Asked Nov 16, 2019

What are some prominent examples of legitimate and appropriate use of P2P?

Whenever we discuss P2P, students will inevitably bring up torrent-based P2P file sharing. From a web technology perspective, what are some of the programs that have been developed, and what kinds of interfaces do they offer? What are the risks of using them?


Expert Answer

Step 1

Peer-to-peer file sharing is the method of sharing, spreading and distribution of digital media. This sharing is done via (P2P) networking technology. It is very different from traditional downloading. It facilitates interaction between computer hardware and software without the need for a database. There is no central server for handling requests in a P2P architecture, unlike the client-server architecture. To link computers and devices without having to configure a database, we need peer-to-peer networks. It's very expensive and difficult to maintain trying to build a server for everything, so people prefer cheaper alternatives such as P2P. Here are some prominent examples of P2P networks –

1)Homegroup is a small set of computers that are connected to each other to share storage and printers. It's one of the most common peer-to...

Want to see the full answer?

See Solution

Check out a sample Q&A here.

Want to see this answer and more?

Solutions are written by subject experts who are available 24/7. Questions are typically answered within 1 hour.*

See Solution
*Response times may vary by subject and question.
Tagged in


Computer Engineering

Related Computer Engineering Q&A

Find answers to questions asked by student like you
Show more Q&A

Q: Which of the following statements are true? In PC relative addressing mode, the PC and constant need...

A: In PC relative addressing mode, the effective or branch address is obtained by adding offset to PC t...


Q: what is the difference between technology and frame work when it comes to computer engineering?

A: Definition:TECHNOLOGYTechnology, in general refers to the scientific knowledge that is applicable fo...


Q: Hello, I am struggling to write a program in Python for a following problem: Write a file ( .py). In...

A: Solution:Given data,The python code to strips the first letters from all file names in a directory i...


Q: identify and briefly four reasons why computer incidents have become more prevalent

A: Four reasons why computer incidents have become more prevalent are:Increasing the complexity of vuln...


Q: Subclass toString should call include super.toString(); re-submit these codes.   public class Vehicl...

A: Program Modifications:Add the super.toString() call with the other print statements in the toString(...


Q: What are REST web services and what is the reason for its popularity?

A: REST stands for Representational State Transfer and is an architectural style for most web based app...


Q: Which partitioning method must be used for partitioning a 4-TB hard drive?

A: Partitioning 4-TB Hard drive:Hard drive uses two methods for partitioning the drive; they are, Maste...


Q: Write a program called StudentTable that prints the below table. Use only print() orprintf(). DO NOT...

A: The program in Java would be using print and printf statements with formatting for left alignment of...


Q: Write a program that asks the user to enter today’s sales for five stores. The program should then d...

A: To solve this program following variables, data types and methods are used to calculate the sell val...