P4P Remodels File Sharing

Technology Review“Peer-to-peer” (P2P) is synonymous with piracy and bandwidth hogging on the Internet. But now, Internet service providers and content companies are taking advantage of technology designed to speed the delivery of content through P2P networks. Meanwhile, standards bodies are working to codify the technology into the Internet’s basic protocols.

Rather than sending files to users from a central server, P2P file-sharing networks distribute pieces of a file among thousands of computers and help users find and download this data directly from one another. This is a highly efficient way to distribute data, resistant to the bottlenecks that can plague centralized distribution systems, but it uses large amounts of bandwidth. Even as P2P traffic slowly declines as a percentage of overall Internet traffic, it is still growing in volume. In June, Cisco estimated that P2P file-sharing networks transferred 3.3 exabytes (or 3.3 billion trillion bytes) of data per month.

While a PhD student at Yale University in 2006, Haiyong Xie came up with the idea of “provider portal for peer-to-peer,” or P4P, as a way to ease the strain placed on networking companies by P2P. Continued at Technology Review.

Related Posts

Microsoft’s Surface RT is an “Unmitigated Disaster.” What’s wrong with that?... After Microsoft successfully used Restricted Boot to make dual-booting Linux distributions and Windows 8 on newer desktop and notebook computers a pai...
$49 Android PC’s ROM, kernel and bootloader released It has just been announced that the ROM, kernel and bootloader for the APC (Android PC) are now available for public download. The APC is an initiativ...
Hooks Hijacked? New Research Shows How To Block Stealthy Malware Attacks The spread of malicious software, also known as malware or computer viruses, is a growing problem that can lead to crashed computer systems, stolen pe...
Online Access With a Fingerprint A new service developed by a researcher at the University of Southampton makes it possible for users to maintain multiple online accounts using a scan...
Two things I’ve learned from using Tor Browser So for the past three months I've been using Tor Browser to surf the Web, not as a primary browser, but as a secondary browser. Firefox is my primary ...
Mozilla caves in to industry forces behind DRM-in-HTML standard Here's the latest from the Electronic Frontier Foundation on the battle to keep DRM (Digital Restrictions Management) out of the Web. This is case of ...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.

Leave a Comment

Your email address will not be published. Required fields are marked *