1 00:00:00,510 --> 00:00:02,421 When we talk about network resources, we have 2 00:00:02,421 --> 00:00:06,180 to think about how data is being moved around the network. 3 00:00:06,180 --> 00:00:08,700 We break this down into two main models, 4 00:00:08,700 --> 00:00:11,550 the client server model and the peer-to-peer model. 5 00:00:11,550 --> 00:00:14,190 Let's start out talking about the client-server model. 6 00:00:14,190 --> 00:00:16,890 The client-server model is going to use a dedicated server 7 00:00:16,890 --> 00:00:19,830 to provide access to files, scanners, printers, 8 00:00:19,830 --> 00:00:21,840 and other resources on the network. 9 00:00:21,840 --> 00:00:24,390 Now, administration and backup is pretty easy here, 10 00:00:24,390 --> 00:00:26,970 because we have one central machine, this server, 11 00:00:26,970 --> 00:00:28,770 that all the resources are sitting on, 12 00:00:28,770 --> 00:00:30,840 and so we can go ahead and backup that server 13 00:00:30,840 --> 00:00:32,549 and we've backed up all the files. 14 00:00:32,549 --> 00:00:33,630 We can configure that server 15 00:00:33,630 --> 00:00:35,730 and we've configured all the accesses, right? 16 00:00:35,730 --> 00:00:37,710 This makes the client server model one 17 00:00:37,710 --> 00:00:40,206 of the main choices we use in business networks. 18 00:00:40,206 --> 00:00:43,350 Now, when we look at the benefits of a client-server model, 19 00:00:43,350 --> 00:00:45,690 it gives us that centralized administration. 20 00:00:45,690 --> 00:00:47,640 There is one or a few key servers 21 00:00:47,640 --> 00:00:49,680 when we can focus all of our effort there, 22 00:00:49,680 --> 00:00:51,000 that gives us easier management, 23 00:00:51,000 --> 00:00:53,520 again, because it's all in one or two places 24 00:00:53,520 --> 00:00:55,950 because we have those few key servers that we can manage, 25 00:00:55,950 --> 00:00:57,660 and it gives us better scalability, 26 00:00:57,660 --> 00:00:59,940 because I can have all of my stuff in one place, 27 00:00:59,940 --> 00:01:02,715 and if I need to expand, I can actually expand outward using 28 00:01:02,715 --> 00:01:04,800 that through a cloud architecture 29 00:01:04,800 --> 00:01:06,510 or some other additional servers, 30 00:01:06,510 --> 00:01:07,980 and depending on how I need to do that, 31 00:01:07,980 --> 00:01:09,600 and this will allow me to put things in tandem 32 00:01:09,600 --> 00:01:10,890 using load balancing, 33 00:01:10,890 --> 00:01:13,080 and it'll gimme a lot more benefits than try 34 00:01:13,080 --> 00:01:15,540 to run things under the peer-to-peer model. 35 00:01:15,540 --> 00:01:17,990 Now, some of those drawbacks to a client server 36 00:01:17,990 --> 00:01:19,950 is that it costs more money 37 00:01:19,950 --> 00:01:21,930 because it requires dedicated hardware 38 00:01:21,930 --> 00:01:23,940 and dedicated operating system software. 39 00:01:23,940 --> 00:01:25,800 So you might have to have something like Windows on there 40 00:01:25,800 --> 00:01:28,530 or a Unix or Linux build, or something like that. 41 00:01:28,530 --> 00:01:30,630 And this takes a highly-specialized skillset 42 00:01:30,630 --> 00:01:32,130 to run all of these things. 43 00:01:32,130 --> 00:01:34,620 And so it requires these dedicated resources, 44 00:01:34,620 --> 00:01:36,360 whether they're machines or software, 45 00:01:36,360 --> 00:01:37,950 or that operating system, as well 46 00:01:37,950 --> 00:01:39,840 as personnel who know how to use it. 47 00:01:39,840 --> 00:01:41,550 So that's kind of the bad things when we talk 48 00:01:41,550 --> 00:01:43,200 about a client-server model. 49 00:01:43,200 --> 00:01:46,080 With all that said, client-server is still the leading model 50 00:01:46,080 --> 00:01:48,360 that we use in business networks. 51 00:01:48,360 --> 00:01:51,630 Now, let's look at the other side, the peer-to-peer model. 52 00:01:51,630 --> 00:01:54,450 This is where peers or other machines, like laptops 53 00:01:54,450 --> 00:01:57,720 and desktops, can share resources together directly. 54 00:01:57,720 --> 00:01:59,790 The administration and backup is very difficult 55 00:01:59,790 --> 00:02:02,790 because all the files are located on different machines 56 00:02:02,790 --> 00:02:04,140 in different places. 57 00:02:04,140 --> 00:02:06,450 For example, if I wanted to share some PowerPoint slides 58 00:02:06,450 --> 00:02:09,000 with you and you're sharing some Excel files with me, 59 00:02:09,000 --> 00:02:10,820 these files are on both of our machines, 60 00:02:10,820 --> 00:02:12,930 and now we're going to have to back up both machines 61 00:02:12,930 --> 00:02:14,250 and manage both of them, 62 00:02:14,250 --> 00:02:16,380 and this is going to give us two sets of permissions on them 63 00:02:16,380 --> 00:02:18,030 and all that other management. 64 00:02:18,030 --> 00:02:20,070 You see how this redundancy in that work 65 00:02:20,070 --> 00:02:22,590 where we have to do multiple things in multiple places. 