2
Most read
4
Most read
5
Most read
PEER TO PEER (P2P)
• Concept was popularized by file sharing systems such as the music-sharing
application Napster
• P2P network is created when two or more PCs are connected and share
resources without going through a separate server.
• A couple of computers connected via a Universal Serial Bus to transfer
files
• Peers are both suppliers and consumers of resources
• Access rights are governed by setting sharing permissions on individual
machines.
• New peers can join the group while old peers leave at any time
• --> BitTorrent system, Skype.
• More vulnerable
• Routing attack, Denial of service
UNSTRUCTTURED PEER TO PEER
STRUCTURED PEER TO PEER
ADVANTAGES
• Use less expensive hardware
• Easy to administer
• User has full accessibility
• Ideal for small business and home users
• No NOS required
• Easy setup and low costsecure
DISADVANTAGES
• Not very secure
• No central point for storage
• Additional load on computer because
of resource sharing
• Hard to maintain version control
• May have duplication of resources
• Difficult to uphold security policy
CLIENT SERVER MODEL
• Request service, called clients and provide service are called sever
• Server is often designed to be a centralized system that serves many
clients.
• Clients and servers communicate over a computer network on separate
hardware
• Clients and servers exchange messages in a request response messaging
pattern
• To prevent abuse and maximize uptime, the server's software limits how
a client can use the server's resources.
• A denial of service attack exploits a server's obligation to process
requests by bombarding it with requests incessantly
ADVANTAGES
• Centralized security
• Faster accesss
• Single password
DISADVANTAGES
• Central point of failure
• Administrator required
• Server software required
• Can cause network congestion

peer to peer and client server model

  • 1.
    PEER TO PEER(P2P) • Concept was popularized by file sharing systems such as the music-sharing application Napster • P2P network is created when two or more PCs are connected and share resources without going through a separate server. • A couple of computers connected via a Universal Serial Bus to transfer files • Peers are both suppliers and consumers of resources • Access rights are governed by setting sharing permissions on individual machines. • New peers can join the group while old peers leave at any time • --> BitTorrent system, Skype. • More vulnerable • Routing attack, Denial of service
  • 2.
  • 3.
  • 4.
    ADVANTAGES • Use lessexpensive hardware • Easy to administer • User has full accessibility • Ideal for small business and home users • No NOS required • Easy setup and low costsecure DISADVANTAGES • Not very secure • No central point for storage • Additional load on computer because of resource sharing • Hard to maintain version control • May have duplication of resources • Difficult to uphold security policy
  • 5.
    CLIENT SERVER MODEL •Request service, called clients and provide service are called sever • Server is often designed to be a centralized system that serves many clients. • Clients and servers communicate over a computer network on separate hardware • Clients and servers exchange messages in a request response messaging pattern • To prevent abuse and maximize uptime, the server's software limits how a client can use the server's resources. • A denial of service attack exploits a server's obligation to process requests by bombarding it with requests incessantly
  • 7.
    ADVANTAGES • Centralized security •Faster accesss • Single password DISADVANTAGES • Central point of failure • Administrator required • Server software required • Can cause network congestion