Client Server Networks example essay topic
All of the other computers connected to the network are called client computers. The server is a dedicated machine that acts as a central location for users to share and access resources. The server controls the level of authority each user has to the shared resources. When logging on to the network, users on client machines are authenticated by the server, based on a user name and password (Lowe, 2004, p. 13). Cost Differences A peer-to-peer network is relatively less expensive and much simpler to manage and setup, than client / server because money does not have to be invested in establishing server hardware or software and the number of users are minimal. Since, a peer-to-peer network is only preferable on networks operating on at least five to ten computers that do not need heavy file or application sharing, the cost is reasonable.
On another note, based on a network with fifteen workstations, using a peer-to-peer configuration may save money upfront, but it could cost a business a lot of time and money in the long run. The reasons for this include, the lack of a central organization, which make data harder to find, no central storage location for archiving files, which may degrade client workstation performance, and lack of overall network management. Server-based networks are higher in cost because money is invested for dedicated servers, network operating software, and network administrators with technical expertise required for network management and configuration. On a small network consisting of fewer than five workstations, client / server architecture is not recommended and is very costly. But, for a network with the potential for growth, a server / client -based network would by cost effective, as compared to peer-to-peer. Using a sample network of fifteen workstations, a client / server network can provide more control, can be configured for high security, and allow workstations to function without more efficiently, moreover than peer-to-peer.
The sophisticated server-based features will be beneficial to productivity. For a home or small office, a peer-to-peer network is favorable, due to its simplicity and low cost. But, for a larger business where growth is anticipated, a client / server network is more cost effective and productivity efficient, regardless of the cost difference (Wolf, 2002). Problems of each Implementation In a peer-to-peer network, problems that may be encountered are through size, growth, security, training, and hosting resources. Regarding size and growth, these networks are designed for networking a small number of computers and may outgrow a network with around ten to fifteen computers. Security on a peer-to-peer network is not very powerful, because the users will be required to give access to each folder they want to share.
This lack of hierarchy has an incredible impact on the security of a network and adequate user training must be provided for problem prevention. In a peer-to-peer network, the users handle their own administration. Users need to be instructed on how to provide sharing capabilities to files, folders, and even printers. In a peer-to-peer network, suddenly shutting down a computer can cause another user's inability to print. In our nature, humans make plenty of mistakes. As an analogy, for example, think about a store without a manager on duty.
The store employees are based only on their trust to protect the items from being shoplifted either by a customer or themselves. An employee happens to see a customer taking an item without paying and walk out the store. The employee does not want to have his job at stake, so he acted as if he didn't see it, since there was no manager on duty. As compared to the security in a peer-to-peer network, it works the same way. If there is no chain of command or proper training, then the network has low security. With problems to hosting resources, in a peer-to-peer network, each computer that connects to another computer, whether for printing or for file sharing, takes up system resources on the hosting computer and degrades maximum performance (Jelen, 2003).
Some disadvantages of a client / server network include, expense, dependence, and maintenance. An initial investment is required to establish a dedicated server and network operating software. Since a server processes requests sent from client workstations, stores shared files and applications, and manages network security and administration, it is quite powerful and holds a lot of responsibility. Client workstations are dependant on the server.
So, if the server happens to go down, all operations across the network will go down as well. As for maintenance, a client / server network requires a network administrator to ensure efficient operation of the network. The administrator is responsible for operating the complex network operating system to perform specific functions like, setting up user accounts to the network domain, providing user authority for certain services, and managing security settings (Jelen, 2003). Solutions and Enhancements Available for each Based on the several disadvantages of a peer-to-peer network, they can simply be solved by switching over to client / based architecture for more scalability, better security, and centralized management. But as a small solution, for some peer-to-peer networks, a server can be simply comprised of a regular workstation with server operating system, such as Windows Server 2000 Professional, as the designated "server" for the network. Although this helps by providing a central location to store data, it does not provide a healthy solution for the needs of a business.
The technology of peer-to-peer networking doesn't just apply to a local area network, but this technology also has expanded out to users all over the Internet. For example, Kazaa is a file sharing media that uses peer-to-peer networking to directly connect desktops across the Internet over an IP network. People are able to share and download copyrighted music and software. This technology has brought new attention to the peer-to-peer technology.
"What's in it for business? In addition to being good for swapping soundtracks, peer-to-peer networking is a way to harness the dormant processing power in desktop PCs. The potential benefits are so great, in fact, that Hewlett-Packard, IBM, and Intel now want to standardize and commercialize the technology. And some experts insist peer-to-peer computing will facilitate entirely new ways of working within and among businesses because it will allow spontaneous, secure communication between small groups that can be created on the fly". (McDougall, 2003) In a client / server network, a server provides many benefits including, optimization, centralization, security, backing up data. A server solution would be categorized by operating systems and applications.
There are several different operating systems for servers, such as Windows Server (NT, 2000, and 2003), Linux, and Novell Netware. A Network Operating System (NOS) has built in features for file serving, print serving, backup capabilities, and security. Some Nos will also include web or mail servers. As far as server applications, they are designed to run on the NOS for specific server requirements based on the type of application and are used for many different purposes, such as faxing or remote accessing. An example of a server application that handles local and global electronic messaging is Microsoft Exchange.
Another example would be Fax Maker for use with a fax server, where multiple users on a network can send and receive axes without having a fax machine (Koma r, 2002, p. 18-19). Security Techniques As mentioned earlier, in a peer-to-peer network, the security is quite low and does not provide the type of security that a client / server network does. One main risk is that that some users can gain control of the end machines of other users, so the potential for a wide range of attack is very high. "Security is probably the issue that most exercises the critics of P 2 P. By its very nature, P 2 P encourages a more open, distributed approach to content and file sharing and this threatens to compromise corporate policies on security".
(Young, 2001) Users in an internal network can protect certain files by not sharing them. But, what if they needed to share certain files? Those files are open to anyone on the Internet to access. In this case, security hardware or software, such as firewalls can protect a network from unauthorized access to an internal network.
A firewall uses a set of techniques to gain access control of a network and is highly recommended not only in a peer-to-peer network, but also for all types of networks. A firewall has settings that can allow or disallow certain IP addresses, domain names, protocols, ports, and even keep away inappropriate words or phrases in a business environment (Oram, 2001). Some routers have firewall capabilities, such as a Linksys Cable / DSL router. An example of a software firewall is Symantec Internet Security, which also has virus protection. As pointed out earlier, client / server networks provide a higher range of security to a network because the server is the main machine that provides network management and security to the network.
There are capabilities for the administrator to set user authority on certain files or applications. A level of hierarchy in a server establishes this type of security. Each user is assigned a unique user name and password to the network domain using a dedicated server. This provides control over which user has access to which resource.
What about protecting the internal network from outside intruders? Well, this can also be solved using a firewall, as mentioned previously in the peer-to-peer security section. Firewall technologies can be used to protect not only the client workstations, but the server as well. It is highly important to protect the server, since it is holds all of the resources that the network depends on.
Resource Sharing and Options Available for each Configuration Since the computers in a peer-to-peer network act individual as their own client and server, there are settings that must be established in order to make this happen. To allow the sharing of resources in a peer-to-peer network, users will have to set authorization and permission for certain users on certain files or applications by sharing them on the network. This can easily be done in a Windows environment by going into the control panel, and setting the file and print sharing protocol for each computer. Once this is done, the user can right click a certain file or application and set the sharing abilities to certain users on the network.
In a client / server network, large files and applications can be shared, such as database management systems or accounting software systems. The server stores all shared applications and files while the clients access the server as needed. The network hub monitors, queues and controls which computer gets access to the server, the printer or other peripherals. There are also specialized servers that are used for certain types of resource sharing, such as file and print servers, application servers, domain controllers, and directory services. The domain controller is the feature of a domain-based network that provides user access management to the network. This feature sets up user names and passwords for each user.
When a user logs into the network, the password is authenticated by the domain controller on the server (Bregma n, 1999).
Bibliography
Bregman, R. (1999).
An Introduction to Networks, Legal City, May, 4868655. Retrieved Sept. 1, 2004, from web, J.
2002).
Peer-to-Peer Network. Computerworld, April. Retrieved Sept. 1, 2004, from web T.
et. al. (2003).
Tech Soup Article, Networks 101: Client / Server Networks. Tech Soup, April, 209. Retrieved Sept. Tech Soup Article, Networks 101: Peer-To-Peer Networks. Tech Soup, April, 210. Retrieved Sept. 1, 2004, from web B.
Sams Teach Yourself RCP / IP Networking in 21 Days. Indianapolis: Sams Publishing. Lowe, D. (2004).
Networking All-in-One Desk Reference For Dummies. New Jersey: Wiley Publishing, Inc. McDougall, P. (2003).
The Power of Peer to Peer, Companies are using the technology to get more from their systems. Information Week, August. Retrieved Sept. 1, 2004, from web N.
2003).
Networking A to Z. New York: McGraw Hill Companies. Oram, A. (2001).
Peer-to-Peer: Harnessing the Power of Disruptive Technologies. O'Reily Online Catalog, March: 0-596-00110-X. Retrieved Sept. 1, 2004, from web M.
Home Networking: What Type Is Best? Network Control: Peer-to-Peer Networks Versus Client / Server. informIT, April. Retrieved Sept. 1, 2004, from web K.
2001).
Is P 2 P ready to do business? - Industry Trend or Event. Computer Weekly, May, 102171. Retrieved Sept. 1, 2004, from web.