SlideShare a Scribd company logo
1 of 37
Download to read offline
Client computing evolution ppt11
Agenda
 Evolution of client computing
 Mainframe computers
 Personal computers
    File server

• Client –Server Computing
• Two-tier Architecture
• Three-tier Architecture
• N-tier Architecture
• Evolution of c-s computing in future
• Conclusion
DUMP TERMINAL

MAINFRAME
                      STILL PROCESSING
                       ON MAIN FRAME


  PERSONAL
 COMPUTERS


                   FILE SERVER
CLIENT/SERVER




    2-TIER



    3-TIER


    N-TIER
Mainframe –based Environment
 In these networks, one large server (a mainframe computer)
  handled all aspects of the network, while each user accessed
  the main server from a terminal.

 The data is processed on the mainframe and then delivered to
  the terminal.

 The data transfer between the terminal and the mainframe
  increases network traffic and slows down requests from other
  terminals.
Mainframe –based Environment contd…
 There are some major problems with this approach:

    Mainframe system are very inflexible.

    Centralized DP department was unable to keep up with the

    demand for new applications.

    high cost of purchase, maintenance and support.
Personal Computer

 Through the years, personal computers started to evolve and
  replaced these terminals but the processing is still process on
  the mainframes.

 With the improvement in computer technology, the
  processing demands started to split between personal
  computers and mainframes.
Contd…

 The first PC networks were based on the file sharing.

 In file sharing, the server simply downloads or transfers files
  from the shared location to your desktop

 File sharing is simple and works as long as shared usage is
  low, update contention is very low, and the volume of data to
  be transferred is low compared with LAN capacity.
Driving Forces Behind Client/server computing


• Forces that drives the move to Client/Server computing widely
  can be classified in two general categories based on:



        Business perspective.

        Technology perspective.
Business Perspective
• Basically the business perspective should be kept in mind for
  obtaining the following achievements through the system:


    For increased productivity.

    Superior quality.

    Improved responsiveness.

    Focus on core business.
Business Perspective contd…
• The effective factors that govern the driving forces are given below:



    The changing business environment.

    Globalization: The world as a market.

    The growing need for enterprise data access.

    The demand for end user productivity gains based on the
     efficient use of data resources.
Technology Perspective

 Technological advances that have made Client/Server computing practical
  by proper use of the following:

    Intelligent desktop devices.

    Computer network architectures.

    Technical advances like microprocessor technology, data

     communication and Internet Database system, operating system and
     graphical user interface.

    Growing cost and performance advantages of PC-based platforms.

    Enterprise network management.
Client –Server Computing
 The main emphasis of Client-Server Architecture is to allow large
  application to be split into smaller tasks and to perform the tasks among
  host (server machine) and desktops (client machine) in the network.



 Client-Server Computing is divided into three components, a

    Client Process

    Server Process

    Middleware
Client –Server Computing contd…

Client :
 A Client is any process that requests specific services from the server
  process.

      The main operations of the client system are listed below:

          Managing the user interface.

          Accepts and checks the syntax of user inputs.

          Processes application logic.

          Generates database request and transmits to server.

          Passes response back to server.
Client –Server Computing contd…
Server :
•   A Server is a process that provides requested services for the Client.

    The main operations of the server are listed below:

     Accepts and processes database requests from client.

     Checks authorization.

     Ensures that integrity constraints are not violated.

     Performs query/update processing and transmits responses to client.

     Maintains system catalogue.

     Provide concurrent database access.

     Provides recovery control.
Middleware
• Middleware is software that runs between client and server
  processes.

• It is the "glue" between the client and server, which makes it
  possible for them to communicate to each other.

• Middleware is written in such a way that the user never
  notices it's presence.

• It delivers secure and transparent services to users.
Elements of C-S Computing




    Client                         Server
                      Network


Client machine                  Server machine
Client/Server :Fat /Thin
 A Client or a Server is so named depending on the extent to which the
  processing is shared between the client and server.

 The concept of Fat Clients or Fat Servers is given by one of the
  important criterion, that is, how much of an application is placed at the
  client end vs. the server end.

 Thin Client :

    A thin client is one that conducts a minimum of processing on the

      client side .

• Fat Client :

    Fat client is one that carries a relatively larger proportion of processing

      load.
 Thin server:

    This architecture places less application functionality on the server

      machine.

    For example file servers.

 Fat Servers:

    This architecture places more application functionality on the

      server machine(s).

    Typically, the server provides more abstract, higher level services.

    The current trend is more towards fat servers in Client/Server Systems.

    The biggest advantage of using the fat server is that it is easier to

      manage because only the software on the servers needs to be changed.
Client/Server Application
 Has three functional units:

    Presentation logic or user interface (for example, ATM

     machines)

    Business logic (for example software that enables a customer

     to request an account balance)

    Data (for example, records of customer accounts)

 Functional units can reside on the client or on multiple servers
Two-Tier Architecture
 In the two-tier architecture, if the Client/Server application has a number
  of business rules needed to be processed, then those rules can reside at
  either the Client or at the Server.

 The architecture of any client/server environment is by definition at least a
  two-tier system, the client being the first tier and the server being the
  second.

 The Client requests services directly from server i.e. client communicates
  directly with the server without the help of another server or server
  process.

 For bigger, enterprise-class problems, use of this 2-tier approach has
  generated some problems.
Contd…
 As the application development is done on client side, maintenance cost of
  application, as well as client side tools etc. is expensive.

 That is why in 2-tier architecture the client is called ‘fat client’.

 Increased network load: Since actual processing of data takes on the
  remote client, the data has to be transported over the network.

 This leads to the increased network stress.

 As all the application logic is executed on the PCs, all these machine have
  to be updated in case of a new release.

 The procedure is complicated, expensive, prone to errors and time
  consuming.
Two-Tier Architecture - Internet
Three -Tier Architecture
 Reusability is hard to achieve if pieces of business logic must be distributed
  across systems and several databases are involved.

 To avoid embedding the application’s logic at both the database side and
  the client side, a third software tier is inserted in between

 In the three-tier architecture, most of the business logic is located in the
  middle tier.

 In this structure, when the business activity or business rules change, only
  the middle tier must be modified.

 In three-tier client/server system the client request are handled by
  intermediate servers which coordinate the execution of the client request
  with subordinate servers.
Three -Tier Architecture
Three -Tier Architecture

 The Middle Tier can be

    A Transaction Processing Monitor

    A Message Server

    An Application Server

    An Object Server
Three -Tier Architecture - Internet
N-tier Architecture

 As the 3-tier applications grew more complex, the basic 3 tiers

  got further sub-divided into many more logically distinct tiers.

 It is mostly the Business Tier that gets further divided into

  scalable and easily deployable sub-tiers.
Contd…
 Some of the benefits in moving from 3-tier to n-tier is as below:

    Easier maintenance and scalability of each tier, independent of the

      other tiers

    Distribution of processing intensive sub-layers on a separate high-end

      processor

    Development and deployment of each tier in the most suitable

      environment and technology.

    A lower tier can be used in more than one ways by multiple tiers in the

      upper layer for different environments like Web or client application UI.
Multi -Tier Architecture
Multi -Tier Architecture
Advantages of client - server

    Centralization - access, resources, and data security are

     controlled through the server

    Scalability - any element can be upgraded when needed

    Flexibility - new technology can be easily integrated into the

     system

    Interoperability - all components (clients, network, servers)

     work together
 Accessibility - server can be accessed remotely and across

  multiple platforms

 Ease of application development

 Lower total costs than “mainframe legacy systems”.

 User friendly - familiar point and click interface
Disadvantages of client – server model

• Dependability - when the server goes down, operations cease

• Maintenance cost

• Training cost

• Hardware cost

• Software cost

• Complexity

• Can cause network congestion
Evolution of c-s computing in future

 The future of computing is not the desktop, it's the Internet and the World Wide
  Web.

 The emerging Internet-standards-based architecture is Network-
  Centric Computing -- Applications that only exist on Networks and that can be
  made available to anyone, anywhere, anytime.

 N-Tier network-based computing allows lightweight thin-client devices such as
  Internet Browsers, Web-TV, Smart-Phones, Personal Digital Assistants (PDA's) and
  Networked Appliances to harness the virtually limitless power of the Internet.

 Net-Centric N-Tier architectures are rapidly becoming the cornerstone for
  enterprise application development and companies around the world are adopting
  it in order to get ahead in the emerging net economy.
Conclusion
 N-Tier systems use component based development techniques combined
  with the open industry standards of the Internet, to build powerful cross-
  platform applications which lower costs, are easier to maintain, provide
  greater efficiencies and fuel competitive advantage.

 To Infinity and Beyond! The new thing in the N-Tier model of computing is
  the ability to distribute independent objects over as many tiers as makes
  sense and then link them dynamically, as required, to
  provide unlimited application flexibility.

 Thus The future of client / server computing is to dynamically determine
  and assign where the computing resources for an application will reside.
References
http://www.scribd.com/doc/19101563/An-Introduction-
  to-Client-Server-Computing

file:///I:/ppt/ppt/Introduction%20to%20N%20Tier%20
   Architecture%20Design%20Approach%20-
   %20Developer%20Geeks.htm
Thank you

More Related Content

What's hot

Implementation levels of virtualization
Implementation levels of virtualizationImplementation levels of virtualization
Implementation levels of virtualizationGokulnath S
 
Positioning, pointing and drawing in Human computer Interaction
Positioning, pointing and drawing in Human computer Interaction Positioning, pointing and drawing in Human computer Interaction
Positioning, pointing and drawing in Human computer Interaction swarna sudha
 
Client server architecture
Client server architectureClient server architecture
Client server architectureRituBhargava7
 
Client-Server Computing
Client-Server ComputingClient-Server Computing
Client-Server ComputingCloudbells.com
 
Middleware and Middleware in distributed application
Middleware and Middleware in distributed applicationMiddleware and Middleware in distributed application
Middleware and Middleware in distributed applicationRishikese MR
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network servicesUc Man
 
Client server architecture
Client server architectureClient server architecture
Client server architectureBhargav Amin
 
Modules and modularization criteria
Modules and modularization criteriaModules and modularization criteria
Modules and modularization criteriaUmaselvi_R
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System AdministrationDuressa Teshome
 
Distributed Systems Architecture in Software Engineering SE11
Distributed Systems Architecture in Software Engineering SE11Distributed Systems Architecture in Software Engineering SE11
Distributed Systems Architecture in Software Engineering SE11koolkampus
 
Distributed System
Distributed SystemDistributed System
Distributed SystemIqra khalil
 
software cost factor
software cost factorsoftware cost factor
software cost factorAbinaya B
 
Software process and project metrics
Software process and project metricsSoftware process and project metrics
Software process and project metricsIndu Sharma Bhardwaj
 
Andrew File System
Andrew File SystemAndrew File System
Andrew File SystemAshish KC
 

What's hot (20)

Implementation levels of virtualization
Implementation levels of virtualizationImplementation levels of virtualization
Implementation levels of virtualization
 
Positioning, pointing and drawing in Human computer Interaction
Positioning, pointing and drawing in Human computer Interaction Positioning, pointing and drawing in Human computer Interaction
Positioning, pointing and drawing in Human computer Interaction
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
 
Client-Server Computing
Client-Server ComputingClient-Server Computing
Client-Server Computing
 
SOA Unit I
SOA Unit ISOA Unit I
SOA Unit I
 
Middleware and Middleware in distributed application
Middleware and Middleware in distributed applicationMiddleware and Middleware in distributed application
Middleware and Middleware in distributed application
 
Client server
Client serverClient server
Client server
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
 
Mobile databases
Mobile databasesMobile databases
Mobile databases
 
Distributed Computing
Distributed ComputingDistributed Computing
Distributed Computing
 
Modules and modularization criteria
Modules and modularization criteriaModules and modularization criteria
Modules and modularization criteria
 
