Disadvantages of client - server architecture , Other Subject

Assignment Help:

Disadvantages

  • Traffic overcrowding on the network has been an subject since the inception of the client-server paradigm. As the amount of instantaneous client requests to a given server increases, the server can turn out to be severely overfull. Contrast that to a P2P network, wherever its bandwidth really increases as extra nodes are added, since the P2P network's in general bandwidth can be approximately computed as the sum of the bandwidths of each node in that network.
  • The client-server model lacks the robustness of a good P2P network. Below client-server, should a serious server fail, clients' requirements cannot be fulfilled. In P2P networks, assets are typically distributed among numerous nodes. Even if one or more nodes disappear and dispose of a downloading file, for instance, the left over nodes should still have the data wanted to complete the download.

Exact types of clients include email clients, web browsers, and online chat clients. detailed types of servers comprise web servers, ftp servers, application servers, database servers, mail servers, file servers, print servers, and terminal servers. Most web services are also types of servers.


Related Discussions:- Disadvantages of client - server architecture

Portal -engine business unit, Project Name : Portal -Engine Business Unit, ...

Project Name : Portal -Engine Business Unit, Role : Team Management. Estimation and Plan. Involved in Requirement Gathering, System Architecture & Design. Presentation & Docum

Process of information security, Process The terms reasonable and prude...

Process The terms reasonable and prudent person, due diligence and due care have been used in the fields of Securities, Finance, and Law for a lot of years. In recent years the

Electronic benefit transfer, Electronic Benefit Transfer Electronic Fun...

Electronic Benefit Transfer Electronic Funds Transfer at Point of Sale (EFTPOS) is an Australian and New Zealand electronic processing system for credit cards, debit cards and

Analysis of business applications, Analysis of Business Applications: ...

Analysis of Business Applications: Designation : Consultant,Faculty Job Profile : The work included Training, leading the Team, designing, developing and documenting

Examine the role of the community, (a) How far can schools institutionalis...

(a) How far can schools institutionalise local action through transformational empowerment and social cohesion and help low attaining schools in socially disadvantaged areas? Give

History of information technology, History of Information Technology: In t...

History of Information Technology: In the year of 1960s and 1970s, the term information technology (IT) was a little known phrase which was used by those who worked in places such

PRODUCT MIX, PRODUCT MIX OF LG COMPZNY??

PRODUCT MIX OF LG COMPZNY??

Is there a feminist methodology?, Is there a Feminist Methodology? The ...

Is there a Feminist Methodology? The question of whether feminism has developed distinct methodological principles that could justify the establishment of a distinct methodolog

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd