Computer network models
A computer network is a system of multiple computers and devices connected by a physical link to a certain architecture (Network Architecture) to collect, exchange data and share resources for multiple user.
An online computer can be one of three types as follows:
- Client (Client) : Does not provide resources but only uses resources from the network.
- Server (Server) : Provides resources and services for machines on the network.
- Peer : Using resources and also providing resources for the network.
Based on how computers are connected to the network as well as how they interact with the network and each other, computer networks are divided into three basic models as follows:
Station-master model (Client-Server)
Workstations are connected to servers, receiving network access and network resources from servers. For Windows NT machines are organized into domains (domains). Security on domains is managed by some special servers called domain controllers. On a domain that has a master domain controller is called a PDC (Primary Domain Controller) and a BDC (Backup Domain Controller) in case PDC goes down.
Client / Server software model is a software solution model for overcoming network overload and overcoming differences in physical structure as well as operating system of computer systems. different online.
Each software built under the Client / Server model will be divided into two parts: the operation on the server is called the Server side and the operation part on the workstation is called the Client side. With this model, workstations are also called clients (or client machines) and servers are called servers. The duties of each section are defined as follows:
- The Server side manages the external environment communications at the Server and with the Client, receives requests in the form of strings (query string), analyzes query strings, processes data and sends the returned results. words on the client side.
- The Client side organizes communication with the user, with the external environment at the workstation and on the Server side, receiving user requests, establishing query strings to the Server, receiving results and organization. show them.
Peer-to-Peer model (Peer-to-Peer)
Peer network (p2p) is a network in which two or more computers share files and access devices such as printers without the need for a server or server software. Peer networks are often organized into workgroup workgroups. This model has no central login process, if you are logged in to the network you can use all resources on the network. Access to resources depends on who shared the resources, so you may have to know the password to gain access to the shared resources.
The p2p network is created by two or more computers that are connected to each other and share resources without going through a dedicated server. The p2p network can be connected on the spot - two computers connected via USB to transfer files. P2 can also be a permanent infrastructure that connects 5-6 computers together in a small office with copper cables. Or it could be a much larger network, using special protocols and applications to establish direct relationships between users on the internet.
Hybrid model (Hybrid)
This model is a combination of Client-Server and Peer-to-Peer. Most computer networks actually belong to this model.
In the above network models, each model has its own advantages and disadvantages for each evaluation criteria such as information security, installation, network scalability . Comparison between The above network models for some common evaluation criteria are given in the following table:
Network model / Evaluation criteria
Client-Server
Peer-to-Peer
Hybrid
Safety and information security.
Has the highest level of security and information security.Network administrators can adjust access to information.
Poor security and security, depending on the level of shared access.
High security and security almost as Client-Server.
Installation capability.
Difficult to install.
Easy to install.
Difficult to install.
Requires hardware and software.
Requires server, network operating system and additional hardware.
No server, network operating system needed, very little additional hardware.
As Client-Server.
Network administrator.
Must have network administrator.
No network administrator required.
As Client-Server.
Processing and centralized storage.
Have.
Is not.
Is not.
Installation costs.
High.
Low.
High.
In a network model where a server (server) is not available, all servers are the same but they are dedicated to performing specific tasks to support workstations on the network, a server can be fully implemented. set of these tasks or there may be some servers that will perform a specific task, such as: Web server, FTP server, File server, Printer server .
According to VietNamNet
See more:
- How to take photos of computer screen fast, without using software
- Summary of tips to fix slow computer errors on Windows 10/8 / 8.1 / 7 and Windows XP
- 4 simple ways to check the configuration and hardware information of computers and laptops
You should read it
- HOW TO INSTALL ISA SERVER ENTERPRISE 2000
- What is VPS? VPS used to do? What is VPS different from Server?
- Understanding the OSI Model (Network Knowledge Part 17)
- Network printer solution with Repotec Print Server.
- Learn the new Network Policy Server feature in Windows Server 2008
- Create VPN Server on Windows 8
- Instructions for setting up and managing FTP Server on Windows 10
- How to manage remote Linux server using SSH
May be interested
- What is Apple's Secure Enclave and how does it protect iPhone and Mac?iphones and macs have a touch id or face id that uses its own processor to handle users' biometric information. it's called the secure enclave, it's basically a complete computer and it offers a wide range of security features.
- We have been charging the wrong way for a long timethere are many comments on the best way to charge smartphones. most people plug in the charger while they sleep, leaving it 100% overnight. but is this the best way to charge your phone? there is a better way to manage and improve battery life.
- Shortcuts to watch videos on NhacCuaTui often useif you are a regular visitor on nhaccuatui, you should know the useful shortcuts on this popular website instead of having to use the mouse to control the video as before. right now, let's join tipsmake.com with a list of useful shortcuts when watching videos on nhaccuatui.
- How to change WiFi Archer C9 password, replace pass WiFi TP Link Archer C9 simpleyou are using the archer c9 wifi transmitter but do not know how to change the wifi password, so follow these four simple steps to quickly change the wifi pass without resorting to the technical experts.
- How to create a new host file on Windowsfile host is an important system file in windows, if you accidentally accidentally delete it, only create a new host file then copy paste the default information.
- What is the difference between Proxy and VPN?a proxy connects you to a remote computer and the vpn also connects you to a remote computer, so are they one? this is incorrect, let's look at the differences between them and when to use proxy and vpn.