Memory virtualization
Memory virtualizationMemory virtualization
Memory virtualization
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Distributed Systems Architecture in Software Engineering SE11
Distributed Systems Architecture in Software Engineering SE11Distributed Systems Architecture in Software Engineering SE11
Distributed Systems Architecture in Software Engineering SE11
 
Temporal databases
Temporal databasesTemporal databases
Temporal databases
 
Distributed System
Distributed SystemDistributed System
Distributed System
 
software cost factor
software cost factorsoftware cost factor
software cost factor
 
Software process and project metrics
Software process and project metricsSoftware process and project metrics
Software process and project metrics
 
Andrew File System
Andrew File SystemAndrew File System
Andrew File System
 

Viewers also liked

Client Server Computing Slides by Puja Dhar
Client Server Computing Slides by Puja DharClient Server Computing Slides by Puja Dhar
Client Server Computing Slides by Puja Dharpuja_dhar
 
Bluetooth an introduction
Bluetooth an introductionBluetooth an introduction
Bluetooth an introductionTech_MX
 
Eight ways to optimise your website
Eight ways to optimise your websiteEight ways to optimise your website
Eight ways to optimise your websiteNed Wells
 
Technology development of horticultural production perhorti
Technology development of horticultural production perhortiTechnology development of horticultural production perhorti
Technology development of horticultural production perhortiArjunawiwaha Pandawa
 
Collective identity
Collective identityCollective identity
Collective identityStellaK17
 
יסודות האימון היהודי
יסודות האימון היהודייסודות האימון היהודי
יסודות האימון היהודיBSDjewishcoaching
 
Ceragem jade bed presentation
Ceragem jade bed presentationCeragem jade bed presentation
Ceragem jade bed presentationAhmed Bahaa
 
Smart Client Development
Smart Client DevelopmentSmart Client Development
Smart Client DevelopmentTamir Khason
 
Client server computing_keypoint_and_questions
Client server computing_keypoint_and_questionsClient server computing_keypoint_and_questions
Client server computing_keypoint_and_questionslucky94527
 
Memory dbms
Memory dbmsMemory dbms
Memory dbmsTech_MX
 
Chapter 2 database architecture
Chapter 2 database architectureChapter 2 database architecture
Chapter 2 database architectureUra Euro
 
Merging files (Data Structure)
Merging files (Data Structure)Merging files (Data Structure)
Merging files (Data Structure)Tech_MX
 
Architecture of dbms(lecture 3)
Architecture of dbms(lecture 3)Architecture of dbms(lecture 3)
Architecture of dbms(lecture 3)Ravinder Kamboj
 
Introduction to the client server computing By Attaullah Hazrat
Introduction to the client server computing By Attaullah HazratIntroduction to the client server computing By Attaullah Hazrat
Introduction to the client server computing By Attaullah HazratAttaullah Hazrat
 
Client server-computing
Client server-computingClient server-computing
Client server-computingjayasreep3
 
Theory of estimation
Theory of estimationTheory of estimation
Theory of estimationTech_MX
 
A N S I S P A R C Architecture
A N S I  S P A R C  ArchitectureA N S I  S P A R C  Architecture
A N S I S P A R C ArchitectureSabeeh Ahmed
 

Viewers also liked (20)

Client Server Computing : unit 1
Client Server Computing : unit 1Client Server Computing : unit 1
Client Server Computing : unit 1
 
Client Server Computing Slides by Puja Dhar
Client Server Computing Slides by Puja DharClient Server Computing Slides by Puja Dhar
Client Server Computing Slides by Puja Dhar
 
Mood board
Mood boardMood board
Mood board
 
Bluetooth an introduction
Bluetooth an introductionBluetooth an introduction
Bluetooth an introduction
 
Eight ways to optimise your website
Eight ways to optimise your websiteEight ways to optimise your website
Eight ways to optimise your website
 
Technology development of horticultural production perhorti
Technology development of horticultural production perhortiTechnology development of horticultural production perhorti
Technology development of horticultural production perhorti
 
Collective identity
Collective identityCollective identity
Collective identity
 
יסודות האימון היהודי
יסודות האימון היהודייסודות האימון היהודי
יסודות האימון היהודי
 
Ceragem jade bed presentation
Ceragem jade bed presentationCeragem jade bed presentation
Ceragem jade bed presentation
 
Smart Client Development
Smart Client DevelopmentSmart Client Development
Smart Client Development
 
Client server computing_keypoint_and_questions
Client server computing_keypoint_and_questionsClient server computing_keypoint_and_questions
Client server computing_keypoint_and_questions
 
Memory dbms
Memory dbmsMemory dbms
Memory dbms
 
Chapter 2 database architecture
Chapter 2 database architectureChapter 2 database architecture
Chapter 2 database architecture
 
Database model BY ME
Database model BY MEDatabase model BY ME
Database model BY ME
 
Merging files (Data Structure)
Merging files (Data Structure)Merging files (Data Structure)
Merging files (Data Structure)
 
Architecture of dbms(lecture 3)
Architecture of dbms(lecture 3)Architecture of dbms(lecture 3)
Architecture of dbms(lecture 3)
 
Introduction to the client server computing By Attaullah Hazrat
Introduction to the client server computing By Attaullah HazratIntroduction to the client server computing By Attaullah Hazrat
Introduction to the client server computing By Attaullah Hazrat
 
Client server-computing
Client server-computingClient server-computing
Client server-computing
 
Theory of estimation
Theory of estimationTheory of estimation
Theory of estimation
 
A N S I S P A R C Architecture
A N S I  S P A R C  ArchitectureA N S I  S P A R C  Architecture
A N S I S P A R C Architecture
 

Similar to Client computing evolution ppt11

Similar to Client computing evolution ppt11 (20)

Clientserver
ClientserverClientserver
Clientserver
 
Odbc and data access objects
Odbc and data access objectsOdbc and data access objects
Odbc and data access objects
 
Client server computing
Client server computingClient server computing
Client server computing
 
Chapter2
Chapter2Chapter2
Chapter2
 
Client server computing
Client server computingClient server computing
Client server computing
 
Client/Server Architecture By Faisal Shahzad
Client/Server Architecture By Faisal Shahzad Client/Server Architecture By Faisal Shahzad
Client/Server Architecture By Faisal Shahzad
 
client-server-architecture.ppt
client-server-architecture.pptclient-server-architecture.ppt
client-server-architecture.ppt
 
client-server-architecture ss.ppt
client-server-architecture ss.pptclient-server-architecture ss.ppt
client-server-architecture ss.ppt
 
SOFTWARE COMPUTING
SOFTWARE COMPUTINGSOFTWARE COMPUTING
SOFTWARE COMPUTING
 
Client Server Architecture
Client Server ArchitectureClient Server Architecture
Client Server Architecture
 
Technical Architectures
Technical ArchitecturesTechnical Architectures
Technical Architectures
 
Part 1 network computing
Part 1 network computingPart 1 network computing
Part 1 network computing
 
Anil Nembang: Hures Company Case Study
 Anil Nembang: Hures Company Case Study Anil Nembang: Hures Company Case Study
Anil Nembang: Hures Company Case Study
 
Client server based computing
Client server based computingClient server based computing
Client server based computing
 
Client-Server Model
Client-Server ModelClient-Server Model
Client-Server Model
 
Client server architecture in .net by varun tiwari
Client server architecture in .net by varun tiwariClient server architecture in .net by varun tiwari
Client server architecture in .net by varun tiwari
 
Introduction and Basics to web technology .pptx
Introduction and Basics to web technology .pptxIntroduction and Basics to web technology .pptx
Introduction and Basics to web technology .pptx
 
client-server.pptx
client-server.pptxclient-server.pptx
client-server.pptx
 
Lecture5 architecture styles.pdf
Lecture5 architecture styles.pdfLecture5 architecture styles.pdf
Lecture5 architecture styles.pdf
 
unit 4-1.pptx
unit 4-1.pptxunit 4-1.pptx
unit 4-1.pptx
 

More from Tech_MX

Virtual base class
Virtual base classVirtual base class
Virtual base classTech_MX
 
