Client Server Network Essay
Client Server Network Essay
Your Name
Network, is the logical and structural layout of the network consisting of transmission
transmission of data and connectivity between components. Various hardware and software
architectures exist that are usually used for distributed computing. At a lower level, it is
necessary to interconnect multiple CPUs with some sort of network, regardless of that network
being printed onto a circuit board or made up of several loosely-coupled devices and cables. At a
higher level, it is necessary to interconnect processes running on those CPUs with some sort of
communication system. Most networks can be classified into one of five different types. These
include Wide Area Networks (WAN), Local Area Networks (LAN), Virtual Private Networks
(VPN), client/server networks, network computing, and peer-to-peer network (Wikipedia, 2009).
LAN (Local Area Network) is network architecture where the computers can be
connected up to limited area. LANs employ a single communication link and special routing.
Approximately, this network can be configured well up to 100 meters distance. The computers
are connected through devices like switches. These kinds of networks are limited to a building
or campus. The users can share the network resource and securities can be implemented only
within the network. LANs are traditionally used to connect a group of people who are in the
same local area. However, the working groups are becoming more geographically distributed in
today's working environment. There, virtual LAN (VLAN) technologies are defined for people
in different places to share the same networking resource. LAN protocols are mostly at data link
layer. The Institute of Electrical and Electronics Engineers (IEEE) is the leading organization
Network Configurations 3
defining most of the LAN protocols (Edraw Soft, 2009). “Until recently, few organizations used
wireless LANs because they cost too much, their data rates were too low, they posed
occupational safety problems because of concerns about the health effects of electromagnetic
radiation, and the spectrum used required a license. Today, these problems have largely
diminished, and wireless LAN popularity is skyrocketing. Wireless LANs must meet
requirements typical of any LAN. They must also meet requirements specific to their intended
WAN (Wide Area Network) connects two or more LANs and other networks so that
computers at one location can communicate to the computers at far away some other locations.
The Internet is certainly the largest WAN, spanning the entire earth and beyond. Some WANs
are built by private companies and only works for them and other are built by some Internet
Service Providers. WANs are usually built through leased lines and routers are used to connect
the network at one place to the network at other place. For example, a company has a network in
UK. The company wants to open its office in USA. In order to connect the two offices in UK and
We can have unprecedented benefits from WAN. By sitting at one city or country the
user can share the resources of the network in other city or country. For example, the user can
print the document or send an instant message by just one click. The users can use online
softwares for communication and can work at the same time on the server database. The benefits
are unlimited and it is up to the organization to what extent they need it for them. We use WAN
in those cases where LAN cannot be used. When more than two computers are involved in the
You can simply define WAN as any form of network (public, private) that covers a wide
geographical area. Type of WAN used depends on the nature of network. For example, there are
100 computers in a network and all computers belong to the same site. We want to send data
between sites. So, one method is to lease transmission lines from the public carriers. We will also
install a private switching system at each site. One of the advantages of a WAN is that we can
Network Configurations 5
use this network to connect computers distributed over a large area. As LAN is limited to an
office or home and does not provide services for long distance. For exchanging data between
sites, services provided by wide area network are sufficient and up to the mark.
Advantages of a WAN:
• Covers a large geographical area so long distance businesses can connect on the one
network
Disadvantages of a WAN:
• Need a good firewall to restrict outsiders from entering and disrupting the network
infrastructure, such as the Internet, to provide remote offices or individual users with secure
access to their organization's network. A VPN can be contrasted with an expensive system of
owned or leased lines that can only be used by one organization. The goal of a VPN is to provide
the organization with the same capabilities, but at a much lower cost (Search Enterprise WAN,
2009). A VPN works by using the shared public infrastructure while maintaining privacy through
security procedures and tunneling protocols such as the Layer Two Tunneling Protocol (L2TP).
In effect, the protocols, by encrypting data at the sending end and decrypting it at the receiving
end, send the data through a "tunnel" that cannot be "entered" by data that is not properly
encrypted. An additional level of security involves encrypting not only the data, but also the
Network Configurations 6
originating and receiving network addresses. Compared to other technologies, VPNs offers
• A VPN offers two main advantages over alternative technologies: cost savings, and
network scalability. To the clients accessing these networks, VPNs also bring some
• With a VPN, you use public network infrastructure including the Internet to make these
connections and tap into that virtual network through much cheaper local leased lines or
• A VPN also can replace remote access servers and long-distance dialup network
connections commonly used in the past by business travelers needing to access to their
company intranet.
• VPN technology also works well with Wi-Fi local area networking. Some organizations
use VPNs to secure wireless connections to their local access points when working inside
the office. These solutions provide strong protection without affecting performance
excessively.
• VPNs require detailed understanding of network security issues and careful installation /
direct control. Instead, the solution relies on an ISP and their quality of service.
• Historically, VPN products and solutions from different vendors have not always been
compatible due to issues with VPN technology standards. Attempting to mix and match
equipment may cause technical problems, and using equipment from one provider may
Client/Server Network
Client/server networks allow the network to centralize functions and applications in one
or more dedicated file servers. The file servers become the heart of the system, providing access
to resources and providing security. Individual workstations (clients) have access to the
resources available on the file servers. The network operating system provides the mechanism to
integrate all the components of the network and allow multiple users to simultaneously share the
same resources irrespective of physical location. Novell Netware and Windows 2000 Server are
• Centralized - Resources and data security are controlled through the server.
• Dependence - When server goes down, operations will cease across the network.
Peer-To-Peer Network
A peer-to-peer network allows two or more PCs to pool their resources together.
Individual resources like disk drives, CD-ROM drives, and even printers are transformed into
shared, collective resources that are accessible from every PC. Unlike client-server networks,
where network information is stored on a centralized file server PC and made available to tens,
hundreds, or thousands client PCs, the information stored across peer-to-peer networks is
uniquely decentralized. Because peer-to-peer PCs have their own hard disk drives that are
accessible by all computers, each PC acts as both a client (information requestor) and a server
(information provider). Because drives can be easily shared between peer-to-peer PCs,
applications only need to be installed on one computer. If users have one copy of Microsoft
Word, for example, it can be installed on user A's computer and still used by user B (Free PC
Tech, 2009).
• Each PC can make backup copies of its data to other PCs for security.
Network Configurations 9
• Easiest type of network to build, peer-to-peer is perfect for both home and office
use.
• Setup - An operating system (such as Windows XP) already in place may only
Conclusion
There are really a lot of challenges to overcome when designing a distributed system
successfully. These challenges or complexity is due to problems that are common to systems
exhibiting distribution behavior: The whole is greater than the sum of its parts. Nonetheless a
system that runs on this kind of computer arrangement is more fault-tolerant and more powerful
than many combinations of standalone systems, because distributed system architecture is more
Distributed systems offer many advantages that are practically impossible to get from
standalone systems. The flexibility of distributed system architecture allows it to grow, accept
new members, interact with them and modify its parts efficiently. System reliability (availability,
security and fault tolerance) is also better because if a computer fails, another one takes its place
to complete the specific task without affecting the overall performance. But the single most
salient characteristic of distributed systems is that as more and more computers become
Network Configurations 10
interconnected we can create whole new types of applications that expand not only many
References
Edraw Soft (2009). Local Area Network Technologies. Retrieve Dec 31, 2009, from
http://www.edrawsoft.com/Local-Area-Network.php
Florida Center for Instructional Technology (FCIT) (2009). An Educator’s Guide to School
Free PC Tech. (2009). Peer to Peer vs. Client/Server Networks. Retrieve Dec 31, 2009, from
http://freepctech.com/pc/002/networks007.shtml
Mitchell, B. (2009). What Are the Advantages and Benefits of a VPN? Retrieve Dec 31, 2009,
from http://compnetworking.about.com/od/vpn/f/vpn_benefits.htm
Search Enterprise WAN (2009). Wide Area Network (WAN) Definitions: Virtual Private
http://searchenterprisewan.techtarget.com/sDefinition/0,,sid200_gci213324,00.html
Stallings, W. (2001). IEEE 802.11: Moving Closer to Practical Wireless LANs. Retrieve Dec
tp=&arnumber=939970&isnumber=20349
Network Configurations 11
http://en.wikipedia.org/wiki/Telecommunications_network