Terminal Server network 1. Image 2. Terms In a terminal server network, processing power is centralized in one large computer, with capacity to handle a large number of connections. The nodes connect to this host computer are either terminals with little or no processing capabilities or microcomputers running special terminal emulation software such as Windows Remote Desktop. Many airline reservation systems are terminal server networks. A large central computer maintains all the schedules, rates, seat availability, and so on. Travel agents use terminals to connect to the central computer and to schedule reservations. Although the ticket may be printed along with travel itineraries at the agent’s desk, nearly all processing is done at the central computer. 1 3. Advantages and disadvantages No. Advantages Disadvantages 1 One advantage of terminal server networks is the centralized location and control of technical personnel, software, and data. One disadvantage is the lack of control and flexibility for the end user. 2 Low-Bandwidth Access to Data: Terminal services reduce the amount of network baQd width that is required to access data from. The remote computer-Data only in the form of screen views are transmitted. Over this bandwidthconstrained it is very successful combination for remotely manipulating large amounts of data. Another disadvantage is that terminal server networks do not use the full processing power available with microcomputers. 3 Helps enable branch-office access to feature-rich applications using lower bandwidth. The terminal server is the major source of risk of downtime. If the terminal server fails, the whole system fails unless a fail-over terminal server is in place. 4 Centralized application hosting. Effectively deliver applications across the enterprise to meet different needs, without straining network resources or exposing corporate data to unnecessary risks. The functionality of the system as a whole is also affected by the network reliability. If the network is down, the whole system is down as well. 5 Cost-effective application management. Reduce the cost and challenges of maintaining desktop machines with applications that are frequently update, infrequently used, or hard to install- or that need to be accessed over low-bandwith connections. Running applications from a terminal server can also be an issue from performance perspective. In some cases, no matter how good the network is, the performance associated with running an application locally on a desktop workstation can still overshadow the benefits of a terminal server environment. 2 Client Server Network 1. Image 2. Terms Client/server networks use central computers to coordinate and supply services to other notes on the network. The server provides access to resources such as Web page, databases, application software, and hard ware. This strategy is based on specialized. Server nodes request the services. Commonly used server operating systems are Windows Server, Mac OS X Server, Linux, and Solaris. Client/ server network are widely used on the internet. For example, each time you open a Web browser, your computer ( the client) send out the request is routed over the internet to a server. This server locates and sends material back to your computer. 3 3. Advantages and disadvantages No. Advantages Disadvantages 1 One advantage of client/ server network strategy is the ability to handle very large networks efficiently. The major disadvantage is the cost installation and maintenance. 2 Another advantage is the availability of powerful network management software to monitor and control network activities. When the server goes down or crashes. All the computers connected to it become unavailable to use. 3 A Client Sever Can Be scaled up to many services that can also be used by multiple users. 4 A client server enables the roles and responsibilities of a computing system. This means that it can update all the computers connected to it. An example of this would be software updates or hardware updates. When everyone tries to do the same thing it takes a little while for the server to do certain tasks. An example of this would be everyone logging into their profile in an organization or a college at the same time. More expensive than a peer to peer network. You have to pay for startup cost. 5 The security is a lot more advanced than a peer to peer network. You can have passwords to your won profile so that no one can access everything when they want. 6 Many mature client-server technologies are already available which were designed to ensure security, 'friendliness' of the user interface, and ease of use. 7 When you expand the server it starts to slow down due to the Bit rate per second. Comparing client-server model to the P2P model, if one server fail, clients’ requests cannot be served but in case of P2P networks, servers are usually distributed among many nodes. Even if one or more nodes fail, for example if a node failed to download a file the remaining nodes should still have the data needed to complete the download. It functions with multiple different clients of different capabilities. 4 Peer-to-peer (P2P) network 1. Image 2. Terms Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads among peers. Peers are equally privileged, equipotent participants in the application. They are said to form a peer-to-peer network of nodes. Peers make a portion of their resources, such as processing power, disk storage or network bandwidth, directly available to other network participants, without the need for central coordination by servers or stable hosts. Peers are both suppliers and consumers of resources, in contrast to the traditional client– server model where only servers supply (send), and clients consume (receive). The peer-to-peer application structure was popularized by file sharing systems like Napster. The concept has inspired new structures and philosophies in many areas of human interaction. Peer-to-peer networking is not restricted to technology, but covers also social processes with a peer-topeer dynamic. In such context, social peer-to-peer processes are currently emerging throughout society. 5 3. Advantages and disadvantages No. Advantages Disadvantages 1 A peer to peer network is inexpensive to set up. One disadvantage of P2P networks is the lack of security controls or other common management functions. So, you can set passwords for files that you don’t want people to access but apart from that the security is pretty poor. It uses the built in networking capabilities of Windows XP Professional (or Vista Business), so no special software is needed. It allows for file and printer sharing, and can be an adequate choice for a very small office. For this reason, few businesses use this type of network to communicate sensitive information. 2 You can access any file on the computer as long as it is set to shared folder. If you have not connected the computers together properly then there can be problems accessing certain files. 3 The requirements for a Peer to Peer Network are that you have a 10 Base T Ethernet cable and an Ethernet hub/ switch. This is rather cheap than having a server. It doesn’t always work if you have many computers and works better with 2 – 8 computers. 4 The architecture of the lay out (How It Connects) is simple. Lack of system administrator. 5 If one computer fails to work all the other computers connected to it continue to work. 6 Distributed processing network 1. Image 2. Term In a distributed processing network, processing capability is located and shared at different notes or locations. This type of strategy is common for decentralized organizations where divisional offices are networks to the organization’s main or centralized computer. 7 3. Advantages and disadvantages No. Advantages Disadvantages 1 Management of distributed data with different levels of transparency like fragmentation transparency, replication transparency and others. Complexity — extra work must be done by the DBAs to ensure that the distributed nature of the system is transparent. Extra work must also be done to maintain multiple disparate systems, instead of one big one. Extra database design work must also be done to account for the disconnected nature of the database — for example, joins become prohibitively expensive when performed across multiple systems. 2 Increase reliability and availability. Economics — increased complexity and a more extensive infrastructure means extra labour costs. 3 Easier expansion. 4 Reflects organizational structure — database fragments are located in the departments they relate to. Security — remote database fragments must be secured, and they are not centralized so the remote sites must be secured as well. The infrastructure must also be secured (e.g., by encrypting the network links between remote sites). Difficult to maintain integrity — but in a distributed database, enforcing integrity over a network may require too much of the network's resources to be feasible. 5 Local autonomy or site autonomy — a department can control the data about them (as they are the ones familiar with it.) Inexperience — distributed databases are difficult to work with, and as a young field there is not much readily available experience on proper practice. 6 Protection of valuable data — if there were ever a catastrophic event such as a fire, all of the data would not be in one place, but distributed in multiple locations. Lack of standards — there are no tools or methodologies yet to help users convert a centralized DBMS into a distributed DBMS. 8 For a summary of network strategies is Strategy Description Terminal Centralized processing power, location, and control. Underutilized processing power of microcomputers. Client/server Client request services. Servers provide services and coordination. Efficient network management software. Expensive. Peer-to-peer All nodes act as clients and servers. Easy and inexpensive. Lacks security controls. Distributed Nodes share resource from different locations. Used in decentralized organization. 9 References 1. http://www.google.com.my/imgres 2. Computing Essentials Complete 2011, written by Timothy J. O’Leary and Linda I. O’Leary, published by McGraw Hill 3. http://www.csc.liv.ac.uk/~dirk/Comp332/COMP332-DDB-notes.pdf 4. http://assignment1ivorfinn.wetpaint.com/page/The+Advantages+And+Disadvanta ges+of+Peer-to-peer+Network+and+client+%2Fserver+netwroks 5. http://simple.wikipedia.org/wiki/Client-server 6. http://networksandservers.blogspot.com/2011/10/virtualization-iii.html 7. http://en.wikipedia.org/wiki/Peer-to-peer# 10