StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Peer to Peer Networking - Research Paper Example

Cite this document
Summary
The author of the present research paper "Peer to Peer Networking" mentions that computers are the most excellent tools that facilitate users to store and carry out operations on huge amounts of data rapidly. Almost every organization makes use of computers to manage bookkeeping…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.9% of users find it useful
Peer to Peer Networking
Read Text Preview

Extract of sample "Peer to Peer Networking"

Information Technology Table of Contents Table of Contents 2 Introduction 3 2- Peer-to-Peer Networking 4 2 Centralized Peer-to-Peer 5 2.1.1- Napster 5 2.1.2- Decentralized Peer-to-Peer 6 2.2 - Peer-to-Peer operating 6 2.3- Advantages of peer-to-peer networking 7 2.4- Disadvantages of peer-to-peer 7 3- Client/Server Networks 8 3.1- Client and Server Devices 9 3.2- Client-Server Applications 10 3.3- Local Client-Server Networks 10 3.4- Multiple servers 10 3.5- File and print servers 11 4.6- Application servers 12 3.7- Specialized servers 12 3.8- Advantages of server-based networks 13 3.9- Disadvantages of Client Server Computing 14 4- Conclusion 14 5- References 14 1- Introduction Computers are most excellent tools that facilitate users to store and carry out operations on huge amounts of data rapidly. Almost every organization, regardless of its size, makes use of computers to manage bookkeeping, track inventory, and store documents. As the organizations grow, they often need several people to enter and process data at the same time. For this to be beneficial, those people must be capable to share the data and information each person enters. Networking computers turns out to be advantageous in this state of affairs. Networks are merely a collection of computers linked by cable or other media so they can share information. The network technology has completely transformed all the fields of life. The fundamental impact of this technology can be seen in daily lives and business areas. With the help of networking, the data and information sharing have become much simple and well-organized for users. Before emergence of the networking, floppy disks were the only choice for transferring and distributing data. But after the emergence of networking, users are not only more gainful for the reason that numerous users can enter data simultaneously, but they can also weigh up and perform operations on the shared data. Consequently, one worker can manage accounts payable, while another can manage account receivable, and someone else can calculate the earnings and loss. In addition, when the organizations apply specific techniques on a computer network, they can follow and make use of information to facilitate make the business run efficiently (Nash, 2000, p. 5). This paper presents detailed analysis of the computer networking technology establishment. The fundamental aim of this research is to provide detailed analysis and different aspects of two most popular network technologies establishment in small construction businesses. The two technologies that will be covered in this paper are Peer-to-peer and Client/server networks technologies. 2- Peer-to-Peer Networking The peer-to-peer (P2P) networking is considered as the simplest form of networking. In a peer-to-peer architecture, each workstation works as a client as well as a server. In addition, there is no middle connection for information sharing and no central server to maintain that information. Data and resources are open for each user all the way through the network and each user is in charge for sharing data and resources attached to their system (Nash, 2000, pp. 5-9; Mitchell, 2009; Peterson & Davie, 1999). In more simple words, a P2P network is established when two or more PCs are connected to share data and resources and there is no separate server computer for establishing connection among those PCs. Furthermore, each computer on the network manages its security and administration for itself (Jelen & King, 2003; Cope, 2002). Figure 1- P2P Network Source: [http://www.computerworld.com/s/article/69883/Peer_to_Peer_Network] (Cope, 2002) 2.1- Centralized Peer-to-Peer There is a main category of the Peer-to-Peer network acknowledged as centralized network. Napster is one of the main types of this network technology (Turban, Rainer, & Potter, 2004) 2.1.1- Napster This program was developed in 1990. The main facility of this technology was regarding the file sharing of music among people. This is based on the client-server architecture. In this architecture the role of the server is to maintain a searchable directory that holds all the presently linked clients. This builds scaling the service basically a matter of adding up client machines into the network server pool (Aitken, Bligh, Callanan, Corcoran, & Tobin, 2009). Figure 1Nepster Working Image source: http://www.slais.ubc.ca/COURSES/libr500/05-06-wt1/www/R_Martin/media/napster.gif 2.1.2- Decentralized Peer-to-Peer The second type of the peer-to-peer network is decentralized network. The main example of this architecture is Freenet. This was developed in 1999. In this structure the distributed resource-sharing network of decentralized peer-to-peer has focused on anonymity as well as autonomy from some kind of power. There is presently a reasonably little client base intended for the Freenet generally for the reason that it is relatively complicated to determine resources users are looking for (Aitken, Bligh, Callanan, Corcoran, & Tobin, 2009). 2.2 - Peer-to-Peer operating Various operating systems help in maintaining peer-to-peer networking. Also, some operating systems have this facility built-in; however, this facility can be added in others (Nash, 2000, pp. 13-16; Peterson & Davie, 1999): The following operating systems have built-in facility of peer-to-peer networking: Windows 95 Windows for Workgroups Windows NT Workstation OS/2 For other operating systems that do not have this facility, for instance Windows and MS-DOS, software such as NetWare Lite or LANtastic can be used to add this facility. 