Templates in C++
Templates in C++Templates in C++
Templates in C++Tech_MX
 
String & its application
String & its applicationString & its application
String & its applicationTech_MX
 
Statistical quality__control_2
Statistical  quality__control_2Statistical  quality__control_2
Statistical quality__control_2Tech_MX
 
Stack data structure
Stack data structureStack data structure
Stack data structureTech_MX
 
Stack Data Structure & It's Application
Stack Data Structure & It's Application Stack Data Structure & It's Application
Stack Data Structure & It's Application Tech_MX
 
Spanning trees & applications
Spanning trees & applicationsSpanning trees & applications
Spanning trees & applicationsTech_MX
 
Set data structure 2
Set data structure 2Set data structure 2
Set data structure 2Tech_MX
 
Set data structure
Set data structure Set data structure
Set data structure Tech_MX
 
Real time Operating System
Real time Operating SystemReal time Operating System
Real time Operating SystemTech_MX
 
Mouse interrupts (Assembly Language & C)
Mouse interrupts (Assembly Language & C)Mouse interrupts (Assembly Language & C)
Mouse interrupts (Assembly Language & C)Tech_MX
 
Motherboard of a pc
Motherboard of a pcMotherboard of a pc
Motherboard of a pcTech_MX
 
More on Lex
More on LexMore on Lex
More on LexTech_MX
 
MultiMedia dbms
MultiMedia dbmsMultiMedia dbms
MultiMedia dbmsTech_MX
 
Linear regression
Linear regressionLinear regression
Linear regressionTech_MX
 
Keyboard interrupt
Keyboard interruptKeyboard interrupt
Keyboard interruptTech_MX
 

More from Tech_MX (20)

Virtual base class
Virtual base classVirtual base class
Virtual base class
 
Uid
UidUid
Uid
 
Templates in C++
Templates in C++Templates in C++
Templates in C++
 
String & its application
String & its applicationString & its application
String & its application
 
Statistical quality__control_2
Statistical  quality__control_2Statistical  quality__control_2
Statistical quality__control_2
 
Stack data structure
Stack data structureStack data structure
Stack data structure
 
Stack Data Structure & It's Application
Stack Data Structure & It's Application Stack Data Structure & It's Application
Stack Data Structure & It's Application
 
Spss
SpssSpss
Spss
 
Spanning trees & applications
Spanning trees & applicationsSpanning trees & applications
Spanning trees & applications
 
Set data structure 2
Set data structure 2Set data structure 2
Set data structure 2
 
Set data structure
Set data structure Set data structure
Set data structure
 
Real time Operating System
Real time Operating SystemReal time Operating System
Real time Operating System
 
Parsing
ParsingParsing
Parsing
 
Mouse interrupts (Assembly Language & C)
Mouse interrupts (Assembly Language & C)Mouse interrupts (Assembly Language & C)
Mouse interrupts (Assembly Language & C)
 
Motherboard of a pc
Motherboard of a pcMotherboard of a pc
Motherboard of a pc
 
More on Lex
More on LexMore on Lex
More on Lex
 
MultiMedia dbms
MultiMedia dbmsMultiMedia dbms
MultiMedia dbms
 
Linkers
LinkersLinkers
Linkers
 
Linear regression
Linear regressionLinear regression
Linear regression
 
Keyboard interrupt
Keyboard interruptKeyboard interrupt
Keyboard interrupt
 

Recently uploaded

Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 

Recently uploaded (20)

Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 

Client computing evolution ppt11

  • 2. Agenda  Evolution of client computing  Mainframe computers  Personal computers  File server • Client –Server Computing • Two-tier Architecture • Three-tier Architecture • N-tier Architecture • Evolution of c-s computing in future • Conclusion
  • 3. DUMP TERMINAL MAINFRAME STILL PROCESSING ON MAIN FRAME PERSONAL COMPUTERS FILE SERVER CLIENT/SERVER 2-TIER 3-TIER N-TIER
  • 4. Mainframe –based Environment  In these networks, one large server (a mainframe computer) handled all aspects of the network, while each user accessed the main server from a terminal.  The data is processed on the mainframe and then delivered to the terminal.  The data transfer between the terminal and the mainframe increases network traffic and slows down requests from other terminals.
  • 5. Mainframe –based Environment contd…  There are some major problems with this approach:  Mainframe system are very inflexible.  Centralized DP department was unable to keep up with the demand for new applications.  high cost of purchase, maintenance and support.
  • 6. Personal Computer  Through the years, personal computers started to evolve and replaced these terminals but the processing is still process on the mainframes.  With the improvement in computer technology, the processing demands started to split between personal computers and mainframes.
  • 7. Contd…  The first PC networks were based on the file sharing.  In file sharing, the server simply downloads or transfers files from the shared location to your desktop  File sharing is simple and works as long as shared usage is low, update contention is very low, and the volume of data to be transferred is low compared with LAN capacity.
  • 8. Driving Forces Behind Client/server computing • Forces that drives the move to Client/Server computing widely can be classified in two general categories based on:  Business perspective.  Technology perspective.
  • 9. Business Perspective • Basically the business perspective should be kept in mind for obtaining the following achievements through the system:  For increased productivity.  Superior quality.  Improved responsiveness.  Focus on core business.
  • 10. Business Perspective contd… • The effective factors that govern the driving forces are given below:  The changing business environment.  Globalization: The world as a market.  The growing need for enterprise data access.  The demand for end user productivity gains based on the efficient use of data resources.
  • 11. Technology Perspective  Technological advances that have made Client/Server computing practical by proper use of the following:  Intelligent desktop devices.  Computer network architectures.  Technical advances like microprocessor technology, data communication and Internet Database system, operating system and graphical user interface.  Growing cost and performance advantages of PC-based platforms.  Enterprise network management.
  • 12. Client –Server Computing  The main emphasis of Client-Server Architecture is to allow large application to be split into smaller tasks and to perform the tasks among host (server machine) and desktops (client machine) in the network.  Client-Server Computing is divided into three components, a  Client Process  Server Process  Middleware
  • 13. Client –Server Computing contd… Client :  A Client is any process that requests specific services from the server process. The main operations of the client system are listed below:  Managing the user interface.  Accepts and checks the syntax of user inputs.  Processes application logic.  Generates database request and transmits to server.  Passes response back to server.
  • 14. Client –Server Computing contd… Server : • A Server is a process that provides requested services for the Client. The main operations of the server are listed below:  Accepts and processes database requests from client.  Checks authorization.  Ensures that integrity constraints are not violated.  Performs query/update processing and transmits responses to client.  Maintains system catalogue.  Provide concurrent database access.  Provides recovery control.
  • 15. Middleware • Middleware is software that runs between client and server processes. • It is the "glue" between the client and server, which makes it possible for them to communicate to each other. • Middleware is written in such a way that the user never notices it's presence. • It delivers secure and transparent services to users.
  • 16. Elements of C-S Computing Client Server Network Client machine Server machine
  • 17. Client/Server :Fat /Thin  A Client or a Server is so named depending on the extent to which the processing is shared between the client and server.  The concept of Fat Clients or Fat Servers is given by one of the important criterion, that is, how much of an application is placed at the client end vs. the server end.  Thin Client :  A thin client is one that conducts a minimum of processing on the client side . • Fat Client :  Fat client is one that carries a relatively larger proportion of processing load.
  • 18.  Thin server:  This architecture places less application functionality on the server machine.  For example file servers.  Fat Servers:  This architecture places more application functionality on the server machine(s).  Typically, the server provides more abstract, higher level services.  The current trend is more towards fat servers in Client/Server Systems.  The biggest advantage of using the fat server is that it is easier to manage because only the software on the servers needs to be changed.
