[Contents] [Back] [<< Prev] [Next >>]

Peer-to-Peer Networking

In the peer-to-peer network environment, resources are distributed throughout the network on computer systems that may act as both service requesters and service providers. In a peer-to-peer network, the user of each PC is responsible for the administration and sharing of resources for his PC, which is known as distributed or workgroup administration.

A peer-to-peer network sometimes is called a workgroup. Peer-to-peer networks are ideal for small organizations (fewer than ten users) where security is not of concern. Peer-to-peer networks also provide a decentralized alternative for situations in which server administration would be too large or complex a task.

Because a peer-to-peer network does not attempt to centralize security, and because peer-to-peer networks are generally much smaller and simpler than server-based networks, the software required to operate a peer-to-peer network can be much simpler. Several desktop operating systems, including the Microsoft operating systems Windows for Workgroups, Windows 95, and Windows NT Workstation, come with built-in peer-to-peer networking functionality.


[note.gif]

When deciding whether to build a peer-to-peer network around NT Workstation or a server-based network around NT Server, remember that a key difference between the two is that NT Workstation supports a maximum of ten concurrent, logged-on users. This means that no more than ten other computers can access resources on a Workstation at one time. NT Server, however, has no such limitation and is capable of supporting dozens, even hundreds, of connections at once by the addition of more access licenses.

Aside from Microsoft’s NT Workstation, Windows 95, and Windows for Workgroups, numerous other operating systems, including the following, are designed to implement peer-to-peer networking models:
Remember that many of these peer-to-peer products can be integrated with networks that are primarily managed in a server-based environment. Macintosh computers, for example, can access resources on an NT Server system that is configured to receive them.