0% found this document useful (0 votes)
78 views16 pages

Presentacion 6 PDF

This document discusses network configuration and the differences between peer-to-peer and server-based networks. It notes that peer-to-peer networks have no dedicated servers, with each computer functioning as both a client and server. Server-based networks have dedicated servers that provide shared resources to client computers. The document outlines factors to consider in choosing a network type, such as organization size, security needs, and administrative support. It provides examples of specialized servers like file, application, mail, and directory servers that are common in large server-based networks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
78 views16 pages

Presentacion 6 PDF

This document discusses network configuration and the differences between peer-to-peer and server-based networks. It notes that peer-to-peer networks have no dedicated servers, with each computer functioning as both a client and server. Server-based networks have dedicated servers that provide shared resources to client computers. The document outlines factors to consider in choosing a network type, such as organization size, security needs, and administrative support. It provides examples of specialized servers like file, application, mail, and directory servers that are common in large server-based networks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Lesson 2: Network Configuration

Ing. José Leonardo Simancas García, Mg.


Network Configuration Overview
In general, all networks have certain components,
functions, and features in common, shown in
Figure 1.9. These include:

•Servers—Computers that provide shared


resources to network users.

•Clients—Computers that access shared network


resources provided by a server.

•Media—The wires that make the physical


connections.

•Shared data—Files provided to clients by servers


across the network.

•Shared printers and other peripherals—Additional


resources provided by servers.

•Resources—Any service or device, such as files,


printers, or other items, made available for use by
members of the network.
Even with these similarities, networks are divided into two
broad categories, illustrated in Figure 1.10:

• Peer-to-peer networks

• Server-based networks

The distinction between peer-to-peer and server-based


networks is important because each type has different
capabilities. The type of network you choose to implement
will depend on factors such as the:

• Size of the organization.


• Level of security required.
• Type of business.
• Level of administrative support available.
• Amount of network traffic.
• Needs of the network users.
• Network budget.
Peer-to-Peer Networks
In a peer-to-peer network, there
are no dedicated servers, and
there is no hierarchy among the
computers. All the computers are
equal and therefore are known
as peers. Each computer
functions as both a client and a
server, and there is no
administrator responsible for the
entire network. The user at each
computer determines what data
on that computer is shared on
the network. Figure 1.11 shows a
peer-to-peer network in which
each computer functions as both
a client and a server.
Size
Peer-to-peer networks are also called workgroups. The term "workgroup" implies a small group of people. There are typically 10
or fewer computers in a peer-to-peer network.

Cost
Peer-to-peer networks are relatively simple. Because each computer functions as a client and a server, there is no need for a
powerful central server or for the other components required for a high-capacity network. Peer-to-peer networks can be less
expensive than server-based networks.

Operating Systems
In a peer-to-peer network, the networking software does not require the same standard of performance and level of security as
the networking software designed for dedicated servers. Dedicated servers function only as servers and not as clients or
workstations. They are discussed in more detail later in this lesson.
Peer-to-peer networking is built into many operating systems. In those cases, no additional software is required to set up a peer-
to-peer network.

Implementation
In typical networking environments, a peer-to-peer implementation offers the following advantages:
• Computers are located at users' desks.
• Users act as their own administrators and plan their own security.
• Computers in the network are connected by a simple, easily visible cabling system.
Where a Peer-to-Peer Network Is Appropriate

Peer-to-peer networks are good choices for environments where:

•There are 10 users or fewer.

•Users share resources, such as files and printers, but no specialized servers exist.

•Security is not an issue.

•The organization and the network will experience only limited growth within the foreseeable
future.

Where these factors apply, a peer-to-peer network will probably be a better choice than a
server-based network.
Peer-to-Peer Network Considerations
Although a peer-to-peer network might meet the needs of small organizations, it is not appropriate for all
environments. The rest of this section describes some of the considerations a network planner needs to address
before choosing which type of network to implement.

Administration

Network administration tasks include:

•Managing users and security.


•Making resources available.
•Maintaining applications and data.
•Installing and upgrading application and operating system software.

In a typical peer-to-peer network, no system manager oversees administration for the entire network. Instead,
individual users administer their own computers.
Sharing Resources
All users can share any of their resources in any manner they choose. These resources include data in shared directories,
printers, fax cards, and so on.

Server Requirements
In a peer-to-peer environment, each computer must:
•Use a large percentage of its resources to support the user at the computer, known as the local user.
•Use additional resources such as hard-disk space and memory, to support the user's accessing resources on the network,
known as the remote user.

While a server-based network relieves the local user of these demands, it requires at least one powerful, dedicated server to
meet the demands of all the clients on the network.

Security
On a computer network, security (making computers and data stored on them safe from harm or unauthorized access)
consists of setting a password on a resource, such as a directory, that is shared on the network. All peer-to-peer network
users set their own security, and shared resources can exist on any computer rather than on a centralized server only;
consequently, centralized control is very difficult to maintain. This lack of control has a big impact on network security
because some users may not implement any security measures at all. If security is an issue, a server-based network might be
a better choice.

Training
Because every computer in a peer-to-peer environment can act as both a server and a client, users need training before they
are able to function properly as both users and administrators of their computers.
Server-Based Networks
In an environment with more than 10 users,
a peer-to-peer network—with computers
acting as both servers and clients—will
probably not be adequate. Therefore, most
networks have dedicated servers. A
dedicated server is one that functions only as
a server and is not used as a client or
workstation. Servers are described as
"dedicated" because they are not
themselves clients, and because they are
optimized to service requests from network
clients quickly and to ensure the security of
files and directories. Server-based networks
(see Figure 1.12) have become the standard
models for networking.
As networks increase in size (as the number
of connected computers, and the physical
distance and traffic between them, grows),
more than one server is usually needed.
Spreading the networking tasks among
several servers ensures that each task will be
performed as efficiently as possible.
Specialized Servers

Servers must perform varied and complex


tasks. Servers for large networks have
become specialized to accommodate the
expanding needs of users. Following
are examples of different types of servers
included on many large networks.
(See Figure 1.13.)

File and Print Servers

File and print servers manage user access


and use of file and printer resources. For
example, when you are running a word-
processing application, the word-processing
application runs on your computer. The
word-processing document stored on the
file and print server is loaded into your
computer's memory so that you can edit or
use it locally. In other words, file and print
servers are used for file and data storage.
Application Servers

Application servers make the server side of client/server applications, as well as the data,
available to clients. For example, servers store vast amounts of data that is organized to make it
easy to retrieve. Thus, an application server differs from a file and print server. With a file and
print server, the data or file is downloaded to the computer making the request. With an
application server, the database stays on the server and only the results of a request are
downloaded to the computer making the request.
A client application running locally accesses the data on the application server. For example, you
might search the employee database for all employees who were born in November. Instead of
the entire database, only the result of your query is downloaded from the server onto your local
computer.

Mail Servers

Mail servers operate like application servers in that there are separate server and client
applications, with data selectively downloaded from the server to the client.
Fax Servers
Fax servers manage fax traffic into and out of the network by sharing one or more fax modem boards.

Communications Servers
Communications servers handle data flow and e-mail messages between the servers' own networks and other
networks, mainframe computers, or remote users who dial in to the servers over modems and telephone lines.

Directory Services Servers


Directory services servers enable users to locate, store, and secure information on the network. For example,
some server software combines computers into logical groupings (called domains) that allow any user on the
network to be given access to any resource on the network.
Planning for specialized servers becomes important with an expanded network. The planner must take into
account any anticipated network growth so that network use will not be disrupted if the role of a specific
server needs to be changed.

The Role of Software in a Server-Based Environment


A network server and its operating system work together as a unit. No matter how powerful or advanced a
server might be, it is useless without an operating system that can take advantage of its physical resources.
Advanced server operating systems, such as those from Microsoft and Novell, are designed to take advantage
of the most advanced server hardware.
Server-Based Network
Advantages

Although it is more complex to install,


configure, and manage, a server-based
network has many advantages over a
simple peer-to-peer network.
Sharing Resources
A server is designed to provide access to
many files and printers while maintaining
performance and security for the user.
Server-based data sharing can be centrally
administered and controlled. Because these
shared resources are centrally located, they
are easier to find and support than
resources on individual computers.
Security
Security is often the primary reason for
choosing a server-based approach to
networking. In a server-based environment,
one administrator who sets the policy and
applies it to every user on the network can
manage security. Figure 1.14 depicts
security being centrally administered.
Backup

Backups can be scheduled several times a day or once a week depending on the importance and value of the
data. Server backups can be scheduled to occur automatically, according to a predetermined schedule, even if
the servers are located on different parts of the network.

Redundancy

Through the use of backup methods known as redundancy systems, the data on any server can be duplicated
and kept online. Even if harm comes to the primary data storage area, a backup copy of the data can be used to
restore the data.

Number of Users

A server-based network can support thousands of users. This type of network would be impossible to manage
as a peer-to-peer network, but current monitoring and network-management utilities make it possible to
operate a server-based network for large numbers of users.

Hardware Considerations
Client computer hardware can be limited to the needs of the user because clients do not need the additional
random access memory (RAM) and disk storage needed to provide server services. A typical client computer
often has no more than a Pentium processor and 32 megabytes (MB) of RAM.
Lesson Summary

The following points summarize the main elements of this lesson:


•Networks are classified into two principal groups based on how they share information: peer-to-peer networks and server-
based networks.
•In a peer-to-peer network, all computers are equal. They can either share their resources or use resources on other
computers.
•In a server-based network, one or more computers act as servers and provide the resources to the network. The other
computers are the clients and use the resources provided by the server.
•Features of the two major network types are summarized in Table 1.1 that follows:
Lesson Checkup
1. List three factors that can influence the choice of whether to implement a peer-to-peer or
server-based network configuration.

2. Describe the advantages of a peer-to-peer network.

3. Describe the advantages of a server-based network.

You might also like