Solved

How P2P Net ?

Posted on 2002-03-28
3
493 Views
Last Modified: 2010-08-05
As I know Morpheus and Kaaza stuck with term Peer 2 Peer what is that mean anyway ? do mass community of that program can communicate and exchange files directly without any server moderator ? if yes then how a client program may know that someone out there running the same client and connect to it IP ?

Anyway is it possible to connect to so many other clients using the same program without a server and knowing all the IP add ?
0
Comment
Question by:comicboy
  • 2
3 Comments
 
LVL 6

Accepted Solution

by:
edey earned 50 total points
ID: 6903081
mmm, they're not actually p2p.
The clients themselves are c/s which, once a connection is made, make the transfers p2p.

Of course morpheus is a little different now, now being backended by gnutella. The gnutella clients have a slightly more complicated scheme where each node is both client & server. This is somewhat like a circular, doubly linked, list - once you've got a pointer to _any_ list item (node) you can traverse the list untill you hit any other list item (node).

This means though, that there's no "starting point" for the gnutella network, and therefore no easy way to find a node so you can be inserted into the network. This is handled by having a couple of nodes with static ip's connected all the time. So, IMHO, while gnutella is in theory p2p in practice it's a mixture of the same c/s & p2p components, just in a slightly different proportion.

GL
Mike
0
 

Author Comment

by:comicboy
ID: 6904499
Actually your short explaination is very heavyweight of information :) great and from what I understand there is no way to create a real P2P without actually has an all time online IP tobe connected to from new entry client ?

Could you please give me the best document or URL which describing actual P2P work ?

Thanks GL Mike :) you are very helpfull :)
0
 

Author Comment

by:comicboy
ID: 6920727
I think your answer is enough :) thanks excellent explaination :)
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Have you ever had your Delphi form/application just hanging while waiting for data to load? This is the article to read if you want to learn some things about adding threads for data loading in the background. First, I'll setup a general applica…
Introduction I have seen many questions in this Delphi topic area where queries in threads are needed or suggested. I know bumped into a similar need. This article will address some of the concepts when dealing with a multithreaded delphi database…
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…

912 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now