Decentralized characteristics of P2P
Publish: 2021-05-03 10:13:41
1. Chongqing jinwowo analysis is based on distributed bookkeeping, collective agreement and intelligent consensus mechanism. The information characteristics of blockchain technology, such as decentralization, open sharing, authenticity and reliability, once attracted great attention. Among them, the characteristics of decentralization are particularly popular, and the attention to decentralization has existed since the birth of blockchain.
2. Decentralization is idealism. Although there is no decentralized P2P platform at present, with the development of blockchain technology, there is a high probability of decentralized peer-to-peer lending in the future
centralization has the advantage of centralization, which should not be too one-sided.
centralization has the advantage of centralization, which should not be too one-sided.
3. Hello, it's a great honor to be here to answer your question. The following are some of my views on this issue. If there are any mistakes, please point them out. Start all
and enter the column
almost every supporter of encryption start-ups has a trend, that is, to use the decentralized value of blockchain technology to sell their business fundamentals
in this paper, we will explain the differences between decentralized financial agreement business and traditional business:
we will mainly discuss two aspects:
1) what is the real meaning of defi
2) what are the types and main differences of defi platforms< Users of traditional financial systems often want to build a system that is easier to access, more transparent, lower transaction costs and less dependent on intermediaries. To build such a more equitable financial system, banks, loans and derivatives must undergo fundamental changes. In addition, a decentralized ecosystem, such as defi, is needed. It promotes P2P lending, eliminates centralized control, and provides users with financial freedom
recently, in the field of cryptocurrency, there are many discussions about defi. It provides financial services to the world: loans, derivatives and other procts. Moreover, the role of traditional financial intermediaries has weakened, or even failed to play a role. Proponents of a decentralized financial system see defi as a good alternative to traditional lending. Some have called it the future of borrowing
defi is built on public blockchains such as bitcoin network and Ethereum. It has become one of the "core drivers" on the Ethereum network. By using unlicensed distributed networks, the defi platform converts financial procts into untrusted protocols that can be accessed by anyone anywhere in the world. People who don't have an account in the bank can also use the defi solution to loan and borrow assets, as well as to trade with financial instruments
open source platforms provide users with great benefits, including transparency, cheap cross-border transactions, no credit checks and less censorship. Anyone can carry out financial activities because there is no geographical restriction<
the degree of decentralization of defi
in recent months, the introction of defi solutions has proliferated. They have different models and their degree of decentralization is also different. Compared with other models, some defi models have poor dispersion. This is because only a few of their components are decentralized, while the rest are still centrally controlled by the company
the establishment of agreement, non trust, price supply, determination of interest rate, provision of liquidity of margin call and start-up of margin call are the key components of defi agreement. They determine the degree of decentralization
if there are a large number of decentralized components, then the defi protocol is more decentralized than other models. Such a protocol will give users complete control over their digital assets and get rid of centralized control. So far, there is no single defi protocol that disperses all components
each defi protocol is assigned a category according to the number of distributed components:
centralized finance (cefi)
defi solutions are usually unmanaged, which means that users can control their funds and be responsible for their security. Instead, cefi is hosted. The central system is responsible for keeping the assets of users and ensuring the safety of users' funds
when it comes to loans or loans, users can't control any aspect of funds. The interest rate is determined by the central government, and the liquidity of margin call is provided by the central system or authorities. Cefi procts use centralized price supply, and it is also permitted to issue margin call. Thank you very much for your patience. If you have any help, please accept it. I wish you a happy life! thank you!
and enter the column
almost every supporter of encryption start-ups has a trend, that is, to use the decentralized value of blockchain technology to sell their business fundamentals
in this paper, we will explain the differences between decentralized financial agreement business and traditional business:
we will mainly discuss two aspects:
1) what is the real meaning of defi
2) what are the types and main differences of defi platforms< Users of traditional financial systems often want to build a system that is easier to access, more transparent, lower transaction costs and less dependent on intermediaries. To build such a more equitable financial system, banks, loans and derivatives must undergo fundamental changes. In addition, a decentralized ecosystem, such as defi, is needed. It promotes P2P lending, eliminates centralized control, and provides users with financial freedom
recently, in the field of cryptocurrency, there are many discussions about defi. It provides financial services to the world: loans, derivatives and other procts. Moreover, the role of traditional financial intermediaries has weakened, or even failed to play a role. Proponents of a decentralized financial system see defi as a good alternative to traditional lending. Some have called it the future of borrowing
defi is built on public blockchains such as bitcoin network and Ethereum. It has become one of the "core drivers" on the Ethereum network. By using unlicensed distributed networks, the defi platform converts financial procts into untrusted protocols that can be accessed by anyone anywhere in the world. People who don't have an account in the bank can also use the defi solution to loan and borrow assets, as well as to trade with financial instruments
open source platforms provide users with great benefits, including transparency, cheap cross-border transactions, no credit checks and less censorship. Anyone can carry out financial activities because there is no geographical restriction<
the degree of decentralization of defi
in recent months, the introction of defi solutions has proliferated. They have different models and their degree of decentralization is also different. Compared with other models, some defi models have poor dispersion. This is because only a few of their components are decentralized, while the rest are still centrally controlled by the company
the establishment of agreement, non trust, price supply, determination of interest rate, provision of liquidity of margin call and start-up of margin call are the key components of defi agreement. They determine the degree of decentralization
if there are a large number of decentralized components, then the defi protocol is more decentralized than other models. Such a protocol will give users complete control over their digital assets and get rid of centralized control. So far, there is no single defi protocol that disperses all components
each defi protocol is assigned a category according to the number of distributed components:
centralized finance (cefi)
defi solutions are usually unmanaged, which means that users can control their funds and be responsible for their security. Instead, cefi is hosted. The central system is responsible for keeping the assets of users and ensuring the safety of users' funds
when it comes to loans or loans, users can't control any aspect of funds. The interest rate is determined by the central government, and the liquidity of margin call is provided by the central system or authorities. Cefi procts use centralized price supply, and it is also permitted to issue margin call. Thank you very much for your patience. If you have any help, please accept it. I wish you a happy life! thank you!
