Most networks make use of the client/server relationship, where clients request services from special purpose computers known as servers. In this video, Mike Chapple explains the differences between the client/server model and peer-to-peer computing.
- [Instructor] Network topologies, such as star, ring,…and bus layouts describe the ways…that network devices are physically…and logically connected to each other.…In addition to understanding the topology of a network,…it's important to understand…how the systems on a network relate to each other.…There are two primary models for network relationships:…client/server and peer-to-peer.…In the client/server model,…each computer on the network has a specific role.…It's either a client or a server.…
The most common client devices are the computers,…smartphones, and tablets in the hands of end-users.…Those client devices access the network…to make use of services that are running on servers.…These servers can be located either on the local network…or on the internet.…Servers are designed to provide services to clients…and typically have a single dedicated function.…They're also computers and they run operating systems…similar to those running on client devices,…but they typically run a server version…of the operating system that is specially tuned…
To join one of Mike's free study groups for access to bonus tips and practice questions, visit certmike.com.
- TCP/IP networking
- Network security devices
- Switches and routers
- Content distribution networks
- Storage networks
- Securing networks
- Network attacks
- Wireless networking and security
Skill Level Intermediate
Q: This course was updated on 07/27/2018. What changed?
A: New videos were added that cover network relationships and security device placement.
IT Security Careers and Certifications: First Stepswith Marc Menninger2h 6m Appropriate for all
IT Security Foundations: Core Conceptswith Lisa Bock1h 13m Beginner
Insights from a Cybersecurity Professionalwith Mike Chapple32m 15s Appropriate for all
1. TCP/IP Networking
2. Network Security Devices
3. Designing Secure Networks
4. Specialized Networking
5. Secure Network Management
6. Network Attacks
7. Wireless Networking
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.