Chapter Two in "Computer Networking"
$19.95 Buy and instantly download this paper now
The paper relates that in chapter two of "Computer Networking", James and Ross delve into an explanation of computer applications. The paper looks at how they define key application-layer concepts, then examine several network applications in detail and finally, look at network application development. The paper asserts that taken together, these explanations not only help describe some basic computer applications, but also explain how they are written, and the core concepts underneath application-layers. The paper does note, however, that because writing applications is a very complicated topic, the authors should have devoted an individual chapter to that section.
From the Paper:"James and Ross begin with a basic discussion of client-server architecture, which features a constantly-on host, which is called the server, which services requests from other hosts, known as clients (James and Ross, p.88). Frequently a cluster of hosts services the clients, because a single server would be unable to keep up with it (James and Ross, p.88). Client-server architecture may be infrastructure intensive because of the requirement of multiple hosts (James and Ross, p.88). In contrast to a client-server architecture, P2P architecture relies on communication between intermittently connected hosts, known as peers (James and Ross, p.88). P2P architectures are cost-effective and self-scalable, but have three major weaknesses. First, they put stress on ISPs (James and Ross, p.89). Second, they can be difficult to keep secure (James and Ross, p.90). Finally, the design of P2Ps makes it difficult to provide incentives to peers (James and Ross, p.90). After discussing client-server architecture, James and Ross provide an overview of how processes on different hosts communicate with one another by sending and receiving messages through software interfaces known as sockets (James and Ross, p.90-91). They then go on to the four types of services a transport-layer protocol can offer: reliable data transfer, throughput, timing, and security (James and Ross, p.92)."
Sample of Sources Used:
- Kurose, James and Keith Ross. Computer Networking: A Top-Down Approach, 5th Edition. Boston: Pearson Education, Inc., 2010.
Cite this Analytical Essay:
Chapter Two in "Computer Networking" (2013, April 30) Retrieved September 19, 2020, from https://www.academon.com/analytical-essay/chapter-two-in-computer-networking-152847/
"Chapter Two in "Computer Networking"" 30 April 2013. Web. 19 September. 2020. <https://www.academon.com/analytical-essay/chapter-two-in-computer-networking-152847/>