P2P Networks

In: Other Topics

Submitted By gatelllau
Words 1881
Pages 8
Laura Gatell Perez
BAMA with Media and Cultural Studies, Yr 3.
School of Creative Enterprise.
Digital Media: Report.
13.11.2009

What effect have Peer to Peer networks had on consumerism such as the selling of films and music?

“In a P2P network, the "peers" are computer systems which are connected to each other via the Internet. Files can be shared directly between systems on the network without the need of a central server.” (http://www.techterms.com/definition/p2p)
It is essential to understand the meaning of “Peer to peer” in order to study the subject in depth. This report aims to analyse and explore the effects of Peer to Peer networks in the music and film industry, and it’s effect on consumerism.

In order to fully understand P2P networks, it is essential to study it’s historical and social context first. Peer to Peer networks started with the so called ‘Internet Boom’ in the late 1990’s. The first online file sharing services operating between 1999 and 2001 was Napster, created by Shawn Fanning. It was the first technology who allowed people to share their MP3 files with others. At the beginning only audio tracks were available for download and it took approximately 30 to 45 minutes for a song to download. Nowadays it takes about a few seconds for a song to download and from 10 to 20 minutes for a movie. However, Napster was soon shut down as it lead the music industry to accuse them of “massive copyright violations”. Moreover, in 10 years the number of users increased considerably from 58 million in 2001 to more than 70 million in 2004. But the problem persisted years after the launch of the service. However, other new networks such as, Limewire, Morpheus or Azureus where still developing and offered a wide variety of copyrighted material to exchange. More than 70% of people aged between 18-29 think file sharing is acceptable.

Consumerism has…...

Similar Documents

Network

...13 Agent-Oriented Novel Quantum Key Distribution Protocol for the Security in Wireless Network Xu Huang, Shirantha Wijesekera and Dharmendra Sharma University of Canberra Australia 1. Introduction Wireless security is becoming increasingly important as wireless applications and systems are widely adopted. Numerous organizations have already installed or are busy in installing “wireless local area networks” (WLANs). These networks, based on the IEEE 802.11 standard, are very easy to deploy and inexpensive. Wi-Fi allows LANs to be deployed without cabling for client devices, typically reducing the costs of network deployment and expansion. As of 2007 wireless network adapters are built into most modern laptops. The price of chipsets for Wi-Fi continues to drop, making it an economical networking option included in ever more devices. Wi-Fi has become widespread in corporate infrastructures, which also helps with the deployment of RFID technology that can piggyback on Wi-Fi. WiFi is a global set of standards, unlike mobile telephones, any standard Wi-Fi device will work anywhere in the world. Other important trends in wireless adoptions are including the introduction of wireless email with devices such as the Blackberry and The Palm VII, rampant digital cell phone use, including the use of short message service (SMWS), and the advent of Bluetooth devices. But the risks associated with the adoption of wireless networking are only now coming to light. A number of impressive......

Words: 6431 - Pages: 26

Networks

...Networks are hardware, software, and media that can be used to connect computers together allowing them to communicate, exchange information and share resources. Networks allow multiple users to access shared data and programs. There are five kinds of networks; LAN, WAN, CAN, MAN, and HAN. The two main types of networks are LAN and WAN. LAN stands for local area network, and WAN stands for wide area network. According to our text “A local area network (LAN) is a data communication system consisting of several devices such as computers and printers.” (The McGraw−Hill Companies, 2006). These devices are physically connected to one another by cables, wireless media, or infrared links. Any network within a building or several that are next to each other is a LAN. A WAN, also known as a wide area network is made up of two or more LAN’s geographically connected. An example of a WAN is when a company or business located in one place has its main offices in one place and other smaller parts of the company in other places all data is shared within the network. There are also three types of hybrid networks, CAN’s, MAN’s, and HAN’s. A CAN or campus area network is like a LAN but on a bigger scale and more diversified, allowing different campus offices and organizations to be linked. For example, at a college the registrar’s office is connected to the bursar’s office. MAN’s which are metropolitan area networks are a large type of network that connects many corporate LANs together.......

Words: 370 - Pages: 2

Networks

...TYPES OF COMPUTER NETWORKS Maninder Kaur professormaninder@gmail.com What is Network? • A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications. • The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams. Different Types of Networks • Depending upon the geographical area covered by a network, it is classified as: – Local Area Network (LAN) – Metropolitan Area Network (MAN) – Wide Area Network (WAN) – Personal Area Network (PAN) Local Area Network (LAN) • A LAN is a network that is used for communicating among computer devices, usually within an office building or home. • LAN’s enable the sharing of resources such as files or hardware devices that may be needed by multiple users • • Is limited in size, typically spanning a few hundred meters, and no more than a mile • Is fast, with speeds from 10 Mbps to 10 Gbps • Requires little wiring, typically a single cable connecting to each device • Has lower cost compared to MAN’s or WAN’s Local Area Network (LAN) • LAN’s can be either wired or wireless. Twisted pair, coax or fibre optic cable can be used in wired LAN’s. • Every LAN uses a protocol – a set of rules that governs how packets are configured and transmitted. • Nodes in a LAN are linked together with a certain topology. These topologies include: – Bus – Ring –......

Words: 611 - Pages: 3

Network

... fwuashie@ug.edu.gh Nationality  : GhanaianDate of Birth: 22nd June, 1981 | | ------------------------------------------------- Profile I am industrious, goal-oriented, focused and ambitious person with Computer Hardware & Networking, and Microsoft Certified System Engineering background. I have a dedicated insight into the needs and views of others, and the ability to identify issues or crisis areas and form inventive information technology solutions. My areas of strength include; Networking and System Administration/Security Objectives I aspire to become a Network Systems Security Analyst and Database Administrator and to work in a demanding, competitive, fulfilling and an exciting environment to bring out the best in me. ------------------------------------------------- Education And Professional Qualification Certification Status | Credential | Certification / Version | | Date Achieved | | Ubiquiti airMAX & Unifi Wi-Fi Training | airMAX Certified & Unifi Wi-Fi | | April 12, 2013 | | Modules: * Understanding Wireless Communication * Active Server Pages * Link Planning and ManagementMicrosoft Certified Technology Specialist | Administrator. * Ubiquiti Protocols and Technologies * Hands-on UniFi Campus WIFI Course * RF......

Words: 774 - Pages: 4

Network

...Network Attached Device Network-attached storage (NAS) is a dedicated hard disk storage device that is set up with its own network address and provides file-based data storage services to other devices on the network. It is attached to a local area network and assigned an IP address, allowing both application programming and files to be served faster because they are not competing for processor resources. NAS devices are usually configured with a web browser and do not have a keyboard or display. Consists of hard disk storage, including multi-disk RAID systems and can usually handle a number of network protocols, including Microsoft's Internetwork Packet Exchange and NetBEUI, Novell's Netware Internetwork Packet Exchange, and Sun Microsystems' Network File System. (Rouse, 2013) NAS devices speed is typically one gigabit Ethernet connection but this can be changed to multiple gigabit, 10 gigabit, fiber optic by adding a pci-e network card(s). Older parts can be used which may be limited to 10/100 megabit. If you need an exact answer for speed, simply look at the wiki on gigabit. The capacity range varies, people have built 40 TB (terabyte) machines and other just have 2TB. With port replication and add on hard drive controller cards there is hardly a limit on size. A board with 6 SATA ports can be replicated (1 to 5 port) allowing for 30 drives to be attached, if 3TB drives were used in raid 50 that would be 72TB of storage. As far as fault tolerance, raid 50...

Words: 703 - Pages: 3

Telecommunications and Networks

...Lecture 6 Telecommunications And Networks Learning Objectives Understand the concept of a network. Apply Metcalfe’s law in understanding the value of a network. Identify major developments and trends in the industries, technologies, and business applications of telecommunications and Internet technologies. Provide examples of the business value of Internet, intranet, and extranet applications. Learning Objectives Identify the basic components, functions, and types of telecommunications networks used in business. Explain the functions of major components of telecommunications network hardware, software, media, and services. Explain the concept of client/server networking. Understand the two forms of peer-to-peer networking. Learning Objectives Explain the difference between digital and analog signals. Identify the various transmission media and topologies used in telecommunications networks. Understand the fundamentals of wireless network technologies. Explain the concepts behind TCP/IP. Understand the seven layers of the OSI network model. Reference Introduction To Information Systems, 16th Edition, Marakas & O’Brien, The McGraw-Hill Company, Inc. The Networked Enterprise Networking The Organization Telecommunications and network technologies are internetworking and revolutionizing business and society. The Internet, the Web, and intranets and extranets are networking business process and employees together; and connecting them to their customers,......

Words: 5527 - Pages: 23

Networks

...Case: You are appointed as a technical expert to implement a network system for a small size maritime supplyrepresentative company with four users. The company provides supply services to Maritime shipping companies through a worldwide network of suppliers. Its owner is a maritime business expert who doesnot know much about the use of computer systems to support her business. Therefore, she has decidedto employ you as a consultant on a short term basis to set-up appropriate systems in a network. She hasheard about various technologies and the efficiency achieved by computer systems and would welcomeadvice on the acquisition of hardware, software and network items to augment her existing systems inorder to meet the company’s growing needs. The company has a budget of £100,000 for this project. The company currently consists of the following departments (all located in the same open space office): The sales Manager who is responsible for dealing with Maritime companies. She is assisted by asales assistant, equipped with a laptop but with no ability to access the web. This department iscurrently the only one with a connection to the Internet and with access to the company’s commonemail.  The General Manager who is responsible for the general operation of the company. She tradeswith suppliers all over the world in order to ensure the best prices of goods for the company’sMaritime shipping clients. For client communication, she uses plain telephone services and a faxmachine....

Words: 545 - Pages: 3

Networks

...The Wealth of Networks The Wealth of Networks How Social Production Transforms Markets and Freedom Yochai Benkler Yale University Press New Haven and London Copyright _ 2006 by Yochai Benkler. All rights reserved. Subject to the exception immediately following, this book may not be reproduced, in whole or in part, including illustrations, in any form (beyond that copying permitted by Sections 107 and 108 of the U.S. Copyright Law and except by reviewers for the public press), without written permission from the publishers. The author has made an online version of the book available under a Creative Commons Noncommercial Sharealike license; it can be accessed through the author’s website at http://www.benkler.org. Printed in the United States of America. Library of Congress Cataloging-in-Publication Data Benkler, Yochai. The wealth of networks : how social production transforms markets and freedom / Yochai Benkler. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-300-11056-2 (alk. paper) ISBN-10: 0-300-11056-1 (alk. paper) 1. Information society. 2. Information networks. 3. Computer networks—Social aspects. 4. Computer networks—Economic aspects. I. Title. HM851.B457 2006 303.48'33—dc22 2005028316 A catalogue record for this book is available from the British Library. The paper in this book meets the guidelines for permanence and durability of the Committee on Production Guidelines for Book Longevity of the Council on Library Resources. 10 9 8 7 6 5 4 3 2 1...

Words: 214717 - Pages: 859

Network

...Network Access Control (NAC) is a computer networking solution that uses a set of protocols to define and implement a policy that describes how to secure access to network nodes by devices when they initially attempt to access the network.[citation needed] NAC might integrate the automatic remediation process (fixing non-compliant nodes before allowing access) into the network systems, allowing the network infrastructure such as routers, switches and firewalls to work together with back office servers and end user computing equipment to ensure the information system is operating securely before interoperability is allowed. A basic form of NAC is the 802.1X standard. Network Access Control aims to do exactly what the name implies—control access to a network with policies, including pre-admission endpoint security policy checks and post-admission controls over where users and devices can go on a network and what they can do. When a computer connects to a computer network, it is not permitted to access anything unless it complies with a business defined policy; including anti-virus protection level, system update level and configuration. While the computer is being checked by a pre-installed software agent, it can only access resources that can remediate (resolve or update) any issues. Once the policy is met, the computer is able to access network resources and the Internet, within the policies defined within the NAC system. NAC is mainly used for endpoint health checks, but......

Words: 294 - Pages: 2

P2P Lending Presenation

...Peer-to-Peer (P2P) Lending Abstract: This paper evaluates the efficacy of the peer-to-peer lending model. While we primarily discuss the consumer loan market, the structure, principles and associated risks are fairly similar for other end markets as well. Contrary to popular opinion, empirical evidence from the limited available market data proves that P2P platforms do not have a lower cost as a percentage of loan receivables at this point compared to traditional banks. As these higher costs are primarily due to marketing activities, going forward, with scalability, they are poised to generate significant cost savings. Through our research, we conclude that P2P lending has a strong value proposition and the potential to disrupt the existing lending market, however, data quality, regulation and investor confidence will play a monumental role in determining the speed and magnitude of its success. What is peer-to-peer lending? Technological evolution, along with changing consumer behaviour, has led to a new era of innovation in financial services and subsequently more transparent and easy-to-use platforms. One of the new business models that has evolved, is peer-to-peer (P2P) lending. In essence, P2P lending is a form of debt financing which allows borrowers and lenders to bypass traditional banks. P2P platforms are sophisticated web-based platforms that significantly reduce the time needed to process a loan. Even though the products offered by P2P platforms......

Words: 4792 - Pages: 20

P2P Case Study

...“Introducing Scrum at P2P” in Larson and Gray, 6e, Pages 609-613. Please read and study the case “Introducing Scrum at P2P” in Larson and Gray, 6e, pages 609-613. Please prepare your answers to the following questions (1.5 line spacing, maximum 4 pages) and submit your answer document to Canvas. Please also bring your answers to class for our discussion. Part A: 1. How well is Scrum working? The case is basically a tale of two sprints. During the first sprint, Scrum guidelines were adhered to and significant progress was made on the project. The team has evolved into self organizing group and is energized. Unfortunately during the second sprint, the project deviated from Scrum guidelines and the team seems less energized and productivity has declined. 2. What are the issues confronting the Big Foot project? Prem started off well but as soon as the project experienced trouble during the second sprint he resorted back to the traditional role of project manager as task master. Admittedly there is fine line between coaching and directing, but he needed to play a less assertive role in solving the integration problem. Here, instead of telling the team what to do, he could have poised questions that would have helped them to solve the problem themselves. This is a hard thing to do when you are under time pressure and you are confident you have the answer. He exacerbated the problem by taking control of the daily scrum away from the team. The synergy that had......

Words: 349 - Pages: 2

Hft Network

...HTF 2441 NETWORK The term network is used to define a structure with a characteristic pattern. There are multiple types of networks, such as computer network, electrical network and social network. The computer network appoints the set of interconnected computers and other equipment, to share information, resources and services. It can be divided into different categories according to their scope, their method of connection (cable, optical fiber, radio, microwave, infrared) or its functional relationship (client-server, person to person), among others. The electricity grid, meanwhile, is one formed by electric generators, transformers, transmission lines and distribution lines, which are responsible for bringing electricity to residential customers. The system uses different voltages, where higher are used on longer distances, while tensions are reduced as the power comes close to the user's premises. As for the social network, the concept refers to that structure where different individuals hold different types of relationships. The social network has updated its significance in recent years, since the term began to be used to define Internet sites that promote virtual communities according to interests. MySpace and Facebook are two of these social networks that bring together millions of users who can exchange messages and files with other network members. A network environment can be configured as client-server......

Words: 416 - Pages: 2

P2P Lending in Singapore

...Abstract This study focuses on demand of P2P market among SMEs and consumer market. The researcher has developed a framework based on how peer to peer lending platforms are important for SME’s and what are the governmental regulations to promote online lending platforms, how SMEs play an important role in the development of economy, how important is the peer to peer platform to them and the future position of peer to peer market in Singapore. The focal point lies on the demand of peer to peer lending platforms among small and medium enterprises and consumer market. The study illustrates a high demand of peer to peer lending among small and medium enterprises regardless of less security of investment. This study also includes risk and regulations associated with peer to peer lending and the impact of social behaviours and social connections on the decision of investors related to investment in online platforms. Acknowledgement I owe a debt of gratitude for working adults and SMEs for providing me accurate data and their feedback regarding their loan preferences. I would like to thank all for their precious time and respond. As this work would not be possible without their time and effort. Tables of Contents 1.0. Introduction 4 1.1. Peer to peer lending platform 5 1.2. Background of the research 7 1.3. Objectives 8 1.4. Research Rationale 9 2.0. Literature Review 9 3.0. Research Methodology 19 4.0. Data analysis 21 5.0. Results and......

Words: 13527 - Pages: 55

P2P Process Management Tool

...corporate website (www.O&G.com). 1.2 Overview O&G’s Exploration & Production (E&P) business segment is in the process of implementing a common global purchase to pay (P2P) process and technical solution (E&P Global P2P Project) to drive contract compliance and improve controls across the P2P process. The technical solution will be based on the mySAP Supplier Relationship Management (SRM) 4.0 suite of applications. O&G’s E&P segment includes the traditional upstream activities of oil and natural gas exploration, field development and production. It also includes midstream activities such as the management of crude oil and natural gas pipelines and processing and export terminals. Our main areas of activity include USA, UK, Russia, Norway, Canada, South America, Africa, the Middle East and Asia. A critical component of the P2P project is establishing connectivity with our supplier community. The E&P P2P program has set an objective of enabling 25,000 suppliers globally. This objective may take several years to achieve, so O&G is looking at ways to accelerate towards this goal. A component of this strategy has been the implementation of a Pilot at the Mad Dog and Holstein assets which has gone live on September 28th, 2006. This implementation has included the leveraging of an existing network to gain connectivity to the network’s existing suppliers. Based on initial Pilot results, O&G is issuing a Request for Information ("RFI") to identify a Process......

Words: 3632 - Pages: 15

Introductory Network Concepts, Network Standards, and the Osi Model

...Introductory Network Concepts, Network Standards, and the OSI Model 1. There are many reasons for a company to network its computers, some are as follows; Share software, information with others on networks, cheaper than buying individual software and hardware for each standalone especially if the software often offers deals for amount being purchased, e-mail between network users, and flexible access from any computer on the network. 2. Two fundamental network models are peer-to-peer(P2P) or Client/Server. In a P2P network, every computer can communicate directly with every other computer, and no computer on this network has more authority than another. On a client/server network every computer acts as a client or a server. 3. There are 3 types of networks depending on how much territory they cover, they are LANs, MANs, and WAN networks. LAN networks cover a small area like one building or one office. MANs cover multiple buildings like a handful of government offices surrounding a state capital. A WAN network is one that connects two or more geographically distinct LANs and MANs. 4. A server is a computer on the network that manages shared resources. 5. A client is a computer on the network that requests resources or services from another computer on a network. 6. A NIC or Network Interface Card is the device that enables a workstation to connect to the network and communicate with other computers. 7. A NOS or Network Operating System is......

Words: 845 - Pages: 4