Professional Documents
Culture Documents
• Peer-To-Peer
Architecture •
Client/Server Architecture
Peer-To-Peer Architecture
1
• It is less costly as it does not contain any dedicated server.
• If one computer stops working but, other computers will continue
working. • It is easy to set up and maintain as each computer manages
itself.
• In the case of Peer-To-Peer network, it does not contain the centralized system.
Therefore, it cannot back up the whole data as the data is different in different
locations.
• Security and data backups are to be done to each individual computer.
• As the numbers of computers increases on a P2P network; performance, security, and
access become a major headache.
Client/Server Architecture
• Can become very costly due to the need of a server as well as networking devices such
as hubs, routers, and switches.
• If and when the server goes down, the entire network will be affected.
• Technical staff needed to maintain and ensure network functions efficiently.
2
• The key difference between Client-Server and Peer-to-Peer network is that there is a
dedicated server and specific clients in the client-server network model whereas, in
peer-to-peer each node can act as both server and client.
• In the client-server model, the server provides services to the client. However, in peer-
to-peer, each peer can provide services and can also request for the services.
• In peer-to-peer model, the servers are distributed in a system, so there are fewer
chances of server getting bottlenecked, but in the client-server model, there is a single
server serving the clients, so there are more chances of server getting bottlenecked.
The size of a network can be expressed by the geographic area they occupy and the number
of computers that are part of the network. Networks can cover anything from a handful of devices
within a single room to millions of devices spread across the entire globe.
Networks can cover anything from a handful of devices within a single room to millions
of devices spread across the entire globe.
Local area networks, generally called LANs, are privately-owned networks within a single
building or campus of up to a few kilometers in size. They are widely used to connect
personal computers and workstations in company offices and organizations to share
resources (e.g., printers) and exchange information. LANs are distinguished from other
kinds of networks by three characteristics:
LANs are restricted in size, which means that the worst-case transmission time is bounded and
known in advance. Knowing this bound makes it possible to use certain kinds of designs that
would not otherwise be possible. It also simplifies network management. Traditional LANs
3
run at speeds of 10 Mbps to 100 Mbps, have low delay (microseconds or nanoseconds), and
make very few errors. Newer LANs operate at up to 10 Gbps.
Advantages
• Extremely efficient and provide fast communication via high-speed carriers, such as
fiber optic cables
• Good backbone for larger networks and provides greater access to WAN
In most WANs, the network contains numerous transmission lines, each one connecting a pair of
routers. If two routers that do not share a transmission line wish to communicate, they must do
this indirectly, via other routers. When a packet is sent from one router to another via one or
more intermediate routers, the packet is received at each intermediate router in its entirety,
stored there until the required output line is free, and then forwarded. A subnet organized
according to this principle is called a store-and-forward or packet-switched subnet. Nearly
all wide area networks (except those using satellites) have store-and-forward subnets. When
the packets are small and all the same size, they are often called cells. The principle of a packet-
switched WAN is so important. Generally, when a process on some host has a message to be
sent to a process on some other host, the sending host first cuts the message into packets, each
one bearing its number in the sequence. These packets are then injected into the network one at
a time in quick succession. The packets are transported individually over the network and
deposited at the receiving host, where they are reassembled into the original message and
4
delivered to the receiving process. Not all WANs are packet switched. A second possibility
for a WAN is a satellite system. Each router has an antenna through which it can send and
receive. All routers can hear the output from the satellite, and in some cases, they can also
hear the upward transmissions of their fellow routers to the satellite as well. Sometimes the
routers are connected to a substantial point-to-point subnet, with only
5
some of them having a satellite antenna. Satellite networks are inherently broadcast and are
most useful when the broadcast property is important.
Advantages
Disadvantages
• Data security
• Network is very complex and management is difficult
• As size increases, the networks become more expensive
Data communications are the exchange of data between two devices via some form of transmission
medium such as a wire cable.
6
Simplex :
Communication is always unidirectional, i.e., one device will transmit and other will receive.
E.g., Keyboard, traditional monitors, etc.
Half Duplex :
Communication is in both directions but not at the same time, i.e, if one device is sending, the
other will receive and vice-versa. E.g., Walkie-Talkies.
Full Duplex :
Communication is in both directions simultaneously, i.e, device can send and receive data at the
same time. E.g., telephone Line.
What are Network Protocols ?
Network protocols are sets of established rules that dictate how to format, transmit and receive
data so computer network devices — from servers and routers to endpoints – can communicate
regardless of the differences in their underlying infrastructures, designs or standards.
Why do we need Network Protocols ?
We need Network Protocols for :
1. Message encoding
2. Message formatting and encapsulation
3. Message timing
4. Message size
5. Message delivery options
Types of Computer Networks :
Client-Server Peer-to-Peer(P2P)
The server manages the network. No central control over the network.
The server can be upgraded to be made more If machines on the network are slow they
powerful to cope with high command. will slow down other machines.
https://www.geeksforgeeks.org/classification-of-computer-network-on-basis-of-architecture/
P2P Advantages :
Advantages /Disadvantaes :
A special Network Operating System (NOS) is provided by server to provide resources to
many users that request them.
It is also very easy and simple to set up and manage data updates. This is because data is
generally stored in centralized manner on server.
The server usually controls resources and data security.
This network also boosts speed of sharing resources.
If anyhow server goes down or crashes, entire will be affected by this.
It is very expensive as compared to P2P. This is due to need for server with greater memory
as well as need for many networking devices such as hubs, routers, switches, etc.
Cost of NOS being provided is very high.
https://www.geeksforgeeks.org/client-server-model/
9
https://www.geeksforgeeks.org/difference-between-client-server-and-peer-to-peer-network/
Client-Server Network: In Client-Server Network, Centralized server is used to store the data.
Peer-to-Peer Network: This model does not differentiate the clients and the servers. In this each
and every node is itself client and server. In Peer-to-Peer Network, Each and every node can do
both request and respond for the services.
https://www.simplilearn.com/what-is-client-server-architecture-article
The client/user uses their web browser to enter the URL they want
The browser asks the Domain Name System (DNS) for an IP address
The DNS server finds the desired server’s IP address and sends it to the web browser
The browser creates either an HTTPS or HTTP request
The server/producer sends the user the correct files
The client/user receives the files sent by the server, and the process is repeated as needed
The Advantages and Disadvantages of Client-Server Architecture
Client-server architecture brings its share of positives and negatives to today’s digital consumers. We
start with a list of advantages:
It’s a centralized system that keeps all the data and its controls in one place
It brings a high level of scalability, organization, and efficiency
It allows the IT staff to change the Client and Server capacities separately
It’s cost-efficient, especially in terms of maintenance
It allows data recovery
It allows load-balancing, which optimizes performance
It allows different platforms to share resources
10
Users don’t need to log into a terminal or another processor to access corporate information or
desktop tools like PowerPoint presenters or spreadsheet utilities
The setup reduces the incidence of data replication
Naturally, client-server architecture isn’t all sunshine and lollipops. Here are the downsides:
If the server has a worm, virus, or Trojan, the users will likely catch it since the network consists of
linked clients and servers
The server is vulnerable to Denial of Service (DoS) attacks
Data packets can be spoofed or modified during transmission
It’s expensive to start up and initially implement
If a critical server goes down, the clients are dead in the water
The setup is prone to phishing and Man in the Middle (MITM) attacks
https://teachcomputerscience.com/client-server-architecture/
11
8. It offers service incorporation, which ensures that it allows user authorization to view
business data through its device and to delete any inappropriate access for logging in.
9. Clients have the facility to share any resources at various platforms and places.
10. The client-server design is implemented on a distributed model basis, ensuring that the server
is replaced, restored, upgraded and moved without influencing the client.
11. The architecture can tackle massive weight given clients, systems, devices and network loads.
12. The architecture provides an easy user interface, file finding procedure and management
system for keeping all the files in an organized pattern.
13. The architecture facilitates the data overwhelming by the reduction in data replication.
Client-Server Architecture Disadvantages:
The limitations of the client-server architecture are focused below.
1. The users will suffer if the primary server goes dump.
2. The architecture requires a particular OS related to networking.
3. Configuration of Hardware components and software tools utilize plenty of costs.
4. There is a need for technical as well as skilled staff for maintenance of the network specifically
for server machines.
5. Numerous requests simultaneously can cause ―traffic congestion problems‖.
6. The architecture can mostly be availed in large organizations and enterprises as the cost is
unbearable for typical clients.
Peer to Peer & Client-Server Network, Differences:
Table 1: Difference between Client-Server and Peer to Peer Networks
S.
Client-Server Network Peer to Peer Network
No.
Clients and Servers are specified as both the systems No differentiation between clients and
1
are distinct servers
The approach is more expensive than the P2P The technique is cheaper than a client-
5
network. server network.
This kind of networking technology is used for P2P networks are commonly used by a
6
small and enlarged networks. few users, mostly less than ten devices.
1. https://www.geeksforgeeks.org/what-is-computer-networking/
2. https://www.geeksforgeeks.org/tcp-ip-model/
3. https://www.geeksforgeeks.org/layers-of-osi-model/
4.
5. https://www.geeksforgeeks.org/computer-network-tutorials/
6.
7.
8.
12
9. https://www.geeksforgeeks.org/network-devices-hub-repeater-bridge-switch-router-
gateways/
10.
https://en.wikipedia.org/wiki/IP_address
a. geeksforgeeks.org/what-is-an-ip-address
All the computers of the world on the Internet network communicate with each other with
underground or underwater cables or wirelessly. To download a file from the internet or
load a web page or literally do anything related to the internet, our computer must
have an address so that other computers can find and locate our in order to deliver
that particular file or webpage that we are requesting. In technical terms, that address is
called IP Address or Internet Protocol Address.
Let us understand it with another example, like if someone wants to send you a mail then
he/she must have your home address. Similarly, your computer too needs an address so that
other computers on the internet can communicate with each other without the confusion of
delivering information to someone else’s computer. And that is why each computer in this
world has a unique IP Address. Or in other words, an IP address is a unique address that is
used to identify computers or nodes on the internet.
Working of IP addresses
The working of IP addresses is similar to other languages. It can also use some set of rules to send
information. Using these protocols we can easily send, and receive data or files to the connected
devices. There are several steps behind the scenes. Let us look at them
Your device directly requests your Internet Service Provider which then grants your device
access to the web.
And an IP Address is assigned to your device from the given range available.
Your internet activity goes through your service provider, and they route it back to you,
using your IP address.
Your IP address can change. For example, turning your router on or off can change your IP
Address.
When you are out from your home location your home IP address doesn’t accompany you. It
changes as you change the network of your device.
Classes of IPv4 Address: There are around 4.3 billion IPv4 addresses and managing all those
addresses without any scheme is next to impossible. Let’s understand it with a simple example. If
you have to find a word from a language dictionary, how long will it take? Usually, you will take
13
less than 5 minutes to find that word. You are able to do this because words in the dictionary are
organized in alphabetical order. If you have to find out the same word from a dictionary that
doesn’t use any sequence or order to organize the words, it will take an eternity to find the word. If
a dictionary with one billion words without order can be so disastrous, then you can imagine the
pain behind finding an address from 4.3 billion addresses. For easier management and assignment
IP addresses are organized in numeric order and divided into the following 5 classes :
IP Class Address Range Maximum number of networks
Classification of IP Address
An IP address is classified into the following types:
1. Public IP Address: This address is available publicly and it is assigned by your network
provider to your router, which further divides it to your devices. Public IP Addresses are of two
types,
Dynamic IP Address: When you connect a smartphone or computer to the internet, your
Internet Service Provider provides you an IP Address from the range of available IP
Addresses. Now, your device has an IP Address and you can simply connect your device to
the Internet and send and receive data to and from your device. The very next time when you
try to connect to the internet with the same device, your provider provides you with different
IP Addresses to the same device and also from the same available range. Since IP Address
keeps on changing every time when you connect to the internet, it is called a Dynamic IP
Address.
Static IP Address: Static address never changes. They serve as a permanent internet address.
These are used by DNS servers. What are DNS servers? Actually, these are computers that
help you to open a website on your computer. Static IP Address provides information such as
device is located on which continent, which country, which city, and which Internet Service
Provider provides internet connection to that particular device. Once, we know who is the
ISP, we can trace the location of the device connected to the internet. Static IP Addresses
provide less security than Dynamic IP Addresses because they are easier to track.
b. https://www.geeksforgeeks.org/structure-and-types-of-ip-address/
An IP address represents an Internet Protocol address. A unique address that identifies the device
over the network. It is almost like a set of rules governing the structure of data sent over the
Internet or through a local network. An IP address helps the Internet to distinguish between
different routers, computers, and websites. It serves as a specific machine identifier in a specific
network and helps to improve visual communication between source and destination.
14
IP address structure: IP addresses are displayed as a set of four digits- the default address may be
192.158.1.38. Each number on the set may range from 0 to 255. Therefore, the total IP address range
ranges from 0.0.0.0 to 255.255.255.255.
IP address is basically divided into two parts: X1. X2. X3. X4
1. [X1. X2. X3] is the Network ID
2. [X4] is the Host ID
1. Network ID–
It is the part of the left-hand IP address that identifies the specific network where the device is
located. In the normal home network, where the device has an IP address 192.168.1.32, the
192.168.1 part of the address will be the network ID. It is customary to fill in the last part that is
not zero, so we can say that the device’s network ID is 192.168.1.0.
2. Hosting ID–
The host ID is part of the IP address that was not taken by the network ID. Identifies a specific
device (in the TCP / IP world, we call devices ―host‖) in that network. Continuing with our
example of the IP address 192.168.1.32, the host ID will be 32- the unique host ID on the
192.168.1.0 network.
1. Static IP Address–
A static IP address is an invalid IP address. Conversely, a dynamic IP address will be provided
by the Dynamic Host Configuration Protocol (DHCP) server, which can change. The Static IP
address does not change but can be changed as part of normal network management.
Static IP addresses are incompatible, given once, remain the same over the years. This type of IP
also helps you get more information about the device.
2. Dynamic IP address–
It means constant change. A dynamic IP address changes from time to time and is not always
the same. If you have a live cable or DSL service, you may have a strong IP address. Internet
Service Providers provide customers with dynamic IP addresses because they are too
expensive. Instead of one permanent IP address, your IP address is taken out of the address
pool and assigned to you. After a few days, weeks, or sometimes even months, that number is
returned to the lake and given a new number. Most ISPs will not provide a static IP address to
customers who live there and when they do, they are usually more expensive. Dynamic IP
addresses are annoying, but with the right software, you can navigate easily and for free.
c. https://www.geeksforgeeks.org/introduction-of-classful-ip-addressing/
15
Hexadecimal Notation:
Classful Addressing
The 32 bit IP address is divided into five sub-classes. These are:
Class A
Class B
Class C
Class D
Class E
Each of these classes has a valid range of IP addresses. Classes D and E are reserved for multicast
and experimental purposes respectively. The order of bits in the first octet determine the classes of
IP address.
IPv4 address is divided into two parts:
Network ID
Host ID
The class of IP address is used to determine the bits used for network ID and host ID and the
number of total networks and hosts possible in that particular class. Each ISP or network
administrator assigns IP address to each device that is connected to its network.
16
Note: IP addresses are globally managed by Internet Assigned Numbers Authority(IANA) and
regional Internet registries(RIR).
Note: While finding the total number of host IP addresses, 2 IP addresses are not counted and are
therefore, decreased from the total count because the first IP address of any network is the network
number and whereas the last IP address is reserved for broadcast IP.
Class A:
IP address belonging to class A are assigned to the networks that contain a large number of hosts.
The network ID is 8 bits long.
The host ID is 24 bits long.
The higher order bit of the first octet in class A is always set to 0. The remaining 7 bits in first octet
are used to determine network ID. The 24 bits of host ID are used to determine the host in any
network. The default subnet mask for class A is 255.x.x.x. Therefore, class A has a total of:
2^7-2= 126 network ID(Here 2 address is subtracted because 0.0.0.0 and 127.x.y.z are special
address. )
2^24 – 2 = 16,777,214 host ID
IP addresses belonging to class A ranges from 1.x.x.x – 126.x.x.x
Class B:
IP address belonging to class B are assigned to the networks that ranges from medium-sized to
large-sized networks.
The network ID is 16 bits long.
The host ID is 16 bits long.
The higher order bits of the first octet of IP addresses of class B are always set to 10. The remaining
14 bits are used to determine network ID. The 16 bits of host ID is used to determine the host in any
network. The default sub-net mask for class B is 255.255.x.x. Class B has a total of:
2^14 = 16384 network address
2^16 – 2 = 65534 host address
IP addresses belonging to class B ranges from 128.0.x.x – 191.255.x.x.
Class C:
IP address belonging to class C are assigned to small-sized networks.
The network ID is 24 bits long.
The host ID is 8 bits long.
The higher order bits of the first octet of IP addresses of class C are always set to 110. The
remaining 21 bits are used to determine network ID. The 8 bits of host ID is used to
determine the host in any network. The default sub-net mask for class C is 255.255.255.x.
Class C has a total of:
2^21 = 2097152 network address
2^8 – 2 = 254 host address
17
IP addresses belonging to class C ranges from 192.0.0.x – 223.255.255.x.
d. https://www.geeksforgeeks.org/what-is-ipv4/
Parts of IPv4
Network part:
The network part indicates the distinctive variety that’s appointed to the network. The network
part conjointly identifies the category of the network that’s assigned.
Host Part:
The host part uniquely identifies the machine on your network. This part of the IPv4 address
is assigned to every host.
For each host on the network, the network part is the same, however, the host half must vary.
Subnet number:
This is the nonobligatory part of IPv4. Local networks that have massive numbers of hosts are
divided into subnets and subnet numbers are appointed to that.
Characteristics of IPv4
IPv4 could be a 32-Bit IP Address.
IPv4 could be a numeric address, and its bits are separated by a dot.
The number of header fields is twelve and the length of the header field is twenty.
It has Unicast, broadcast, and multicast style of addresses.
IPv4 supports VLSM (Virtual Length Subnet Mask).
IPv4 uses the Post Address Resolution Protocol to map to the MAC address.
RIP may be a routing protocol supported by the routed daemon.
Networks ought to be designed either manually or with DHCP.
Packet fragmentation permits from routers and causing host.
Advantages of IPv4
IPv4 security permits encryption to keep up privacy and security.
IPV4 network allocation is significant and presently has quite 85000 practical routers.
It becomes easy to attach multiple devices across an outsized network while not NAT.
18
This is a model of communication so provides quality service also as economical knowledge
transfer.
IPV4 addresses are redefined and permit flawless encoding.
Routing is a lot of scalable and economical as a result of addressing is collective more
effectively.
Data communication across the network becomes a lot of specific in multicast organizations.
Limits net growth for existing users and hinders the use of the net for brand new
users.
Internet Routing is inefficient in IPv4.
IPv4 has high System Management prices and it’s labor-intensive, complex, slow &
frequent to errors.
Security features are nonobligatory.
Difficult to feature support for future desires as a result of adding it on is extremely
high overhead since it hinders the flexibility to attach everything over IP.
e. https://www.geeksforgeeks.org/difference-between-mac-address-and-ip-address/
Both MAC Address and IP Address are used to uniquely define a device on the internet. NIC
Card’s Manufacturer provides the MAC Address, on the other hand, Internet Service Provider
provides IP Address.
The main difference between MAC and IP address is that MAC Address is used to ensure the
physical address of the computer. It uniquely identifies the devices on a network. While IP
addresses are used to uniquely identifies the connection of the network with that device takes part
in a network.
Let’s see the difference between MAC Address and IP Address:
S.NO MAC Address IP Address
MAC Address stands for Media Access IP Address stands for Internet Protocol
1. Control Address. Address.
A device attached with MAC Address can A device attached with IP Address can retrieve
3. retrieve by ARP protocol. by RARP protocol.
MAC Address is used to ensure the IP Address is the logical address of the
5. physical address of a computer. computer.
MAC Address helps in simply identifying IP Address identifies the connection of the
7. the device. device on the network.
19
S.NO MAC Address IP Address
MAC Address of computer cannot be IP Address modifies with the time and
8. changed with time and environment. environment.
MAC address help to solve IP address IP addresses never able to solve MAC address
13. issue. issues.
MAC addresses can be used for The IP address can be used for broadcasting or
14. broadcasting. multicasting.
https://www.javatpoint.com/computer-network-architecture
Computer Network Architecture is defined as the physical and logical design of the software,
hardware, protocols, and media of the transmission of data. Simply we can say that how computers
are organized and how tasks are allocated to the computer.
The two types of network architectures are used:
o Peer-To-Peer network
o Client/Server network
Peer-To-Peer network
o Peer-To-Peer network is a network in which all the computers are linked together with equal
privilege and responsibilities for processing the data.
20
o Peer-To-Peer network is useful for small environments, usually up to 10 computers.
o Peer-To-Peer network has no dedicated server.
o Special permissions are assigned to each computer for sharing the resources, but this can lead
to a problem if the computer with the resource is down.
AD
Client/Server Network
o Client/Server network is a network model designed for the end users called clients, to access
the resources such as songs, video, etc. from a central computer known as Server.
o The central controller is known as a server while all other computers in the network are
called clients.
o A server performs all the major operations such as security and network management.
o A server is responsible for managing all the resources such as files, directories, printer, etc.
o All the clients communicate with each other through a server. For example, if client1 wants to
send some data to client 2, then it first sends the request to the server for the permission. The
server sends the response to the client 1 to initiate its communication with the client 2.
f. https://www.geeksforgeeks.org/difference-between-private-and-public-ip-addresses/
g. https://www.geeksforgeeks.org/difference-between-ip-address-and-port-number/
h. https://www.geeksforgeeks.org/private-ip-addresses-in-networking/
i. https://www.geeksforgeeks.org/what-is-ipv6/
j. https://www.geeksforgeeks.org/what-is-ipv4/
k. https://www.geeksforgeeks.org/differences-between-ipv4-and-ipv6/
l.
21
My classes are always going to be full of relevant information that is certainly not included in the
syllabus.
An IP address serves two principal functions: it identifies the host, or more specifically
its network interface, and it provides the location of the host in the network, and thus the capability
of establishing a path to that host. Its role has been characterized as follows: "A name indicates what
we seek. An address indicates where it is. A route indicates how to get there."[2] The header of each IP
packet contains the IP address of the sending host and that of the destination host.
22