Subject is Foundation of Information Technology
Discussion Questions |
To log on to a website such as G-mail or Yahoo!, you need to
specify your login name and password. The site does not allow you
to access your e-mail messages if the information provided is
incorrect. At times you do not remember the password for a
particular site and have to repeatedly guess the right password and
type it, wasting valuable time.
1. What are some of the ideas that you use for generating passwords
for your own use?
What do you believe are good aspects about this method and what do you think are issues with this method?
Be careful not to share any of your own personal
passwords.
2. The Internet is based on the client/server architecture, which is the most widely used system architecture.
Another system architecture called the peer-to-peer architecture can be used on a LAN.
Research peer-to-peer architecture and compare it with client/server architecture.
Share examples along with positives and negatives for the uses of either architecture and how it can affect outcomes or results from the infrastructure.
Please answer all questions if possible.
Answer 1
For generating the passwords one can take into account following things:
Positive points about this technique are:
Shortcoming of this technique is:
Answer 2
Peer-to-peer (P2P) networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the application. There are three models of unstructured P2P computer network architecture:
The most common application is for content distribution. This includes software publication and distribution, content delivery networks, streaming media and peer casting for multicasting streams, which facilitates on-demand content delivery.
Peer-to-Peer |
Client-Server |
---|---|
Resources are not removed from the network until they are no longer being requested. |
Resources may be removed at any time. |
Resources inserted under content hash key URIs will always have the same content. |
Resources referenced by URIs may change content. |
Signed subspace keys create unique, verifiable namespaces in the network. |
Namespaces are assigned by a centralized body and rely on DNS resolution. |
Storage and bandwidth are distributed and provided by the entire network. |
Storage and bandwidth must be provided by the host. |
Very difficult to determine who is inserting or requesting content. Thus good privacy. |
Relatively easy to determine who is inserting or requesting content. Lesser privacy |
Peer to Peer
Examples — Skype, GNUnet, Lime Wire, Kazaa etc. are some leading software using peer to peer architecture.
Advantages of peer to peer architecture are:
Disadvantages of peer to peer architecture are:
Client/Server
Examples — WhatsApp, Hike, Cloud services, google mailing services, etc.
Advantages of Client/Server
Disadvantages
Peer to Peer
Client/Server
Get Answers For Free
Most questions answered within 1 hours.