Free Essay

Storage Networking

In:

Submitted By jyotsnau1
Words 1568
Pages 7
CNIT 34200
Description

Lab 1 – Storage Networking

This laboratory activity introduces key storage networking concepts. Using an open source SAN/NAS solution you will build a network storage server that provides both block and file level storage across the network. Using virtualization technologies multiple operating systems will be configured to use the network storage. We will use a rolling check-off approach in this laboratory. You may check off progress at any point of a phase’s duration. The final check-off date is the last day on which you may check off objectives for full credit. For Phases I and II partial credit will be available for up to one week after the final phase check off. Please be sure to review the notes section at the end of this document before beginning the lab.

There is adequate time to complete these objectives if you plan and manage your people resources well. However, if you get behind it will quickly snowball. It is highly suggested that you have everything in Phase I other than VM installation completed by Martin Luther King Day.

Objectives Phase I – Three weeks  Implement a NetGear GS108T gigabit switch for management and iSCSI traffic. A sample configuration is shown in figure 1. Port Tagged 802.1q VLAN 1 2 3 4 1 & 101 5 1 & 101 6 7 8 Untagged 802.1q VLAN 1 101 1 PVID (if required) 1 101 1 1 1 1 1 1 Attached Host

1 1 1

Uplink to NET SAN iSCSI Interface SAN Mgmt Interface ESXi 1 ESXi 2 Client 1 Client 2 Client 3

Figure 1 – VLAN Configuration

o IP addresses  VLAN 1 is in the 10.19.lab_station_number.0/24 range  VLAN 101can be any 192.168.x.0/24 o Connect clients and servers to the switch as shown in figure 2.

Internet (Lab Network)

SAN Server FreeNAS Dell Optiplex GX620

VM Server 1 Vmware ESXi Dell Optiplex 990/7010

DMZ VM Server 2 Vmware ESXi Dell Optiplex 990/7010

`
VMware viClient Windows 7

`
VMware viClient Windows 7

`
VMware viClient

Windows 7

Figure 2 – Physical Network Diagram  Implement a FreeNAS SAN server o Hardware  Dell GX620  Second NIC  Second hard drive  USB drive The NIC, hard drive, and USB drive will be provided by your TA







o Software  Install FreeNAS onto the USB stick  Install the latest updates and patches  Configure FreeNAS to use one NIC for management and file sharing (the lab network) and the other for iSCSI o Configure Storage  Create a ZFS striped volume containing both disks  Create a directory in the ZFS volume and expose via NFS Implement two VMware servers o Hardware  Dell 990/7010 o Software  Install VMware ESXi 5.5  Configure VMware networking  Add two kernel port groups: o VLAN 1 – Management Network o VLAN 101 – iSCSI  Add two virtual machine port groups: o VLAN 1 – Virtual machine network o VLAN 101 - iSCSI o Configure storage  Local VMFS datastore (created during installation)  FreeNAS NFS partition mounted as a VMware datastore  The address/name of your NFS export on FreeNAS  rtfm.cit.lcl:/iso mounted as a VMware datastore via NFS  This NFS export contains all of the required client operating system ISO images for installing VMs Implement three management stations o Software  Windows clients  Windows 7  Install VMware viclient on each  Download from http://your_esxi_server_address  Also install host update utility Install operating systems in VMware virtual machines o Spread across VMware servers as desired o Use ISO images on NFS mounted ISO datastore for installation  Mount from rtfm.cit.lcl:iso o Install to local storage  Windows Server 2012  Windows Server 2008  CentOS o Install to NFS mounted FreeNAS datastore  Windows Server 2003  Windows 7

Phase II – two weeks o Configure FreeNAS as an iSCSI target server  Do not use any authentication initially on the iSCSI targets  Configure iSCSI targets on FreeNAS  Create file extents  One extent/iSCSI target per initiator o Connect to an iSCSI target on the SAN from virtual machines installed in phase 0  Implement software iSCSI initiator in both Windows and CentOS  Create a target on FreeNAS for each initiator  Mount an iSCSI partition to each operating system o As a second drive o Initially use SendTargets to find targets o Connect to SAN via iSCSI from VMware ESXi  Create a large iSCSI extent/target  Mount the target on one ESXi and format as a VMFS file system  Mount the same target on the second ESXi  Move existing VM images from local storage to iSCSI VMFS file system o Exploit the capabilities of using VMware with a SAN  Implement a vCenter Server virtual appliance o Add a VM on the iSCSI based datastore to the inventory on both ESXi Servers  Show that it can be easily ran on either server  But not on both concurrently… o Show that a running virtual machine can be moved to another server via vMotion o Add authentication/authorization to iSCSI targets  Limit iSCSI target access to a specific initiator by IP address  Implement CHAP security  One-way CHAP for discovery  Two-way (Mutual) CHAP for targets Phase III – two weeks o Implement network booting via iSCSI  General Information  Network boot clients will be virtual machines o Client machines will PXE boot gPXE iSCSI boot loader via TFTP o Place all VM definitions on NFS share on FreeNAS





Deploy Infrastructure  Use existing local CentOS VM for DHCPD and TFTP daemons  Configure DHCPD for PXE with static reservations per lecture notes  Configure TFTP to serve the gPXE undionly.kpxe boot loader Operating Systems  Install new operating system instances directly to iSCSI target o Windows Server 2012 o Windows Server 2008 o Windows 7 o CENTOS  Move existing operating system instances to iSCSI target and configure for network booting o Existing Windows Server 2003

Notes – Read carefully before beginning Initial Tasks Install a Windows client and configure it to access the Internet to look up documentation. Initial Switch Configuration    The GS108T can be reset to factory defaults by holding down the reset switch on the front of the switch The default IP address is 192.168.0.239/24 The default password is “password”

VLANs and Networking VLANs should be configured as IEEE 802.1Q VLANs with the tag numbers defined in the objectives portion. In VMware the single physical NIC (vmnic) should have a vSwitch associated with it with four ports: a VMkernel port for each VLAN tag configured with an IP address for the ESXi server and a Virtual Machine Port Group for each VLAN tag for use by your guest (client) operating systems. The guest operating systems should connect to the VLAN 1 port group as their primary NIC (with default route and DNS information) and to the iSCSI port group to connect to the iSCSI initiator. FreeNAS Configuration FreeNAS is an appliance. As such, the installation drive is reserved for use by the operating system. Be sure to install it to the USB stick rather than one of the hard drives in the system.

Similar to ESXi, the only configuration done at the FreeNAS console is the management network settings. Once the management network is set-up, all further configuration is done via a web browser. FreeNAS Storage and Partitioning FreeNAS uses ZFS, a next generation storage approach that combines aspects of logical volume management, software RAID, and a traditional filesystem into a single filesystem. Create a single ZFS Volume containing both drives in a striped configuration. ZFS will be discussed further in lecture. VMware iSCSI implementation After adding the software iSCSI Storage Adapter (initiator), use sendtargets (dynamic discovery) to enumerate the targets/extents on the FreeNAS server. Discovered targets will show in the static discovery tab on the iSCSI initiator configuration pane. Once the target has been discovered, it can be mounted via add storage disk/LUN from the configure/storage tab. iSCSI Authentication Do not use CHAP authentication for initial configuration as it makes it difficult to troubleshoot: is it a basic iSCSI problem or a CHAP problem? Once iSCSI functionality is confirmed, add CHAP authentication. CHAP is expected to be implemented at checkoff for full credit. The CHAP usernames should be set to the host’s IQN. Note that when using CHAP, the passwords (shared secrets) must be at least 12 characters long or it not authenticate properly. vCenter Appliance Instructions for implementing the VMware vCenter appliance are available on Blackboard Install and configure DHCP Daemon Install the dhcp package via yum. Note that the CENTOS DHCP package is named dhcp even though the daemon is named dhcpd. Configure the DHCP daemon for PXE per the network booting lecture notes. Install TFTP Daemon Install the tftp-server package via yum. The xinetd package is a dependency of tftp-server and should install automatically if it is not already installed. Configure the tftp-server package per the network booting lecture notes.

Install New Operating System Instance Directly to iSCSI Target iSCSI network booting must be correctly configured before installation. BIOS must be configured to attempt network boot first and operating system installation media second. Refer to the network booting lecture notes for more information. Copy Existing Installs to iSCSI Target Use dd to copy existing boot drive from the .vmdk-flat file on the NFS share to the iSCSI target partition. Be sure to specify the correct block size with the bs= option. The default block size is 512. Refer to lecture notes for further information.

