Verified Document

Peer-To-Peer And Client/Server Networks A Term Paper

Related Topics:

Not only does security become an issue when there are more than ten users involved in a peer-to-peer network, but performance also becomes a problem. Because each user acts as a server in a peer-to-peer network, download and upload can occur slower than it would occur when a central server is present (Edwards, p. 11). Peer-to-peer networks are effective because they are inexpensive to set and supervise. Also, each user can perform tasks that are characteristic to clients and servers alike, given the fact that they can share and download information at the same time. The only security available when regarding peer-to-peer networks is that clients can control what they share and with who they share it through setting passwords for what they want to share with certain users. However, this is not of the most secure methods of protecting one's information, as any user who knows the password will have access to the restricted information, regardless of their Internet Protocol address (Mueller, p.1077).

Even though they are very complex, they have numerous features in common. The fact that they too can have passwords decreases the chances of security violations (Wai-Sing Loo, 2007, p. 6).
All in all, client/server networks are the best option for those who want to install a network. However, because most users are not willing to pay for a server or because they are not qualified to manage such a network, peer-to-peer networks are usually more common (Mueller, p.1077).

Works cited:

1. Edwards, James. (2002). Peer-to-peer programming on Groove. Addison-Wesley.

2. Mueller, Scott. (2002). Upgrading and repairing PCs. Que Publishing.

3. Wai-Sing Loo, Alfred.(2007). Peer-to-peer computing: building supercomputers with Web technologies. Springer.

Sources used in this document:
Works cited:

1. Edwards, James. (2002). Peer-to-peer programming on Groove. Addison-Wesley.

2. Mueller, Scott. (2002). Upgrading and repairing PCs. Que Publishing.

3. Wai-Sing Loo, Alfred.(2007). Peer-to-peer computing: building supercomputers with Web technologies. Springer.
Cite this Document:
Copy Bibliography Citation

Related Documents

Client Is a Never Married 27-Year-Old African-American
Words: 870 Length: 3 Document Type: Essay

client is a never married 27-year-old African-American lady who has completed 12 years of formal education. She is currently employed as a retail salesperson in the clothing section at a local department store. Her parents died in an automobile crash six weeks ago and she was very close to them. She stated that she misses her parents very much. The client reports that her development as a child was normal

Client/Server Model Client Server Model
Words: 738 Length: 2 Document Type: Term Paper

For example, when one has web server run on any client computer, he/she is able to visit the pages by using the IP address into the address of the browser. Client server communication cannot take place without using the protocols. Protocols enable the packets to fly around the internet that does not only contain the information on the destination address as well as port, but also contain protocols. Client

Server Architectures Using a Fat
Words: 812 Length: 3 Document Type: Assessment

Thick client technology can support more efficient asynchronous transfers and the independence of data models at the individual worker level can significantly improve the overall performance of a given project. Thick client/server networks are especially well suited for concurrent engineering tasks given their data management and overhead requirement specifications (Lee, 2002). In the field of engineering consulting and design, it is also critically important for companies to have secured

Server Cookies the Term Cookies
Words: 2131 Length: 5 Document Type: Term Paper

In January 2000 a new system was implemented by double click wherein for the first time the linking of the name of the user and any other information that it can pick up as the user moves from site to site. This is done in this manner and that is the user name and address is collected and stored in a cookie from a site where this is entered

Networks "Enterprise Glue": Information Mobilization the Core
Words: 1544 Length: 5 Document Type: Essay

networks "enterprise glue": information mobilization the core case module involves careful assessment sources strategic enterprise information. But ' ready tackle, speed underlying issues dynamics. Information networks as "enterprise glue": information mobilization To what degree should organizations depend on the analysis of large data and other IT resources to formulate basic strategy? The business agents of the modern day society are faced with countless challenges from both within and outside their environments. For

Social Networks on Society Social Networks Are
Words: 1344 Length: 4 Document Type: Thesis

Social Networks on Society Social networks are changing the fabric of society by changing the patterns, depth and intensity of communication and collaboration happening globally today. The torrent of information, ideas, opinions and thoughts that social networks have unleashed will continually re-order the global economic, socio-political and technological dimensions of society. At the center of the effects of social networks on society is the voice it has given the common

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now