DIVE INTO SOFTWARE /
clients for file sharing
In a Peer to Peer network, each node is governed by the same rules and has the same ability to initiate and negotiate connections with other nodes. This may sound very dull, and maybe it is, but it has offered some interesting ways to get around idiotic intellectual property law enforcement. Traditional network models are a legacy of the olden days, when users used terminals to timeshare connection to a mainframe. The 'client/server', or 'master/slave' network model of a big, powerful computer serving many small puny computers still prevails, and makes it farily simple for the owners of big powerful computers (or people who have the cash to sue them) to control access to network resources. However, now that most consumer desktop computers are extremely powerful, and broadband access is growing, the Peer to Peer network model in which each computer fulfils the same function has become increasingly useful.

Peer to Peer has become a more general term for file sharing software that stores data on user machines. This is a bit confusing because if there is a central server that catalogues and tracks the files, and does the searching etc., the network is not genuinely Peer to Peer, and is just as simple to control centrally as a client/server network. Napster, for instance, was one of these sort-of-peer-to-peer-networks, most of which have now been sued off-line.

The genuine Peer to Peer networks such as Gnutella that still function on the Internet distribute data, but also distribute search processing and databases of file locations, so cannot be knocked off-line so easily by removing one component node.

The route around Intellectual Property law that these networks offer has depended on the technical and legal inability of IP owners to track and persue such a huge mass of uploaders and downloaders. Recently, after lots of high-level lobbying, IP owners are being given licence to hack by the US Government (under the proposed Uniform Computer Information Transactions Act) and have already started persuing some 'offenders', and generally sabotaging the networks with semantic attacks (uploading millions of badly named files to confuse people).

There seem to be two possible ways to maintain Peer to Peer's useful legal workarounds; to use strong encryption and increased security to prevent corporate hacking and snooping (as the Freenet project attempts to do), and/or to move off the Internet and onto Free Networks where node owners can control who accesses their resources, and who they swap files with.