Computer network models

A computer network is a system of multiple computers and devices connected by a physical link to a certain architecture (Network Architecture) to collect, exchange data and share resources for multiple user.

A computer network is a system of multiple computers and devices connected by a physical link to a certain architecture (Network Architecture) to collect, exchange data and share resources for multiple user.

An online computer can be one of three types as follows:

  1. Client (Client) : Does not provide resources but only uses resources from the network.
  2. Server (Server) : Provides resources and services for machines on the network.
  3. Peer : Using resources and also providing resources for the network.

Based on how computers are connected to the network as well as how they interact with the network and each other, computer networks are divided into three basic models as follows:

Station-master model (Client-Server)

Workstations are connected to servers, receiving network access and network resources from servers. For Windows NT machines are organized into domains (domains). Security on domains is managed by some special servers called domain controllers. On a domain that has a master domain controller is called a PDC (Primary Domain Controller) and a BDC (Backup Domain Controller) in case PDC goes down.

Client / Server software model is a software solution model for overcoming network overload and overcoming differences in physical structure as well as operating system of computer systems. different online.

Each software built under the Client / Server model will be divided into two parts: the operation on the server is called the Server side and the operation part on the workstation is called the Client side. With this model, workstations are also called clients (or client machines) and servers are called servers. The duties of each section are defined as follows:

  1. The Server side manages the external environment communications at the Server and with the Client, receives requests in the form of strings (query string), analyzes query strings, processes data and sends the returned results. words on the client side.
  2. The Client side organizes communication with the user, with the external environment at the workstation and on the Server side, receiving user requests, establishing query strings to the Server, receiving results and organization. show them.

Picture 1 of Computer network models

Peer-to-Peer model (Peer-to-Peer)

Peer network (p2p) is a network in which two or more computers share files and access devices such as printers without the need for a server or server software. Peer networks are often organized into workgroup workgroups. This model has no central login process, if you are logged in to the network you can use all resources on the network. Access to resources depends on who shared the resources, so you may have to know the password to gain access to the shared resources.

The p2p network is created by two or more computers that are connected to each other and share resources without going through a dedicated server. The p2p network can be connected on the spot - two computers connected via USB to transfer files. P2 can also be a permanent infrastructure that connects 5-6 computers together in a small office with copper cables. Or it could be a much larger network, using special protocols and applications to establish direct relationships between users on the internet.

Picture 2 of Computer network models

Hybrid model (Hybrid)

This model is a combination of Client-Server and Peer-to-Peer. Most computer networks actually belong to this model.

In the above network models, each model has its own advantages and disadvantages for each evaluation criteria such as information security, installation, network scalability . Comparison between The above network models for some common evaluation criteria are given in the following table:

Network model / Evaluation criteria

Client-Server

Peer-to-Peer

Hybrid

Safety and information security.

Has the highest level of security and information security.Network administrators can adjust access to information.

Poor security and security, depending on the level of shared access.

High security and security almost as Client-Server.

Installation capability.

Difficult to install.

Easy to install.

Difficult to install.

Requires hardware and software.

Requires server, network operating system and additional hardware.

No server, network operating system needed, very little additional hardware.

As Client-Server.

Network administrator.

Must have network administrator.

No network administrator required.

As Client-Server.

Processing and centralized storage.

Have.

Is not.

Is not.

Installation costs.

High.

Low.

High.

In a network model where a server (server) is not available, all servers are the same but they are dedicated to performing specific tasks to support workstations on the network, a server can be fully implemented. set of these tasks or there may be some servers that will perform a specific task, such as: Web server, FTP server, File server, Printer server .

According to VietNamNet

See more:

  1. How to take photos of computer screen fast, without using software
  2. Summary of tips to fix slow computer errors on Windows 10/8 / 8.1 / 7 and Windows XP
  3. 4 simple ways to check the configuration and hardware information of computers and laptops
Update 26 May 2019
Category

System

Mac OS X

Hardware

Game

Tech info

Technology

Science

Life

Application

Electric

Program

Mobile