Presentacion 6 PDF
Presentacion 6 PDF
• Peer-to-peer networks
• Server-based networks
Cost
Peer-to-peer networks are relatively simple. Because each computer functions as a client and a server, there is no need for a
powerful central server or for the other components required for a high-capacity network. Peer-to-peer networks can be less
expensive than server-based networks.
Operating Systems
In a peer-to-peer network, the networking software does not require the same standard of performance and level of security as
the networking software designed for dedicated servers. Dedicated servers function only as servers and not as clients or
workstations. They are discussed in more detail later in this lesson.
Peer-to-peer networking is built into many operating systems. In those cases, no additional software is required to set up a peer-
to-peer network.
Implementation
In typical networking environments, a peer-to-peer implementation offers the following advantages:
• Computers are located at users' desks.
• Users act as their own administrators and plan their own security.
• Computers in the network are connected by a simple, easily visible cabling system.
Where a Peer-to-Peer Network Is Appropriate
•Users share resources, such as files and printers, but no specialized servers exist.
•The organization and the network will experience only limited growth within the foreseeable
future.
Where these factors apply, a peer-to-peer network will probably be a better choice than a
server-based network.
Peer-to-Peer Network Considerations
Although a peer-to-peer network might meet the needs of small organizations, it is not appropriate for all
environments. The rest of this section describes some of the considerations a network planner needs to address
before choosing which type of network to implement.
Administration
In a typical peer-to-peer network, no system manager oversees administration for the entire network. Instead,
individual users administer their own computers.
Sharing Resources
All users can share any of their resources in any manner they choose. These resources include data in shared directories,
printers, fax cards, and so on.
Server Requirements
In a peer-to-peer environment, each computer must:
•Use a large percentage of its resources to support the user at the computer, known as the local user.
•Use additional resources such as hard-disk space and memory, to support the user's accessing resources on the network,
known as the remote user.
While a server-based network relieves the local user of these demands, it requires at least one powerful, dedicated server to
meet the demands of all the clients on the network.
Security
On a computer network, security (making computers and data stored on them safe from harm or unauthorized access)
consists of setting a password on a resource, such as a directory, that is shared on the network. All peer-to-peer network
users set their own security, and shared resources can exist on any computer rather than on a centralized server only;
consequently, centralized control is very difficult to maintain. This lack of control has a big impact on network security
because some users may not implement any security measures at all. If security is an issue, a server-based network might be
a better choice.
Training
Because every computer in a peer-to-peer environment can act as both a server and a client, users need training before they
are able to function properly as both users and administrators of their computers.
Server-Based Networks
In an environment with more than 10 users,
a peer-to-peer network—with computers
acting as both servers and clients—will
probably not be adequate. Therefore, most
networks have dedicated servers. A
dedicated server is one that functions only as
a server and is not used as a client or
workstation. Servers are described as
"dedicated" because they are not
themselves clients, and because they are
optimized to service requests from network
clients quickly and to ensure the security of
files and directories. Server-based networks
(see Figure 1.12) have become the standard
models for networking.
As networks increase in size (as the number
of connected computers, and the physical
distance and traffic between them, grows),
more than one server is usually needed.
Spreading the networking tasks among
several servers ensures that each task will be
performed as efficiently as possible.
Specialized Servers
Application servers make the server side of client/server applications, as well as the data,
available to clients. For example, servers store vast amounts of data that is organized to make it
easy to retrieve. Thus, an application server differs from a file and print server. With a file and
print server, the data or file is downloaded to the computer making the request. With an
application server, the database stays on the server and only the results of a request are
downloaded to the computer making the request.
A client application running locally accesses the data on the application server. For example, you
might search the employee database for all employees who were born in November. Instead of
the entire database, only the result of your query is downloaded from the server onto your local
computer.
Mail Servers
Mail servers operate like application servers in that there are separate server and client
applications, with data selectively downloaded from the server to the client.
Fax Servers
Fax servers manage fax traffic into and out of the network by sharing one or more fax modem boards.
Communications Servers
Communications servers handle data flow and e-mail messages between the servers' own networks and other
networks, mainframe computers, or remote users who dial in to the servers over modems and telephone lines.
Backups can be scheduled several times a day or once a week depending on the importance and value of the
data. Server backups can be scheduled to occur automatically, according to a predetermined schedule, even if
the servers are located on different parts of the network.
Redundancy
Through the use of backup methods known as redundancy systems, the data on any server can be duplicated
and kept online. Even if harm comes to the primary data storage area, a backup copy of the data can be used to
restore the data.
Number of Users
A server-based network can support thousands of users. This type of network would be impossible to manage
as a peer-to-peer network, but current monitoring and network-management utilities make it possible to
operate a server-based network for large numbers of users.
Hardware Considerations
Client computer hardware can be limited to the needs of the user because clients do not need the additional
random access memory (RAM) and disk storage needed to provide server services. A typical client computer
often has no more than a Pentium processor and 32 megabytes (MB) of RAM.
Lesson Summary