Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have a permission to ask a question, You must login to ask question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

Network Classmate

Network Classmate Logo Network Classmate Logo

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • FAQs
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
Home/ Questions/Q 2698
Next
In Process
Vipin Chauhan
Vipin ChauhanLevel 30
Asked: August 3, 20212021-08-03T16:24:34+05:30 2021-08-03T16:24:34+05:30

What Do The Client/Server And Peer-To-Peer Network Models Have In Common?

What Do The Client/Server And Peer-To-Peer Network Models Have In Common?
  • 3
  • 1 1 Answer
  • 494 Views
  • 0 Followers
  • Share
    Share
    • Share on Facebook
    • Share on Twitter
    • Share on LinkedIn
    • Share on WhatsApp

Related Questions

  • What Is Socks Proxy On My Mac?
  • What Are The Most Dangerous Websites?
  • What Does -C Mean In Linux?
  • What Does The Root Port Mean?
  • What Is The Maximum Distance For Coaxial Cable?

You must login to add an answer.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

1 Answer

  • Voted
  • Oldest
  • Recent
  1. Network Classmate Bronze
    2021-08-04T00:08:34+05:30Added an answer on August 4, 2021 at 12:08 am

    What do the client/server and peer-to-peer network models have in common?
    Now, let us learn about the client-server model and the peer-to-peer model. These two are the two networking models.
    The client-server model, that requires the central servers that are responding to the client requests. And the peer-to-peer network model, there are different variations in the peer-to-peer network model. Now let us look briefly into each of the client-server and the peer-to-peer models.

    When we go in a traditional way, the networking has been built on the client-server architecture. In the client-server model, two computers typically can communicate with each other by using the ad of the request the response.

    The quiet requestor who asking for the service is the client.
    And the responder is the one that servicing and takes the role of a server. In the client-server model, the files are downloaded from the server, and files are uploaded by the client, so when we think of the computers, it looks like we are downloading the webpages, files, or any other data. When we are sending the information, we are usually uploading the information to the server or by uploading the request.

    The servers can have multiple clients that request the information at the same time.
    The server needs software and also needs processing power and the memory and stage. The server has to see that every client should maintain the window sizes congestion window sends the window and receive the window sequence numbers, all this information should be maintained for each client that takes the more processing memory.

    Now let us discuss the peer to peer, networking model. In the peer-to-peer model, the landers with the IPV4 mostly concerns.
    The peer-to-peer can decentralize the resources on a network, it says that anybody can be a server and the data can be located anywhere. On any connected device, in the peer-to-peer architecture, the data is accessed from a peer device to another peer device without going through any kind of dedicated server.

    In the peer-to-peer model, anybody can access the information and anybody can share the information together. Each device can be known as a peer and can function as both the client and the server.
    There are some common peers to peer networks, let us discuss each of them briefly. Bitcoin, G2, BitTorrent,eDonkey are some of the examples of the peer-to-peer network. One of the main problems in peer to peer model is that the private IPV4 addresses as an act, the customer can communicate with another customer if they have the same private IPV4 address. We cannot just directly connect with each other.

    We use the index server to make the connection between the two servers. After the connection is established, there is no need to communicate with the index server.

    We use the TCP/IP hole punching and the NAT traversals that add some of the complications to the application like network latency delay. It is just a workaround to allow these two private network devices to be able to communicate with each other. We can use the IPV6 where we can directly communicate with each other without any private IPs.

    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp

Sidebar

Ask A Question

Top Members

Shailendra Yadav

Shailendra Yadav

  • 0 Questions
  • 51k Points
Level 50
Sneha Singh

Sneha Singh

  • 0 Questions
  • 40k Points
Level 40
Vipin Chauhan

Vipin Chauhan

  • 0 Questions
  • 32k Points
Level 30
  • Popular
  • Comments
  • Shailendra Yadav

    Network Theory PDF

    • 0 Comments
  • Shailendra Yadav

    Network Management Accounting And Performance Strategies PDF

    • 0 Comments
  • Shailendra Yadav

    Zigbee Wireless Sensor And Control Network PDF

    • 0 Comments
  • Shailendra Yadav

    Radio Access Network PDF

    • 0 Comments
  • Shailendra Yadav

    Network Security Articles PDF

    • 0 Comments

  • Home
  • Groups page
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Communities
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • FAQs

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2021 Network Classmate™. All Rights Reserved.
Designed by LeadsNut

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT