Advantage and disadvantage of peep to peer network
Answers
Answered by
7
The advantages of peer to peer network are as follows:
The main advantage of peer to peer network is that it is easier to set upIn peer-to-peer networks all nodes are act as server as well as client therefore no need of dedicated server.The peer to peer network is less expensive.Peer to peer network is easier to set up and use this means that you can spend less time in the configuration and implementation of peer to peer network.It is not require for the peer to peer network to use the dedicated server computer. Any computer on the network can function as both a network server and a user workstation.
The disadvantages of peer to peer network
A computer can be accessed anytime.Network security has to be applied to each computer separately.Backup has to be performed on each computer separately.No centralized server is available to manage and control the access of data.Users have to use separate passwords on each computer in the network.As with most network systems, unsecure and unsigned codes may allow remote access to files on a victim's computer or even compromise the entire network
The main advantage of peer to peer network is that it is easier to set upIn peer-to-peer networks all nodes are act as server as well as client therefore no need of dedicated server.The peer to peer network is less expensive.Peer to peer network is easier to set up and use this means that you can spend less time in the configuration and implementation of peer to peer network.It is not require for the peer to peer network to use the dedicated server computer. Any computer on the network can function as both a network server and a user workstation.
The disadvantages of peer to peer network
A computer can be accessed anytime.Network security has to be applied to each computer separately.Backup has to be performed on each computer separately.No centralized server is available to manage and control the access of data.Users have to use separate passwords on each computer in the network.As with most network systems, unsecure and unsigned codes may allow remote access to files on a victim's computer or even compromise the entire network
Similar questions