Peer-To-Peer And Client/Server Networks A Term Paper

PAGES
2
WORDS
641
Cite

Not only does security become an issue when there are more than ten users involved in a peer-to-peer network, but performance also becomes a problem. Because each user acts as a server in a peer-to-peer network, download and upload can occur slower than it would occur when a central server is present (Edwards, p. 11). Peer-to-peer networks are effective because they are inexpensive to set and supervise. Also, each user can perform tasks that are characteristic to clients and servers alike, given the fact that they can share and download information at the same time. The only security available when regarding peer-to-peer networks is that clients can control what they share and with who they share it through setting passwords for what they want to share with certain users. However, this is not of the most secure methods of protecting one's information, as any user who knows the password will have access to the restricted information, regardless of their Internet Protocol address (Mueller, p.1077).

...

Even though they are very complex, they have numerous features in common. The fact that they too can have passwords decreases the chances of security violations (Wai-Sing Loo, 2007, p. 6).
All in all, client/server networks are the best option for those who want to install a network. However, because most users are not willing to pay for a server or because they are not qualified to manage such a network, peer-to-peer networks are usually more common (Mueller, p.1077).

Works cited:

1. Edwards, James. (2002). Peer-to-peer programming on Groove. Addison-Wesley.

2. Mueller, Scott. (2002). Upgrading and repairing PCs. Que Publishing.

3. Wai-Sing Loo, Alfred.(2007). Peer-to-peer computing: building supercomputers with Web technologies. Springer.

Sources Used in Documents:

Works cited:

1. Edwards, James. (2002). Peer-to-peer programming on Groove. Addison-Wesley.

2. Mueller, Scott. (2002). Upgrading and repairing PCs. Que Publishing.

3. Wai-Sing Loo, Alfred.(2007). Peer-to-peer computing: building supercomputers with Web technologies. Springer.


Cite this Document:

"Peer-To-Peer And Client Server Networks A" (2010, July 02) Retrieved May 2, 2024, from
https://www.paperdue.com/essay/peer-to-peer-and-client-server-networks-9940

"Peer-To-Peer And Client Server Networks A" 02 July 2010. Web.2 May. 2024. <
https://www.paperdue.com/essay/peer-to-peer-and-client-server-networks-9940>

"Peer-To-Peer And Client Server Networks A", 02 July 2010, Accessed.2 May. 2024,
https://www.paperdue.com/essay/peer-to-peer-and-client-server-networks-9940

Related Documents

client is a never married 27-year-old African-American lady who has completed 12 years of formal education. She is currently employed as a retail salesperson in the clothing section at a local department store. Her parents died in an automobile crash six weeks ago and she was very close to them. She stated that she misses her parents very much. The client reports that her development as a child was normal

For example, when one has web server run on any client computer, he/she is able to visit the pages by using the IP address into the address of the browser. Client server communication cannot take place without using the protocols. Protocols enable the packets to fly around the internet that does not only contain the information on the destination address as well as port, but also contain protocols. Client

Thick client technology can support more efficient asynchronous transfers and the independence of data models at the individual worker level can significantly improve the overall performance of a given project. Thick client/server networks are especially well suited for concurrent engineering tasks given their data management and overhead requirement specifications (Lee, 2002). In the field of engineering consulting and design, it is also critically important for companies to have secured

In January 2000 a new system was implemented by double click wherein for the first time the linking of the name of the user and any other information that it can pick up as the user moves from site to site. This is done in this manner and that is the user name and address is collected and stored in a cookie from a site where this is entered

Network dating sites. How type dating evolved . Include pros cons. Network dating sites have gained a particular place of social eminence within contemporary times. Online dating sites that members pay to use, such Match.com, made over a billion dollars in 2010 (No author). Many people consider these websites as primary options for dating for the simple fact that they allow expedient access to other singles who are also looking to

Network Plan for ABC Corp
PAGES 9 WORDS 2595

The paper creates Extended Access Control Lists for ABC Corporation using Port Numbers. Extended Access Control Lists for ABC Corporation using Port Numbers access-list 101 permit tcp 172.16.3.0. 0.0.0.255 any eq 20 access-list 101 permit tcp 172.16.5.0. 0.0.0.255 any eq 21 access-list 101 permit tcp 172.16.3.1/16. 0.0.0.255 any eq 22 access-list 101 permit tcp 172.16.3.254/16. 0.0.0.255 any eq 25 access-list 101 permit tcp 172.16.5.254/16. 0.0.0.255 any eq 35 access-list 101 permit tcp 172.16.0.254/16. 0.0.0.255 any eq18 access-list 101