SlideShare a Scribd company logo
1 of 2
Download to read offline
Client/Server Model
Applications may vary from single-tier desktop applications          (applications that follow the single-tier
architecture) to multi-tier applications (applications that follow the two-, three-,         or         n-tier
architecture).Based on the processing scenario, a business application can have the following elements:
     The User Interface or the presentation elements through which data is entered.
     The application logic or the business rule element, which helps in validating the entered data.
     The data storage or the data management element, which manages the storage and retrieval of data.

These elements form the base of the models or architectures used in application development. All these
elements can exist on the same computer as a single process or on different computers as different
processes. Depending on the placement of these elements the application architecture can be categorized
as:

    1.   Single-tier architecture
    2.   Two-tier architecture
    3.   Three-tier architecture
    4.   N-tier architecture

    1. Single-tier architecture
A single executable file handles all functions relating to the user, business, and data service layers. All
elements of a business application are combined as a single process. If multiple users need to work on this
application then it needs to be installed on the computer of every user. This type of architecture has one
disadvantage. In case some errors are identified in the application then after rectifying the same, the
application has to be installed again on the system of every user. This is time-consuming process.




                                    Figure 1.0 Single-tier architecture

    2. Two-tier architecture
In two tier architecture, the application is divided in to two parts. One part handles data, while the other
provides the user interface. Therefore, this architecture is called two-tier architecture. The part that handles
the UI is called the client tier. The part that implements the application logic and validates the input data
based on the business rules is called the Server tier, as shown in the following figure.




                                    Figure 1.1 Two-tier architecture
In this architecture, the mainteanance, upgrade and general administration of data is easier, as it exists only
on the server and not on all the clients.Two tier architecture is called the client server architecture. A client
sends the request for services and a server provides the service. Most RDBMS, such as Microsoft Access,
SQL Server, and Oracle, support client-server architecture. RDBMS provides centralized functionality
while supporting many users.
3. Three-tier architecture
When implementing complex business solutions in two-tier architecture, the tier on which the business
logic is implemented becomes over loaded. As a result, it takes more time to execute. Therefore, to provide
further flexibility, the two-tier architecture can be split into three tiers. In three tier architecture, the first
tier is the client tier. The second or the middle tier is called the business tier. The third tier is called the
Server tier. The server tier contains a database server that manages the data. All the three service layers
reside separately, either on the same machine or on different machines. In this architecture, an additional
tier called a business tier has been added between the client tier and the server tier, as shown in the
following figure.




                                   Figure 1.2 Three-tier architecture

The business tier consists of all the business rules. It consists of the application logic that implements
business rules and validates the data. The advantage of a three tier application is that it allows you to change
the business rules without affecting the other two tiers.

    4. N-tier architecture
As the business complexities increased, the business tier became larger and unmanageable. This led to the
evolution of n-tier architecture, where the business services model was divided into smaller manageable
units. N-tier is also called multi tier architecture. In this architecture, one components near the client tier is
responsible to do the client side validation and send the data to the presentation tier. Therefore, it is possible
to keep the UI-centric processing component on a computer near the client. The UI-centric processing
component is responsible for processing the data received from and sent to the presentation tier. Data-
centric processing components are responsible for accessing the data tier to retrieve, modify, and delete
data to and from the database server.The N-tier architecture consists of the following layers:

       Client tier
       UI-Centric processing components
       Data-Centric processing object
       Database Server

Applications that follow multi tier can be used across various locations. For example, in Web application,
an application is stored on the Web server. The clients access the applications from any location through
a browser. The clients make requests to the web server and receive responses.

More Related Content

What's hot

Soal trouble praktikum revisi
Soal trouble praktikum revisiSoal trouble praktikum revisi
Soal trouble praktikum revisi
Samsugi S
 
408372362-Student-Result-management-System-project-report-docx.docx
408372362-Student-Result-management-System-project-report-docx.docx408372362-Student-Result-management-System-project-report-docx.docx
408372362-Student-Result-management-System-project-report-docx.docx
santhoshyadav23
 
lecture2 computer graphics graphics hardware(Computer graphics tutorials)
 lecture2  computer graphics graphics hardware(Computer graphics tutorials) lecture2  computer graphics graphics hardware(Computer graphics tutorials)
lecture2 computer graphics graphics hardware(Computer graphics tutorials)
Daroko blog(www.professionalbloggertricks.com)
 
College mgmnt system
College mgmnt systemCollege mgmnt system
College mgmnt system
Sayali Birari
 
Line drawing algo.
Line drawing algo.Line drawing algo.
Line drawing algo.
Mohd Arif
 
SRS Of Social Networking
SRS Of Social NetworkingSRS Of Social Networking
SRS Of Social Networking
maaano786
 

What's hot (20)

Output primitives in Computer Graphics
Output primitives in Computer GraphicsOutput primitives in Computer Graphics
Output primitives in Computer Graphics
 
UNIT-IV
UNIT-IVUNIT-IV
UNIT-IV
 
Transport services
Transport servicesTransport services
Transport services
 
Soal trouble praktikum revisi
Soal trouble praktikum revisiSoal trouble praktikum revisi
Soal trouble praktikum revisi
 
Ppt of online job portal
Ppt of online job portalPpt of online job portal
Ppt of online job portal
 
Srand022 bluetooth based attendance management system
Srand022   bluetooth based attendance management systemSrand022   bluetooth based attendance management system
Srand022 bluetooth based attendance management system
 
Tcp and udp
Tcp and udpTcp and udp
Tcp and udp
 
408372362-Student-Result-management-System-project-report-docx.docx
408372362-Student-Result-management-System-project-report-docx.docx408372362-Student-Result-management-System-project-report-docx.docx
408372362-Student-Result-management-System-project-report-docx.docx
 
lecture2 computer graphics graphics hardware(Computer graphics tutorials)
 lecture2  computer graphics graphics hardware(Computer graphics tutorials) lecture2  computer graphics graphics hardware(Computer graphics tutorials)
lecture2 computer graphics graphics hardware(Computer graphics tutorials)
 
BRESENHAM’S LINE DRAWING ALGORITHM
BRESENHAM’S  LINE DRAWING ALGORITHMBRESENHAM’S  LINE DRAWING ALGORITHM
BRESENHAM’S LINE DRAWING ALGORITHM
 
FTP & TFTP
FTP & TFTPFTP & TFTP
FTP & TFTP
 
Frame buffer
Frame bufferFrame buffer
Frame buffer
 
Cs8591 u4
Cs8591 u4Cs8591 u4
Cs8591 u4
 
Attributes of output Primitive
Attributes of output Primitive Attributes of output Primitive
Attributes of output Primitive
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP model
 
College mgmnt system
College mgmnt systemCollege mgmnt system
College mgmnt system
 
Line drawing algo.
Line drawing algo.Line drawing algo.
Line drawing algo.
 
Output primitives computer graphics c version
Output primitives   computer graphics c versionOutput primitives   computer graphics c version
Output primitives computer graphics c version
 
SRS Of Social Networking
SRS Of Social NetworkingSRS Of Social Networking
SRS Of Social Networking
 
Final project presentation CSE
Final project presentation CSEFinal project presentation CSE
Final project presentation CSE
 

Viewers also liked

.NET Framework Overview
.NET Framework Overview.NET Framework Overview
.NET Framework Overview
Doncho Minkov
 
Introduction to Web Architecture
Introduction to Web ArchitectureIntroduction to Web Architecture
Introduction to Web Architecture
Chamnap Chhorn
 
Architecture of a Modern Web App
Architecture of a Modern Web AppArchitecture of a Modern Web App
Architecture of a Modern Web App
scothis
 
Pengembangan sbi
Pengembangan sbiPengembangan sbi
Pengembangan sbi
smkfarmasi
 
15 web tools for administrators
15 web tools for administrators15 web tools for administrators
15 web tools for administrators
Brandon Raymo
 
Una Igualdad Merecida; Jacinta Martínez Sánchez 4ºB
Una Igualdad Merecida; Jacinta Martínez Sánchez 4ºB Una Igualdad Merecida; Jacinta Martínez Sánchez 4ºB
Una Igualdad Merecida; Jacinta Martínez Sánchez 4ºB
sabinamora
 
50 sites 21st century skills
50 sites 21st century skills50 sites 21st century skills
50 sites 21st century skills
Brandon Raymo
 

Viewers also liked (20)

4 sdlc and stlc
4 sdlc and stlc4 sdlc and stlc
4 sdlc and stlc
 
8 Characteristics of good user requirements
8 Characteristics of good user requirements8 Characteristics of good user requirements
8 Characteristics of good user requirements
 
.NET Framework Overview
.NET Framework Overview.NET Framework Overview
.NET Framework Overview
 
Introduction to .net framework
Introduction to .net frameworkIntroduction to .net framework
Introduction to .net framework
 
Introduction to Web Architecture
Introduction to Web ArchitectureIntroduction to Web Architecture
Introduction to Web Architecture
 
Architecture of a Modern Web App
Architecture of a Modern Web AppArchitecture of a Modern Web App
Architecture of a Modern Web App
 
Pengembangan sbi
Pengembangan sbiPengembangan sbi
Pengembangan sbi
 
15 web tools for administrators
15 web tools for administrators15 web tools for administrators
15 web tools for administrators
 
Beni culturali - Daniela Fiore
Beni culturali  - Daniela FioreBeni culturali  - Daniela Fiore
Beni culturali - Daniela Fiore
 
Daur baur Digital activation
Daur baur Digital activationDaur baur Digital activation
Daur baur Digital activation
 
Presentación2
Presentación2Presentación2
Presentación2
 
Thesis
ThesisThesis
Thesis
 
Una Igualdad Merecida; Jacinta Martínez Sánchez 4ºB
Una Igualdad Merecida; Jacinta Martínez Sánchez 4ºB Una Igualdad Merecida; Jacinta Martínez Sánchez 4ºB
Una Igualdad Merecida; Jacinta Martínez Sánchez 4ºB
 
J query 17-visual-cheat-sheet
J query 17-visual-cheat-sheetJ query 17-visual-cheat-sheet
J query 17-visual-cheat-sheet
 
Resume1
Resume1Resume1
Resume1
 
ValeryBassenkoResume
ValeryBassenkoResumeValeryBassenkoResume
ValeryBassenkoResume
 
Why Form a Health Professions Training Program at Your Federally Qualified H...
Why Form a Health Professions Training Program at Your  Federally Qualified H...Why Form a Health Professions Training Program at Your  Federally Qualified H...
Why Form a Health Professions Training Program at Your Federally Qualified H...
 
50 sites 21st century skills
50 sites 21st century skills50 sites 21st century skills
50 sites 21st century skills
 
Bid’ah, apakah itu
Bid’ah, apakah ituBid’ah, apakah itu
Bid’ah, apakah itu
 
Introducing PhoneGap to SproutCore 2
Introducing PhoneGap to SproutCore 2Introducing PhoneGap to SproutCore 2
Introducing PhoneGap to SproutCore 2
 

Similar to Client server architecture in .net by varun tiwari

Chapter2
Chapter2Chapter2
Chapter2
suks_87
 
Client computing evolution ppt11
Client computing evolution ppt11Client computing evolution ppt11
Client computing evolution ppt11
Tech_MX
 
Differences Between Architectures
Differences Between ArchitecturesDifferences Between Architectures
Differences Between Architectures
prasadsmn
 
N tier architecture
N tier architectureN tier architecture
N tier architecture
Nidhi Saurav
 

Similar to Client server architecture in .net by varun tiwari (20)

2-Tier and 3-Tier Architecture of Enterprise Resource Planning
2-Tier and 3-Tier Architecture of Enterprise Resource Planning2-Tier and 3-Tier Architecture of Enterprise Resource Planning
2-Tier and 3-Tier Architecture of Enterprise Resource Planning
 
Introductuction of sql server gain america
Introductuction of sql server  gain americaIntroductuction of sql server  gain america
Introductuction of sql server gain america
 
Chapter2
Chapter2Chapter2
Chapter2
 
Client computing evolution ppt11
Client computing evolution ppt11Client computing evolution ppt11
Client computing evolution ppt11
 
Client/Server Architecture By Faisal Shahzad
Client/Server Architecture By Faisal Shahzad Client/Server Architecture By Faisal Shahzad
Client/Server Architecture By Faisal Shahzad
 
Web Based Application for Rent or Sale
Web Based Application for Rent or SaleWeb Based Application for Rent or Sale
Web Based Application for Rent or Sale
 
Appathika.ppt
Appathika.pptAppathika.ppt
Appathika.ppt
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
 
two tier and three tier
two tier and three tiertwo tier and three tier
two tier and three tier
 
Dispute Resolution Web Application
Dispute Resolution Web ApplicationDispute Resolution Web Application
Dispute Resolution Web Application
 
Differences Between Architectures
Differences Between ArchitecturesDifferences Between Architectures
Differences Between Architectures
 
A
AA
A
 
Mobile Responsive Social Corporate Intranet Portal Application
Mobile Responsive Social Corporate Intranet Portal ApplicationMobile Responsive Social Corporate Intranet Portal Application
Mobile Responsive Social Corporate Intranet Portal Application
 
Odbc and data access objects
Odbc and data access objectsOdbc and data access objects
Odbc and data access objects
 
J2 ee archi
J2 ee archiJ2 ee archi
J2 ee archi
 
3 tier architecture
3 tier architecture3 tier architecture
3 tier architecture
 
N tier architecture
N tier architectureN tier architecture
N tier architecture
 
N tier architecture
N tier architectureN tier architecture
N tier architecture
 
N tier architecture
N tier architectureN tier architecture
N tier architecture
 
N tier architecture
N tier architectureN tier architecture
N tier architecture
 

More from Bosco Technical Training Society, Don Bosco Technical School (Aff. GGSIP University, New Delhi)

More from Bosco Technical Training Society, Don Bosco Technical School (Aff. GGSIP University, New Delhi) (20)

String Manipulation Function and Header File Functions
String Manipulation Function and Header File FunctionsString Manipulation Function and Header File Functions
String Manipulation Function and Header File Functions
 
C Structure and Union in C
C Structure and Union in CC Structure and Union in C
C Structure and Union in C
 
Preprocessor Directive in C
Preprocessor Directive in CPreprocessor Directive in C
Preprocessor Directive in C
 
File Handling in C Programming
File Handling in C ProgrammingFile Handling in C Programming
File Handling in C Programming
 
Bit field enum and command line arguments
Bit field enum and command line argumentsBit field enum and command line arguments
Bit field enum and command line arguments
 
Pointers in C and Dynamic Memory Allocation
Pointers in C and Dynamic Memory AllocationPointers in C and Dynamic Memory Allocation
Pointers in C and Dynamic Memory Allocation
 
Array in C
Array in CArray in C
Array in C
 
C storage class
C storage classC storage class
C storage class
 
Function in C Programming
Function in C ProgrammingFunction in C Programming
Function in C Programming
 
C Constructs (C Statements & Loop)
C Constructs (C Statements & Loop)C Constructs (C Statements & Loop)
C Constructs (C Statements & Loop)
 
C Operators
C OperatorsC Operators
C Operators
 
C programming Basics
C programming BasicsC programming Basics
C programming Basics
 
Software Development Skills and SDLC
Software Development Skills and SDLCSoftware Development Skills and SDLC
Software Development Skills and SDLC
 
