Networking Concepts Essay

I would tell Fred to use the Peer-to-Peer architecture or the Client Server architecture both have pro’s and con’s. The reason that I would tell him to use the Peer-to-Peer architecture is in a peer to peer architecture, workstation on the network will be able to shares its files equally with the other buyers. Peer-to-peer networks should be installed in very small businesses, and since this is a small business, it should fit perfectly. They are inexpensive to set up , which is what Fred needs.

A peer-to-peer network can support about ten clients and that should be plenty. The key thing to remember about peer-to-peer networking is that it shares files and printers as inexpensively as possible; y. Since Fred’s users are allowed to control access to the resources on their own computers. One thing that you have to be careful with dealing with peer to peer is security; security becomes very risky in a peer-to-peer environment. There’s no central security or any way to control who shares what.

I would tell him to use the Client/server network if security is a top priority for him. A good thing about client server is that they all have centralized security databases that control access to shared resources on servers. This is a benefit that will definitely serve Fred. Security will not be an issue because users can’t log on to the network unless they supply valid usernames and passwords to the server. Client server networks tend to be more stable than peer to peer.

In a peer-to-peer network, certain shared resources reside on each user’s machine. If users decide to play around and crash their computers, they could seriously affect their peer-to-peer network. . One drawback of the client server network is its cost. Fred is just starting out and servers can become very expensive. Doing research I found out that, you could pay over $800 for a copy of Windows NT Server and five client licenses, and that price doesn’t even include the cost of the hardware, which must be more powerful than a standard workstation.

Read also  Patton Fuller Community Hospital Request for Project

You will also need someone to manage client servers. I guess it all comes down to money, if you can afford it and if you have a qualified person to manage it, a client server network is going to be your best bet. If you have only a few employees who share a printer and occasional files, however, there’s absolutely nothing wrong with setting up a simple peer-to-peer networking environment. What’s best for you will depend on your budget and the size of your office.

More Essays

  • Impacts of Data Classification Standards

    Through my research I have found three basic domains that are affected by the "internal use only" data classification standard. What I would like to discuss in this report addressing IT infrastructure is how these three domains are affected. I will be discussing the User Domain, Workstation Domain, and LAN...

  • Patton Fuller Community Hospital Request for Project

    The following document shall serve as the RFP (Request for Project) for the Patton-Fuller Community Hospital. Team A has researched the hospital's current IT systems seeking ways to ensure many years of continued success and compliance with the very best practices in the IT community today. Specific areas...

  • Performing Protocol Captures

    1.Which tool is better at performing protocol captures and which tool is better at performing protocol analysis? Wireshark is better for performing protocol analysis and Netwitness Investigator is best at performing protocol captures. Wireshark does well at both aspects, which makes it a little...

  • Backbone Network

    The chapter starts out explaining how a BN (Backbone Network) works. Backbone Network: Connecting all of the LANs of an organization entails another type of network (BN). A properly designed backbone network provides a high-speed circuit that serves as the central conduit across which the LANs of an...

  • The Dawn of the Net

    In the video of warriors of the . net the whole way of accessing the internet is described, the devices which the information goes through in the form of packaged data, the summary is as follows: When we enter a web address on the internet explorer it is considered as a package in which all the information...

  • Why Is It Impractical for an Organization to Own the Entirety of a Wan_

    Why is it impractical for an organization to own the entirety of a WAN? There are no limitations on WANs so they can be custom built for the size of the organization. Why is it favorable for an organization to maintain ownership of the entirety of the LAN? For the purpose of organizational...

  • Checkpoint Switching

    Packet switched networks move data in small blocks, or packets based on the destination address in each packet. When they are received the packets are reassembled in sequence to make up the message. Circuit switched networks rely on dedicated point-to-point connections during transmission. There are many...

  • Setting Up a Network at a New Office

    1.1 General Setting up a new network at a new office will require the purchase of new workstations, installing a new server, or implementing network security and virus protection systems network wide. LC Comm primary goal is to translate the technology needs of your building into an industry standard...

  • Configuring and Maintaining Network Security

    Because this is only a test deployment, you will be using a Windows 8 computer to function as the web server. In this exercise, you will install Internet Information Services on your workstation and then configure it to host two websites. Mindset Internet Information Services enables you to configure...

  • Networking Fundamentals

    1. Unit 1 review questions: a. The functions provided by a network are usually referred to as Network Services. b. A(n) Client Server may also be known as simply an access server. c. True or False: A client/server network is the simplest network model. d. True or False: A common way to share resources on a...

Read also  Why Is It Impractical for an Organization to Own the Entirety of a Wan_