  • 19. Client/Server Application  Has three functional units:  Presentation logic or user interface (for example, ATM machines)  Business logic (for example software that enables a customer to request an account balance)  Data (for example, records of customer accounts)  Functional units can reside on the client or on multiple servers
  • 20. Two-Tier Architecture  In the two-tier architecture, if the Client/Server application has a number of business rules needed to be processed, then those rules can reside at either the Client or at the Server.  The architecture of any client/server environment is by definition at least a two-tier system, the client being the first tier and the server being the second.  The Client requests services directly from server i.e. client communicates directly with the server without the help of another server or server process.  For bigger, enterprise-class problems, use of this 2-tier approach has generated some problems.
  • 21. Contd…  As the application development is done on client side, maintenance cost of application, as well as client side tools etc. is expensive.  That is why in 2-tier architecture the client is called ‘fat client’.  Increased network load: Since actual processing of data takes on the remote client, the data has to be transported over the network.  This leads to the increased network stress.  As all the application logic is executed on the PCs, all these machine have to be updated in case of a new release.  The procedure is complicated, expensive, prone to errors and time consuming.
  • 23. Three -Tier Architecture  Reusability is hard to achieve if pieces of business logic must be distributed across systems and several databases are involved.  To avoid embedding the application’s logic at both the database side and the client side, a third software tier is inserted in between  In the three-tier architecture, most of the business logic is located in the middle tier.  In this structure, when the business activity or business rules change, only the middle tier must be modified.  In three-tier client/server system the client request are handled by intermediate servers which coordinate the execution of the client request with subordinate servers.
  • 25. Three -Tier Architecture  The Middle Tier can be  A Transaction Processing Monitor  A Message Server  An Application Server  An Object Server
  • 27. N-tier Architecture  As the 3-tier applications grew more complex, the basic 3 tiers got further sub-divided into many more logically distinct tiers.  It is mostly the Business Tier that gets further divided into scalable and easily deployable sub-tiers.
  • 28. Contd…  Some of the benefits in moving from 3-tier to n-tier is as below:  Easier maintenance and scalability of each tier, independent of the other tiers  Distribution of processing intensive sub-layers on a separate high-end processor  Development and deployment of each tier in the most suitable environment and technology.  A lower tier can be used in more than one ways by multiple tiers in the upper layer for different environments like Web or client application UI.
  • 31. Advantages of client - server  Centralization - access, resources, and data security are controlled through the server  Scalability - any element can be upgraded when needed  Flexibility - new technology can be easily integrated into the system  Interoperability - all components (clients, network, servers) work together
  • 32.  Accessibility - server can be accessed remotely and across multiple platforms  Ease of application development  Lower total costs than “mainframe legacy systems”.  User friendly - familiar point and click interface
  • 33. Disadvantages of client – server model • Dependability - when the server goes down, operations cease • Maintenance cost • Training cost • Hardware cost • Software cost • Complexity • Can cause network congestion
  • 34. Evolution of c-s computing in future  The future of computing is not the desktop, it's the Internet and the World Wide Web.  The emerging Internet-standards-based architecture is Network- Centric Computing -- Applications that only exist on Networks and that can be made available to anyone, anywhere, anytime.  N-Tier network-based computing allows lightweight thin-client devices such as Internet Browsers, Web-TV, Smart-Phones, Personal Digital Assistants (PDA's) and Networked Appliances to harness the virtually limitless power of the Internet.  Net-Centric N-Tier architectures are rapidly becoming the cornerstone for enterprise application development and companies around the world are adopting it in order to get ahead in the emerging net economy.
  • 35. Conclusion  N-Tier systems use component based development techniques combined with the open industry standards of the Internet, to build powerful cross- platform applications which lower costs, are easier to maintain, provide greater efficiencies and fuel competitive advantage.  To Infinity and Beyond! The new thing in the N-Tier model of computing is the ability to distribute independent objects over as many tiers as makes sense and then link them dynamically, as required, to provide unlimited application flexibility.  Thus The future of client / server computing is to dynamically determine and assign where the computing resources for an application will reside.