SlideShare a Scribd company logo
1 of 27
Understanding Networked Applications:
A First Course
Chapter 5
by
David G. Messerschmitt
Understanding Networked Applications A First Course2
Client
host
Server
host
Client
host
Understanding Networked Applications A First Course3
Part of the rationale
• Specialization:
– Clients specialize in user interface
– Servers specialize in managing data and
application logic
• Sharing:
– Many clients can be supported by few servers
– Often data and logic are shared among
applications and users
Understanding Networked Applications A First Course4
Client/server
Peer-to-peerServer
“I want to access
some information”
“I want to
collaborate
with my
colleague”
Client
Understanding Networked Applications A First Course5
Distinctions
• Client-server
– Asymmetric relationship
– Client predominately makes requests, server
makes replies
• Peer-to-peer
– Symmetric relationship
Understanding Networked Applications A First Course6
Client
Server
Client
Email client sends
message to server
Message is stored
on POP server
Later, recipient’s
email client
retrieves message
from server
Email application
Understanding Networked Applications A First Course7
Client
Server
Client
Chat clients send
user’s typing to server
Chat server
aggregates typing
from all users and
sends to all clients
Other user’s clients
display aggregated
typing from chat
server
Chat application
Understanding Networked Applications A First Course8
Presentation
Application
logic
Shared
data
Local-area network
Note: many clients per
application server, several
application servers per data
server
Three-tier client/server
Understanding Networked Applications A First Course9
Client
Web
browser
Web
server
Application
logic
Databases
and DBMS
Common
gateway
interchange
Host architecture
Application partition
Understanding Networked Applications A First Course10
Practice in defining tiers
• Online bookseller (e.g. amazon.com)
• Stock trading system (e.g. Schwab or E-
trade)
Understanding Networked Applications A First Course11
amazon.com
Understanding Networked Applications A First Course12
Schwab
Understanding Networked Applications A First Course13
Question
• What types of social applications would be
appropriate for a client/server architecture?
Understanding Networked Applications A First Course14
Departments
Enterprise
Commerce
Enterprise-to-enterprise
Consumer
Understanding Networked Applications A First Course15
Customers
Consumer Enterprise
Customer-service
department
Technical-support
department
software4u.com
Understanding Networked Applications A First Course16
Web server
Customer logic
Customer
audit
Software
documentation
Web
browser
Problem
knowledge
base
Databases
Agent logic
Consumer
application
Enterprise
application
Technician logic
Web server
Web
browser
Web server
Web
browser
Customercare
Understanding Networked Applications A First Course17
Accounts Products Orders
Customer logic
Databases
Agent logic
Customers Agents Technicians
Technician logic
Understanding Networked Applications A First Course18
Book distribution
centers
books4u.com
Customers
Financial institution
Consumer Enterprise Inter-enterprise
Understanding Networked Applications A First Course19
Web server
Customer logic
Customers Merchandise
Web
browser
Orders
Acquirer
bank
Book
distributors
Databases
Outside links
Fullfillment logic
Consumer
e-commerce
Inter-enterprise
e-commerceBookmerchant
Understanding Networked Applications A First Course20
Clients
Customers Merchandise
Acquirer
bank
Book
distributorsOrders
Customer logic
Databases
Fullfillment logic
Understanding Networked Applications A First Course21
Stock market
stocks4u.com
Customers
Information providers
Consumer Enterprise Inter-enterprise
Understanding Networked Applications A First Course22
Web server
Customer logic
Accounts Products
Web
browser
Orders
Information
providers
Financial
markets
Databases
Outside links
Trading logic
Consumer
e-commerce
Inter-enterprise
e-commerceStocktrader
Understanding Networked Applications A First Course23
Clients
Accounts Products
Information
providers
Financial
marketsOrders
Customer logic
Databases
Trading logic
Understanding Networked Applications A First Course24
Local florists
flowers4u.com
Customers
Financial institution
Consumer Enterprise Inter-enterprise
Understanding Networked Applications A First Course25
Web server
Customer logic
Accounts Products
Web
browser
Orders
Acquirer
bank
Databases
Outside link
Fullfillment logic
Consumer
e-commerce
Inter-enterprise
e-commerce
Push client
Push
server
Floristdelivery
Understanding Networked Applications A First Course26
Accounts Products
Acquirer
bank
Orders
Customer logic
Databases
Fullfillment logic
Customers Florists
Understanding Networked Applications A First Course27
Shortcomings of client/server
• Departmental solution
• Proliferates non-interoperable technologies
and applications
• Hardwired applications lose flexibility
What are some goals and likely
characteristics of future enterprise
architectures?

More Related Content

Similar to 05

Chapter 8: ERP and Electronic Commerce
Chapter 8: ERP and Electronic CommerceChapter 8: ERP and Electronic Commerce
Chapter 8: ERP and Electronic CommerceQuang Ngoc
 
Building Real-time Push APIs Using Kafka as the Customer Facing Interface wit...
Building Real-time Push APIs Using Kafka as the Customer Facing Interface wit...Building Real-time Push APIs Using Kafka as the Customer Facing Interface wit...
Building Real-time Push APIs Using Kafka as the Customer Facing Interface wit...HostedbyConfluent
 
HTTP Server Push Techniques
HTTP Server Push TechniquesHTTP Server Push Techniques
HTTP Server Push TechniquesFolio3 Software
 
APIdays Singapore 2019 - Business of APIs: From Integration to Monetisation, ...
APIdays Singapore 2019 - Business of APIs: From Integration to Monetisation, ...APIdays Singapore 2019 - Business of APIs: From Integration to Monetisation, ...
APIdays Singapore 2019 - Business of APIs: From Integration to Monetisation, ...apidays
 
Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic designudhayakumarc1
 
SWsoft Hosting Solutions for SaaS
SWsoft Hosting Solutions for SaaSSWsoft Hosting Solutions for SaaS
SWsoft Hosting Solutions for SaaSwebhostingguy
 
Confirm Client Requirements
Confirm Client RequirementsConfirm Client Requirements
Confirm Client RequirementsSteven Cahill
 
Designing a Future-proof API Program
Designing a Future-proof API ProgramDesigning a Future-proof API Program
Designing a Future-proof API ProgramPronovix
 
ppt-3-iotlogicdesign-210125034351.pptx
ppt-3-iotlogicdesign-210125034351.pptxppt-3-iotlogicdesign-210125034351.pptx
ppt-3-iotlogicdesign-210125034351.pptxjohnpragasam1
 
Lecture 11 client_server_interaction
Lecture 11 client_server_interactionLecture 11 client_server_interaction
Lecture 11 client_server_interactionSerious_SamSoul
 
Siten Software Company Profile - Updated Sep./2016
Siten Software Company Profile - Updated Sep./2016Siten Software Company Profile - Updated Sep./2016
Siten Software Company Profile - Updated Sep./2016Vu Tuyen Hoang
 
Performance Testing: Putting Cloud Customers Back in the Driver’s Seat
Performance Testing:  Putting Cloud Customers Back in the Driver’s SeatPerformance Testing:  Putting Cloud Customers Back in the Driver’s Seat
Performance Testing: Putting Cloud Customers Back in the Driver’s SeatCompuware APM
 
Optimizing Network Connectivity to your Data Center
Optimizing Network Connectivity to your Data CenterOptimizing Network Connectivity to your Data Center
Optimizing Network Connectivity to your Data CenterThousandEyes
 
Application-Servers.pdf
Application-Servers.pdfApplication-Servers.pdf
Application-Servers.pdfSamir Paul
 

Similar to 05 (20)

Chapter 8: ERP and Electronic Commerce
Chapter 8: ERP and Electronic CommerceChapter 8: ERP and Electronic Commerce
Chapter 8: ERP and Electronic Commerce
 
Building Real-time Push APIs Using Kafka as the Customer Facing Interface wit...
Building Real-time Push APIs Using Kafka as the Customer Facing Interface wit...Building Real-time Push APIs Using Kafka as the Customer Facing Interface wit...
Building Real-time Push APIs Using Kafka as the Customer Facing Interface wit...
 
HTTP Server Push Techniques
HTTP Server Push TechniquesHTTP Server Push Techniques
HTTP Server Push Techniques
 
APIdays Singapore 2019 - Business of APIs: From Integration to Monetisation, ...
APIdays Singapore 2019 - Business of APIs: From Integration to Monetisation, ...APIdays Singapore 2019 - Business of APIs: From Integration to Monetisation, ...
APIdays Singapore 2019 - Business of APIs: From Integration to Monetisation, ...
 
Web engineering cse ru
Web engineering cse ruWeb engineering cse ru
Web engineering cse ru
 
Ecom
EcomEcom
Ecom
 
elc200day9.ppt
elc200day9.pptelc200day9.ppt
elc200day9.ppt
 
Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic design
 
Msia711.05
Msia711.05Msia711.05
Msia711.05
 
SWsoft Hosting Solutions for SaaS
SWsoft Hosting Solutions for SaaSSWsoft Hosting Solutions for SaaS
SWsoft Hosting Solutions for SaaS
 
Confirm Client Requirements
Confirm Client RequirementsConfirm Client Requirements
Confirm Client Requirements
 
Designing a Future-proof API Program
Designing a Future-proof API ProgramDesigning a Future-proof API Program
Designing a Future-proof API Program
 
ppt-3-iotlogicdesign-210125034351.pptx
ppt-3-iotlogicdesign-210125034351.pptxppt-3-iotlogicdesign-210125034351.pptx
ppt-3-iotlogicdesign-210125034351.pptx
 
Lecture 11 client_server_interaction
Lecture 11 client_server_interactionLecture 11 client_server_interaction
Lecture 11 client_server_interaction
 
Rohan_Purekar
Rohan_PurekarRohan_Purekar
Rohan_Purekar
 
chapter 2.pdf
chapter 2.pdfchapter 2.pdf
chapter 2.pdf
 
Siten Software Company Profile - Updated Sep./2016
Siten Software Company Profile - Updated Sep./2016Siten Software Company Profile - Updated Sep./2016
Siten Software Company Profile - Updated Sep./2016
 
Performance Testing: Putting Cloud Customers Back in the Driver’s Seat
Performance Testing:  Putting Cloud Customers Back in the Driver’s SeatPerformance Testing:  Putting Cloud Customers Back in the Driver’s Seat
Performance Testing: Putting Cloud Customers Back in the Driver’s Seat
 
Optimizing Network Connectivity to your Data Center
Optimizing Network Connectivity to your Data CenterOptimizing Network Connectivity to your Data Center
Optimizing Network Connectivity to your Data Center
 
Application-Servers.pdf
Application-Servers.pdfApplication-Servers.pdf
Application-Servers.pdf
 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

05

  • 1. Understanding Networked Applications: A First Course Chapter 5 by David G. Messerschmitt
  • 2. Understanding Networked Applications A First Course2 Client host Server host Client host
  • 3. Understanding Networked Applications A First Course3 Part of the rationale • Specialization: – Clients specialize in user interface – Servers specialize in managing data and application logic • Sharing: – Many clients can be supported by few servers – Often data and logic are shared among applications and users
  • 4. Understanding Networked Applications A First Course4 Client/server Peer-to-peerServer “I want to access some information” “I want to collaborate with my colleague” Client
  • 5. Understanding Networked Applications A First Course5 Distinctions • Client-server – Asymmetric relationship – Client predominately makes requests, server makes replies • Peer-to-peer – Symmetric relationship
  • 6. Understanding Networked Applications A First Course6 Client Server Client Email client sends message to server Message is stored on POP server Later, recipient’s email client retrieves message from server Email application
  • 7. Understanding Networked Applications A First Course7 Client Server Client Chat clients send user’s typing to server Chat server aggregates typing from all users and sends to all clients Other user’s clients display aggregated typing from chat server Chat application
  • 8. Understanding Networked Applications A First Course8 Presentation Application logic Shared data Local-area network Note: many clients per application server, several application servers per data server Three-tier client/server
  • 9. Understanding Networked Applications A First Course9 Client Web browser Web server Application logic Databases and DBMS Common gateway interchange Host architecture Application partition
  • 10. Understanding Networked Applications A First Course10 Practice in defining tiers • Online bookseller (e.g. amazon.com) • Stock trading system (e.g. Schwab or E- trade)
  • 11. Understanding Networked Applications A First Course11 amazon.com
  • 12. Understanding Networked Applications A First Course12 Schwab
  • 13. Understanding Networked Applications A First Course13 Question • What types of social applications would be appropriate for a client/server architecture?
  • 14. Understanding Networked Applications A First Course14 Departments Enterprise Commerce Enterprise-to-enterprise Consumer
  • 15. Understanding Networked Applications A First Course15 Customers Consumer Enterprise Customer-service department Technical-support department software4u.com
  • 16. Understanding Networked Applications A First Course16 Web server Customer logic Customer audit Software documentation Web browser Problem knowledge base Databases Agent logic Consumer application Enterprise application Technician logic Web server Web browser Web server Web browser Customercare
  • 17. Understanding Networked Applications A First Course17 Accounts Products Orders Customer logic Databases Agent logic Customers Agents Technicians Technician logic
  • 18. Understanding Networked Applications A First Course18 Book distribution centers books4u.com Customers Financial institution Consumer Enterprise Inter-enterprise
  • 19. Understanding Networked Applications A First Course19 Web server Customer logic Customers Merchandise Web browser Orders Acquirer bank Book distributors Databases Outside links Fullfillment logic Consumer e-commerce Inter-enterprise e-commerceBookmerchant
  • 20. Understanding Networked Applications A First Course20 Clients Customers Merchandise Acquirer bank Book distributorsOrders Customer logic Databases Fullfillment logic
  • 21. Understanding Networked Applications A First Course21 Stock market stocks4u.com Customers Information providers Consumer Enterprise Inter-enterprise
  • 22. Understanding Networked Applications A First Course22 Web server Customer logic Accounts Products Web browser Orders Information providers Financial markets Databases Outside links Trading logic Consumer e-commerce Inter-enterprise e-commerceStocktrader
  • 23. Understanding Networked Applications A First Course23 Clients Accounts Products Information providers Financial marketsOrders Customer logic Databases Trading logic
  • 24. Understanding Networked Applications A First Course24 Local florists flowers4u.com Customers Financial institution Consumer Enterprise Inter-enterprise
  • 25. Understanding Networked Applications A First Course25 Web server Customer logic Accounts Products Web browser Orders Acquirer bank Databases Outside link Fullfillment logic Consumer e-commerce Inter-enterprise e-commerce Push client Push server Floristdelivery
  • 26. Understanding Networked Applications A First Course26 Accounts Products Acquirer bank Orders Customer logic Databases Fullfillment logic Customers Florists
  • 27. Understanding Networked Applications A First Course27 Shortcomings of client/server • Departmental solution • Proliferates non-interoperable technologies and applications • Hardwired applications lose flexibility What are some goals and likely characteristics of future enterprise architectures?

Editor's Notes

  1. Copyright 1999, University of California Jul 29, 2013
  2. Copyright 1999, University of California Jul 29, 2013
  3. Copyright 1999, University of California Jul 29, 2013
  4. Copyright 1999, University of California Jul 29, 2013
  5. Copyright 1999, University of California Jul 29, 2013 What is presentation, application logic, shared data? Presentation: Web browser Application logic Shared data
  6. Copyright 1999, University of California Jul 29, 2013 What is presentation, application logic, shared data?
  7. Copyright 1999, University of California Jul 29, 2013 Deferred applications need a server -- you wouldn’t want communication to fail because a client was turned off, and there is often a “consolidation” function (example chatroom) Immediate applications can be done peer-to-peer -- if a client is turned off, no point to the application anyway. Also avoids server bottlenecks. Server may still have a role is filtering or consolidation.
  8. Copyright 1999, University of California Jul 29, 2013 Major goal: flexibility to meet new business opportunities and new organizational structures More tiers to logically decouple roles Away from stovepipe: horizontal as well as vertical structure