SlideShare a Scribd company logo
Peer-to-Peer Network
Prepared by:
EILLEN IVY A. PORTUGUEZ
Peer-to-Peer Network
 Devices are connected directly to each other without any additional
networking devices between them.
 Devices has equivalent capabilities and responsibilities.
 Network has no central point of control or administration
 Allows certain files to be shared with everyone or selected users.
 Common in small offices that do not use a dedicated file server.
Example of Peer-to-Peer Network
Client/Server Network
 The server provides the requested information or service
to the client.
 Servers commonly perform some of the processing work
for client machines.
 Servers maintained by network administrator.
 All the data on the network is stored on a centralized file
server.
Client/Server Network
 Shared printers on the network are managed by a
centralized print server.
 Network users with the proper permissions can access
both the data and shared printers.
 Each user must provide an authorized username and
password to gain access to network resources that he or
she is permitted to use.
Example of Client/Server Network
• Implemented the data
backups and security
measures of the
network
• Controls the users
access to the network
resources.
Individual Task
Comparison
Direction: Using the table below, cite the features of peer-to-peer
and client /server network that describes their difference.
Peer-to-Peer Network Client/Server Network
1.
2.
3.
4.
5.
Peer-to-Peer Study
Directions: Have a partner. Using different reference available
such as articles, books, internet and publications,
investigate and search for the advantages and
disadvantages of Peer-to-peer and Client/Server
network. You will present your readings in front of
the class and you will be rated according to the
rubrics for research and rubrics for oral
presentation.
RUBRICS FOR RESEARCH STUDY
Qualities & Criteria Poor(0-
80)
Good
(80-90)
Excellen
t (90-
100)
Format/Layout (15%)
* Presentation of the text
* Structuring of the text
Content/Information (70%)
* All the elements of the topics are addressed
* The information is technically sound
* Information based on careful research
* Coherence of Information
References (15%)
* Soundness of references
CRITERIA Developing
(has more than
seven errors)
Proficient
(has 4-7 errors)
Advance
(has no more
than 3 minor
errors)
1. Gave an interesting introduction
2. Presented clear explanation of topic
3. Presented information in logical manner
4. Used complete sentence
5. Offered a concluding summary
6. Spoke clearly, correctly, distinctly, and
confidently
7. Maintained eye contact with the audience
8. Maintained acceptable posture
9. Utilized audio-visual aids (creativity in
presentation
10. Handled questions & comments
TOTAL
GRAND TOTAL
ORAL PRESENTATION RUBRIC
-END-

More Related Content

What's hot

TLE 10 (ICT): Configuring a Wireless Router
TLE 10 (ICT): Configuring a Wireless RouterTLE 10 (ICT): Configuring a Wireless Router
TLE 10 (ICT): Configuring a Wireless Router
Romne Ryan Portacion
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2
wilfredo dela cerna
 
381091947 introduction-computer-systems-servicing-nc-ii
381091947 introduction-computer-systems-servicing-nc-ii381091947 introduction-computer-systems-servicing-nc-ii
381091947 introduction-computer-systems-servicing-nc-ii
hantos_cute
 
Peer to-peer networks
Peer to-peer networksPeer to-peer networks
Peer to-peer networks
Nkosinathi Lungu
 
2 set-up-computer-networks
2 set-up-computer-networks2 set-up-computer-networks
2 set-up-computer-networks
Rose Mary Ganiban
 
Maintain Computer Systems and Network.ppt
Maintain Computer Systems and Network.pptMaintain Computer Systems and Network.ppt
Maintain Computer Systems and Network.ppt
Julius Alcaria
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS Kak Yong
 
04 The Purpose of Straight-Through and Crossover Cables.pptx
04 The Purpose of Straight-Through and Crossover Cables.pptx04 The Purpose of Straight-Through and Crossover Cables.pptx
04 The Purpose of Straight-Through and Crossover Cables.pptx
Chellepia
 
Network operating system
Network operating systemNetwork operating system
Network operating system
John Carlo Catacutan
 
CBLM - Set Up Computer Network (CSS)
CBLM - Set Up Computer Network (CSS)CBLM - Set Up Computer Network (CSS)
CBLM - Set Up Computer Network (CSS)
Jean_SHS DepEd
 
CSS L13 STRUCTURED CABLING SYSTEM
CSS L13 STRUCTURED CABLING SYSTEMCSS L13 STRUCTURED CABLING SYSTEM
CSS L13 STRUCTURED CABLING SYSTEM
Marvin Bronoso
 
CSS L11 INTRODUCTION TO COMPUTER NETWORKING
CSS L11 INTRODUCTION TO COMPUTER NETWORKINGCSS L11 INTRODUCTION TO COMPUTER NETWORKING
CSS L11 INTRODUCTION TO COMPUTER NETWORKING
Marvin Bronoso
 
TLE ICT CSS 10 Information and task sheet 2.1 day 1
TLE ICT CSS 10 Information and task sheet 2.1 day 1TLE ICT CSS 10 Information and task sheet 2.1 day 1
TLE ICT CSS 10 Information and task sheet 2.1 day 1
Leonel Rivas
 
Parts of System Unit
Parts of System UnitParts of System Unit
Parts of System Unit
Sef Cambaliza
 
Configure Computer System and Network
Configure Computer System and NetworkConfigure Computer System and Network
Configure Computer System and Network
EILLEN IVY PORTUGUEZ
 
Tools, materials and equipment for networking
Tools, materials and equipment for networkingTools, materials and equipment for networking
Tools, materials and equipment for networking
shierly pabello
 
Networking Chapter 6
Networking Chapter 6Networking Chapter 6
Networking Chapter 6mlrbrown
 
The Basics of Network Troubleshooting
The Basics of Network TroubleshootingThe Basics of Network Troubleshooting
The Basics of Network Troubleshooting
zaisahil
 
CSS CORE 1 - INSTALL & CONFIGURE COMPUTER SYSTEMS AND NETWORKS
CSS CORE 1 - INSTALL & CONFIGURE COMPUTER SYSTEMS AND NETWORKSCSS CORE 1 - INSTALL & CONFIGURE COMPUTER SYSTEMS AND NETWORKS
CSS CORE 1 - INSTALL & CONFIGURE COMPUTER SYSTEMS AND NETWORKS
Eric Talamisan
 
ICT Orientation (CSS)
ICT Orientation (CSS)ICT Orientation (CSS)
ICT Orientation (CSS)
Ydel Capales
 

What's hot (20)

TLE 10 (ICT): Configuring a Wireless Router
TLE 10 (ICT): Configuring a Wireless RouterTLE 10 (ICT): Configuring a Wireless Router
TLE 10 (ICT): Configuring a Wireless Router
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2
 
381091947 introduction-computer-systems-servicing-nc-ii
381091947 introduction-computer-systems-servicing-nc-ii381091947 introduction-computer-systems-servicing-nc-ii
381091947 introduction-computer-systems-servicing-nc-ii
 
Peer to-peer networks
Peer to-peer networksPeer to-peer networks
Peer to-peer networks
 
2 set-up-computer-networks
2 set-up-computer-networks2 set-up-computer-networks
2 set-up-computer-networks
 
Maintain Computer Systems and Network.ppt
Maintain Computer Systems and Network.pptMaintain Computer Systems and Network.ppt
Maintain Computer Systems and Network.ppt
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 
04 The Purpose of Straight-Through and Crossover Cables.pptx
04 The Purpose of Straight-Through and Crossover Cables.pptx04 The Purpose of Straight-Through and Crossover Cables.pptx
04 The Purpose of Straight-Through and Crossover Cables.pptx
 
Network operating system
Network operating systemNetwork operating system
Network operating system
 
CBLM - Set Up Computer Network (CSS)
CBLM - Set Up Computer Network (CSS)CBLM - Set Up Computer Network (CSS)
CBLM - Set Up Computer Network (CSS)
 
CSS L13 STRUCTURED CABLING SYSTEM
CSS L13 STRUCTURED CABLING SYSTEMCSS L13 STRUCTURED CABLING SYSTEM
CSS L13 STRUCTURED CABLING SYSTEM
 
CSS L11 INTRODUCTION TO COMPUTER NETWORKING
CSS L11 INTRODUCTION TO COMPUTER NETWORKINGCSS L11 INTRODUCTION TO COMPUTER NETWORKING
CSS L11 INTRODUCTION TO COMPUTER NETWORKING
 
TLE ICT CSS 10 Information and task sheet 2.1 day 1
TLE ICT CSS 10 Information and task sheet 2.1 day 1TLE ICT CSS 10 Information and task sheet 2.1 day 1
TLE ICT CSS 10 Information and task sheet 2.1 day 1
 
Parts of System Unit
Parts of System UnitParts of System Unit
Parts of System Unit
 
Configure Computer System and Network
Configure Computer System and NetworkConfigure Computer System and Network
Configure Computer System and Network
 
Tools, materials and equipment for networking
Tools, materials and equipment for networkingTools, materials and equipment for networking
Tools, materials and equipment for networking
 
Networking Chapter 6
Networking Chapter 6Networking Chapter 6
Networking Chapter 6
 
The Basics of Network Troubleshooting
The Basics of Network TroubleshootingThe Basics of Network Troubleshooting
The Basics of Network Troubleshooting
 
CSS CORE 1 - INSTALL & CONFIGURE COMPUTER SYSTEMS AND NETWORKS
CSS CORE 1 - INSTALL & CONFIGURE COMPUTER SYSTEMS AND NETWORKSCSS CORE 1 - INSTALL & CONFIGURE COMPUTER SYSTEMS AND NETWORKS
CSS CORE 1 - INSTALL & CONFIGURE COMPUTER SYSTEMS AND NETWORKS
 
ICT Orientation (CSS)
ICT Orientation (CSS)ICT Orientation (CSS)
ICT Orientation (CSS)
 

Similar to Peer to-peer network

Basic of Networking
Basic of NetworkingBasic of Networking
Week 2 network configurartion
Week 2 network configurartionWeek 2 network configurartion
Week 2 network configurartion
Robert Almazan
 
Networking course khurram shahzad
Networking course khurram shahzadNetworking course khurram shahzad
Networking course khurram shahzad
khurrak_shahzad
 
unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdf
shubhangisonawane6
 
client-server.pptx
client-server.pptxclient-server.pptx
client-server.pptx
EbukaChikodi
 
Peer-to-Peer Network
Peer-to-Peer NetworkPeer-to-Peer Network
Peer-to-Peer Network
lester641719
 
computer networks
computer networkscomputer networks
computer networks
Gicheru Onesmus
 
Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2webhostingguy
 
Unit1 - Individual Project Due on 03292014A company wan.docx
Unit1 - Individual Project       Due on  03292014A company wan.docxUnit1 - Individual Project       Due on  03292014A company wan.docx
Unit1 - Individual Project Due on 03292014A company wan.docx
dickonsondorris
 
Open Systems Interconnection
Open Systems InterconnectionOpen Systems Interconnection
Open Systems Interconnection
SanowerHossainRabbi
 
Advantages-and-Disadvantages-of-P2P-Network-Client-Server-Network.pdf
Advantages-and-Disadvantages-of-P2P-Network-Client-Server-Network.pdfAdvantages-and-Disadvantages-of-P2P-Network-Client-Server-Network.pdf
Advantages-and-Disadvantages-of-P2P-Network-Client-Server-Network.pdf
NanetteMaraonSansano1
 
Tableau Security Model.pptx
Tableau Security Model.pptxTableau Security Model.pptx
Tableau Security Model.pptx
AnkurSharma561446
 
Networking Comptia
Networking ComptiaNetworking Comptia
Networking ComptiaMarco Cruz
 
networking concepts
networking conceptsnetworking concepts
networking concepts
mtguillermo
 
Routers and Routing Basic Module 1
Routers and Routing Basic Module 1Routers and Routing Basic Module 1
Routers and Routing Basic Module 1
paolo374233
 

Similar to Peer to-peer network (20)

Basic of Networking
Basic of NetworkingBasic of Networking
Basic of Networking
 
Week 2 network configurartion
Week 2 network configurartionWeek 2 network configurartion
Week 2 network configurartion
 
Compare peer
Compare peerCompare peer
Compare peer
 
Networking course khurram shahzad
Networking course khurram shahzadNetworking course khurram shahzad
Networking course khurram shahzad
 
unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdf
 
client-server.pptx
client-server.pptxclient-server.pptx
client-server.pptx
 
Peer-to-Peer Network
Peer-to-Peer NetworkPeer-to-Peer Network
Peer-to-Peer Network
 
Presentation6
Presentation6Presentation6
Presentation6
 
computer networks
computer networkscomputer networks
computer networks
 
Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2
 
Unit1 - Individual Project Due on 03292014A company wan.docx
Unit1 - Individual Project       Due on  03292014A company wan.docxUnit1 - Individual Project       Due on  03292014A company wan.docx
Unit1 - Individual Project Due on 03292014A company wan.docx
 
Clientserver
ClientserverClientserver
Clientserver
 
Open Systems Interconnection
Open Systems InterconnectionOpen Systems Interconnection
Open Systems Interconnection
 
Advantages-and-Disadvantages-of-P2P-Network-Client-Server-Network.pdf
Advantages-and-Disadvantages-of-P2P-Network-Client-Server-Network.pdfAdvantages-and-Disadvantages-of-P2P-Network-Client-Server-Network.pdf
Advantages-and-Disadvantages-of-P2P-Network-Client-Server-Network.pdf
 
Networking
NetworkingNetworking
Networking
 
Tableau Security Model.pptx
Tableau Security Model.pptxTableau Security Model.pptx
Tableau Security Model.pptx
 
Networking Comptia
Networking ComptiaNetworking Comptia
Networking Comptia
 
networking concepts
networking conceptsnetworking concepts
networking concepts
 
Kinds of networks
Kinds of networksKinds of networks
Kinds of networks
 
Routers and Routing Basic Module 1
Routers and Routing Basic Module 1Routers and Routing Basic Module 1
Routers and Routing Basic Module 1
 

More from EILLEN IVY PORTUGUEZ

SET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEMSET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEM
EILLEN IVY PORTUGUEZ
 
Visual Information and Media
Visual Information and MediaVisual Information and Media
Visual Information and Media
EILLEN IVY PORTUGUEZ
 
The Power of Media and Information
The Power of Media and InformationThe Power of Media and Information
The Power of Media and Information
EILLEN IVY PORTUGUEZ
 
Network Security
Network SecurityNetwork Security
Network Security
EILLEN IVY PORTUGUEZ
 
Swot analysis
Swot analysisSwot analysis
Swot analysis
EILLEN IVY PORTUGUEZ
 
Wearable technology
Wearable technologyWearable technology
Wearable technology
EILLEN IVY PORTUGUEZ
 
Web design principles
Web design principlesWeb design principles
Web design principles
EILLEN IVY PORTUGUEZ
 
Understanding the computer system
Understanding the  computer systemUnderstanding the  computer system
Understanding the computer system
EILLEN IVY PORTUGUEZ
 
Use of tools in pc hardware servicing
Use of tools in pc hardware servicingUse of tools in pc hardware servicing
Use of tools in pc hardware servicing
EILLEN IVY PORTUGUEZ
 
Technology empowerment ict today
Technology empowerment ict todayTechnology empowerment ict today
Technology empowerment ict today
EILLEN IVY PORTUGUEZ
 
Technology empowerment
Technology empowermentTechnology empowerment
Technology empowerment
EILLEN IVY PORTUGUEZ
 
Search engines & advantage and disadvantage of intenet
Search engines & advantage and disadvantage of intenetSearch engines & advantage and disadvantage of intenet
Search engines & advantage and disadvantage of intenet
EILLEN IVY PORTUGUEZ
 
Productivity tools
Productivity toolsProductivity tools
Productivity tools
EILLEN IVY PORTUGUEZ
 
Personal entrepreneurial competencies (pecs)
Personal entrepreneurial competencies (pecs)Personal entrepreneurial competencies (pecs)
Personal entrepreneurial competencies (pecs)
EILLEN IVY PORTUGUEZ
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
EILLEN IVY PORTUGUEZ
 
Online presentation tools
Online presentation toolsOnline presentation tools
Online presentation tools
EILLEN IVY PORTUGUEZ
 
Online platforms and applications
Online platforms and applicationsOnline platforms and applications
Online platforms and applications
EILLEN IVY PORTUGUEZ
 
Mapping applications
Mapping applicationsMapping applications
Mapping applications
EILLEN IVY PORTUGUEZ
 
Key concepts of selecting a business idea
Key concepts of selecting a business ideaKey concepts of selecting a business idea
Key concepts of selecting a business idea
EILLEN IVY PORTUGUEZ
 
Internet and online ethics & etiquette
Internet and online ethics & etiquetteInternet and online ethics & etiquette
Internet and online ethics & etiquette
EILLEN IVY PORTUGUEZ
 

More from EILLEN IVY PORTUGUEZ (20)

SET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEMSET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEM
 
Visual Information and Media
Visual Information and MediaVisual Information and Media
Visual Information and Media
 
The Power of Media and Information
The Power of Media and InformationThe Power of Media and Information
The Power of Media and Information
 
Network Security
Network SecurityNetwork Security
Network Security
 
Swot analysis
Swot analysisSwot analysis
Swot analysis
 
Wearable technology
Wearable technologyWearable technology
Wearable technology
 
Web design principles
Web design principlesWeb design principles
Web design principles
 
Understanding the computer system
Understanding the  computer systemUnderstanding the  computer system
Understanding the computer system
 
Use of tools in pc hardware servicing
Use of tools in pc hardware servicingUse of tools in pc hardware servicing
Use of tools in pc hardware servicing
 
Technology empowerment ict today
Technology empowerment ict todayTechnology empowerment ict today
Technology empowerment ict today
 
Technology empowerment
Technology empowermentTechnology empowerment
Technology empowerment
 
Search engines & advantage and disadvantage of intenet
Search engines & advantage and disadvantage of intenetSearch engines & advantage and disadvantage of intenet
Search engines & advantage and disadvantage of intenet
 
Productivity tools
Productivity toolsProductivity tools
Productivity tools
 
Personal entrepreneurial competencies (pecs)
Personal entrepreneurial competencies (pecs)Personal entrepreneurial competencies (pecs)
Personal entrepreneurial competencies (pecs)
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Online presentation tools
Online presentation toolsOnline presentation tools
Online presentation tools
 
Online platforms and applications
Online platforms and applicationsOnline platforms and applications
Online platforms and applications
 
Mapping applications
Mapping applicationsMapping applications
Mapping applications
 
Key concepts of selecting a business idea
Key concepts of selecting a business ideaKey concepts of selecting a business idea
Key concepts of selecting a business idea
 
Internet and online ethics & etiquette
Internet and online ethics & etiquetteInternet and online ethics & etiquette
Internet and online ethics & etiquette
 

Recently uploaded

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

Peer to-peer network

  • 2. Peer-to-Peer Network  Devices are connected directly to each other without any additional networking devices between them.  Devices has equivalent capabilities and responsibilities.  Network has no central point of control or administration  Allows certain files to be shared with everyone or selected users.  Common in small offices that do not use a dedicated file server.
  • 4. Client/Server Network  The server provides the requested information or service to the client.  Servers commonly perform some of the processing work for client machines.  Servers maintained by network administrator.  All the data on the network is stored on a centralized file server.
  • 5. Client/Server Network  Shared printers on the network are managed by a centralized print server.  Network users with the proper permissions can access both the data and shared printers.  Each user must provide an authorized username and password to gain access to network resources that he or she is permitted to use.
  • 7. • Implemented the data backups and security measures of the network • Controls the users access to the network resources.
  • 9. Comparison Direction: Using the table below, cite the features of peer-to-peer and client /server network that describes their difference. Peer-to-Peer Network Client/Server Network 1. 2. 3. 4. 5.
  • 10. Peer-to-Peer Study Directions: Have a partner. Using different reference available such as articles, books, internet and publications, investigate and search for the advantages and disadvantages of Peer-to-peer and Client/Server network. You will present your readings in front of the class and you will be rated according to the rubrics for research and rubrics for oral presentation.
  • 11. RUBRICS FOR RESEARCH STUDY Qualities & Criteria Poor(0- 80) Good (80-90) Excellen t (90- 100) Format/Layout (15%) * Presentation of the text * Structuring of the text Content/Information (70%) * All the elements of the topics are addressed * The information is technically sound * Information based on careful research * Coherence of Information References (15%) * Soundness of references
  • 12. CRITERIA Developing (has more than seven errors) Proficient (has 4-7 errors) Advance (has no more than 3 minor errors) 1. Gave an interesting introduction 2. Presented clear explanation of topic 3. Presented information in logical manner 4. Used complete sentence 5. Offered a concluding summary 6. Spoke clearly, correctly, distinctly, and confidently 7. Maintained eye contact with the audience 8. Maintained acceptable posture 9. Utilized audio-visual aids (creativity in presentation 10. Handled questions & comments TOTAL GRAND TOTAL ORAL PRESENTATION RUBRIC
  • 13. -END-