2.3- Advantages of peer-to-peer networking The P2P networks have their position and offer lot of benefits. Small, reasonably priced networks can simply be established by means of peer-to-peer systems. In addition, the peer-to-peer network architecture is suitable for small office networks. But, once company’s network has reached about ten or more users, the management of the network becomes very difficult. The P2P network is widely used in home networks and also most organizations utilize when they have to make the decision to share information and connect their individual systems. The P2P is normally the cheapest network to install because it does not need a dominant dedicated server. All that is necessary to connect several PCs and build a peer-to-peer network are operating system, network adapters, and cable or other transmission media (Nash, 2000, p. 14; Jelen & King, 2003). 2.4- Disadvantages of peer-to-peer Although P2P networks provide several benefits to small organizations but peer-to-peer networks may not for all time be the top choice. The common principle is to discontinue using peer-to-peer networking when total number of clients reaches about ten. For instance, a company has twenty-five users on a peer-to-peer network distributing information and sharing resources. In a short time, company would have people with various revisions of the documents on various client computers. In addition, there would be problems when company needs to set up the twenty-sixth client on the network if the company had to receive the information from the more clients. The company needs to connect that client to one client for printer, another for the fax device and third for documents and this process continues. Consequently, if the company’s network had a central server, they would only need to retrieve information from one source (Nash, 2000, pp. 13-16). Training also becomes very difficult with the increasing number of clients. For instance, if a company establishes peer-to-peer networking, then it needs to train its users on how to share information and resources because each user is in charge and acts as administrator of their systems. This can be a puzzling job for various users, who have other tasks also (Nash, 2000, pp. 13-16). Security in a peer-to-peer network turns out to be complicated to maintain. Users need to be familiar with how to protect their own resources. For the reason that there is no central management, and each user is in charge and acts as administrator of their systems. Therefore, it is the users’ job to make certain that only allowed users can retrieve or use their data (Nash, 2000, pp. 13-16; Bradley, 2009; Mills, 2009). 3- Client/Server Networks Client server networking divides the computers into two classes, clients and servers, all they are linked by a network of some type. In a server-based network, there is one computer usually larger than the client-which is committed to distributing data and/or information to clients. In addition, the server is in charge to manage data, as well as printers and other resources that clients need to access. The server is not only a high-speed computer containing excellent processor, but it also needs enough storage space to keep and maintain all the data that has to be distributed to the clients. Therefore, there is no burden on clients for the reason that they only ask for resources. Furthermore, the server is committed to distribute information or files, so it can not be utilized as a work station. The function of a server is firmly to offer support or services to clients, but not to ask for services. Servers are optimized to distribute information as quick as possible (Nash, 2000, pp. 16-18; Kurose & Ross, 2009; Turban, Leidner, McLean, & Wetherbe, 2005). Figure 2- Client/server networks Source: [http://www.techsoup.org/learningcenter/networks/page4773.cfm] 3.1- Client and Server Devices Client/server networking devices are usually PCs having network software applications establish demand as well as obtain information over the network. Mobile devices and desktop computers are able to mutually function like clients (Mitchell, 2009). 3.2- Client-Server Applications The client-server model differentiates among devices and application. Network clients formulate requirements to a server through transferring messages, as well as servers request to their clients through fulfilling every demand as well as returning outcomes. One server normally supports various clients, as well as numerous servers can be networked mutually in a pool to hold the augmented processing load because of increasing number of clients (Mitchell, 2009). 3.3- Local Client-Server Networks A lot of home networks make use of the client-server systems without even understanding it. Broadband routers, for instance, hold DHCP servers that offer IP addresses to the home client machines/computers (like DHCP clients). Additional kinds of network servers can be seen in home comprise print servers as well as backup servers (Mitchell, 2009). 3.4- Multiple servers As the size of network expands organizations possibly need more than just a single server to manage all the requirements of clients. Organizations may also need to establish different servers to manage diverse jobs. There are two major types of dedicated servers one is file and print server and other is application server (Nash, 2000). Figure no- 3- Multiple servers Source: [http://blogs.technet.com/photos/josebda/images/2605482/original.aspx] 3.5- File and print servers These servers are developed to distribute or transfer data to clients and to manage printing requests. The main purpose of these servers is to store data and applications. As servers are not used for the application processing; each application is processed locally on the client (Nash, 2000). Figure 4- File and print servers source; [http://www.mic-it.com/jpg/Client-Server-Network.jpg] 4.6- Application servers Application servers are different from file and print servers. The application that is used by client is stored on the client. After that requests are sent to the server for processing, and after that processed information is received by the client. In this way, client processes little information, while each application is processed by the server. 