10 Oct 2022

94

Comparison of Computer Networks

Format: APA

Academic level: College

Paper type: Research Paper

Words: 351

Pages: 1

Downloads: 0

In the event of generating a password, it is easier when I use memorable words that I can remember combined with numbers that I use more often. However, I use the memorable words in combination with the numbers I often use to generate passwords that I use for various accounts to make it easier to remember them (Walker, 2012). The good thing about using memorable numbers and numbers used often is because it enables me to remember the password to avoid time wastage during retrieval in the event of forgetting. Similarly, using the same password for different accounts reduces the chances of forgetting the password. However, the issue with this method is that it increases my vulnerability since the people who know me quite well like close friends and family can guess my password and get it right. Also, in the event someone discovers my password they can easily access all my accounts, thus invading my privacy and possibly gaining vital information that can be used against me. 

There are differences between a peer-to-peer network and a client/server network, which makes them suitable for different people as well as organizations. The first difference is that while a peer-to-peer network has no central server, which means that each workstation shares its files with the others on the same network as well as lacking central storage for users. A client/server network is constituted of separate servers and clients, whereby through the workstations, users of such a network can access most files that are stored on a central storage server (Groth, 2006). The server enables access to users depending on which files they need to access as well as their business on the network. Another difference is that of the location for installing each network. While the installation of a peer-to-peer networks is recommended for home use or for very small businesses, which means they are more affordable; a client/server network is recommended for larger institutions and can be as big as the clients need them to be, which means that such a network is rather expensive compared to its counterpart thus a disadvantage of the client/server network. An example of each network is World Wide Web for the client/server network and Skype for a peer-to-peer network (Wu & Irwin, 2016). 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

References 

Groth, D. (2006).  Network+ Study Guide (Exam N10-002) . New York, NY: John Wiley & Sons. 

Walker, H. M. (2012).  The tao of computing . CRC Press. 

Wu, C. H. J., & Irwin, J. D. (2016).  Introduction to computer networks and cybersecurity . CRC Press. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Comparison of Computer Networks.
https://studybounty.com/a-comparison-of-computer-networks-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 87

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 81

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 86

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration