Professional Documents
Culture Documents
Networking
Networking
Peer-to-Peer Networks
• Peer-to-peer network is also called workgroup
• No hierarchy among computers all are equal
• No administrator responsible for the network
Peer-to-peer
8
Peer-to-peer network architecture
• Advantages of peer-to-peer networks:
• Low cost
• Simple to configure
• User has full accessibility of the computer
• Disadvantages of peer-to-peer networks:
• May have duplication in resources
• Difficult to uphold security policy
• Where peer-to-peer network is appropriate:
• 10 or less users
• No specialized services required
• Security is not an issue
• Only limited growth in the foreseeable future
9
Clients and Servers
• Network Clients (Workstation)
• Computers that request network resources or services
• Network Servers
• Computers that manage and provide network resources and
services to clients
• Usually have more processing power, memory and hard
disk space than clients
• Run Network Operating System that can manage not
only data, but also users, groups, security, and
applications on the network
10
Client/Server cont..
• Advantages of client/server networks
• Facilitate resource sharing – centrally administrate and
control
• Facilitate system backup and improve fault tolerance
• Enhance security – only administrator can have access to
Server
• Support more users – difficult to achieve with peer-to-peer
networks
Ring Mesh
Computer viruses
• A computer virus is a program that tries to alter
the behavior of the computer without the user's
permission.
• The virus might attempt to overwrite data, change
the way another program operates, or damage the
system by altering key operating system files.
Symptoms of Computer Viruses
• Runs consistently slower than normal
• Stops responding or locks up often
• Crashes and restarts every few minutes
• Restarts on its own and then fails to run normally
• Applications don't work properly
• Disks or disk drives are inaccessible
• Printing doesn't work correctly
• You see unusual error messages
• You see distorted menus and dialog boxes
How to Protect your computer against viruses
• Protect your computer current with the latest
updates.
• Use an Internet firewall
• Subscribe to industry standard antivirus software
and keep it current(updated).
• Never open an e-mail attachment from someone
you don't know.
• If you use Microsoft Office applications, it's a
good idea to keep them updated too.
Virus
• Program that is designed to replicate itself and
spread from file to file, usually attaching itself to
applications.
• When this application is run, it can infect other
files on a user's disk.
• Human interaction is necessary for a virus to
spread to another user's files.
– Downloading files
– Trading diskettes with others
– Copying files to/from file servers
– Sending e-mail attachments
Worm
• Infects Computers, but it is spread to other
computers on a network automatically and without
the action of humans.
• A worm doesn't alter or delete files but instead
they reside in memory, eat up system resources,
and slow down your computer.
• To protect against a worm, networked users must
keep up with operating system patches and
updates and be aware of any suspicious traffic.
Trojan Horse
• Program that initially appears useful or benign and
fools a user into running it. But while it runs, it
could be allowing "back door" access to your
computer by hackers or destroying files on your
hard disk.
• For protection against a Trojan Horse, users must
be suspicious of any unknown program and be
sure it is safe before running it.