1 00:00:01,220 --> 00:00:07,790 In the last lecture, we had a look at peer to peer network architecture, and we also discussed the 2 00:00:07,790 --> 00:00:14,390 disadvantages of peer to peer architecture, which we will be overcoming in trying to solve our architecture. 3 00:00:15,110 --> 00:00:19,520 Now, let us have a look at client server architecture. 4 00:00:21,310 --> 00:00:28,860 Glines, our networks are pretty much the polar opposite of peer to peer networks because in them a 5 00:00:28,860 --> 00:00:34,770 single server users network operating system for managing the whole network. 6 00:00:35,640 --> 00:00:36,900 So here's how it works. 7 00:00:38,310 --> 00:00:45,510 Client machines request for a resource, goes to the main server, which responds by handling security 8 00:00:45,510 --> 00:00:48,480 and directing the client to the desired resource. 9 00:00:49,290 --> 00:00:55,200 Now this happens instead of the request going directly to the machine with the desired resource. 10 00:00:55,620 --> 00:00:58,110 And it has some serious advantages. 11 00:00:58,710 --> 00:01:04,590 Now, here, the server asks the central governing authority, and that is why there is ease of accessing 12 00:01:04,590 --> 00:01:05,250 the files. 13 00:01:06,580 --> 00:01:14,110 First, because the network is much better organized and doesn't depend on users remembering where needed 14 00:01:14,110 --> 00:01:21,970 resources are, it's a whole lot easier to find the files you need because everything is stored in one 15 00:01:21,970 --> 00:01:24,890 spot on that special server. 16 00:01:25,750 --> 00:01:33,250 And that is why if the server is fully protected, it provides a huge amount of security to the network. 17 00:01:34,590 --> 00:01:41,610 Your security also gets a lot tighter because all usernames and passwords are on that specific server, 18 00:01:41,910 --> 00:01:44,970 which is never, ever used as a workstation. 19 00:01:46,120 --> 00:01:54,340 You even gain scalability, client server networks can have a lot of workstations on them, and surprisingly, 20 00:01:54,490 --> 00:01:59,740 with all those demands, the networks performance is actually optimized. 21 00:02:00,870 --> 00:02:05,100 And therefore, less memory is needed to store the passwords. 22 00:02:05,790 --> 00:02:12,150 So instead of saving the 50 usernames and passwords in all the 50 machines, we can store that only 23 00:02:12,150 --> 00:02:13,010 on the servers. 24 00:02:13,290 --> 00:02:18,960 And that is why most of the I.T. professionals are more concerned about the servers rather than their 25 00:02:18,960 --> 00:02:26,520 hosts, because in today's services, model and business applications rely completely on client server 26 00:02:26,520 --> 00:02:30,960 architecture to give the ease of information access to the customers. 27 00:02:32,070 --> 00:02:38,730 I hope you understand the difference between the peer to peer network architecture and client network 28 00:02:38,730 --> 00:02:39,500 architecture. 29 00:02:40,480 --> 00:02:46,990 I would like to end this lecture by giving you a simple analogy, for example, if you consider you 30 00:02:46,990 --> 00:02:52,750 have a group of four friends and if you want to have access, if you want to see the assignment of your 31 00:02:53,020 --> 00:02:56,890 peer group, you can just ask him and he will give you his assignment. 32 00:02:57,250 --> 00:03:01,170 That is no one who can say no or there is no one to keep a watch on you. 33 00:03:01,630 --> 00:03:08,590 But if you have a group of four friends and teacher is there in the classroom, you can just you just 34 00:03:08,590 --> 00:03:12,850 have to take the permission of the class teacher in order to do anything. 35 00:03:13,630 --> 00:03:19,480 Now, this is the major difference between peer to peer networks and climbs of a network, but a central 36 00:03:19,480 --> 00:03:26,170 governing authority is there to which keeps all the security measures on track. 37 00:03:27,210 --> 00:03:34,530 So if you have any doubts, please feel free to ask the question and answer Butel reply you as fast 38 00:03:34,530 --> 00:03:35,170 as you can. 39 00:03:35,490 --> 00:03:40,200 And again, do not forget to please write a rating on review for a cause. 40 00:03:40,680 --> 00:03:46,080 It really means a lot that you are enjoying this cause I will see you in the next lecture.