Kings of file sharing. Review of software for working with p2p networks

If you regularly use the Internet, most likely you have heard of the terms peer-to-peer network, decentralized network, or peer-to-peer network, peer-to-peer or its abbreviation - P2P network. All these terms mean the same thing. If you want to know what peer-to-peer is and what it is used for, you should read this article.

What is P2P or Peer to Peer Network?

Peer-to-peer, or P2P network for short, is a type of computer network that uses a distributed architecture. This means that all computers or devices that are part of it share workloads on the network. Computers or devices that are part of a peer-to-peer network are called peers. Each node in a peer-to-peer network, or peer, is equal to other peers. There are no privileged members, and there is no central administrative structure. Thus, the network is decentralized.

In some ways, peer-to-peer networks are socialist networks in the digital world. Each participant is equal to the others, and each has the same rights and responsibilities as the others. Peers are both clients and servers at the same time.

In addition, every resource available in a peer-to-peer network is shared among all nodes without the participation of a central server. Shared resources in a P2P network can be:

  • Processing power
  • Disk space
  • Network Bandwidth

CMS detailed instructions

2.1. Login and instructions

Login

When you log in, the default user name is admin and the password is blank, click “OK” to enter the CMS main interface.

Exit

Only users with administrative rights can log out of the CMS, user and guest cannot log out of the CMS.

When exiting the CMS, you must enter a username and password for administrator rights.

2.2. Software interface instructions

The software interface as shown above is mainly divided into 6 sections: 1 system button bar 2 tab bar 3 device list 4 live preview 5 PTZ control 6 alarm information list

● System buttons:

Help Collapse Full screen Exit

● Tab bar:

Logo image preview interface recording playback interface interface setting management interface exit the management interface and switch the user exit the CMS.

● Device List:
List Mode
According to the user configuration listing level to show area, settings and channel
Current screen
shows the current connected device on the screen, only displayed in list mode

● Real-time preview

Click the electronic zoom button and use the mouse to draw an area on the screen, then the area can be enlarged Voice Conversation button, select the window needed to open the conversation, then click the Reverse Conversation button, the window status will show the panel, the reverse can be done call, only one device's callback can be opened at a time. Voice monitoring button, click it to open the voice monitoring, the window status bar will appear, click it again to close the voice monitoring, you can open the voice monitoring of multiple devices at the same time. Record button, select the window you need to record, click the record button to open the record manually, the window status bar will be displayed, click it again to close the record manually. Image capture button, select the window needed to capture the image, click the capture button to realize image capture, if you press the capture button continuously, 1 second can capture 2 images at most. Multiple image selection button, click it to select multiple image display, 1,4,6,8,9,16 image options. Full screen display button, click it, then the live preview area will be displayed in full screen. Alarm message list reduction or expansion button, click on it to reduce the alarm message list, click again to expand the alarm message list.

2.3. Device management

2.3.1. Add device

Before using the CMS, you must add a device and configuration. Click the button (“Setting”) on the tab bar, enter the device management page. [Add to the list]

When you initially launch the software, the list tree is empty by default. Click the "Add Region" button, the "Add Region" dialog box will pop up. After filling in the name in the scope name column, click OK to add the scope to the list tree. Since the added area is the first area, so this area does not exist and belongs to the area, the area is empty.

Note.

You can add up to 128 areas to the list tree.

Add an area to the device tree

Change the name of the selected area

Delete selected area

Add a device manually, click it to open the Add Device dialog box

click on it, then open the edit device dialog

Remove selected device

add found devices to the selected area

click on it to search for devices on the local network

select all devices in the search list

[Add device]

● Search to add a device on the local network

By clicking the search button, CMS will search all the devices in the local network, then select the device you need to add to the search list and select the area, click the button to add device, so you can add the selected device to that area.

●Add device manually

Click the button, the Add Device dialog box will appear as below:

[UID]

Device UID, each device has different UID

[Name]

device name, it is defined by the user. Max 15 Chinese characters. (Note: Once you enter a name, the device tree in the preview window only displays the device name, not the device's IP address.)

[Password]

device login password, default admin

[Square]

displaying the device area After filling in all the required information, click OK to complete adding the device.

2.4. Image preview

After setting up the device, click the "Preview" button on the tab bar, and then return to the main monitoring interface. By default, the list tree is used to display the device tree. You can switch the displayed group and list information by clicking "group" and "list" in the device tree. Default image display uses 4 image segmentation, support max. 36 images.

When the image segmentation is maximum, it has 16/25/36 image mode optional. The higher the picture, the higher the performance of the host. If 25 or 36 images are displayed, we suggest using more than i3 CPU and an independent graphics card.

Image display instructions:

: Indicates that no device is connected to this channel. When connected, OSD information will be displayed on the device.

Feedback state when the icon becomes , it means this channel is talkback, otherwise the channel do not open talkback.

: Listening status, when the icon becomes , it means this channel is listening, otherwise it does not open listening.

: Status, when the icon becomes , it means it is an entry, otherwise no entry.

In list mode, double-click the UID or device name, or drag the UID directly into Windows to display the image.

Once the device is connected, a blue triangle will be shown on the UID or name; If it shows, it means the device is not connected. If it shows, it means he will have anxiety.

Right click on any area, an image will appear as shown on the right:

[Everything is connected]

Connecting devices in the selected area

[Start Manual Area Recording]

Open manual entry in selected area

[Stop manual area recording]

stop manual recording in the selected area

[Quality]

Max. Medium and Min

[Auto-adjust everything]

The device automatically adjusts the image ratio in the selected area

[Full display of all]

The device displays images in the selected area as segmentation image size

2.5. PTZ control

2.5.1.

You can control the PTZ rotation in eight directions using the direction key, and select the PTZ rotation speed using the slider, "-" means slow down the PTZ rotation speed, "+" means increase the PTZ rotation speed.

Iris ehlarge button, need camera support lens

Aperture reduction button, need camera support lens

Zoom button, need camera support lens

Zoom out button, need camera support lens

Focus is in the button, need camera support lens

Focus button, need camera support lens

2.5.2. Preset

CMS can support Max 256 preset. Please refer to the instruction of the set quantity the camera supports for how many presets can be used in concrete.

[Preset]

Select the window you need to set the preset, then select the preset number, click the "Preset" button, the preset point is successfully set

[Recall Preset]

Select the window you want to call the preset, then select the preset number, click the "Call" button, before selecting the call, you need to set the preset first.

[Remove Preset]

Select the window you want to delete the preset, then select the preset, click the "Delete" button, the preset will be deleted successfully.

2.6. Records management

2.6.1. Recording plan

From the tab bar, select “Settings” - “Manage Recordings” - “Enable Recording Plan” as shown above:

SUN - SAT means one week based on the number of days; 0 - 23 means one day, based on half an hour

[Enable Recording Plan]

Select a channel, then left click to drag the green blocks onto the schedule as shown above; the green area is the time interval in which the recording plan is included. After setting the time, click the Save button.

[Close Recording Plan]

Uncheck the enabled recording plan, click “Save”; or cancel the green block in the schedule and click Save. Green block cancellation method: You just need to left click and drag the mouse, the green block can be canceled.

Note.

If the recording time plan is the same for all devices, you only need to set one device, then click the "Copy and Save" button, then the recording plan will be activated on all devices.

[Total recording length]

The default recording length is 5 minutes in the system settings for one recording file. The file can install 1-30 minutes. Please refer to the image on the right and change the length in the total post length and save it.

[Remaining space for disk recycling]

1G-50G scope is optional, when disk space is less than the set range, it is skipped to another disk or deletes the oldest recording file (default recycle is 10GB)

[Recording format]

264 and AVI recording formats. If the recording format is 264, you must use the manufacturer's player to play the recording.

[No hard drive space]

Select "Yes" when the entire disk space is less than the disk space set, it will delete the oldest entry. Select "No" when the entire space is less than the installed disk space, recording will be stopped.

[Recording path]

After installing CMS, CMS will automatically check the hard disk on the device and display it in the list, by default it is D disk.

Note:

CMS can support Max 24 disks, namely memory can connect Max 24 hard disk

2.6.2. Manual recording

First select the window, then click the button or right-click the window to select the entry. Please check the recording plan to see the recording length and path settings.