Similar Documents

Premium Essay

Storing Up Treasures

...where thieves break in and steal.” – Matthew 6:19 Actually, most people do store up their treasures on Earth, so much so in fact, that quite a few people are filling up their own treasure chests by renting out storage space. Self-Storage is an industry in which storage space is rented out to tenants, usually on a monthly basis. The storage space is usually in the form of a room, container or locker. Access to the space is usually secured by the tenant’s own lock and key. Clients include individuals, who usually store household goods, as well as businesses, which use the facilities for storing inventory or archives. As of 2009, there was approximately 2.3 billion square feet of rentable storage space in the US. The first modern self-storage facilities appeared in the US in the 1960s. The self-storage business was meant to provide individuals with space to deal with “life events”: moving, marriage, divorce etc. American workers have always been quite mobile, and the end of the 20th century, with its increasing divorce rates, and rush of transitions to 2nd or 3rd homes, saw a significant increase in the number of life events. However, by the end of the 1990s, demand was growing at a faster rate than explained by these factors. From 2000 to 2005, the number of self-storage facilities almost doubled, with 3000 new facilities built each year. Since the 1990s, demand was increasingly driven by the accumulation of goods, fuelled in part by increasing real disposable income. Individuals...

Words: 1150 - Pages: 5

Premium Essay

Doc Memory Summary

...had hearing as that of a blind person, I would be able to Recognize someone that I knew based on the sound of his or her voice including the pitch. I would be Able to determine if they are happy or sad based on the sound of their voice. 3. Semantic (meaning) as in certain cultures and professions people have different meanings and Nicknames for item and people. A prime example would be in the African American culture a Light-skinned person is referred to as “Red Bone”. Memory Storage Memory is stored two ways according to Miller (1956): 1. Short Term Memory (STM). This is memory that is stored for a brief duration which Could consist of 0-30 seconds. 2. Long Term Memory (LTM). This is memory that can last a lifetime and is thought to Be unlimited. An example would be remembering something that happen at two years of Age and through adulthood. Memory Retrieval Memory retrieval refers to getting information out of storage. I would...

Words: 453 - Pages: 2

Premium Essay

Resume

...accountability outcome. SUMMARY OF QUALIFICATIONS • DIRECT, PLAN AND IMPLEMENT THE QUALITY IMPROVEMENT OF A CUSTOMER FOCUSED TEAM DEVELOPING STRATEGIC RELATIONSHIPS WITH INTERNAL, EXTERNAL CUSTOMERS AND DEPARTMENTS. Professional Experience Supervisor February 2013 to January 2014 KARMA STORE • Determined inventory requirements; requisitioned, received, stored, and issued supply items. • Applied proper accounting procedures; conducted recurring inventories. • Issued supplies to personnel per budgetary constraints. • Received incoming shipments and verified against invoices. • Ensured proper storage, rotation (FIFO), and stocking of merchandise; maintained stringent controls on supply usage and rotation. • Maintained/updated records using automated and manual processes. • Analyzed statistical data to determine trends; coordinated logistical activities and reviewed policies. • Computed supply usage, stockage levels, order points, and economic order quantities. • Collated and analyzed data, and prepared management reports and summaries. Inventory/Document Control • Prepared and calculated all inventory and cost data; remained within budgetary goals. • Received, collated and maintained supply/logistic operations documents. • Reviewed property books and adjustment documents for correctness;...

Words: 482 - Pages: 2

Premium Essay

Long Term Memory Research Paper

...Memory is how we can remember all the things that we experience in day-to-day life. Memory can be broken down into 3 basic processes; Encoding: the initial recording of information as a memory. Storage: when information is saved for future use. Retrieval: when the brain recalls information that has been saved. This process happens all within a matter of seconds. There are 3 different types of memory; sensory, short-term and long-term. Sensory memory is remembering how a place smelled or sounded. This form of memory typically lasts about 1 second. Short-term memory stores things that you only need to remember for a brief period of time. For example; remembering your grocery list when you go shopping. This is something you only remember for a few hours, however some short-term memories only last 15-20 seconds. The third type of memory is long-term memory, which is one of the most complicated parts of memory. Long-term memory can be broken down into 5 parts; general long-term, declarative, procedural, semantic and episodic....

Words: 615 - Pages: 3

Free Essay

Ncc Key Issues

... Capacity Dumping = = [pic] = 2250 BBL/Hour Destoning = 3x 1,500 BBL/Hour = 4500 BBL/Hour Dechaffing (dry) = 2x1,500 BBL/Hour = 3,000 BBL/Hour Dechaffing (wet) =1x1,500 BBL/hour = 1,500 BBL/Hour Drying = 3x200 BBL/Hour = 600 BBL/Hour Separating = 3x400 BBL/Hour = 1200 BBL/Hour Bailey Mills = 3x400 BBL/Hour = 1200 BBL/Hour Processing Requirement Total: 16,400 BBLs / 12 hours = 1,367 BBL/Hour Dry Berries: 1,367 BBL/Hour x 30% = 410 BBL/Hour. Wet Berries: 1,367 BBL/Hour x 70% = 957 BBL/Hour. Conclusion: Processing at 600 BBL/hour, dryer is the bottleneck. Current System Performance Analysis Dryers can process only 600 BBL/Hour. Storage bins (wet) fill at a rate of 957 – 600 = 357 BBL/Hour. 357...

Words: 1018 - Pages: 5

Premium Essay

Nt1310 Unit 3 Assignment

...the target i.e. server side data storage center. In this case of Deduplication the client is not modified and is totally not knowing or aware of any Deduplication mechanism happening at the target side. Target-based Deduplication accomplished by the backup servers and hardware appliances at target which having ability to perform and handle those Deduplication activities. That means there is no overhead on the client or server being backed up. Thus the result of this kind of technology i.e. target based Deduplication drastically raise the storage utilization, but at the same time it fails to meet bandwidth saving perspectives. 3.2.2. Source based de-duplication In this scenario Deduplication performed on client side i.e. before it transmitted By processing the data before transmitting we can reduce the transmitted amount of data and therefore it reduces the network bandwidth and this less bandwidth is required for the backup software. Deduplication on source side uses the engine at client side which checks for the duplication against the Deduplication index which is located on the backup server. This is done with the help of the backup agent who is aware of the Deduplication which is located at the client side and who is responsible for backs up only unique data or blocks. And those unique blocks of data will be transmitted to the disk. The result of this kind of technology i.e. source based Deduplication improves bandwidth as well as the storage utilization. ...

Words: 546 - Pages: 3

Free Essay

Production Management and Material Management

...through the production department without causing stoppage of production due to shortage of materials. STORE MANAGEMENT Store keeping is a primarily a service function in which the store keeper acts as a custodian of all items carried in the store. Store management should aim at providing the service as efficiently as possible with minimum possible cost. Store keeping may be defined as a function of receiving, storing and issue of raw materials, bought-out parts and components, spare parts, tools, consumables, supplies and stationery items etc. to the user departments. FUNCTIONS OF STORE MANAGEMENT * To receive raw materials, components, tools, equipments and other items and account for them. * To provide adequate and proper storage and preservation of various kinds of materials. * To meet the demands of the user departments by proper issues and keeping account of items used b user departments. * To highlight accumulation of stocks, discrepancies and abnormal consumption and implement proper control measures. * To ensure good housekeeping to facilitate proper material handling, material preservation, receipt, stocking and issue of...

Words: 1107 - Pages: 5

Free Essay

Does Schema Theory Effect Memory Encoding?

...CLA IA HL Psychology Does Schema Theory effect memory encoding? Introduction: Memory can be defined as the process of reproducing and recalling information from something that has been learned before. (W. Matlin) There are two main types of memory storages, short term storage and long term memory storage. Short term memory is usually described as the recollection of information that happened recently, while long term memory is something that can retain and stay in your brain for long periods of times. (Zimmermann, 2014) Schemas are mental saving devices, they are plans for action and frameworks for thinking. Schemas originally are used and serve as a window through which we perceive the way the world is. They are hierarchies of knowledge and provide us with all sort of different information. They allow us to navigate ourselves in a complex world through this pre-existing rules and guides for action and thought. (Bryan). A study conducted by (Bartlett, 1932) “War of the Ghosts” was aimed to investigate the effects of schemas on human memory. In the method the participants were asked to read a story about an American tale where people were hunting seals in Canoes. The participants’ memory was tested and investigated by repeated reproduction and serial reproduction. In serial reproduction, the first participant would read the original story and then rewrite what they remember about it. The first participant’s reproduction would then be read by the second participant...

