Skip to main content

PEER TO PEER NETWORK MODEL: HOW CAN IT MAKE A DIFFERENCE IN YOUR EVERYDAY TASK?

When using  peer-to-peer network model, the operating system of each computer on the network is responsible for controlling access to its resources without centralized control.  The computers are known as nodes or hosts on the network, form a logical group of computers and users that share resources.  Each computer using peer-to-peer network controls its own administration, resources and security.  Basically, it functions without any intermediary.  


The types of operating system that can be installed on computers in a peer to peer network are Windows, Linux and macOS.



You can also be more open to knowing how this Peer-to-peer settings can help you in your studies as well as in the future.



Keep in mind that the connecting lines describes the logical arrangement or topology of the group of computers.




THE ADVANTAGES OF USING PEER-TO-PEER NETWORKS:

They are simple to configure. For these reason, this network type can be used where technical assistants are scarce.

They are often less expensive to set up and maintain than any other types of networks.

Built in redundancy


THE DISADVANTAGES OF USING PEER-TO-PEER NETWORKS:

They are not scalable, whereby, as a peer-to-peer network grows larger, adding or changing significant elements of the network may be difficult.

They are not necessarily secure, meaning that in simple installations, data and other resources shared by network users can be easily discovered and used by unauthorized people. 

They are not practical for connecting more than a few computers because it’s too time consuming to manage the resources on the network. 

Not very secure

No central point of storage or file archiving

Additional load on computer due to resource sharing

Hard to maintain version control

Exclusive e-book by GetResponse and Joanna Wiebe

Comments

Popular posts from this blog

THE OSI MODEL: THE 7 LAYERS IN NETWORKING EXPLAINED

 The Open Systems Interconnection (OSI)  was developed by the International Organization for Standardization in 1984 to enable different types of networks to be linked together.  The model contains seven layers, as shown in the Figure below. These layers describe networking functions from the physical network interface to the software applications interfaces. The intent of the OSI model is to provide a framework for networking that ensures compatibility in the network hardware and software and to accelerate the development of new networking technologies.  Physical layer Provides the electrical and mechanical connection to the network. Examples of technologies working in this layer are Electronic Industries Alliance/Telecommunications Industry Association (EIA/TIA)–related technologies, UTP, fiber, and network interface cards (NICs).  It uses topologies: BUS, STAR, RING, MESH Communication modes: Simplex, Half Duplex, Full Duplex Hardware including ne...

FUNDAMENTALS OF NETWORKING

JOB OPPORTUNITIES IN NETWORKING A short discussion can be on: Provide job opportunities that has taken your interest based on the video watched...  WHAT IS A NETWORK?  A network is  a group of computers & other devices that are connected by some type of transmission media. A network can be as small as two computers connected together by a cable or can even be made up of  billions of computers & other devices connected across the world through radio waves, satellites, infra red beams, cable, wireless and even phone lines. The other devices can be referred to cell phones, personal computers, mainframe computers, printers, scanners, security cameras, vehicles and wearable technology devices. TYPES OF NETWORK  Local Area Network (LAN) Metropolitan Area Network (MAN) Wide Area Network (WAN) Personal Area Network (PAN)

HOW CAN CLIENT / SERVER NETWORK MODEL BE A CHANGE FOR YOU??

WHAT IS CLIENT / SERVER?  In the client-server network model (which is sometimes called the client-server architecture or client-server topology), resources are managed by the network operating system through a centralized directory database.  The database can be managed by one or more servers, as long as they have the same network operating system. In the midst of a WINDOWS SERVER   controls network access to a group of computers, this LOGICAL group is known as Windows DOMAIN .  The centralized directory database that keeps user account information & security for the entire group of computers is called AD (Active Directory) .   Each user on the network has his/her own domain level account assigned by the network administrator and kept in Active Directory .   A user can sign on to the network from any computer on the network and get access to the resources that Active Directory allows. The process is managed by AD DS (Active Directo...