- Peer-to-peer
- Contents
- Peer-to-peer Network [ edit ]
- Private networks [ edit ]
- Partially decentralized networks [ edit ]
- P2P Technology Review [ edit ]
- Use of P2P [ edit ]
- What Are Peer-to-Peer (P2P) Networks?
- Table of Contents
- What Are Peer-to-Peer Networks?
- How Do P2P Networks Work?
- Types of P2P networks
- Unstructured P2P NetworksВ
- Structured P2P Networks
- Hybrid P2P NetworkВ
- P2P Use in BlockchainВ
- Where Does Blockchain Store the Transaction Data?
- Who Owns The Blockchain?
- What Is a P2P Crypto Exchange?
- How Do P2P Exchanges Work?
- Popular P2P ExchangesВ
- Paxful
- LocalBitcoinsВ
- Binance P2P
- HODL HODL
Peer-to-peer
Enjoyed the article? Share:
Peer-to-peer (P2P) – is the peer decentralized computer network. It is based on the equal rights of all participants. Such a structure makes the network more secure, as there is no possibility to block off its separate servers – all the participants of the network are both servers and clients. The blockchain technology is built on the basis of the P2P network.
Contents
Peer-to-peer Network [ edit ]
Although the P2P systems were previously used in many areas of apps, the architecture was popularized by the file exchanging system Napster, released in 1999. This conception inspired new structures and philosophies in many areas of the human interaction.
Private networks [ edit ]
There are examples of private blockchain networks built on Peer-to-peer technology: Darknet, Friend-to-friend.
Partially decentralized networks [ edit ]
In addition to pure peer-to-peer networks, there are so-called hybrid networks in which there are servers used to coordinate the operation, search or provide information about existing network machines and their status (online, offline, etc.). Hybrid networks combine the speed of centralized networks and the reliability of decentralized networks thanks to hybrid schemes with independent index servers that synchronize information with each other. If one or more servers fail, the network continues to function. Partially decentralized networks include, for example, eDonkey, BitTorrent, Direct Connect, The Onion Router.
P2P Technology Review [ edit ]
In the peer-to-peer network, the tasks or workload are distributed equally among the peer-to-peer networks with equal privileges. Separate nodes provide all network participants with a part of their resources, such as the computational power, space of the disk storage or the network capacity. At that, there is no need of a centralized coordination by the servers or stable hosts.
This means that, unlike the traditional “client-server” model, separate network nodes carry out both the functions of servers and clients, i.e. are both consumers and suppliers of the network resources. In the first case, a node sends a request for the necessary resources, in the second one – reacts on such request by offering its own resources.
In some cases, in the partially decentralized networks, there are separate servers that coordinate the work of the network as well as provide the information about the valid nodes and their status.
New combined P2P systems look for the solutions, with that the separate network participants offer not the same resources, but the unique ones, which are useful for the whole virtual community. This allows solving more complicated tasks within the network than when all its nodes do the same.
Use of P2P [ edit ]
The peer networks are used for the file-sharing operations. In this case, the user gives an access to the file on his computer to other network participants, acting as a server. The client finds the file and starts downloading it from the computer. The downloading of one file from several sources at once is also possible.
Another use of the peer networks is the distributed computing. In this case, a complicated task is divided into a plenty of small ones that are solved by the network participants, “collecting” the result after that into an entity.
Finally, on the basis of the distributed networks, the modern peer payment systems are developed, which offer fairer terms of use. All the cryptocurrencies work according to this principle.
Источник
What Are Peer-to-Peer (P2P) Networks?
Peer-to-peer marketplaces are one of the fundamental pieces of the crypto industry — what are they, and why do people use them instead of centralized exchanges?
Table of Contents
Short for peer-to-peer, P2P networks are types of distributed network applications that date back to the 1980s when they were first deployed for business purposes. However, the concept was introduced to the general public in 1999 when college student Shawn Fanning created a music-sharing service, Napster.В
The service quickly became a hub for the unauthorized sharing of copyrighted songs, but two years later, Napster was shut down by the lawmakers as a result of a lawsuit from the American music industry. This gave rise to a new generation of P2P services wanting to fill the void and further the development of decentralized networks.В
Today, the P2P model is leveraged in web search engines, online marketplaces, streaming platforms, P2P blockchains and the IPFS (InterPlanetary File System) web protocol. However, the P2P model is also at the core of blockchain technology and has found a new use with the advent of cryptocurrencies.В
What Are Peer-to-Peer Networks?
A peer-to-peer network is a decentralized communication model between two peers also known as nodes, which can communicate with each other without the need for a central server. Unlike the seeder/leecher (or client/server) model in which a seeder makes the request and a leecher fulfills the request, the P2P network model allows each party to function as both a seeder and as a leecher. The network, once formed, can be used by the participants to share and store files without the help of an intermediary.В
How Do P2P Networks Work?
A peer-to-peer model is maintained by a distributed network of computers. These computers don’t have a server or central administrator as each node holds a copy of the files — acting as both a server and a client. Therefore, each node can upload files for other nodes or download files from them. These nodes use their own hard drives to store their data instead of a central server.В
Since each node has common capabilities to store, transmit and receive files, P2P networks tend to be faster and more efficient. Unlike traditional architectures in which a single point of failure exists, a P2P network has a distributed architecture which makes it extremely resistant to cyberattacks.В
Types of P2P networks
P2P networks can be categorized according to their architectural differences. Three main categories are described below.
Unstructured P2P NetworksВ
In an unstructured P2P network, the nodes connect and communicate randomly. Since nodes frequently join and leave the network, these systems are best-suited for high churn activity. For example, a social platform deployed on an unstructured P2P network can utilize it efficiently, as users can choose to join or leave the network frequently.В
Such networks are easy to build; however, they require high CPU and memory usage because search queries are sent to the entire network. Thus, if only 5% of the computers have what you’re searching for, it might take a while.В
Structured P2P Networks
Structured networks, on the other hand, are organized in a way that allows nodes to search efficiently even if the data is not widely available. In most cases, these networks implement a distributed hash table (DHT), which enables nodes to search for data using hash functions. While structured networks can route traffic efficiently, they require higher setup and maintenance cost and tend to be more centralized.В
Hybrid P2P NetworkВ
A hybrid network combines a peer-to-peer and client/server model on a single platform. The network uses an index server that contains data on the locations of resources at the center and uses this server for searches. The centralization functionality provided by a structured network and the node equality provided by an unstructured network are responsible for making trade-offs on the hybrid network. Comparatively, this type of network performs better than its counterparts as certain search queries do require a centralized functionality but, at the same time, can benefit from the decentralized networks.
P2P Use in BlockchainВ
The concept of blockchain was popularized in 2008, as part of the proposal for Bitcoin, a virtual currency developed to address the age-old problem of trust. Bitcoin creator Satoshi Nakamoto defined it as a “peer-to-peer electronic cash system” built with the aim to create a P2P digital form of money without banks.В
The underlying blockchain technology leverages the power of P2P networks and provides a shared and trusted ledger of transactions. As a distributed ledger technology, blockchain records transactions as an immutable timestamped digital block that indicates senders and receivers. No centralized authority manages the blockchain networks and only the participants can validate transactions among each other. The technology allows people and institutions to trust the output without trusting the participants. This new form of distributed data storage and management acts as a digital ledger that publicly records all transactions and activities.В
Where Does Blockchain Store the Transaction Data?
The data on a blockchain is structured much differently than a typical database. While a database stores information into tables, a blockchain structures its data into blocks. These blocks have a certain storage capacity to add each transaction taking place on the network. Once a block is filled, a new block is added to the previously filled block to add new transactions, thereby forming a chain of blocks called the blockchain.В
As such, blockchains are decentralized and therefore are not stored in a central place. Instead, they are stored in nodes or computers that partake in the network. Each node has a copy of the blockchain, or in other words, the transactions that are done on the network. Thus, the system is backed up by every single node participating in the network.
Who Owns The Blockchain?
No one owns the technology, although certain and specific blockchains can be owned by several entities. Although the technology is generally associated with Bitcoin, the idea behind blockchain can be traced back to 1991 to the work of Stuart Haber and W.Scott Stornetta.В
However, it doesn’t really matter who introduced blockchain technology, because it’s a protocol. While you can claim the ownership of a blockchain application, you can’t technically own the technology itself.В
What Is a P2P Crypto Exchange?
P2P crypto exchanges allow users to buy or sell directly with another user. Unlike centralized exchanges where you have to complete KYC to process an order, most P2P exchanges allow you to send/receive cryptocurrencies without asking you for identity verification. Also, exchanges based on the P2P model have no single point of failure like centralized exchanges do.В
How Do P2P Exchanges Work?
A user can usually register with the exchange without having to go through identity verification. Registration simply requires an email address and a password. After registering, a user can go through different buy and sell offers posted by individuals on the platform. Each offer has different payment options, a different rate and usually a minimum or maximum purchase amount. A buyer can select an offer and contact the seller to set up a transaction. If you’re a seller, you can post the accepted payment method as well as any fee involved. Generally, P2P crypto exchanges use an escrow account to deposit cryptocurrencies or other collateral from the users to ensure the safety of the platform.
Popular P2P ExchangesВ
Paxful
Paxful is a P2P marketplace that connects Bitcoin buyers and sellers. The exchange offers more than 300 ways to buy Bitcoin, including but not limited to bank transfer, online wallets, gift cards, cash payments, debit/credit cards, cryptos and assets. Though Paxful is trusted by over three million users worldwide, its integrity shouldn’t be confused with the seller’s integrity. The exchange is simply a marketplace. You should pay attention to the reputation of the seller before making a trade. However, the exchange offers a secure escrow service for Bitcoin transactions, which makes it harder to be scammed. You also must verify your Paxful account with an ID to use it.
Fees: 1% for sellers; no fee for buyers
LocalBitcoinsВ
LocalBitcoins is a P2P crypto exchange that allows buyers and sellers to communicate directly instead of manually matching them. Its sellers offer a wide range of payment options, such as PayPal, wire transfer, SEPA, Skrill, etc., and the platform secures trading using measures like escrow service, login guard and 2FA (optional). Starting in 2019, LocalBitcoin requires you to submit some identity verification for interacting with (trading, buying, sending) different amounts of Bitcoin.
Fees: 1% for sellers: nothing from buyers
Binance P2P
Binance P2P is a peer-to-peer marketplace in the Binance ecosystem that connects buyers and sellers. The exchange offers an escrow service to protect its users and supports trade using WeChat, Alipay, bank transfer, and QIWI. Unlike other P2P exchanges, Binance requires you to complete identity verification before you start trading. The platform supports a wide range of cryptocurrencies, including Bitcoin, Binance Coin, Ethereum, EOS and Tether.
Fees: Zero fees for both the buyers and sellersВ
HODL HODL
This P2P non-custodial cryptocurrency exchange provides direct service to buyers and sellers without holding their funds. Instead, HODL HODL uses a multisig escrow to secure its users from scammers. The exchange offers more than 215 payment methods to its users. Its services are available around the world, except for the U.S. The users don’t have to go through KYC or AML procedures, as they can create an offer just by registering.В
Fees: 0.6% of the contract amount, i.e., 0.3% per user
Originally known as “Bitsquare,” Bisq is a desktop program that needs to be downloaded before using it. Similar to HODL HODL, Bisq also allows users to register for accounts without verifying their identity with KYC. Each transaction on Bisq requires a security deposit from both the sellers and buyers to ensure fair trade. Users can deposit security through different methods, including Perfect Money, OK Pay, Alipay and Zele.
Fees: Fees vary with the transactionВ
This article contains links to third-party websites or other content for information purposes only (“Third-Party Sites”). The Third-Party Sites are not under the control of CoinMarketCap, and CoinMarketCap is not responsible for the content of any Third-Party Site, including without limitation any link contained in a Third-Party Site, or any changes or updates to a Third-Party Site. CoinMarketCap is providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement, approval or recommendation by CoinMarketCap of the site or any association with its operators. This article is intended to be used and must be used for informational purposes only. It is important to do your own research and analysis before making any material decisions related to any of the products or services described. This article is not intended as, and shall not be construed as, financial advice. The views and opinions expressed in this article are the author’s [company’s] own and do not necessarily reflect those of CoinMarketCap.
Источник