IT Terminology: What Is a Server Based Network?

server-based-network

In the world of computing, network is a common terminology. The network of computing can be based on a server or working peer-to-peer. In this article, we are focusing on ‘what is a server based network?’ As the name suggests, the base for server based network is a server. The server used as the base for this network is often known as central server. In order to access the whole system, users need to send request for permission to this central server. Therefore, a central server on server based network is connected to multiple clients. Other than the access to the whole system, central server also shares data as well.

 

Why sharing data is required on a network? It is important for two reasons. The first reason is to accelerate the processing of information. When the data is shared, users are able to use the data on the processing procedure. The second reason is related to the safety of whole data. Most businesses that relies their operational on data processing often consider the data as important asset. Therefore, by sharing the data, it is not saved in a single location. Therefore, if damage happens on the client computer, the data remains safe. To put it simply, the shared data works as backup on such circumstance.

 

Of course the data shared on server based network is not for any clients. Another security level needs to be implemented so that the shared data of a client cannot be opened by other clients. In this case, the most common security measure is using client account. Users will have their corresponding username and password. After the users log in to their account, they will have clearance on which shared data can be accessed. Therefore, the shared data of a client can only be accessed by a user with authority clearance.

 

What makes server based network different with peer-to-peer network? In such network, central server is not present. The absence of central network is not necessary since users are able to share the same data. The authentication process is not required at this level. Each user is able to access the data shared on the same workgroup. The down side of peer-to-peer network is the absence of record keeping track of which user accessing the shared data. On the other hand, it makes the shared data distributed easier since authentication process does not need to be performed.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>