Chapter 2
2.1 The role of Network
The role of the network is to improve data transfer and better documentation within the organization and beyond. User’s privilege can be determined through the network, an example is: determining what computer can access certain files on the network. These limitations can vary from user to user based on their role in the organization.
2.2 Peer-to-Peer, Peer-to-Peer over a client server Network and Client-Server
P2P computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the application. They are said to form a peer-to-peer network of nodes. Each node is a computer on the network which acts and communicates with other Peers to make a portion of their resources, such as processing power, disk storage or network bandwidth, directly available to other network participants, without the need for central coordination by servers or stable hosts.
2.2.1 Peer-to-Peer over a network
A P2P network is created when two or more PC’s are connected and share resources without going through a separate server computer.
2.2.2 Advantages of Peer-to-Peer over a Network
1) It is easy to install and so is the configuration of computers on this network,
2) All the resources and contents are shared by all the peers, unlike server-client architecture where Server shares all the contents and resources.
3) P2P is more reliable as central dependency is eliminated. Failure of one peer doesn’t affect the functioning of other peers. In case of Client –Server network, if server goes down whole network gets affected.
4) There is no need for full-time System Administrator. Eve...
... middle of paper ...
...agram below describes how data are being built up from various components and the protocol involved in each stage. Also, a short description of the protocol has being illustrated on the diagram.
6.2 Performance
This is an important aspect of a network, this shows the way data flows and also monitors the performance of the network. In reality, there are three main essential layers in the OSI model when send a packet, which are the physical layer, data Link layer, Network Layer.
When a packet is sent it goes through an Electrical/optical protocol in the physical layer to the data link layer (Switch, Hub). The data link layer determines the data is framed before being transmitted on the medium. After this step, it takes it to the logical network paths, which only happens in the network layer through a Router or a layer 3 Switch which can identify IP addressing.
Multiplexing will gather the data from the source host and give that data some header information. This data will be created into segments by demultiplexing and then be sent to the 3rd layer (Network layer). So to summarize multiplexing will gather data and give it header information and demultiplexing will create segments and sent them to the network layer. Now with flow control that will relate with multiplexing, mainly because it can take multiple data streams and combine them into one shared stream, making that a form of data flow control. Now as far as error checking that will relate to the frames of the data. The logical link control will use a frame check sequence (FCS) to check the frame to see if there is any problems with it. If it detects an error during the frame check sequence then the frame will be discarded and the data will be passed on to the network layer. With this all being said this will mainly be used in the OSI model since the logical link control is the sub-layer for the data link layer. (The other sub layer being MAC) Without the logical link control or 802.2 then the data link layer wouldn’t function
Backing up data, avoiding a single point of failure, and making sure data is only put where it needs to be are a few extra precautions to keeping your network secure [8].
Peer-to-peer (P2P) networks have had a staggering growth in the past few years. Since Napster, dozens of P2P networks have been created in its imitation. Due to the growing accessibility of broadband, which increases the speed of downloads, P2P networks generate nearly 1.8 billion downloads per month. Popularity and acceptance is still continually growing.
Will we find a replication of this history in P2P technology? Even though we will have to wait qui...
Sean Fanning and Sean Parker originally intended for Napster to be a “peer to peer” file-sharing program. Napster changed the way we as a community shared files. Instead of going out and buying a CD from one of your favorite artist, rather you could download their latest single and create your own CD rather than buying just one CD because you only like one of the songs. Instead you were converting different music files into MP3. These changes caused the Music Industry to take a hit singles were being released before they were even suppose to come out. CD sales dropped. The Record industry became outraged, even musicians started getting fed up. When it comes to the whole Napster vs. RIAA I had no idea that it was as huge as it was. I can understand
A network can be based on either a peer-to-peer level or server-based, also referred to as domain-based. To distinguish the difference, a peer-to-peer network, also known as a workgroup, is a network in which a group of computers are connected together to share resources, such as files, applications, or peripherals. The computers in a peer-to-peer network are peers to one another, meaning no single computer has control over one another. There is also no central location for users to access resources, which means that each individual computer must share their files in order for other computers to have access (Muller, 2003, p.411). “In a peer-to-peer environment, access rights are governed by setting sharing permissions on individual machines.” (Cope, 2002) On the other hand, in a domain-based network, the computers connected together are either servers or clients. All of the other computers connected to the network are called client computers. The server is a dedicated machine that acts as a central location for users to share and access resources. The server controls the level of authority each user has to the shared resources. When logging on to the network, users on client machines are authenticated by the server, based on a user name and password (Lowe, 2004, p.13).
What do P2P, File sharing, and Bit Torrent sites have in common? They all are file sharing websites that you can send and look at files with other billions of people. Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. File sharing is the practice of distributing or providing access to digital media, such as computer programs, multimedia (audio, images and video), documents or electronic books. Bit Torrent is a website used that is kind of like a peer-to-peer file sharing ("P2P") site which is used to distribute data and electronic files over the Internet. Be warned, though because these websites
Peer-to-peer is a communications model in which each party has the same capabilities and either party can initiate a communication session. Other models with which it might be contrasted include the client/server model and the master/slave model. In some cases, peer-to-peer communications is implemented by giving each communication node both server and client capabilities. In recent usage, peer-to-peer has come to describe applications in which users can use the Internet to exchange files with each other directly or through a mediating server.
This protocol associates a state with each cached copy of shared data block. The different states that can be associated with the block are as follows:
The first online peer to peer file-sharing application was Napster. Napster allowed people to copy music from their CDs onto their computers in mp3 format. They then allowed other members of Napster to download these songs onto their computers. Once this caught on, millions of people were downloading thousands of songs a day. And as you can imagine, this did not make the record companies happy with the idea that people were getting their music for free instead of buying the CD. It also caused a problem with some of the recording artists. Most notably Metallica.
Have you ever needed to have more than one home computer for you and your family? Do you have two or more computers, but need to copy and/or share files and/or programs between them, but you don’t know how? Do all of your computers need Internet access, but you don’t want to have a phone line installed for each of them? Well, you can do all of this. I know, because this is what I did at my home. After doing research I found that there are several advantages for having your own Home Computer Network. Following, are several reasons to do this in your house.
All around the world people connected to the internet are downloading free digital content through P2P file sharing software.
Peer-to-peer (P2P) is a substitute network design to the conventional client-server architecture. P2P networks utilize a decentralised model in which each system, act as a peer, and serve as a client with its own layer of server functionality. A companion plays the role of a client and a server in the meantime. That is, the node can send calls to other nodes, and at the same time respond to approaching calls from other companions in the system. It is different from the traditional client-server model where a client can just send requests to a server and then wait for the server’s response.
P2P technically stands for "peer-to-peer." A peer-to-peer architecture allows hardware or software to function on a network without the need for central servers. The person connects directly to his or her peer through a dedicated connection where no one else can interfere. An example of P2P chat clients are MSN Messenger and Yahoo Messenger. These P2P clients make chatting user-friendly and interesting as there are options for a web cam or an audio conversation, and options to transfer files from one peer to another. The use of emoticons makes the conversation either more real or more fun.
... middle of paper ... ... TCP/IP operates at levels 3 and 4 of the OSI model.