Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Computer Networking

Computer networking is the practice of connecting computers together to enable communication and
data exchange. It is a collection of two or more devices, called nodes, connected by communication links.
Each device has an IP address that helps identify a device. Computer networks can be categorized into
three types: Client-Server model, Peer-to-Peer model, Adhoc network, and Tethering network.

Client-Server model is a distributed application structure that partitions tasks or workload between
server providers and client requesters. It offers advantages such as a centralized system, cost efficiency,
and data recovery. However, it also has disadvantages such as vulnerability to viruses, Trojans, worms,
Denial of Service (DOS) attacks, spoofed data packets, and Man in the Middle (MITM) attacks.

Peer-to-Peer (P2P) network model, first introduced in the late 1970s, is a simple network of computers
where each computer acts as a node for file sharing within the network. P2P networks do not involve a
large number of nodes, usually less than 12, and each node shares an equal workload. P2P networks
require specialized software and allow resource sharing among the network.

Despite the constant threat of attack, almost all operating systems today support P2P networks. The
advantages of P2P networks include a centralized system, cost efficiency, and the ability to share
resources among the network.

Peer-to-Peer (P2P) networks are a popular method for distributing information due to their efficiency and
scalability. They are used in various applications such as instant messaging (IM), file sharing, IP telephony,
data storage, peercasting, digital marketing, cryptocurrency exchange, ridesharing, and open source
software development.

P2P networks are efficient and scalable, allowing for faster exchange and sharing of resources. They also
allow users to manage their own computers, eliminating the need for a network manager. P2P network
configuration can be done via software wizards, and they can be set up in homes and small businesses.
P2P networks typically have less network traffic than a client-server network.

However, P2P networks have disadvantages, such as users not centrally backing up files and folders, slow
performance due to computer access, files being stored on individual computers, and limited security.
Users must ensure that viruses are not introduced into the network and that the network is secure.

In conclusion, P2P networks offer numerous advantages, such as cost-effectiveness, scalability, and
flexibility. However, they also have disadvantages, such as inability to centrally back up files and folders,
slow performance, and limited security.

A P2P network is a type of network where multiple computers share resources, acting as both clients and
servers. It allows all computers to access client devices directly connected to one specific computer.
Client-server networks have numerous clients connected to a central server, allowing faster access
speeds and easier file upgrades.

Ad hoc networks, also known as peer-to-peer (P2P) networks, are wireless local area networks (WLANs)
that allow devices to connect without the need for access points (APs). They work similarly to Bluetooth
connections, allowing paired devices to share an Internet connection and transmit files.

There are four types of ad hoc networks: Mobile Ad Hoc Network (MANET), Vehicular Ad Hoc Network
(VANET), Smartphone Ad Hoc Network (SPAN), and Wireless Mesh Network (WMN). These networks
serve various purposes, such as providing military units access, enabling users to create personal area
networks (PANs), providing emergency responders with signals during crises, monitoring patients, and
checking for natural or man-made disasters.
Ad hoc networks are easier to set up than infrastructure mode, providing a low-cost way of direct client-
to-client or client-to-internet communication. They are easy to configure, offer an effective way to
communicate with nearby devices, and are less vulnerable to security threats. They may also be more
practical than traditional infrastructure-based networks.

Ad hoc networks have several disadvantages, including limited support for Wi-Fi-enabled technology like
Android devices, wireless printers, and custom IoT sensors, poor wireless communication range issues,
and difficulty in scaling due to the lack of a central device for all traffic flow. Additionally, ad hoc networks
cannot disable SSID broadcasting, making them vulnerable to attackers. Security options are limited due
to a lack of network infrastructure services, such as access to RADIUS servers for 802.1x authentication
purposes.

Tethering is another method used to connect devices like smartphones to the internet, creating mobile
hotspots. However, this method requires more endpoint system resources and may not offer advanced
security features found in stationary infrastructure WLANs. Tethering can be used to create WiFi
networks between devices, but it has limitations, such as limiting the number of devices connected at
once and rapidly consuming mobile data and battery.

Infrastructure mode is a better option for larger, permanent networks, as it supports more endpoints and
has higher-power wireless radios and antennas. Ad hoc networks also face performance problems when
using the internet if one device is connected to and sharing it with others. Tethering can be used to
create WiFi networks between devices, but it can also consume mobile data and drain batteries quickly.
Overall, ad hoc networks should be considered when considering the best option for your specific needs
and requirements.

Tethering is a method of connecting a smartphone to other devices using a USB connector, Bluetooth, or
WiFi. There are three main methods: WiFi tethering, Bluetooth tethering, and USB tethering. WiFi
tethering creates a wireless local area network (WLAN) where the smartphone acts as a hotspot,
connecting the laptop to the internet. Bluetooth tethering allows the smartphone to share the internet
connection with the laptop, transforming the phone into a portable modem. USB tethering connects the
smartphone to the laptop using a USB cable, allowing the laptop to share the internet through the USB
cable.

Tethering offers several advantages, such as allowing multiple device connections, creating small hot
spots for teamwork, being cost-free, allowing multiple device connections, and being more secure than
public WiFi. However, it consumes a lot of mobile data quickly, drains the mobile's battery, and may not
be allowed by some carriers or plan types. Additionally, internet speed may be slower, and phone calls
may not be possible during tethering.

You might also like