peering


A relationship between two or more small- or medium-sized ISPs in which the ISPs create a direct link between each other and agree to forward each other’s packets directly across this link instead of using the standard Internet backbone. For example, suppose a client of ISP X wants to access a web site hosted by ISP Y. If X and Y have a peering relationship, the HTTP packets will travel directly between the two ISPs. In general, this results in faster access since there are fewer hops. And for the ISPs, it’s more economical because they don’t need to pay fees to a third-party Network Service Provider (NSP).

Peering can also involve more than two ISPs, in which case all traffic destined for any of the ISPs is first routed to a central exchange, called a peering point, and then forwarded to the final destination. This is similar to the Network Access Points (NAPs) managed by the NSPs, but on a smaller scale.

Read Also:

  • pen computer

    A computer that utilizes an electronic pen (called a stylus) rather than a keyboard for input. Pen computers generally require special operating systems that support handwriting recognition so that users can write on the screen or on a tablet instead of typing on a keyboard. Most pen computers are hand-held devices, which are too small […]

  • pen tool

    In graphics software, the pen tool is frequently used in the creation of smooth-edged selections, but is not a type of selection tool. The Pen Tool creates vector paths that can be converted into selections that in turn can be used to extract or mask groups of pixels.

  • perceptual coding

    In digital audio perceptual coding is a coding method used to reduce the amount of data needed to produce high-quality sound. Perceptual coding takes advantage of the human ear, screening out a certain amount of sound that is perceived as noise. In perceptual coding you reduce or eliminate the sounds that the ear would perceive […]

  • perfect forward secrecy

    A key-establishment protocol, used to secure VPN communications. If one encryption key is compromised only data encrypted by that specific key is compromised. For perfect forward secrecy (PFS) to exist the key used to protect transmission of data must not be used to derive any additional keys.

  • perigee

    In satellite communications, most satellites orbit the earth in elliptical patterns with the earth not in the exact center of the orbital pattern. When a satellite is at its closest point to the earth, it is at the perigee of the orbit. When a satellite is at its furthest point from the earth, it is […]


Disclaimer: peering definition / meaning should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional. All content on this website is for informational purposes only.