Search /
Advanced search  |  Help  |  Site map
Click for Layer 8! No, really, click NOW!
Networking for Small Business
Where's my gigabit Internet, anyway?
Americans cool with lab-grown organs, but not designer babies
IE6: Retired but not dead yet
Enterprise who? Google says little about Apps, business cloud services in Q1 report
DDoS Attackers Change Techniques To Wallop Sites
Can we talk? Internet of Things vendors face a communications 'mess'
AMD's profitability streak ends at two quarters
Michaels says breach at its stores affected nearly 3M payment cards
Exclusive: Google's Project Loon tests move to LTE band in Nevada
H-1B loophole may help California utility offshore IT jobs
How a cyber cop patrols the underworld of e-commerce
For Red Hat, it's RHEL and then…?
Will the Internet of Things Become the Internet of Broken Things?
Kill switches coming to iPhone, Android, Windows devices in 2015
Israeli start-up, working with GE, out to detect Stuxnet-like attacks
Galaxy S5 deep-dive review: Long on hype, short on delivery
Google revenue jumps 19 percent but still disappoints
Windows XP's retirement turns into major security project for Chinese firm
Teen arrested in Heartbleed attack against Canadian tax site
Still deploying 11n Wi-Fi?  You might want to think again
Collaboration 2.0: Old meets new
9 Things You Need to Know Before You Store Data in the Cloud
Can Heartbleed be used in DDoS attacks?
Secure browsers offer alternatives to Chrome, IE and Firefox
Linksys WRT1900AC Wi-Fi router: Faster than anything we've tested

P2P getting down to some serious work

Today's breaking news
Send to a friendFeedback

Just a few years removed from the mayhem of music swapping that clogged corporate networks, peer-to-peer technology is growing up and rediscovering its roots as a legitimate concept for distributed computing in corporate environments and the Internet.

The turnaround is distinct since P2P has distanced itself from the darling days of Napster and has been transplanted onto the architectural drawing boards of Internet and corporate network gurus.

For network executives, the about-face is showing up in such discrete places as wireless routing, identity management, Web services and grid computing. P2P has proved its worth - albeit with a few warts - in enterprise collaboration and content management applications, but its brightest future may be in the plumbing of corporate distributed computing.

P2P in its purest form is two endpoints communicating without a server in the middle. But many P2P products use a hybrid approach that can incorporate a server.

But even as P2P fades into the background, questions around security, standards and quality of service still have to be answered before P2P can flourish, experts say.

The P2P evolution

Regardless, P2P's evolution has hit its next stage.

"Peer-to-peer is an architecture and one that will play a substantial role in distributed computing as endpoints in the network gain more power," says Jamie Lewis, CEO and research chair of Burton Group. He says that will be particularly important for Web services as peers share processes and data. "P2P will become a fundamental part of how distributed computing evolves across the Internet and how enterprises build distributed systems internally."

Lewis says the Internet today is very rudimentary with its basic protocols for basic operations. "Now we're seriously talking about the network becoming the computer, incorporating some P2P connections and being able to share processes and power, which is what grid computing provides."

Observers say it's a renaissance.

"P2P's reverting to an architecture that can be applied to solve problems that by their very nature are distributed," says Neil Macehiter, senior consultant for Ovum, a research and consulting firm. "But the question is can this model provide benefits for business use."

Macehiter says it can, but he cautions that security, such as removing blocks to P2P traffic on corporate firewalls, is still a major inhibitor to acceptance.

"But you can imagine something like grid extending to share application logic instead of just being a data grid or a storage grid. When you look at Web services sharing business logic in the enterprise, you see the intersection with grid and P2P," he says.

Working together

To underscore P2P's evolution, the Global Grid Forum (GGF), a 2-year-old group founded by academics and researches, merged in April with the P2P Working Group, originally founded by Intel. The groups are attempting to marry the GGF's work on harnessing servers on a grid with P2P's ability to connect desktops.

"We're now trying to figure out how grid and P2P play nice together, and capture that power for use in enterprise computing," says Andrew Chien, co-director of the GGF's peer-to-peer area and CTO of Entropia, a provider of desktop grid applications.

Late last month, the merged group began evaluating how P2P relates to the Open Grid Services Architecture, an effort to standardize grid computing. Chien says his group is exploring how P2P protocols for such things as registration, resource discovery and coordination of data transfer support a common grid infrastructure.

And P2P's roots are reaching into other areas. It is an integral part of mobile wireless technology set for release this fall by MeshNetworks. The company's MeshLAN software extends the range of 802.11 wireless networks by making every wireless peer an endpoint in an ad-hoc P2P network and also a router/repeater to channel traffic to other peers.

Using a patented multihopping technology, peers that are out of range of wireless access points or peers they wish to communicate with can hop through other peers to reach their destination, including corporate LANs. It not only increases the wireless range, it preserves throughput, which is up to 6 megabits. The technology also is mobile, letting hopping take place from nodes traveling in vehicles up to 250 mph.

"P2P allows us to do the hopping, and our algorithms allow the traffic to pick the most efficient path to travel," says Rick Rotondo, vice president of disruptive technologies for MeshNetworks. "The beauty of a P2P network is that it is self-forming and self-healing."

And the technology is mature. The Defense Advanced Research Projects Agency (DARPA), which created the Internet, spent $150 million developing the peer technology for use in forming instant networks among soldiers on a battlefield. MeshNetworks licensed it from DARPA has spent an additional $27 million to create a commercial product.

P2P also is key to the PingID Project to create an identity management system similar to work under way by Microsoft and the Liberty Alliance Project, which are not using P2P.

"Ideally, you need a way to create, manage and exchange digital identity information with no one in the middle of the transaction," says Andre Duran, founder of the project. He says that's P2P, but it's just one part of the equation.

"Your ID is a virtual private vault with different drawers," Duran says. "One drawer may be on your PC, one may be with a service provider, and you need a client to manage all that. We are building the infrastructure to support that."

Ping ID is working on server and client software that acts like a mini-Web server and maintains a repository of user's identity information. Users have the option of exchanging IDs directly through P2P or using client/server technology to authorize a third party to dispense their identity data.

"P2P provides a level of control that other architectures don't," Duran says. "It comes down to the fact that some applications are more efficient with P2P."

That is the concept that is driving P2P into so many different areas of computing.

"P2P has evolved from something highly disruptive to something complementary to intranets, extranets, mobile users and all the Web integration," says Greg Bolcer, CTO of Endeavors Technology, which develops a P2P collaboration software called Magi.

And although P2P is still settling into this new role, it's obvious that its reputation as a music-swapping corporate scourge are now well behind it.


Contact Senior Editor John Fontana

Other recent articles by Fontana

Grid computing uses spare CPU power
The goal of grid computing, which gets its name from its gridlike architecture, is to link surplus computing power and other spare IT resources with clients who have periodic needs beyond the capacity of their machines. Network World, 07/15/02.

Grid computing hits security gridlock
Doubts about the security of grid computing - serious enough to stifle adoption - are being addressed head-on by Sun and the Global Grid Forum. Network World, 06/10/02.

NWFusion offers more than 40 FREE technology-specific email newsletters in key network technology areas such as NSM, VPNs, Convergence, Security and more.
Click here to sign up!
New Event - WANs: Optimizing Your Network Now.
Hear from the experts about the innovations that are already starting to shake up the WAN world. Free Network World Technology Tour and Expo in Dallas, San Francisco, Washington DC, and New York.
Attend FREE
Your FREE Network World subscription will also include breaking news and information on wireless, storage, infrastructure, carriers and SPs, enterprise applications, videoconferencing, plus product reviews, technology insiders, management surveys and technology updates - GET IT NOW.