BASIC CONCEPT
ARCHITECTURE
TOPOLOGY

NETWORK ARCHITECTURE
Network architectures is the way network are designed to communicate.

TYPES OF ARCHITECTURE


peer-to-peer architecture


Client-server architecture


TYPES OF ARCHITECTURE
PEER-TO-PEER ARCHITECTURE
CLIENT-SERVER ARCHITECTURE
DEFINITION
A network model in which all computers can function as clients or servers as needed, and there's no centralized control over network resources.
Network in which one or more computers act as a server, and other computers(clients) on the network request services from the server
ADVANTAGES
  • Less startup cost to setup the network architecture-No need for a server
  • Easy to install and configure for the computers in the network
  • When a peer fails it will not affect other peers so the network is reliable.
  • Centralized-Resources and data security are controlled through the server.
  • Scalability-adding or removing resources in the network can be easily done by configuring the server.
  • Better management of files-All files are stored in the server.
  • Accessibility-Server can be accessed remotely and across multiple platforms including Windows, Linux and Mac OS.
DISADVANTAGES
  • Decentralized-No central repository for files and applications.
  • Less security-does not provide the security available on a client/server network.
  • Every user is taking care his own machine.
  • Expense-Require initial investment in dedicated server.
  • Maintenance-Large networks will require a staff to ensure efficient operation.
  • Dependence-When server goes down, operations will cease across the network

PEER-TO-PEER ARCHITECTURE VS CLIENT-SERVER ARCHITECTURE
CLIENT/SERVER ARCHITECTURE
PEER-TO-PEER ARCHITECTURE
Computer request services from the server
Each individual computers act as both the services provider and the service consumer
Software installation in the server only
Software installation for all computer
Easy to manage the resources in the network(server existence facilitate the distribution of the resources)
Difficult to manage the resources in the network
Higher cabling cost
Less cabling cost
Security control by the server (centralized)
Security control by their own