Describe peer to peer and client server networks.

1 Answer

Answer :

Peer to Peer network Peer-to-peer (P2P) is an alternative network model to that provided by traditional client -server architecture. P2P networks use a decentralized model in which each machine, referred to as a peer, functions as a client with its own layer of server functionality. A peer plays the role of a client and a server at the same time. That is, the peer can initiate requests to other peers, and at the same time respond to incoming requests from other peers on the network. It differs from the traditional client-server model where a client can only send requests to a server and then wait for the server‟s response. In P2P networks overall network performance actually improves as an increasing number of peers are added to the network. These peers can organize themselves into ad-hoc groups as they communicate, collaborate and share bandwidth with each other to complete the tasks at hand (e.g. file sharing). Each peer can upload and download at the same time, and in a process like this, new peers can join the group while old peers leave at any time. This dynamic re-organization of group peer members is transparent to end-users.

image

Client Server Network 

There are an almost infinite variety of client/server networks, but all of them have a couple of things in common. All have centralized security databases that control access to shared resources on servers. A client can only send requests to a server and then wait for the server‟s response. The server contains a list of usernames and passwords. Users can‟t log on to the network unless they supply valid usernames and passwords to the server. Once logged on, users may access only those resources that the network administrator allows them to access. Thus, client/server networks possess much more security than do peer-to-peer networks. Client/server networks also tend to be much more stable. 

image

Related questions

Description : Compare peer to peer network and server based networks.

Last Answer : Peer to Peer Network Server Based Network It is a decentralized management It is centralized management It is easy to set up & no administrator required It is complex to set ... client has less power. Uses less expensive computer hardware. It is hardware intensive.

Description : A client of yours would like to expand with a small bistro in front of her catering kitchen. What do you tell her is one advantage to a peer-to-peer network over a client-server network in her case?

Last Answer : Peer-to-peer networking is less expensive and easier to upkeep.

Description : Point out the wrong statement. a) All IM clients use peer-to-peer messaging b) IM software aimed at businesses such as XMPP, Lotus Sametime, and Microsoft Office Communicator use a client/server ... messaging is as popular in business as it is in personal communications d) None of the mentioned

Last Answer : None of the mentioned

Description : List two important features of peer to peer network.

Last Answer : 1. A peer-to-peer (P2P) network is a type of decentralized and distributed network architecture in which individual nodes in the network (called peers ) act as both suppliers and consumers of ... network, a group of computers is connected together so that user can share resources and information. 

Description : List classification of network on basis of geographical area. State the benefits of networks.

Last Answer : Computer Networks are classified based on the geographical area into * Local Area Network * Metropolitan Area Network * Wide Area Network * Campus Area Network (CAN) * Personal Area ... hence the cost of installation, maintenance reduces and also makes it easier to manage these applications.

Description : List any two important benefits of networks.

Last Answer : 1. Help to enhance connectivity 2. Networking help in sharing of hardware 3. Eases out management of data 4. Internet 5. Data sharing

Description : Which is the best peer to peer software or p2p client?

Last Answer : answer:Limewire happens to be the best p2p application for music. Its fast, has a huge collection, lets you download individual songs. 823 of the 2037 songs in my iPod are from limewire. The only ... safe, do not share your limewire collection. Ps. message if you want the PRO version of limewire

Description : What will an auditor who has been proposed for an audit engagement usually do prior to accepting a new client? a. Draft the financial statements of the client as a measure of goodwill b ... review work papers. d. Perform a peer review on the potential client in accordance with professional standards

Last Answer : With the permission from the prospective client, contact the predecessor auditor to determine if there are any disagreements between the client and the audit firms

Description : Which of the following best describes the passing of confidential information from a client to its auditor? The information: a. Should in no circumstances be conveyed to third parties. b. Is not ... d. Should be conveyed to the public if it affects the "correctness" of the financial statement

Last Answer : Is not legally protected and can be subpoenaed by a competent cour

Description : In which of the following circumstances would a CPA be bound by ethics to refrain from disclosing any confidential information obtained during the course of a professional engagement? a. The CPA is ... the PICPA. d. An inquiry by a disciplinary body of PICPA requests confidential client information

Last Answer : A major stockholder of a client company seeks accounting information from the CPA after management declined to disclose the requested information

Description : The confidential relationship will be violated if, without client's permission, the CPA provides working papers about client to a. A court of law which subpoenas them. b. Another CPA firm as part ... . d. An investigative or disciplinary body which is conducting a review of the CPA's practice.