2.7. Local playback

2.7.1. Playback by search time

When a recording has finished playing, click on it to continue playing

Stop playback button, when playing a recording, click it to stop playback.

Frame button, when playing a recording, press it to play back one frame, press once to play back a single frame.

Image capture button, select the playback window, click it to capture images to disk.

Electronic zoom button, select the button in the playback process, then draw the enlarged image area on the window.

Full screen button, select this button, the window area will be displayed in full screen, if you need to display one window in full screen, double click the window

When playing a recording, please select the playback speed via the drop-down list, the default is normal speed.

Voice button, you can choose whether the voice will be open during recording playback, the default is closed.

[Recovery playback]

Step 1: Select the recording file format and search time. Step 2: Select the windows you want to play and select the channel in the list tree. Step 3: If there are files matching the condition in the time slot, it will be displayed in the timeline panel. Step 4: Double click the device channel to play the recording.

2.7.2. Playback by searching for a file

Step 1: Select the recording file format and device channel. Step 2: Select the search time and click "Search" button, the system will display the corresponding record file in the device tree. Step 3: Select the playback window and double-click the recording file to play the recording.

File playback supports equal playback of recording files in four windows at the same time

2.8. user management

The factory default administrator user for the device is admin, the password is blank. After logging in, the administrator can add a user, delete a user, and set the user's access rights. User permission has three types: administrator, user, guest. Administrator permission: can carry out device management, user management, video surveillance, recording playback, card settings, log query, user switching and client exit; User Permission: Can do video surveillance, video playback, map settings, view log, switch users and change password. Guest Permission: Can do video surveillance, switch user and change password.

2.8.1. Add user

Step 1: After logging in as an administrator, select Settings from the tab bar - User Management. Step 2: Click the "Add" button, enter the username, password and select the user permission. Step 3: Click "Save". user added successfully

2.8.2. Delete user

Step 1: After logging in as an administrator, select Settings from the tab bar - User Management. Step 2: Select the user and click the Remove button.

2.8.3. Change user permissions

Step 1: After logging in as an administrator, select Settings from the tab bar - User Management. Step 2: Select a user and click the Edit button. Step 3: Select the user permission and click the "Save" button.

2.8.4. Change user password

Step 1: From the tab bar, select Settings - User Management. Step 2: Select a user and click the Edit button. Step 3: Enter a new password and click the "Save" button.

2.9. Magazines

Magazine type:

[All magazines]

Recording all system information

[System Log]

Record the username, logout, user configuration, etc.

[Journal of work]

Recording all work information from users

[Alarm log]

Recording device alarm information

2.9.1. Log retention time

Step 1: From the tab bar, select Settings - Other Settings. Step 2: Select the log time, retention time, one month, two months, three months, six months optional and click the "Save" button.

2.9.2. Log Query

Step 1: Select the log type and sub log type. Step 2: Select a device to view the log. By default, all devices are selected. Select the start time and end time of the log query and click the Search button.

2.9.3. Log backup

Step 1: Select the log type and sub log type Step 2: Select the device to view the log, default is all devices Step 3: Select the start time and end time of the log query and click the "Search" button Step 4: Click "Export" and select backup path

Note.

1. When backing up a log, you must first search the log and then perform the backup. 2. Export log format - Excel format. 3. Each Excel table can only save a log of 5000 items, if the quantity exceeds 5000, the left log will form another Excel table and so on.

What do P2P (peer-to-peer) networks do?

The main purpose of peer-to-peer networks is to share resources and allow computers and devices to work together to provide a specific service or perform a specific task. As mentioned earlier, a decentralized network is used to share all types of computing resources such as processing power, network bandwidth or disk space. However, the most common use case for peer-to-peer networks is to share files online. Peer-to-peer networks are ideal for file sharing because they allow computers connected to them to receive and send files simultaneously.

Consider the situation: you open your web browser and visit a website where you download a file. In this case, the site acts as a server and your computer acts as a client that receives the file. You can compare it to a one-way road: the file being downloaded is the car that goes from point A (the website) to point B (your computer).

If you download the same file over a peer-to-peer network using the BitTorrent site as a starting point, the download is performed differently. The file is downloaded to your computer in chunks that come from many other computers that already have the file on the P2P network. At the same time, the file is also sent (downloaded) from your computer to others who request it. This situation is like a two-way street: the file is like several small cars that arrive on your computer, but are also sent to other users when they request it.

Final Thoughts

Peer-to-peer architecture can be designed and used in different ways. It is the basis of blockchains that make the existence of cryptocurrencies possible. By distributing transaction logs across large networks of nodes, P2P architecture provides security, decentralization, and censorship resistance.

In addition to their utility in blockchain technology, P2P systems can also serve other distributed computing applications, ranging from file sharing networks to energy trading platforms.

Why are peer-to-peer networks useful?

P2P networks have several features that make them useful:

  • They are difficult to “drop,” that is, to take them out of working condition. Even if you disconnect one peer, the others continue to work and communicate. For the network to stop working, you must close all peers.
  • Peer-to-peer networks are extremely scalable. New peers are easy to add since you don't need to change the configuration on the central server.
  • When it comes to file sharing, the larger the peer-to-peer network, the faster it happens. Having the same file stored across many peers in a decentralized network means that when someone needs to download it, the file is downloaded from many places at the same time.

List of essential tools for watching P2P TV without problems

Knowing the benefits of a P2P TV network , it is logical that you ask yourself What programs can make it easier for me to search and watch channels?

Well, take a look at at least 3 completely legal and updated options that will surely suit you:

Ace stream

Leading the way in this top three P2PTV streaming clients is Ace Stream. Wherever you go, you will see that it is a favorite and a precursor to this kind of emissions. You can use it if you have devices with operating systems. Android, MacOS, Windows or Linux, since in many countries this is a legal way to enjoy free and safe content.

Of course, you have to be careful because not everything that is distributed is legal, but overall it is a great resource. Ace Stream is based on the Bit Torrent protocol so no central server is required. Its interface is very attractive and modern, very similar to the design of Windows 10. To use this player, you will have to enter https://www.acestream.org/ and select the tool that you need most .

TorrenTV

Use Responsibly TorrenTV is one of the most recommended computer programs . It is multi-platform, as it is fully compatible with Linux, Windows or MacOS. This program has the advantage of having a multimedia center for playing .torrent .

Also you can use it later as a standalone media player . Yes, any video you have saved on your computer can be watched using TorrenTV. Along with this, it supports Chromecast for use with your home SmartTV. With its many features, it is one of the first options for those who don't need a mobile phone. You can download it by following the link https://torrentv.github.io/.

Flixtor.Stream

Finally, another quality alternative is the Fixtor program . Its interface is one of the most intuitive you can find, allowing anyone who doesn't know a computer to learn how to use it. Additionally, it is compatible with Windows, MacOS, and Android computers.

This open source project makes it easier to visualize Torrent-related media. All reproductions are produced in streaming mode, which does not require downloading any file. With so many options to watch TV channels from your computer or Smart TV, you can now safely use P2PTV networks.

Why do we need peer-to-peer networks? Legal use of P2P networks

Peer-to-peer networks are needed to connect computers and devices into a single network without the need to configure a server. When creating a server, it becomes expensive and difficult to maintain, and people use cheaper alternatives such as P2P. Here are some common examples of using P2P networks:

  • When you connect a Windows device to a group of computers in your home, you create a peer-to-peer network between them. Homegroup is a small group of computers that are linked together to share disk space and printers. This is one of the most common uses for peer-to-peer technology. Some people might say that homegroups cannot be peer-to-peer because the computers on the network are connected to a router. However, keep in mind that the router has nothing to do with managing the network. A router does not act as a server, but simply as an interface or link between the local network and the Internet.
  • When you create a network between two computers, you create a peer-to-peer network.
  • Sharing large files on the Internet is often done using P2P network architecture. For example, some online gaming platforms use a P2P network to download games between users. Blizzard Entertainment distributes Diablo III, StarCraft II and World of Warcraft using P2P. Another major publisher, Wargaming, does the same with its games World of Tanks, World of Warships and World of Warplanes. Others, such as Steam or GOG, prefer not to use P2P, but to maintain dedicated servers around the world.
  • Windows 10 updates are delivered both from Microsoft servers and via the P2P network.
  • Many Linux operating systems are distributed via BitTorrent, which use peer-to-peer networks. Examples include Ubuntu, Linux Mint, and Manjaro.
  • Finally, blockchain technology uses peer-to-peer decentralized networks to record information in a distributed ledger on all computers on the network simultaneously. (For more details, see the articles “ What is blockchain in simple terms? ” and “ What is a distributed ledger? ”)

