Understanding the differences between client/server and peer-to-peer networks

转载 2015年10月12日 19:08:23
If you work with computers long enough, sooner or later you’ll hear the terms “client/server” and “peer-to-peer.” These terms may seem strange at first, but each describes a particular networking architecture. And each architecture is more suitable for certain types of businesses. In this article, I’ll explore the differences between client/server and peer-to-peer networks.

What’s the difference?
There’s a huge difference between client/server and peer-to-peer networks. For instance, a peer-to-peer network has no central server. Each workstation on the network shares its files equally with the others. There’s no central storage or authentication of users. Conversely, there are separate dedicated servers and clients in a client/server network. Through client workstations, users can access most files, which are generally stored on the server. The server will determine which users can access the files on the network.

Peer-to-peer networks should be installed in homes or in very small businesses where employees interact regularly. They are inexpensive to set up (comparatively speaking); however, they offer almost no security. On the other hand, client/server networks can become as big as you need them to be. Some support millions of users and offer elaborate security measures. As you can imagine, client/server networks can become very expensive.

Peer-to-peer networks
Peer-to-peer networks are appropriate only for very small businesses or for home use. A peer-to-peer network can support about ten clients (workstations) before it begins to suffer from some serious performance and management problems. Usually, peer-to-peer networks are composed of a collection of clients that run either Windows NT Workstation or Windows 98. Windows 3.11, Windows 95, and Windows 2000 Professional also support peer-to-peer networking.

The concept behind peer-to-peer networking is to share files and printers as inexpensively as possible; therefore, there’s no main server on the network. Instead, each client functions both as a client and as a server simultaneously. Since users are allowed to control access to the resources on their own computers, however, security becomes very risky in a peer-to-peer environment. There’s no central security or any way to control who shares what. Users are free to create any network share points on their computers. The only security on a peer-to-peer network is at the share level. When users create network shares, they may implement no security, which means that anyone can have full access to the share, or they may assign a password to the share. Depending on which networking platform you use, a user may be able to assign one password to a share for read-only access and another password for full control over the share.

Although this arrangement may sound somewhat secure, it isn’t. The computer that contains the shared resources doesn’t check on who’s trying to access those resources. Any user can access them as long as the user knows the password. If someone happens to write down a password, anyone who finds that password can access the share.

Client/server networks
There are an almost infinite variety of client/server networks, but all of them have a couple of things in common. For one thing, all have centralized security databases that control access to shared resources on servers. In the world of Windows, the server usually runs NetWare, Windows NT, or one of the Windows 2000 Server products. The server contains a list of usernames and passwords. Users can’t log on to the network unless they supply valid usernames and passwords to the server. Once logged on, users may access only those resources that the network administrator allows them to access. Thus, client/server networks possess much more security than do peer-to-peer networks.

Client/server networks also tend to be much more stable. In a peer-to-peer network, certain shared resources reside on each user’s machine. If users decide to monkey around and crash their computers, they could seriously affect their peer-to-peer network (where coworkers depend on resources that reside on other users’ machines). On most client/server networks, however, shared resources reside on the server, where they’re safe from curious users. If a user happens to erase a shared resource from the server, you can rely on the nightly backup. (It’s very difficult to back up a peer-to-peer network every night.)

The primary downside to a client/server network is its cost. Servers can become very expensive. For example, you could pay over $800 for a copy of Windows NT Server and five client licenses, and that price doesn’t even include the cost of the hardware, which must be more powerful than a standard workstation. Additionally, client/server networks require an employee to manage them. Unless you have someone in your office who’s trained in NetWare or Windows NT Server and in all of the issues that are involved in client/server networking, you’ll have to hire someone from the outside. And believe me when I say that qualified networking professionals don’t come cheap.

If you can afford it and if you have a qualified person to manage it, a client/server network is going to be your best bet. If you have only three employees who share a printer and occasional files, however, there’s absolutely nothing wrong with setting up a simple peer-to-peer networking environment. What’s best for you will depend on your budget and the size of your office.

Brien M. Posey is an MCSE who works as a freelance technical writer and as a network engineer for the Department of Defense. If you’d like to contact Brien,send him an e-mail. (Because of the large volume of e-mail he receives, it's impossible for him to respond to every message. However, he does read them all.)

The authors and editors have taken care in preparation of the content contained herein, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for any damages. Always have a verified backup before making any changes.

This article comes from :http://www.techrepublic.com/article/understanding-the-differences-between-client-server-and-peer-to-peer-networks/

CNN入门必读经典:Visualizing and Understanding Convolutional Networks

本文主要是借助deconvnet来可视化卷积网络,这对于理解卷积网络还是非常重要的,同时本文又是13年ImageNet分类任务的冠军。 代码: https://github.com/guruucs...
  • bea_tree
  • bea_tree
  • 2017年04月03日 12:55
  • 1487

Visualizing and Understanding Convolutional Networks翻译总结

Zfnet 论文:《Visualizing and Understanding Convolutional Networks》 1.     概述 这篇论文主要的贡献是将卷及神经网络的隐藏层的特征进行...
  • xjz18298268521
  • xjz18298268521
  • 2016年08月31日 09:35
  • 2366

“看懂”卷积神经网(Visualizing and Understanding Convolutional Networks)

在所有深度网络中,卷积神经网和图像处理最为密切相关,卷积网在很多图片分类竞赛中都取得了很好的效果,但很多人都不了解卷积网取得良好成绩的原因。为此,卷积神经网的发明者Yann LeCun的得意门生Mat...
  • kklots
  • kklots
  • 2013年12月06日 18:15
  • 17645

深度学习研究理解5:Visualizing and Understanding Convolutional Networks

Visualizing and understandingConvolutional Networks 本文是Matthew D.Zeiler 和Rob Fergus于(纽约大学)13年撰写的论文,主...
  • whiteinblue
  • whiteinblue
  • 2015年01月30日 20:20
  • 8667

Visualizing and Understanding Convolutional Networks(精读)

一.文献名字和作者      Visualizing and Understanding Convolutional Networks, ECCV2014     二.阅读时间    ...
  • shengno1
  • shengno1
  • 2014年11月12日 10:09
  • 3873


Maven 使用dependencyManagement 元素来提供了一种管理依赖版本号的方式。通常会在一个组织或者项目的最顶层的父POM 中看到dependencyManagement 元素。使用p...
  • normol
  • normol
  • 2017年07月12日 07:16
  • 339

[深度学习论文笔记][Visualizing] Understanding Neural Networks Through Deep Visualization

Yosinski, Jason, et al. “Understanding neural networks through deep visualization.” arXiv preprint a...
  • Hao_Zhang_Vision
  • Hao_Zhang_Vision
  • 2016年10月31日 08:27
  • 618

(译)理解 LSTM 网络 (Understanding LSTM Networks by colah)

@翻译:huangyongye 原文链接: Understanding LSTM Networks 前言:其实之前就已经用过 LSTM 了,是在深度学习框架 keras 上直接用的,但是到现在对L...
  • Jerr__y
  • Jerr__y
  • 2017年02月28日 16:38
  • 13097

《Understanding the difficulty of training deep feedforward neural networks》笔记

  • KangRoger
  • KangRoger
  • 2017年03月11日 11:13
  • 1244

Visualizing and Understanding Convolutional Networks论文笔记

本文是Matthew D.Zeiler 和Rob Fergus 13年的论文,主要通过Deconvnet(反卷积)来可视化卷积网络,来理解卷积网络,并进行分析和调优;本文通过反卷积,将Alex-net...
  • bailufeiyan
  • bailufeiyan
  • 2016年01月24日 20:51
  • 804
您举报文章:Understanding the differences between client/server and peer-to-peer networks