Question

In: Computer Science

Explain network application architectures and protocols which are developed based on those architectures.

  • Explain network application architectures and protocols which are developed based on those architectures.

Solutions

Expert Solution

Solution:

Network application architectures:

There are basically two types of architectures:

  • Client-Server Architecture: The client-server architecture works on the model which says that firstly a client requests for something then it is sent through the various network layer to the server so the server can process the request and gives a proper response on the basis of that, the response is again sent back through the client. This way of serving and granting requests is commonly referred to as the client-server architecture. The client has a fixed IP address to communicate.
  • P2P Architecture (Peer to peer architecture): The peer to peer architecture works on the server mainly at the center of the system. There are a pair of hosts which directly communicate with each other, they don't require a server as a middle through which communication takes place. Sharing of files and other documents becomes very easy and they take much less time.

Client-Server Protocols:

  • TCP/IP: This is a connection-oriented protocol which is used during communication. Here basically the communications are reliable i.e overheads are present. It is also said that it manages the flow control scenario and it also deals with the retransmission scenarios of the dropped packets. In the OSI model, TCP works in the transport layer and also on the sessions layer. Here, when each packet travels, it is considered to be as an independent packet without any relation with any other packets.

P2P Protocols:

  • File Transfer Protocol: This protocol can be termed as a protocol which works in the P2P architecture. It is said to be as a client-server protocol but the star part is that it is very much flexible i.e its role depends on the type of application it is working upon. Basically, the FTP looks whether the file exchange is properly happening between the hosts or not.
  • SMTP Protocol: This protocol is mainly used in e-mails. It basically follows the process of store and forward. it mainly interacts with the computer and the email inbox i.e when the sending and receiving hosts are connected.

Related Solutions

Explain network application architectures and protocols which are developed based on those architectures.
Explain network application architectures and protocols which are developed based on those architectures.
What are the different types of application architectures?
What are the different types of application architectures?
What kind of network management protocols are available? What information can these protocols provide? Explain it...
What kind of network management protocols are available? What information can these protocols provide? Explain it with example.
What kind of network management protocols are available? What information can these protocols provide? Explain it...
What kind of network management protocols are available? What information can these protocols provide? Explain it with example.
What kind of network management protocols are available? What information can these protocols provide? Explain it...
What kind of network management protocols are available? What information can these protocols provide? Explain it with example.
Explain the two different categories of Application layer protocols, and then detail the PDU used at...
Explain the two different categories of Application layer protocols, and then detail the PDU used at this layer.​
Explain the logic used to determine which activity to reduce on a Project Network based on...
Explain the logic used to determine which activity to reduce on a Project Network based on the cost slope and other relevant information.
2. Which of the generic architectures considered in lectures is most susceptible to race conditions. Explain...
2. Which of the generic architectures considered in lectures is most susceptible to race conditions. Explain your reasoning -- why do you believe that your chosen architecture is most susceptible?
The OSI layers can be divided between those that serve the network and those that serve...
The OSI layers can be divided between those that serve the network and those that serve the computer. Identify the layers concerned strictly with the network and the ones that serve the local computer.The OSI layers can be divided between those that serve the network and those that serve the computer. Identify the layers concerned strictly with the network and the ones that serve the local computer.
Which of the following terms relates to those instances in which internet based advertising is purposefully...
Which of the following terms relates to those instances in which internet based advertising is purposefully placed on web pages that contain content of relevance so far as the product or service being promoted is concerned? behavioural targeting push technologies sponsorship contextual advertising
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT