Get premium membership and access questions with answers, video lessons as well as revision papers.
1. The files or resources are not centrally organized with a P2P network.
A P2P network stores files or resources on individual computers instead of using a centrally organized public area. That means it can be challenging for some people to locate specific files when the owner of a PC doesn’t seem to have a logical filing system. You must search through each database manually to determine what files are necessary to download to your system. If you don’t have a robust Internet connection supporting these efforts, then you could find yourself wasting a lot of time.
2. Virus introduction risks rise with a peer to peer network.
When a peer to peer network is employed, then it becomes the responsibility of each unique user to prevent viruses, malware, and other problems from being introduced to the system. One person making a mistake can adversely impact an entire team’s productivity levels indefinitely.
Even if the entire network runs antivirus software and operates with a firewall, there are no guarantees that an individual user will avoid every problem they find online.
3. P2P networks often have very little security.
Most peer to peer networks have very little security available to protect the information stored on individual terminals or computers. If the IT department assigns permissions to a specific device, then anyone with access to it will share that level of access. Most users don’t even need to log onto their workstations because of the structures employed. That means the first line of defense for homeowners or businesses that use P2P networks is their front door. If a workstation can require a password, it is useful to put one in place to protect files and resources.
4. There is no way to back up files or folders centrally.
The only way to back up files using a peer to peer network is to store them on separate devices. That means you will have independent duplicate files that each user can modify independently of each other. The lack of a centralized system creates issues with collaboration because of this disadvantage since the information is more terminal-based without a server. If something happens to a workstation and files get lost, there is no way to recover from that issue unless a backup drive is part of that individual terminal.
5. P2P networks often suffer from performance issues.
When users operate in a peer to peer network, then each terminal has the opportunity to access every other device that’s connected to it. That means each computer could get accessed by every other available user on the system at any time. Each direct connection results in slower performance, even if the user of the terminal is not trying to access any other information except what is locally stored.
This disadvantage is the primary reason why most peer to peer connections involve only two devices. Once the number of terminals starts to climb higher, performance issues almost always have a higher risk of occurring.
6. The structure may allow remote access to some terminals.
As with most network systems, a peer to peer network may experience the disadvantage of having unsigned or unsecured codes present on a specific terminal. If this situation were to occur, then it may allow someone to remotely access files on a connected computer without permission. That means it is sometimes possible to compromise the entire network when this incident occurs.
Because each system manages only itself, there is no way to determine the difference between authorized or unauthorized use with this structure.
7. You might need to use a specific interface to read the file.
If you use torrent downloads as a way to access content, then you typically need to have a special software program or platform that can make the file usable. Specific codex requirements might be necessary to read the information. Even when you have all of the elements in place to access the data, a large network has a greater risk of file corruption because different components of the seeding process exist on a variety of different systems.
Because larger systems don’t give you many choices or information about where your data originates, peer to peer networks force users to rely on a trust-based system. That’s why websites like The Pirate Bay and others use rating systems and other tools to sort out the better files from the ones you will want to avoid.
8. Peer to peer networks don’t provide a way to view files before download.
This disadvantage does not apply to a network that allows individual terminals to access files remotely from authorized systems. It applies to all other structures because there is no way to review the information that you want to download until the file appears on your computer. Most systems will give you the opportunity to observe what the file contains as a preview, but it will not allow you to view the quality of the data.
The only way that users can avoid problems with this issue is to perform a quality check through the online feedback from others or to request files from sources that you personally trust.
9. You can expose personal information through peer to peer network activities.
The peer to peer protocol will automatically expose your IP address to the people involved in your swarm. If you want to protect your privacy while downloading files, then the only method available to you is to use a virtual private network. A VPN allows you to route your traffic through different online servers in various countries so that your home address receives a disguise. Even your ISP cannot break through this tunnel.
If you decide to start using a VPN, you’ll want to make sure that the service provider has a strong reputation for preventing leaks.
