1
00:00:00,300 --> 00:00:07,950
We have developed networking as a way to share resources and information and how that's achieved directly

2
00:00:08,190 --> 00:00:13,470
maps to the particular architecture of the networking operating systems that we have been using.

3
00:00:14,620 --> 00:00:20,410
Now, in this lecture, we are going to talk about the most common known application architecture,

4
00:00:20,410 --> 00:00:22,630
that is peer-to-peer architecture.

5
00:00:23,470 --> 00:00:27,190
There are two main network types that you need to know about.

6
00:00:27,190 --> 00:00:33,100
The first one is peer to peer, and the second one is client to server, which are going to see in the

7
00:00:33,100 --> 00:00:33,900
next lecture.

8
00:00:34,480 --> 00:00:41,500
And by the way, it's really tough to tell the difference just by looking at the diagram or even by

9
00:00:41,500 --> 00:00:48,550
checking out like the video of the network, but the differences between peer-to-peer and blind.

10
00:00:48,550 --> 00:00:55,750
So architectures are pretty major, that they are not just physical differences, they are logical differences,

11
00:00:55,750 --> 00:00:56,050
too.

12
00:00:57,150 --> 00:00:59,090
Now, you'll see what I mean in a bit.

13
00:00:59,770 --> 00:01:02,560
So what is a peer to peer network architecture?

14
00:01:02,890 --> 00:01:10,990
Well, computers connected together in peer to peer architecture do not have any central or special

15
00:01:10,990 --> 00:01:18,550
authority that all peers, meaning that when it comes to authority, that all equals, for example,

16
00:01:18,550 --> 00:01:19,810
your group of friends.

17
00:01:19,930 --> 00:01:20,430
Right.

18
00:01:20,440 --> 00:01:24,210
No one has the authority to judge you or to decide who is greater.

19
00:01:24,610 --> 00:01:31,330
But when a teacher enters a classroom, the teacher has the moral authority that is an example of clients

20
00:01:31,330 --> 00:01:32,140
of architecture.

21
00:01:32,950 --> 00:01:39,970
Then the authority to perform a security check for proper access rights lies with the computer that

22
00:01:39,970 --> 00:01:43,330
has the desired resources being requested from it.

23
00:01:44,870 --> 00:01:52,280
Now, it also means that computers existing in a peer to peer network can be applied to machines that

24
00:01:52,280 --> 00:01:58,480
access resources and server machines and provide those resources to other computers.

25
00:01:59,270 --> 00:02:05,470
Now, peer to peer network architecture is perfectly fine for less number of hosts.

26
00:02:05,480 --> 00:02:12,470
But if you're trying to have more than 50 or even 100 computers in a peer to peer network architecture,

27
00:02:12,860 --> 00:02:15,100
then it becomes a tedious task.

28
00:02:16,650 --> 00:02:23,760
If your network is running Windows, Mac or Unix in a local area network workgroup, you have to have

29
00:02:24,000 --> 00:02:26,040
a peer to peer network.

30
00:02:27,480 --> 00:02:34,830
Now, when it comes to peer-to-peer architecture, security is not centrally governed, each and every

31
00:02:34,830 --> 00:02:41,070
user has to remember and maintain a list of users and passwords on each and every machine.

32
00:02:42,360 --> 00:02:49,110
Worse, some of all those important passwords for the same users change on different machines, even

33
00:02:49,110 --> 00:02:50,620
for accessing resources.

34
00:02:50,910 --> 00:02:52,470
It's a total mess.

35
00:02:53,550 --> 00:03:00,480
And since every user has to remember the usernames and passwords of other computers, a lot of memory

36
00:03:00,480 --> 00:03:03,110
is required in this type of architecture.

37
00:03:04,320 --> 00:03:06,800
For example, as you can see on the screen.

38
00:03:06,850 --> 00:03:09,940
This is an example of peer-to-peer network architecture.

39
00:03:10,440 --> 00:03:15,360
Now, Millie, Pluto, Mickey and Louie are four types of users.

40
00:03:15,630 --> 00:03:22,560
And as you can see on the screen, each user is storing the passwords of remaining three beers.

41
00:03:23,250 --> 00:03:29,130
Now, for example, if Pluto wants to access the resources of Mickey and Mickey has to remember the

42
00:03:29,130 --> 00:03:31,690
password of Pluto, this is such a mess.

43
00:03:31,980 --> 00:03:37,200
Now, this seems okay for four computers, but what if there are hundreds, thousands of computers,

44
00:03:37,650 --> 00:03:37,940
then?

45
00:03:37,950 --> 00:03:43,350
Is it possible to store all the information in thousand computers of each and every year?

46
00:03:43,740 --> 00:03:47,660
No, that would take up a lot of time and a lot of memory.

47
00:03:47,700 --> 00:03:53,910
We do not have that much of memory just to store usernames and passwords and to tackle this problem.

48
00:03:54,210 --> 00:03:57,000
Client server architecture is.

49
00:03:58,060 --> 00:04:06,730
Used in today's most of the business applications in the next lecture will have a look at client server

50
00:04:06,730 --> 00:04:07,860
network architecture.

