Verified Document

Peer-To-Peer And Client/Server Networks A Term Paper

Not only does security become an issue when there are more than ten users involved in a peer-to-peer network, but performance also becomes a problem. Because each user acts as a server in a peer-to-peer network, download and upload can occur slower than it would occur when a central server is present (Edwards, p. 11). Peer-to-peer networks are effective because they are inexpensive to set and supervise. Also, each user can perform tasks that are characteristic to clients and servers alike, given the fact that they can share and download information at the same time. The only security available when regarding peer-to-peer networks is that clients can control what they share and with who they share it through setting passwords for what they want to share with certain users. However, this is not of the most secure methods of protecting one's information, as any user who knows the password will have access to the restricted information, regardless of their Internet Protocol address (Mueller, p.1077).

Even though they are very complex, they have numerous features in common. The fact that they too can have passwords decreases the chances of security violations (Wai-Sing Loo, 2007, p. 6).
All in all, client/server networks are the best option for those who want to install a network. However, because most users are not willing to pay for a server or because they are not qualified to manage such a network, peer-to-peer networks are usually more common (Mueller, p.1077).

Works cited:

1. Edwards, James. (2002). Peer-to-peer programming on Groove. Addison-Wesley.

2. Mueller, Scott. (2002). Upgrading and repairing PCs. Que Publishing.

3. Wai-Sing Loo, Alfred.(2007). Peer-to-peer computing: building supercomputers with Web technologies. Springer.

Sources used in this document:
Works cited:

1. Edwards, James. (2002). Peer-to-peer programming on Groove. Addison-Wesley.

2. Mueller, Scott. (2002). Upgrading and repairing PCs. Que Publishing.

3. Wai-Sing Loo, Alfred.(2007). Peer-to-peer computing: building supercomputers with Web technologies. Springer.
Cite this Document:
Copy Bibliography Citation

Related Documents

Client Is a Never Married 27-Year-Old African-American
Words: 870 Length: 3 Document Type: Essay

client is a never married 27-year-old African-American lady who has completed 12 years of formal education. She is currently employed as a retail salesperson in the clothing section at a local department store. Her parents died in an automobile crash six weeks ago and she was very close to them. She stated that she misses her parents very much. The client reports that her development as a child was normal

Client/Server Model Client Server Model
Words: 738 Length: 2 Document Type: Term Paper

For example, when one has web server run on any client computer, he/she is able to visit the pages by using the IP address into the address of the browser. Client server communication cannot take place without using the protocols. Protocols enable the packets to fly around the internet that does not only contain the information on the destination address as well as port, but also contain protocols. Client

Server Architectures Using a Fat
Words: 812 Length: 3 Document Type: Assessment

Thick client technology can support more efficient asynchronous transfers and the independence of data models at the individual worker level can significantly improve the overall performance of a given project. Thick client/server networks are especially well suited for concurrent engineering tasks given their data management and overhead requirement specifications (Lee, 2002). In the field of engineering consulting and design, it is also critically important for companies to have secured

Server Cookies the Term Cookies
Words: 2131 Length: 5 Document Type: Term Paper

In January 2000 a new system was implemented by double click wherein for the first time the linking of the name of the user and any other information that it can pick up as the user moves from site to site. This is done in this manner and that is the user name and address is collected and stored in a cookie from a site where this is entered

Network Dating Sites How Type Dating Evolved Include Pros Cons
Words: 1386 Length: 4 Document Type: Essay

Network dating sites. How type dating evolved . Include pros cons. Network dating sites have gained a particular place of social eminence within contemporary times. Online dating sites that members pay to use, such Match.com, made over a billion dollars in 2010 (No author). Many people consider these websites as primary options for dating for the simple fact that they allow expedient access to other singles who are also looking to

Network Plan for ABC Corp
Words: 2595 Length: 9 Document Type: Essay

The paper creates Extended Access Control Lists for ABC Corporation using Port Numbers. Extended Access Control Lists for ABC Corporation using Port Numbers access-list 101 permit tcp 172.16.3.0. 0.0.0.255 any eq 20 access-list 101 permit tcp 172.16.5.0. 0.0.0.255 any eq 21 access-list 101 permit tcp 172.16.3.1/16. 0.0.0.255 any eq 22 access-list 101 permit tcp 172.16.3.254/16. 0.0.0.255 any eq 25 access-list 101 permit tcp 172.16.5.254/16. 0.0.0.255 any eq 35 access-list 101 permit tcp 172.16.0.254/16. 0.0.0.255 any eq18 access-list 101

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now