Peer-to-peer networks are the cheapest way to distribute content because they use the bandwidth of peers rather than the bandwidth of the content creator.

Let's figure it out

  1. In fact, everything is simple - P2P is a peer-to-peer network in which all computers have equal rights. Unclear? Here's an example: one user downloaded the entire movie. Other users can then download from it. When other users have downloaded the movie in its entirety, it means that the movie is available to these users in its entirety. If someone wants to download a movie again, they will download a little from everyone, and as a result, the download speed will be higher. The main thing is that the user does not mind being downloaded from him. But this is very figurative. In general, you probably already guessed what we’re talking about - a torrent. Yes, torrent is one of the P2P services.
  2. P2P simply means that there is a network, for example a torrent, and in this network there is no such thing that you can download only from one server. As it usually happens, you download movies from the site, music, programs... but you download from the site. From one site, from where other users can download. As a result, the speed may not be the highest and may be limited by the server's upload speed. But P2P doesn’t work like that - you download data from those who have downloaded it completely. And the more people who download it, the easier and faster you can download.
  3. Torrent is just one type of P2P service. There are other networks where you can search for files and download. And in fact, all these files are not on some server, but from those who have already downloaded them, they, in turn, are shared with those who want to download. This is how P2P works.
  4. Simply torrent is the most popular P2P service. There is also Emule - this is a network already forgotten by everyone; it used to be more popular. This is not a torrent, but it works in much the same way - there is a search for files, you can find a movie, put it on download and it will download from those users who have already downloaded it. But even if the user has downloaded only half of the movie, he can already share this half with other users who do not have this half of the movie. Of course, this is an example about a film; it could be music, programs, basically any files.
  5. Another advantage of P2P is that it may happen that you are downloading a movie, but one of those who distributes the movie is on your provider’s network. Then you will download from the user of your provider - and in this case the speed may be even higher than according to the tariff, because in fact it is not the Internet, but a provider network, something like a local one, often the speed of which is higher than the speed of access to the Internet.

It’s also worth understanding what the users are called, who has already downloaded and who is just downloading:

  1. A Peer
    is simply a download participant. It doesn’t matter whether he has already downloaded files or is just downloading, he is a peer. It's just a loading member.
  2. Seed
    - and this is the one who has completely downloaded the file and is ready to distribute it to others who are just downloading.
  3. Leech
    is someone who is just downloading, who has not yet downloaded the data completely.

Accordingly, the more seeds there are in the download, the higher the download speed will be, the easier it will be to download the file. And if there are no seeds at all, then you won’t be able to download it. But one seed always exists - the creator of the distribution.

In general, all these seeds... lychees... you don’t need to bother about it. The program, the network client, thinks about this. For example, a torrent is uTorrent, if you download a file through it and do not close the program, other users who have not yet downloaded the file will download from you.

On the other hand, if there are few seeds and many liches, this is also not very good. Because the return rate of several seeds will be divided among all liches. But this is temporary - everyone who downloads turns into a seed and begins to distribute, provided, of course, that the person has not left the distribution))

Here is an example of what a P2P network means, all participants have equal rights:

That is, there is no dependence on the server.. which if it crashes, then no one will be able to download anything..

And this is just a note:

Popular P2P apps? Yes, any program that allows you to download torrents - uTorrent, BitComet, BitTorrent, QBittorrent.. By the way, here is an example of a program that is specifically for downloading not via P2P, but the old fashioned way from a server - also the familiar Download Master download.

