This website uses cookies to ensure you have the best experience. Learn more

Are Peer To Peer File Sharing Networks Dead?

2399 words - 10 pages

Abstract
Peer to Peer file sharing networks established in the late 1990s with the introduction of Napster and evolved with networks and applications such as Limewire, eMule and BitTorrents accounted for roughly 27% to 55% of all Internet traffic in their peak times.
Other technologies have now been introduced which started to see P2P Network traffic decline, dropping from 3.5% to 0.6% of total internet traffic. Or reported by the University of Michigan peer-to-peer network traffic has gone from 4 percent of all Internet traffic to about half a percent in recent years.
The Apple iTunes store with a catalogue of over 12 million songs, 55,000 TV episodes and 8,500 movies amongst 50 million ...view middle of the document...

There is little evidence to support that peer to peer file sharing networks are about to evolve into something else.

1. Introduction
This essay will investigate the topic of “Are peer to peer file sharing networks (like BitTorrent, eMule etc.) dead or are they about to evolve into something else?”
The middle to late nineteen nineties saw the internet become economically available in average households. With the internet evolving, technologies leveraging from internet users around the world were being introduced that provided an easy mechanism to share multimedia files such as music and videos. In 1999 Napster was born and this was the mainstream introduction to Peer to Peer file sharing networks. Throughout the new millennium peer to peer network traffic started to increase with the introduction of other applications, such as Limewire and eMule for example. It didn’t take long for peer to peer traffic network traffic to grow so large with the introduction of BitTorrent technology that in February 2009 it was estimated that it accounted for roughly 27% to 55% of all Internet traffic (depending on geographical location) (Schulze, H & Mochalski, K 2009).
The essay will first look at what a peer to peer file sharing network is, then flow into other forms of file sharing and download methods available. As well as giving the reader an understanding of the technologies in question this essay will investigate the statistics of the relevant technology’s and explore if peer to peer file sharing is becoming something of the past or evolving into something else.

2. Discussion
A Peer to Peer file sharing network from here on forward in the essay will be referred to as ‘P2P Network’. A P2P Network is a computer network where clients are connected to each other via a common software program and a computer network, most commonly the internet.
“Files can be shared directly between systems on the network without the need of a central server. In other words, each computer on a P2P network becomes a file server as well as a client.” (P2P (Peer To Peer) Definition 2011, p.1) Upon connecting to a network, the P2P network software “allows you to search for files on other people's computers. Meanwhile, other users on the network can search for files on your computer, but typically only within a single folder that you have designated to share.” (P2P (Peer To Peer) Definition 2011, p.1) Although there are many different P2P networks and applications available, some of the most popular software programs include Napster, Limewire, BitTorrent, and eMule.
While P2P Networks ruled internet traffic and file sharing mechanisms in the new millennium, recently evidence has shown that there has been a decline in P2P Network traffic, as shown in Figure 1. The image shows the traffic monitored on the following ports 6346, 6882, 6881, 4662 which are the most commonly ports used by P2P File Sharing Applications and Networks.


Figure 1 (Arbor Networks 2009)
...

Other Papers Like Are Peer to Peer File Sharing Networks Dead?

Tech 140 Essay

648 words - 3 pages sharing method. | |d. |Networks enable multiple users to share resources. | ____ 2. Which network model ensures that no computer on the network has more authority than another? |a. |client/server |c. |peer-to-peer | |b. |stand alone

Unit 1 Net+ Essay

1105 words - 5 pages common way to share resources on a client/server network is by modifying the file-sharing controls via the computer’s operating system. e. True or False: The oldest and still most frequently used network communications services are print services. 2. Install Visio on your workstation. Visio can be obtained from MSDNAA. Once Visio is installed, create a simple network diagram. Start the Visio application, select Network, and then Basic Network

File Sharing Morality

2466 words - 10 pages moral theories, including the Kantian, Utilitarian, and Rights Ethics philosophies. There are many users of the internet today, and a majority of them participate in file-sharing via the use of a wide variety of peer-to-peer (P2P) networks. These people believe that what they are doing is not wrong, but rather one of their rights as consumers of media. In contrast to this, many people of the movie and music industries believe that their creative

4.5 Module Review

754 words - 4 pages the whole system as well. Network computing is beneficial because it is relatively inexpensive, easy to manage, and puts an emphasis on sharing information among employees. Network computing is not for everyone however because it can be very complicated to understand the whole system which may cause management challenges. Using network computing also increases the chance of data leakage to unauthorized users. Peer to peer networks are