10. Some peer to peer protocols require you to upload and download simultaneously.
When you use the BitTorrent protocol to manage your peer to peer networking solutions, then you are uploading and downloading files simultaneously. This activity can significantly impact the speed of your Internet connection in adverse ways. It may be impossible to perform simple tasks during the downloading process because of this disadvantage, including an inability to open a simple web page.
Some networks allow you to isolate this traffic somewhat, but it will still impact users who need to multitask projects as part of their job duties. If you’re accessing files at home, it won’t take much to overwhelm a standard DSL connection.
11. Some peer to peer networks may place illegal content on your device without your knowledge.
Peer to peer network providers will not police the files that people choose to download. It is considered a resource for users to share information independent of any third-party solutions. It is entirely possible for someone to download a file without realizing that it contains illegal content. Although most situations involve entertainment media like music or movies, there can be seriously immoral or unethical files that make their way to your device if you don’t carefully screen your commands.
Depending on where your computer or terminal is and what you download, you could receive an Internet ban, cease-and-desist letters from content creators, or a visit by a local police officer.
Kavungya answered the question on May 17, 2019 at 11:44
- Give the advantages of peer-to-peer networks/workgroups.(Solved)
Give the advantages of peer-to-peer networks/workgroups.
Date posted: May 17, 2019. Answers (1)
- Give the steps on how to configure a computer to work in a network.(Solved)
Give the steps on how to configure a computer to work in a network.
Date posted: May 17, 2019. Answers (1)
- Describe Ping network command.(Solved)
Describe Ping network command.
Date posted: May 17, 2019. Answers (1)
- Describe Ipconfig.(Solved)
Describe Ipconfig.
Date posted: May 17, 2019. Answers (1)
- Define Pathping.(Solved)
Define Pathping.
Date posted: May 17, 2019. Answers (1)
- Describe the challenges in the use of the Internet in a business environment.(Solved)
Describe the challenges in the use of the Internet in a business environment.
Date posted: May 17, 2019. Answers (1)
- Write the procedure for opening the browser and surfing the internet(Solved)
Write the procedure for opening the browser and surfing the internet.
Date posted: May 17, 2019. Answers (1)
- Give the Disadvantages of emails.(Solved)
Give the Disadvantages of emails.
Date posted: May 17, 2019. Answers (1)
- Describe POP3 email system.(Solved)
Describe POP3 email system.
Date posted: May 17, 2019. Answers (1)
- Describe IMAP.(Solved)
Describe IMAP.
Date posted: May 17, 2019. Answers (1)
- Describe Microsoft Exchange.(Solved)
Describe Microsoft Exchange.
Date posted: May 17, 2019. Answers (1)
- Outline the step by step procedure of Reading Email messages.(Solved)
Outline the step by step procedure of Reading Email messages.
Date posted: May 17, 2019. Answers (1)
- Write the procedure used in Sending an e-mail message. (Solved)
Write the procedure used in Sending an e-mail message.
Date posted: May 17, 2019. Answers (1)
- Write a procedure on how to Add a Contact to the Address Book.(Solved)
Write a procedure on how to Add a Contact to the Address Book.
Date posted: May 17, 2019. Answers (1)
- Write the procedure of editing a Contact in the Address Book.(Solved)
Write the procedure of editing a Contact in the Address Book.
Date posted: May 17, 2019. Answers (1)
- Write the procedure used in creating a distribution list.(Solved)
Write the procedure used in creating a distribution list.
Date posted: May 17, 2019. Answers (1)
- Write the procedure of Sending a Message using the Address Book or Distribution List(Solved)
Write the procedure of Sending a Message using the Address Book or Distribution List
Date posted: May 17, 2019. Answers (1)
- Give the procedure on how Search Engines find Web Pages.(Solved)
Give the procedure on how Search Engines find Web Pages.
Date posted: May 17, 2019. Answers (1)
- Give the procedure of locating information within a website.(Solved)
Give the procedure of locating information within a website.
Date posted: May 17, 2019. Answers (1)
- Outline the steps of Attaching files to email messages.(Solved)
Outline the steps of Attaching files to email messages.
Date posted: May 17, 2019. Answers (1)