Professional Documents
Culture Documents
application architectures.
Hardware provides the set of instructions that utilizes the networking equipment for
data transmission, whereas software specifies the sequence of commands
(communication protocol) that uses the hardware equipment for data transmission.
A basic data transfer is made up of numerous phases that take place at different
layers of the computer network. The most established communication stack is the
OSI 7-layer model.
In a p2p network, all computers on the network are considered equal, with each
workstation offering access to resources and data.
This means that each node in the p2p network model can both request for services
from the other peers or offer services to the other peers. Each node can be both a
client and a server.
Peer-to-Peer can be huge networks in which computers may interact with each other
and share what is on or linked to their machines with other people.
The client-server model structure is a centralized network in which the server hosts,
provides, and maintains the majority of the client’s data and services.
In this network model, a central server is a must and all the clients (computers) are
connected to the central server for retrieving data or using its services.
The diagram above shows a server connected to the network (shown as Internet
above but can be any other type of network) with various clients.
The server acts as a middle point of the network. Servers wait for requests from
clients to show up before responding.
and data.
Performance Client-server systems are more robust As the number of nodes in a peer-to-
longer required.
Client-server networks are preferable for bigger networks, particularly if they are
expected to increase in scale.
If your network contains sensitive data, you should employ a client-server structure
as well.
When you use a web browser to go to a particular website, the browser (client)
sends a request to the web server which is handling the website’s content.
Then the server responds to the request and sends data and cookies back to the
browser which will show that data according to the configuration.
The same goes for database servers. The client sends a request/query to the server,
which checks for the legitimacy of that request. If everything checks out, the server
will send data back to the client.
Server peering is used in the Internet mail system, which is a distributed client-server
framework.
Clients send and receive mail via communicating with servers, while servers
communicate with one another.
An outgoing message can be sent directly to the server (MTA), which will transport it
to the recipient’s inbox, or to another MTA, which will pass it on.
In 1999, when Napster was launched, was a pivotal moment in the history of P2P.
People utilized Napster to exchange and download music via file-sharing programs.
Peer-to-peer technology had to face a lot of backlash because of its usage in illegal
file-sharing (torrents). But a lot of companies and many day-to-day services we use,
incorporate p2p technology.
Another example is Windows 10 updates. Microsoft’s servers and P2P are both used
to deliver Windows 10 upgrades.
Some online gaming platforms make use of peer-to-peer (P2P) technology to allow
players to download games. Diablo III, StarCraft II, and World of Warcraft are all
distributed through peer-to-peer (P2P) by Blizzard Entertainment.
Pros Cons
server.
The system will not be disrupted if one of the Possibilities of Illegal data sharing.
computers crashes.
Pros Cons
Backing up and archiving data is easier in this The user policies in the network must be set by an
Illustrate.
Non-Persistent Connection
1. Without parallel connection
2. With parallel connection
Without parallel connection Non-Persistent
Each objection takes two RTT (assuming no window limit) one for TCP
connection and other for HTTP image/text file.
With parallel connection Non-Persistent
Persistent connection
1. Non-Pipelined
2. Pipelined
In Non-pipeline connection we first establish connection which takes two
RTT then we send all the objects images/text files which takes 1 RTT each
(TCP for each object is not required).
In Pipelined connection 2RTT for connection establishment and then
1RTT(assuming no window limit) for all the objects i.e. images/text.