3.2 Making Provisions For Applications And Services Flashcards

1
Q

How Data Requests Occur and Are Filled?

A
  1. Client/server model
  2. Application layer services and protocols
  3. Peer-to-peer networking and applications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Advantages of client/server model

A
  • Centralized administration
  • Security is easier to enforce
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Client/Server Mode

A
  • Resources are stored on the server
  • Files are uploaded from the client to the server and downloaded from the server to the client
  • A client is a hardware/software combination that people use directly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Servers

A
  • Any device that responds to requests from client applications
  • Usually a computer that contains information to be shared with many client systems
  • Example: web pages, documents, database, pictures, videos, audio files
  • In other cases, such as network printer, the print server delivers the client print requests to the specified printer
  • Server daemon
    • a service, or process the server runs
  • Repositories of information
  • Processes control the delivery of files to clients
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Application Layer Services and Protocols

A
  • Multiple Clients’ Service Requests
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Peer-to-Peer (P2P) Networking and Applications

A
  • P2P networking involves 2 distinct forms:
    1. Peer-to-peer network design
    2. Peer-to-peer applications
      Both forms have similar features but in practice work very differently
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Peer-to-Peer (P2P) Networks

A
  • Two or more computers are connected through a network and are able to share resources such as printers and files without having a dedicated server
  • Every connected end device, know as peer, can function as a client or server on a ‘per request’ basis
  • In a peer-to-peer exchange, both devices are considered equal in the communication process
  • Resources are decentralized (information can be located anywhere) on a network
  • Difficult to enforce security and access policies
  • User accounts and access rights have to be set individually on each peer device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

P2P Applications

A
  • Unlike P2P networks, a device can act as both the client and server within the same communication session
  • Require that each end device provide user interface and run a background service
  • Can be used on P2P networks, client/server networks and across the internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

P2P Hybrid System

A
  • Utilizes a centralized directory called an index server even though the files being shared are on the individual host machines
  • Each peer accesses the index server to get to the location of a resource stored on another peer
  • The index server can also help connect two peers, but after they are connected, the communication takes place between the two peers without additional communication to the index server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly