0% found this document useful (0 votes)
47 views

Network Models

This document discusses two main types of network models: peer-to-peer and server-based (client/server). In a peer-to-peer model, computers can function as both clients and servers with no centralized control over shared resources. In a server-based model, certain computers function as dedicated servers that have centralized authority over access to network resources through a domain. While peer-to-peer networks are easier to set up, server-based networks provide more control, security, scalability and reliability through centralized administration.

Uploaded by

Ashik
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views

Network Models

This document discusses two main types of network models: peer-to-peer and server-based (client/server). In a peer-to-peer model, computers can function as both clients and servers with no centralized control over shared resources. In a server-based model, certain computers function as dedicated servers that have centralized authority over access to network resources through a domain. While peer-to-peer networks are easier to set up, server-based networks provide more control, security, scalability and reliability through centralized administration.

Uploaded by

Ashik
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Network Models

Network model

 A network model defines how and where resources are shared


and how access to these resources is regulated.
Two major type :-
1. Peer-to-Peer
2.Server-based(client/server)
Peer-to-Peer

 most computers function as clients or servers, as circumstances indicate


 there's no centralized control over who has access to network resources
 each user maintains control over his or her own shared resources
Server-based

 Certain computers take on specialized roles and function mainly


as servers and ordinary users machines tend to function mainly as
clients.
 servers have centralized authority over who has access to network
resource
Peer-to-Peer/Work group model

 Computers on a pear to peer network can take both client and


server roles
 These networks impose no centralized control or security over
shared resources
 Every user must act as the administrator
 Users can give everyone else unlimited access to their resources
or grant restricted (or no) access to other users on the network
Continue..
 To grant this access, users must create user accounts and passwords for each
user who will access shared resources or their computers .The username and
password for accessing a computer are called credentials.
 Windows-based peer-to-peer network computers are members of a work group,
but a work group is simply an identifier and doesn't constitute a network
security boundary.
 As the number of users and computers grows, these networks can become
unworkable.
Advantages:-

 Easiest and most inexpensive to install


 Computers are connected and configured correctly, users can
begin sharing information immediately
 Desktop computers and client OS's cost considerably less than
their server counterparts.
 Easy to use
 Don't require extensive staff training or a dedicated network
administrator
Disadvantages:-

 Performance reduction
 Data loss can occur
 That affects peer-to-peer networks is data organization
 Managing resources and their security is difficult
Server/Domain-Based Model

 Server-based networks allow centralized control over network


resources
 Server OSs are designed to handle many simultaneous user
logons and requests for shared resources efficiently
 Servers are dedicated to running network services and shouldn't
be used to run user applications.
 Domain is a collection of users and computers whose accounts
are managed by Windows servers called domain controllers
Continue..

 Users and computers in a domain are subject to network access


and security policies defined by a network administrator and
enforced by domain controllers
 The software managing centralized access and security is a
directory service
 Network services :- Directory services, Naming services, E-mail
services, Application services, Communication services, Web
services
Advantages:-

 Server-based networks are easier to expand


 This networks can handle anywhere from a handful to thousands
of users
 Multiple servers can be configured to work together
 Enables administrators to add more servers to share
 Provide fault tolerance
 Improve reliability and performance
Disadvantages:-

 The additional overhead of operating a server based network


 Require one or more dedicated computers to run the server OS
 Cost more than desktop computers
 These networks usually require at least part-time support
 Acquiring the skills to manage a server based network or hiring a
trained network administrator

You might also like