SlideShare a Scribd company logo
1 of 7
Running head: SERVERS 1
Running head: SERVERS 1
Debbie Utter
Colorado Technical University
Unit 3 IP
Introduction to Operating Systems and Client/Servers
Environment
IT140-1503B-01
Dr. Stephan Reynolds
September 11, 2015
Peer-to-peer networks and client-server networks are both
distinct networking architectures, each model being suitable for
different types of organizations. The main difference between
these two architectures is that in Client-server networks, there
is a dedicated central computer (known as a server) and the
other reliable computers (clients) dependent on the server’s
resources. On the other hand, in a peer-to-peer network, each
computer can act as the server and client to the others. In
simpler terms, if each computer in the network can fully carry
out its functions independently, then it is in a peer-to-peer
network. If one computer is the go-to computer for services
such as file storage or the one given the capability to grant or
deny access of services to the other computers, then those
computers are in a client-server network.
Peer-to-peer and client-server networks can both be
differentiated using the various aspects as follows:
(a) Performance
A peer-to-peer network is only suitable for as much as 10
computers, past which performance problems will arise. An
organization with more than 10 computers is best suited for a
client-server network. This is because of the presence of a
server that does most of the management and control duties.
Also, an issue with one computer won’t necessarily interfere
with the network since it’s not required to share its computing
power.
(b) Cost
Client-server networks are basically more expensive than peer-
to-peer networks, both in installation and maintenance. The
server in client-server networks needs to have great computing
power, and therefore you need have dedicated software to
manage the network. An example of this software that does this
job excellently is the Windows Server. Such programs are
complicated to run, and so more costs may arise due to the need
to have experts that fix any arising problems.
(c) Security
Client-server networks are more secure than peer-to-peer
networks. The server has a function in it that can grant or reject
a user’s access request to the network. This feature is important
as it helps keep unwanted users, malware or malicious bots out
of the network. However, it is important to note that as the more
computers join the client-server network, security management
becomes increasingly difficult.
(d)Geographical area
A peer-to-peer network is suitable when it is being set up in
homes or small organizations. But for bigger organizations,
such as hospitals, a client-server is ideal due to the need for
technical functions in the organization.
Depending on the above factors, a client-server network would
work best in Health Care HQ.
As earlier mentioned, Windows Server is one of the most
efficient operating systems that manages client-server networks.
It is a platform through which network applications and web
services are developed and run on. It is one of the many
Microsoft products. The two major operating systems releases
are Windows Server 2008 and Windows Server 2012. Both offer
the following services: file sharing, print sharing, user
administration, application server, Dynamic host configuration
protocol [DHCP], domain name system [DNS], and backing up
data.
Windows Server 2012 has notable improvements from the
Windows Server 2008 (which was an earlier release) that
greatly enhances its functionality.
In terms of file management, the 2012 release has Dropbox’s
functionality incorporated into it by means of Work Folders.
This is software that gives you a highly functional, secure file
replication service. Work Folders can efficiently keep copies of
files on the server and other client computers. A client can also
easily request and get a file as long a connection with the server
is established.
Another feature include in Windows Server 2012 is the
Dynamic Host Configuration Protocol (DHCP) Server Failover.
This feature now allows two DHCP servers to sync information
about the same instance. If one server goes down, the other
server instantaneously takes over responsibility of managing the
clients.
Domain Name System Security Extensions (DNSSEC) is another
improved feature in Windows Server 2012. It is a suite of
additions to Domain Name Systems (DNS) which protects the
network traffic from outside attacks. It is able to do this by
validating a digital signature to each DNS response, after which
the resolver can verify the authenticity of DNS data, even from
untrusted DNS server.
RECOMMENDATION
In conclusion, Windows Server 2012 offers improved
performance to deal with high latency and variable network
conditions. It is reliable in that it offers new ways to reduce
network downtime and at the same time enhancing the
network’s performance. The OS is also easily responsive to any
change in other networking devices. It has low latency which
means that the end-to-end transaction processing that happens
in applications is greatly reduced.
Running head: SERVERS 1
Running head: SERVERS 1
Debbie Utter
Colorado Technical University
Unit 3 IP
Introduction to Operating Systems and Client/Servers
Environment
IT140-1503B-01
Dr. Stephan Reynolds
September 11, 2015
Peer-to-peer networks and client-server networks are both
distinct networking architectures, each model being suitable for
different types of organizations. The main difference between
these two architectures is that in Client-server networks, there
is a dedicated central computer (known as a server) and the
other reliable computers (clients) dependent on the server’s
resources. On the other hand, in a peer-to-peer network, each
computer can act as the server and client to the others. In
simpler terms, if each computer in the network can fully carry
out its functions independently, then it is in a peer-to-peer
network. If one computer is the go-to computer for services
such as file storage or the one given the capability to grant or
deny access of services to the other computers, then those
computers are in a client-server network.
Peer-to-peer and client-server networks can both be
differentiated using the various aspects as follows:
(a) Performance
A peer-to-peer network is only suitable for as much as 10
computers, past which performance problems will arise. An
organization with more than 10 computers is best suited for a
client-server network. This is because of the presence of a
server that does most of the management and control duties.
Also, an issue with one computer won’t necessarily interfere
with the network since it’s not required to share its computing
power.
(b) Cost
Client-server networks are basically more expensive than peer-
to-peer networks, both in installation and maintenance. The
server in client-server networks needs to have great computing
power, and therefore you need have dedicated software to
manage the network. An example of this software that does this
job excellently is the Windows Server. Such programs are
complicated to run, and so more costs may arise due to the need
to have experts that fix any arising problems.
(c) Security
Client-server networks are more secure than peer-to-peer
networks. The server has a function in it that can grant or reject
a user’s access request to the network. This feature is important
as it helps keep unwanted users, malware or malicious bots out
of the network. However, it is important to note that as the more
computers join the client-server network, security management
becomes increasingly difficult.
(d)Geographical area
A peer-to-peer network is suitable when it is being set up in
homes or small organizations. But for bigger organizations,
such as hospitals, a client-server is ideal due to the need for
technical functions in the organization.
Depending on the above factors, a client-server network would
work best in Health Care HQ.
As earlier mentioned, Windows Server is one of the most
efficient operating systems that manages client-server networks.
It is a platform through which network applications and web
services are developed and run on. It is one of the many
Microsoft products. The two major operating systems releases
are Windows Server 2008 and Windows Server 2012. Both offer
the following services: file sharing, print sharing, user
administration, application server, Dynamic host configuration
protocol [DHCP], domain name system [DNS], and backing up
data.
Windows Server 2012 has notable improvements from the
Windows Server 2008 (which was an earlier release) that
greatly enhances its functionality.
In terms of file management, the 2012 release has Dropbox’s
functionality incorporated into it by means of Work Folders.
This is software that gives you a highly functional, secure file
replication service. Work Folders can efficiently keep copies of
files on the server and other client computers. A client can also
easily request and get a file as long a connection with the server
is established.
Another feature include in Windows Server 2012 is the
Dynamic Host Configuration Protocol (DHCP) Server Failover.
This feature now allows two DHCP servers to sync information
about the same instance. If one server goes down, the other
server instantaneously takes over responsibility of managing the
clients.
Domain Name System Security Extensions (DNSSEC) is another
improved feature in Windows Server 2012. It is a suite of
additions to Domain Name Systems (DNS) which protects the
network traffic from outside attacks. It is able to do this by
validating a digital signature to each DNS response, after which
the resolver can verify the authenticity of DNS data, even from
untrusted DNS server.
RECOMMENDATION
In conclusion, Windows Server 2012 offers improved
performance to deal with high latency and variable network
conditions. It is reliable in that it offers new ways to reduce
network downtime and at the same time enhancing the
network’s performance. The OS is also easily responsive to any
change in other networking devices. It has low latency which
means that the end-to-end transaction processing that happens
in applications is greatly reduced.

More Related Content

Similar to Running head SERVERS1Running head SERVERS1.docx

A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageIGEEKS TECHNOLOGIES
 
Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)rosu555
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storageIGEEKS TECHNOLOGIES
 
cloudcomputing-151228104644 (1).pptx
cloudcomputing-151228104644 (1).pptxcloudcomputing-151228104644 (1).pptx
cloudcomputing-151228104644 (1).pptxGauravPandey43518
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Types of networks according
Types of networks accordingTypes of networks according
Types of networks accordingMicrobiology
 
Types of networks according to security
Types of networks according to securityTypes of networks according to security
Types of networks according to securityMicrobiology
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxojaswiniwagh
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxssuserea0dfe
 
Ensuring d.s
Ensuring d.sEnsuring d.s
Ensuring d.skarthi j
 
Discusion on Cloud Computing Services:A Selective Study
Discusion on Cloud Computing Services:A Selective StudyDiscusion on Cloud Computing Services:A Selective Study
Discusion on Cloud Computing Services:A Selective StudyPrasanna Kumar Valluri
 
Computing And Information Technology Programmes Essay
Computing And Information Technology Programmes EssayComputing And Information Technology Programmes Essay
Computing And Information Technology Programmes EssayLucy Nader
 
Introduction to Cloud Computing
Introduction to Cloud Computing Introduction to Cloud Computing
Introduction to Cloud Computing CloudSyntrix
 
Types of networks according to security
Types of networks according to securityTypes of networks according to security
Types of networks according to securityAmjad Afridi
 
Cloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesCloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesTechsparks
 
An in-building multi-server cloud system based on shortest Path algorithm dep...
An in-building multi-server cloud system based on shortest Path algorithm dep...An in-building multi-server cloud system based on shortest Path algorithm dep...
An in-building multi-server cloud system based on shortest Path algorithm dep...IOSR Journals
 

Similar to Running head SERVERS1Running head SERVERS1.docx (20)

A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storage
 
Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storage
 
cloudcomputing-151228104644 (1).pptx
cloudcomputing-151228104644 (1).pptxcloudcomputing-151228104644 (1).pptx
cloudcomputing-151228104644 (1).pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Types of networks according
Types of networks accordingTypes of networks according
Types of networks according
 
Types of networks according to security
Types of networks according to securityTypes of networks according to security
Types of networks according to security
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 
Clientserver
ClientserverClientserver
Clientserver
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Ensuring d.s
Ensuring d.sEnsuring d.s
Ensuring d.s
 
Discusion on Cloud Computing Services:A Selective Study
Discusion on Cloud Computing Services:A Selective StudyDiscusion on Cloud Computing Services:A Selective Study
Discusion on Cloud Computing Services:A Selective Study
 
Computing And Information Technology Programmes Essay
Computing And Information Technology Programmes EssayComputing And Information Technology Programmes Essay
Computing And Information Technology Programmes Essay
 
Introduction to Cloud Computing
Introduction to Cloud Computing Introduction to Cloud Computing
Introduction to Cloud Computing
 
Types of networks according to security
Types of networks according to securityTypes of networks according to security
Types of networks according to security
 
Cloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesCloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and Terminologies
 
An in-building multi-server cloud system based on shortest Path algorithm dep...
An in-building multi-server cloud system based on shortest Path algorithm dep...An in-building multi-server cloud system based on shortest Path algorithm dep...
An in-building multi-server cloud system based on shortest Path algorithm dep...
 
H017113842
H017113842H017113842
H017113842
 

More from charisellington63520

in addition to these questions also answer the following;Answer .docx
in addition to these questions also answer the following;Answer .docxin addition to these questions also answer the following;Answer .docx
in addition to these questions also answer the following;Answer .docxcharisellington63520
 
In an environment of compliancy laws, regulations, and standards, in.docx
In an environment of compliancy laws, regulations, and standards, in.docxIn an environment of compliancy laws, regulations, and standards, in.docx
In an environment of compliancy laws, regulations, and standards, in.docxcharisellington63520
 
In American politics, people often compare their enemies to Hitler o.docx
In American politics, people often compare their enemies to Hitler o.docxIn American politics, people often compare their enemies to Hitler o.docx
In American politics, people often compare their enemies to Hitler o.docxcharisellington63520
 
In addition to the thread, the student is required to reply to 2 oth.docx
In addition to the thread, the student is required to reply to 2 oth.docxIn addition to the thread, the student is required to reply to 2 oth.docx
In addition to the thread, the student is required to reply to 2 oth.docxcharisellington63520
 
In addition to reading the Announcements, prepare for this d.docx
In addition to reading the Announcements, prepare for this d.docxIn addition to reading the Announcements, prepare for this d.docx
In addition to reading the Announcements, prepare for this d.docxcharisellington63520
 
In Act 4 during the trial scene, Bassanio says the following lin.docx
In Act 4 during the trial scene, Bassanio says the following lin.docxIn Act 4 during the trial scene, Bassanio says the following lin.docx
In Act 4 during the trial scene, Bassanio says the following lin.docxcharisellington63520
 
In a Word document, please respond to the following questions.docx
In a Word document, please respond to the following questions.docxIn a Word document, please respond to the following questions.docx
In a Word document, please respond to the following questions.docxcharisellington63520
 
In a Word document, create A Set of Instructions. (you will want.docx
In a Word document, create A Set of Instructions. (you will want.docxIn a Word document, create A Set of Instructions. (you will want.docx
In a Word document, create A Set of Instructions. (you will want.docxcharisellington63520
 
In a two page response MLA format paperMaria Werner talks about .docx
In a two page response MLA format paperMaria Werner talks about .docxIn a two page response MLA format paperMaria Werner talks about .docx
In a two page response MLA format paperMaria Werner talks about .docxcharisellington63520
 
In a paragraph (150 words minimum), please respond to the follow.docx
In a paragraph (150 words minimum), please respond to the follow.docxIn a paragraph (150 words minimum), please respond to the follow.docx
In a paragraph (150 words minimum), please respond to the follow.docxcharisellington63520
 
In a paragraph form, discuss the belowThe client comes to t.docx
In a paragraph form, discuss the belowThe client comes to t.docxIn a paragraph form, discuss the belowThe client comes to t.docx
In a paragraph form, discuss the belowThe client comes to t.docxcharisellington63520
 
In a minimum of 300 words in APA format.Through the advent o.docx
In a minimum of 300 words in APA format.Through the advent o.docxIn a minimum of 300 words in APA format.Through the advent o.docx
In a minimum of 300 words in APA format.Through the advent o.docxcharisellington63520
 
In a paragraph form, post your initial response after reading th.docx
In a paragraph form, post your initial response after reading th.docxIn a paragraph form, post your initial response after reading th.docx
In a paragraph form, post your initial response after reading th.docxcharisellington63520
 
In a minimum 250-word paragraph, discuss at least one point the auth.docx
In a minimum 250-word paragraph, discuss at least one point the auth.docxIn a minimum 250-word paragraph, discuss at least one point the auth.docx
In a minimum 250-word paragraph, discuss at least one point the auth.docxcharisellington63520
 
In a hostage crisis, is it ethical for a government to agree to gran.docx
In a hostage crisis, is it ethical for a government to agree to gran.docxIn a hostage crisis, is it ethical for a government to agree to gran.docx
In a hostage crisis, is it ethical for a government to agree to gran.docxcharisellington63520
 
In a double-spaced 12 Font paper  How did you immediately feel a.docx
In a double-spaced 12 Font paper  How did you immediately feel a.docxIn a double-spaced 12 Font paper  How did you immediately feel a.docx
In a double-spaced 12 Font paper  How did you immediately feel a.docxcharisellington63520
 
In a follow-up to your IoT discussion with management, you have .docx
In a follow-up to your IoT discussion with management, you have .docxIn a follow-up to your IoT discussion with management, you have .docx
In a follow-up to your IoT discussion with management, you have .docxcharisellington63520
 
In a COVID-19 situation identify the guidelines for ethical use of t.docx
In a COVID-19 situation identify the guidelines for ethical use of t.docxIn a COVID-19 situation identify the guidelines for ethical use of t.docx
In a COVID-19 situation identify the guidelines for ethical use of t.docxcharisellington63520
 
In a 750- to 1,250-word paper, evaluate the implications of Internet.docx
In a 750- to 1,250-word paper, evaluate the implications of Internet.docxIn a 750- to 1,250-word paper, evaluate the implications of Internet.docx
In a 750- to 1,250-word paper, evaluate the implications of Internet.docxcharisellington63520
 
In a 600 word count (EACH bullet point having 300 words each) di.docx
In a 600 word count (EACH bullet point having 300 words each) di.docxIn a 600 word count (EACH bullet point having 300 words each) di.docx
In a 600 word count (EACH bullet point having 300 words each) di.docxcharisellington63520
 

More from charisellington63520 (20)

in addition to these questions also answer the following;Answer .docx
in addition to these questions also answer the following;Answer .docxin addition to these questions also answer the following;Answer .docx
in addition to these questions also answer the following;Answer .docx
 
In an environment of compliancy laws, regulations, and standards, in.docx
In an environment of compliancy laws, regulations, and standards, in.docxIn an environment of compliancy laws, regulations, and standards, in.docx
In an environment of compliancy laws, regulations, and standards, in.docx
 
In American politics, people often compare their enemies to Hitler o.docx
In American politics, people often compare their enemies to Hitler o.docxIn American politics, people often compare their enemies to Hitler o.docx
In American politics, people often compare their enemies to Hitler o.docx
 
In addition to the thread, the student is required to reply to 2 oth.docx
In addition to the thread, the student is required to reply to 2 oth.docxIn addition to the thread, the student is required to reply to 2 oth.docx
In addition to the thread, the student is required to reply to 2 oth.docx
 
In addition to reading the Announcements, prepare for this d.docx
In addition to reading the Announcements, prepare for this d.docxIn addition to reading the Announcements, prepare for this d.docx
In addition to reading the Announcements, prepare for this d.docx
 
In Act 4 during the trial scene, Bassanio says the following lin.docx
In Act 4 during the trial scene, Bassanio says the following lin.docxIn Act 4 during the trial scene, Bassanio says the following lin.docx
In Act 4 during the trial scene, Bassanio says the following lin.docx
 
In a Word document, please respond to the following questions.docx
In a Word document, please respond to the following questions.docxIn a Word document, please respond to the following questions.docx
In a Word document, please respond to the following questions.docx
 
In a Word document, create A Set of Instructions. (you will want.docx
In a Word document, create A Set of Instructions. (you will want.docxIn a Word document, create A Set of Instructions. (you will want.docx
In a Word document, create A Set of Instructions. (you will want.docx
 
In a two page response MLA format paperMaria Werner talks about .docx
In a two page response MLA format paperMaria Werner talks about .docxIn a two page response MLA format paperMaria Werner talks about .docx
In a two page response MLA format paperMaria Werner talks about .docx
 
In a paragraph (150 words minimum), please respond to the follow.docx
In a paragraph (150 words minimum), please respond to the follow.docxIn a paragraph (150 words minimum), please respond to the follow.docx
In a paragraph (150 words minimum), please respond to the follow.docx
 
In a paragraph form, discuss the belowThe client comes to t.docx
In a paragraph form, discuss the belowThe client comes to t.docxIn a paragraph form, discuss the belowThe client comes to t.docx
In a paragraph form, discuss the belowThe client comes to t.docx
 
In a minimum of 300 words in APA format.Through the advent o.docx
In a minimum of 300 words in APA format.Through the advent o.docxIn a minimum of 300 words in APA format.Through the advent o.docx
In a minimum of 300 words in APA format.Through the advent o.docx
 
In a paragraph form, post your initial response after reading th.docx
In a paragraph form, post your initial response after reading th.docxIn a paragraph form, post your initial response after reading th.docx
In a paragraph form, post your initial response after reading th.docx
 
In a minimum 250-word paragraph, discuss at least one point the auth.docx
In a minimum 250-word paragraph, discuss at least one point the auth.docxIn a minimum 250-word paragraph, discuss at least one point the auth.docx
In a minimum 250-word paragraph, discuss at least one point the auth.docx
 
In a hostage crisis, is it ethical for a government to agree to gran.docx
In a hostage crisis, is it ethical for a government to agree to gran.docxIn a hostage crisis, is it ethical for a government to agree to gran.docx
In a hostage crisis, is it ethical for a government to agree to gran.docx
 
In a double-spaced 12 Font paper  How did you immediately feel a.docx
In a double-spaced 12 Font paper  How did you immediately feel a.docxIn a double-spaced 12 Font paper  How did you immediately feel a.docx
In a double-spaced 12 Font paper  How did you immediately feel a.docx
 
In a follow-up to your IoT discussion with management, you have .docx
In a follow-up to your IoT discussion with management, you have .docxIn a follow-up to your IoT discussion with management, you have .docx
In a follow-up to your IoT discussion with management, you have .docx
 
