Vous êtes sur la page 1sur 15

Peer-to Peer vs.

Client-Server
Network

Does not require a server as each computer on the
network can provide serves to each other computer.
No centralised management of data \ applications
meaning that each computer stores its own data.
Network is usually much slower and less secure than a
client-server setup.
How to decide which one?
Size of network:
A peer-to-peer network relies upon the power and
bandwidth of each computer on the network and can
be cumbersome e of large networks. A client server
relies on the server and is more suitable for larger
network installations.

Money available;
a client server networks initially cost more as
increased hardware (switches\ servers) needs to be
purchased. Maintenance of a client server network is
also more complex and requires a network specialist
increasing staffing costs.

LAN vs. VLAN
A LAN is a physical, local area network defined by
cables, and networking hardware.

A VLAN is a virtual LAN defined by software
parameters programmed into the networking
hardware.

Transmission Media
The physical connections between network devices.

What should you consider when selecting the right one:
Cost
Speed
Security
Reliability

Why are Standards Important?
Interoperability:
The ability for a network to interact with all computers on
the network through the use of consistent standards. For
example; through the use of standard protocols like the
OSI model.

Software\ Hardware Compatibility:
It is vital that all hardware and software components
conform to open standards to ensure interoperability. For
example; Making sure that devices on the same network
can be connect by wired and wireless hardware.

Packet Switching
A mode of data transmission in which a message is
broken into a number of parts that are sent
independently, over whatever route is optimum for each
packet and reassembled at the destination.


Advantages of Packet Switching
It makes very efficient use of the network which means
that there are no tied-up lines limiting
communication.

It can easily get around broken bits of the network. If
parts of the network structure are damaged or
destroyed the packets are rerouted around the
problem.

Wireless Networking Technology
Hardware required:

Receivers\ Transmitters\ Router

Software required:

Operating System\ Browser\ Encryption software

Network Security
Authentication: The process of identifying an individual,
usually based on a username and password. This data is used to
then restrict what that user has access to in the network.

Firewall: a part of a computer system or network that is
designed to block unauthorized access while permitting outward
communication. This could be a software program or hardware
device.

Filtering: controlling access to a network by analyzing the
incoming and outgoing packets and letting them pass or halting
them based on the IP address of the source and destination.

Encryption: The translation of data into a secret code. To read
an encrypted file, you must have access to a secret key or
password that enables you to decrypt it.

Extranet vs. VPN
An extranet is an intranet that can be partially
accessed by authorized outside users, enabling
businesses to exchange information over the Internet
securely.

An extranet allows external access to an intranet site
from a remote location (an internal company website).
A VPN is a technology that can be used for setting up
secure networks between communicating computers.

VPN Technologies
Tunnelling Protocols:
A protocol that allows for the secure movement of data from one
network to another. Tunneling involves allowing private network
communications to be sent across a public network, such as the
Internet, through a process called encapsulation. The
encapsulation process allows for data packets to appear as though
they are of a public nature to a public network when they are
actually private data packets, allowing them to pass through
unnoticed.

VPN Gateways:
A VPN gateway (VPN router) is a connection point that connects
two LANs that a non-secure network such as the Internet connects.
Therefore, a VPN gateway connects to either a single VPN gateway
or to multiple VPN gateways to extend the LAN.
Advantages of a VPN
Security:
VPNs offer a much higher level of secure communication when
compared to other remote methods of communication due to the
advanced technologies that are used to protect the network from
unauthorized access.

Cost:
Costs are significantly lower than other types of configurations
VPNs provide reduced operational costs and lower connection
costs for remote users.

Scalability:
VPNs are flexible in terms of growing with the company and
adding new users to the network. It allows for increased growth
without having to add new components to accommodate the
growth.

Disadvantages of a VPN
Reliability;
The VPN is reliant on the internet and the Internet Service
Provider (ISP). ISP down-time will mean that the VPN will not
work so selecting the correct ISP is vital.

Security;
VPNs are susceptible to security breaches. Using and unsecured
computer to access the VPN can compromise the network if the
computer has a virus once the user has authenticated his access
request and successfully logged on to the servers.

Complex;
VPNs are not particularly easy for a business to create or deploy.
The technology requires a high-level understanding of network
and security issues, as well as careful planning and configuration.

VPN Security Risks
Hacking attacks:
VPN hijacking: Unauthorised take-over of an established VPN
connection by impersonating that client.
Man in the middle attack: This attack involves the interference
(insertion, deletion, modifying, etc.) of messages between the
communicating parties

Viruses| Malware:
The server side of a VPN can be attacked by a virus if the attacker can get
past the user credentials. This attack compromises the security of all users
on the network.

Insecure storage of credentials:
Many VPN client programs store the authentication credentials, the user
name and passwords in the program itself. This means that an attacker
with access to the user's system can potentially obtain the user's
passwords and user name.

Vous aimerez peut-être aussi