Network lesson 3


Network configuration types


1.      Peer to peer network

In a peer to peer network, there are no dedicated servers or hierarchy among the computers. In this type of network, each device has equivalent capabilities and responsibilities individual users are responsible for there own resources and can be decide which data and device to share. Because individual users are responsible for the resources on their own computer, the network has no central point of control or administration.
Peer to peer networks work best in environments with ten or fewer computers. Because individual users are in control of their own computers, there is no need to hire a dedicated network administrator.
Peer to peer networks have several disadvantages,
·         There is no centralized network administration which makes it difficult to determine who controls resources on the network.
·         There is no centralized security. Each computer must use separate security measures for data protection.
·         The network becomes more complex and difficult to manage as the number of computers on the network increases.
·         There might be no centralized data storage. Separate data backup must be maintained. This responsibility falls on the individual users.

2.      Client server network

In client server network, the client request information or service from the server. The server provides the requested information or service to the client. Server on a client server network commonly performs some of the processing word for client machine. For example, sorting through a database before delivering only the records requested by the client.
One example of a client server network is a corporate environment in which employs use a company e mail server to sent, receive store e mail. The e mail client on an employed computer issues a request to e mail server for any unread e mail. The server responds by sending the requested e mail the client.
In client server model, network administrators maintain the servers. The network administrators implements data backups and security measures. The network administrators also control user access to the network resources. All of the data on the network is stored on a centralized file server. Each user must provide an authorized user name and password to gain access to network resources. That each person is permitted to use. 







NVScreations

Comments

Popular Posts