Peer to peer databases use a network of resources to disseminate data among users. Participants share processing power, bandwidth, and disk storage space. The most common use is file sharing. There are two basic forms: structured and unstructured. The main advantage is decentralization, but anonymity poses risks.
A peer to peer database uses a network of resources of various individuals collectively to disseminate data and information among them. Participants share processing power, bandwidth, and disk storage space to increase the capacity of the collective network. The most common use of peer to peer databases is to share computer files as both suppliers and consumers.
The general structure of a peer to peer database takes the form of a large or small network with each user acting as a node. Peer to peer networks have a user platform that allows individual participants to exchange content and information over the Basic Internet Protocol network. Depending on the database, users are identifiable or anonymous.
Although peer to peer databases have been around for several years, the popularity of the systems increased in the late 1990s with the exchange of computer files associated with music and video. One of the first popular networks was Napster, a peer to peer database designed for exchanging MP3 music files. Other file sharing databases such as FastTrack, Gnutella, BitTorrent and LimeWire also gained popularity in the early 21st century.
There are two basic forms of peer to peer databases: structured and unstructured. Structured databases have fixed connections that operate within the user platform. Unstructured networks have a variety of nodes with no fixed organization. This allows for greater anonymity within the user database.
Within the two frameworks, the network can take the form of a pure or centralized network. A pure peer to peer network features a fixed type of nodes that allow users to operate on a uniform platform. Centralized peer-to-peer networks have a central server, which acts as the main index for users. The information is collected in a central database and distributed to users.
The main advantage of peer to peer databases is the fact that computing power is spread across a variety of resources. By decentralizing capacity, more customers can be added to the system than otherwise possible. Data transfer is not slowed down with an increase in user volume as in the case of a centralized network.
One of the major challenges of peer-to-peer networking, however, is the risks associated with anonymous users. Most networks are unsecured in nature, making it possible for a variety of malicious software or individuals to access sensitive information. In extreme cases, the entire peer-to-peer database can be compromised, resulting in large amounts of data being extracted.
Protect your devices with Threat Protection by NordVPN