Can You Describe Pear-to-pear Networking?

7

7 Answers

Anonymous Profile
Anonymous answered
Pear-to-pear is similar in many ways to apple-to-apple networking however the shape of the network created is more like that of a teardrop whereas the latter creates a more circular network
thanked the writer.
Anonymous
Anonymous commented
In fact, apple-to-apple networks were invented by Apple (the firm behind the iPhone and company) in the late 1980's. Microsoft, fearing to lose this market, came with the idea of a pear-to-pear network for PCs. The interesting characteristic of pear-to-pear networking is its ability to scale up, thus allowing many small pear-to-pear networks to be joined together in what is called a networking tree, or a pear tree. Additionally, many pear trees can be joined together into a forest of pear trees.
minhaj razi Profile
minhaj razi answered
Its basically peer not pear if you are really asking about peer-to-peer networking.
When you connect several computers together through cables and wires in order to share the resources available on these computers that is known to be networking.

When several computers joined together without server and share the resources this technology is know as peer-to-peer. Two computers are considered peers if they are communicating with each other and playing similar roles. For example, a desktop computer in an office might communicate with the office's print server; however, they are not peers, since the server is playing the role of server and the desktop computer is playing the role of client. In some cases peer-to-peer model uses no servers, so the network is composed entirely of peers. Computers connected to the Network are also referred to as "nodes" or "hosts". Each node has its IP address. The communication is done through token passing method to each node. Just like in ring topology when several computer are connected with each other without a server in the form of a ring. Peer-to-peer technology is used to facilitate the real time communication which can do; exchange data share files, locate other users, communicate, and collaborate directly in real time.

According to modern technology model may be contrasted include the client /server model and the master/slave model. In some cases, peer-to-peer communications is implemented by giving each communication node both server and client capabilities. In recent usage, peer-to-peer has come to describe applications in which users can use the Internet to exchange files with each other directly or through a mediating server.

The infrastructure of peer-to-peer provides application programming interfaces used on server less application, including message and file sharing.
raaga Profile
raaga answered
In pear-to-pear networking each node can act as both a client and a server. Hence there is no central repository for information. Data and resources are distributed throughout the network, and each user is responsible for sharing data and maintaining resources connected to the system.

Pear-to-pear networking is suitable for small business networks and home networks. Mostly this type of network is used to share resources. Since it does not need a powerful dedicated server, small, inexpensive networks can be easily set up using pear-to-pear networking. It just requires network adapters, cable or other transmission media, and operating system. Some operating systems have pear-to-pear networking built-in such as Windows 95, Windows for Workgroups, Windows NT Workstation, Windows XP, OS/2
Etc. For most operating systems without this capability, MS DOS software such as NetWare Lite or LANtastic can be added.

However pear-to-pear networks may not be the best choice for larger and growing networks. The general rule is to stop using pear-to-pear network as the number of nodes reaches about ten. It requires trained people who are responsible for sharing data and managing their resources. Security in a pear-to-pear network becomes difficult to maintain.

As each user needs to know how to secure the resources. Due to the lack of central administration it is the user's responsibility to ensure authorized access. The users themselves handle sharing out the data as well as setting permissions that may be needed. Most pear-to-pear networks implement share-level security. Share-level security requires a user to know the password for a resource before using it.
Sadia Batool Profile
Sadia Batool answered
Networking is used for connecting different computers together for the sake of transfer of data and information among them. It is a great help in transfer of data in an easy manner.
It can be of many types. It is ramified according to its needs. The much known type of networking is pear to pear networking. It is also known as p to p networking. It is to connect computers in a simple modus operandi.

It can be done by networking cables. It can be done by proper setting of LAN card. It will have a main server and the other computer will be client. Both computers would be able to change things with in a computer. We may work at a time in both of the computers in the same manner. It will be sharing of drives of the computer. It cannot share internet because it cannot go for browsing. Networking of internet can be done by using another instrument known as hub. Setting is all about Networking Settings in the Control
Anonymous Profile
Anonymous answered
There are no client and server and worked on group bas.
Anonymous Profile
Anonymous answered

Honestly!
We would use Lifesize(Lifesize Express 220) qvsupplies.com/product-category/lifesize/ for interoffice meetings and all-hands. Currently, we use GotoWebinar which is a huge PITA for IT. We would put one in our large conference rooms for larger than 25 participants which is the Hangout limitation.

Tom  Jackson Profile
Tom Jackson answered

I don't think pears were able to talk, type, or otherwise communicate back in 2007 when this question was posted.

Answer Question

Anonymous