diff --git a/docs/src/architecture/p2p-network.md b/docs/src/architecture/p2p-network.md index f36bd9316..cbf901ac3 100644 --- a/docs/src/architecture/p2p-network.md +++ b/docs/src/architecture/p2p-network.md @@ -2,27 +2,26 @@ ## Small-World Network -Freenet is structured as a decentralized peer-to-peer network, utilizing the -principles of a small-world network. This unique network topology enhances -Freenet's robustness against denial-of-service attacks, enables it to scale -dynamically based on user demand, and facilitates efficient and transparent data -storage. Additionally, users can subscribe to specific data keys to receive -immediate notifications about any updates. +Freenet is structured as a decentralized peer-to-peer network, based on the idea of +a [small-world network](https://en.wikipedia.org/wiki/Small-world_network). This +network topology is scalable and efficient, allowing contract state to be found +quickly and without any reliance on a central authority. ![Small World Network](p2p-network.svg) -## Understanding Freenet Peers +## Freenet Peers -In Freenet, a "peer" is any computer running the Freenet Core software. The -peers are organized in a ring-like structure, with each peer assigned a -specific numerical value between 0.0 and 1.0, indicating its location in the -network's topology. This location is derived from the peer's public key. +In Freenet, a "peer" is any computer running the [Freenet +Core](https://github.com/freenet/freenet-core) software. The peers are organized +in a ring-like structure, with each peer assigned a specific numerical value +between 0.0 and 1.0, indicating its location in the network's topology. This +location is derived from the peer's public key. ## Establishing Neighbor Connections Every Freenet peer, also referred to as a node, forms two-way connections with a set of other peers, termed "neighbors." These connections utilize the User -Datagram Protocol (UDP) and can do [Frewall hole punching](https://en.wikipedia.org/wiki/Hole_punching_(networking)) when necessary. Peers manage their resource usage — +Datagram Protocol (UDP) and can do [Frewall hole punching]() when necessary. Peers manage their resource usage — bandwidth, memory, CPU, and storage — based on limits set by the user. ## Adaptive behavior @@ -30,5 +29,5 @@ bandwidth, memory, CPU, and storage — based on limits set by the user. Peers keep track of their neighbor's performance and learn to prefer faster connections over time. -Peers can also identify bad behavior by other peers like excess resource usage and +Peers can also identify bad behavior by other peers like excess resource usage and will disconnect from them.