Computer Technos

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 30 July 2010

Understanding Workgroups

Posted on 10:33 by Unknown
The workgroup was the original form of networking supported by Windows, and it’s really still the basic form of all Windows networking. The concept of a workgroup was originally defined around peer-to-peer networking, where any machine on a network can act as a server and any machine can act as a workstation. Even today, Windows Server 2008 has both the Server and the Workstation services that provide these two roles. You can use your Windows Server 2008 server as a workstation if you want — no one can honestly say that this functionality is unavailable. Of course, Microsoft now has the Server Core version of Windows Server 2008. Theoretically, you can use Server Core as a workstation, but I don’t know of anyone who’d want to.

The other standard form of networking is client/server. In this form of networking, you don’t use the server as a workstation. In fact, when working with operating systems such as NetWare (http://www.novell.com/products/netware/), you can’t use the machine that has the operating system installed as a workstation. It’s simply impossible to use a NetWare server as a workstation because no functionality exists to do it. The advantage of client/server setups is that they’re very light and reliable. The server uses all its resources to perform tasks on behalf of the client. However, this form of networking lacks flexibility. All workstations are always workstations, and all servers are always servers.



Understanding the pros of workgroups
Workgroups are convenient because you don’t have to have one super machine to handle everyone’s requests. Any workstation can also act as a server, so you can attach a laser printer to one workstation and an inkjet to another workstation. With the proper settings, everyone has access to both printers even though the printers appear on different machines. Sharing occurs on many levels. A workstation with an exceptionally large hard drive can share some of that hard drive space with everyone on the network. Likewise, a workstation with an Internet connection can share the connection with everyone else. Peer-to-peer networking is all about sharing whatever a workstation has in excess with everyone else on the network so that everyone benefits from that excess.

Most administrators also find workgroups easier to manage, at least when they’re small. If someone wants access to a particular workstation, their name must appear on the list of users for that workstation. When a workstation wants to share a particular asset, you must configure that asset for sharing and define who can use it. All of the settings are localized and easy to understand. You don’t have to worry about global security policies, Active Directory, or anything else that’s overly complicated.

A workgroup need not exist as a separate entity. You can use a workgroup network setup at the departmental level and a domain or client/server setup at the enterprise level. The concepts behind a workgroup work equally well in the departmental environment as they do in standalone mode. One question with workgroups is finding out how large can you make them before they reach their limit. The best way to answer this question is to determine how the administrator configures the workgroup, know whether the workgroup contains the proper number of dedicated servers, and what you expect the workgroup to do. If your only goal for the workgroup is to share files and print documents, a workgroup of any size is possible. As you add tasks, such as database management, the potential size for a workgroup decreases because you’re asking it to perform more work. A workgroup configuration that includes e-mail, file, print, and database management services is probably limited to 100 nodes. However, a skillful administrator could potentially increase that size.



Understanding the cons of workgroups
Using a workgroup becomes less advantageous when you begin using a number of custom applications and require centralized management for help desk support and other needs. Adding remote users and other enterprise requirements increase complexity and the need for centralized management, which usually means obtaining a central management application. For example, if you plan to use Microsoft’s System Center Operations Manager, or SCOM (http://www.microsoft.com/systemcenter/opsmgr/default.mspx), you need a domain. Consequently, the workgroup meets its match in complexity, not necessarily in size.

Workgroups also tend to provide poorer security than does a centralized network (client/server or domain). Because everyone is sharing resources freely, it can be difficult to lock down those resources and ensure that they’re shared only as required to accomplish tasks within the workgroup. Because of the poorer security, workgroups often encounter problems with adware and viruses where one machine’s woe automatically becomes every machine’s woe.

Source of Information : For Dummies Windows Server 2008 For Dummies
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Networking | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Windows 7 Shortcut Keys
    Longtime users of Windows have probably grown accustomed to navigating around the Windows user interface using the keyboard. This especially...
  • Windows on Mac: Virtualization Solutions
    If you’d prefer to join the ever-increasing ranks of Mac switchers—you traitor, you—you can still run Windows and, more important, Windows a...
  • Customizing Library Folders in Windows 7
    In your library folders, you can customize view options based on the contents. In the toolbar of the Pictures and Music library folders, Win...
  • Windows 7 BitLocker Drive Encryption
    In Windows Vista, you had the BitLocker Drive Encryption feature that allowed you to encrypt the content of entire volumes. In Windows 7, Mi...
  • Using Windows 7’s Performance Options
    While all the performance tools are available individually throughout the system, Windows 7 introduces a nice list of available tools, if yo...
  • Windows 7 - Installing and Configuring a Printer
    If your printer is already installed and operational at this point, you can skip this section and skim ahead for others that may be of inter...
  • Considering Centralized versus Group Sharing
    One of the most important preparation steps for your server is determining how to store the data you create. The two common methods are cent...
  • Berkeley Motes
    The Berkeley motes are a family of embedded sensor nodes sharing roughly the same architecture. Let us take the MICA mote as an example. The...
  • Using Windows 7 Ease of Access Tools
    If you have difficulty using a mouse or typing, have slightly impaired vision, or are deaf or hard of hearing, you can adjust the appearance...
  • Troubleshooting Boot and Startup Problems - Driver Loading in Safe Mode
    How does Windows know which device drivers and services are part of standard and networking-enabled safe mode? The answer lies in the HKLM\S...

Categories

  • Access 2010
  • BlackBerr
  • BlackBerry
  • Computer Science
  • Cyber Security
  • Exchange Server 2010
  • File Utilities
  • Foursquare
  • Google
  • Hardware
  • Internet
  • iPad
  • Linux
  • Lync Server
  • Microsoft Virtualization
  • Mobile Web
  • Networking
  • News
  • Security
  • Server Architectures
  • Smartphone
  • Ubuntu Linux
  • Windows
  • Windows 7
  • Windows Home Server
  • Windows Security
  • Windows Server 2008
  • Windows Server 2008 Hyper-V
  • Windows XP
  • Wireless

Blog Archive

  • ►  2012 (66)
    • ►  August (5)
    • ►  July (9)
    • ►  June (9)
    • ►  May (8)
    • ►  April (9)
    • ►  March (9)
    • ►  February (8)
    • ►  January (9)
  • ►  2011 (85)
    • ►  December (5)
    • ►  November (6)
    • ►  October (7)
    • ►  September (8)
    • ►  August (9)
    • ►  July (9)
    • ►  June (7)
    • ►  May (7)
    • ►  April (4)
    • ►  March (6)
    • ►  February (8)
    • ►  January (9)
  • ▼  2010 (230)
    • ►  December (13)
    • ►  November (3)
    • ►  October (2)
    • ►  September (10)
    • ►  August (31)
    • ▼  July (32)
      • Preparing to Create a Workgroup
      • Understanding Workgroups
      • Reviewing Legacy Windows Server 2003 Active Direct...
      • Examining Additional Windows Server 2008 R2 AD DS ...
      • Reviewing Additional Active Directory Services
      • Auditing Changes Made to AD Objects
      • Implementing Multiple Password Policies per Domain
      • Restarting AD DS on a Domain Controller
      • Recovering Deleted Items Using the AD Recycle Bin
      • Outlining AD DS Changes in Windows Server 2008 R2
      • Outlining AD DS Security
      • Outlining the Role of DNS in AD DS
      • Explaining AD DS Replication
      • Outlining the Role of Groups in an AD DS Environment
      • Examining the Key Features of Active Directory Dom...
      • Examining the Evolution of Directory Services
      • Windows Server 2008 R2 Running Add-in Applications...
      • Windows Server 2008 R2 Running Built-in Applicatio...
      • Windows Server 2008 R2 Core to an Active Directory...
      • Improvements in Server Roles in Windows Server 200...
      • Addition of Migration Tools
      • Restoring Deleted AD DS Objects Using the Active D...
      • Improvements in Clustering and Storage Area Networ...
      • Improvements for Thin Client Remote Desktop Services
      • Improvements in Windows Server 2008 R2 for Better ...
      • Improvements in Mobile Computing in Windows Server...
      • Improvements in Security in Windows Server 2008 R2
      • Windows Server 2008 R2 Introduction of Windows Dep...
      • Windows Server 2008 R2 Leveraging the Best Practic...
      • Windows Server 2008 R2 Leveraging File Server Reso...
      • Windows Server 2008 R2 Introducing Performance and...
      • Windows Server 2008 R2 Improvements in the Group P...
    • ►  June (23)
    • ►  May (2)
    • ►  April (21)
    • ►  March (32)
    • ►  February (28)
    • ►  January (33)
  • ►  2009 (119)
    • ►  December (33)
    • ►  November (31)
    • ►  October (35)
    • ►  September (20)
Powered by Blogger.

About Me

Unknown
View my complete profile