Chapter 2
2.1 The role of Network
The role of the network is to improve data transfer and better documentation within the organization and beyond. User’s privilege can be determined through the network, an example is: determining what computer can access certain files on the network. These limitations can vary from user to user based on their role in the organization.
2.2 Peer-to-Peer, Peer-to-Peer over a client server Network and Client-Server
P2P computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the application. They are said to form a peer-to-peer network of nodes. Each node is a computer on the network which acts and communicates with other Peers to make a portion of their resources, such as processing power, disk storage or network bandwidth, directly available to other network participants, without the need for central coordination by servers or stable hosts.
2.2.1 Peer-to-Peer over a network
A P2P network is created when two or more PC’s are connected and share resources without going through a separate server computer.
2.2.2 Advantages of Peer-to-Peer over a Network
1) It is easy to install and so is the configuration of computers on this network,
2) All the resources and contents are shared by all the peers, unlike server-client architecture where Server shares all the contents and resources.
3) P2P is more reliable as central dependency is eliminated. Failure of one peer doesn’t affect the functioning of other peers. In case of Client –Server network, if server goes down whole network gets affected.
4) There is no need for full-time System Administrator. Eve...
... middle of paper ...
...agram below describes how data are being built up from various components and the protocol involved in each stage. Also, a short description of the protocol has being illustrated on the diagram.
6.2 Performance
This is an important aspect of a network, this shows the way data flows and also monitors the performance of the network. In reality, there are three main essential layers in the OSI model when send a packet, which are the physical layer, data Link layer, Network Layer.
When a packet is sent it goes through an Electrical/optical protocol in the physical layer to the data link layer (Switch, Hub). The data link layer determines the data is framed before being transmitted on the medium. After this step, it takes it to the logical network paths, which only happens in the network layer through a Router or a layer 3 Switch which can identify IP addressing.
The 802 committee and the OSI model both relate to one another. The OSI model shows how the layers of the internet are able to communicate and function with each other. While the 802 committee will add onto that by showing how network protocols should function. With that being said there are numerous working groups under the 802 committee however the one that I will be writing about is the 802.2 or the logical link control (LLC). The logical link control is in the 2nd layer (data-link) of the OSI model. The purpose of this protocol is flow and error control along with multiplexing and demultiplexing. How multiplexing works is by getting multiple data streams and combining them into one shared stream. This is mainly seen in the common forms
Peer-to-peer (P2P) networks have had a staggering growth in the past few years. Since Napster, dozens of P2P networks have been created in its imitation. Due to the growing accessibility of broadband, which increases the speed of downloads, P2P networks generate nearly 1.8 billion downloads per month. Popularity and acceptance is still continually growing.
Will we find a replication of this history in P2P technology? Even though we will have to wait qui...
Backing up data, avoiding a single point of failure, and making sure data is only put where it needs to be are a few extra precautions to keeping your network secure [8].
Peer-to-peer is a communications model in which each party has the same capabilities and either party can initiate a communication session. Other models with which it might be contrasted include the client/server model and the master/slave model. In some cases, peer-to-peer communications is implemented by giving each communication node both server and client capabilities. In recent usage, peer-to-peer has come to describe applications in which users can use the Internet to exchange files with each other directly or through a mediating server.
A network can be based on either a peer-to-peer level or server-based, also referred to as domain-based. To distinguish the difference, a peer-to-peer network, also known as a workgroup, is a network in which a group of computers are connected together to share resources, such as files, applications, or peripherals. The computers in a peer-to-peer network are peers to one another, meaning no single computer has control over one another. There is also no central location for users to access resources, which means that each individual computer must share their files in order for other computers to have access (Muller, 2003, p.411). “In a peer-to-peer environment, access rights are governed by setting sharing permissions on individual machines.” (Cope, 2002) On the other hand, in a domain-based network, the computers connected together are either servers or clients. All of the other computers connected to the network are called client computers. The server is a dedicated machine that acts as a central location for users to share and access resources. The server controls the level of authority each user has to the shared resources. When logging on to the network, users on client machines are authenticated by the server, based on a user name and password (Lowe, 2004, p.13).
What do P2P, File sharing, and Bit Torrent sites have in common? They all are file sharing websites that you can send and look at files with other billions of people. Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. File sharing is the practice of distributing or providing access to digital media, such as computer programs, multimedia (audio, images and video), documents or electronic books. Bit Torrent is a website used that is kind of like a peer-to-peer file sharing ("P2P") site which is used to distribute data and electronic files over the Internet. Be warned, though because these websites
The first online peer to peer file-sharing application was Napster. Napster allowed people to copy music from their CDs onto their computers in mp3 format. They then allowed other members of Napster to download these songs onto their computers. Once this caught on, millions of people were downloading thousands of songs a day. And as you can imagine, this did not make the record companies happy with the idea that people were getting their music for free instead of buying the CD. It also caused a problem with some of the recording artists. Most notably Metallica.
This protocol associates a state with each cached copy of shared data block. The different states that can be associated with the block are as follows:
Peer-to-peer (P2P) is a substitute network design to the conventional client-server architecture. P2P networks utilize a decentralised model in which each system, act as a peer, and serve as a client with its own layer of server functionality. A companion plays the role of a client and a server in the meantime. That is, the node can send calls to other nodes, and at the same time respond to approaching calls from other companions in the system. It is different from the traditional client-server model where a client can just send requests to a server and then wait for the server’s response.
... middle of paper ... ... TCP/IP operates at levels 3 and 4 of the OSI model.
All around the world people connected to the internet are downloading free digital content through P2P file sharing software.
In a client server network data is shared to a centralized server. It gives each member different privileges. The administrator controls the users access to files on the network Some primary operating systems for a client server have been UNIX based operating systems, Windows Server, and Netware . They are used in large networks for corporations. The reason for this is because they are more secure and have many features. They all grant the ability to configure and update the software. Server based can also operating systems can interact with sensors in the hardware to find issues like overheati...
P2P technically stands for "peer-to-peer." A peer-to-peer architecture allows hardware or software to function on a network without the need for central servers. The person connects directly to his or her peer through a dedicated connection where no one else can interfere. An example of P2P chat clients are MSN Messenger and Yahoo Messenger. These P2P clients make chatting user-friendly and interesting as there are options for a web cam or an audio conversation, and options to transfer files from one peer to another. The use of emoticons makes the conversation either more real or more fun.
Have you ever needed to have more than one home computer for you and your family? Do you have two or more computers, but need to copy and/or share files and/or programs between them, but you don’t know how? Do all of your computers need Internet access, but you don’t want to have a phone line installed for each of them? Well, you can do all of this. I know, because this is what I did at my home. After doing research I found that there are several advantages for having your own Home Computer Network. Following, are several reasons to do this in your house.