SlideShare a Scribd company logo
Peer to peer network
And
Client- server
PEER TO PEER
 Peer to peer is an approach to computer
networking where all computers share
equivalent responsibility for processing
data. Peer-to-peer networking (also known
simply as peer networking) differs from
client-server networking, where certain
devices have responsibility for providing or
"serving" data and other devices consume
or otherwise act as "clients" of those
servers
Characteristics of a Peer
Network
 Peer to peer networking is common on
small local area networks (LANs),
particularly home networks. Both wired
and wireless home networks can be
configured as peer to peer environments
Benefits of a Peer to Peer
Network
 You can configure computers in peer to
peer workgroups to allow sharing of
files, printers and other resources
across all of the devices. Peer networks
allow data to be shared easily in both
directions, whether for downloads to
your computer or uploads from your
computer.
Advantages of peer to peer
network
 1) It is easy to install and so is the configuration of
computers on this network,
2) All the resources and contents are shared by all the
peers, unlike server-client where Server shares all the
contents and resources.
3) P2P is more reliable as central dependency is
eliminated. Failure of one peer doesn’t affect the
functioning of other peers. In case of Client –Server
network, if server goes down whole network gets affected.
4) There is no need for full-time System Administrator.
Every user is the administrator of his machine. User can
control their shared resources.
5) The over-all cost of building and maintaining this type
of network is comparatively very less.
Disadvantages of peer to peer
network
 Because each computer might be being
accessed by others it can slow down the
performance for the user
 Files and folders cannot be centrally
backed up
Security is not good and you can set
passwords for files that you don’t want
people to access but apart from that the
security is pretty poor.
Client - server
 The term client-server refers to a
popular model for computer networking
that utilizes client and server devices
each designed for specific purposes.
The client-server model can be used on
the Internet as well as local area
networks (LANs). Examples of client-
server systems on the Internet include
Web browsers and Web servers, FTP
clients and servers, and the DNS.
Characteristics of a client -
server
 Sends requests to the server
 It expects and receives responses from
the server.
Benefits Of Client Server
 All data are centralized on a single
server, simplifying security checks and
updates data and software.
 The technology supporting the client -
server are more mature than others.
 A level administration server, customers
have little importance in this model, they
have less need to be administered
List of clients
Advantages of client- server
 A client server enables the roles and
responsibilities of a computing system. This
means that it can update all the computers
connected to it. An example of this would be
software updates or hardware updates.
 The security is a lot more advanced than a
peer to peer network. You can have passwords
to your won profile so that no one can access
everything when they want. And the level off
access range in different organizations
 Many mature client-server technologies are
already available which were designed to
ensure security, 'friendliness' of the user
interface, and ease of use
Disadvantages of client- server
 When the server goes down or crashes.
All the computers connected to it
become unavailable to use
 More expensive than a peer to peer
network. You have to pay for start up
cost
 When you expand the server it starts to
slow down due to the Bit rate per
second.

More Related Content

What's hot

An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networking
Jafar Nesargi
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
kieshore
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
Nitin16498
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
Uc Man
 
Remote desktop connection
Remote desktop connectionRemote desktop connection
Remote desktop connection
Jasleen Kaur (Chandigarh University)
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
Kailash Kumar
 
Networking devices
Networking devicesNetworking devices
Networking devices
university of Gujrat, pakistan
 
Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals
Kirti Verma
 
Common Network Services
Common Network ServicesCommon Network Services
Common Network Services
ŐŔaṉģ Zaib
 
Domain Name System ppt
Domain Name System pptDomain Name System ppt
Client Server Network By Usman Ihsan
Client Server Network By Usman IhsanClient Server Network By Usman Ihsan
Client Server Network By Usman Ihsan
Subhan_Virk_UAF
 
Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver PresentationTuhin_Das
 
Peer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By AhnafPeer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By Ahnaf
ahnarokz
 
Computer Networking - Its Advantages & Disadvantages
Computer Networking - Its Advantages & DisadvantagesComputer Networking - Its Advantages & Disadvantages
Computer Networking - Its Advantages & Disadvantages
Rita Gokani
 
Computer network
Computer networkComputer network
Computer network
Neha Gupta
 
Basic components of a computer network
Basic components of a computer  networkBasic components of a computer  network
Basic components of a computer network
Edison Francis
 
Server configuration
Server configurationServer configuration
Server configuration
Aisha Talat
 
Presentation on data communication
Presentation on data communicationPresentation on data communication
Presentation on data communicationHarpreet Dhaliwal
 

What's hot (20)

An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networking
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
 
Remote desktop connection
Remote desktop connectionRemote desktop connection
Remote desktop connection
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals
 
Common Network Services
Common Network ServicesCommon Network Services
Common Network Services
 
Domain Name System ppt
Domain Name System pptDomain Name System ppt
Domain Name System ppt
 
Osi model
Osi modelOsi model
Osi model
 
Client Server Network By Usman Ihsan
Client Server Network By Usman IhsanClient Server Network By Usman Ihsan
Client Server Network By Usman Ihsan
 
Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver Presentation
 
Peer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By AhnafPeer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By Ahnaf
 
Computer Networking - Its Advantages & Disadvantages
Computer Networking - Its Advantages & DisadvantagesComputer Networking - Its Advantages & Disadvantages
Computer Networking - Its Advantages & Disadvantages
 
Computer network
Computer networkComputer network
Computer network
 
Basic components of a computer network
Basic components of a computer  networkBasic components of a computer  network
Basic components of a computer network
 
Server configuration
Server configurationServer configuration
Server configuration
 
Presentation on data communication
Presentation on data communicationPresentation on data communication
Presentation on data communication
 

Viewers also liked

Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Venkatesh Iyer
 
Peer-to-Peer Systems
Peer-to-Peer SystemsPeer-to-Peer Systems
Peer-to-Peer Systems
Uwe Schmidt
 
CLOUDSEC LONDON 2016 - Puneet Kukreja - Enabling Cloud Security -
CLOUDSEC LONDON 2016 - Puneet Kukreja - Enabling Cloud Security - CLOUDSEC LONDON 2016 - Puneet Kukreja - Enabling Cloud Security -
CLOUDSEC LONDON 2016 - Puneet Kukreja - Enabling Cloud Security -
Puneet Kukreja
 
Peer to-peer networks
Peer to-peer networksPeer to-peer networks
Peer to-peer networks
Nkosinathi Lungu
 
Citcism on Peer to peer networking
Citcism on Peer to peer networkingCitcism on Peer to peer networking
Citcism on Peer to peer networking
Webix.pk
 
Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)
sarmad ali
 
File Sharing
File SharingFile Sharing
File Sharing
Ripu Jain
 
AWS Adoption in FSI
AWS Adoption in FSIAWS Adoption in FSI
AWS Adoption in FSI
Amazon Web Services
 
Client Server Architecture
Client Server ArchitectureClient Server Architecture
Client Server ArchitectureRence Montanes
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks
Nicola Cerami
 
BaaS-platforms and open APIs in fintech l bank-as-a-service.com
BaaS-platforms and open APIs in fintech l bank-as-a-service.comBaaS-platforms and open APIs in fintech l bank-as-a-service.com
BaaS-platforms and open APIs in fintech l bank-as-a-service.com
Vladislav Solodkiy
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
Bhargav Amin
 
P2 p
P2 pP2 p
Peer to peer
Peer to peerPeer to peer
Peer to peer
Anh Quoc
 

Viewers also liked (15)

Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks
 
Peer-to-Peer Systems
Peer-to-Peer SystemsPeer-to-Peer Systems
Peer-to-Peer Systems
 
CLOUDSEC LONDON 2016 - Puneet Kukreja - Enabling Cloud Security -
CLOUDSEC LONDON 2016 - Puneet Kukreja - Enabling Cloud Security - CLOUDSEC LONDON 2016 - Puneet Kukreja - Enabling Cloud Security -
CLOUDSEC LONDON 2016 - Puneet Kukreja - Enabling Cloud Security -
 
Peer to-peer networks
Peer to-peer networksPeer to-peer networks
Peer to-peer networks
 
Citcism on Peer to peer networking
Citcism on Peer to peer networkingCitcism on Peer to peer networking
Citcism on Peer to peer networking
 
Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)
 
File Sharing
File SharingFile Sharing
File Sharing
 
AWS Adoption in FSI
AWS Adoption in FSIAWS Adoption in FSI
AWS Adoption in FSI
 
Client Server Architecture
Client Server ArchitectureClient Server Architecture
Client Server Architecture
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks
 
BaaS-platforms and open APIs in fintech l bank-as-a-service.com
BaaS-platforms and open APIs in fintech l bank-as-a-service.comBaaS-platforms and open APIs in fintech l bank-as-a-service.com
BaaS-platforms and open APIs in fintech l bank-as-a-service.com
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
 
P2 p
P2 pP2 p
P2 p
 
Peer to peer
Peer to peerPeer to peer
Peer to peer
 

Similar to Peer to peer

Advantages-and-Disadvantages-of-P2P-Network-Client-Server-Network.pdf
Advantages-and-Disadvantages-of-P2P-Network-Client-Server-Network.pdfAdvantages-and-Disadvantages-of-P2P-Network-Client-Server-Network.pdf
Advantages-and-Disadvantages-of-P2P-Network-Client-Server-Network.pdf
NanetteMaraonSansano1
 
Network archetecture
Network archetectureNetwork archetecture
Network archetecture
shah fahad
 
Types of networks according to security
Types of networks according to securityTypes of networks according to security
Types of networks according to security
Amjad Afridi
 
Running head SERVERS1Running head SERVERS1.docx
Running head SERVERS1Running head SERVERS1.docxRunning head SERVERS1Running head SERVERS1.docx
Running head SERVERS1Running head SERVERS1.docx
charisellington63520
 
unit 4-1.pptx
unit 4-1.pptxunit 4-1.pptx
unit 4-1.pptx
prakashvs7
 
SOFTWARE COMPUTING
SOFTWARE COMPUTINGSOFTWARE COMPUTING
SOFTWARE COMPUTING
DrThenmozhiKarunanit
 
Networking course khurram shahzad
Networking course khurram shahzadNetworking course khurram shahzad
Networking course khurram shahzad
khurrak_shahzad
 
unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdf
shubhangisonawane6
 
Types of networks according to security
Types of networks according to securityTypes of networks according to security
Types of networks according to security
Microbiology
 
Types of networks according
Types of networks accordingTypes of networks according
Types of networks according
Microbiology
 
Network architecture
Network architectureNetwork architecture
Network architecturelinghazali
 
L4Network Architecture.pptx
L4Network Architecture.pptxL4Network Architecture.pptx
L4Network Architecture.pptx
GarimaJain745610
 
Using Network
Using NetworkUsing Network
Using Network
Anjan Mahanta
 
client-server.pptx
client-server.pptxclient-server.pptx
client-server.pptx
EbukaChikodi
 

Similar to Peer to peer (20)

Advantages-and-Disadvantages-of-P2P-Network-Client-Server-Network.pdf
Advantages-and-Disadvantages-of-P2P-Network-Client-Server-Network.pdfAdvantages-and-Disadvantages-of-P2P-Network-Client-Server-Network.pdf
Advantages-and-Disadvantages-of-P2P-Network-Client-Server-Network.pdf
 
Networking types
Networking typesNetworking types
Networking types
 
Network archetecture
Network archetectureNetwork archetecture
Network archetecture
 
Compare peer
Compare peerCompare peer
Compare peer
 
Kinds of networks
Kinds of networksKinds of networks
Kinds of networks
 
Types of networks according to security
Types of networks according to securityTypes of networks according to security
Types of networks according to security
 
Running head SERVERS1Running head SERVERS1.docx
Running head SERVERS1Running head SERVERS1.docxRunning head SERVERS1Running head SERVERS1.docx
Running head SERVERS1Running head SERVERS1.docx
 
unit 4-1.pptx
unit 4-1.pptxunit 4-1.pptx
unit 4-1.pptx
 
SOFTWARE COMPUTING
SOFTWARE COMPUTINGSOFTWARE COMPUTING
SOFTWARE COMPUTING
 
Networking course khurram shahzad
Networking course khurram shahzadNetworking course khurram shahzad
Networking course khurram shahzad
 
unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdf
 
Types of networks according to security
Types of networks according to securityTypes of networks according to security
Types of networks according to security
 
Types of networks according
Types of networks accordingTypes of networks according
Types of networks according
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Hardware1
Hardware1Hardware1
Hardware1
 
Hardware1
Hardware1Hardware1
Hardware1
 
Clientserver
ClientserverClientserver
Clientserver
 
L4Network Architecture.pptx
L4Network Architecture.pptxL4Network Architecture.pptx
L4Network Architecture.pptx
 
Using Network
Using NetworkUsing Network
Using Network
 
client-server.pptx
client-server.pptxclient-server.pptx
client-server.pptx
 

Recently uploaded

Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 

Recently uploaded (20)

Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 

Peer to peer

  • 1. Peer to peer network And Client- server
  • 2. PEER TO PEER  Peer to peer is an approach to computer networking where all computers share equivalent responsibility for processing data. Peer-to-peer networking (also known simply as peer networking) differs from client-server networking, where certain devices have responsibility for providing or "serving" data and other devices consume or otherwise act as "clients" of those servers
  • 3.
  • 4. Characteristics of a Peer Network  Peer to peer networking is common on small local area networks (LANs), particularly home networks. Both wired and wireless home networks can be configured as peer to peer environments
  • 5. Benefits of a Peer to Peer Network  You can configure computers in peer to peer workgroups to allow sharing of files, printers and other resources across all of the devices. Peer networks allow data to be shared easily in both directions, whether for downloads to your computer or uploads from your computer.
  • 6. Advantages of peer to peer network  1) It is easy to install and so is the configuration of computers on this network, 2) All the resources and contents are shared by all the peers, unlike server-client where Server shares all the contents and resources. 3) P2P is more reliable as central dependency is eliminated. Failure of one peer doesn’t affect the functioning of other peers. In case of Client –Server network, if server goes down whole network gets affected. 4) There is no need for full-time System Administrator. Every user is the administrator of his machine. User can control their shared resources. 5) The over-all cost of building and maintaining this type of network is comparatively very less.
  • 7. Disadvantages of peer to peer network  Because each computer might be being accessed by others it can slow down the performance for the user  Files and folders cannot be centrally backed up Security is not good and you can set passwords for files that you don’t want people to access but apart from that the security is pretty poor.
  • 8. Client - server  The term client-server refers to a popular model for computer networking that utilizes client and server devices each designed for specific purposes. The client-server model can be used on the Internet as well as local area networks (LANs). Examples of client- server systems on the Internet include Web browsers and Web servers, FTP clients and servers, and the DNS.
  • 9. Characteristics of a client - server  Sends requests to the server  It expects and receives responses from the server.
  • 10. Benefits Of Client Server  All data are centralized on a single server, simplifying security checks and updates data and software.  The technology supporting the client - server are more mature than others.  A level administration server, customers have little importance in this model, they have less need to be administered
  • 11.
  • 13. Advantages of client- server  A client server enables the roles and responsibilities of a computing system. This means that it can update all the computers connected to it. An example of this would be software updates or hardware updates.  The security is a lot more advanced than a peer to peer network. You can have passwords to your won profile so that no one can access everything when they want. And the level off access range in different organizations  Many mature client-server technologies are already available which were designed to ensure security, 'friendliness' of the user interface, and ease of use
  • 14. Disadvantages of client- server  When the server goes down or crashes. All the computers connected to it become unavailable to use  More expensive than a peer to peer network. You have to pay for start up cost  When you expand the server it starts to slow down due to the Bit rate per second.