Mobile commerce
Mobile commerceMobile commerce
Mobile commerce
 
E commerce application
E commerce applicationE commerce application
E commerce application
 
Data normalization
Data normalizationData normalization
Data normalization
 
Html Form Controls
Html Form ControlsHtml Form Controls
Html Form Controls
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
ER to Relational Mapping
ER to Relational MappingER to Relational Mapping
ER to Relational Mapping
 
Entity Relationship Model
Entity Relationship ModelEntity Relationship Model
Entity Relationship Model
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Client server architecture in .net by varun tiwari

  • 1. Client/Server Model Applications may vary from single-tier desktop applications (applications that follow the single-tier architecture) to multi-tier applications (applications that follow the two-, three-, or n-tier architecture).Based on the processing scenario, a business application can have the following elements:  The User Interface or the presentation elements through which data is entered.  The application logic or the business rule element, which helps in validating the entered data.  The data storage or the data management element, which manages the storage and retrieval of data. These elements form the base of the models or architectures used in application development. All these elements can exist on the same computer as a single process or on different computers as different processes. Depending on the placement of these elements the application architecture can be categorized as: 1. Single-tier architecture 2. Two-tier architecture 3. Three-tier architecture 4. N-tier architecture 1. Single-tier architecture A single executable file handles all functions relating to the user, business, and data service layers. All elements of a business application are combined as a single process. If multiple users need to work on this application then it needs to be installed on the computer of every user. This type of architecture has one disadvantage. In case some errors are identified in the application then after rectifying the same, the application has to be installed again on the system of every user. This is time-consuming process. Figure 1.0 Single-tier architecture 2. Two-tier architecture In two tier architecture, the application is divided in to two parts. One part handles data, while the other provides the user interface. Therefore, this architecture is called two-tier architecture. The part that handles the UI is called the client tier. The part that implements the application logic and validates the input data based on the business rules is called the Server tier, as shown in the following figure. Figure 1.1 Two-tier architecture In this architecture, the mainteanance, upgrade and general administration of data is easier, as it exists only on the server and not on all the clients.Two tier architecture is called the client server architecture. A client sends the request for services and a server provides the service. Most RDBMS, such as Microsoft Access, SQL Server, and Oracle, support client-server architecture. RDBMS provides centralized functionality while supporting many users.
  • 2. 3. Three-tier architecture When implementing complex business solutions in two-tier architecture, the tier on which the business logic is implemented becomes over loaded. As a result, it takes more time to execute. Therefore, to provide further flexibility, the two-tier architecture can be split into three tiers. In three tier architecture, the first tier is the client tier. The second or the middle tier is called the business tier. The third tier is called the Server tier. The server tier contains a database server that manages the data. All the three service layers reside separately, either on the same machine or on different machines. In this architecture, an additional tier called a business tier has been added between the client tier and the server tier, as shown in the following figure. Figure 1.2 Three-tier architecture The business tier consists of all the business rules. It consists of the application logic that implements business rules and validates the data. The advantage of a three tier application is that it allows you to change the business rules without affecting the other two tiers. 4. N-tier architecture As the business complexities increased, the business tier became larger and unmanageable. This led to the evolution of n-tier architecture, where the business services model was divided into smaller manageable units. N-tier is also called multi tier architecture. In this architecture, one components near the client tier is responsible to do the client side validation and send the data to the presentation tier. Therefore, it is possible to keep the UI-centric processing component on a computer near the client. The UI-centric processing component is responsible for processing the data received from and sent to the presentation tier. Data- centric processing components are responsible for accessing the data tier to retrieve, modify, and delete data to and from the database server.The N-tier architecture consists of the following layers:  Client tier  UI-Centric processing components  Data-Centric processing object  Database Server Applications that follow multi tier can be used across various locations. For example, in Web application, an application is stored on the Web server. The clients access the applications from any location through a browser. The clients make requests to the web server and receive responses.