3.7- Specialized servers There are also various servers that have particular function. Few examples are: (Nash, 2000) Mail servers: These servers are particularly established to manage clients’ e-mail requests. Several servers are proficient of running from a standard file server; however they facilitate groupware and other applications, so they require more hardware. The simplest way out is to set the e-mail server applications on their own file server. Communications servers: These are established to manage remote users dialling into network. The communications server applications are usually placed on a different server for security. Because it is suitable to protect a server that performs one task than to secure a server that is accessed but internal users as well. 3.8- Advantages of server-based networks Client/server networking is best when the number of user is more than ten, because P2P network is not able to manage more than ten users. In this network company needs to have users link to one or a more than one servers to acquire resources they require. This facilitates in establishing a coordinated file set that everyone works from in place of each user working with the copy that is stored on their local computer (Nash, 2000). It is very easy to manage security in server-based network. As a company only needs to generate and retain accounts on the server rather than every workstation, an administrator can allocate resources to the clients. Right of entry to resources can be approved to user accounts. Therefore, this is very much safe as compared to peer-to-peer, because in P2P network a single password is utilized by every user who accesses the resource. In addition, network can also be relatively inexpensive. Because the server is storing approximately all the information on a network, so there is no need of large hard drives for the client computers. This can reduce the cost of network establishment for the reason that each client can be a less powerful, inexpensive system (Nash, 2000). 3.9- Disadvantages of Client Server Computing There are few disadvantages of client server networking: (eCommerce Technology, 2009) More expensive to install and retain If there is failure at Single point of the network, i.e. server failure, the network failure Complicated special-purpose software needs appointment of specialist personnel, growing expanses Dedicated software and hardware increase expenditures 4- Conclusion Computer networking is the basic need of almost every organization or business. There are different tools and techniques for developing and maintaining networks. And the use of these tools and techniques depend on organization’s need and budget. This paper has presented detailed analysis two network technologies. This research has presented the detailed and deep overview of the Peer-to-peer and Client/server networks technologies. In this paper I have discussed their types, needs, applications, advantages and disadvantages. I hope this research will offer an insight into the overall analysis and investigation of this technology structure. 5- References Aitken, D., Bligh, J., Callanan, O., Corcoran, D., & Tobin, J., 2009. Peer-to-Peer Technologies and Protocols. Available at: http://ntrg.cs.tcd.ie/undergrad/4ba2.02/p2p/index.html [Accessed 14 December 2009]. Bradley, T., 2009. Peer-to-Peer (P2P) Network Security. Available at: http://netsecurity.about.com/od/newsandeditorial1/a/p2psecurity.htm [Accessed 14 December 2009]. Cope, J., (2002, April 08). QuickStudy: Peer-to-Peer Network. Available at: http://www.computerworld.com/s/article/69883/Peer_to_Peer_Network [Accessed 14 December 2009]. Jelen, T., & King, R., 2003. Networks 101: Peer-To-Peer Networks The basics of peer-to-peer networking. Available at: http://www.techsoup.org/learningcenter/networks/page4772.cfm [Accessed 14 December 2009]. Kurose, J. F., & Ross, K. W., 2009. Computer Networking: A Top-Down Approach. New York: Addison Wesley. Mills, E., 2009. Can peer-to-peer coexist with network security? Availablet at:, from http://news.cnet.com/8301-1009_3-10190426-83.html [Accessed 14 December 2009]. Mitchell, B., 2009. Introduction to Client Server Networks. Available at: http://compnetworking.about.com/od/basicnetworkingfaqs/a/client-server.htm [Accessed 14 December 2009]. Nash, J., 2000. Networking Essentials, MCSE Study Guide. California: IDG Books Worldwide, Inc. Peterson, L. L., & Davie, B. S., 1999. Computer Networks: A Systems Approach, Second Edition. New York: Morgan Kaufmann. Turban, E., Leidner, D., McLean, E., & Wetherbe, J., 2005. Information Technology for Management: Transforming Organizations in the Digital Economy . New York: Wiley. Turban, E., Rainer, R. K., & Potter, R. E., 2004. Introduction to Information Technology,3rd Edition. New York: Wiley. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Peer to Peer Networking Research Paper Example | Topics and Well Written Essays - 2000 words - 1, n.d.)
Peer to Peer Networking Research Paper Example | Topics and Well Written Essays - 2000 words - 1. Retrieved from https://studentshare.org/information-technology/1731253-information-technology
(Peer to Peer Networking Research Paper Example | Topics and Well Written Essays - 2000 Words - 1)
Peer to Peer Networking Research Paper Example | Topics and Well Written Essays - 2000 Words - 1. https://studentshare.org/information-technology/1731253-information-technology.
“Peer to Peer Networking Research Paper Example | Topics and Well Written Essays - 2000 Words - 1”, n.d. https://studentshare.org/information-technology/1731253-information-technology.
  • Cited: 0 times

CHECK THESE SAMPLES OF Peer to Peer Networking

Are There Any Current Issues in the News Involving Commercial Speech (2010)

However, with the advent of mp3 format, the music industry struggled to gain market share as Peer to Peer Networking swept the globe.... 1.... re there any current issues in the news involving commercial speech?... ? According to a Newsweek poll, 86% of Americans believe the government has snatched civil liberties....
3 Pages (750 words) Research Paper

Analysis and Evaluation of Peer-to-Peer Search Methods

Peer to Peer Networking is different from other types because there is no server within the network.... peer to peer networks are characterized by; Scalable and Secure Peer Name Resolution Efficient Multipoint Communication Distributed Data Management Secure Peer Identities Secure Peer-to-Peer Groups The difference between peer to peer networks and client-server networks is based on the design architecture.... In client-server networks, it's designed that the clients request for services while the server provides the services but in the peer to peer architecture, the different peers provide the services and use the provided services [1]....
3 Pages (750 words) Essay

Mid term Questions

1: The Single-Most Pressing Societal Concern with the Growth of Social networking One of the most formidable threats which accost the growth of social networking is the uniformity of mass conscience.... hellip; This is due to the fact that social networking can be used to manipulate the masses....
4 Pages (1000 words) Assignment

Competitive Advantages of Computer Networking

Thus, a large amount of money can be saved by investing with resources needed for computer networking such as technical staffs, network gears, and applications (Midkiff, 2004). Question A: Competitive advantages can be gained by the Wannabee Training Group by engaging in Computer networking.... Thus, a large amount of money can be saved by investing with resources needed for computer networking such as technical staffs, network gears, and applications (Midkiff, 2004)....
2 Pages (500 words) Essay

Network Solution to Real Vertical Growth Demands

Service provider, like ΑΩ TechInd (Alpha Omega Technical Industries) should often select the vertical market(s) to specialize in, in order to facilitate… A richer range of offerings, resulting into higher revenues and operations that are more successful, should characterize these developments....
4 Pages (1000 words) Case Study

Computer Technology and the Networked Organization

Under the architecture the configurations of the company Peer to Peer Networking architecture will be put in place.... The company has to have records of its members in order to justify if he/she is a member and for the company to have his personal details whether.... It advises various types of fields e....
2 Pages (500 words) Essay

Traditional Structured Design

ystems and architectures less inclined to a hierarchyThe Peer-to–peer networking system is less inclined to a hierarchy.... The less inclination to the hierarchy of Peer-to-peer networking system is due to the reality that, the system have decentralised distribution network.... Peer-to-peer networking and Applications 6, (3), 257Nam Pyo S.... The peer-to-peer system also lacks the required privacy essential in the communication process....
1 Pages (250 words) Essay

Computer Networking For a Small Business

The paper "Computer networking For a Small Business" discusses that for a growing business, it is necessary to have a website and this would advertise the products and services offered by the business.... any businesses these days are turning to wireless networking because of a number of reasons.... etting up the network should be easy Microsoft Windows systems which are widely used have networking capabilities in them.... This makes it easier should you choose to do it yourself but networking personnel is recommended....
5 Pages (1250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us