Banner

WELCOME TO FARAHSTARSSS!
Click below to navigate to:
 

Tuesday, 2 January 2018





WHAT IS NETWORK ARCHITECTURE ?



NETWORK ARCHITECTURE 


  • The configuration of computers, devices and media on a network.



CATEGORIES OF NETWORK :-


  • PEER TO PEER NETWORK
  • CLIENT/SERVER NETWORK





PEER TO PEER NETWORK




  • A simple, inexpensive network that typically connects fewer  than 10 computers.
  • Each computer has equal responsibilities and capabilities. 
  • Allows users to set up a peer-to-peer network.
  • Each computer stores files on its own storage devices.
  • All computers on the network share any peripheral device(s) attached to any computer. 
  • Ideal for very small businesses and home user
  • Directly available without the need for central coordination by servers or stable hosts.



CLIENT/SERVER NETWORK





  • One or more computers act as a server, and the other computers on the network request services from the server.
  • Server : host computer, controls access to the hardware, software and provides a centralized storage area for programs, data and information.
  • Clients  rely on the server for its resources.
  • Client computer sends a resource or process request to the server over the network connection
  • Server can manage several clients simultaneously
  • Web server serves many simultaneous users with Web page and or website data.






CATEGORIES

CLIENT/SERVER NETWORK

PEER TO PEER NETWORK

DEFINITIONOne or more computers act as a server on the network request services
from the server.
Each computer equal responsibilities and capabilities, sharing
hardware, data, or information
SIZEFor medium and large networkFor small network fewer than 10 computers.
OPERATING SYSTEMNeeds a specific operating system such as Windows Server 2008.Does not need a specific operating system.
TRAININGNeeds trainingDoes not need training
SET UPMore difficult to set upEasy to set up
INSTALLATIONMore expensive to installLess expensive to install
IMPLEMENTBig corporations or organizations with high security dataSmall businesses and home users






No comments:

Post a Comment