Explain peer-to-peer networking model, Computer Networking

Assignment Help:

Explain Peer-to-Peer Networking Model.

A networking model where every workstation has equivalent capabilities and responsibilities is called as peer-to-peer model. There is no central server in this network and computers join hands to share files, printers and Internet access. It is practical for workgroups of a dozen or less computers making it common environments, where every PC acts as an independent workstation that stores data on its own disk but which can share it with all other PCs on the network. Software for peer-to-peer network is contained with most modern desktop operating systems like Windows and Mac OS.

 


Related Discussions:- Explain peer-to-peer networking model

Show the seven layers of iso''s osi model, Q. Show the seven layers of ISO'...

Q. Show the seven layers of ISO's OSI model? Ans:- The seven layers are given below:   -  Application Layer -  Presentation Layer -  Session Layer -  Transport Laye

Illustrate go back - N protocol, Q. Illustrate Go Back - N protocol? G...

Q. Illustrate Go Back - N protocol? Go Back - N - Sender window size - Receiver window size = 1 - Why the names go back- N? - When the frame is spoilt the sende

State the software requirement for an intranet, State the Software requir...

State the Software requirement for an intranet To develop an Intranet the first we should design a Client /Server model for our network. As you know clients are the computers

Message passing in pvm, Message Passing The PVM communication model giv...

Message Passing The PVM communication model gives asynchronous blocking receive, asynchronous blocking send and nonblocking receive functions. In our methodology, a blocking se

Explain collision, When the signal hits to each other, collision accord.

When the signal hits to each other, collision accord.

Routing table - network layer and routing , Routing Table Each  router ...

Routing Table Each  router now  uses the  shortest path tree to construct its routing table . each  router  uses the same algorithm and the same link state  database its own sh

Explain the types of security threats, Q. Explain the types of Security Thr...

Q. Explain the types of Security Threats? (a) Normal Flow (b) Interruption: An asset of a system develops into unavailable or unusable. (c) Interception: A few unaut

What is bandwidth, Question 1 What is bandwidth?                         >...

Question 1 What is bandwidth?                         >>What is the bandwidth of                            a) Telephone signal                            b) Commercial radio broa

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd