TVs. Consoles. Projectors and accessories. Technologies. Digital TV

File sharing networks examples. What are peer-to-peer networks? The principle of operation and rules of file sharing. Pros and cons

One area where peer-to-peer technology can be used is file sharing. It looks like this: network users upload any files to a “shared” (English share) folder, i.e. a folder from which files are available for downloading by other clients. Some other network user sends a request to search for a file. The program searches network clients for files that match the request and displays the result. After this, the user can download files from the found sources. Modern file-sharing networks allow you to download one file from several sources at once (this is faster and more reliable). To make sure that this file is the same for all sources, a comparison is made not only by the file name, but also by checksums or hashes such as MD4, TTH, SHA-1. While a user is downloading a file (and after it is finished), other network clients can also download this file from him, as a result of which particularly popular files may end up being available for download from hundreds of sources at the same time.

Organizations such as the RIAA discredit peer-to-peer networks by publishing fake files on them (the content of which does not correspond to the name, often the first is pornographic in nature). This led to the loss of popularity of the KaZaA network in favor of eDonkey, which has a more advanced architecture.

In February 2006, the most popular server in the eDonkey network, Razorback, ceased operation, and then the development of the unpopular commercial client EDonkey2000 ceased. The EDonkey2000 network itself continues to function, because it is not tied to specific servers and there are a large number of freely distributed client programs.

Well-known decentralized and hybrid networks

  • 1) ED2K aka eDonkey2000 - a centralized network, the largest of the currently existing file-sharing networks. The search is performed by specialized servers connected to each other. Clients independently exchange using the MFTP protocol. MetaMachine, the developers of the original concept and the first client based on the web interface (Edonkey 2000 v1.4.5), stopped supporting this project in 2005, but the network continues to function due to the more advanced and more powerful eMule client, which uses Kademlia mechanisms to build a decentralized segment eD2k.
  • 2) Overnet, Kad - decentralized technologies based on the Kademlia protocol, serving searches on the eDonkey2000 (eD2k) network.
  • 3) BitTorrent is a technology for distributed distribution of files, usually of large size. Different high speed and centralization. Some BitTorrent clients support DHT and can work without a central server (the so-called tracker).
  • 4) Direct Connect - is a loosely connected dedicated search server (hub). Direct Connect hubs are very convenient for organizing file exchange in local networks.
  • 5) FastTrack, iMesh - originally implemented in KaZaA...
  • 6) OpenFT is an open continuation of the FastTrack network. Supported by giFT (KCeasy), mlDonkey clients.
  • 7) Gnutella is a completely decentralized network using a protocol developed by Nullsoft, based on HTTP downloads. Self-organization of the network occurs due to the automatic interchange of node-list data between connected clients. Clients: Shareaza, BearShare, LimeWire, Gnucleus, Phex.
  • 8) Gnutella2 is an extension of the Gnutella protocol. The main changes affected only the organization of the file search system. In this way, it was possible to reduce the overall load on the network by using targeted mailing of requests only to those clients who have the required file. The problem with false initiation of a UDP-flood attack has also been eliminated. In all other respects, the network is completely similar to Gnutella1. Shareaza main client.
  • 9) Ares is a file-sharing network for any files.
  • 10) Soulseek is a proprietary protocol. All searches take place through a central server, which has free registration And paid subscription(official website). Clients: Soulseek, mlDonkey, SolarSeek.
  • 11) Freenet, GNUnet, Entropy - anonymous and censorship-resistant file-sharing networks.
  • 12) MP2P (Manolito P2P) - supported by Blubster, Piolet, RockItNet clients.
  • 13) NEOnet is a partially decentralized commercial network on a shareware basis. It is a specific auxiliary modification of the DHT protocol when working in a separate commercial segment of the Gnutella1 network, supported by the Morpheus client. Properties cryptographic protection and network anonymity are not supported in the NeoNet network.
  • 14) easy P2P
  • 15) Tesla -- Possibly contains MalWare.
  • 16) Filetopia -- potentially secure network for sharing a wide variety of content.
  • 17) MUTE -- Clients: MFC Mute, Napshare.
  • 18) Nodezilla is an anonymous file-sharing network.
  • 19) Peer2Mail - in principle, this is not even a peer-to-peer network, but a type of software that allows you to transfer files between two hosts (peer-to-peer), using postal services as a router. File transfer technology is based on encapsulation in the SMTP protocol.
  • 20) Ants p2p -- 3rd generation open P2P network increased security. Java client.
  • 21) Anthill
  • 22) Rodi - supports searching by file content. Java client.
  • 23) AppleJuice is a partially decentralized network (like eDonkey).
  • 24) BeShare - a BeOS-oriented network.
  • 25) Jabber is an open P2P messaging technology.
  • 26) Skype -- P2P telephony.
  • 27) JXTA - standardization of P2P specifications and protocols http://www.jxta.org
  • 28) KDrive -- global virtual disk for exchanging files with authorization and encryption.
  • 29) ProxyShare - new high speed network with great possibilities.
  • 30) ZEPP
  • 31) Acquisition - network and client for Mac.
  • 32) RShare is an anonymous open P2P network.
  • 33) Marabunta is an alternative peer-to-peer system focused exclusively on providing instant messaging services on a common bulletin board (P2P-chat). The program is mainly designed for use in local networks, and therefore does not contain the ability to auto-update the node list (it has to be replenished manually). If there are permanent IP addresses of recipients, it can work on the Internet, however, the built-in bootstrap function from the developers’ servers is not functional due to the fact that since 2006 the project has practically ceased to develop. The properties of cryptographic protection and network anonymity are not implemented in the program.
  • 34) SKad or OpenKAD - modification of the Kademlia protocol. Completely decentralized networks of this type were created mainly in Japan. The first step in this direction was the Winny program. Further development of this network towards network anonymity led to the emergence Share programs. And today there is a third version running the Perfect Dark program.
  • 35) Unfortunately, all three versions of the SKad network developed in parallel and although they have much in common, due to the modification of the node-list encoding procedure towards stronger encryption, they are not compatible with each other. Thus, all three programs formed three identical networks with different degrees of security.
  • 36) Usenet - good old global message board;)
  • 37) Chord
  • 38) Pastry
  • 39) Tapestry or Chimera
  • 40) Groove Virtual Office -- Proprietary software from Microsoft.
  • 41) P-Grid is a self-organizing decentralized network.
  • 42) P2PTV - a network of television channels.
  • 43) KoffeePhoto - a network for sharing photos.

A file sharing network is the sharing of computer data or space on a network with different levels. Although files can be easily shared offline (for example, by simply transferring or sending them on physical media), the above term almost always means sharing them over a network, even if this happens on a small local network.

What are they?

File-sharing networks allow multiple people to use the same file through some combination of read or view, write or modify, copy or print capabilities. Typically, such a network has one or more administrators. Users can have the same or different access levels. File sharing can also mean having a dedicated amount of personal data storage on a shared file system.

For many years, the file-sharing network was a feature of multi-element and multi-user computer systems. With the advent of the Internet, a system called File Transfer Protocol (FTP) has been widely used.

The most famous example

FTP can be used to read and possibly write files shared by a specific set of users of an FTP server site, with password access. Many FTP sites offer file sharing, or at least the ability to view or copy data, or download it, using a public password (which is "anonymous"). Most website developers use this system to upload new or revised files to the server. Moreover, the World Wide Web itself can be viewed as a large-scale file-sharing network in which requested pages or files are constantly downloaded or copied by users.

File sharing is a practice sharing or providing access to digital information or resources, including documents, multimedia (audio/video), graphics, computer programs, images and e-books. This is the private or public distribution of data or resources on a network with at different levels sharing privileges. Another example of such a system is free file hosting services, which allow you to download and receive data for network users.

Types of file sharing networks

File sharing can be done in several ways. The most common methods for their storage, distribution and transmission include the following:

  • Removable storage devices.
  • Centralized server installations (file hosting on networks).
  • Web-oriented hyperlinks.
  • Distributed peer-to-peer networks.

How is functionality provided?

Most file-sharing network tasks use two main sets of network criteria:

Peer-to-Peer (P2P), Peers or File Sharing: This is the most popular method of data sharing and is enabled by peer-to-peer software. Users network computer determine general data using third-party software. P2P file sharing allows users to directly access, download and edit data. Some third party software facilitates P2P sharing by collecting and segmenting large files into smaller pieces (eg Ares).

File sharing network as file hosting service: This alternative provides a wide selection of popular online materials. These services are quite often used with methods collaboration on the Internet, including email, blogs, forums or other environments that may include direct download links from file hosting services. These websites typically host files that allow users to download them.

When users download or use a file using a sharing network, their computer also becomes part of that system, allowing other people to download data from their computer. Many free file hosting services are based on this principle. However, such data sharing is generally illegal, except for sharing material that is not copyrighted or proprietary.

Another problem with file sharing apps is the problem of spyware or adware, as some file sharing sites host spyware on their pages. These spyware applications are often installed on users' computers without their consent or knowledge.

File synchronization and sharing services

Cloud-based file synchronization and sharing services provide automatic file transfer by updating files from a dedicated directory public access on network devices each user. Data placed in this folder can also usually be viewed and downloaded through the website and mobile application and may be available for viewing or collaboration by other users. Such services have become popular due to the consumer-oriented provision of file-sharing networks, in particular Dropbox and GoogleDrive.

Rsync - more traditional program, released in 1996, which synchronizes files on a direct machine basis. Data synchronization in general can use other approaches to data exchange. Typical examples include distributed file systems, version control, or mirrors.

History of the development of file-sharing networks

At first, files were exchanged using removable media. Computers were able to access remote data using the installation file system, bulletin board systems (1978), Usenet (1979) and FTP servers (1985).

The later InternetRelayChat (1988) and Hotline (1997) allowed users to communicate remotely via chat and exchange files. In the late 1990s, mp3 encoding became widespread, which was standardized in 1991 and significantly reduced the size of audio files.

In June 1999, Napster was developed as an unstructured, centralized peer-to-peer system that required a server to index and discover other participants in a connection. Gnutella, eDonkey2000 and Freenet were released in 2000 and immediately spread widely across many countries.

Thus, Gnutella was the first decentralized file sharing network. This network treated all connecting programs as equal and therefore had no central point of failure. Freenet was the first network to guarantee anonymity. Then the client and server software eDonkey2000 was released, which became the prototype of the popular torrents today.

In 2001, Kazaa and Poisoned were released for Mac. Their FastTrack network was better distributed, although unlike Gnutella it carried more traffic to improve routing efficiency. The network was proprietary and encrypted, and Kazaa's developers beat the competition as a result.

Through the Internet you can easily find people with similar interests and hobbies. If your online communication circle is limited to a few people, then exchanging information with them is quite simple. This can be done both by mail and via instant messaging services. But what to do if you need to constantly keep in touch with dozens, or even hundreds of people close to you in spirit? How to tell them all that you have photos from Ritchie Blackmore's latest concert, a list of exam tickets or latest version free tweaker? Don't ask everyone the same question and wait for an answer. Most best way The solution to this problem is peer-to-peer networks. A group of people on such a network receives equal access rights to the information available on it, that is, each computer can be both a client and a server. Each participant in such a network allows access to certain files on their hard drive, after which they are entered into a database and become available for download by all network users. Files are exchanged through a program called a peer-to-peer client. There are many peer-to-peer networks, and there are even more clients to work in them, because several programs can exist for one network.

The name of this client stands for Direct Connect, that is, a direct connection from one user to another bypassing the server. The process of connecting to the DC++ () network is simplified as much as possible: you need to enter your nickname, postal address(possibly non-existent) and indicate the speed of your Internet connection. In the Description field, you can specify any information about yourself: interests, geographic location - in a word, everything that you consider necessary.

Hubs are usually organized by topic: music, movies, comics, games, etc. Each hub has its own administrator, who sets the rules for its use and the minimum amount of open resources, with which you can log into the system. Many hubs look at not only how many files you share, but also whether they fit the theme of the hub. If you went to a hub dedicated to games and opened access to Windows folder, they may be thrown out of the system. The use of hubs also has its advantages: network members living in the same region can unite into such communities. Many providers charge much less for traffic within a region or country than for traffic abroad, and in some packages, domestic incoming traffic is completely free. Thus, you can save a lot by downloading all the necessary files from users who live in your region.

Soulseek

This program is focused primarily on music files. This doesn't mean it doesn't offer the ability to upload and share other types of files. However, you are more likely to find the audio file you are interested in here than, say, a game or photo. It is not necessary to share your resources on Soulseek (website), but, as in all programs of this kind, it is advisable. The fact is that when you start downloading a file from one of the users, he sees who is downloading what from him. And it is quite possible that he will want to see what interesting things you have. Not finding a single open resource, he may be offended and put you on the Ban List, i.e. to the list of users who will never be able to download anything from him again. The program implements connection settings very conveniently. You can control the download speed directly in the file transfer/reception window. Here you can determine maximum quantity network participants to whom you can simultaneously transfer a file, as well as the number of Extra users. The latter are those participants in the system who do not need to stand in a general queue to receive the treasured file from you. Only you can add users to the extra list. This is how it turns out that all users are equal, but some are “more equal” than others.

Soulseek allows you to exchange not only files, but also messages. For this purpose, there is a chat in which many rooms are open for musical interests. There are also rooms for Russian-speaking users - for example, RUSSIA. Russian language is supported. One of the most interesting features of Soulseek is the ability to enter search queries in Wish List. This option works like this: if you haven’t found anything for a given request, you can add it to this wish list. At certain intervals, Soulseek itself will search among the files of users appearing on the network. If suddenly a file is found, the program will immediately notify you about it.

This client is an improved version of the eDonkey program, which, in turn, is the original client of the peer-to-peer network of the same name. Over the few years of its existence, the eDonkey network has become incredibly popular all over the world. The eDonkey client was not designed for such a number of participants, which caused its performance to deteriorate - slow loading files, errors appearing, etc.

What is a file sharing network for? This is a collective term for programs that are needed to share files. The principle of their operation is the ability to find and download the necessary freely available resources that were posted by another user.

General information

A file sharing network is a peer-to-peer entity. It is used to exchange files between participants who are both a server and a client. Networks exist by type of organization: centralized, decentralized, hybrid. How are they different?


What is it for?

A file sharing network is necessary for exchanging information over the Internet. With its help, you can download music, software, movies, games and much more to your computer. The file hosting service works according to the following principle:

  1. The user downloads the program.
  2. Provides access to some of its own resources.
  3. The downloaded program has a search bar that allows you to search for files on the resources of other users. They must be intended for free use. The resources found can be downloaded for free.

Torrents are considered a prime example of file sharing services. Translated from English it means "bit stream". The network is a peer-to-peer protocol for exchanging files between participants. Information is downloaded in parts. For file sharing there are special programs and BitTorrent networks. They will be discussed in more detail below.

Instructions for use

How to use the I2P network and other file hosting services? One of the most popular programs today are programs for exchanging via the BitTorrent protocol. A distribution may consist of one or more files. For each transfer, metadata is created with a torrent extension. They contain information about the URL tracker, full information about the file (name, size) and other parameters. In addition, the sum of file segments, the user key, and sources that do not operate according to the protocol are indicated. The peculiarity of torrent operation is that the load during distribution is minimal.

In order to download the selected file, you need to join the tracker via specified address, provide your address and file amount. Next, the user receives the addresses of other clients who download the same resource. He needs to update the progress of the process from time to time to get updated addresses of the clients. As a result, there is a constant process of information exchange between segments. In order for a torrent to work faster, you need a large number of clients. The exchange of information also depends on the number and size of segments.

Pros and cons

The Freedom file-sharing network has advantages and disadvantages. The advantages include the ability to find any program, software, or other resource and download it completely free of charge. Taking into account the fact that there are quite a lot of users in such systems, finding even the most exclusive file will not be difficult. When downloading, an SSL protocol is created.

The disadvantages of file-sharing systems include fines for using torrents in some countries. In addition, downloading a large amount of software will require a huge amount of space. RAM. Many users have difficulty obtaining information due to the lack of a “golden” account. In order to purchase full access to file hosting resources, you need to pay a certain amount. In addition, downloaded files are packaged in archives, so extracting them takes time.

Networks

Some of the most popular file hosting services include the following programs: eMule, DC++, LimeWire, FrostWire. Also, do not forget about various torrents, including Azureus, BitComet, uTorrent. Private file-sharing networks deserve special attention. For example, the I2P network belongs to the anonymous ones. She organizes her work independently. Its peculiarity is that I2P stores hashed, encrypted network addresses. Transmitted traffic is encrypted, all messages are protected.

Common features of networks, regardless of their popularity, include the absence of queues for downloading files. All information is distributed in parts, and segments are exchanged from one user to another. During the process, the client monitors the integrity of the fragments. The user has the ability to simultaneously receive and distribute files. Already downloaded fragments can be distributed again.

The ED2K network is a centralized type of exchange. Specialized servers that are connected to each other help search for available files on it. Independent information exchange between clients occurs via the MFTP protocol.

MoneyWiz 3 – Fiat and Crypto is an application for iOS that will greatly facilitate financial management, thanks to the support of automatic data entry and transaction categorization.

A few words about MoneyVis:

The program will become your reliable assistant in financial management. With it, you don't have to do much of anything yourself: just connect to one of thousands of supported banks from around the world, and the application will download transaction information and categorize them. At the same time, the latest version of the program supports operations with Forex and cryptocurrency. And thanks to the use of our own algorithms artificial intelligence, the results of automatic distribution become more accurate as you use the application.

Additionally, MoneyWiz 3 - Personal Finance uses the SYNCbits synchronization service to keep your data up to date across all your devices. An interesting feature is the function of transferring data between applications, or manually synchronizing data. It allows you to import transactions in CSV, QIF, OFX, QFX and MT940 format files. The same files can be transferred to mobile phone or computer, including for transferring data to other applications.

Key features of the program:

  • Internet banking system support from anywhere in the world.
  • Access to more than 16,000 banks in 50+ countries.
  • Automatic categorization of transactions.
  • Cross-platform data synchronization.
  • Highly efficient budget allocation, transaction planning, financial forecasting and reporting.
  • Ability to manually enter transactions and import bank statements.
  • Reliable data encryption.
  • Ability to set a PIN code for entry.
  • FaceID and TouchID support.
  • Availability of the program in Russian.

Screenshots



Related publications