In a COVID-19 situation identify the guidelines for ethical use of t.docx
In a COVID-19 situation identify the guidelines for ethical use of t.docxIn a COVID-19 situation identify the guidelines for ethical use of t.docx
In a COVID-19 situation identify the guidelines for ethical use of t.docx
 
In a 750- to 1,250-word paper, evaluate the implications of Internet.docx
In a 750- to 1,250-word paper, evaluate the implications of Internet.docxIn a 750- to 1,250-word paper, evaluate the implications of Internet.docx
In a 750- to 1,250-word paper, evaluate the implications of Internet.docx
 
In a 600 word count (EACH bullet point having 300 words each) di.docx
In a 600 word count (EACH bullet point having 300 words each) di.docxIn a 600 word count (EACH bullet point having 300 words each) di.docx
In a 600 word count (EACH bullet point having 300 words each) di.docx
 

Recently uploaded

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 

Recently uploaded (20)

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 

Running head SERVERS1Running head SERVERS1.docx

  • 1. Running head: SERVERS 1 Running head: SERVERS 1 Debbie Utter Colorado Technical University Unit 3 IP Introduction to Operating Systems and Client/Servers Environment IT140-1503B-01 Dr. Stephan Reynolds September 11, 2015 Peer-to-peer networks and client-server networks are both distinct networking architectures, each model being suitable for different types of organizations. The main difference between these two architectures is that in Client-server networks, there is a dedicated central computer (known as a server) and the other reliable computers (clients) dependent on the server’s resources. On the other hand, in a peer-to-peer network, each
  • 2. computer can act as the server and client to the others. In simpler terms, if each computer in the network can fully carry out its functions independently, then it is in a peer-to-peer network. If one computer is the go-to computer for services such as file storage or the one given the capability to grant or deny access of services to the other computers, then those computers are in a client-server network. Peer-to-peer and client-server networks can both be differentiated using the various aspects as follows: (a) Performance A peer-to-peer network is only suitable for as much as 10 computers, past which performance problems will arise. An organization with more than 10 computers is best suited for a client-server network. This is because of the presence of a server that does most of the management and control duties. Also, an issue with one computer won’t necessarily interfere with the network since it’s not required to share its computing power. (b) Cost Client-server networks are basically more expensive than peer- to-peer networks, both in installation and maintenance. The server in client-server networks needs to have great computing power, and therefore you need have dedicated software to manage the network. An example of this software that does this job excellently is the Windows Server. Such programs are complicated to run, and so more costs may arise due to the need to have experts that fix any arising problems. (c) Security Client-server networks are more secure than peer-to-peer networks. The server has a function in it that can grant or reject a user’s access request to the network. This feature is important as it helps keep unwanted users, malware or malicious bots out of the network. However, it is important to note that as the more computers join the client-server network, security management becomes increasingly difficult. (d)Geographical area
  • 3. A peer-to-peer network is suitable when it is being set up in homes or small organizations. But for bigger organizations, such as hospitals, a client-server is ideal due to the need for technical functions in the organization. Depending on the above factors, a client-server network would work best in Health Care HQ. As earlier mentioned, Windows Server is one of the most efficient operating systems that manages client-server networks. It is a platform through which network applications and web services are developed and run on. It is one of the many Microsoft products. The two major operating systems releases are Windows Server 2008 and Windows Server 2012. Both offer the following services: file sharing, print sharing, user administration, application server, Dynamic host configuration protocol [DHCP], domain name system [DNS], and backing up data. Windows Server 2012 has notable improvements from the Windows Server 2008 (which was an earlier release) that greatly enhances its functionality. In terms of file management, the 2012 release has Dropbox’s functionality incorporated into it by means of Work Folders. This is software that gives you a highly functional, secure file replication service. Work Folders can efficiently keep copies of files on the server and other client computers. A client can also easily request and get a file as long a connection with the server is established. Another feature include in Windows Server 2012 is the Dynamic Host Configuration Protocol (DHCP) Server Failover. This feature now allows two DHCP servers to sync information about the same instance. If one server goes down, the other server instantaneously takes over responsibility of managing the clients. Domain Name System Security Extensions (DNSSEC) is another improved feature in Windows Server 2012. It is a suite of additions to Domain Name Systems (DNS) which protects the network traffic from outside attacks. It is able to do this by
  • 4. validating a digital signature to each DNS response, after which the resolver can verify the authenticity of DNS data, even from untrusted DNS server. RECOMMENDATION In conclusion, Windows Server 2012 offers improved performance to deal with high latency and variable network conditions. It is reliable in that it offers new ways to reduce network downtime and at the same time enhancing the network’s performance. The OS is also easily responsive to any change in other networking devices. It has low latency which means that the end-to-end transaction processing that happens in applications is greatly reduced. Running head: SERVERS 1 Running head: SERVERS 1 Debbie Utter Colorado Technical University Unit 3 IP Introduction to Operating Systems and Client/Servers Environment IT140-1503B-01 Dr. Stephan Reynolds September 11, 2015
  • 5. Peer-to-peer networks and client-server networks are both distinct networking architectures, each model being suitable for different types of organizations. The main difference between these two architectures is that in Client-server networks, there is a dedicated central computer (known as a server) and the other reliable computers (clients) dependent on the server’s resources. On the other hand, in a peer-to-peer network, each computer can act as the server and client to the others. In simpler terms, if each computer in the network can fully carry out its functions independently, then it is in a peer-to-peer network. If one computer is the go-to computer for services such as file storage or the one given the capability to grant or deny access of services to the other computers, then those computers are in a client-server network. Peer-to-peer and client-server networks can both be differentiated using the various aspects as follows: (a) Performance A peer-to-peer network is only suitable for as much as 10 computers, past which performance problems will arise. An organization with more than 10 computers is best suited for a client-server network. This is because of the presence of a server that does most of the management and control duties. Also, an issue with one computer won’t necessarily interfere with the network since it’s not required to share its computing power. (b) Cost Client-server networks are basically more expensive than peer- to-peer networks, both in installation and maintenance. The server in client-server networks needs to have great computing power, and therefore you need have dedicated software to manage the network. An example of this software that does this job excellently is the Windows Server. Such programs are
  • 6. complicated to run, and so more costs may arise due to the need to have experts that fix any arising problems. (c) Security Client-server networks are more secure than peer-to-peer networks. The server has a function in it that can grant or reject a user’s access request to the network. This feature is important as it helps keep unwanted users, malware or malicious bots out of the network. However, it is important to note that as the more computers join the client-server network, security management becomes increasingly difficult. (d)Geographical area A peer-to-peer network is suitable when it is being set up in homes or small organizations. But for bigger organizations, such as hospitals, a client-server is ideal due to the need for technical functions in the organization. Depending on the above factors, a client-server network would work best in Health Care HQ. As earlier mentioned, Windows Server is one of the most efficient operating systems that manages client-server networks. It is a platform through which network applications and web services are developed and run on. It is one of the many Microsoft products. The two major operating systems releases are Windows Server 2008 and Windows Server 2012. Both offer the following services: file sharing, print sharing, user administration, application server, Dynamic host configuration protocol [DHCP], domain name system [DNS], and backing up data. Windows Server 2012 has notable improvements from the Windows Server 2008 (which was an earlier release) that greatly enhances its functionality. In terms of file management, the 2012 release has Dropbox’s functionality incorporated into it by means of Work Folders. This is software that gives you a highly functional, secure file replication service. Work Folders can efficiently keep copies of files on the server and other client computers. A client can also easily request and get a file as long a connection with the server
  • 7. is established. Another feature include in Windows Server 2012 is the Dynamic Host Configuration Protocol (DHCP) Server Failover. This feature now allows two DHCP servers to sync information about the same instance. If one server goes down, the other server instantaneously takes over responsibility of managing the clients. Domain Name System Security Extensions (DNSSEC) is another improved feature in Windows Server 2012. It is a suite of additions to Domain Name Systems (DNS) which protects the network traffic from outside attacks. It is able to do this by validating a digital signature to each DNS response, after which the resolver can verify the authenticity of DNS data, even from untrusted DNS server. RECOMMENDATION In conclusion, Windows Server 2012 offers improved performance to deal with high latency and variable network conditions. It is reliable in that it offers new ways to reduce network downtime and at the same time enhancing the network’s performance. The OS is also easily responsive to any change in other networking devices. It has low latency which means that the end-to-end transaction processing that happens in applications is greatly reduced.