1.38k likes | 1.62k Views
CHAPTER Major Network Functional Architectures. Chapter Objectives. Discuss the characteristics, features etc of Peer-to-peer and client-server networks Discuss the emerging concept of thin-clients Examine the network operating system in terms of the client and sever components
E N D
Chapter Objectives • Discuss the characteristics, features etc of Peer-to-peer and client-server networks • Discuss the emerging concept of thin-clients • Examine the network operating system in terms of the client and sever components • Provide an overview of the desirable characteristics of the server and client hardware
Chapter Modules • Peer-to-Peer Networks • Client-Server Networks • Server and Client Operating Systems • An Overview of Client and Server Hardware
Key Words • Peer-to-peer, client-server • User level security, resource level security • hard-resource and soft resource sharing • scope • file/folder level access control (client-server) • folder level access control (peer-to-peer)
MODULE Peer-to-Peer Network Architecture
Questions • What are the characterizing features of peer-to-peer architecture? • Name some application areas of peer-to-peer architecture? • What are the two different types of access controls that could be imposed on peer-to-peer networks? Focus on the networks that could be set up with Windows 9x and the Windows 2000 or the Windows XP Client operating systems?
Peer-to-Peer Configuration Workstation Workstation Printer • Share and share alike among peer stations • Absence of a server
Characteristics of a Peer-to-Peer Network • Simple and inexpensive • Each user • Manages his or her resources on workstation • User is also the administrator of his or her resources • Multi-user applications cannot be implemented • Limited potential for expansion in terms of applications
Security • Limited security • If an operating system such as Windows 9x is used for setting the peer-to-peer network • Uses FAT32 • Better Security • If an operating system such as Windows XP is used for setting the peer-to-peer network • Uses NTFS
Peer-to-Peer Implementation • Any number of computers can be connected as long as they are not used for multi-user applications • An example of a multi-user application is the SQL database application • Limiting factor • Narrow scope of directory implementation and peripheral sharing
Peer-to-Peer Sharing • Simple sharing of resources • Share • Files • Printers • Sharing an Internet connection • etc. • Simple messaging • Unsuitable for multi-user business applications • Limited number of connections and limited sharing
Windows XP Professional • File and printer sharing • A web server could also be run on an XP client • However, the connection is limited to only 10 concurrent users
Limitations in Windows • Windows XP • 10 concurrent users at any time • Windows Home Edition • 5 concurrent users at any time
Peer-to-Peer OS • Windows 7 • Windows Vista • Windows XP • Linux
Typical Peer-to-Peer Security Printer (Password) Folder (Password) Workstation (Name) Network
Peer-to-Peer Security • No administrator to administer the overall security of the network resources • Resources are independently administered by the user on each peer computer (client) • No centralized control on the resources
Operating Systems Supporting Peer-to-Peer Networking • Nearly all the client operating systems of today support peer-to-peer networking
Operating Systems Supporting Peer-to-Peer Networking • Support for peer-to-peer networking is built into the newer desktop operating systems • Windows 98/95/Me • Windows NT Workstation • Windows 2000 Professional • Windows XP Professional • Windows Vista • Windows 7 • Ubuntu Linux (Server and Client OS) • Fedora Linux • Macintosh OS • A network operating system per se is not required for implementing the peer-to-peer network
Peer-to-Peer Networks Peer-to-Peer Networks Windows 9X Windows NT Workstation Windows 2000 Professional Windows XP Professional Windows Vista Share-level access control User-level access control
Peer-to-Peer Networks Based on Windows 9x • Only share level access control is possible • Access to a resource such as a printer, for example, can be controlled based on passwords only and not based on user names • User level access control is not possible where access to the resources could be controlled based on user names • Each user may be given a different type of access to the resource
A Note on Windows NT, Windows 2000 and Windows XP • It is possible to configure peer-to-peer networks with Windows NT Workstation, Windows 2000 Professional, Windows XP Professional, and Windows 7 • Such networks offer better security compared to the same configured with Windows 95/98 • User-level access control is enforced in this case
File Systems • Windows • FAT32 • NTFS 5.0 • Linux • .ext2 • Mac OS • HFS – older version • HFS+ - Later version
Advanced Peer-to-Peer Networks(Windows 2000/XP Based) Printer (User) Folder (User) Workstation (User) Network
Peer-to-Peer Sharing of Hard and Soft Resources: An Example Printer (Password) Folder (Password) Share by accessing at location or copying to local station Workstation (Name) Share by attaching as a logical printer to local station Network
MODULE Client-Server Network Architecture
A Typical Client-Server Physical Architecture Server Printer File Server Application Server Thin-client Server Client Client Note: This is simply a physical client-server architecture.
Logical Client-Server Application Architectures • File server • Application server • Thin-client
Network Servers • Basic network operating system • DNS server • DHCP server etc.
Client-Server Network Architecture and Applications • The presence of a client-server physical network architecture does not necessarily imply that client-server applications are running on the network • Distinguishing between client-server physical network architecture and client-server applications is important • A client-server network physical architecture is required to support client-server applications
Client-Server Access Control • Possible to exercise control at the user level • Access control can be imposed based on user names • Different levels of access can be given to different users • Read and Write • Read Only etc.
Client Server Access Control On a Folder Server User1 R & W User2 R Tariff Client Client User1 User3 User2
Client-Server Characteristics • One or more servers are present • Server is the lifeline of the network • The server is optimized for performance • Higher level of security • User level and share level access control • Login password, station restrictions etc. • Architecture of choice for most business applications
The Scope • Networks based on powerful client-server operating systems can support a large number of users and workstations • Very large networks can be configured by linking smaller client-server network segments together • Active Directory based networks • Windows 2003 Server
Client-Server Network Application Architecture • File Server • Application server • Thin-Client
Functional Architectures Functional Architectures Peer-to-Peer Client-Server Share-Level Access Control File Server Thin-Client User Level Access Control Application Server
Physical and Application Architectures Server File Server Application Server Thin-client Server Printer Client Client
Factors Used in the Comparison of Architectures • Place of execution for application • Network traffic implications • TCO • Enforcing security • Software requirements • Server side • Client side
MODULE File Server Networks
File Server and Application Servers • File server is the simplest architecture • Application server is the more advanced architecture • Forms the core of the implementation of the client server technology • Thin-client is also an advanced architecture
Questions to be Asked • Place of execution for application • Network traffic implications • TCO • Enforcing security • Software requirements • Server side • Client side
Functional Features of a File Server Running a Database Depository of shared data, shared applications etc. Server Data files and application files Client Database search is performed on the client Processing of data data takes place at the client
Word Execution Alternatives Server Client Microsoft Word stored on logical hard disk (Shared application) Microsoft Word stored on local hard disk (Dedicated application)
File Server in a Nut Shell • The file server basically operates as one large shared storage space for the clients • Any client with the permission to access the resources on the file server can share folders etc. on the file server • In effect, the file server functions as a logical disk (network drive) as far as the client is concerned • Compared to a local disk, the difference is that the logical disk can be shared by other clients as well
The Logical Drive Concept Physically present on the client Shared storage from the server Physical Drive c: Logical or Network Drive f: Client Station Logical drive is physically located at the server.
File Server Characteristics • Shared data is stored on the server and brought to the client for processing • Shared application software are also stored on the server • Entire execution takes place at the client • Consequently, considerable network traffic is generated as the files are ported to the client for processing • Application server networks overcome this drawback by executing part of the application on the server
Some File Server Concerns • Powerful clients are necessary as the execution takes place at the client • Total Cost of Ownership (TCO) is high • More network traffic is generated
File Server Features • Advantage • Easy to set up • Disadvantage • Higher network traffic • Higher TCO