Words: 678 - Pages: 3

Free Essay

Data Inspection

...The Mason School of Business Information Technology Office provides services to the school’s faculty, staff, and students. The data center could be separated into two sections. The first section are the equipment that are accessible to general users. The second section are only accessible to the staff of IT department. Section 1 Accessible to users In each classroom, a computer and a control penal of projector are located at the podium. The podium is designed specifically for these equipment. The host is locked inside the podium; the monitor and control panel are attached to the podium. The key to the podium is separated from the key to the storage. Only the staff of IT department have the access to the keys. If one of the keys is lost or stolen, all the locks will be replaced and new keys will be distributed. IT department could also control the podium remotely for customer support. There is an IP camera on the back wall of each classroom. They have two main functions. The first one is that IT department could provide customer support and services through the camera. The second function is based on security consideration. The cameras monitor all the classroom and are controlled by the IT department. The video tapes of monitor are collected and stored by an outsourcing company from Richmond on a weekly basis. The finance market classroom is located on the first floor. The classroom is equipped with more technical installments. If the computer and televisions are impaired...

Words: 1057 - Pages: 5

Free Essay

Storing and Issuance

...Storing and Issuance At East Avenue Medical Center storing and issuance is done to make sure that the First-In First-Out policy has been followed in order to retain the quality and quantity of the food items and it has a standard operating procedure. The objectives of the standard operating procedure are to make sure that proper storage and issuance of food items are done to avoid losses and shortage. The following diagram shows the flow of storing and issuance at EAMC: The first step, storing and issuing of supplies where the storekeeper and MMS staff store should store all items properly. If items are perishable, store food items at the freezer/refrigerator and it non-perishable, store items in a dry storage room. To avoid losses or pilferages, all storage areas must be locked. Second step, record all supplies. The storekeeper should record all food items using the stock card for the control of supplies. The third step is issuance of supplies. The dietary supplies may be issued from NDS storeroom and MMS storeroom. The food to be issued is based on the menu of the day. The storekeeper shall issue food items upon presentation of properly signed RIS. RIS must contain the amount and list of all items needed and must have the signature of the requesting Admin ND. The storekeeper should prepare daily food consumption report and must do a month end inventory and then submit it to the ND who does the preparation of monthly report. Last step is monitoring. This is where all...

Words: 276 - Pages: 2

Free Essay

Its310 Final

...University – Global Campus January 28, 2015 Table of Contents Desktops and Server 3 Peripherals 4 Networking 4 Security 5 A Comprehensive and Secure Solution Even small businesses can benefit from a solid network. Due to the unique nature of the site and the number of offices a Microsoft based small business network suits the location perfectly well. For this business I recommend purchasing 20 HP Desktops with standard peripherals, a wireless N based network infrastructure, and a Microsoft Windows 2010 small business server for user authentication, file sharing, and security. Desktops and Server The HP 6305 Small Form Factor desktop is an excellent option for this deployment. IT comes standard with a dual core AMD A4-5300 processor which has a 3.4 GHz core speed and a 1MB cache, built in Radeon HD 7480 Graphics, 8GB of DDR3-1600 RAM and a 1TB HDD. Windows 7 64-bit comes pre-installed; a 64-bit operating system is required to take full advantage of the 8 GB of RAM. Also installed is an Intel 7260NB 802.11a/b/g/n wireless network card to support a wireless network which will be discussed later. These machines will provide plenty of local storage and sufficient processing power to handle all standard business applications with sufficient RAM to handle most multitasking scenarios. For a centralized server an HP ProLiant ML310e Gen 8 will provide 2TB of storage for shared files while providing a 1 HDD failure tolerance, the server will also provide a centralized...

Words: 1048 - Pages: 5

Free Essay

Tft2

...Page 1 June 4, 2014 ABC Company Proposed revision of Information Security Policy Anthony Ronning: Information Security Manager OBJECTIVE: Due to the recent breach of our electronic health record (EHR) systems, it is necessary that policies pertaining to access and control mechanisms of health records be reviewed and/or modified to mitigate future incidents SPECIFIC GOALS: 1.) Implement a standard based on Attribute Based Access Control (ABAC) to ensure that electronic health records (EHR) are protected from unauthorized entities 2.) Implement a standard for the use of remote access methods to information systems 3.) Implement a standard that ensures that access to electronic health records (EHR) is audited and backed up without changes or over writing INFORMATION SECURITY POLICY GOALS: * Confidentiality = data or information is not made available or disclosed to unauthorized persons or processes * Unauthorized access = the INABILITY of unauthorized persons to read, write, modify, or communicate data/information or otherwise use any system resource * Integrity = data or information has not been altered or destroyed in an unauthorized manner * Availability = data or information is made accessible and usable upon demand by authorized users * Legislative and Regulatory Requirements = policies comply with Federal and HIPAA regulatory standards * Business continuity plan integration = policy revisions fall within the business continuity...

Words: 2279 - Pages: 10

Premium Essay

En1420 Final Project

...ITT Technical Institute | Information Technology Computer Networking Systems | Is it Competitive in the Global Marketplace | | [Type the author name] | | EN1420 Composition II Professor Procopio | Table Of Contents Cover Page ……………………………………………………...Page 1 Table of Contents ………………………………………………Page 2 Evaluation ………………………………………………………Page 3 – 4 Concept Map …………………………………………………....Page 5 Outline …………………………………………………………..Page 6 Professional Letter ……………………………………………..Page 7 Information Technology Computer Networking Systems The field of IT specifically networking is a field that has been growing very rapidly in the United States. The mobile data trend (smart-phones, tablets, etc.) and “cloud computing” (subscription-based or pay-per-use services like apps and data storage) mean companies that scaled back I.T. departments in the 2008 economic downturn are hiring again. This is good for anyone in this particular IT field and shows a trend for future growth. In the next few paragraphs I will discuss current pay rates and projected job growth of this industry over the next 8 years. Prospects should be best for applicants who have an associate’s degree or a bachelor’s degree in computer science and are up to date on the latest technology. The amount of education a person has in this field will greatly improve his chances at receiving a higher salary then those with less training. There are many aspects to this field and the jobs available can vary. Network...

Words: 1015 - Pages: 5

Free Essay

Setting Up Home Network

...Setting up a Home Network Srikanth Gunda Wilmington University 1. Overview of wireless networking technology There are various types of wireless network which are wireless Local Area Network (WLAN), Wireless personal Area Network (WPAN), Wireless mesh Network. Wireless networks are convenient in home network, small schools and offices. Wireless network are basically suitable to interconnect cell phones and computers, printers, TVs which helps in easy communication. Wireless network uses radio frequency rather than wire to communicate. Clients unite their gadgets which helps to communicate Wireless access points. The speed is relative to distance between the transmitter and receiver due to the utilization of radio frequency; consequently, the closer the client is to the transmitter the more the speed is. 2. Advantages of wireless networking technology Wireless networking technology gives various benefits to the household and office use, some of these benefits are below:- I. Most of the working class families have few computers which are arranged in various rooms. It is expensive, and time-consuming to introduce cables to a network that are situated in rooms which helps them to impart the broadband communication hence a wireless router resolves the issue. II. As the clients stay in the coverage of the signal, he/she can move their gadgets easily around the house. This protects hours of cable reconnection as the gadgets can get web by long wireless facility...

Words: 667 - Pages: 3

Premium Essay

Face Detetction

...Data Communication Theory What is dotted decimal notation on IPv4 addresses? Answer: It is presentation form for the numerical data that consists of a string of decimal numbers each pair is separated by a dot. The common use is to write the numbers in the octet group based 10 (decimal) numbers separated by dots. In computer networking, Internet Protocol Version 4 addresses are commonly written using quad-dotted notation of four decimal integers, ranging from 0 to 255 each. Chapter 6- Explain the Peer-to Peer network and what are its advantages? Answer – In Peer to Peer network, network hosts don’t have a specific role. They provide specific services and also consume network services. We have hosts that will fulfill a variety of different roles, like one computer can have printer connected to it which is then shared on to the network. Another computer can have a large hard drive attached to it and everyone else is allowed to use the hard drive for data storage, modification etc. In Such network we have hosts that both provide and consume network services. In essence they function both as a Client and as a Server at the same time. The advantage of Peer to Peer network is the ease of installation. We can share our resources on the network and everyone can share the benefits. On the other hand is not very scalable. The Peer-to-peer network are useful only for a network with fewer computers and are suitable for applications that do not require a high level of...

Words: 1023 - Pages: 5