Blog: P2P

 File sharing is transferring a file from one computer to another. File-sharing can be between any two devices connected through a network or using a storage device. There are different ways to share a file, such as uploading it on a hosting website; anyone who can access the server will also have access to the file. We can distribute it through and call it a storage device such as a USB. We can also share it between two computers directly over a network, a “Peer to Peer” (P2P) file sharing. P2P is a file-sharing method between two or more computers without using a central server. In P2P sharing, a computer can act as a client and a file server.

P2P file-sharing requires a P2P client. Some typical clients are BitTorrent, LimeWire, and Vuze. A torrent file contains information about files to be distributed, such as names, structure, network locations, etc. It identifies such computers that can send the parts of the requested file. With this, it can download a file from different computers located anywhere in the world. During downloading a file, a computer can also upload the parts of a file to other computers. Another method of P2P sharing is through a file hosting service. We upload a file on a file hosting service site like Google Drive, MEGA, MediaFire, and Dropbox. After uploading a file, we can access it publicly or privately, depending on our choice.

File sharing through P2P can be illegal if the shared item is copyrighted. These are the primary sources of digital piracy, as almost everything from a music track to software is accessible free of cost via P2P sharing. This affects the creator and distributor of a file adversely. An example of piracy through P2P sharing is the number of downloads of “The Dark Knight” movie; people downloaded it through P2P file sharing over seven million times.

References.
  1. Digital Pirates Winning Battle With Studios by Brian Stelter and Brad Stone. The New York Times, Feb 5, 2009, p. A1.http://www.nytimes.com/2009/02/05/business/media/05piracy.html

Comments

Popular posts from this blog

Modeling Reality with Virtual Worlds

Blog v Wiki

Blog: Privacy