66 00:02:22,590 --> 00:02:23,850 Now, if I took that 67 00:02:23,850 --> 00:02:26,085 and I scaled that up to 50 machines, that gets kind 68 00:02:26,085 --> 00:02:27,840 of being a nightmare, right? 69 00:02:27,840 --> 00:02:30,120 Because we're going to have a lot of work there. 70 00:02:30,120 --> 00:02:32,610 That's the big drawback to peer-to-peer. 71 00:02:32,610 --> 00:02:34,740 Now, where is peer-to-peer useful? 72 00:02:34,740 --> 00:02:36,750 Well, if you think back a decade ago, 73 00:02:36,750 --> 00:02:38,790 there was a software out there called Napster, 74 00:02:38,790 --> 00:02:41,490 and this was a peer-to-peer file sharing program. 75 00:02:41,490 --> 00:02:42,750 Now, it happened to be used for a lot 76 00:02:42,750 --> 00:02:45,420 of illegal activity like downloading music without copyright 77 00:02:45,420 --> 00:02:47,580 and those type of things, but the concept behind it 78 00:02:47,580 --> 00:02:49,470 is what we want to focus on here. 79 00:02:49,470 --> 00:02:50,580 Each person who was part 80 00:02:50,580 --> 00:02:52,950 of the network gave and received files. 81 00:02:52,950 --> 00:02:54,607 It was a peer-to-peer sharing network. 82 00:02:54,607 --> 00:02:56,610 Now, the benefits of peer-to-peer 83 00:02:56,610 --> 00:02:58,140 was it was low-cost. 84 00:02:58,140 --> 00:03:00,840 There was no infrastructure, no specialized hardware, 85 00:03:00,840 --> 00:03:02,401 no dedicated hardware, none of that stuff, 86 00:03:02,401 --> 00:03:04,020 because there's just software 87 00:03:04,020 --> 00:03:07,260 and it allowed everyone to talk to each other as they wanted 88 00:03:07,260 --> 00:03:08,094 to and share files. 89 00:03:08,094 --> 00:03:10,650 You could pick a folder your hard drive 90 00:03:10,650 --> 00:03:12,240 and share that out with the world. 91 00:03:12,240 --> 00:03:13,620 This allowed you to create resources 92 00:03:13,620 --> 00:03:15,390 and networks wherever we wanted to. 93 00:03:15,390 --> 00:03:16,713 So this was kind of the thing here 94 00:03:16,713 --> 00:03:19,230 is that there was no specialized operating system, 95 00:03:19,230 --> 00:03:22,069 no dedicated resources, and it was very low to start up. 96 00:03:22,069 --> 00:03:24,210 Now, if I wanted to create a network 97 00:03:24,210 --> 00:03:26,430 and we had five computers, I might just turn one 98 00:03:26,430 --> 00:03:28,950 of them into a file sharing off my local laptop, 99 00:03:28,950 --> 00:03:30,270 and you can all access it. 100 00:03:30,270 --> 00:03:31,290 It would be no problem. 101 00:03:31,290 --> 00:03:33,090 That's the idea of a peer-to-peer. 102 00:03:33,090 --> 00:03:34,770 But there's also some drawbacks 103 00:03:34,770 --> 00:03:38,083 because if my machine is off now, you can't access anything. 104 00:03:38,083 --> 00:03:40,800 Whereas if I had a centralized server, you still could 105 00:03:40,800 --> 00:03:42,840 because that server would be on 24 hours 106 00:03:42,840 --> 00:03:44,850 a day, seven days a week. 107 00:03:44,850 --> 00:03:46,590 Now, what are some of the drawbacks? 108 00:03:46,590 --> 00:03:49,320 Well, the biggest one is decentralized management. 109 00:03:49,320 --> 00:03:51,750 Everyone can own and control their own machine 110 00:03:51,750 --> 00:03:52,950 and decide what they're sharing 111 00:03:52,950 --> 00:03:54,450 and what they're not sharing. 112 00:03:54,450 --> 00:03:56,730 This becomes extremely inefficient when you deal 113 00:03:56,730 --> 00:03:58,920 with large networks or business networks, 114 00:03:58,920 --> 00:04:00,960 and it has horrible scalability. 115 00:04:00,960 --> 00:04:02,550 So if I wanted to run a peer-to-peer network 116 00:04:02,550 --> 00:04:04,560 for an organization the size of Facebook, 117 00:04:04,560 --> 00:04:05,850 it just wouldn't work. 118 00:04:05,850 --> 00:04:06,960 It would be horrible. 119 00:04:06,960 --> 00:04:07,793 You'd have 120 00:04:07,793 --> 00:04:09,120 to have centralized management for stuff. 121 00:04:09,120 --> 00:04:11,700 Otherwise, when things get large, they get lost. 122 00:04:11,700 --> 00:04:13,230 And so in business networks, 123 00:04:13,230 --> 00:04:15,811 we are really going to focus on this client-server model 124 00:04:15,811 --> 00:04:18,173 over peer-to-peer for the exam. 125 00:04:18,173 --> 00:04:20,880 You do want to understand what a client-server model 126 00:04:20,880 --> 00:04:23,910 is and a peer-to-peer model, and really what the benefits 127 00:04:23,910 --> 00:04:25,860 and drawbacks are for each of them. 128 00:04:25,860 --> 00:04:28,560 All the benefits on the client server model are drawbacks 129 00:04:28,560 --> 00:04:30,540 on peer-to-peer, and all the drawbacks 130 00:04:30,540 --> 00:04:31,650 on client-server model 131 00:04:31,650 --> 00:04:33,570 are actually benefits on peer-to-peer. 132 00:04:33,570 --> 00:04:35,370 They're basically opposites of each other. 133 00:04:35,370 --> 00:04:37,870 If you remember that, you'll do great on the exam.