|Broadband Internet Information|
How Peer to Peer (P2P) Works
Peer to Peer (P2P) Technology- How it works:
Ever wondered how P2P works? This guide will run down most of the major P2P services and how they work. Peer to Peer technology lets people share files over a network on the internet. Most people now use what is known as the second generation of P2P, which is unlike its predecessors like such as Napter, the second generation has no centralized server, making it harder for it to shut down.
How first generation P2P services worked:
A connection is established by a peer finding another peer to connect to. Each peer exchanges active peer and their addresses. When a connection has been established, the user can then search for files. When a search has been submitted, it connects to all nodes on its connection list. The results are then displayed and a connection is made.
How second generation P2P services worked:
Gnutella2: Hubs are used to quickly search for files, eliminating the original "find peer and search" method. Instead, they store a list of files on all the "Leaves" (A peer) that are connected to it, thus dramatically reducing search time. Advantages: Unlike Napster, if a hub crashes, it's network stays alive. Disadvantages: Doesn't make network any more durable than the first generation of P2P. Gnutella2: www.gnutella.com
FastTrack: Programs such as Kazaa and iMesh use the FastTrack protocol. Normal peers connect to a supernode which acts jsut like a hub. Supernodes also connect to other supernodes, allowing search requests to move through the network very quickly. Peers then establish a direct connection to a client after a file has been found. Advantages: Any client can become a supernode. Disadvantages: Corruption of files occur. Clients include: Kazaa (www.kazaa.com), iMesh (www.imesh.com)
BitTorrent: .torrent files are used to store information about the file being shared. Once a torrent file is opened, the client connects to the tracker which tells the client where the file is located and what other peers/seeders there are. BitTorrent works by chunks of small files being transferred (even through multiple connections), while you are downloading. The files are checked for corruption as the download continues. Leechers are people who download and don't upload, and are highly frowned upon on some sites, disallowing them from downloading any further. Advantages: Very fast for popular, new files. Disadvantages: Trackers are unreliable and if it goes down, the file is lost. Clients include: Azureus (www.azureus.com), Shareaza (www.shareaza.com).
EDonkey Network: Edonkey runs on the same principle as first generation P2P, only anybody can become a server. Clients communicate with the server to download files, and random chunks can be downloaded in any order then put together in the end. Advantages: No file corruption, leech penalization. Disadvantages: It can penalize users unfairly. EDonkey: www.edonkey2000.com
Infinitive!, Copyright 2005. All Rights Reserved.
Infinitive! http://www.infinate.x10hosting.com This article may be reproduced so long as your remain a link down the bottom. -Admin, Nigel.
This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news
How students and administrators are working together to expand broadband internet in the region - The Post
Hoeven Convenes Hearing To Examine Broadband Internet And Other Telecommunications Access On Tribal Lands - United States Senate Committee on Indian Affairs
Cyrier: Texas must improve broadband internet access in rural communities - Austin American-Statesman
The Coming Television Revolution
The revolution is just getting started and will be begin to make its mark this year. By 2010, it will begin to take off.
Webmail - What are the Benefits?
There are so many different webmail services on the internet, from the huge ones like Yahoo, Gmail, Hotmail, to the much smaller ones from private websites and ISPs. There is a lot to worry about with e-mail these days but some of these front line webmail services are really a great way of helping to protect your system.
How to Secure your DSl / Cable Internet Connection Against Malicious Attacks
Securing your Windows Xp computer is done by achieving two main tasks.The first, is to prevent unauthorized users sitting at your computer and logging in through your keyboard.
How to Troubleshoot Your Internet Connection for DSL or Cable Service
One of the common problems among internet users is testing their internet connection to pinpoint the exact problem. There is a big number of internet users who use DSL, and cable modem service.
Business Satellite Internet Products Compared - 2005
There are a number of options available for Business Class Satellite Internet connectivity in the U.S.
Beta Testing First Mobile Internet Satellite Broadband, Part III
Back in 1999 when we beta tested the first wireless mobile office with satellite broadband Internet we had something that no one lese had. Today you can buy these systems for $5,500 fully installed on any RV.
Broadband Connection to the Central Sun
You may have noticed the expansion of consciousness that has taken place since the Harmonic Concordance. This is due to the new Broadband connection that has been created to the Universe's Central Sun.
Broadband is the name given to a high-speed Internet connection that provide large bandwidth. It is a quick connection, typically "always-on" and capable of transmitting data at a much faster rate than a standard dialup modem connection.
Broadband - Will it Affect Your Online Marketing Future?
The coming age of general Broadband use bearing down upon us, minute by minute, is going to leave many changes in its wake. Some will be welcome; others will demand all we can do, just to keep up!Of course, items like high quality graphics, streaming video and movies on demand will be commonplace.
Ka Band -Affordable Satellite Internet On The Way!
Ka Band VSAT* satellite internet technology has enormous possibilities for telecommuters, rural locations and eventually for Motor Home users around the U.S.
A Cheap Alternative To Broadband?
Are you a dial-up user looking for a faster connection, but don't like Broadband prices? If so, you should take a look at a new service called OnSpeed, which has received rave reviews in Internet technology publications.What OnSpeed does is to re-route web pages and email via its own servers, compressing the data on the fly prior to sending it onwards to your PC.
Some DSL Broadband Definitions
Often too many people get confused with all the definitions, here we have explained in easy to understand terms.ADSL: Asymmetric Digital Subscriber Line - asymmetric meaning it's faster downstream than upstream.
Remotely Connecting by Satellite To the Hospital - 2005
Hospital's and the Medical Professionals associated with them across America have discovered during the last few years that a great deal of efficiency can be accomplished by utilizing the World Wide Web to connect Doctors, Surgeons, Medical Transcribers and remote or mobile Clinics together. A specialist can instantly review an X-Ray or medical chart half way around the world or from a very remote area.
Time to Redefine Telecom
Telecommunication, according to Wikipedia, is the extension of communication over a distance. In practice, it also recognizes that something may be lost in the process; hence the term 'telecommunication' covers all forms of distance and/or conversion of the original communications, including radio, telegraphy, television, telephony, data communication and computer networking.
Internet service providers are becoming more and more present as the internet makes its way into more and more homes in America. This is making it harder to decide which ISP to subscribe to.
Wi-Fi Hotspot Security
You've set up your Boingo account, you're hanging out at the Home Turf sports bar in LAX and you figure you'll do a little business or check your e-mail while sipping a Chardonnay. Well, that's the point of Wi-Fi hotspots; being able to take care of a few things while in a relaxing atmosphere.
ICMP Protocol - Internet Control Message Protocol
The Internet Control Message Protocol communicates errors messages between systems that require attention. This error is not usually at the user level, the error is handled by the application layer.
Google Brings Millions of Hard-to-Find Library Books to Your Fingertips
Millions of hard-to-find books from five major libraries will soon be a lot easier to access: Google has made plans to scan and digitize them, making the books available on their widely used Internet search engine.Google's latest endeavor is a large step beyond previous attempts to scan books so they can be read online (Google, Amazon.
How to Choose Best ISP for Your Needs
Well, the Internet access industry is starting to shake its way out. The much-anticipated consolidation of access providers is nearing its end.
Are you suddenly chat-less now that Yahoo has shut down many chat sites, due to complaints? One complaint was that people where using chat rooms to lure under age kids for sex. While others say the chat rooms were used to promote underage sex.
|home | site map|