Research on the Application of Computer P2P Network Technology in Local Area Network

This article analyzes the basic content, application advantages, and infrastructure of computer P2P network technology. The author studies the specific application of computer P2P network technology in application structure, download mode, node function design, overlay network protocol, network data distribution, multiple copy redundancy processing, node failure detection, and copy repair processing. The author studied the countermeasures against hacker attacks, virus transmission problems, and transmission speed problems in the process of technology application. The purpose of this article is to give full play to the application effects of computer P2P network technology and improve the security of the local area network operation process.


INTRODUCTION
In the application process of computer P2P network technology, it can be classified as a kind of peer-to-peer Internet technology. Programmers can perform network data exchange, file information sharing and other processing according to actual needs, thereby improving the application value of data information. In the context of the continuous development of science and technology, the P2P network technology system is also continuously optimized, and its advantages in local area network applications have gradually become prominent. By sorting out the key points of the application of computer P2P network technology in local area networks, and sorting out common problems and solutions, it is of positive significance to better display the value of technology applications.

Fundamental Contents
The P2P structure is a peer-to-peer network. This network structure has received widespread attention when it was first born because of its own advantages. In the past few years, this structural technology has developed very rapidly. At present, the industry does not have a standard definition of P2P. Intel defines P2P technology as "the sharing of computer resources and information through direct exchange between systems." The computer resources and services we are talking about here include multiple aspects, such as information exchange, processor clock and disk space, and cache. The American IBM company has given a broader definition of this structure. They regard P2P as a structured system composed of multiple computers with Internet protocols. The characteristic of this structured system is that the system does not rely on the central or serial server, but on the active writing of edge devices. These member resources are obtained from other member users in the network instead of the server provided by the network.

Application Advantage
In practical applications, the technology has the following application advantages. (1) An important goal of P2P networks is to allow all clients to provide resources, including bandwidth, storage space and computing power. Therefore, when a node joins and requests for the system increase, the capacity of the entire system also increases. This is not possible with a C/S structure with a set of fixed servers. The increase of clients in this structure means slower data transmission for all users. (2) The distributed nature of the P2P network also increases the robustness of failure prevention by replicating data on multiple nodes. Moreover, in a pure P2P network, nodes do not need to rely on a central index server to discover data. In the latter case, the system will not have a single point of crash. (3) When P2P is used to describe the Napster network, the peer-to-peer protocol is considered important. However, the actual achievement of the Napster network is that the peer nodes (just like the end of the network) are combined with a central index. This allows it to locate available content quickly and efficiently. The peer-to-peer protocol is just a general method to achieve this.

Ring Topology
In the application process of computer P2P network technology, the ring topology is an important part, as shown in Figure 1. In the ring structure, each workstation will act as a separate working node with a unique node ID. Moreover, the node ID is also processed by a hash function during use, and the number of bits is 128, which has strong uniqueness. In the application process of the ring topology, each application node will save the ID of the two node workstations in the routing table during use to facilitate the smooth interaction of work data. Moreover, this can also accurately find other nodes in a shorter time, and the recognition accuracy is above 99.6%. In practical applications, this type of structure is often used in file sharing processing, multimedia transmission and other links. It has a good application effect. The tree structure of computer P2P network technology is an important part in the application process. As shown in Figure 2, in the tree structure, each workstation will spread from the same reference point to the outside world as a separate work branch node. These work branch nodes will also be classified into a certain node based on their mutual affiliation. They maintain independence and relevance to each other. In the design of the branch node ID, a hash function is also used for processing. The lowest-level node only records the ID information of the previous level, and the highest-level node only records the first-level affiliation node ID. Other levels of nodes will record the home node ID and branch node ID, thereby improving the orderliness of the work process. In practical applications, this type of structure is often used in multimedia transmission links, and it has good application effects.

Grid
Except to the first two application structures, the network structure of computer P2P network technology is also an important part of the application process. As shown in Figure 3, in the network structure, each workstation will act as a separate work branch node, maintaining a strong disorder and no stable subordination. It uses random connections to connect nodes together, which has strong tolerance and dynamic adaptability. As a result, it can be used as an important carrier for live streaming. In actual applications, if the network changes greatly, the relevant staff will also introduce the super node as an auxiliary structure to associate the independent nodes used. It has super compatibility, thereby enhancing the effect of structural application.

Application Structure
Judging from the current application situation, the computer P2P structure it applies to is a composite application structure that can provide richer functional services. From the perspective of local area network applications, the scope of work is basically limited to the scope of office communications. Based on this, it is necessary to make full use of the application advantages brought by the P2P network technology, which not only reduces the dependence of the system on the CPU, but also does not need to use a larger central processing unit during use. It can also provide a more convenient system operation on the basis of ensuring the rationality of the speed during use, thereby increasing the work efficiency by 30%-50%. For example, the office needs to use the local area network to establish an information exchange platform. It can realize the point-to-point exchange of information in the platform, and it can be used with a reliable central processing unit to achieve a stable assisting effect, thereby improving the reliability of the information exchange process.

Download Method
Judging from the past application situation, the text transfer protocol used in the selection of the download method is mainly HTTP protocol or FTP protocol. This is also the basic condition to ensure the efficient transmission of information. The smooth integration of P2P network technology can serve as two application functions in the information downloading process, namely server management function and customer service function. This kind of function can respond to the user's download request in a timely manner during the application process. The information content can also be shared in a short time, and users can also transfer some of their favorite resources to the local area network. This not only improves the richness of download resources, but also provides more convenience for the system network, and facilitates the smooth progress of subsequent download activities.

Node Function Design
When applying computer P2P network technology to the node function design link, it is necessary to make full use of the high scalability and high availability of the technology itself, so as to improve the durability of the information storage process on the basis of ensuring complete coverage of information. In practical applications, the peer node will be used for functional design. The schematic diagram of the structure is shown in Figure 4. Among them, the kademlia protocol is a basic carrier that assists the smooth operation of the network topology system, which has also been effectively applied in the local area network.

Overlay Network Protocol
When using computer P2P network technology to optimize the content of the local area network, it is also necessary to select a reasonable coverage network protocol to ensure the orderly delivery of structured data information. In the specific application process, the maintenance nodes will be associated at the logical application layer to ensure that any node can complete information interaction by relying on the network protocol to meet the information transmission needs. The structured P2P overlay network protocol established based on P2P network technology can sort out the connection status between nodes. Meanwhile, with the help of nodes, dynamic P2P network management can be successfully completed to serve the needs of local area network operation. Currently commonly used