Freedom Lighthouse

903 words - 4 pages ____ facilitates communication and resource sharing between other computers on the network. A) servlet B) workstation C) personal computer D) server Points Earned: 1.0/1.0 5. ____ networks are the most popular type of network for medium- and large-scale organizations. A) Client/server B) Peer-to-peer C) Stand-alone D) Stationary Points Earned: 1.0/1.0 6. A ____ network is confined to a relatively small space. A) NAN B) MAN C) WAN D) LAN Points Earned

Internet Piracy

1499 words - 6 pages . File sharing, put simply, is the process of making available and distributing files via the internet. Many freely developed applications have been made available that simplify this process, providing the ability to easily search for, download, and upload any piece of digital content imaginable. These applications are commonly referred to as P2P or peer-to-peer applications as they allow individuals (peers) to directly connect with other peers to

Nt2580 Lab 1 - Nt2580 Lab 1 Lab #1 - Assessment Worksheet

599 words - 3 pages . Protocols are rules or standards that describe how hosts communicate and exchange data. Despite the costs of implementation and maintenance, networks actually save organizations money by allowing them to: Consolidate (centralize) data storage Share peripheral devices like printers Increase internal and external communications Increase productivity and collaboration One way to classify networks is based on the role network devices

Digital Music Piracy

1414 words - 6 pages ). Although legal actions were presented that did not stop other peer-to-peer programs to be created with a hefty amount of followers. Although there were harsh consequences towards downloading music it has not stopped most from illegally downloading music. One year after the creation of Napster a new file swapping program was released over in internet, it was called Gnutella. Gnutella is a peer-to-peer overlay network for file sharing (Ho, Kevin, Wu

Networking

1020 words - 5 pages -Peer file sharing Businesses, ISP’s, & Protocols Companies are obtaining strategic business values via the Internet and different types of protocols. The three ways businesses use internet services and protocols can include but are not limited to communication (VoIP), operations (Enterprise Applications), and web publishing (Microsoft Office). A VoIP is a phone service that utilizes the internet to connect users with one another. This allows

Online Music Trading

593 words - 3 pages suits against napster, for exploiting and "stealing" their work, online music trading was still a very popular habit you might say. People were still doing it, and there was nothing anybody could do to stop it. It continued on this way until about 2002, about two years after the peer to peer file sharing program "Kazaa" came into play. This program allowed users to connect to a large network of other users, and share all types of files, including

Computer Security In Education

330 words - 2 pages university at risk for lawsuits if the information is exposed. Student’s internet use on campus daily comes in contact with social network targeting, malicious software, infrastructure attacks, phishing, and peer-to-peer file transfers (Rasmussen, 2011). These dangers put not only the students’ computers at risk for security breaches, but the universities’ network as well. The damages resulting from data breaches in college networks are numerous. Not only

Related Essays

Peer To Peer Lending In The United States

2041 words - 9 pages to large populations of turnover, asymmetry of interest and zero-cost identity. A variety of incentive mechanisms have been implemented to encourage or even force nodes to contribute resources.”) 隐私和匿名 (Privacy and Anonymity) “一些的对等网络上放置隐私沉重的重视和匿名性,也就是说,确保通信的内容是隐藏的窃听,而参与者的身份/位置隐蔽。” (“Some peer-to-peer networks place a heavy emphasis on privacy and anonymity—that is, ensuring that the contents of communications are hidden from eavesdroppers

Peer To Peer Lending Uk Facts And Figures 2015

651 words - 3 pages regulators, the UK has stepped up with clear and practical legislation. Globally, UK based platforms are leading the charge around the globe by setting up subsidiaries or joint ventures, or buying local platforms. Not everything is as rosy as the industry cheerleaders may suggest, with several platforms closing, never opening or clearly designed to make quick money for owners. Over the next decade the peer-to-peer industry will grow rapidly

Peer To Peer Shopping Essay

673 words - 3 pages Ted Bundy Theodore Robert “Ted” was born on November 24, 1946. His mother lived with her parents, which created a confusing perception in Ted as a kid. He believed his grandparents were his parents and his mother was his older sister. As Ted grew his mom move out and married Johnny Culpepper Bundy. Ted took his stepfather’s last name and so his new name came out to be “Ted Bundy”. Ted Bundy was known for his smartness, charisma, and good

Tom Stoppard's "Rosencrantz And Guildenstern Are Dead" Gains Depth Through Its Sustained Allusion To Shakespeare's "Hamlet."

527 words - 3 pages In Tom Stoppard's Rosencrantz and Guildenstern Are Dead many allusions are made to Shakespeare's Hamlet, adding depth to the play. Rosencrantz and Guildenstern (Ros and Guil) would not exist without Hamlet and only come to life when that play begins. From the start of Stoppard's play the only sense of time is provided by its references to Hamlet. Rosencrantz and Guildenstern Are Dead is a backstage look at Hamlet.Stoppard's Rosencrantz and