Last Answer : Another CPA firm which has just purchased the CPA's entire practice.

Description : A CPA in public practice shall not disclose any confidential client information without the specific consent of the client. The confidentiality rule is violated if CPA disclosed information without client' ... s largest stockholder. d. Complaint filed with the trial board of the Board of Accountancy

Last Answer : Request by client's largest stockholder.

Description : Which of the following best describes the passing of confidential information from a client to its auditor? The information: a. Should in no circumstances be conveyed to third parties. b. Is not ... d. Should be conveyed to the public if it affects the "correctness" of the financial statements

Last Answer : Is not legally protected and can be subpoenaed by a competent court.

Description : Compare Server based network and peer-to-peer network.

Last Answer : Compare Server based network & Peer to Peer network Server based network Peer to Peer 1. It is much like company uses centralized management. 1. It is much like company uses ... 7.It support small Network 8.Better performance 8.Might hurt user's performance

Description : Describe client server system with example.

Last Answer : Client server system consists of two logical components. One is Client and the other one is Server . Clients are those who send the request to perform a specific task to the server. ... client's CPU and memory. But server runs a database management system which manages the whole database.

Description : The purpose of a proxy server is to control exchange of data between the two networks at …………..instead of ……….. A. an application level , an IP level B. network layer, physical layer C. an application layer, physical layer D. Network layer , an application layer

Last Answer : A. an application level , an IP level

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : 4. What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? A. Desktop, laptop, server B. Personal computer, Internet, mobile telephone C. Hardware, software, networks D. Open computer systems, communication systems, and embedded systems

Last Answer : D. Open computer systems, communication systems, and embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : Describe the different modes of fibre optic cable with neat diagram. Compare fibre optic cable with UTP cable.

Last Answer : STEP-INDEX MULTIMODE FIBER has a large core, up to 100 microns in diameter. As a result, some of the light rays that make up the digital pulse may travel a direct route, whereas others ... optic cables. Fiber is more expensive than copper due to the light emitting equipment and cost.

Description : Describe the need and importance of subnet masking. Give an example of subnet mask.

Last Answer : Subnet mask is a 32 bits long address used to distinguish between network address and host address in IP address. Subnet mask is always used with IP address. Subnet mask has ... In binary notation  IP address 11000000.10101000.00000001.00001010  Subnet mask 11111111.11111111.11111111.00000000

Description : Describe various factors considered for passive maintenance.

Last Answer : 1. Static Electricity: Static electricity or ESD can cause numerous problems within a system. The problems usually appear during the winter months when humidity is low or in extremely dry climates ... . The power-supply fan carries airborne particles through your system, and they collect inside. 

Description : Describe the function and operation of firewall with neat diagram.

Last Answer : A firewall is a part of computer system or network that is designed to block unauthorized access while permitting authorized communications.  2. It is a device or set of devices configured to ... i. Packet filter ii. Proxy server iii. Circuit-level Gateway iv. Application Gateway

Description : Describe the importance of preventive maintenance.

Last Answer : Importance of Preventive Maintenance Preventive maintenance is one of the most ignored aspects of PC ownership, most people seem to think that the PC doesn't need preventive maintenance, and so ... time, and preventive maintenance will help to improve the speed of your system in these respects.

Description : Describe data encapsulation.

Last Answer : In figure which gives an overall view of the OSI layers, D7 means the data unit at layer 7, D6 means the data unit at layer 6, and so on. The process starts at layer 7 (the application layer), ... trailer. For level N-1, the whole packet coming from level N is treated as one integral unit.

Description : Draw neat labelled constructional diagram of INKJET printer. Describe the function of each block. State two advantages.

Last Answer : It is a non-impact printer. It provides letter quality printout than dot matrix printer. Its output is sharper than Dot matrix though its output quality is not to the same level of laser printer ... is compatible in quality to that of a laser printer. Faster when compared to Dot Matrix printers.

Description : Describe any four preventive maintenance for hard disk.

Last Answer : Preventive maintenance of Hard Disk * Take periodic backup of data and critical areas such as boot sectors, FAT and directory structure on the disk. * Defragment the disk to maintain the disk efficiency ... at least once a year. * Reinstall all the software to maintain disk efficiency and speed.

Description : Describe function of each pin of 9 pin RS 232 connector.

Last Answer : An RS232 pinout 9 pin cable features nine pins: 1. Data Carrier Detect (DCD or CD) - After a data terminal is detected, a signal is sent to the data set that is going to be transmitted ... occurs, the data terminal is alerted, but the RI will not stop the flow of serial data between devices.

Description : What is the best and faster way to transfer a DataTable from server side to client side: using JSON format or pure HTML?

Last Answer : Unless there is a good reason to write the displayed data cient side, pure HTML should be more efficient. It should display in a browser faster. Also, the server side source code is visible to ... HTML generated client side will not be visible to any bot that does not have a JavaScript interpreter.

Description : In WWW a client is called ……….. and a server is called ……… -Technology

Last Answer : Web browser, Web server

Description : Which software model is best suitable for client server application? -Technology

Last Answer : Concurrent Process model is best suitable for client server application.

Description : What is Client Server Architecture ?

Last Answer : Client Server Architecture There is always a host called Server. This server serves many other hosts , called clients. The client host does not need to be on all the time. A notable feature of ... server at any time. Notable examples of client server architecture are web , e-mail rematch login etc.

Description : What are the features of client server network ?

Last Answer : Client Server Network Features The client-server network is easily expandable. This can be done for tens of thousands of users. Such networks have servers. Server computer hardware is generally advanced and these servers ... why the skills of network users are not so important.

Description : What is a client server network ?

Last Answer : A client server network is a network that has a powerful computer or server for central control and data storage and all other computers or clients are connected to this server. One computer ... comply with the server's security policy. Client-server networks are also called server-based networks.

Description : What approaches to server and client development do you know?

Last Answer : Whenever you use an ATM to check your balance or withdraw some money, you are actually participating in a client-server interaction with a computer on your bank's network. A client-server network ... socket, locates the Web page requested and sends it over the Internet to the user's browser.

Description : What is a client and a server?

Last Answer : Client and Server are computers which are connect on the same network it may be Local area network LAN or wide area network WAN, BUT the CLIENT IS THE REQUESTING MACHINE WHILE THE SERVER IS THE SUPPLYING MACHINE.

Description : Is terminal server load balancing the responsibility of the client or the host?

Last Answer : Server load balancing is almost always the hosts responsibility. Even in the case of terminal severs, the host should ensure proper connections to the server.

Description : When a client computer sends a request to a Domain Name System (DNS) server, what type of packet is sent?

Last Answer : DNS primarily uses the User Datagram Protocol (UDP) on port number 53 to serve requests. DNS queries consist of a single UDP request from the client followed by a single UDP reply from the server. ... the answer exceeds 512 bytes and both client and server support EDNS, larger UDP packets are used.

Description : The most important or powerful computer in a typical network is _____ 1) Desktop 2) Network client 3) Network server 4) Network station 5) None of these

Last Answer : Answer :3

Description : Where is a procedure return in an external pl/sql library executed at the client or at the server?

Last Answer : At the client.

Description : Where is the external query executed at the client or the server?

Last Answer : At the server.

Description : Why are OPS$ accounts a security risk in a client/server environment? (for DBA

Last Answer : f you allow people to log in with OPS$ accounts from Windows Workstations, you cannot be sure who they really are. With terminals, you can rely on operating system passwords, with Windows, you ... of whether you have identified your ID with a password or defined it to be IDENTIFIED EXTERNALLY.

Description : What is used to see if a client is still connected to a NetWare server? A. Spoofing TCP/SAP B. Watchdog packet C. GNS Round Robin D. DNS Round Robin

Last Answer : Watchdog packet

Description : . A _____ DBMS distributesdata processing tasks between the workstation anda network server. A. Network B. Relational C. Client Server D. Hierarchical E. None of the above

Last Answer : Client Server

Description : In one of the pairs of protocols given below, both the protocols can use multiple TCP connections between the same client and the server. Which one is that? a. HTTP, FTP b. HTTP, TELNET c. FTP, SMTP d. HTTP, SMTP

Last Answer : a. HTTP, FTP