Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Inside Peer-to-peer Architecture

October 20, 2003
When security executives look deep into their security systems, they may discover that within the very structure of their systems lies a major source of risk: the server.

The typical architecture for a security system includes a host layer where the primary users interact with the system. These host terminals are connected to a server layer and form a client/server relationship, with the server providing the heart of the system.

A controller layer links the numerous hardware devices that connect the inputs, outputs, card readers and other components of the system to the server. The controllers are central managing devices that carry the database and all the intelligence for the decisions made at the device layer.

The Crux of the Situation

Some systems feature a network layer that connects the controller to the wide area network and to the server. Other designs rely on Ethernet connectivity at this level.

The problem with the configuration described above – and why it causes potential complications – is that the server is between the users and all the networked and linked devices that make up the security system. As a result, the server can become a single point of failure that can disrupt the entire system. We can all relate to server failures and the problems they cause: when an office network goes down and our computers no longer access the files we need or when our email provider crashes and we lose emails. When the server operating a security system goes down, at best, it can halt the operator’s ability to view the system. In the worst case, it can even halt a system’s functionality and total operation.

An alternative configuration offering less risk and more flexibility is a non-server-based system using a network of equalized, independent workstations sharing the same database. Eliminating the server and moving access and functions to the workstation level reduces system vulnerability to attack or failure. With multiple hosts, there is no possibility of a single point of failure, and the malfunction of one host will not affect the other hosting workstations because each operates fully independently from the others. In an emergency, the independent hosts can be quickly relocated to any point where the network exists, readily lending themselves to rapid redeployment.

Remote monitoring from across town, or even across the country, is also possible with this system. In a multi-tenant building, tenants can be provided with their own hosts for self-management, while still being restricted from accessing the entire system.

This architecture also provides additional protection from system failure. For example, because peer-to-peer and event-initiated control is distributed to the controller devices, no control functions in the system rely upon the host. This means that even if the host layer is unavailable, these functions are unaffected.

Further protection at the controller level can be secured by providing comprehensive support for battery backup and power management, with full alarm and self-monitoring capability. During power loss, for example, system functionality can be distributed into the battery-backed controller layer. Since the host layer is made up of non-client workstations, they can easily be redeployed to locations where power is available.

The peer-to-peer structure also lowers maintenance and installation costs. Often, in order to provide protection from server failure, a dual redundant configuration is used in client/server-configured systems. Servers, however, are expensive; so this arrangement drives up installation costs. System expansion poses an additional problem, because as the size of a system increases, the server, or servers, must be scaled up accordingly. Once again, this adds to the cost; cost increases even more if a dual configuration is used.

With a true peer-to-peer system, increasing availability is as simple as adding another workstation. No server upgrades or redundant arrays of independent disks, or RAID array disk farms, are necessary, nor are there any related escalating maintenance costs. Creating redundancy in this type of system is also simple and economical. Users simply provide multiple interfaces from different hosts, each backing up the other.

Non-server-based systems still provide the user’s information technology department with critical network information. In addition, non-server-based systems do not necessarily consume massive amounts of bandwidth, as some critics claim. Such systems can even be managed and have bandwidth regulated using standard network management tools, and may require as little as 186 bytes when performing system downloads.

Elimination of a server frees up the system to operate independently, which allows alarms and responses to be routed to their final monitoring station, both faster and more securely. While the client/server configuration has served the industry in the past, technology has continued to advance. It is no longer necessary to rely upon an older and increasingly marginal system while new technologies are creating whole new possibilities for system architecture, reporting and control – and ultimately building security.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SmartLink Peer-to-Peer Fire Alarm Network

    See More
  • Fire Essentials: Multiplexing, Distributed Intelligence, Peer-to-peer Panels

    See More
  • Intercom on wood paneling

    Five reasons a building needs a peer-to-peer based IP intercom system

    See More

Related Products

See More Products
  • The Complete Guide to Physical Security

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing