0% found this document useful (0 votes)
254 views

Client-Server Report

The document discusses and compares client-server and peer-to-peer (P2P) network architectures. In a client-server architecture, central servers store resources and respond to requests from multiple clients. Common examples include WhatsApp and Facebook. P2P architectures decentralize resources across peers that can both request and provide resources to other peers, like BitTorrent. While client-server is easier to maintain and secure, P2P improves download speeds and does not require servers. Both architectures face security challenges that can be addressed through protocols like SSH, SSL, and blockchain technologies.

Uploaded by

sudersen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
254 views

Client-Server Report

The document discusses and compares client-server and peer-to-peer (P2P) network architectures. In a client-server architecture, central servers store resources and respond to requests from multiple clients. Common examples include WhatsApp and Facebook. P2P architectures decentralize resources across peers that can both request and provide resources to other peers, like BitTorrent. While client-server is easier to maintain and secure, P2P improves download speeds and does not require servers. Both architectures face security challenges that can be addressed through protocols like SSH, SSL, and blockchain technologies.

Uploaded by

sudersen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

With the rampant growth in technology, Internet/web is playing a major role in our daily

lives, where whatever we need do virtually requires an internet connection. So, it is not only used
for computers but foe other technologies too. For instance, network architectures. There are two
types of architecture which is client/server architecture and peer-to-peer architecture.

Client/Server architecture basically requires central service responding to client request.


Two computers typically communicate with each other by using request/response protocol. The
requestor takes on the role of a client and the responder takes on the role of a server [1]. Two-tier
and three-tier architectures are most commonly used to communicate each other. The client and
server perform distinct functions where the communicate each other by inter-processing to
exchange packets/data in between them [1,2].

Send request

Return result

Computer Server/Database

Diagram 1.1 shows two-tier architecture where server


act as a database as well.

Send request Search data

Return result Retrieve data

Computer Server Database

Diagram 1.2 shows three-tier architecture where


server and database are separated.

Example client/server architecture


 Whatsapp
 Facebook
 Instagram

Example scenario on Whatsapp


a. User A sends a “Hello” message to user B using Whatsapp application
b. The dedicated server receives the message and send (send request) it to the User B
c. If the server is not able to send the message, the message remains with one tick
(return result); else the message will be seen or displays with two ticks.
d. This occurs vice-versa. The server supports multiple concurrent clients and
provides large number of resources in the server [2].
Due to damages, natural phenomena that causes server to corrupt or disrupt and comes at
the stage where data cannot be retrieved, P2P networks becomes a solution for it. P2P networks
decentralized the resources on a network. A P2P Cloud allows organizations or even individual
to build a computing infrastructure out of existing resources, which can be easily allocated
among different tasks [3]. Data can be located anywhere and on any device. Data is accessed
from a peer device without the use of a dedicated server. Each device (called as a peer) can
function as both a server and a client.

Diagram 1.3 shows multiple computer system make


connections between peers in order to transfer data
between each other.

Example peer-to-peer server


 Bitcoin
 Bittorent
 E-donkey

Example scenario on Bittorent


a. User A and User B downloads a file called “Hi.mp3”.
b. Bittorent, then splits the file and sends the one part to User A and the other part to
UserB, and let the users to download the part they are missing from each other.
This reduces the time and load on the server.

Although both architectures are popular, each of them has their pros’ and cons’ as well.

Client/Server architecture

Pros’ Con’s

1. Allows easier
1. Required skilled
sharing of data from
person to maintain
client to servers.
the server.
2. Reduces and avoids
2. Servers are literally
data duplication by
expensive
storing the resources
3. Security issues
in server rather than
in client.
3. Splits the process of
application across
multiple nodes [2]

Peer-to-Peer architecture
Pros’ Con’s

1. User performance
1. Increase in download
can be slowed due to
speed.
each node is
2. No need for a
accessed frequently
network operating
2. Resources cannot be
system
centrally backed up.
3. Easy architecture
3. Any intrusion or
setup
virus attacks is fully
4. No server is required
responsible by the
individual.
4. No securities besides
the permission
Diagram 1.4 shows a client/server architecture
simulated in packet tracer

A network tool called packet tracer is used as a simulation in order to create the client/server
architecture. 5 computers, 3 mobile phones, 1 router and 1 server are used in this representation.
Ip address is assigned manually for the wired devices and DHCP is used for the wireless devices
as the router is able to assign the IP address accordingly. For instance, if PC0 requests a data the
data is received by the router and sends it to the server. Then, the server returns back the packet
as per the PC0 request. If server fails, error message is sent back to the PC0.

IP address table
NODE IP ADRESS

PC0 192.168.0.3

PC1 192.168.0.4

PC2 192.168.0.5

PC3 192.168.0.106

PC4 192.168.0.107

SMARTPHONE0 192.168.0.101

SMARTPHONE1 192.168.0.103

SMARTPHONE2 192.168.0.105

SERVER0 192.168.0.2

DNS server: 192.168.0.101

ROUTER0 192.168.0.1
Diagram 1.4 shows a client/server architecture
simulated in packet tracer

While in peer-to-peer architecture, server is removed. 3 smartphones, 5 computers, 1


access point, 1 switch, 1 router is used in this architecture. In order to reduce the load to the
router, an access point is used to connect the wireless devices. Each peer is connected to another
peer in order to transmit/ exchange data for each other.
IP address table

NODE IP ADRESS

PC0 192.168.1.2

PC1 192.168.1.6

PC2 192.168.1.4

PC3 192.168.1.3

PC4 192.168.1.5

SMARTPHONE0 192.168.1.7

SMARTPHONE1 192.168.1.9

SMARTPHONE2 192.168.1.8

ROUTER0 192.168.1.1

Although web have been so popular these days, vulnerability and exploits do grow. In
order to reduce it, various securities are implemented to establish a secured connection between
network architectures. Firstly, client/server architecture uses :

1. SSH (Secured Shell) protocol


a. To establish a protected connection between the client and the server. This
protocol uses port 22.

2. FTPS (Secured file transfer protocol)


a. Transfers the files from server danger-free of hackers compromising or
stealing data. It basically, encrypts the data while sending and decrypts it once
reached the targeted node.

3. SSL (Secured Socket Layer) certificates are used


a. It authenticates the user and authority signs. The program jumbles data so that
sensitive information is not leaked.
Secondly, the big defect for P2P network is security. P2P only uses secured socket layers
(SSL) as the protection. SSL ensure privacy when interacting with peers via internet and without
interference as well. But, by introducing blockchain for P2P network will be the most secured
platform as it ensures tamper-free network environment.

Network scalability for client/server architecture

 Services provided via the internet are optimized when those services are located where
there are big pipes.
 ISPs build their networks with a hierarchy of bandwidth, and even constrain some
customers’ (residential) bandwidth for uploading so they are less likely to be servers.
 Content providers and other major web services can also be distributed in multiple
locations which are closer to the customers.

Network scalability for P2P architecture

 Because most users have a private IPv4 address and NAT is required for internet access,
each peer must access a central index server to get the location of a resource stored on
another peer.
o The index server helps to connect two peers, but after connected, the
communication may take place between the two peers without additional
communication to the index server – (TCP/UDP hole punching, NAT transversal).

 As solution IPv6 address is used for a reliable connection.


References

[1]. Kratky, S., & Reichenberger, C. (2013). Client/Server Development based on the
Apple Event Object Model. Atlanta.

[2]. Kambalyal, C. (2010). 3-tier architecture. Retrieved On, 2.

[3]. Clouds and peer-to-peer. URL, June 11 2009.


http://berkeleyclouds.blogspot.com/2009/06/clouds-and-peer-to-peer.html.

[4]. Davis, P.T.(Editor) (1996). Securing Client/Server Computer Networks. McGraw-


Hill, USA

[5]. Sultan, N. (2010). Cloud computing for education: A new dawn?. International
Journal of Information Management, 30(2), 109- 116.

[6]. P. E. Renaud, Introduction To Client/Server Systems: A Practical Guide For Systems


Professionals, Wiley & Sons, 1993.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy