Point to point architecture - application layer, Computer Networking

Assignment Help:

Point to Point Architecture

The term  peer means equal which can  be informally  interpreted as a process with  capability similar to the other processes with process communicates. In the context of P2P networks a peer process acts as a client process and at the same  time a server process for the  same functions. For example  a process  that downloads files from other and meanwhile  the process shared files  for others  to download  is a peer process in file downloading uploading. There is  no distinction between  these  processes  in terms  of which  is  providing  or using  services. Peer processes communicate  with each other  in  a symmetric pattern.  Note that the function that a peer process requests and offer  must  by the  same  within  the context of a given applications.

In P2P architecture  there is not an always   on server at the  centre of the applications. Instead arbitrary pairs of hosts called peers communicate directly with  each other because the peers communicate  without  passing through some  special server, the  architecture is called peer to peer. The P2P architecture is illustrated in figure 3.1 (b).

 One of the greatest strengths of the P2P architecture is its scalability. For  example  in a P2P file  sharing application millions of peers may participate  in the file sharing community with each one functioning  as a server and contributing resources  files and also  community. This while  each peer  will generals work load by requesting files, and  also adds serves  capacity to the system sub responding to the requests of other peers. Thus  increases the demand but also increase service capacity on the  other hand because of  the highly  distributed and decentralized nature  of P2P applications they can be difficult  to manage.

183_Point to Point Architecture.png

                                             figure client Server Application P2P architecture


Related Discussions:- Point to point architecture - application layer

Role of design in achieving reliability, ROLE OF DESIGN IN ACHIEVING RELIAB...

ROLE OF DESIGN IN ACHIEVING RELIABILITY One of the most important methods for achieving high reliability is through design.  Use reliability cannot be higher than the design re

Factor causing parallel overheads, Factor Causing Parallel Overheads F...

Factor Causing Parallel Overheads Figure clearly explains that the performance metrics are not able to achieve a linear curve in comparison to the enhance in number of process

Sonet frame format - sonet sdh, SONET Frame Format SONET  uses  a basic...

SONET Frame Format SONET  uses  a basic  transmission  rate of STS -1 that  is equivalent to 51.84 mbps. Higher level  signals  are integer multiples of the base rate. For  exa

INAB-426-, As• New Content (Week 5) o System Integration Implementation P...

As• New Content (Week 5) o System Integration Implementation Plan ? Develop a detailed implementation plan that captures the following (address 4 of these): ? Testing activitie

Access networks and physical media - computer network, Access Networks and ...

Access Networks and Physical Media Access  networks  are the  physical  links(S) that connect  an end  systems to its edge  router. Which  is the  first router on a path  fr

Network and system administration, The goal of this assignment is to provid...

The goal of this assignment is to provide an exposure to Network and System Administration issues. For the project, you are required to design/configure/implement/test/review a Net

What are the data link protocols, What are the Data link protocols? Dat...

What are the Data link protocols? Data link protocols are sets of specifications used to implement the data link layer. The categories of Data Link protocols are 1. Asynchro

Difference between routable and non- routable protocols, What is the differ...

What is the difference between routable and non- routable protocols? Ans) Routable protocols can work with a router and can be used to build huge networks. Non-Routable protocol

Why routine security audits are essential, Why Routine security audits are ...

Why Routine security audits are essential It is essential that regular security audits are conducted to find out physically which computer is connected and permits access to

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd