IT THEORY
NOTES
, THEORY
Internet B communications
technology
Grade 12-NETWORK
CHAPTER E
Centralised nerwork
includes less powerful devices
a
single server with
connecting
used for applications , dara
storage ,
utilities
decentralised network
distributes workload machines
amoung
is used for
extra
processing distributed
processing
computer using to run an
systems < processor application
↳
derect Idle Caus allocare
programs
Thin clients
deskrop terminal -
no hard drive
all features on me laplop are found on the server
used as PC-replacement [cost effective]
Far clients
herworked computer required software is stored
locally
-
limited dependence on network
preferred customise and
configure /sophisticated applications]
reduced server load and nerwork traffic
Smarr Clients
Clara power of local device
Store
removely processing
-
Features found browser applications handle
nor in
heavy dava requirements
use network dara nor dependent on continuous nerwork connection
Sharing across WAN
Client-server modal downloaders
hosted that
dara is
by remove server delivers gara when
requesting
S
Slow and of failure
single point
,Peer to peer model
each device acts as a server
through 2 way connections
Sharing aara
(seeding)
fast and point of failure
no
single
only downloading (leeching) makes this no different
advantages
file
-easy sharing
-
reduced cosis
-
adapribility
-
reliability
high performance
disadvantages
unwanted
sharing
-
securing risus
-
malware
birtorrent
peer-to-peer protocol
multiple peers swarm andtransfer dara (no need for a central server)
↳
I the same torrent
downloading uploading
Giles splir to faster
are make
loading and men reassembled into seeds
DirTorent tracker is of server-assists in communication
type
a
>
have cerrain files
-
records which peers and are accessible
>
-
coordinates coficient transmission of files
nor
illegal
FTP
differs from peer-to-peer as it is client-server protocol
>
allows me or files
-
exchange
WEDDAU
collaborative of remove files
eairing
file server
simultaneously works as a
Remove Acess
access a device from a remove location
Sourware installed on the host device allows connection-full control
, advantages
·
reduced cosrs
·
improved
productivity
·
cost
risus
·
malware
access)
(giving
·
dara loss a
stranger
·
privacy
VDN
Connects users to private internal herwork the
remore a
using internet
data is sent
through a
highly encrypted virtual tunnel
>
protection
-
Anonyming (IP address)
>
-
Censorship
>
-
advantages
reduced costs
·
·
productiving
·
·
securing
Anonimity
risus
·
dangerous service provider
U
poor
encryption
Interner of
things
related
System of
computing
devices ,
people ere with unique IP addresses and can wansfer dara without
human interaction
devices .
System on Chip
advantages
cost
saving
saved time
or life
quality
Daperless systems
rasus
automating
disadvantages
replaced jobs