4. Jinwowo network technology:
the centralized platform leads to data monopoly and data island, and only a few oligarchs enjoy the data dividend
centralization and decentralization are the differences between centralization and decentralization. Decentralization mainly refers to the empowerment of ordinary users by technology.
the centralized platform leads to data monopoly and data island, and only a few oligarchs enjoy the data dividend
centralization and decentralization are the differences between centralization and decentralization. Decentralization mainly refers to the empowerment of ordinary users by technology.
5. It depends on where the cash is withdrawn. In the mine pool, the verification code is not needed. The verification code of exchange cash withdrawal is sent to the mobile phone
6. Hello<
Introction to P2P technology
what is P2P
P2P is peer to peer, which is called peer-to-peer connection or peer-to-peer network. P2P technology mainly refers to the information control technology formed by hardware connection, and its representative form is software. P2P originated from the original way of network communication, such as in the Building PC through LAN interconnection, different buildings through modem remote dial-up interconnection. Among them, the communication mode based on TCP / IP protocol constitutes the basis of today's Internet, so from the perspective of basic technology, P2P is not a new technology, but a new application technology mode< Key technology
P2P is a new application-oriented technology based on Internet environment, mainly software technology
(1) for many computers on the Internet, P2P applications need to consider the interconnection of low-end PCs more than other applications. They do not have the strong networking ability of servers. At the same time, for the previous P2P application technology, the hardware environment is more complex now. In terms of communication infrastructure, P2P applications need to pay more attention to the interconnection of low-end PCs, P2P must provide end-to-end location (addressing) and handshake technology on the existing hardware logic and underlying communication protocol to establish a stable connection. The technologies involved include IP address resolution, NAT routing and firewall
(2) on the application level, if two peers represent two different companies respectively, and they have established a connection through the Internet, then one party's information must be recognized by the other party, so the current protocols of data description and exchange on the Internet, such as XML, soap, UDDI, are all considered by a perfect P2P software
(3) if there is communication, there must be security, and encryption technology must be considered
(4) other considerations include how to set up the central server and how to control the network scale< Compared with the existing Internet technology, P2P technology is mainly based on S / C mode. In this mode, a high-performance computer with powerful processing capacity and large bandwidth should be set on the Internet, with high-end server software, a large amount of data should be stored on it, and a variety of service software should be installed, In the centralized processing of data at the same time, it can serve other PCs on the Internet, provide or receive data, provide processing power and other applications. For a PC connected with the server and receiving services, this PC is the client, and its performance can be relatively weak. One of the characteristics of P2P technology is to weaken the role of the server, or even cancel the server. Any two PCs are both servers and clients, that is, peer-to-peer< Strictly speaking, P2P technology is a kind of grid
the definition of Grid: grid is the software infrastructure running on the network, and it is the bond and adhesive to connect and integrate different hardware systems, software systems and application systems< (1) as both s and C, how to behave depends on the requirements of users, and network applications are driven by users freely
(2) the direct flow of information between network devices, high speed and timely, rece the cost of transit service
(3) constitute the basis and application of network device interaction
(4) while making the network information decentralized, P2P devices with the same characteristics can form a subnet in the Internet, which makes the information centralized again in a new way<
three technology applications
P2P technology is mainly used in the following aspects:
1. Timely communication: ICQ, OICQ and IP phone technology
2. File and other content sharing -- BT technology
now people are very familiar with using BT download resources, BT's full name is called bittorren, Chinese translation / bit turbulence, many netizens directly take homophonic, It's very vivid to call it / abnormal, such as taking out the derogatory color, because it is indeed a resource exchange mechanism different from the normal Internet. As an innovative download tool, BT absorbs the technical advantages of P2P and simply and effectively realizes the sharing of download pressure. BT first divides a file into Z parts on the uploader's side. Party a randomly downloads the N parts on the server, and Party B randomly downloads the M parts on the server. In this way, Party A's BT will go to Party B's computer to get the M parts that Party B has downloaded, and Party B's BT will go to Party A's computer to get the N parts that Party A has downloaded, This not only reces the load of the server, but also speeds up the download speed of the user (Party A and Party B), improves the efficiency, and also reces the restrictions between regions; For example, if C wants to connect to the server to download it, it may be only a few K, but it's much faster to get it from a and B's computers. So the more people you use, the more people you download, the faster you will be. Here is the advantage of BT. Moreover, while you download, you are also uploading (someone takes a part of that file from your computer), so while enjoying the download provided by others, you are also contributing
3. Search engine design of adaptive information retrieval system based on P22
the network topology of adaptive information retrieval system based on P2P proposed in this paper is shown in Figure 1. The system consists of several autonomous nodes, which constitute an information retrieval network according to the network architecture, and each node is equal. Each node is composed of a client agent and a server agent. Users submit questions through the client agent. For each question, the client agent can use any combination of meta search, crawler and forwarding to the server agent for retrieval processing according to the specific situation. For the result documents returned by the three methods, the client agent presents them to users after merging and filtering. When browsing the results, users mark the document as interested or not interested, and submit relevant feedback to the client agent. Using these feedbacks, the client agent can build a user model, which will be used to filter the results in the future on the one hand, and modify the user's original questions on the other hand for further retrieval processing in the future. At the same time, the server-side agent is responsible for the communication between nodes. It can cluster users on the basis of receiving user models and related documents. On the basis of clustering, it can realize cooperative recommendation and forward retrieval requests among users with the same or similar interests. The internal structure design of a single node is shown in Figure 2<
4. Collaborative work -- the impact of P2P technology on e-learning application mode
knowledge exchange learning based on P2P idea:
P2P is a technology, but it is also an idea, which has the potential to change the status of the whole Internet. It connects people directly and enables people to realize direct interaction through the Internet, which makes network communication easier and resource sharing more direct. Therefore, it has great prospects in strengthening network interpersonal communication, file exchange and distributed computing. With the rise of P2P technology, knowledge exchange based on P2P ideas also began to appear on the network. For example, the learning ideas company provides a solution to capture the knowledge exchange between indivials in real time, which includes a unique matching and forwarding system, which enables external knowledge to be transmitted in real time with information exchange. The technology of learning ideas is very similar to the routing system of enterprise call center. It allows routing and matching based on knowledge and skills, and enables one user to connect with another related user in case of real needs and specific problems. Compared with the traditional e-learning system, the biggest difference of the knowledge exchange scheme based on P2P idea is that it can provide a channel for knowledge sharing between learners and others without creating a specialized learning environment or formally arranging teaching activities
at present, the mainstream e-learning systems such as ellumniate, centra, WebEx also provide some synchronous learning and collaborative solutions (such as virtual "online meeting room"), although they can allow learners to carry out informal learning exchange and direct communication, but this kind of learning activities generally need to focus on the theme, the content, and the content Make clear plans and arrangements for time and personnel exchange. The knowledge exchange scheme based on P2P is different. When a user or student encounters some difficulties, he can express his problems in the learning ideas system, and the system can immediately help him transfer to a colleague or student user who has experience in solving such problems. Just like asking and communicating with people around you, this virtual real-time communication method can solve the real problems encountered by users more quickly, and eliminate the time and space barriers of learning through the formal teaching system
the real value of the informal knowledge exchange scheme based on P2P technology is that it enables learning and communication to happen online at any time, and can be integrated into the actual work and life process. This random, free and timely knowledge exchange scheme not only enables learning interaction to take place around each network user, but also enables the learning process of informal knowledge exchange to be recorded and archived. When people join the P2P network, all users have equal opportunities, they can easily communicate freely on the network, exchange and learn at any time, and then get the knowledge and information they need from the communication with each other. P2P gets rid of the fetters of intermediate services, it connects people directly through the network, makes the interpersonal knowledge exchange more rapid and convenient, and improves the efficiency of solving learning problems and dealing with social affairs<
four shortcomings of P2P technology and current solutions
management and security issues are the biggest problems facing P2P
in P2P technology structure, the significance of central node is greatly weakened or even completely eliminated. The characteristics of decentralization will be more fully reflected, and the flat characteristics of network communication structure will be further highlighted. Such a communication structure makes the management and control of network information transmission more complex and difficult. From the perspective of management, the main challenges of P2P technology are reflected in two aspects: the control of the spread of bad content is more complex; Copyright management is more difficult< It is reported that the Intellectual Property Office of the US Congress has drafted a new version of the bill to ban the application of such P2P software; As early as October 2003, the United Kingdom passed legislation to implement the controversial European Copyright Law, which makes it clear theoretically that the use of similar P2P services may constitute a crime
the current solution is to use JXTA Technology (juxtapose parallel technology)
JXTA technology provides the core technology of building P2P network applications, aiming to build a general development platform for P2P applications. Jx2ta technology mainly includes a protocol set independent of programming language system platform and network platform. This protocol set describes the most basic requirements of P2P applications. It can be said that JXTA is a P2P stack under the P2P network services or applications on the operating system or virtual machine, which provides the core functions required by P2P applications. However, some people are critical of this, such as Fang Xing
Introction to P2P technology
what is P2P
P2P is peer to peer, which is called peer-to-peer connection or peer-to-peer network. P2P technology mainly refers to the information control technology formed by hardware connection, and its representative form is software. P2P originated from the original way of network communication, such as in the Building PC through LAN interconnection, different buildings through modem remote dial-up interconnection. Among them, the communication mode based on TCP / IP protocol constitutes the basis of today's Internet, so from the perspective of basic technology, P2P is not a new technology, but a new application technology mode< Key technology
P2P is a new application-oriented technology based on Internet environment, mainly software technology
(1) for many computers on the Internet, P2P applications need to consider the interconnection of low-end PCs more than other applications. They do not have the strong networking ability of servers. At the same time, for the previous P2P application technology, the hardware environment is more complex now. In terms of communication infrastructure, P2P applications need to pay more attention to the interconnection of low-end PCs, P2P must provide end-to-end location (addressing) and handshake technology on the existing hardware logic and underlying communication protocol to establish a stable connection. The technologies involved include IP address resolution, NAT routing and firewall
(2) on the application level, if two peers represent two different companies respectively, and they have established a connection through the Internet, then one party's information must be recognized by the other party, so the current protocols of data description and exchange on the Internet, such as XML, soap, UDDI, are all considered by a perfect P2P software
(3) if there is communication, there must be security, and encryption technology must be considered
(4) other considerations include how to set up the central server and how to control the network scale< Compared with the existing Internet technology, P2P technology is mainly based on S / C mode. In this mode, a high-performance computer with powerful processing capacity and large bandwidth should be set on the Internet, with high-end server software, a large amount of data should be stored on it, and a variety of service software should be installed, In the centralized processing of data at the same time, it can serve other PCs on the Internet, provide or receive data, provide processing power and other applications. For a PC connected with the server and receiving services, this PC is the client, and its performance can be relatively weak. One of the characteristics of P2P technology is to weaken the role of the server, or even cancel the server. Any two PCs are both servers and clients, that is, peer-to-peer< Strictly speaking, P2P technology is a kind of grid
the definition of Grid: grid is the software infrastructure running on the network, and it is the bond and adhesive to connect and integrate different hardware systems, software systems and application systems< (1) as both s and C, how to behave depends on the requirements of users, and network applications are driven by users freely
(2) the direct flow of information between network devices, high speed and timely, rece the cost of transit service
(3) constitute the basis and application of network device interaction
(4) while making the network information decentralized, P2P devices with the same characteristics can form a subnet in the Internet, which makes the information centralized again in a new way<
three technology applications
P2P technology is mainly used in the following aspects:
1. Timely communication: ICQ, OICQ and IP phone technology
2. File and other content sharing -- BT technology
now people are very familiar with using BT download resources, BT's full name is called bittorren, Chinese translation / bit turbulence, many netizens directly take homophonic, It's very vivid to call it / abnormal, such as taking out the derogatory color, because it is indeed a resource exchange mechanism different from the normal Internet. As an innovative download tool, BT absorbs the technical advantages of P2P and simply and effectively realizes the sharing of download pressure. BT first divides a file into Z parts on the uploader's side. Party a randomly downloads the N parts on the server, and Party B randomly downloads the M parts on the server. In this way, Party A's BT will go to Party B's computer to get the M parts that Party B has downloaded, and Party B's BT will go to Party A's computer to get the N parts that Party A has downloaded, This not only reces the load of the server, but also speeds up the download speed of the user (Party A and Party B), improves the efficiency, and also reces the restrictions between regions; For example, if C wants to connect to the server to download it, it may be only a few K, but it's much faster to get it from a and B's computers. So the more people you use, the more people you download, the faster you will be. Here is the advantage of BT. Moreover, while you download, you are also uploading (someone takes a part of that file from your computer), so while enjoying the download provided by others, you are also contributing
3. Search engine design of adaptive information retrieval system based on P22
the network topology of adaptive information retrieval system based on P2P proposed in this paper is shown in Figure 1. The system consists of several autonomous nodes, which constitute an information retrieval network according to the network architecture, and each node is equal. Each node is composed of a client agent and a server agent. Users submit questions through the client agent. For each question, the client agent can use any combination of meta search, crawler and forwarding to the server agent for retrieval processing according to the specific situation. For the result documents returned by the three methods, the client agent presents them to users after merging and filtering. When browsing the results, users mark the document as interested or not interested, and submit relevant feedback to the client agent. Using these feedbacks, the client agent can build a user model, which will be used to filter the results in the future on the one hand, and modify the user's original questions on the other hand for further retrieval processing in the future. At the same time, the server-side agent is responsible for the communication between nodes. It can cluster users on the basis of receiving user models and related documents. On the basis of clustering, it can realize cooperative recommendation and forward retrieval requests among users with the same or similar interests. The internal structure design of a single node is shown in Figure 2<
4. Collaborative work -- the impact of P2P technology on e-learning application mode
knowledge exchange learning based on P2P idea:
P2P is a technology, but it is also an idea, which has the potential to change the status of the whole Internet. It connects people directly and enables people to realize direct interaction through the Internet, which makes network communication easier and resource sharing more direct. Therefore, it has great prospects in strengthening network interpersonal communication, file exchange and distributed computing. With the rise of P2P technology, knowledge exchange based on P2P ideas also began to appear on the network. For example, the learning ideas company provides a solution to capture the knowledge exchange between indivials in real time, which includes a unique matching and forwarding system, which enables external knowledge to be transmitted in real time with information exchange. The technology of learning ideas is very similar to the routing system of enterprise call center. It allows routing and matching based on knowledge and skills, and enables one user to connect with another related user in case of real needs and specific problems. Compared with the traditional e-learning system, the biggest difference of the knowledge exchange scheme based on P2P idea is that it can provide a channel for knowledge sharing between learners and others without creating a specialized learning environment or formally arranging teaching activities
at present, the mainstream e-learning systems such as ellumniate, centra, WebEx also provide some synchronous learning and collaborative solutions (such as virtual "online meeting room"), although they can allow learners to carry out informal learning exchange and direct communication, but this kind of learning activities generally need to focus on the theme, the content, and the content Make clear plans and arrangements for time and personnel exchange. The knowledge exchange scheme based on P2P is different. When a user or student encounters some difficulties, he can express his problems in the learning ideas system, and the system can immediately help him transfer to a colleague or student user who has experience in solving such problems. Just like asking and communicating with people around you, this virtual real-time communication method can solve the real problems encountered by users more quickly, and eliminate the time and space barriers of learning through the formal teaching system
the real value of the informal knowledge exchange scheme based on P2P technology is that it enables learning and communication to happen online at any time, and can be integrated into the actual work and life process. This random, free and timely knowledge exchange scheme not only enables learning interaction to take place around each network user, but also enables the learning process of informal knowledge exchange to be recorded and archived. When people join the P2P network, all users have equal opportunities, they can easily communicate freely on the network, exchange and learn at any time, and then get the knowledge and information they need from the communication with each other. P2P gets rid of the fetters of intermediate services, it connects people directly through the network, makes the interpersonal knowledge exchange more rapid and convenient, and improves the efficiency of solving learning problems and dealing with social affairs<
four shortcomings of P2P technology and current solutions
management and security issues are the biggest problems facing P2P
in P2P technology structure, the significance of central node is greatly weakened or even completely eliminated. The characteristics of decentralization will be more fully reflected, and the flat characteristics of network communication structure will be further highlighted. Such a communication structure makes the management and control of network information transmission more complex and difficult. From the perspective of management, the main challenges of P2P technology are reflected in two aspects: the control of the spread of bad content is more complex; Copyright management is more difficult< It is reported that the Intellectual Property Office of the US Congress has drafted a new version of the bill to ban the application of such P2P software; As early as October 2003, the United Kingdom passed legislation to implement the controversial European Copyright Law, which makes it clear theoretically that the use of similar P2P services may constitute a crime
the current solution is to use JXTA Technology (juxtapose parallel technology)
JXTA technology provides the core technology of building P2P network applications, aiming to build a general development platform for P2P applications. Jx2ta technology mainly includes a protocol set independent of programming language system platform and network platform. This protocol set describes the most basic requirements of P2P applications. It can be said that JXTA is a P2P stack under the P2P network services or applications on the operating system or virtual machine, which provides the core functions required by P2P applications. However, some people are critical of this, such as Fang Xing
7. P2P technology introction
what is P2P
P2P is peer to peer, which is called peer-to-peer connection or peer-to-peer network. P2P technology mainly refers to the information control technology formed by hardware connection, and its representative form is software. P2P originated from the original way of network communication, such as in the Building PC through LAN interconnection, different buildings through modem remote dial-up interconnection. Among them, the communication mode based on TCP / IP protocol constitutes the basis of today's Internet, so from the perspective of basic technology, P2P is not a new technology, but a new application technology mode< Key technology
P2P is a new application-oriented technology based on Internet environment, mainly software technology
(1) for many computers on the Internet, P2P applications need to consider the interconnection of low-end PCs more than other applications. They do not have the strong networking ability of servers. At the same time, for the previous P2P application technology, the hardware environment is more complex now. In terms of communication infrastructure, P2P applications need to pay more attention to the interconnection of low-end PCs, P2P must provide end-to-end location (addressing) and handshake technology on the existing hardware logic and underlying communication protocol to establish a stable connection. The technologies involved include IP address resolution, NAT routing and firewall
(2) on the application level, if two peers represent two different companies respectively, and they have established a connection through the Internet, then one party's information must be recognized by the other party, so the current protocols of data description and exchange on the Internet, such as XML, soap, UDDI, are all considered by a perfect P2P software
(3) if there is communication, there must be security, and encryption technology must be considered
(4) other considerations include how to set up the central server and how to control the network scale< Compared with the existing Internet technology, P2P technology is mainly based on S / C mode. In this mode, a high-performance computer with powerful processing capacity and large bandwidth should be set on the Internet, with high-end server software, a large amount of data should be stored on it, and a variety of service software should be installed, In the centralized processing of data at the same time, it can serve other PCs on the Internet, provide or receive data, provide processing power and other applications. For a PC connected with the server and receiving services, this PC is the client, and its performance can be relatively weak. One of the characteristics of P2P technology is to weaken the role of the server, or even cancel the server. Any two PCs are both servers and clients, that is, peer-to-peer< Strictly speaking, P2P technology is a kind of grid
the definition of Grid: grid is the software infrastructure running on the network, and it is the bond and adhesive to connect and integrate different hardware systems, software systems and application systems< (1) as both s and C, how to behave depends on the requirements of users, and network applications are driven by users freely
(2) the direct flow of information between network devices, high speed and timely, rece the cost of transit service
(3) constitute the basis and application of network device interaction
(4) while making the network information decentralized, P2P devices with the same characteristics can form a subnet in the Internet, which makes the information centralized again in a new way<
three technology applications
P2P technology is mainly used in the following aspects:
1. Timely communication: ICQ, OICQ and IP phone technology
2. File and other content sharing -- BT technology
now people are very familiar with using BT download resources, BT's full name is called bittorren, Chinese translation / bit turbulence, many netizens directly take homophonic, It's very vivid to call it / abnormal, such as taking out the derogatory color, because it is indeed a resource exchange mechanism different from the normal Internet. As an innovative download tool, BT absorbs the technical advantages of P2P and simply and effectively realizes the sharing of download pressure. BT first divides a file into Z parts on the uploader's side. Party a randomly downloads the N parts on the server, and Party B randomly downloads the M parts on the server. In this way, Party A's BT will go to Party B's computer to get the M parts that Party B has downloaded, and Party B's BT will go to Party A's computer to get the N parts that Party A has downloaded, This not only reces the load of the server, but also speeds up the download speed of the user (Party A and Party B), improves the efficiency, and also reces the restrictions between regions; For example, if C wants to connect to the server to download it, it may be only a few K, but it's much faster to get it from a and B's computers. So the more people you use, the more people you download, the faster you will be. Here is the advantage of BT. Moreover, while you download, you are also uploading (someone takes a part of that file from your computer), so while enjoying the download provided by others, you are also contributing
3. Search engine design of adaptive information retrieval system based on P22
