Free Essay

Difference Between Servers and Workstations

In:

Submitted By Ber2635
Words 276
Pages 2
In this paper I am supposed to describe the differences between a server, and a workstation. I will provide a few comparisons that will be able to show you these differences. While looking into these comparisons, I have realized there are not too many similarities of the two. So the following is the information that I have found while looking the information up about servers, and workstations.

Let’s start with the definition of the two. The server is a type of application and/or device that will provide a service for the connected clients as part of the client server architecture. A server is designed particularly for networking. While, a workstation is a computer that is being used to power applications such as graphic art, video editing, or other CPU/RAM software. These are two completely different definitions.

Moving onto the functions and operating systems of these two categories the only similarity you will see in both is Linux. Besides that they are different. The server has the functions of Internet, Office, Education, and Home networks. The workstation has functions of, business, Design, Engineering, and Multi-Media Production. With the Operating systems the server side has Free BSD, Solaris, Linux, and Windows server. On the other side with the Workstation it is Unix, Linux, and Windows workstation.

Looking at the information provided, does show that there are definite differences between the two. They should not be comparable on to many levels at all. Out of everything provided there was only one similarity. That leaves me with, after looking at the information, that both are devices that are needed, but not comparable in any real way.

Similar Documents

Free Essay

Peer-to-Peer vs Client Server Network

...What's the difference between client/server and peer-to-peer networks? There’s quite a bit, although most of the differences are in two areas – security and cost. Beyond that, your consideration for what you need is largely dependent on budget and the size of your organization. So, what’s the difference? A peer-to-peer network has no central server. Every workstation on the network shares files equally with everyone else on the network. This also means there is no authentication of users and no central storage. This model is considered a decentralized form of networking. Conversely, the client/server network provides a central pool of data and resources, with user profiles established with localized restriction on which data can be accessed. This model is commonly referred to as a centralized form of networking. Both are good! There’s an old saying, ‘wisdom is what works’. Well, the same is true for your network. Peer-to-peer networks are great for use in homes or in small businesses where employees interact regularly and share all information and files. They don’t cost much to setup, nor are they difficult to manage. The downside is there’s almost no security (pretty much controlled at an individual ‘share’ level). Once you get more than 8-10 workstations connected, there would likely be an impact to performance and management since each station functions as both client and server at the same time. As each employee manages the sharing of their workstation...

Words: 452 - Pages: 2

Premium Essay

Exemptions

...Local Area Networks – The Basics Chapter 7 Learning Objectives After reading this chapter, you should be able to: • • • • • • • • State the definition of a local area network List the primary function, activities, and application areas of a local area network Cite the advantages and disadvantages of local area networks Identify the physical and logical local area networks Cite the characteristics of wireless local area networks and their medium access control protocols Specify the different medium access control techniques Recognize the different IEEE 802 frame formats Describe the common local area network systems Chapter Outline 1. Introduction 2. Primary Function of Local Area Networks 3. Advantages and Disadvantages of Local Area Networks 4. The First Local Area Network – The Bus/Tree 5. Star-Wired Bus LANs 6. Medium Access Control Protocols a. Contention-based protocols 7. Bridges a. Transparent bridge 8. Switches a. Virtual LANs b. Isolating traffic patterns and providing multiple access c. Full-duplex switches 9. Popular Local Area Networks a. Wired Ethernet b. Wireless Ethernet 10. IEEE 802 a. IEEE 802.3 and 802.5 frame formats 11. LANs In Action: A Small Office Solution 12. LANs In Action: A Home Office Solution 13. Summary Lecture Notes Introduction A local area network (LAN) is a communication network that interconnects a variety of data communicating devices within a small geographic area and broadcasts data at high data transfer rates with very...

Words: 4358 - Pages: 18

Premium Essay

Virtual Network Design

...controllers into a virtualized environment. The company expects this system to reduce network traffic and improve throughput between virtual servers and desktop clients. The current environment of Western Dynamics has physical machines for the Dynamic Host Control Protocol (DHCP), Domain Name Services (DNS), and Active Directory. They have recently purchased a new Quad Core computer with two Network Interface Cards (NIC) and 8 GB of RAM. This hardware should be capable of meeting the requirements necessary to run all three servers in one box. This is how the network currently looks, and how the proposed network will look like. Current network Router Router AD Server AD Server DNS Server DNS Server DHCP Server DHCP Server Switch Switch Printer Printer Printer Printer Switch Switch Switch Switch Group of 100 workstations Group of 100 workstations Group of 75 workstations Group of 75 workstations Virtualized Virtualized Proposed network Router Router DHCP DNS AD Server DHCP DNS AD Server Switch Switch Printer Printer Printer Printer Switch Switch Switch Switch Group of 100 workstations Group of 100 workstations Group of 75 workstations Group of 75 workstations DHCP 10.0.1.2 DHCP RANGES: 10.0.75.1-10.0.75.126 10.0.100.0-10.0.100.126 DNS 10.0.1.3 AD 10.0.1.4 OS: Windows Server 2008 10.0.1.1 DHCP 10.0.1.2 DHCP RANGES: 10.0.75.1-10.0.75.126...

Words: 1703 - Pages: 7

Free Essay

The Benefits of Twisted Pair Cable

...client computers I would like for you to consider moving towards the client server network modelOnce a peer-to-peer network grows beyond 10 computers, it will likely begin to suffer from performance and from administrative problems (Posey, 2000) In the client server network model network hosts have specific roles which are assigned to them. There are certain host that are assigned as servers, which will provide network resources to the workstations. Unlike the current peer to peer model that is supported in your organization today in which everyone workstation has the same or similar operating systems. There are several benefits for your organization to consider to transitioning to client server network model. One of the major benefits of the client server network model is scalability. Since we know the potential for this organization to double in size over the next two years scalability is a key factor. It’s very easy to expand the size of your network with client server model because it will be easy to just add on workstation. Everything is centralized to the server. This server will be the centralized platform for all the workstations. Another major benefit of this client server model is increased security. This server will provide security that Ocper, Inc. current peer to peer model lacks. This server is responsible for the security surrounding the shared resource. In the client server environment you can set the appropriate permissions on the database based on...

Words: 719 - Pages: 3

Premium Essay

Assess the Impact on Access Controls for a Regulatory Case Study Learning Objectives and Outcomes

...Week 1 Lab Part 1: Assess the Impact on Access Controls for a Regulatory Case Study Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: 1. Configure user accounts and access controls in a Windows Server according to role-based access implementation 2. Configure user account credentials as defined policy, and access right permissions for each user 3. Create and administer Group Policy Objects for the management of Windows Active Directory Domain machines within the IT infrastructure 4. Apply the correct Group Policy Object definitions per requirements defined by policies and access right permissions for users 5. Assign and manage access privileges as requested in the case study to apply the recommended and required security controls for the user accounts Week 1 Lab Part 1 - Assessment Worksheet Assess the Impact on Access Controls for a Regulatory Case Study Overview Watch the Demo Lab in the Week 1 Learning Space Unit 1, and answer the questions below. The lab demonstrates creating an Active Directory domain as well as user and group objects within the new domain. Directories will be created and permissions assigned based on the required access control as defined in the matrix. Group Policy Objects will also be created and linked to Objects within the domain to enforce security settings. Lab Assessment Questions & Answers 1. What does DACL stand for and what...

Words: 1428 - Pages: 6

Premium Essay

Eglish

...important for IT students to know the foundations of computer networks because it’s a key to understand the concepts of what this career consist of. Today, computer networks are part of everyday lives and it is a skill to obtain to succeed the field. 2. What is the difference between a computer and a workstation? Computers perform three simple tasks: input, process, and output while a workstation is a connected computer/s and has an IP address. 3. What is the main purpose of a CPU and a NIC? The central processing unit (CPU) main function is to execute instructions from computer programs. The network interface card (NIC) is an additional card plugged into a motherboard slot which provides a connection between the computer and the network. 4. What is the difference between RAM AND ROM? Storage types, short-term storage (RAM) and the permanent, long term, (ROM). 5. How is data stored? Characters, bits or bytes? It is stored in bits (1, 0). 6. What is the main purpose of a bus in computers? The main purpose of the bus in computers is to carry data from one place to another on the computer. In a computer, there are buses between the CPU, RAM, disk drives, and expansion slots. The bus connecting expansion slots to the motherboard connect a network interface card (NIC) into one of these slots, the faster and busier your computer is, the faster its bus type needs to be. 7. Why are protocols...

Words: 753 - Pages: 4

Premium Essay

Unix vs Windows Critique

...of UNIX® or Linux® Versus Microsoft® Windows Server® Virtual Company: Riordan Kenneth Fleming, Eddy Garcia, H. RaShonda Harris, Lupita Sebastian and John Ward University of Phoenix – POS 420 Introduction to UNIX September 19, 2012 Introduction History Riordan Manufacturing is a global plastics manufacturer who employs over 500 people with projected annual earnings of $46 million. Riordan's major clientele include automotive parts manufacturers, aircraft manufacturers, the Department of Defense, beverage makers and bottlers, and appliance manufacturers (Apollo Group, Inc., 2005). With manufacturing plants in Albany, Georgia, Pontiac, Michigan, and Hangzhou, China, Riordan’s e-business plays a vital role in continued growth. Riordan’s Internet site states, “Riordan Manufacturing, Inc. is an industry leader in the field of plastic injection molding. Purpose The purpose of this paper is to discuss the differences between UNIX/Linux versus Microsoft Windows. Our paper will discuss facts that cover security, administrative, networking, performance, programmability. Security Technical One of the key differences between the Unix approach to system security and the MS Windows approach is that significant security characteristics of Unix systems are a consequence of good architectural design. Modularity within the system is another example of architectural security in UNIX, but lacking in MS Windows. These differences in the design and relative security of Unix...

Words: 2022 - Pages: 9

Premium Essay

It Infrastructure.

...One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.1. What are the differences between ZeNmap GUI (Nmap) and Nessus?ZeNmap is used to map a network and Nessus is used to Test a network for vulnerabilities.2. Which scanning application is better for performing a network discovery reconnaissance probing of an IP network infrastructure? Nmaps sole purpose is just that, network probing and recon.3. Which scanning application is better for performing a software vulnerability assessment with suggested remediation steps? Nessus would be a better tool for this operation. While you can find network vulnerabilities with Nmap, it is not used as such.4. How many total scripts (i.e., test scans) does the Intense Scan using ZenMap GUI perform?Port Scanning, OS detection, Version detection, Network Distance, TCP sequence prediction, Trace...

Words: 310 - Pages: 2

Free Essay

Data

...with very low error rates. 2. List the primary activities and application areas of local area network. b. File server, print server, connections to other networks. 3. List the advantages and disadvantages of local area networks. c. The advantages are sharing of files and devices, and intercommunication. d. The disadvantages are maintenance, complexity, and costs. 4. What are the basic layouts of local area networks? List two advantages that each layout has over the others. e. Buses advantages are the use of low-noise coaxial cable, and inexpensive taps. f. Star-wired buses are simple to interconnect, have easy to add components, and are most popular. g. Star-wired rings are simple to interconnect and have easy to add components. 5. What is meant by a passive device? h. A signal that enters is neither amplified nor regenerated. The signal is simply passed on. 6. What is meant by a bidirectional signal? i. A signal that propagates in either direction on a medium. 7. What are the primary differences between baseband technology and broadband technology? j. Baseband is a digital signal, where broadband is analog and can carry many signals. 8. What purpose does a hub serve? k. The hub is a collection point for workstations. 9. What is the difference between a physical design and a logical design? l. Physical is the wiring and components. Logical is how the software passes...

Words: 806 - Pages: 4

Free Essay

Certified Ethical Hacking

...of the incident response team who had been assigned an incident response in the form of a help desk trouble ticket. You followed the phases of a security incident response to investigate the event, contain the malware, eradicate the suspicious files, re-test the system in readiness for returning it to service, and complete a detailed security incident response report in the provided template. You used AVG Anti-Virus Business Edition to scan the infected workstation and documented your findings as you proceeded. Lab Assessment Questions & Answers 1. When you are notified that a user's workstation or system is acting strangely and log files indicate system compromise, what is the first thing you should do to the workstation or system and why? Have the user of the machine cease all activity and contain the infected machine by disconnecting from the network (unplug Ethernet cable or disable wireless), leaving it isolated but not powered off. It should be left in its steady state. This isolates the contaminated workstation from the organization’s network and Internet, as well as preventing the contamination from spreading. Logs, memory forensics, footprints, and other malicious activity must be kept in its steady state untouched until you arrive on scene. 2. When an antivirus program identifies a virus and quarantines this file, has the malware been eradicated? No. The file is identified containing malware or a virus and moved to a non-standard location and folder, the...

Words: 1206 - Pages: 5

Free Essay

Is404 Week 1 Lab

...Week 1 Lab Part 1 - Assessment Worksheet Assess the Impact on Access Controls for a Regulatory Case Study Overview Watch the Demo Lab in the Week 1 Learning Space Unit 1, and answer the questions below. The lab demonstrates creating an Active Directory domain as well as user and group objects within the new domain. Directories will be created and permissions assigned based on the required access control as defined in the matrix. Group Policy Objects will also be created and linked to Objects within the domain to enforce security settings. Lab Assessment Questions & Answers 1. What does DACL stand for and what does it mean? Discretionary access control List (DACL) is a type of access control defined by the Trusted Computer System Evaluation Criteria "as a means of restricting access to objects based on the identity of subjects and/or groups to which they belong 2. Why would you add permissions to a group instead of the individual? It is more resourceful and less time consuming. 3. List at least 3 different types of access control permissions available in Windows. Full Control, Modify, Execute, Read, Write 4. What are the least permissions that you need in order to view the contents of a folder? Read, so the user has access to any file on the system that they are entitled to, but they are not able to make any changes. 5. What are other available Password Policy options that could be enforce to improve security? ...

Words: 1093 - Pages: 5

Free Essay

Week 4 Best Answer

...Best Answer What is the key difference between groups and Organizational Units (OUs)? a. Because groups are independent from domain structure, its members may be located anywhere in the domain or outside the domain. b. You cannot apply Group Policy settings directly to group objects. c. OUs are containers, whereas groups are not containers. d. There is essentially no difference between OUs and groups. 2. An Active Directory functional level must be low enough to ensure interoperability between domain controllers running different versions of Windows Server. How does the functional level affect the AD forest? a. Higher functional level means more efficient AD communication. b. Higher functional level means few Global Catalog errors. c. Lower functional level means fewer features available. d. Lower functional level means time to upgrade the lowest servers. 3. What is the primary reason for creating different sites on an Active Directory network? a. To create geographical divisions within the Active Directory b. To provide another boundary when applying Group Policy settings (along with domains and OUs) c. To provide a layer of access control between objects in differing sites d. To control the amount of traffic passing over the relatively slow and expensive WAN links between locations 4. What is the simplest way for administrators to upgrade their Active Directory Domain Services (AD DS) infrastructure to Windows Server 2012? a. Upgrade all existing...

