Free Essay

Client-Based or Client/Serer

In:

Submitted By koreysgirl
Words 770
Pages 4
Client-based or client/serer
Mashelle Scott
IT/240
December 20, 2013
Jennifer Gonzales

Client-based or client/serer After reading the scenario I choose a client/server model. Client/server networks employ one or more centralized servers that house critical information that is shared by everyone. Meaning, that it is comprised of a single central computer acting as a server that directs multiple other computers,(clients). They also provide centralized backup, which can be determined by the business. Also as a business expands a client server enables them to reach a shared database program no matter the distance. If there were to be an issue the company could recover the data and resume operations. With client/server model the servers are sometimes clustered in order to provide failover capability in the event hardware failure which avoids downtime and saves the company money.
In any situation the decision to employ a client-based or client-server network depends on the business in question. If the company is a small business it may do well without a costly server, as long as there is someone appointed to ensure the backups are performed. As with a bigger business it might be more important to utilize a client-server network for the reason stated above. With a larger company it will be more important in order to provide the security and stability that a client/server network gives. For example, through encryption data can be available only to qualified individuals. I was once read that a client/server network and applications are best for businesses for these five reasons, 1. Duplicate information. Duplicate data makes up the majority of data on the Internet. It is no coincidence that we see the same situation happening inside companies. How many copies of the same document are floating around each of your machines as users work on them? Sending files is extremely out of date. Files that reside on a cloud based system, or a client-server system, are accessed, modified and reside in the same location. This means there is only one copy of a single document unless specified, and then it will be a copy that everyone also has access to. 2. Human errors and mistakes. We can see from the issue of duplicates floating around on different machines, how likely it is that human error will cause issues with these files. The final copy of a presentation or invoice sent to a client might not be the final copy. This can result in more than extremely embarrassing situations. Humans make enough errors on their own without giving them more chances to do so. 3. Data safety. Backing up is essential. Making sure everyone is backing up their machine each day, or implementing procedures to do that will be time consuming and cumbersome. With a single server or a cloud-supplied server, you have a single point for backup and supply to your offsite backup service. In cases of total data failure, your disaster recovery storage retrieval and rescue plans will also be simplified. There will be only one place to reload that required data. 4. Data security. Client-server systems require access. Access is defined by the administrator, which means each user will have different levels of access. Your data is centralized, and you can control who has access to it. In traditional peer-to-peer systems, this type of data control is either non-existent, or it is very difficult to manage. 5. Software integration and updating. What happens when a new version of your software is released? Someone has to manually update all of the machines in your company. With a whole range of software applications running on all those machines, you will have conflict issues as some machines are updated before others. With client-server software solutions, the applications reside on the server. The user’s machine accesses the data, either through a very light client application, and more often than not, browser-based access is the norm. In other words, each of your staff only needs a browser on their individual machines to do all their tasks and access all the applications they need. 6. Machine control. Are you tired of staff using applications they shouldn’t be? Do you have to maintain your machines more than you should because they have applications installed, they shouldn’t? We can set our company computers to act like terminals, and in essence, users can only interact with the applications they have available.

Reference
, K. (February 11, 2012). 5 reasons why your business should be using client-server based applications. Retrieved from http://wwwnetchunks.com

Similar Documents

Premium Essay

Srs for Airline Registration

... | |DDB |Distributed Data base | |ER |Entity relationship | 1.3  INTENDED AUDIENCE AND READING SUGGESTIONS This project is the college level project and is implementing under the guidance of college professors. This project is useful to everyone who travels in flights. 1.4  PROJECT SCOPE The purpose of the online system is to create convenient and easy-to-use online system for passengers, trying to buy airline tickets. The system is based on a relational database with its flight management and...

Words: 1563 - Pages: 7

Premium Essay

Global Pharmaceutical Industry

...necessary applications and resources for certain users  Mitigate risks from unmanaged endpoints  Customize experience and access for diverse user groups (partners, suppliers, employees)  Enable provisional workers (contractors, outsourcing)  Enforce consistent security policy  Support myriad of devices (smartphones, laptops, kiosks) …And the Solution Must Achieve Positive ROI  Minimize initial CAPEX costs  Lower ongoing administrative and support OPEX costs 3 www.radiusconsultingghana.com Copyright © 2010 Juniper Networks, Inc. www.juniper.net THE SOLUTION: JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES Mobile User – Cafe  Secure SSL access to remote users from any device or location  Easy access from Web-browsers – no client software to manage  Dynamic, granular access control to manage users and resources SA6500 VoIP Teleworker Business Partner or Customer  Single comprehensive solution to access various application types from various devices available Wireless User Airport Kiosk User 4 www.radiusconsultingghana.com Copyright © 2010 Juniper Networks, Inc. www.juniper.net JUNIPER NETWORKS SSL VPN MARKET LEADERSHIP...

Words: 3503 - Pages: 15

Free Essay

Booking Assesment

...3 Why we used Relational Database 19 11. Suggestions for the Improvements 21 12. Importance of the Database Modeling phase in a Database Development Project 22 12.1 Modeling Steps 22 12.2 Database Deigning Process 22 * Abstract Short Message Technology (SMS) is commonly used among the students modern world as it is a reliable mobile technology. Thus, to simplify the process of assignment booking and to save time SMS technology can be used effectively. In this project, the development of an SMS based assignment booking system is presented. Using the SMS interface, students would be able to send requests for time slots and receive the availability of that slot. Online assignment booking system completely depends on internet connection and also it consumes time. However, GSM coverage required for SMS technology is more reliable as it always exists almost everywhere and also sending SMS with time slot will not consume much time. Thereby, SMS based assignment booking system will overcome the existing...

Words: 6238 - Pages: 25

Premium Essay

Ms 70-640

...Microsoft 70-640 TS: Windows Server 2008 Active Directory, Configuring Version: 30.6 Microsoft 70-640 Exam Topic 1, Exam Set 1 QUESTION NO: 1 You work as the network administrator at ABC.com. The ABC.com network has a domain named ABC.com. All servers on the ABC.com network run Windows Server 2008. Only one Active-Directory integrated zone has been configured in the ABC.com domain. ABC.com has requested that you configure DNS zone to automatically remove DNS records that are outdated. What action should you consider? A. You should consider running the netsh /Reset DNS command from the Command prompt. B. You should consider enabling Scavenging in the DNS zone properties page. C. You should consider reducing the TTL of the SOA record in the DNS zone properties page. D. You should consider disabling updates in the DNS zone properties page. Answer: B Explanation: In the scenario you should enable scavenging through the zone properties because scavenging removes the outdated DNS records from the DNS zone automatically. You should additionally note that patience would be required when enabling scavenging as there are some safety valves built into scavenging which takes long to pop. Reference: http://www.gilham.org/Blog/Lists/Posts/Post.aspx?List=aab85845-88d2-4091-8088a6bbce0a4304&ID=211 QUESTION NO: 2 You work as the network administrator at ABC.com. The ABC.com network has a domain named ABC.com. All servers on the ABC.com network run Windows Server 2008. The ABC.com network...

Words: 34198 - Pages: 137

Free Essay

Abcdefg

...License Administration Guide FlexNet Publisher Licensing Toolkit 11.9 Legal Information Book Name: Part Number: Product Release Date: License Administration Guide FNP-1190-LAG01 July 2010 Copyright Notice Copyright © 2010 Flexera Software, Inc. and/or InstallShield Co. Inc. All Rights Reserved. This product contains proprietary and confidential technology, information and creative works owned by Flexera Software, Inc. and/or InstallShield Co. Inc. and their respective licensors, if any. Any use, copying, publication, distribution, display, modification, or transmission of such technology in whole or in part in any form or by any means without the prior express written permission of Flexera Software, Inc. and/or InstallShield Co. Inc. is strictly prohibited. Except where expressly provided by Flexera Software, Inc. and/or InstallShield Co. Inc. in writing, possession of this technology shall not be construed to confer any license or rights under any Flexera Software, Inc. and/or InstallShield Co. Inc. intellectual property rights, whether by estoppel, implication, or otherwise. All copies of the technology and related information, if allowed by Flexera Software, Inc. and/or InstallShield Co. Inc., must display this notice of copyright and ownership in full. Trademarks Flexera Software, AdminStudio, DemoNow, FlexEnabled, Flexlm, FlexNet, FlexCertified, FlexNet Connect, FlexNet Connector, FlexNet Manager, FlexNet Publisher, Globetrotter, InstallAnywhere, InstallAnywhere...

Words: 52399 - Pages: 210