You may have probably heard people say that they have a "network" because their computers in their office or home are connected to the Internet.

The term "network" does not, in this case, reflect the true nature of this particular setting. To say that you have a network just because your computers are connected to the internet, as if you were saying your car is a truck because it has wheels, engines and loads. Of course, you can try to fill your living room furniture in the car, but you'll almost face problems immediately.

Obviously, just like a car designed to transport not large masses of furniture, Peer-to-Peer networks are, by definition, very unsuitable for offices – even small ones.

So, what's the Peer-to-Peer Network? AZT

Most people used peer-to-peer networks at a certain point in our life. When you access a file through the Internet or print the printer to the next cabinet to print a color presentation, it works with a "peer" device that is connected to a network. Peer-to-Peer (or "P2P") refers mostly to how to connect to another device on a network. Do you remember Napster or Kazaa? These are clear examples of large, internet-based P2P networks. Users can create software in their computers – create direct connections and share files over the Internet on another computer anywhere in the world.

On paper, this may sound like a great idea, but in reality, its benefits are not great. While music and video enthusiasts worshiped – and media companies hate it – P2P networks are really a very bad choice in the office environment.

Imagine this: 1. There is a P2P network in the office and 2. There is a huge showcase that pops up and spent full time on the Power Point. You need to enter your staff to finalize it. How do you share this file with them to add their changes and return it to you? Since you have a P2P network, your settings are "ineffective" to "very dangerous":

a. Ask your IT technician to "share" a folder on your computer to allow others to access it;

b. Send the file to others and then engage multiple times "send and receive" as long as this is done (or with fear);

c. Use some kind of media storage (CD, DVD, flash memory) and manually copy all the participants … and download it.

With a glance you can assume that there is nothing wrong with these possibilities. However, nothing is effective or safe and will not prevent human errors. Let's read it further.

File Sharing:

Sharing your computer folder is a bad idea in itself. Whenever you "share" something, it becomes very vulnerable to all sorts of viruses.

Therefore, if you try to solve a problem, you are creating new, new ones. Keep in mind that the main task of the virus is to repeat itself and cause harm. You may have an antivirus, but how safe are you up to date? If you have a P2P network, it is likely that your IT infrastructure is inadequate and your security software is obsolete and vulnerable.

If the risk of viral infection will not prevent sharing, it will probably be. To access a file for another computer, you need two things:

1. Direct (physical) connection to the device

2. The username and password used to access the "shared" resource

In other words, for each shared folder to access someone else's computer, someone (eg IT person, network administrator, etc.) the rights to the affected. Suppose there are five computers in the office and each computer needs at least 3 shared folders; this is a 15 "share." Every time you rent a new employee, you have to include your username in all 15 shares – or at least those you need. It quickly evolves into a nightmare that searches for many business or office administrators. One of the most commonly used methods is to keep the same username to avoid changing the name of the former employee. Finally he works for Joshua, and Emily works under Bob.

Email This Resource:

Suppose you have a file of 30MB (megabytes) – not an unlikely scenario because you want to share files with your colleagues due to the complexity of certain videos and graphics. Because your P2P network relies on a third-party email provider such as Gmail, Hotmail, or AOL, your emails must be sent to Oklahoma or Timbuktu to the email server and returned from a computer , which is four feet from yours! [19659002] Sending a large file to anyone via the Internet is not only ineffective, but also burdensome for the system. Therefore, most e-mail providers limit the maximum size of files transferred through e-mail servers to 20 megabytes.

Another big problem is managing shared files. If you want to change the file you received in the email, save it first to your computer, otherwise you will lose everything when you close it. Let's say you've given 16 versions of a given file for a certain time while emailing your colleagues. Errors and omissions will go back and forth (plus attachment and reinstallation) unless you create a versioning system on your computer to try to track changes. By the time you are ready, you will send at least 32 emails per person!

Media Distribution at Work:

This is the most difficult task for anyone who does not mind writing or saving files to CDs, DVDs, or flash drives and sending them to each member of the team (plus aggregated re-upload them to the computer, then burn again, rescue and re-distribute them)

Summarized

The hidden costs of the P2P network deny the perceived "savings" and make valuable valuable time and labor valuable waste, not to mention loss of data and incorrect placement. Money and time will waste the recurring problems that are eliminated by a regular configured network.

Leave a Reply

Your email address will not be published. Required fields are marked *