Differentiate the client–server and peer-to-peer models of d, Basic Computer Science

Assignment Help:
The client-server model firmly differentiates the roles of the client and server. According to this model, the client requests services that are provided by the server. The peer-to-peer model doesn’t have such severe roles. In actual fact, all nodes in the system are considered peers and thus may act as either clients or servers or both. A node may request a service from any more peers, or the node may in fact give such a service to other peers in the system.
For instance, let’s consider a system of nodes that share cooking recipes. Under the client-server model, all formulas are stored with the server. If a client wishes to access a recipe, it must ask for the recipe from the specified server. Using the peer-to-peer model, a peer node could ask other peer nodes for the particular recipe. The node (or perhaps nodes) with the requested recipe could give it to the requesting node. Notice
How each peer may perform as both a client (i.e. it may request recipes) and as a server (it may give recipes.)

Related Discussions:- Differentiate the client–server and peer-to-peer models of d

Process control management, Process Control Management:   A  process  ...

Process Control Management:   A  process  is an executing program. It is considered the standard unit of work within a computer system. Every executing program is treated as a

Application-specific multiprocessors, Application-Specific Multiprocessors ...

Application-Specific Multiprocessors Although this book details a variety of similar architectures, it specializes in the design of such architectures in the perspective of par

Autonomous rational agents - artificial intelligence, A utonomous Rational...

A utonomous Rational Agents: In many cases, it is not accurate to talk about a particular program or a particular  robot, as the combination of and software and hardware in so

Potential risks to information systems, Question 1 Write about Pot...

Question 1 Write about Potential Risks to Information Systems Factors to be addressed for making information systems more secure Question 2 Write about the foll

Comparison instructions , They are used to evaluate operators, and they hav...

They are used to evaluate operators, and they have an effect on the content of the flags. CMP CMPS (CMPSB) (CMPSW) CMP INSTRUCTION Idea: To measure up to the operators. Syntax: CMP

Data communication , (iv) Suppose that the TCP entity receives a 1.5 megaby...

(iv) Suppose that the TCP entity receives a 1.5 megabyte file from the application layer and that the IP layer is willing to carry blocks of maximum size 1500 bytes. Calculate the

Discrete math, Below you will find a question the areas of automata. Solve ...

Below you will find a question the areas of automata. Solve the problem showing all steps. Thoroughly explain how and why you performed each step with complete sentences. A finite

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd