The document discusses peer-to-peer (P2P) networks, where computers connect directly to share files, resources, and bandwidth without a centralized server. P2P networks allow for easy administration and accessibility but lack centralized security and version control. In contrast, client-server models use centralized servers to serve client requests, allowing for faster access and centralized security management but introducing single points of failure.
The document discusses peer-to-peer (P2P) networks, where computers connect directly to share files, resources, and bandwidth without a centralized server. P2P networks allow for easy administration and accessibility but lack centralized security and version control. In contrast, client-server models use centralized servers to serve client requests, allowing for faster access and centralized security management but introducing single points of failure.
The document discusses peer-to-peer (P2P) networks, where computers connect directly to share files, resources, and bandwidth without a centralized server. P2P networks allow for easy administration and accessibility but lack centralized security and version control. In contrast, client-server models use centralized servers to serve client requests, allowing for faster access and centralized security management but introducing single points of failure.
• Concept was popularized by file sharing systems such as the music-sharing
application Napster • P2P network is created when two or more PCs are connected and share resources without going through a separate server. • A couple of computers connected via a Universal Serial Bus to transfer files • Peers are both suppliers and consumers of resources • Access rights are governed by setting sharing permissions on individual machines. • New peers can join the group while old peers leave at any time • --> BitTorrent system, Skype. • More vulnerable • Routing attack, Denial of service UNSTRUCTTURED PEER TO PEER STRUCTURED PEER TO PEER ADVANTAGES DISADVANTAGES
• Use less expensive hardware • Not very secure
• Easy to administer • No central point for storage • User has full accessibility • Additional load on computer because • Ideal for small business and home users of resource sharing • No NOS required • Hard to maintain version control • Easy setup and low costsecure • May have duplication of resources • Difficult to uphold security policy CLIENT SERVER MODEL • Request service, called clients and provide service are called sever • Server is often designed to be a centralized system that serves many clients. • Clients and servers communicate over a computer network on separate hardware • Clients and servers exchange messages in a request response messaging pattern • To prevent abuse and maximize uptime, the server's software limits • how a client can use the server's resources. A denial of service attack exploits a server's obligation to process ADVANTAGES DISADVANTAGES
• Centralized security • Central point of failure
• Faster accesss • Administrator required • Single password • Server software required • Can cause network congestion