This is what the uTorrent torrent client looks like, where we see a list of downloads, progress, displays speed and everything you need:

This program can be called a P2P program that downloads, thereby creating P2P traffic))

History of P2P networks

The predecessor to peer-to-peer networks is USENET, which was developed in 1979. It was a system that allowed users to read and publish messages/news. It was a network similar to modern online forums, but the difference was that USENET did not rely on a central server or administrator. USENET copied the same message/news to all servers found on the network. Likewise, decentralized networks distribute and use all the resources available to them.

The next big milestone in the history of peer-to-peer networks was 1999, when Napster was born. Napster was a file-sharing software that people used to distribute and download music. Music distributed through Napster was typically copyrighted and thus illegal to distribute. However, this has not stopped people from using it.

Although Napster was the one that brought P2P into the mainstream, the project ultimately failed and was shut down by authorities due to illegal content distribution.

It is also safe to say that a new stage in the development of peer-to-peer networks was the formation of the blockchain industry in 2008 along with the advent of Bitcoin . The use of peer-to-peer decentralized networks is one of the three main components of blockchain technology, along with a shared ledger of records and a consensus mechanism.

Currently, P2P remains one of the most popular technologies for sharing files over the Internet, used both legally and illegally.

Settings

1.1. Installation Requirements

Hardware environment:

1. Pentium IV series, processor base frequency greater than 2.0 GB 2. Memory capacity greater than 2 GB 3. 120 GB hard disk or higher 4. Screen resolution 1024 x 768 or higher

Software environment:

Windows2000 / Windows XP / Windows2003 / Windows Vista / Windows 7 / Windows 10

1.2. Installation step

Double click the installation package, it will appear under the interface:

Select the installation path, click “Next” to complete the installation.

After installation, an icon will appear on the desktop:

The following interface will be displayed in the program panel:

Illegal use of peer-to-peer networks

P2P is a controversial technology because it is widely used for piracy. Due to the advantages of this technology, there are many websites on the Internet that offer access to copyrighted content such as movies, music, software or games through P2P networks. While the technology itself is not illegal and has many legal uses that do not involve piracy, the way some people use P2P is illegal.

Therefore, when using a peer-to-peer network, make sure that you are not engaging in piracy or other uses that are punishable by law.

[edit] P2P and PC

P2P differs from a browser in that it does not require hundreds of RAM for drawing and caching web pages, placing the load primarily on the computer’s hard drive. But the load on the hard drive, however, sometimes forces an ignorant user to break the keyboard even on the fastest machines (due to moving from one download to another).

  • The Orthodox solution is to buy a new hard drive as the SECOND SCREW in the computer.
  • For users of “laptops, PC replacements”, “HDD CADDY” ($10-13 on Aliexpress with delivery) are produced, which are placed in place of the CD. There are SATA-SATA and IDE-SATA (for IDE Laptop ports for CDs. You can easily put a 500 GB screw into an ancient laptop from 2002 or an old laptop from 2008.)
  • To ensure that the CD is ready for use via USB (yes! There are only 5 volts!), USB-SATA cords are also sold there.
  • For the proud owners of true “replacement PCs” with an eSATA port, appropriate cords are available (2 dollars there), 12V is available and the ability to connect bare 3.5 screws for terabytes of gigs. It is also possible to equip netbooks with a hard drive (a box with a fan for $30 with a separate power supply and as many as two or three (the third is for ancient IDE 3.5) hard drive ports), but this is no longer true.
  • You can transfer the old OS using Acronis/native Windows “system image creator”/some other “system migration” utility. system separately from user data on the SSD and leave the screw as is.
  • For those who have two hard drives in their computer (or a select few who use an old computer with a torrent spooler and a bunch of screws as a thermal fan/heater for the garage), the general advice is simple: turn off distribution restrictions, if you are such a librarian-archivist! And restrictions on the number of max. downloads too! They are made for the same laptops or household computers with a single hard drive, of which 95% exist in the world.
  • By the way, about garages. When using a 16 ampere (~3500 watt) GOST cord, you can screw in a “rogue socket” to power a single light bulb. Just take care to ground the housing to the garage wall with a separate piece of wire!
Rating
( 2 ratings, average 4 out of 5 )
Did you like the article? Share with friends:
For any suggestions regarding the site: [email protected]
Для любых предложений по сайту: [email protected]