Free Essay

Peer to Peer and Client/Server Networks

In: Computers and Technology

Submitted By deedee99
Words 642
Pages 3
Peer-to-Peer and Client/Server Networks Darsheen Smith Strayer University

Peer-to-Peer and Client/Server Networks A network is a group of computers and other devices, such as a printer, that are connected by some type of transmission media (i.e. fiber optic cables or radio waves) (Dean, 2010, p.2). Originally “sneakernet” was the only means of electronic source sharing. It involved the transfer of electronic information by physically couriering removable media, such as floppy disks, from one computer to the next (Wikipedia, 2011, para 1). With the advancement of computer technology so is the modernization of computer networking. Analysis There are two types of networks, peer-to-peer and client/server networks. Both have the capability to communicate with other computers on the network. They also have the capability to protect files from unauthorized users. There are also distinct differences between the two types of networks. In a peer-to-peer network every computer can communicate directly with every other computer. No computer has more authority than another. A Typical peer-to-peer network consists of two or more personal computers (Dean, 2010, p.3). In contrast, a client/server network consists of a central computer, called a server, which is designed to permit communication and information sharing between computers, known as clients, on the network. The clients do not share their resources directly with each other, but rather use the server as an intermediary. Clients and servers communicate through connectivity devices such as switches and routers (Dean, 2010, p.5). There are also advantages and disadvantages of having these types of networks. Some of the advantages of a peer-to-peer network are the simplicity to configure and it can be less expensive to setup and maintain than a client/server network (Dean, 2010, p.4). Some of the disadvantages are it is not flexible where there is a need for expansion in the network. Changing or adding elements can be difficult (Dean, 2010, p.4). For example, each user on the network is responsible for configuring their computer to allow access or no access to certain files on the computer from other users. As the network grows it will require a lot more configuring for the new users on the network based on their need to access certain files from other computers. The network can also have security issues because unauthorized users can easily access sources from other users. Some of the advantages of a client/server are that it can be used on a larger scale due to the centralized computer connection. It is more secure because logon accounts and passwords for everyone can be assigned in one place (Dean, 2010, p.6). Problems that may arise on the network can be monitored, diagnosed, and fixed easily from one location vise going to each computer. Some of the disadvantages are if the server goes down then the entire network may go down. It is more expensive to install due to the hardware and software involved and its complexity to set up. And it needs to be maintained by staff with IT skills (Biohealthmatics, 2010). Discussion In conclusion, networking via electronically has made resource sharing so much easier, faster, and convenient. Computers are a vital part of our everyday lives at home and at work so information sharing is prevalent. With this domination of information comes the need for a reliable and vigorous network. Because of the current fast paced generation there is no time for the delay of information sharing. The largest and world-wide network is the internet.

References Biohealthmatics. (2010). Client/server networks. Retrieved April 12, 2011, from: http://www.biohealthmatics.com/technologies/networks/client_server.aspx Dean, T. (2010). Network + guide to networks. Mason, Ohio: Cengage Learning. Wikipedia Foundation. (2010). Sneakernet. Retrieved April 12, 2011, from: http://en.wikipedia.org/wiki/Sneakernet.

Similar Documents

Free Essay

Peer-to-Peer vs Client Server Network

...What's the difference between client/server and peer-to-peer networks? There’s quite a bit, although most of the differences are in two areas – security and cost. Beyond that, your consideration for what you need is largely dependent on budget and the size of your organization. So, what’s the difference? A peer-to-peer network has no central server. Every workstation on the network shares files equally with everyone else on the network. This also means there is no authentication of users and no central storage. This model is considered a decentralized form of networking. Conversely, the client/server network provides a central pool of data and resources, with user profiles established with localized restriction on which data can be accessed. This model is commonly referred to as a centralized form of networking. Both are good! There’s an old saying, ‘wisdom is what works’. Well, the same is true for your network. Peer-to-peer networks are great for use in homes or in small businesses where employees interact regularly and share all information and files. They don’t cost much to setup, nor are they difficult to manage. The downside is there’s almost no security (pretty much controlled at an individual ‘share’ level). Once you get more than 8-10 workstations connected, there would likely be an impact to performance and management since each station functions as both client and server at the same time. As each employee manages the sharing of their workstation...

Words: 452 - Pages: 2

Free Essay

Network Security

...Peer-to-Peer and Client/server Networks Professor: Karen Lederer Trevor Kale 4/16/2011 We shall discuess the difference between Peer-to-Peer networks and the Client/Server networks. First we need to describe how each one operates in order to view the differences between both. First we will describe a Peer-to-Peer network. In the Peer-to-Peer network every computer can communicate directly with every other computer.(2009, Dean, Pg.3) Because of this setup no one computer has more authority then another one on the network. Each person on the network can set their access and restrictions for other users to their computer. These configurations are simple to configure and due to the simplisity they do not require a great technical expertise. They also tend to be cheaper due to lack of need of equipment to establish this network. Some disadvantages consist of not being flexible, that is as they grow they become more difficult to handle. Security on these networks is very lacking due to ease of access of unauthorized access. They are also not very practical due to the lack of centralized resources requires a user to have their terminal on in order to access their resources. That is the basics of a Peer-to-Peer network setup, next we move on to the Client/Server model. In a Client/Server network a centralized computer known as a server facilitates communication between other computers on the network known as clients. For a computer to function as a server they must be running...

Words: 478 - Pages: 2

Free Essay

Unit 1 Net+

...provided by a network are usually referred to as network services _. b. A (n) remote access server may also be known as simply an access server. c. True or False: A client/server network is the simplest network model. d. True or False: A common way to share resources on a client/server network is by modifying the file-sharing controls via the computer’s operating system. e. True or False: The oldest and still most frequently used network communications services are print services. 2. Install Visio on your workstation. Visio can be obtained from MSDNAA. Once Visio is installed, create a simple network diagram. Start the Visio application, select Network, and then Basic Network Diagram. Start by clicking the Computers and Monitors tab, then drag a few PCs to the diagram, one the upper right, the other the lower right. Next click the Network and Peripherals tab, drag a switch to the middle of the diagram, drag a server to the upper left and a printer to the bottom left. Next, we need to connect the devices. Click the Comm-link icon to connect the devices to the switch. (Link to Sample) SEE BELOW: 3. Describe in your own words the similarities and differences between a peer-to-peer network and a client-server network. Peer-to-peer network is similar to a client server in the aspect that they both share internet connection for access to outer resources. And play a role of both client and server but in different connections such as peer-to-peer can share files...

Words: 1087 - Pages: 5

Free Essay

140 Phase 3

...Chanee Lowry 6/6/16 Unit 3 IP Instructor: L. Meadors Peer to Peer vs. Client/server With peer-to-peer all of the PC’s on the same network act as equals sharing the same files and resources. Communications between these PC’s use a direct link with no central network controller, such as a client/server. Peer-to-peer network is the easiest to set up because it doesn’t require any software other than the operating system it came with. It also doesn’t require complex configuration of a client/server network. It is cost efficient and the only hardware required is two wireless NIC’s. Client/server uses a central PC (a server) that stores data and other resources. One centralized PC called the client which works as a host to many other computers or workstation’s called clients .The server uses a list of usernames and passcodes whereas peer-to-peer does not. Client/Server offers more security and is more stable. If one user crashes there system, than it could affect their peer-to-peer network. Most client /server networks share one server, making it easier to back up data and files Peer-to-Peer | Client/Server | Each PC is an equal participant on the network | One PC acts as the network controller | PCs are not reliant on one PC for resources such as the printer | One PC controls access to network resources | Access to the network is not centrally controlled | Network access and security are centrally controlled | Can operate on a basic PC operating system | Need a special operating...

Words: 326 - Pages: 2

Free Essay

The Benefits of Twisted Pair Cable

...Pair Cable The current network model that is being used by your company today is the peer to peer model. This model is an ideal selection for a company or organization when there are very few computers. Since your organization currently has 20 Windows peer to peer client computers I would like for you to consider moving towards the client server network modelOnce a peer-to-peer network grows beyond 10 computers, it will likely begin to suffer from performance and from administrative problems (Posey, 2000) In the client server network model network hosts have specific roles which are assigned to them. There are certain host that are assigned as servers, which will provide network resources to the workstations. Unlike the current peer to peer model that is supported in your organization today in which everyone workstation has the same or similar operating systems. There are several benefits for your organization to consider to transitioning to client server network model. One of the major benefits of the client server network model is scalability. Since we know the potential for this organization to double in size over the next two years scalability is a key factor. It’s very easy to expand the size of your network with client server model because it will be easy to just add on workstation. Everything is centralized to the server. This server will be the centralized platform for all the workstations. Another major benefit of this client server model is increased security...

Words: 719 - Pages: 3

Free Essay

Peer to Peer Server

...Peer-to-Peer VS. Client Server Trevor Crews Strayer University Networks are used to offer advantages that cannot be obtained through the sole use of a standalone computer. There are two common types of network, Peer-to-Peer and Client/Server. Peer-to-Peer is the simpler of the two while client server remains the more complex. Both types offer advantages and disadvantages over the others. “In a peer-to-peer network, every computer can communicate directly with every other computer.” (Dean, 2010) This set-up allows for all computers to have access to each other and the same level of authority. Because of this fact no one computer can do more or less than any other computer on the network. They do, however; each have the ability to limit and share only a portion of their resources and the ability to prevent access to certain data. As they are set up directly to each other every computer has the ability to send and receive information to and from every other computer on the network. Using Peer-to-Peer networks though however does have its advantages and disadvantages. First let’s look at the advantages. The main advantage to a Peer-to-Peer network is how simple it is to configure. This allows them to be deployed in areas where high-end technical expertise may be limited. Due to this fact they can be seen in areas from local home networks to small businesses and at times even larger companies may implement them. Another advantage is that they are less expensive to both set...

Words: 616 - Pages: 3

Premium Essay

Security Aspects of Peer-to-Peer Computing

...Security Aspects of Peer-to-Peer Computing Shayla J. Brock INSY 4900.51 May 9, 2014 It is important to enable peers to represent and update their trust in other peers in open networks for sharing files, and especially services. A trust model and a method for building reputation based on recommendations in peer-to-peer networks. Since trust is multifaceted, peers need to develop differentiated trust in aspects of other peers’ capability. The peer’s needs are different in different situations. Depending on the situation, a peer may need to consider it’s trust in a specific aspect of another peer’s capability or in multiple aspects. There are networks that provide a flexible method to present differentiated trust and combine different aspects of trust. The evaluation of the model using a simulation shows that the system where peers communicate their experiences outperforms the system where peers do not share recommendations with each other and that a differentiated trust adds to the performance in terms of percentage of successful interactions. Currently, a new and highly interesting paradigm for communication on the Internet, known as Peer-to-Peer (P2P), is emerging...

Words: 2656 - Pages: 11

Premium Essay

Nt1330 Unit 3 Network Analysis

...understanding of local area network technologies involves: Describing networking concepts Explaining why the components have been used in a local area network (LAN) to achieve the desired characteristics Explaining how the connection technologies allow the components to function in a LAN Describing the access control method used in the Ethernet architecture. LAN Uses 2 Characteristics 2 Purpose 2 Peer to Peer LANs 3 Characteristics 3 Purpose 3 Client/Server LANs 3 Characteristics 3 Purpose 3 Bandwidth 4 QoS 4 Data Transmission Modes 4 Network Address Translation (NAT) 5 TCP/IP (Transmission Control Protocol/Internet Protocol) 6 Open System Interconnection (OSI) Model 7 IP Addressing 8 Components 9 To...

Words: 1600 - Pages: 7

Free Essay

Project Management for the Central Goverment

...(For Six Months Industrial Training) By Nitika Sharma CHAPTER NO. TITLE PAGE NO. TITLE PAGE…………………………………………………………………………………….i ABSTRACT……………………………………………………………………………………..ii ACKNOWLEDGEMENT………………………………………………………………….iii LIST OF TABLES & FIGURES…………………………………………………………iv 1. INTRODUCTION 1.1 Types of Peer to Peer………………………………………………………………..…...........2 1.1.1 Unstructured P2P…………………………………………………………………………2 1.1.2 Centralized P2P…………………………………………………………………………….3 1.2 Applications………………………………………………………………………..……………….....3 1.3 Advantages…………………..……………………………………………...............................3 1.4 Objective …………………………………………………………………………………………..…....4 1.5 Scope…………………….……………………………………………………………………….………….4 2. FEATURES OF PROJECT…………………………………………………………………………….5 3. HARDWARE & SOFTWARE REQUIREMENTS 3.1 Input Requirements…………………………………….……………………………………..8 3.2 Output Requirements………………………………………………………………………..8 3 3.3 Software Requirements…………………….………………………………………………..8 3.4 Hardware Requirements……………………………………………………………………..8 4. TOOL USED FOR DEVELOPMENT 4.1 NetBeans…………………………………………………………………………….……………….10 4.1.1 Features and Tools…………………..……………………………..………..…….10 4.1.2 Source Code Editor………………………………………………………………….10 4.1.3 GUI Builder………………………………………………………………………………..11 5. TECHNOLOGY TO BE USED 5.1 Introduction to Java…………………………………………………………..……………..13 5.1.1 Java Virtual Machine……………………………………………….…………..13 5.1.2 Principles………………………………………………………………………………..13 5.1.3 Versions………………………………………...

Words: 12882 - Pages: 52

Premium Essay

Nt1330 Unit 5 Algorithm Report

...providing security in peer to peer network we are using the AES algorithm and MD5 algorithm. AES for converting the plain text into cipher text which is been sent to the peers from the other peer. For password generator we are using the MD5 algorithm which uses the hash value for providing the total integrity while sharing the data among the peers. For secure communication using the secrete key of the cryptographic algorithm. Connection between the two peers will be established using the socket programming in both the peers will be connected using the mini server of a particular client from which data has to be shared. This connection is not a powerful connection and it also does not show the concept of handshaking. So establishing...

Words: 1096 - Pages: 5

Premium Essay

Nt1310 Unit 3 Assignment 1 Data Analysis

...Data flows in a single direction, from one entity to the next. An entity accepts data in circulation on the ring only if it corresponds to its address. If not, the entity in question passes the data to the next entity. (https://fr.wikipedia.org/wiki/R%C3%A9seau_en_anneau) In a star network topology, network devices are connected to a central hardware system (the node). The role of this one is to ensure the communication between the different equipments of the network. In practice, the central equipment can be a hub , a switch or a router. The downside to a star architecture is that it is susceptible to traffic problems because the central computer is processing all of the messages. (https://fr.wikipedia.org/wiki/R%C3%A9seau_en_%C3%A9toile) The latest implementation in Wide Area Network Architectures has actually existed in the supercomputer industry since its inception being that of the Mesh Architecture. In a fully connected Mesh each node is connected to every other node, and while this may be the ideal implementation it is also the most impractical since this has an exponential cost association the further apart the nodes are geographically from each other....

Words: 1527 - Pages: 7

Premium Essay

Nt2580 Lab 1 - Nt2580 Lab 1 Lab #1 - Assessment Worksheet...

...A network is a group of computers (often called nodes or hosts) that can share information through their interconnections. A network is made up of the following components: Computer systems (nodes or hosts). Network devices that enable connectivity (such as hubs, switches, and routers). The transmission medium provides a path for electrical signals between devices. Network interfaces are devices that send and receive electrical signals. Protocols are rules or standards that describe how hosts communicate and exchange data. Despite the costs of implementation and maintenance, networks actually save organizations money by allowing them to: Consolidate (centralize) data storage Share peripheral devices like printers Increase internal and external communications Increase productivity and collaboration One way to classify networks is based on the role network devices play: Network Type Description Peer-to-peer In peer-to-peer networking (also called workgroups), each computer controls access to its own resources. Security controls on each computer identify who can have access to the computer's resources. Advantages of peer to peer networks include: Easy implementation Inexpensive Disadvantages of peer to peer networks include: Difficult to expand (not scalable) Difficult to support Lack centralized control No centralized storage Windows 7 includes a new feature called a HomeGroup. The HomeGroup is a simple way to create a peer-to-peer network...

Words: 584 - Pages: 3

Free Essay

Feadfe

...Question #1: You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights. What kind of network would you install? How would the pieces and components of this network relate to each other? Define each component. .Answer #1: For this scenario I would use a server-client relationship. For this I would need a server to handle login and authentication, a second server for files (file server), I would probably have to create groups in which accounts are assigned and identified by. This would allow me to grant user profiles more, less or equal privileges to the server and it's contents. In order to interconnect all of these things a switch will be required. Question #2: You are the network administrator for a company that has a peer-to-peer network. How would the pieces and components of this network relate to each other? Define all the components of this type of network Answer #2: Peer-to-peer networks are much different than server-client networks. The major difference is that in a peer-to-peer network there is no single server feeding data to the users. In a peer-to-peer network all of the machines involved communicate and share data amongst each other and have an equal role in the network. Question #3: You are the administrator of a client-server environment. What kind of network would you install? How...

Words: 379 - Pages: 2

Premium Essay

Logs

...the world. By using a systems development plan, The Bead Bar will be able to reach more customers. The Bead Bar should use an Enterprise DBMS to The Bead Bar. The enterprise DBMS will allow The Bead Bar is a large enough company that an enterprise DBMS will be what they need. Enterprise DBMS's are perfect for organizations, and companies that have multiple locations. The enterprise DBMS can give prices, changes, and inventory information to the different locations. Enterprise DBMS runs from one central location, then branches out to the other locations. They can connect directly to the company's websites to give the information needed to run the business such as item prices and inventory levels. The Network Model or the Codasyl is the best model for The Bead Bar. The Network Model allows data entered to be linked to each other. There are no restrictions in how the data is connected to each other as in the Hierarchical Model. This model is very complicated, but is very flexible. The Bead Bar needs flexibility in their data entries. There are many benefits of using a DBMS. One benefit of using a DBMS is that the DBMS transforms the data in a way that takes up less space. The user would enter the information and the DBMS would automatically change the information to another format so there is less space taken up. This gives the business more available space for more needed information. Another benefit of using a DBMS is the security that it provides the business. The DBMS settings...

Words: 1607 - Pages: 7

Premium Essay

Nt1310 Unit 3 Assignment 1

...Question 1 1.1 Network: is an interconnection of computers connected in such a way they can communicate with each other to share information, services and resources. This connection can be wireless using specific communication devices & transmission media or a wired connection using cabling & other related resources. (Bruce Hallberg, 2013) 1.2 (Bruce Hallberg, 2013) • They provide communication systems internally and externally in the company such as using email services to communicate with employees and clients. • Networks are expandable and not limited therefore as the company grows the network also grows • Having a type of network such as client/server network provides an expendable large database with centralised security and application services. • Having a network will save the company time and increase the worker productivity...

Words: 872 - Pages: 4