... doesn't have the document that the requestor is looking for, it forwards the request to another node that, according to its information, is more likely to have the document. The messages form a chain ... one of the servers. The key is used to decrypt the file and a tamper check is then performed. If the document successfully passes the tamper check, it is displayed in the browser; otherwise, ... that is the last notable client/server-based, peer- to -peer system. Gnutella and Freenet were next, and they led the way in decentralized peer- to -peer systems. Already, the effects of the peer- to- peer...