Visitors to VTC.com will be able to view all introductory videos for each training course.
Free Trial Members will gain access to first three chapters for each training course.
Full Access Members have full access to VTC.com�s entire library of video tutorials.
Let's take a look at some of the different devices that you might run into when examining different network models. We will start out with the peer. A peer is an in user's computer that usually functions as a server and a workstation. A peer is usually managed by the user that sits at it. So they maintain all around security and all around network resources. A client is different from a peer in that the client will relay on the server for most of its administrative functions and the server will provide the client with network resources as well. A terminal and a host go hand in hand. A terminal is what we considerate dumb device. You may have heard them call green screens or dump terminals and that's because they relay on the host for all of their processing and resource access. So the terminal is usually going to consist of just a monitor, a keyboard and there might be yet, some of them have a mouse as well. So let's take a look at how these network devices are going to work in their appropriate network models. We will start out with the peer to peer network model. In a peer to peer environment there really are no servers. Each individual computer serves as its own server sharing out whatever resources that user deems necessary. Now this can be great for a small environment because there is no complexity as far as server administration and network administration. We just let our users kind of run wild and do the things that they need necessary. At the same time this brings out a problem. The larger your network gets the more obsolete a peer to peer network becomes. Especially if you are a network administrator you really don't want to be running around in a peer to peer environment trying to individually manage each and every user's computer. Another problem that we face in a peer to peer environment is security. Each user will be responsible for managing his or her own security. A one user might know more than another user about security and that can create a problem. So let us look at a method of solving this with the different network models. The client-server network model is probably the most common network model you will see implemented today. Most of the time you will have a separate administration team for your network or your servers and when you have your clients they will only have access towards the network administrator or server administrator deems necessary. A server will usually have more expensive or higher in hardware and will probably have a server operating system as well. Now servers will provide access to different network resources .Network resources can include printers, hard drive space almost anything that a user might need to access that they can do so from their local machine. We can see here that the client will relay heavily on the server's guidance and administration. And our next network model called host to terminal which generally have a very expensive host. Now a lot of people like to call these servers and you cannot go either way with it though we hear that from host, we usually know we have a very powerful computer on our hands. So we have our terminals connected to that and the terminals will relay heavily on the host for all of their computing needs. So if I was the user at the terminal anything that I did would be transmitted to the host and processed and then returned back over to the terminals. And this offers a benefit over the client-server because if we figure a computer's life cycle it is about two years. We will have to upgrade one big host every two years. On the other side with the client-server network we might have to upgrade both the clients and the server. So both the host-terminal and the client-server networks are great. Most likely when you see a network environment it will have a great mixture of the several different types of models. We call this the hybrid model. And we can see in this environment we have our host to terminal, our clients and servers and even our peers sharing out their own individual resources. So this should give you a pretty good idea about our different network models. Next we will talk about physical topologies.
Course: | CompTIA Network+ Certification (2005 Objectives) |
Author: | Brad Causey |
SKU: | 33608 |
ISBN: | 1-932808-53-1 |
Release Date: | 2005-03-22 |
Duration: | 7 hrs / 97 lessons |
Captions: | No |
Compatibility: |
Vista/XP/2000, OS X, Linux QuickTime 7, Flash 8 |