the network topology of adaptive information retrieval system based on P2P proposed in this paper is shown in Figure 1. The system consists of several autonomous nodes, which constitute an information retrieval network according to the network architecture, and each node is equal. Each node is composed of a client agent and a server agent. Users submit questions through the client agent. For each question, the client agent can use any combination of meta search, crawler and forwarding to the server agent for retrieval processing according to the specific situation. For the result documents returned by the three methods, the client agent presents them to users after merging and filtering. When browsing the results, users mark the document as interested or not interested, and submit relevant feedback to the client agent. Using these feedbacks, the client agent can build a user model, which will be used to filter the results in the future on the one hand, and modify the user's original questions on the other hand for further retrieval processing in the future. At the same time, the server-side agent is responsible for the communication between nodes. It can cluster users on the basis of receiving user models and related documents. On the basis of clustering, it can realize cooperative recommendation and forward retrieval requests among users with the same or similar interests. The internal structure design of a single node is shown in Figure 2<
4. Collaborative work -- the impact of P2P technology on e-learning application mode
knowledge exchange learning based on P2P idea:
P2P is a technology, but it is also an idea, which has the potential to change the status of the whole Internet. It connects people directly and enables people to realize direct interaction through the Internet, which makes network communication easier and resource sharing more direct. Therefore, it has great prospects in strengthening network interpersonal communication, file exchange and distributed computing. With the rise of P2P technology, knowledge exchange based on P2P ideas also began to appear on the network. For example, the learning ideas company provides a solution to capture the knowledge exchange between indivials in real time, which includes a unique matching and forwarding system, which enables external knowledge to be transmitted in real time with information exchange. The technology of learning ideas is very similar to the routing system of enterprise call center. It allows routing and matching based on knowledge and skills, and enables one user to connect with another related user in case of real needs and specific problems. Compared with the traditional e-learning system, the biggest difference of the knowledge exchange scheme based on P2P idea is that it can provide a channel for knowledge sharing between learners and others without creating a specialized learning environment or formally arranging teaching activities
at present, the mainstream e-learning systems such as ellumniate, centra, WebEx also provide some synchronous learning and collaborative solutions (such as virtual "online meeting room"), although they can allow learners to carry out informal learning exchange and direct communication, but this kind of learning activities generally need to focus on the theme, the content, and the content Make clear plans and arrangements for time and personnel exchange. The knowledge exchange scheme based on P2P is different. When a user or student encounters some difficulties, he can express his problems in the learning ideas system, and the system can immediately help him transfer to a colleague or student user who has experience in solving such problems. Just like asking and communicating with people around you, this virtual real-time communication method can solve the real problems encountered by users more quickly, and eliminate the time and space barriers of learning through the formal teaching system
the real value of the informal knowledge exchange scheme based on P2P technology is that it enables learning and communication to happen online at any time, and can be integrated into the actual work and life process. This random, free and timely knowledge exchange scheme not only enables learning interaction to take place around each network user, but also enables the learning process of informal knowledge exchange to be recorded and archived. When people join the P2P network, all users have equal opportunities, they can easily communicate freely on the network, exchange and learn at any time, and then get the knowledge and information they need from the communication with each other. P2P gets rid of the fetters of intermediate services, it connects people directly through the network, makes the interpersonal knowledge exchange more rapid and convenient, and improves the efficiency of solving learning problems and dealing with social affairs<
four shortcomings of P2P technology and current solutions
management and security issues are the biggest problems facing P2P
in P2P technology structure, the significance of central node is greatly weakened or even completely eliminated. The characteristics of decentralization will be more fully reflected, and the flat characteristics of network communication structure will be further highlighted. Such a communication structure makes the management and control of network information transmission more complex and difficult. From the perspective of management, the main challenges of P2P technology are reflected in two aspects: the control of the spread of bad content is more complex; Copyright management is more difficult< It is reported that the Intellectual Property Office of the US Congress has drafted a new version of the bill to ban the application of such P2P software; As early as October 2003, the United Kingdom passed legislation to implement the controversial European Copyright Law, which makes it clear theoretically that the use of similar P2P services may constitute a crime
the current solution is to use JXTA Technology (juxtapose parallel technology)
JXTA technology provides the core technology of building P2P network applications, aiming to build a general development platform for P2P applications. Jx2ta technology mainly includes a protocol set independent of programming language system platform and network platform. This protocol set describes the most basic requirements of P2P applications. It can be said that JXTA is a P2P stack under the P2P network services or applications on the operating system or virtual machine, which provides the core functions required by P2P applications. However, some people hold a critical attitude towards this. For example, Fang Xingdong thinks: P2P communication
what is P2P
P2P is peer to peer, which is called peer-to-peer connection or peer-to-peer network. P2P technology mainly refers to the information control technology formed by hardware connection, and its representative form is software. P2P originated from the original way of network communication, such as in the Building PC through LAN interconnection, different buildings through modem remote dial-up interconnection. Among them, the communication mode based on TCP / IP protocol constitutes the basis of today's Internet, so from the perspective of basic technology, P2P is not a new technology, but a new application technology mode< Key technology
P2P is a new application-oriented technology based on Internet environment, mainly software technology
(1) for many computers on the Internet, P2P applications need to consider the interconnection of low-end PCs more than other applications. They do not have the strong networking ability of servers. At the same time, for the previous P2P application technology, the hardware environment is more complex now. In terms of communication infrastructure, P2P applications need to pay more attention to the interconnection of low-end PCs, P2P must provide end-to-end location (addressing) and handshake technology on the existing hardware logic and underlying communication protocol to establish a stable connection. The technologies involved include IP address resolution, NAT routing and firewall
(2) on the application level, if two peers represent two different companies respectively, and they have established a connection through the Internet, then one party's information must be recognized by the other party, so the current protocols of data description and exchange on the Internet, such as XML, soap, UDDI, are all considered by a perfect P2P software
(3) if there is communication, there must be security, and encryption technology must be considered
(4) other considerations include how to set up the central server and how to control the network scale< Compared with the existing Internet technology, P2P technology is mainly based on S / C mode. In this mode, a high-performance computer with powerful processing capacity and large bandwidth should be set on the Internet, with high-end server software, a large amount of data should be stored on it, and a variety of service software should be installed, In the centralized processing of data at the same time, it can serve other PCs on the Internet, provide or receive data, provide processing power and other applications. For a PC connected with the server and receiving services, this PC is the client, and its performance can be relatively weak. One of the characteristics of P2P technology is to weaken the role of the server, or even cancel the server. Any two PCs are both servers and clients, that is, peer-to-peer< Strictly speaking, P2P technology is a kind of grid
the definition of Grid: grid is the software infrastructure running on the network, and it is the bond and adhesive to connect and integrate different hardware systems, software systems and application systems< (1) as both s and C, how to behave depends on the requirements of users, and network applications are driven by users freely
(2) the direct flow of information between network devices, high speed and timely, rece the cost of transit service
(3) constitute the basis and application of network device interaction
(4) while making the network information decentralized, P2P devices with the same characteristics can form a subnet in the Internet, which makes the information centralized again in a new way<
three technology applications
P2P technology is mainly used in the following aspects:
1. Timely communication: ICQ, OICQ and IP phone technology
2. File and other content sharing -- BT technology
now people are very familiar with using BT download resources, BT's full name is called bittorren, Chinese translation / bit turbulence, many netizens directly take homophonic, It's very vivid to call it / abnormal, such as taking out the derogatory color, because it is indeed a resource exchange mechanism different from the normal Internet. As an innovative download tool, BT absorbs the technical advantages of P2P and simply and effectively realizes the sharing of download pressure. BT first divides a file into Z parts on the uploader's side. Party a randomly downloads the N parts on the server, and Party B randomly downloads the M parts on the server. In this way, Party A's BT will go to Party B's computer to get the M parts that Party B has downloaded, and Party B's BT will go to Party A's computer to get the N parts that Party A has downloaded, This not only reces the load of the server, but also speeds up the download speed of the user (Party A and Party B), improves the efficiency, and also reces the restrictions between regions; For example, if C wants to connect to the server to download it, it may be only a few K, but it's much faster to get it from a and B's computers. So the more people you use, the more people you download, the faster you will be. Here is the advantage of BT. Moreover, while you download, you are also uploading (someone takes a part of that file from your computer), so while enjoying the download provided by others, you are also contributing
3. Search engine design of adaptive information retrieval system based on P22
the network topology of adaptive information retrieval system based on P2P proposed in this paper is shown in Figure 1. The system consists of several autonomous nodes, which constitute an information retrieval network according to the network architecture, and each node is equal. Each node is composed of a client agent and a server agent. Users submit questions through the client agent. For each question, the client agent can use any combination of meta search, crawler and forwarding to the server agent for retrieval processing according to the specific situation. For the result documents returned by the three methods, the client agent presents them to users after merging and filtering. When browsing the results, users mark the document as interested or not interested, and submit relevant feedback to the client agent. Using these feedbacks, the client agent can build a user model, which will be used to filter the results in the future on the one hand, and modify the user's original questions on the other hand for further retrieval processing in the future. At the same time, the server-side agent is responsible for the communication between nodes. It can cluster users on the basis of receiving user models and related documents. On the basis of clustering, it can realize cooperative recommendation and forward retrieval requests among users with the same or similar interests. The internal structure design of a single node is shown in Figure 2<
4. Collaborative work -- the impact of P2P technology on e-learning application mode
knowledge exchange learning based on P2P idea:
P2P is a technology, but it is also an idea, which has the potential to change the status of the whole Internet. It connects people directly and enables people to realize direct interaction through the Internet, which makes network communication easier and resource sharing more direct. Therefore, it has great prospects in strengthening network interpersonal communication, file exchange and distributed computing. With the rise of P2P technology, knowledge exchange based on P2P ideas also began to appear on the network. For example, the learning ideas company provides a solution to capture the knowledge exchange between indivials in real time, which includes a unique matching and forwarding system, which enables external knowledge to be transmitted in real time with information exchange. The technology of learning ideas is very similar to the routing system of enterprise call center. It allows routing and matching based on knowledge and skills, and enables one user to connect with another related user in case of real needs and specific problems. Compared with the traditional e-learning system, the biggest difference of the knowledge exchange scheme based on P2P idea is that it can provide a channel for knowledge sharing between learners and others without creating a specialized learning environment or formally arranging teaching activities
at present, the mainstream e-learning systems such as ellumniate, centra, WebEx also provide some synchronous learning and collaborative solutions (such as virtual "online meeting room"), although they can allow learners to carry out informal learning exchange and direct communication, but this kind of learning activities generally need to focus on the theme, the content, and the content Make clear plans and arrangements for time and personnel exchange. The knowledge exchange scheme based on P2P is different. When a user or student encounters some difficulties, he can express his problems in the learning ideas system, and the system can immediately help him transfer to a colleague or student user who has experience in solving such problems. Just like asking and communicating with people around you, this virtual real-time communication method can solve the real problems encountered by users more quickly, and eliminate the time and space barriers of learning through the formal teaching system
the real value of the informal knowledge exchange scheme based on P2P technology is that it enables learning and communication to happen online at any time, and can be integrated into the actual work and life process. This random, free and timely knowledge exchange scheme not only enables learning interaction to take place around each network user, but also enables the learning process of informal knowledge exchange to be recorded and archived. When people join the P2P network, all users have equal opportunities, they can easily communicate freely on the network, exchange and learn at any time, and then get the knowledge and information they need from the communication with each other. P2P gets rid of the fetters of intermediate services, it connects people directly through the network, makes the interpersonal knowledge exchange more rapid and convenient, and improves the efficiency of solving learning problems and dealing with social affairs<
four shortcomings of P2P technology and current solutions
management and security issues are the biggest problems facing P2P
in P2P technology structure, the significance of central node is greatly weakened or even completely eliminated. The characteristics of decentralization will be more fully reflected, and the flat characteristics of network communication structure will be further highlighted. Such a communication structure makes the management and control of network information transmission more complex and difficult. From the perspective of management, the main challenges of P2P technology are reflected in two aspects: the control of the spread of bad content is more complex; Copyright management is more difficult< It is reported that the Intellectual Property Office of the US Congress has drafted a new version of the bill to ban the application of such P2P software; As early as October 2003, the United Kingdom passed legislation to implement the controversial European Copyright Law, which makes it clear theoretically that the use of similar P2P services may constitute a crime
the current solution is to use JXTA Technology (juxtapose parallel technology)
JXTA technology provides the core technology of building P2P network applications, aiming to build a general development platform for P2P applications. Jx2ta technology mainly includes a protocol set independent of programming language system platform and network platform. This protocol set describes the most basic requirements of P2P applications. It can be said that JXTA is a P2P stack under the P2P network services or applications on the operating system or virtual machine, which provides the core functions required by P2P applications. However, some people hold a critical attitude towards this. For example, Fang Xingdong thinks: P2P communication
8. The concept of P2P
P2P is the abbreviation of peer-to-peer. In English, peer has the meanings of "peer", "colleague" and "partner". In this way, P2P can be understood as "partner to partner", or peer-to-peer networking. At present, people think that it has a bright future in enhancing people's communication, file exchange, distributed computing and so on
in short, P2P directly connects people and enables people to interact directly through the Internet. P2P makes communication on the network easier, more direct sharing and interaction, and truly eliminates middlemen. P2P means that people can directly connect to other users' computers and exchange files, instead of connecting to the server to browse and download as in the past. Another important feature of P2P is to change the Internet's current big website centered state, return to "decentralization", and return power to users. P2P seems to be very new, but just as B2C and B2B transplant common things in the real world to the Internet, P2P is not new. In real life, we communicate face to face or by telephone according to P2P mode every day<
the good side:
peer-to-peer computing, collaborative work, search engine, file exchange
P2P technology will realize most of the potential of the Internet, transforming the Internet from a file based web page and e-mail network into a dynamic, granular network, in which specific information components can be effectively placed and shared. There will no longer be any difference between the network and the computer. You still remember this slogan: the network is the computer, perhaps the highest realm of martial arts novels: the unity of man and nature<
the bad side:
right issues, management difficulties, spam, engulfing network bandwidth, charity virus, standard dispute
in addition to the above shortcomings, P2P network is still a relatively fragile network: in P2P network, the server is no longer the center of the network, but still coordinates the work of the whole network, The paralysis of the server will lead to the paralysis of the whole network. It is not difficult to imagine that a P2P network with many users will become the target of hackers, which will greatly threaten the security of P2P network.
P2P is the abbreviation of peer-to-peer. In English, peer has the meanings of "peer", "colleague" and "partner". In this way, P2P can be understood as "partner to partner", or peer-to-peer networking. At present, people think that it has a bright future in enhancing people's communication, file exchange, distributed computing and so on
in short, P2P directly connects people and enables people to interact directly through the Internet. P2P makes communication on the network easier, more direct sharing and interaction, and truly eliminates middlemen. P2P means that people can directly connect to other users' computers and exchange files, instead of connecting to the server to browse and download as in the past. Another important feature of P2P is to change the Internet's current big website centered state, return to "decentralization", and return power to users. P2P seems to be very new, but just as B2C and B2B transplant common things in the real world to the Internet, P2P is not new. In real life, we communicate face to face or by telephone according to P2P mode every day<
the good side:
peer-to-peer computing, collaborative work, search engine, file exchange
P2P technology will realize most of the potential of the Internet, transforming the Internet from a file based web page and e-mail network into a dynamic, granular network, in which specific information components can be effectively placed and shared. There will no longer be any difference between the network and the computer. You still remember this slogan: the network is the computer, perhaps the highest realm of martial arts novels: the unity of man and nature<
the bad side:
right issues, management difficulties, spam, engulfing network bandwidth, charity virus, standard dispute
in addition to the above shortcomings, P2P network is still a relatively fragile network: in P2P network, the server is no longer the center of the network, but still coordinates the work of the whole network, The paralysis of the server will lead to the paralysis of the whole network. It is not difficult to imagine that a P2P network with many users will become the target of hackers, which will greatly threaten the security of P2P network.
9. About one day. This is just an estimated time, because it takes time for the courier to collect and sort the items. When they arrive in a city, they need to sort again, and when they arrive at the destination, they need to sort and deliver. There are also road conditions on the way of delivery, the speed of courier sorting and so on, which will affect the arrival time of express delivery, and the time may be advanced or extended.
Hot content