209 project outline
TRANSCRIPT
What are they? Client/Server
Client/Server Applications go from the client side, and send the information to a centralized server.
Different from Peer-to-Peer
Will discuss P2P in later slides
Your Internet Browser is a Client/Server application!
Where they would work
Typically, bigger companies will use Client/Server model for their networking.
Every Web browser is a Client/Server application.
Email clients are Client/Server
Examples of Client/Server Applications
The entire Internet is a giant Client/Server App, in the form of TCP/IP
Web Browsers that access the Internet are Client/Server applications too
Email clients use this C/S method
Network printers use this application
A bigger example would be a company that stores all of its’ data on a big centralized server
What are they? Peer-to-Peer
The computers share direct information with each other, without the use of a centralized server.
This means the computer does not lose data if another computer crashes, like they would if they were using a server
This also mean less down time due to inability to connect
How they work exactly (P2P)
Rather than the centralized server of a Client/Server application, computers connect over a network to another computer directly.
This converts to faster transfer times
This also comes with more risks
Where they would work (P2P)
Smaller companies might be able to make use of this model, as well as websites that share files. Another use for this is video or voice chat over computers.
Schools could also make use of Peer-to-Peer software, for computer supervision.
Examples of P2P Applications
Skype uses P2P
Bitcoin, a popular internet currency
File sharing sites (Even illegitimate ones!)
Cons of Client/Server Applications
Costs become higher the more clients you have
Risk of Server crashing and losing data, time, and money
Pros of Peer-to-Peer Applications
Applications easy to install and configure
Possibility to be faster
No risk of server crashing and losing data
Cheaper than Client/Server applications
No need for System Administrator
Cons of Peer-to-Peer applications
Security risks with physical security.
Viruses are easily transferred
Data recovery is nearly impossible
Used for illegal purposes a lot of times