Premium Essay

P2P Networks

In:

Submitted By gatelllau
Words 1881
Pages 8
Laura Gatell Perez
BAMA with Media and Cultural Studies, Yr 3.
School of Creative Enterprise.
Digital Media: Report.
13.11.2009

What effect have Peer to Peer networks had on consumerism such as the selling of films and music?

“In a P2P network, the "peers" are computer systems which are connected to each other via the Internet. Files can be shared directly between systems on the network without the need of a central server.” (http://www.techterms.com/definition/p2p)
It is essential to understand the meaning of “Peer to peer” in order to study the subject in depth. This report aims to analyse and explore the effects of Peer to Peer networks in the music and film industry, and it’s effect on consumerism.

In order to fully understand P2P networks, it is essential to study it’s historical and social context first. Peer to Peer networks started with the so called ‘Internet Boom’ in the late 1990’s. The first online file sharing services operating between 1999 and 2001 was Napster, created by Shawn Fanning. It was the first technology who allowed people to share their MP3 files with others. At the beginning only audio tracks were available for download and it took approximately 30 to 45 minutes for a song to download. Nowadays it takes about a few seconds for a song to download and from 10 to 20 minutes for a movie. However, Napster was soon shut down as it lead the music industry to accuse them of “massive copyright violations”. Moreover, in 10 years the number of users increased considerably from 58 million in 2001 to more than 70 million in 2004. But the problem persisted years after the launch of the service. However, other new networks such as, Limewire, Morpheus or Azureus where still developing and offered a wide variety of copyrighted material to exchange. More than 70% of people aged between 18-29 think file sharing is acceptable.

Consumerism has

Similar Documents

Premium Essay

Nt1310 Unit 4 P2p Networks

...client. These servers usually require tremendous network and processing resources in order to serve multiple clients requests simultaneously. Still, the last mile to the server often becomes the bottleneck of the system because all clients are served by this one central network link. The QoS delivery of video streams cannot be guaranteed in case the bandwidth requirements exceed the resources at disposal. In order to overcome this major drawback network workloads need to be distributed and scaled as it is often achieved in P2P networks. Applying these techniques to VoD applications allows each peer in the network to act as a restricted video-server by offering a low number of selected movies to all other peers. As a consequence the workload is distributed among all participating peers. The...

Words: 463 - Pages: 2

Premium Essay

Unit 1 P2p Research Papers

...process of computer networks in which each computer can act as a server for the other computers. This allows shared access to files and peripherals without the need for an central server.The first thought of development of P2P(Peer to Peer) was established in 1969. It was the first RFC(Request for Comments). However, the first implementation of a P2P network was Usenet. This implementation was in the year,1979. The next fifthteen plus years, which followed the first implementation of P2P were uneventful. This would continue until the late 1990’s, when a surge in popularity centered around P2P’s capabilities came about. The way the security of P2P works is by “encrypting P2P traffic, the hope is that not only will the data be safely encrypted, but more importantly, the P2P data stream is encrypted and not easily detectable. With the actual connection stream completely encrypted, it becomes much harder for the P2P traffic to be detected, and, thus, attacked, blocked, or throttled.”(1). The other aspect of how P2P security works would be “anonymizing peers, the P2P network can protect the identity of nodes and users on the network, something that encryption only cannot ensure.”(1). They both work together, well in conjunction, making P2P rather useful in the security field at times. An...

Words: 1620 - Pages: 7

Premium Essay

Computer Networking

...connection speeds. The two most commonly used networks are client servers and peer to peer (P2P) networks. There are many ways that computers connect and share information with each other. Computers today connect and share information by connecting to a network. There are several types of networks that computers can connect to, but the two most popular are local area networks (LAN) and wireless local area networks (WLAN). In a computer network, anything that a computer can communicate with can be connected to the network. Such as printers, fax machines, routers, and other computers. The internet was created in the mid 1960’s by the department of defense. At first this new invention called the internet was not available to the public. Like with every other new technology, the government officials were the only ones with access to the internet. In 1974 the design of the Transmission Control Program (TCP) made data and information sharing easier and more efficient. In 1982 the internet technology protocols were developed. These protocols worked together with the TCP to regulate and monitor the information sent/received over network. The first definition of the internet is described as computers connected to a set of networks (Mitchell, 2010). From here on out, the World Wide Web is the most sophisticated way to send and receive electronic mail, find information on any topic, and access web pages from any computer. A computer network is used to connect two or more computers together...

Words: 1649 - Pages: 7

Free Essay

How Uber Succeed

...Introduction Uber, a young but famous startup who was founded in 2009, created an innovative business model (Ridesharing services) in transportation industry with the help of modern technological innovations. People just need to tap on Uber app to order a ride. Due to the convenience and reliability of its service, Uber has become a global company who has $51 billion market valuation and operates in 330 cities in more than 60 countries. It can be learned from the case that a product innovation from a startup is changing the ride-service industry or even the transportation industry. This paper will analyze how product innovation helps Uber to be a well-known and highly valued company in just few years. Arguments Based on the case, there are three reasons of Uber’s product innovation success: an innovative business method, good timing of entry and a coherent strategy. An innovative business model As we all know, Uber was created to solve the problem of unmatched rides demand and rides offer due to the difference in space and time in taxi industry. The basic pattern of Uber is to provide an information exchange platform as a form of mobile application to connect passengers who need rides with drivers who can provide ride services. It can be considered as a new application of peer-to-peer model in transportation industry. So Uber actually is a platform provider. This platform helps the form of ridesharing service, which is quite different from traditional way of taking rides...

Words: 1773 - Pages: 8

Premium Essay

Nt1330 Unit 3

...2. Bill has two networks that he can choose from, Peer to Peer network (P2P) or Client Server Network. Peer to Peer network is a decentralized network, consist of up to 10 computers plugged into a central device called a hub or switch. In a P2P network, the user is the administrator of the computer, the administrator can host and share different computer devices such as scanners or printers with other computers in the network. This process requires to log on through a local account that authenticates each user log in. For that purpose, this will help to prove the unwieldy for the user and resource they are trying to use. P2P networks are ideally suitable for home and small businesses where security isn’t a concern. The goodness of having P2P network is no costly servers the low cost, no time to set-up and no expensive servers to purchase, also it requires little to no training involved....

Words: 859 - Pages: 4

Premium Essay

Computer

...in researching   1) Developing a search strategy showed me how to organize my material and stay on topic. It also introduce me to key concepts which I have been using in my classes when studying and taking notes. Ironically I found using this method at work as well. Recently I found a solution to an ongoing network problem and my manager approached me asking me to fully research the resolution draft an email and send it out to the entire team.By using the search strategy I was able to gather the correct information that was needed to draft the email and send it to my team. 2)The Boolean operator AND OR NOT stuck in my head the most. I learned that this method is the main component to an effective statement and to broaden or narrow your search. When I use to search google without using the Boolean operator I always wondered why the search engine always gave me along list of searchs that didnt really relate to what I was looking up. By using this method I was able to get the exact results that I wanted and as I mention above this method was also used when I did my initial search statement for the email I sent to my colleagues on how to properly resolve the network issue. 3)Lastly the most important component of a research project is to cite the resources appropiately. In this course i was introduce to several styles of citing. There are different citing styles for different  documentation styles. I had to go back and really study this method thoroughly as suggested by...

Words: 337 - Pages: 2

Free Essay

There After

...How would one counter an active attack? b) Give examples of two possible scenarios when one cannot be absolutely certain that an adversary is launching a modification-of-message attack or denial-of-service attack, even when the proper security protections are in place. Explain your answer. c) How could traffic analysis jeopardize security? Give an example to illustrate your answer. Question 2 (a) Is it likely to achieve perfect security for a network (i.e. to have a network that will never fail in terms of security) in the real business world? Give three possible reasons to substantiate your answer. (b) The computing speed is much faster these days compared to that some years back. On the other hand, old algorithms and systems are still in use. Give three reasons to explain this situation. Question 3 a) (i) Explain Security Services and Security Mechanisms. (ii) Suppose the main threat of a network is replay attack. Does the use of confidentiality services protect the network against such attack? Explain your answer. (iii) Is it always the case that only one mechanism can be used to achieve the provision of a particular service? Give an example to illustrate and explain the answer. (b) Explain how the following services ensure security of the systems or of data transfers and give possible example or scenario for each: i) Message authentication ii) Non- repudiation iii) Confidentiality ...

Words: 284 - Pages: 2

Premium Essay

Harriet's Chocolate Factory

...Case Study 1: Harriet’s Fruit and Chocolate Company Daniel Michovich Dr. Otto CIS532: Network Architecture and Analysis January 26, 2013 Mission Statement: Striving to be number one fruit and chocolate industry area wide. Introduction “Harriet’s Fruit and Chocolate Company was established in 1935 in the Pacific Northwest of the United States to ship gift baskets of locally grown peaches and pears to customers in the United States (Oppenheimer, 2011)” In regards to the physical infrastructure of Harriet’s Fruit and Chocolate Company, my investigation will reveal many important aspects to aid in the planning of the network design. First, I will determine the number of buildings to be used, as well as the distance between them and what equipment they will contain such as wiring closets or computer rooms and the current network devices. Determining the distance will help in the cabling design and wiring as well as the selection of technologies and devices to meet the design goals. My investigation will further reveal any architectural or environmental constraints, such as tall trees within the path that power lines may travel, that will assist in decisions such as whether wireless technologies are feasible as well as if there are any impediments to communications or installation, to include all hazards. Infrastructure architecture consists of the hardware, software, and telecommunications equipment that, when...

Words: 1326 - Pages: 6

Free Essay

Ecss Practice Exams

...| | |The most damaging of the denial of service attacks can be a _______________ attacks, where an attacker uses zombie software distributed | |over several machines | | | | | |[pic] | |Bot | | | | | |[pic] | |Distributed denial of service ...

Words: 2882 - Pages: 12

Premium Essay

Ipremier Case Study

...customer an opportunity to decide if they want the products or not. iPremier Company iPremier is one of the top retail business that sell the luxury items, profiting $2.1 million on sales $32millions in 2006. Since then sale has grown over 20% annually. There was a decrease, but everything works itself out. Upper management describes working at iPremier as intense. .Qdata is the company that host iPremier computer equipment and provided connectivity to the internet (Austin and Murray, 2007). Although Qdata offers monitoring of website for customer and network operation, they had not invested in advanced technology and was not able to keep staff. During 75-minute attack how well did they iPremier perform. What would you have done differently if you was Bob Turley Bob Turley is new Chief Information Officer and is currently in New York on business. AT 4.31 am he received a call, from the network been hack and wired email received with just the word “Ha”. The site was a DoS attack coming from about 30 locations, the purpose of the attack was an attempt to make the computer unavailable. iPremier was not ready for such an attached and didn’t have anything in order which would help them with such an attacked. The situation was poorly handled, and Bob did not contact anyone higher up to let them know what was going on. He didn’t know who to contact, whether to call police or FBI or who to contact at...

Words: 967 - Pages: 4

Free Essay

Trending & Aggregation

... | |*Document Date: |[2013-05-20] | | T&A Handbook [pic] Update Notes |Date |Version |Description |Author | |2013-05-20 |V1 |T&A Handbook |Elham Kalantari | Contents 1 Introduction 3 2 T&A Interfaces 3 2-1 Source Availability 3 2-2 Dashboards 4 2-2-1 General Information 4 2-2-2 Over Time Mode 5 2-2-3 Over Network Elements Mode 9 2-2-4 Dashboards Contextual Menu 9 3 Examples 10 Introduction This document will guide you through the Trending&Aggregation (T&A) user interfaces. Some examples are available at the end. T& A Interfaces 2-1 Source Availability [pic] : This icon allows the visualization of source file availability. By clicking on it, below window appears. [pic] :...

Words: 1080 - Pages: 5

Premium Essay

Computer

...afford to spend and if anyone is technical in the company or are they going to need some outside help to keep up maintenance after the system is in place. (this can add to the cost of the system) My next step would be to start asking some questions about the law firm. I would like to know what the law firm is in charge of doing. Criminal, civil, family or so on; I think this would give me a better understanding of some of the information I may be working with along the way. As a law firm I am sure they spend a lot of time in the courtrooms and in their home offices so other questions I would ask is if they have cell phones and laptops that will need to access information on the network; this will help in a couple of areas, firstly in deciding if we should consider cloud computing or a private network and secondly, how to set up files access and permissions by departments and depending on size of company, maybe servers. Being a law firm a big consideration would have to be security of the information they access and ways of accessing this information. I would like to talk with the employees also, just to get an idea...

Words: 500 - Pages: 2

Free Essay

Paper

...Ruben Quinones IT245 - Introduction to Network Management Colorado Technical University Online Professor: Dr. Shawn P. Murray Phase 1 Individual Project Due January 13, 2013 Table of Contents Section 1: Target Organization - Identifying the Network 3 Section 2: Diagramming the Network - Network Architecture 4 Section 3: Network Models 5 Section 4: Network Protocols and Agents 6 Section 5: Network Security 7 Section 6: Network Management 8 References 9 Section 1: Target Organization - Identifying the Network * My organization is located in Pompano Beach, FL with a secondary warehouse location at Sunrise, FL. The company employs around 1,400 to 1,500 employees which 300-400 are computer and mobile device network user. * All of our users must use password protected sign on to access the network which gives access to our main software systems. * The company uses to Dell servers, one for back up and one for daily accessing. * The IT department consists of 5 employees; * IT manager – Supervises all IT technicians and Help desk operators. * Network I technician – overviews and maintains network protocols, ensures regular server maintenance is executed. * Network II Technician – gives back up to Network I and provides different analytical services to users. * Help desk technicians I and II – Executes more regular tasks, such as user maintenance, printer set up, workstation access and set up, and mobile devices...

Words: 269 - Pages: 2

Premium Essay

Case 2.1 Server Downtime

...TO: FROM: DATE: February 15, SUBJECT: Server Downtime Problem Statement: This report contains my findings and recommendations as a result of my research. This is a look into the server downtime and problems with the primary network servers here at Widget Company. First we will be looking into the numbers and statistical results I have found. Statistical Results: Based on the data I was given during the month of April the network experienced 5 different problems, they are lockups, memory errors, weekly virus scan, slow startup, and manual restart. The results of these issues are. 22 times the server was down 735 Minutes of total time server was down * * Of those 22 times the server was down the breakdown of how frequently each one occurred is as follows. * * * * This shows that memory errors were the most frequent reason the server was down. Memory errors were also responsible for the most time at 34% or 250 Minutes. What is interesting is that while there were only 4 times the server was down for its weekly virus scan it was responsible for about 33% or 240 minutes of the server downtime. * * * * Aside for the 4 planned weekly virus scans of 60 minutes each. The server was down 18 times for 495 Minutes. Memory errors contributed to over half of this downtime. Next we will take a look at my recommendations based on the data. * * Conclusion * * The server was down for a total of 735 Minutes during...

Words: 323 - Pages: 2

Premium Essay

Unit 8 Assignment 1

...institutions, and a number of private security firms — all working to study and combat data breaches. Analysis With 47,000+ Security incidents analyzed, 621 confirmed data breaches studied, and 19 international contributors, Verizon has ample amounts of data to compile and use to better their network. This data can also be analyzed to see what types of people are making these breaches and what motives they may have for doing so. In the 2013 DBIR, 69% of breaches were spotted by an external party and 76% of the network intrusions were due too weak or stolen passwords. Some of the other factors that have been realized was that 75% of the attacks are opportunistic and 19% of attacks are some form of espionage. There is also much evidence that many of these breaches could be tied to organized crime and gathering financial information. On a very basic level, just looking at the history of organized crime, money has always been in the center in one form or another. The money can be in the form of an exchange for a good or service, or it could be, knowing the financial information of someone for future business proposals or some other malicious intent. Recommendations - Tighter security on the networks. - Since some data breaches are done by resigned employees, instant account closing of all resources to...

Words: 344 - Pages: 2