Programming Models: Client-Server, Process Groups, and Peer-to-Peer

Author(s):  
Robbert van Renesse
Author(s):  
Chr Carter ◽  
Abdennour El Rhalibi ◽  
Madjid Merabti ◽  
A. Taleb Bendiab
Keyword(s):  

Author(s):  
S. H. Kwok ◽  
Y. M. Cheung ◽  
K. Y. Chan

A recent survey revealed that 18 millions American Internet users, or approximately 14% of total American Internet population have peer-to-peer (P2P) file-sharing applications running on their computers (Rainie & Madden, 2004). Not surprisingly, P2P applications have become common tools for information sharing and distribution since the appearance of Napster (Napster, 2003) in 1999. P2P systems are the distributed systems in which all nodes are equal in terms of functionality and able to directly communicate with each other without the coordination of a powerful server. Anonymity, scalability, fault resilience, decentralization and self-organization are the distinct characteristics of P2P computing (Milojicic et al., 2002) compared with the traditional client-server computing. P2P computing is believed to be capable of overcoming limitations of the computing environment placed by the client-server computing model. Milojicic et al. (2002), for example, suggested that P2P computing is capable of providing improved scalability by eliminating the limiting factor, the centralized server existing in the client-server computing. In the past few years, P2P computing and its promised characteristics have caught the attention of researchers who have studied the existing P2P networks, and the advantages and disadvantage of P2P systems. Important findings include the excessive network traffic caused by flooding-based searching mechanism that must be tackled in order to fully utilize the improved scalability of P2P systems (Matei, Iamnitchi, & Foster, 2002; Portmann & Seneviratne, 2002). There were proposed efficient searching techniques targeted for both structured and unstructured P2P systems. Other research projects were conducted to study, and were intended to complement, the drawbacks brought by distinct characteristics of P2P systems. For example, the P2P users’ free-riding behavior is generally attributed to the anonymity of such form of communication (Adar & Huberman, 2000). Recent research projects have shifted to a new line of investigation of P2P networks from the economic perspective and applications of P2P systems in workplaces (Kwok & Gao, 2004; Tiwana, 2003).


Respati ◽  
2017 ◽  
Vol 11 (31) ◽  
Author(s):  
Putra Wanda

Abstrak –Saat ini, perkembangan Instant Messenger sangat pesat, salah satu aspek yang menjadi perhatian adalah tentang keamanan pesan yang dikirim melalui Mobile Instant Messenger yang harus melewati jalur komunikasi internet. Ada banyak metode yang telah dikembangkan untuk meningkatkan aspek pengamanan data meliputi penggunaan algoritma kriptografi keamanan seperti RSA-Triple DES, penggunaan algoritma AES pada protokol Off The Record (OTR), penggunaan algoritma Kurva Hyper Elliptic serta penggunaan jaringan virtual pada skema pengamanan.Pada umumnya arsitektur komunikasi Instant Messenger dapat dibagi menjadi dua arsitektur yaitu arsitektur client server dan peer to peer (P2P). Makalah ini mendeskripsikan berbagai metode pengamanan yang telah dikembangkan untuk meningkatkan keamanan komunikasi pada Public Instant Messenger.Kata Kunci : Algortima, Keamanan, Mobile Banking


2020 ◽  
Author(s):  
budiono

AbstractManajemen jaringan di era jaringan komputer modern adalah hal yang sangat penting karena setiap perangkat dapat berkoneksi dengan perangkat lain yang berada di seluruh dunia melalui kecanggihan teknologi internet. Tentu saja dengan kemajuan ini membutuhkan suatu sistem pemantauan jaringan komputer yang membantu administrator jaringan dalam mengelola Local Area Network (LAN). Permasalahan yang sering timbul adalah kesulitan untuk mengetahui status open port disaat terjadi trouble ataupun serangan di dalam jaringan karena jumlah port jaringan mencapai 65.536, sehingga membutuhkan waktu yang lebih lama untuk melakukan perbaikan jaringan. Selain itu kebutuhan akan suatu sistem terintegrasi dalam pemantauan proses serta statistik port dalam Local Area Network (LAN) menjadi landasan dalam penelitian ini sehingga dapat meminimalisasi penggunaan sistem yang terlalu banyak dalam pemantauan jaringan komputer. Hasil dari penelitian ini adalah suatu sistem baru hasil modifikasi dari Mandau Registry Tools and Information System dengan menambahkan layanan seperti informasi protokol, statistik port, dan informasi tentang Domain Name System (DNS) dan penambahan layanan Access Control Lists (ACLs) dengan Fail2Ban. Menggunakan tahapan perencanaan, analisis, desain, implementasi, dan pengujian sebagai metode pengembangan sistem, diharapkan penelitian ini dapat membantu pemantauan dan keamanan Local Area Network (LAN) yang lebih baik dengan kompleksitas informasi proses jaringan dan statistik port yang dihasilkan.Lan memiliki kecepatan perpindahan data yang lebih tinggi Berfungsi. dengan baik tanpa adanya jalur telekomunikasi kelainan tidak membutuhkan akses internet.Local area network Lan merupakan sebuah komputer yang saling dihubungkan bersama di dalam satu area tertentu yang tidak begitu luas secara garis besar terdapat dua tipe jaringan atau lan bubar dan jaringan client server.Pada jaringan peer to peer setiap komputer yang terhubung ke jaringan dapat bertindak baik sebagai workstation maupun server. Sedangkan pada Jaringan client server hanya satu komputer yang bertugas sebagai server dan komputer lain berperan sebagai workstation.


2009 ◽  
pp. 1454-1461
Author(s):  
Oghenevwogaga Benson Adogbeji ◽  
Esharenana E. Adomi

The convergence of information and communication technology as embodied in the Internet has transformed the present day society into a knowledge society. Earlier, information and knowledge were passed by word of mouth or through manuscripts, and communication was a slow process, but today information is passed from one individual to an infinite number of other users through a number of media and formats which makes rapid and widespread dissemination of information possible (Preeti, 2006). This information dissemination has been so easy today due to the advent of computer network. Computer network is the interconnection of two or more computers for the purpose of sharing resources; this may involve the sharing of common database, software, printer etc. In networking, one may use peer-to-peer model or the client/server model. The peer-to-peer model is a decentralized networking model, which means all account administration is local to each machine and each machine maintains its own account database. In this model, each computer is equal or “peer” of the others. None of the members has total control over the others. This networking may involve the use of hub if the systems are more than two but none of the workstation has total control of the others. However, client/server type of network model is the type of network model, which is defined by the presence of server on the network that provides security and administration of the network. The server enables centralized database security and backup (Adogbeji & Adomi, 2005). In order for the cyber cafés in Nigeria to be able to have access to the entire world and give access to users, there comes the need to network their computers. This they do using client/server model and star topology. This chapter investigates networking patterns in cybercafes in Delta state. It explores the types of network adopted locally, types of networking model adopted in the cafes, reasons for adopting the models, types of networking topology adopted and problems inherited in the networking pattern adopted. Recommendations for improvement are also set forth.


Author(s):  
Oghenevwogaga Benson Adogbeji ◽  
Esharenana E. Adomi

The convergence of information and communication technology as embodied in the Internet has transformed the present day society into a knowledge society. Earlier, information and knowledge were passed by word of mouth or through manuscripts, and communication was a slow process, but today information is passed from one individual to an infinite number of other users through a number of media and formats which makes rapid and widespread dissemination of information possible (Preeti, 2006). This information dissemination has been so easy today due to the advent of computer network. Computer network is the interconnection of two or more computers for the purpose of sharing resources; this may involve the sharing of common database, software, printer etc. In networking, one may use peer-to-peer model or the client/server model. The peer-to-peer model is a decentralized networking model, which means all account administration is local to each machine and each machine maintains its own account database. In this model, each computer is equal or “peer” of the others. None of the members has total control over the others. This networking may involve the use of hub if the systems are more than two but none of the workstation has total control of the others. However, client/server type of network model is the type of network model, which is defined by the presence of server on the network that provides security and administration of the network. The server enables centralized database security and backup (Adogbeji & Adomi, 2005). In order for the cyber cafés in Nigeria to be able to have access to the entire world and give access to users, there comes the need to network their computers. This they do using client/server model and star topology. This chapter investigates networking patterns in cybercafes in Delta state. It explores the types of network adopted locally, types of networking model adopted in the cafes, reasons for adopting the models, types of networking topology adopted and problems inherited in the networking pattern adopted. Recommendations for improvement are also set forth.


Author(s):  
Maria Manuela Cunha ◽  
Goran D. Putnik ◽  
Joaquim Pereira da Silva ◽  
José Paulo Oliveira Santos

The Agile/Virtual Enterprise (A/V E) model is considered a highly dynamic version of the Virtual Enterprise (VE) model, and its implementation presents several requirements in order to keep the VE partnership aligned with the market, i.e., with business. Such requirements include (1) the reduction of reconfiguration costs and effort, and (2) the capability to preserve the firms’ private knowledge on products or processes. These must be assured by a specific environment, or, in other words, by organizational infrastructures as a meta-organizational structure for VE design (or integration) and operation, such as the Market of Resources – an environment developed by the authors to cope with the highlighted requirements, and assuring a better performance than the traditional environments such as the Internet search engines or the electronic marketplaces. The Chapter describes the functionalities of the Market of Resources and explains how does it supports A/V E integration, and addresses some technologies that could support A/V E integration within the Market of Resources, namely XML/ebXML and Webservices. The Chapter proposes an architecture to support the operation of the Market of Resources, representing a fusion of the peer-to-peer (P2P) architecture with the client-server architecture, as a variant of P2P architecture. Also, a laboratory implementation of the web services for manufacturing is presented too.


2021 ◽  
Author(s):  
Ibrahim Mahmood Ibrahim ◽  
Subhi R. M. Zeebaree ◽  
Hajar Maseeh Yasin ◽  
Mohammed A. M. Sadeeq ◽  
Hanan M. Shukur ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document