0% found this document useful (0 votes)
26 views

Computer Science Powerpoint

The document discusses client-server and peer-to-peer network models. In client-server, clients request services from dedicated servers. In peer-to-peer, nodes both request and provide services to other nodes without dedicated servers. The document provides examples of each model and discusses their pros and cons.

Uploaded by

shaylee.brandt9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views

Computer Science Powerpoint

The document discusses client-server and peer-to-peer network models. In client-server, clients request services from dedicated servers. In peer-to-peer, nodes both request and provide services to other nodes without dedicated servers. The document provides examples of each model and discusses their pros and cons.

Uploaded by

shaylee.brandt9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 1

•• Each node joins the network to allow:

Client-server:
• • •Heavily
Provision
•Client:
SeparateCompany ofhas
andedicated
dependentservices
application aservers
on
large touser
or havingall other
system
and that nodes:
specific
access
base accesses
client
to service • Server: a computer program used to serve requests of other
aworkstations
a server
• • A•available
device
Servicesor software
available that can workonoffline
THIN
onconstant
“look-up” computer or online clients THICK
•made
Users
• able
Requires
Access to by
access
atoserver a to
server
most
resources allowfiles
must stored
be dedicated
access
properly to filesservers
controlled and for
• • • Able
Server • to do processing
When
Examples:
dictates node
which requests
user even
can when look
service,
access not
whichconnected
up computer
file to a server
• run
Examples:
•applications
Need for to
goodrun
Relies uninterrupted
on
network connection
security to server Can even when not connected to a
• • Can be
• data
findsconnected
Web out which
browser to a LAN/MAN/WAN,
nodeaspect
page can
requestsprovide virtual network,
required to a server • File server: allow user to share and load data
•Sharing
•Ainternet
device
Avoid ormost important
software
accidental which
loss needs of
toclient-server
be connected
• Allows or asystems
• installation
service
Chat cloud computing
on mobile
of software ontoserver
phones
client’s computer files
powerful computer/server to allow for processing
•• •• Pros:
Other • users
Online Requires
can access
games few local
data fromresources
another (RAM
node or Relies heavily
• on localserver:
resources
•UsesDoescentral
Peer-to-peer:not security
work unless databases
connected to server Application deals with the distribution of
• • ••Pros:• More
Communication SSD)
robust processing
with peers even programs
whenlog not connected
network to a
•A server
Networkhost runs
Passwords of andoneuser
users orfairly
is more
IDs server
required
small to ontowhich applications software to each computer
• • • Peers
share
User their
only server
both suppliers
resources
has access with and consumers
clients
totoresources • Printofserver:
•No Less
need expensive
Relies
for robuston expand
good
security and assigned by network
fast connection More tolerant ensures that
slow network printing from devices
connection
• • •client
A •
Peers
administrator clients
does have
participate
notacross
shareasmore
equals
but control andnetwork
onlyonrequests
the can store their
a servers own
content on the network is done in queue
•Require
Updates all
workstation-based devices simultaneously
applications rather than
•• Does programs Data isafter
and stored
data on remote server
and sending of Data is• stored onserver:
local resources
•not
Central have
server
Server
server-based aoffers
central
looks server
security storing, delivery
and protection Proxy acts as a buffer between WAN and
• No • Cons:
user
Cons:authentication
•emails LAN
•• Little • Less secure • Web server: provides access to web applications.
Server•security
has
Highbackup
reliance of onresources
server, if server goes down device
• • Each
• Prevents
Connectivity client
is accidental
the mostneeds to update
important
loss data and software
aspect The client is the web browser software
cannot work
•• Faster
Use •of and individually
more
aStart-up
file reliable
server: due to direct connection • Software include:
costs generally higher than for thick clients
• • Data integrity andissues
• •Examples:
More than
Central 20 nodes
storage cause performance of
management anddata
management
files • Printing

issues Examples:
• •Enable network users to access files • File storing
POS terminal at a grocery store

• Allows Normal sharingPC of information without offline devices • Game hosting
• Laptop
• Allows any computer to be configured as the host • Websites
• Tablet/Mobile phone • Other web services

You might also like