A peer is considered an equal. All computers on a peer-to-peer network can be considered equals, as shown in the picture. That is to say, no one computer is in charge of the network’s operation. Each computer controls its own information and is capable of functioning as either a client or a server depending on which is needed at the time.
Peer-to-peer networks are popular as home networks and for use in small companies because they are inexpensive and easy to install. Most operating systems (the software that runs the basic computer functionality) come with peer-to-peer networking capability built in. The only other cost involved with setting up a peer-to-peer network comes into play if a computer does not have a network interface card, or NIC (the device that physically connects your computer to your network’s cabling), already installed.
|
Peer To Peer Computer Network |
Typical initial peer-to-peer networking involves no security measures. Rather, each peer simply shares its resources and allows others open access to them. In fact, a peer-to-peer network becomes difficult to manage when more and more security is added to the resources. This is because users control their own security by adding password protection to each share they create. Shares are any resources users control on their
computers, such as document folders, printers, and other peripherals. Each shared resource can actually have its own password. Someone wanting access to numerous shared resources has to remember many passwords. Security on a peer to peer network can quickly become complex and confusing. While peer-to-peer networks are inexpensive to set up, they are extremely limited in scope. The accepted maximum number of peers that can operate on a peer-to-peer network is ten. They are, therefore, not appropriate for larger, more secure networks.