SlideShare a Scribd company logo
Peer to peer networking.


What is it?



Peer to peer network is simply a connection going directly without a
server.



It can be a small scale connection with copper wires connected or a
larger scale network via protocols within the computers in the
internet.



Computers running a peer to peer network run the same software
and the networking protocols.
Benefits and constraints.


BENEFITS



CONSTRAINTS



Easy installation and
configuration.





The connection is more reliable
even if one connection is
damaged it does not affect the
other computers on the network.

Less security. Viruses and trojans
can be passed very easily since
less protection.



Data recovery and backup
systems are very weak where
every computer in this network
should have their own backups in
case of data loss.



No proper administrator to control
the whole accessibility of the
network.



Every user can control the
network via a shared resource.



Connection startup is very cost
effective.No need of a networking
operating system.
Client server





In a network where a single powerful computer is centralized
as a server and other normal computers(clients) are
connected to this central computer, this type of network is
called a client server network.
Here the server’s responsibility is to distribute the commands
to the service requests issued by the clients.
A server is a host that is running one or more server
programs which share their resources with the clients.
Benefits

Constraints



It has a centralized architecture where
the server helps the whole network
setup.



Not as effective as a P2P network. If
the server goes down the whole
network system goes down.



There is a proper management where
an administrator can take control of
the whole network and easily access
the files.



Can lead to congestions if there is a
load of client requests from the
servers.



Need to allocate an associate for
controlling and maintaining the server.



Data backup and file recovery is
possible via the server.



Security is much effective in this
platform where the server can
determine the access rights and
usage.

Benefits and constraints.
Centralized network
This a network where everything is connected to a
central server.
 It stores both the user account and the other
information of the user.

Benefits


Files can be transferred from one
computer to another easily



Centralized printers.



Very expensive



Need of a system administrator to
control the server.

All updates can be run through the
server where it will update the whole
network applications.





Centralized information



Constraints

Centralized Data backup.

Benefits and constraints.
Cluster networking.




The word "cluster" is used broadly in computer networking to
refer to a number of different implementations of shared
computing resources.
Typically, a cluster integrates the resources of two or more
computing devices .
Benefits

Constraints

High availability for the
end users
 Highly reliable.





It requires more
hardware to maintain
 Not much flexible
 Not cost effective

Benefits and constraints.
Virtual networking


It is done by combining hardware and software
network resources and network functionality into a
single, software-based administrative entity.
Benefits

Constrains

They reduce the
hardware components
 Cost effective
 High security





This type of network has
to depend on protocols
other than IP standards.

Benefits and constraints.
Cloud based


Cloud computing is a type of computing that relies
on sharing computing resources rather than having
local servers or personal devices to handle
applications.
Benefits





Very cost effective
Easy backup and
recovery
Easy access to
information and data

Constrains




Security in the cloud
High chances of prone
attacks.

Benefits and constraints.

More Related Content

What's hot

ISDN
ISDNISDN
ISDN
Singh_Trn
 
Multiple Access Techniques for 5G
Multiple Access Techniques for 5GMultiple Access Techniques for 5G
Multiple Access Techniques for 5G
Sitha Sok
 
network Switch
 network Switch network Switch
network Switch
zeeshan hanif
 
Types of networking
Types of networkingTypes of networking
Types of networking
Natasha Maqbool
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryption
RK Nayak
 
Basic Concepts in Wireless LAN
Basic Concepts in Wireless LANBasic Concepts in Wireless LAN
Basic Concepts in Wireless LAN
Dr Shashikant Athawale
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentation
bcdran
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
vasanthimuniasamy
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt
Sabreen Irfana
 
Types of Networking Devices
Types of Networking DevicesTypes of Networking Devices
Types of Networking Devices
Shubham Bathe
 
Computer network answer
Computer network answerComputer network answer
Computer network answer
Md. Mashiur Rahman
 
Bluetooth presentation
Bluetooth presentationBluetooth presentation
Bluetooth presentation
DhairYash Kotwani
 
Transmission media
Transmission mediaTransmission media
Transmission media
kinish kumar
 
Routing
RoutingRouting
Routing
Saima Azam
 
ZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY pptZIGBEE TECHNOLOGY ppt
EC8551 COMMUNICATION NETWORKS
EC8551 COMMUNICATION NETWORKSEC8551 COMMUNICATION NETWORKS
EC8551 COMMUNICATION NETWORKS
GOWTHAMMS6
 
Wireless networks mcq
Wireless networks mcqWireless networks mcq
Wireless networks mcq
Santhosh Krishna
 
Network Layer
Network LayerNetwork Layer
Network Layer
reshmadayma
 
First and second generation communication
First and second generation communicationFirst and second generation communication
First and second generation communication
Muhammad Uzair Rasheed
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
kirbadh
 

What's hot (20)

ISDN
ISDNISDN
ISDN
 
Multiple Access Techniques for 5G
Multiple Access Techniques for 5GMultiple Access Techniques for 5G
Multiple Access Techniques for 5G
 
network Switch
 network Switch network Switch
network Switch
 
Types of networking
Types of networkingTypes of networking
Types of networking
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryption
 
Basic Concepts in Wireless LAN
Basic Concepts in Wireless LANBasic Concepts in Wireless LAN
Basic Concepts in Wireless LAN
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentation
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt
 
Types of Networking Devices
Types of Networking DevicesTypes of Networking Devices
Types of Networking Devices
 
Computer network answer
Computer network answerComputer network answer
Computer network answer
 
Bluetooth presentation
Bluetooth presentationBluetooth presentation
Bluetooth presentation
 
Transmission media
Transmission mediaTransmission media
Transmission media
 
Routing
RoutingRouting
Routing
 
ZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY pptZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY ppt
 
EC8551 COMMUNICATION NETWORKS
EC8551 COMMUNICATION NETWORKSEC8551 COMMUNICATION NETWORKS
EC8551 COMMUNICATION NETWORKS
 
Wireless networks mcq
Wireless networks mcqWireless networks mcq
Wireless networks mcq
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
First and second generation communication
First and second generation communicationFirst and second generation communication
First and second generation communication
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
 

Viewers also liked

Peer-to-Peer Streaming Based on Network Coding Decreases Packet Jitter
Peer-to-Peer Streaming Based on Network Coding Decreases Packet JitterPeer-to-Peer Streaming Based on Network Coding Decreases Packet Jitter
Peer-to-Peer Streaming Based on Network Coding Decreases Packet Jitter
Alpen-Adria-Universität
 
Formalizing Peer-to-Peer Systems based on Content Addressable Network
Formalizing Peer-to-Peer Systems based on Content Addressable NetworkFormalizing Peer-to-Peer Systems based on Content Addressable Network
Formalizing Peer-to-Peer Systems based on Content Addressable Network
Faculty of Computer Science
 
Device & Types of Networking
Device & Types of NetworkingDevice & Types of Networking
Device & Types of Networking
Orion soft technologies khairpur
 
Common types of networks(networking)
Common types of networks(networking)Common types of networks(networking)
Common types of networks(networking)
welcometofacebook
 
Peer to peer
Peer to peerPeer to peer
Peer to peer
Raymond Douglas
 
Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks
Venkatesh Iyer
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
icanhasfay
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And Software
Steven Cahill
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
Ashita Agrawal
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
Sai Sakoji
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
Rajesh Sadhukha
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
Kak Yong
 

Viewers also liked (12)

Peer-to-Peer Streaming Based on Network Coding Decreases Packet Jitter
Peer-to-Peer Streaming Based on Network Coding Decreases Packet JitterPeer-to-Peer Streaming Based on Network Coding Decreases Packet Jitter
Peer-to-Peer Streaming Based on Network Coding Decreases Packet Jitter
 
Formalizing Peer-to-Peer Systems based on Content Addressable Network
Formalizing Peer-to-Peer Systems based on Content Addressable NetworkFormalizing Peer-to-Peer Systems based on Content Addressable Network
Formalizing Peer-to-Peer Systems based on Content Addressable Network
 
Device & Types of Networking
Device & Types of NetworkingDevice & Types of Networking
Device & Types of Networking
 
Common types of networks(networking)
Common types of networks(networking)Common types of networks(networking)
Common types of networks(networking)
 
Peer to peer
Peer to peerPeer to peer
Peer to peer
 
Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And Software
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 

Similar to Networking types

Kinds of networks
Kinds of networksKinds of networks
Kinds of networks
Ismail Mukiibi
 
Compare peer
Compare peerCompare peer
Compare peer
Ismail Mukiibi
 
Network archetecture
Network archetectureNetwork archetecture
Network archetecture
shah fahad
 
unit 4-1.pptx
unit 4-1.pptxunit 4-1.pptx
unit 4-1.pptx
prakashvs7
 
Advantages-and-Disadvantages-of-P2P-Network-Client-Server-Network.pdf
Advantages-and-Disadvantages-of-P2P-Network-Client-Server-Network.pdfAdvantages-and-Disadvantages-of-P2P-Network-Client-Server-Network.pdf
Advantages-and-Disadvantages-of-P2P-Network-Client-Server-Network.pdf
NanetteMaraonSansano1
 
Chapter 1 - Introduction to the basic concepts of networks.ppt
Chapter 1 - Introduction to the basic concepts of networks.pptChapter 1 - Introduction to the basic concepts of networks.ppt
Chapter 1 - Introduction to the basic concepts of networks.ppt
ssuser3acfba
 
Computer networking
Computer networkingComputer networking
Computer networking
tdsparks3
 
unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdf
shubhangisonawane6
 
Network administration Book
Network administration BookNetwork administration Book
Network administration Book
Muhammad Jawwad Hashmi
 
Networking basics
Networking basicsNetworking basics
Networking basics
Sahil Showkat
 
Networking course khurram shahzad
Networking course khurram shahzadNetworking course khurram shahzad
Networking course khurram shahzad
khurrak_shahzad
 
L4Network Architecture.pptx
L4Network Architecture.pptxL4Network Architecture.pptx
L4Network Architecture.pptx
GarimaJain745610
 
Clientserver
ClientserverClientserver
Clientserver
Madhumithah Ilango
 
SOFTWARE COMPUTING
SOFTWARE COMPUTINGSOFTWARE COMPUTING
SOFTWARE COMPUTING
DrThenmozhiKarunanit
 
Types of networks according to security
Types of networks according to securityTypes of networks according to security
Types of networks according to security
Amjad Afridi
 
PEER_TO_PEER SHARING PRESENTATION
PEER_TO_PEER SHARING PRESENTATIONPEER_TO_PEER SHARING PRESENTATION
PEER_TO_PEER SHARING PRESENTATION
Aseem Chakrabarthy
 
Sem 1 Ch 5
Sem 1 Ch 5Sem 1 Ch 5
Sem 1 Ch 5
aqeelhaider74
 
Types of networks according to security
Types of networks according to securityTypes of networks according to security
Types of networks according to security
Microbiology
 
Types of networks according
Types of networks accordingTypes of networks according
Types of networks according
Microbiology
 
Hardware1
Hardware1Hardware1
Hardware1
George Ranson
 

Similar to Networking types (20)

Kinds of networks
Kinds of networksKinds of networks
Kinds of networks
 
Compare peer
Compare peerCompare peer
Compare peer
 
Network archetecture
Network archetectureNetwork archetecture
Network archetecture
 
unit 4-1.pptx
unit 4-1.pptxunit 4-1.pptx
unit 4-1.pptx
 
Advantages-and-Disadvantages-of-P2P-Network-Client-Server-Network.pdf
Advantages-and-Disadvantages-of-P2P-Network-Client-Server-Network.pdfAdvantages-and-Disadvantages-of-P2P-Network-Client-Server-Network.pdf
Advantages-and-Disadvantages-of-P2P-Network-Client-Server-Network.pdf
 
Chapter 1 - Introduction to the basic concepts of networks.ppt
Chapter 1 - Introduction to the basic concepts of networks.pptChapter 1 - Introduction to the basic concepts of networks.ppt
Chapter 1 - Introduction to the basic concepts of networks.ppt
 
Computer networking
Computer networkingComputer networking
Computer networking
 
unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdf
 
Network administration Book
Network administration BookNetwork administration Book
Network administration Book
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Networking course khurram shahzad
Networking course khurram shahzadNetworking course khurram shahzad
Networking course khurram shahzad
 
L4Network Architecture.pptx
L4Network Architecture.pptxL4Network Architecture.pptx
L4Network Architecture.pptx
 
Clientserver
ClientserverClientserver
Clientserver
 
SOFTWARE COMPUTING
SOFTWARE COMPUTINGSOFTWARE COMPUTING
SOFTWARE COMPUTING
 
Types of networks according to security
Types of networks according to securityTypes of networks according to security
Types of networks according to security
 
PEER_TO_PEER SHARING PRESENTATION
PEER_TO_PEER SHARING PRESENTATIONPEER_TO_PEER SHARING PRESENTATION
PEER_TO_PEER SHARING PRESENTATION
 
Sem 1 Ch 5
Sem 1 Ch 5Sem 1 Ch 5
Sem 1 Ch 5
 
Types of networks according to security
Types of networks according to securityTypes of networks according to security
Types of networks according to security
 
Types of networks according
Types of networks accordingTypes of networks according
Types of networks according
 
Hardware1
Hardware1Hardware1
Hardware1
 

Recently uploaded

UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 

Recently uploaded (20)

UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 

Networking types

  • 1. Peer to peer networking.  What is it?  Peer to peer network is simply a connection going directly without a server.  It can be a small scale connection with copper wires connected or a larger scale network via protocols within the computers in the internet.  Computers running a peer to peer network run the same software and the networking protocols.
  • 2. Benefits and constraints.  BENEFITS  CONSTRAINTS  Easy installation and configuration.   The connection is more reliable even if one connection is damaged it does not affect the other computers on the network. Less security. Viruses and trojans can be passed very easily since less protection.  Data recovery and backup systems are very weak where every computer in this network should have their own backups in case of data loss.  No proper administrator to control the whole accessibility of the network.  Every user can control the network via a shared resource.  Connection startup is very cost effective.No need of a networking operating system.
  • 3. Client server    In a network where a single powerful computer is centralized as a server and other normal computers(clients) are connected to this central computer, this type of network is called a client server network. Here the server’s responsibility is to distribute the commands to the service requests issued by the clients. A server is a host that is running one or more server programs which share their resources with the clients.
  • 4. Benefits Constraints  It has a centralized architecture where the server helps the whole network setup.  Not as effective as a P2P network. If the server goes down the whole network system goes down.  There is a proper management where an administrator can take control of the whole network and easily access the files.  Can lead to congestions if there is a load of client requests from the servers.  Need to allocate an associate for controlling and maintaining the server.  Data backup and file recovery is possible via the server.  Security is much effective in this platform where the server can determine the access rights and usage. Benefits and constraints.
  • 5. Centralized network This a network where everything is connected to a central server.  It stores both the user account and the other information of the user. 
  • 6. Benefits  Files can be transferred from one computer to another easily  Centralized printers.  Very expensive  Need of a system administrator to control the server. All updates can be run through the server where it will update the whole network applications.   Centralized information  Constraints Centralized Data backup. Benefits and constraints.
  • 7. Cluster networking.   The word "cluster" is used broadly in computer networking to refer to a number of different implementations of shared computing resources. Typically, a cluster integrates the resources of two or more computing devices .
  • 8. Benefits Constraints High availability for the end users  Highly reliable.   It requires more hardware to maintain  Not much flexible  Not cost effective Benefits and constraints.
  • 9. Virtual networking  It is done by combining hardware and software network resources and network functionality into a single, software-based administrative entity.
  • 10. Benefits Constrains They reduce the hardware components  Cost effective  High security   This type of network has to depend on protocols other than IP standards. Benefits and constraints.
  • 11. Cloud based  Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications.
  • 12. Benefits    Very cost effective Easy backup and recovery Easy access to information and data Constrains   Security in the cloud High chances of prone attacks. Benefits and constraints.