<?xml version="1.0" encoding="utf-8" ?><rss version="2.0" xml:base="https://www.webmaster-forums.net/crss/node/1037493" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title></title>
    <link>https://www.webmaster-forums.net/crss/node/1037493</link>
    <description></description>
    <language>en</language>
          <item>
    <title></title>
    <link>https://www.webmaster-forums.net/server-management/network-confusion#comment-1214905</link>
    <description> &lt;p&gt;O.K, Thanks Abhishek, It is very ambiguous, and its supposted to be for newcomers to the topic!!&lt;/p&gt;
 </description>
     <pubDate>Sun, 11 Feb 2007 21:11:42 +0000</pubDate>
 <dc:creator>StuPeas</dc:creator>
 <guid isPermaLink="false">comment 1214905 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title></title>
    <link>https://www.webmaster-forums.net/server-management/network-confusion#comment-1214900</link>
    <description> &lt;blockquote class=&quot;bb-quote-body&quot;&gt;&lt;p&gt;&lt;strong&gt;StuPeas;214899 wrote:&lt;/strong&gt; &quot;A network using the &lt;em&gt;user-level access model&lt;/em&gt; allows users to obtain access to resources only if they belong to a centralised access list.  This access list can be&lt;strong&gt; centralised to a particular server or to an entire network&lt;/strong&gt;&quot;
&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;I think it refers to the fact that the list of users and their access priorities are stored and served in some central node.  Any nodes sharing resources under these permissions will check with the central server before exposing them to a requesting user.&lt;/p&gt;
&lt;p&gt;Say, if you ask to read a particular shared file, its host will check if you&#039;re permitted to do so through the ACLs given by the central server, before allowing or denying you access.  The ACL definition may permit you to read only, but not write or delete, etc.&lt;/p&gt;
&lt;blockquote class=&quot;bb-quote-body&quot;&gt;&lt;p&gt;&lt;strong&gt;StuPeas;214899 wrote:&lt;/strong&gt; &quot;Operatin systems that provide both &lt;strong&gt;centralised and local user-level server access&lt;/strong&gt; include the following: Win2000 server......&quot;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;I presume this means that the ACLs can be managed at either a central server as above or just on the local host.  It&#039;s a little bit ambiguous to me, sorry.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.webmaster-forums.net/misc/smileys/smile.png&quot; title=&quot;Smiling&quot; alt=&quot;Smiling&quot; class=&quot;smiley-content&quot; /&gt;&lt;/p&gt;
 </description>
     <pubDate>Sun, 11 Feb 2007 19:58:43 +0000</pubDate>
 <dc:creator>Abhishek Reddy</dc:creator>
 <guid isPermaLink="false">comment 1214900 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title></title>
    <link>https://www.webmaster-forums.net/server-management/network-confusion#comment-1214899</link>
    <description> &lt;p&gt;Thanks Abhishek.  you have answered a KEY point regarding access permissions for the network (which just so happens to be the exact principle im having problems with).&lt;/p&gt;
&lt;p&gt;If you have a second or two, maybe you could clear up my confusion regarding &quot;Access Control Lists&quot; that are used for &quot;User-Level Access&quot; (i.e. where a shared &quot;object&quot; contains information regarding the user or group &quot;permissions&quot; for the object in question), as opposed to simple password protection for a share.&lt;/p&gt;
&lt;p&gt;The primary text im quoting from is &quot;CIW network administration, Sybex (2002)&quot;.&lt;br /&gt;
 The book says...&lt;/p&gt;
&lt;p&gt;&quot;A network using the &lt;em&gt;user-level access model&lt;/em&gt; allows users to obtain access to resources only if they belong to a centralised access list.  This access list can be&lt;strong&gt; centralised to a particular server or to an entire network&lt;/strong&gt;&quot;&lt;/p&gt;
&lt;p&gt;Im not sure what the text in Bold means.&lt;/p&gt;
&lt;p&gt;If possible could you also translate this for me as well...&lt;/p&gt;
&lt;p&gt;&quot;Operatin systems that provide both &lt;strong&gt;centralised and local user-level server access&lt;/strong&gt; include the following: Win2000 server......&quot;&lt;/p&gt;
&lt;p&gt;An answer for these points will probably clear up my confusion altogether and i will be writing you into my will.&lt;/p&gt;
&lt;p&gt;Thanks&lt;/p&gt;
&lt;p&gt;Stuart.&lt;/p&gt;
 </description>
     <pubDate>Sun, 11 Feb 2007 19:33:57 +0000</pubDate>
 <dc:creator>StuPeas</dc:creator>
 <guid isPermaLink="false">comment 1214899 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title></title>
    <link>https://www.webmaster-forums.net/server-management/network-confusion#comment-1214896</link>
    <description> &lt;p&gt;You do seem to have some preconceptions that may cause confusion.  You&#039;re still sort of on the right track though.&lt;/p&gt;
&lt;p&gt;Here are some basic ideas, in a client-server network model.&lt;/p&gt;
&lt;p&gt;When a node in a network shares data that other nodes ask for, it is acting as a server.  The nodes making requests are clients.  For example, when you load a web page, your computer is the client, as it makes the HTTP request; and the remote host is the web server, as it listens and responds to your request.&lt;/p&gt;
&lt;p&gt;A node can be a server and a client at the same time.  In a P2P network, all nodes can ask for data, and all nodes can share data.  That means every node is potentially a client or server, simultaneously.&lt;/p&gt;
&lt;p&gt;That means any number of servers could be added into the mix, and it won&#039;t stop any nodes sharing data in a truly P2P way (it depends on the protocol).  In fact, they couldn&#039;t do it without at least one server.&lt;/p&gt;
&lt;p&gt;However, centralised servers may be needed for some purposes, like password/key or database services.  By juggling keys, you could, for instance, have a P2P network with centralised authentication but decentralised data communication.&lt;/p&gt;
&lt;p&gt;So all your data wouldn&#039;t have to go through the central server, that would just mediate your connection.  The remote host and you will have to mutually identify yourselves to the server (and perhaps fetch keys to decrypt each other&#039;s packets).  This is how many instant messaging chat applications operate.  Again, it depends on the protocol.&lt;/p&gt;
&lt;p&gt;I hope that hasn&#039;t confused you more.  &lt;img src=&quot;https://www.webmaster-forums.net/misc/smileys/smile.png&quot; title=&quot;Smiling&quot; alt=&quot;Smiling&quot; class=&quot;smiley-content&quot; /&gt;&lt;/p&gt;
 </description>
     <pubDate>Sun, 11 Feb 2007 18:46:26 +0000</pubDate>
 <dc:creator>Abhishek Reddy</dc:creator>
 <guid isPermaLink="false">comment 1214896 at https://www.webmaster-forums.net</guid>
  </item>
  </channel>
</rss>
