Differentiate the client–server and peer-to-peer models of d, Basic Computer Science

Assignment Help:
The client-server model firmly differentiates the roles of the client and server. According to this model, the client requests services that are provided by the server. The peer-to-peer model doesn’t have such severe roles. In actual fact, all nodes in the system are considered peers and thus may act as either clients or servers or both. A node may request a service from any more peers, or the node may in fact give such a service to other peers in the system.
For instance, let’s consider a system of nodes that share cooking recipes. Under the client-server model, all formulas are stored with the server. If a client wishes to access a recipe, it must ask for the recipe from the specified server. Using the peer-to-peer model, a peer node could ask other peer nodes for the particular recipe. The node (or perhaps nodes) with the requested recipe could give it to the requesting node. Notice
How each peer may perform as both a client (i.e. it may request recipes) and as a server (it may give recipes.)

Related Discussions:- Differentiate the client–server and peer-to-peer models of d

Unix, Shell Scriptiong

Shell Scriptiong

Static ram, STATIC RAM: Flip-Flops are the basic memory cells in a stat...

STATIC RAM: Flip-Flops are the basic memory cells in a static RAM. Each flip-flop is based on either two bipolar transistors or two Metal Oxide Semiconductors Field-Effect Tra

Variable - concept of programming language, Variable - Concept of programmi...

Variable - Concept of programming language: Variable: As referencing memory by its physical address is very tedious, variable names are used. A variable is a symbolic name giv

Application software, APPLICATION SOFTWARE Application Software ...

APPLICATION SOFTWARE Application Software generally is the software which is used to generate customized applications for the clients. Ex: Word Star, Lotus 1-2-3, Ms-

Cryptography, Consider the one-time pad encryption scheme to encrypt a 1-bi...

Consider the one-time pad encryption scheme to encrypt a 1-bit message m, and assume m is chosen with uniform distribution from message space M={0,1}. Let E1 be the event "message

Represent the user interface, Question: CarRide.com is the web portal t...

Question: CarRide.com is the web portal to CarRide Ltd; a car rental company that makes full use of technological advances to make sure you enjoy the ride with your rental car.

Introduction to microprocessor, The microprocessor is at times referred to ...

The microprocessor is at times referred to as the ''brain'' of the personal computer, and is responsible for the processing of the instructions which creates computer software. It

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd