You are on page 1of 7

Network Architecture

• Network Architecture refers to the layout of the network,


consisting of the hardware , software , connectivity,
communication protocols and media such as wired and wireless.
• Network architecture , is the logical and structural layout of the
network.
• There are following main two types of network architecture. These
two are the common network models that we use in our day-to-
day life.
1. Client Server Architecture
2. Peer to Peer Architecture
Client Server Architecture
Server:
Server is the powerful system that provides centralized administration of the
network, such as printers and files. and serves up the resources that are available
on the network
Client:
The Client is the machine or computer which lets the user access the data or
resources on the remote computer.
 The System Administrator manages the data on the server.
 The client machines and the server are connected through network.
 It allows the client to access data even if the client machine and the server are
far apart from each other.
Client / Server Architecture
• In Client / Server model, the client process on the client machines sends the
request to the server process on the server machine.
• When the server receives the client request, it lookouts for the requested data
and send it back with the reply.
• All the services are provided by centralized server, there may be a chances of
server getting bottlenecked, slowing down the efficiency of the system.

What is Bottleneck ?
Bottleneck is nothing but
the narrow route or a
point of traffic
congestion.
Client / Server Architecture
Note:
 The process of transferring the file from remote computer to local computer is called
downloading.
 The process of transferring the file or data from local computer to remote is called
uploading.
Advantages:
1. Centralized Resources: Server is the center of the network and it can manage resources
that are common to all users.
2. Improved Security: Server provides better security to network users.
3. Scalable Network: It is possible to remove or add clients without affecting the operation
of the network and without the need for major changes.
4. Flexibility: New technology can be easily integrated into the system.
5. Interoperability: All components (Client/Server/Network) work together.
Dis Advantages:
6. Expensive: Requires high initial investment in dedicated server.
7. Maintenance: Large networks will require a staff to ensure efficient operation and
maintenance.
8. Dependence: When server goes down, operations will cease across the network.
Peer to Peer Network
• In peer to peer there is no dedicated servers or hierarchy among the
computers.
• The term “Peer” refers that computers are equally privileged in the network.
• In Peer to Peer, each node either be a client or a server depending on the
whether the node is requesting or providing the services. Here each node is
considered as a Peer.

Note:
All Modern desktop
Operating Systems such as
Macintosh OSX, Linux,
Windows etc can support
peer to peer network.
Key Differences Between Client-Server
and Peer-to-Peer network
• The key differences between Client-Server and Peer-to-Peer network is that
there is a dedicated server and specific clients in the client-server network
model whereas, in peer-to-peer each node can act as both server and client.
• In the client-server model, the server provides services to the client. However,
in peer-to-peer, each peer can provide services and can also request for the
services.
• In the client-server model, data is stored on a centralized server whereas, in
peer-to-peer each peer has its own data.
• In peer-to-peer model, the servers are distributed in a system, so there are
fewer chances of server getting bottlenecked, but in the client-server model,
there is a single server serving the clients, so there are more chances of server
getting bottlenecked.
• The client-server model is more expensive to implement than peer-to-peer.
• The client-server model is more scalable and stable than peer-to-peer.
Conclusion:

It depends on the environment which network


model to implement; each model has its own
strength and flaws.

You might also like