Words: 1019 - Pages: 5

Premium Essay

Lab 6 Assessment Worksheet

...1. What is the difference between Roles and Features in Windows Server 2008? A server role is a set of software programs that lets a computer perform a specific function for multiple users or other computers within a network. Features are software programs that can support or increase the functionality of one or more roles, or improve the functionality of the server, regardless of which roles are installed. 2. What is installed when you choose the Windows Server Backup Feature? Windows Server Backup Microsoft Management Console (MMC) snap-in 3. How often should servers be backed up? It is recommended to do them frequently. About every 90 days should be fine. 4. What are the different types of backup that are performed in servers? Copy Backup, Daily Backup, Differential Backup, Incremental Backup, Normal Backup 5. What are the primary purposes of backing up a server? Recover information after it is lost. 6. Besides performing and scheduling changes, what else can you do in the Windows XP Backup and Restore program? How can these applications be used as part of the Business Continutity and Disaster Recovery Plan? In the Backup you can backup everything on the computer, selected files, drives, or network data, only backup the System State data. In the Restore you can only restore from a backup file. 7. Can you restore a server’s operating system image using the restore application? Yes, by using Windows Recovery Environment and a backup...

Words: 387 - Pages: 2

Free Essay

Linux and Windows Server Critique

...Linux and Windows Server Critique Team C POS 420 June 25, 2012 Yevgeniy Tovshteyn Linux vs. Windows Both Linux and Windows are operating systems with advantages and differences in functionality and user friendliness. With networking becoming an important part of company operation in this day and age. Kudler will come to depend on networking for availability to the marketplace via the Internet, while requiring their internal systems for email, Voice over Internet Protocol (VoIP) phone systems, and using business data. Linux and Windows are the only 2 operating systems that have grown to the top level in the field of networking. Learning Team C examines these types of strengths and weaknesses regarding security, administration, performance, and programming. Kudler Fine Foods Current Systems: 3 locations: La Jolla, Del Mar, and Encinitas La Jolla Novell 4.11 Server for POS 4 POS Workstations with Pentium II, Windows 9X 1 Standalone UPS (Uninterruptable Power Supply) 1 Server with Inventory Spreadsheet with Pentium II, 64mg Ram, Windows 9X, external CD burner and bubble jet printer. 1 Server with NT Server 1 56K modem Del Mar Novell 4.11 Server for POS 4 POS Workstations with Pentium II, Windows 9X 1 Standalone UPS (Uninterruptable Power Supply) 1 Server with Inventory Spreadsheet with Pentium II, 64mg Ram, Windows 9X, external CD burner and bubble jet printer. 1 Server with NT Server 1 56K modem Encinitas Novell 4.11 Server for POS 4 POS Workstations...

Words: 1833 - Pages: 8

Premium Essay

Basis

...Sarbanes-Oxley Act (SOX) – Passed in 2002, the SOX requires publicly traded companies to submit accurate and reliable financial reporting. This law does not require securing private information, but it does require security controls to protect the confidentiality and integrity of the reporting itself. Gramm-Leach-Bliley Act (GLBA) – Passed in 1999, the GLBA requires all types of financial institutions to protect customers’ private financial information. Health Insurance Portability and Accountability Act (HIPAA) – Passed in 1996, the HIPAA requires health care organizations to secure patient information. Children’s Internet Protection Act (CIPA) – Passed in 2000, CIPA requires public schools and public libraries to use an Internet safety policy. The policy must address the following: * Children’s access to inappropriate matter on the internet. * Children’s security when using e-mail, chat rooms, and other electronic communications. * Restricting hacking and other unlawful activities by children online. * Disclosing and distributing personal information about children without permission. * Restricting children’s access to harmful material. Family Education Rights and Privacy Act (FERPA) – Passed in 1974, FERPA protects the private data of students and their school records. Federal Information Security Management Act (FISMA) – Passed in 2002, the FISMA requires federal civilian agencies to provide security controls over resources that support federal operations...

Words: 1342 - Pages: 6