1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Soloha48 [4]
4 years ago
9

Compare and contrast between Client/Server and Peer-to-Peer networks. What are some of the business benefits of using such netwo

rks? Support your answer with examples.
Computers and Technology
1 answer:
fgiga [73]4 years ago
3 0
Client/Server and Peer-to-Peer networks are the two major network architecture models in use today. They each have advantages and disadvantages that can be used to benefit a particular outcome.

Briefly, the client/server model relates to one or many client performing relatively simple requests, which are then executed by a server. The server is performing more complex tasks, and often interacting with many clients simultaneously. Examples of client/server models include most websites, including the Brainly page you are running right this instant. Your web browser is acting as a client, and the Brainly.com website is running as a web server. It receives simple requests or information from your browser, such as clicking on a question or text typed by your keyboard, and then acts on this information by consulting a database, returning values, or returning a whole new web page to your browser. The client/server model is very powerful in business as it allows powerful and secure server-side processing and relatively simple clients. Office 365 that runs all microsoft office suites such as word and excel in a web browser on 'the cloud' is an example of a highly sophisticated client/server architecture.

By contrast, peer-to-peer networks are a distributed architecture of equals. Instead of a simple client and complex server, all clients are equals and link together to form nodes on a distributed network. There is no central control (server) and each node acts as a client and server to other nodes. This is also an extremely powerful network; as there is no central control it is difficult to shut down a peer-to-peer network. Taking out one node will not break the network in comparison to the client/server architecture where if the server goes down, services halt. Prime examples of famous peer-to-peer networks are the Bitcoin network and similar cryptographic currency networks, and music and file sharing networks such as Torrents. The torrent tracker websites are client/server however once a torrent is loaded into a torrent downloading application, the file is collectively downloaded from hundreds of 'peers' across the world as part of the torrent peer-to-peer network.


You might be interested in
Que compone una maquina Rube Goldberg (operadores mecánicos- maquinas simples – mecanismos)
Veseljchak [2.6K]

Answer:

dominoes, fans, PVC pipe, magnets, duct tape, marbles, cups or bowls, miniature toy cars, paper towel tubes, string.

------------------------------------------------------------------------------------------------------------

dominó, abanicos, tubos de PVC, imanes, cinta adhesiva, canicas, tazas o cuencos, carros de juguete en miniatura, tubos de toallas de papel, cuerdas.

Explanation:

3 0
3 years ago
Why do you think viruses are called “viruses”? What do they have in common with the living viruses that cause diseases in humans
Vinvika [58]

Answer:

Computer viruses are referred to living viruses as they both have similar effects.

Explanation:

While living viruses invade cells and cause harmful effects on the body, computer viruses basically do the same thing. Computer viruses are a malicious code that inserts itself into a computer. It's designed to spread to one computer to another, just like a living virus.

Similarities:

  • Spreads from one host to another.
  • They both alter/harm the host.
  • Both can replicate itself.

Differences:

  • A computer virus is manmade, while living viruses aren't.
  • A computer virus needs to be removed manually through an app or software while living viruses are almost curable medicine.
  • A computer virus effects machines and software while living viruses only infect living organisms.
5 0
3 years ago
Read 2 more answers
1. Which of these is NOT true about Torsion Bars? A. They can be used to adjust Ride Height B. They can be adjusted anytime sinc
Strike441 [17]

My answer is B: They can be adjusted anytime since they don't affect alignment angles.

Option A is correct. Manufactures can change the Torsion bar to adjust the ride height. This is done to compensate the engine weight. Option C is  correct. The torsion’s bar acquires a twisting motion on one end of the suspension, and is firmly fixed to the car’s frame at the other end. Actually, it attaches to the lower control ARM and a cross member key on the chassis frame. Option D is also correct. When a wheel passes over a bump, the Torsion bar acquires a twisting motion on one end of an object whose other end is fixed.


7 0
3 years ago
Does anyone know what the name of the game is, where you click on the grey dots in a 3x3 grid and try to make them all the same
antoniya [11.8K]

Answer:

Its the pattern puzzle game.

Explanation:

The answer is straight forward. Its a pattern puzzle game, and here we need to change everything to same color, and that is a pattern of this pattern game. Many forms of such pattern games are available, but this one happens to be the most popular among them all, and is widely used by various people of all ages to pass their time.

3 0
3 years ago
Software on the nas handles features such as data storage, file access, and file and storage management. true or false
Alexus [3.1K]
True! pretty sure :D
7 0
3 years ago
Read 2 more answers
Other questions:
  • In a word processor, Tariq chooses Options from the Tools menu and then selects the Track Changes tab. Which of the following ta
    14·1 answer
  • A _______ is a piece of computer hardware used for the modulation and demodulation of data between digital and analog formats.
    10·1 answer
  • Write a MIPS program to generate the following series of integers: 1, 2, 3. 6, 9, 18. 27, 54. 81. If you are curious where this
    13·1 answer
  • A raised dot (ú) shows where the enter key was pressed. true or false.
    13·1 answer
  • A network administrator receives a call from the sales department requesting ports 20 and 21 be opened on the company’s firewall
    12·1 answer
  • What type of encryption is currently used to secure wpa2?
    12·1 answer
  • The website of an international human rights organization stores a large database of information and provides search functionali
    15·1 answer
  • There are two kinds of type that you can add to a document in Photoshop. You can add
    13·1 answer
  • What is a type of local network that people can use to access the<br> Internet?
    8·1 answer
  • Write a Python program that accepts a year written as a four-digit Arabic (ordinary) numeral and outputs the year written in Rom
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!