Welcome to graduate2professional.blogspot.com

Sunday, April 22, 2012

Client–Server Vs Peer to Peer Net work architecture:


There are essentially two types of network architectures—
1.       Client-Server and
2.       Peer-to-peer.
In the client-server scheme, a central server handles all security and file transactions;
In peer-to-peer networks, each machine shares its own resources and handles its own security.
Client-server is the more expensive of the two to implement because such networks require a central file server. Although you can use many types of computers as your file server, you'll get the best results if you use a dedicated, high-end machine.
The other disadvantage to client-server networks is the cost of the server software. For example, you can expect to pay about $700 for a copy of NT Server. The core software package authorizes you to connect five PCs to your server, and then it requires you to pay a client license fee of around $70 for each additional PC that you connect to your network.
In fact, client-server networks are so expensive to set up that you may be wondering why anyone would ever choose this option. The answer is that this network structure offers a wide range of powerful administrative tools, which are particularly useful in an environment where security is an issue.
In a client-server environment, the dedicated file server controls the level of access that client PCs have to shared resources. This means that you can control network security from a central location through a utility such as Windows NT Server's User Manager or NetWare's NWADMIN.
Peer-to-peer networks aren't nearly as expensive to create, since you don't need a dedicated machine, server software, or special client licenses. In fact, all the software you need comes with Windows 95. This affordability often makes peer-to-peer networks ideal for small businesses or home users.
However, the main disadvantage of using this type of network is that you sacrifice security by placing network control in the hands of end users. Therefore, this network strategy is obviously inappropriate for high-security environments.

No comments:

Post a Comment