logo

Networking and Security - Application, Internet, and Physical Layer

   

Added on  2023-06-11

5 Pages1001 Words106 Views
Running head: NETWORKING SECURITY 1
Networking and Security
Name of the Student:
Name of the Institution:

NETWORKING SECURITY 2
Topic 3: Application Layer of the Internet
The application layer of the internet/network model gives network users the ability to
interact with devices and services such as Facebook, google web server and maps among many
other applications available services in the network. These networks allow sharing of resources
depending on the architecture used, with some machines serving as dedicated servers and clients
or client/server simultaneously. As such, application have different architectures ranging from
client-server, peer-to-peer, host-based and cloud based architecture.
At the local levels of the network, the application (services) allows network users an
access to shared network resources such as printers, network faxes and distributed mails, and
shared and attached memory.
The client-server architecture takes the model of ‘services provider and a consumer’ with
user applications such as email, FTP clients and web browsers being the clients-consumers and a
dedicated server- the service provider- that meets the requests made by the applications. The
clients’ application request for such services as file server and information stored in the database
servers.
In the peer-to-peer network model, each of the connected devices can act as a server and
a client simultaneously, requesting for services from other devices in the same network and
servicing requests made by them too. With these networks, server roles are distributed among
connected devices hence no need for dedicated server. Host based network exist where a
machine.
Other modes of interaction in the network are through the cloud computing- cloud
architecture in which the cloud is looked to as either infrastructure as a services or software as a

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network And Security Student Name Affiliation Date Introduction
|4
|937
|229

Understanding Dynamic Host Configuration Protocol (DHCP)
|5
|666
|329

Networking Security Assignment
|6
|1409
|38

Importance of DHCP
|5
|694
|165

Networking Technologies Assignment
|9
|2023
|44

Network and Security: Layers, Multiplexing, and Error Control Mechanisms
|4
|1235
|455