The total points in the organization LAN
The computer on your network, called the workstation (Workstation), a computer, providing their resources - server computer with access to shared resources - the customer.
Several computers located in the same room or functionally doing the same job: accounting and planning records, registration of incoming goods, etc., connect to each other and unite in a working group so that they can share different resources: programs, documents , Printers, fax, etc.
The working group is organized so that members of its computers contain all the necessary resources for proper operation. Typically, a working group of more than 10 - 15 computers, include a dedicated server - a powerful computer that are all shared directories and special software to control access to the entire network or its parts.
Team servers unites in the domains. A domain user can log into the network at any workstation in the domain and gain access to all of its resources. Typically, the server networks all shared printers connected to the print server.
In terms of the coordination of computers, network shared by odnorangovye (Peer-to-Peer Network) and Dedicated Server (Dedicated Server Network). In the peer network, each computer performs equal role. However, the increase in the number of computers on the network and the growth of peresylaemyh data has resulted in the network bandwidth becomes narrow mestom.3
Widespread operating system is Windows 95 (98), developed by Microsoft, designed primarily to work in peer networks to support the computer as a client of other networks.
Windows 95, like Windows for Workgroups, may act as a server on the network. Ensure compatibility with older Networking MS-DOS and Windows Z.h. The new operating system allows you to:
• to share hard drives, printers, fax boards, organize odnorangovye local area network (LAN);
• use the remote access and office computer in turn caused the server;
• to support 16-bit network driver DOS.
Your network administrator can specify the overall design of a desktop system, to determine which operations will be accessible to users, and monitor the configuration of desktop system.
The network, based on a relatively small area, called the local (LAN - Local Area Network). In recent years there has been a complex structure of the LAN through the creation of heterogeneous networks of different computer platforms. The possibility of video conferencing and multimedia use increases the requirements for software networks. Modern servers can store binary large object (BLOB), containing text, graphics, audio and video files. In particular, if you need to get on the network database of Staff, the technology will allow BLOB refer not only to personal data: name, last name, date of birth, but also portraits in digital form.
Two technologies server
There are two technologies use the server: technology file server and client-server architecture. The first model uses a file server that stores the majority of programs and data. At the request of the user sent him the necessary programs and data. Information processing is done on the workstation.
In a system with client-server data exchange takes place between a client (front-end) and a server (back-end). Data storage and processing is done on a powerful server, who also serves as controlling access to resources and data. Working station receives only the results of the query. The developers of applications to process information normally use this technology.
Using large and complex applications has led to the development of multi-layer, especially the three architecture in the deployment of data on a separate server database (DB). All access to the database go through an application server, where they are combined. Reducing the number of hits to the database reduces licenses for database management system.
Статьи по теме:
Developing databases, Inside ViewBacking up data. Should I pay?The situation for the computerZao «Light Kommunikeyshn» confirm its status «Microsot Gold Certified Partner» In 2008Lock down the personal information on your computerLASER (LED) Plotters Industrial and engineering processes Client accounting, Accounting orders - the most popular SoftwareProductivity billing systemLinux: Gentoo Vs Ubuntu FunctionalityDownload MozillaDevelopment of Software Development ProjectsAdvantages of Mobile CommerceEnabling Windows XPMore Software to create an electronic catalog SzagsThe choice of antivirus software for home computerWAYS OF COMPUTER CRIMESThe program 1S Accounting Enterprise 8Greedy cabinet creators Spyware is testing! What your child is doing online?Robot Tartalo knocking at your doorBus EISA Computer data as an object of criminal assaultComputer virusThe company Janet Systems Llc Presented Soa-Platform Ijanet Framework Ultra The exhibition «Kitel 2008»Mobile Trade Optimum - Office Business RepresentativesComputer technology and GenealogyABOUT personal characteristics COMPUTER CRIMINALSCOMPUTER CRIME PREVENTIONWhat is the codec and where they can be downloaded Inkjet Plotters (SP, INK-JET PLOTTER)More Software invites you to Docflow 2008!Windows Media PlayerVersion Mobile Forex 2.15: A new approach to reliability and convenienceDevelopment of Iron Industry Or Who Wanted Now Multi ProcessorsTheft of computer dataData protection. Luxury or means of survival?UAB «Business Technology» Conducted Integrated Automation Ltd. Insurance Company «Amkopolis»Black Banner - or the threat of new technologies? Enabling Windows VistaWhat file compression better?Classification LAN (LCS)Systemic and local bus Working in Windows VistaRepair & servicing Windows registryTips software and programs connected branch AccessSpyware battle; Use of firewall protectionProxy Server - This effective way of protecting information as well as a barrier to attack, hackers The possibility of CompactPCI have more than 8 slotsPreventive methods that reduce fatigue while working for a computerThe destruction of computer dataHISTORY OF BUILDERSDocument for LinuxUsing Protection Agency to maintain the security Professional