers are individuals who are close in age to one another, closely usually than siblings. Thus, in contrast with their status in most of their

Anthill: A Framework for the Design and Analysis of Peer-to-Peer Systems

1170 words - 5 pages . Voulgaris et al. state that a participating peer being able to randomly select another peer to exchange information is a crucial element in an epidemic protocol. Traditional protocols supported this random selection by providing a list of all other participating peers. Their research is based around the fact that this approach cannot scale to large networks and consequently the authors have developed an epidemic protocol for disseminating

Learning Technologies in Adult Education

1946 words - 8 pages is related to what they are. Because of the term technology, it is frequently believed that learning technologies are instructional devices that make use of computers, the Internet, or some other type of electronic technology such as video and television. Newer learning technologies are changing the shape of the landscape in adult education, however. Distance education is burgeoning and web-based training opportunities abound. In many circles

Peer Affiliation, Social Behavior, and Callous-Unemotional Traits in Adolescence

2384 words - 10 pages psychopathy and severe antisociality, this paper will focus specifically on the callous-unemotional temperamental style and its correlates. Given that adolescents spend a dominating majority of their time in the presence of their peers, when studying any form of psychopathology in this population it is of eminent importance to also consider the effect of peer relations on the construct of interest. The growing body of work in the peer relations

Similar Essays

Napster Peer To Peer Technology Essay

1877 words - 8 pages Napster Peer to Peer Technology The latter half of the twentieth century has seen a dramatic decline in the price of reproduction technologies much to the displeasure of the copyright industry. The technological progression has been virtually unstoppable: the photocopier to the cassette recorder, the video tape recorder to the newly developed recordable CD. The spread of the Internet over the past 10 years has resulted in the new

Scalability And Consistency In Peer To Peer Based Network Gaming

2012 words - 8 pages results that occur in the game world back to clients. As the number of clients grows, scalability is achieved by employing server clusters. In addition to broadcasting results, the server is also responsible for: managing player positions in the virtual world, manage the AI and non-player characters in the world, and securely save each player’s characters and their traits. An optional model being widely proposed for deploying MMOGs is the peer-to

Classes Of Decentralized Peer To Peer Networks Essay

2061 words - 9 pages probabilistic flooding algorithm, which considers resource distribution and heterogeneity of the number of direct outgoing links to other peers to reduce message overhead. Similarly to our proposal, in this method, each peer selects a neighbor as query’s next hop based on a function of its degree and a function of its neighbors’ degrees. These two functions also depend on the distance from the query’s originator to control the amount of generated load

Solutions To Peer Pressure Essay

1114 words - 5 pages Many people experience all different forms of peer pressure throughout their life. There are different types of peer pressure such as to do drugs, or drink or even to just do something completely dumb or against what that specific person believes in. At a teenager age there are many more issues with peer pressure because in these years not only are we vulnerable and curious but the people known as our ‘friends’ have a lot of influence over us