In recent months, peer-to-peer (P2P) computing has been much hyped, promising to simplify information search and retrieval, better enable resource sharing, and help integrate software applications now distributed across computer networks.
Simply defined, P2P is an IT architectural precept that links and exploits all available networked technology (including, CPUs, storage, files, data, metadata, and network availability). This enables users, applications, and systems to centrally find and locally bind all network resources (i.e., transfer, translate, or integrate them).
When centrally coordinated, we believe P2P computing can have dramatic implications for solving complex, costly IT problems — including data discovery, acquisition, and life-cycle management. This will prove true first for problems associated with business-to-business (B2B) commerce, managing supply chains, enabling service chains, and managing content.
Through 2003, Sun, Microsoft, Intel, and a handful of emerging vendors like Thinkstream, XDegrees, Consilient, and Groove Networks will lead the way by refining P2P architectural principles and applications. Early-adopter Global 2000 companies will experiment with P2P during this time to improve acquisition and management of distributed data in internal portals, external B2B initiatives, and corporate-wide knowledge sharing programs.
By 2005, P2P will be a common IT architectural model within large distributed networks and B2B integration initiatives (such as supply or service chain planning).
We do not believe that Napster, Gnutella, and other services such as United Devices (which enables CPU sharing) exemplify sound distributed P2P technology. They are little more than file indexing and sharing tools, riddled with security and control flaws and acting more like viruses than reliable distributed IT frameworks. P2P is a maturing architectural approach, originally conceived in mature computing environments (i.e., Unix, TCP/IP) and driven by the pervasive deployment of network infrastructures and servers (mainly the Internet).
Unfortunately, from an e-business market perspective, too many vendors claiming to offer P2P solutions are confusing and fragmenting the market. We believe this will continue through 2003, wherein hastily designed and relatively narrow P2P interpretations (tailored to specific markets or content) will focus on early niche markets (by offering, say, improved searching in financial or legal databases). Larger vendors, meanwhile, will try to include P2P in their latest computing paradigms (i.e., Microsoft’s .Net, Sun’s Project Jxta, or Intel’s P2P Working Group).
From a technical perspective, the control of processes, workflow, business rule management, and overall system performance has not been thought through and will require more thorough analysis. But P2P’s greatest technical concern is security — whether of data, applications, or entire systems.
In its nascent state, P2P is inherently an environment of unstable connectivity and unpredictable network addressing. This chaotic state complicates authentication, authorization, and access management. To be secure, P2P solutions must be predicated on or integrated with public key infrastructure technology and process management. These, however, will not be pervasive parts of the architecture until 2004. (Early thought leaders such as Thinkstream have begun to address these security issues.)
Another P2P limitation is it assumes that metadata (data about data) will be pervasive, timely, and accurate. Indeed, structuring metadata within a central repository to find relevant content spread across a distributed network eliminates the costs and management problems associated with more resource-intensive approaches (such as content aggregation common in B2B procurement, or index “spidering” common to most search strategies).
Metadata, if well designed, is smaller and lighter than the data itself, lending to rapid search and retrieval and helping to simplify problems associated with B2B linking and integration. (For example, many companies have, in setting up supply chain management systems, had difficulty integrating the infrastructures of their various suppliers.)
However, at this point metadata is neither common nor standard. Therefore, for P2P in B2B applications to be pragmatic, companies must enforce discipline in systems, data, and metadata design. Pending market improvements in distributed directory services and format tools (known by acronyms like UDDI, RDF, and ebXML) will be required to ensure metadata availability and integrity.
Additionally, P2P must exploit principles inherent in existing hierarchical and distributed networks. Companies considering P2P as an architecture should evaluate their system designs — whether hierarchical systems that centrally find resources, or distributed systems that locally bind with required resources (i.e., data translation or transfer).
Business Impact:Peer-to-peer computing architecture can streamline e-business processes and leverage investments in unused or underused IT infrastructure. It can also lower integration costs among commerce chain partners.
Bottom Line:Technical flaws in the nascent peer-to-peer computing market will soon be overcome. By 2005, peer-to-peer will become an embedded architectural precept in e-business infrastructures.
Carl Lehmann is an analyst for META Group, an IT consulting firm based in Stamford, Conn.
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
FEATURE | By Samuel Greengard,
November 05, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
FEATURE | By Cynthia Harvey,
October 07, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
Top 10 Machine Learning Companies 2020
FEATURE | By Cynthia Harvey,
September 22, 2020
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
Anticipating The Coming Wave Of AI Enhanced PCs
FEATURE | By Rob Enderle,
September 05, 2020
The Critical Nature Of IBM’s NLP (Natural Language Processing) Effort
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
August 14, 2020
Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.
Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.
Advertise with Us
Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this
site are from companies from which TechnologyAdvice receives
compensation. This compensation may impact how and where products
appear on this site including, for example, the order in which
they appear. TechnologyAdvice does not include all companies
or all types of products available in the marketplace.