SlideShare a Scribd company logo
1 of 37
Agenda
 Evolution of client computing
 Mainframe computers
 Personal computers
    File server

• Client –Server Computing
• Two-tier Architecture
• Three-tier Architecture
• N-tier Architecture
• Evolution of c-s computing in future
• Conclusion
DUMP TERMINAL

MAINFRAME
                      STILL PROCESSING
                       ON MAIN FRAME


  PERSONAL
 COMPUTERS


                   FILE SERVER
CLIENT/SERVER




    2-TIER



    3-TIER


    N-TIER
Mainframe –based Environment
 In these networks, one large server (a mainframe computer)
  handled all aspects of the network, while each user accessed
  the main server from a terminal.

 The data is processed on the mainframe and then delivered to
  the terminal.

 The data transfer between the terminal and the mainframe
  increases network traffic and slows down requests from other
  terminals.
Mainframe –based Environment contd…
 There are some major problems with this approach:

    Mainframe system are very inflexible.

    Centralized DP department was unable to keep up with the

    demand for new applications.

    high cost of purchase, maintenance and support.
Personal Computer

 Through the years, personal computers started to evolve and
  replaced these terminals but the processing is still process on
  the mainframes.

 With the improvement in computer technology, the
  processing demands started to split between personal
  computers and mainframes.
Contd…

 The first PC networks were based on the file sharing.

 In file sharing, the server simply downloads or transfers files
  from the shared location to your desktop

 File sharing is simple and works as long as shared usage is
  low, update contention is very low, and the volume of data to
  be transferred is low compared with LAN capacity.
Driving Forces Behind Client/server computing


• Forces that drives the move to Client/Server computing widely
  can be classified in two general categories based on:



        Business perspective.

        Technology perspective.
Business Perspective
• Basically the business perspective should be kept in mind for
  obtaining the following achievements through the system:


    For increased productivity.

    Superior quality.

    Improved responsiveness.

    Focus on core business.
Business Perspective contd…
• The effective factors that govern the driving forces are given below:



    The changing business environment.

    Globalization: The world as a market.

    The growing need for enterprise data access.

    The demand for end user productivity gains based on the
     efficient use of data resources.
Technology Perspective

 Technological advances that have made Client/Server computing practical
  by proper use of the following:

    Intelligent desktop devices.

    Computer network architectures.

    Technical advances like microprocessor technology, data

     communication and Internet Database system, operating system and
     graphical user interface.

    Growing cost and performance advantages of PC-based platforms.

    Enterprise network management.
Client –Server Computing
 The main emphasis of Client-Server Architecture is to allow large
  application to be split into smaller tasks and to perform the tasks among
  host (server machine) and desktops (client machine) in the network.



 Client-Server Computing is divided into three components, a

    Client Process

    Server Process

    Middleware
Client –Server Computing contd…

Client :
 A Client is any process that requests specific services from the server
  process.

      The main operations of the client system are listed below:

          Managing the user interface.

          Accepts and checks the syntax of user inputs.

          Processes application logic.

          Generates database request and transmits to server.

          Passes response back to server.
Client –Server Computing contd…
Server :
•   A Server is a process that provides requested services for the Client.

    The main operations of the server are listed below:

     Accepts and processes database requests from client.

     Checks authorization.

     Ensures that integrity constraints are not violated.

     Performs query/update processing and transmits responses to client.

     Maintains system catalogue.

     Provide concurrent database access.

     Provides recovery control.
Middleware
• Middleware is software that runs between client and server
  processes.

• It is the "glue" between the client and server, which makes it
  possible for them to communicate to each other.

• Middleware is written in such a way that the user never
  notices it's presence.

• It delivers secure and transparent services to users.
Elements of C-S Computing




    Client                         Server
                      Network


Client machine                  Server machine
Client/Server :Fat /Thin
 A Client or a Server is so named depending on the extent to which the
  processing is shared between the client and server.

 The concept of Fat Clients or Fat Servers is given by one of the
  important criterion, that is, how much of an application is placed at the
  client end vs. the server end.

 Thin Client :

    A thin client is one that conducts a minimum of processing on the

      client side .

• Fat Client :

    Fat client is one that carries a relatively larger proportion of processing

      load.
 Thin server:

    This architecture places less application functionality on the server

      machine.

    For example file servers.

 Fat Servers:

    This architecture places more application functionality on the

      server machine(s).

    Typically, the server provides more abstract, higher level services.

    The current trend is more towards fat servers in Client/Server Systems.

    The biggest advantage of using the fat server is that it is easier to

      manage because only the software on the servers needs to be changed.
Client/Server Application
 Has three functional units:

    Presentation logic or user interface (for example, ATM

     machines)

    Business logic (for example software that enables a customer

     to request an account balance)

    Data (for example, records of customer accounts)

 Functional units can reside on the client or on multiple servers
Two-Tier Architecture
 In the two-tier architecture, if the Client/Server application has a number
  of business rules needed to be processed, then those rules can reside at
  either the Client or at the Server.

 The architecture of any client/server environment is by definition at least a
  two-tier system, the client being the first tier and the server being the
  second.

 The Client requests services directly from server i.e. client communicates
  directly with the server without the help of another server or server
  process.

 For bigger, enterprise-class problems, use of this 2-tier approach has
  generated some problems.
Contd…
 As the application development is done on client side, maintenance cost of
  application, as well as client side tools etc. is expensive.

 That is why in 2-tier architecture the client is called ‘fat client’.

 Increased network load: Since actual processing of data takes on the
  remote client, the data has to be transported over the network.

 This leads to the increased network stress.

 As all the application logic is executed on the PCs, all these machine have
  to be updated in case of a new release.

 The procedure is complicated, expensive, prone to errors and time
  consuming.
Two-Tier Architecture - Internet
Three -Tier Architecture
 Reusability is hard to achieve if pieces of business logic must be distributed
  across systems and several databases are involved.

 To avoid embedding the application’s logic at both the database side and
  the client side, a third software tier is inserted in between

 In the three-tier architecture, most of the business logic is located in the
  middle tier.

 In this structure, when the business activity or business rules change, only
  the middle tier must be modified.

 In three-tier client/server system the client request are handled by
  intermediate servers which coordinate the execution of the client request
  with subordinate servers.
Three -Tier Architecture
Three -Tier Architecture

 The Middle Tier can be

    A Transaction Processing Monitor

    A Message Server

    An Application Server

    An Object Server
Three -Tier Architecture - Internet
N-tier Architecture

 As the 3-tier applications grew more complex, the basic 3 tiers

  got further sub-divided into many more logically distinct tiers.

 It is mostly the Business Tier that gets further divided into

  scalable and easily deployable sub-tiers.
Contd…
 Some of the benefits in moving from 3-tier to n-tier is as below:

    Easier maintenance and scalability of each tier, independent of the

      other tiers

    Distribution of processing intensive sub-layers on a separate high-end

      processor

    Development and deployment of each tier in the most suitable

      environment and technology.

    A lower tier can be used in more than one ways by multiple tiers in the

      upper layer for different environments like Web or client application UI.
Multi -Tier Architecture
Multi -Tier Architecture
Advantages of client - server

    Centralization - access, resources, and data security are

     controlled through the server

    Scalability - any element can be upgraded when needed

    Flexibility - new technology can be easily integrated into the

     system

    Interoperability - all components (clients, network, servers)

     work together
 Accessibility - server can be accessed remotely and across

  multiple platforms

 Ease of application development

 Lower total costs than “mainframe legacy systems”.

 User friendly - familiar point and click interface
Disadvantages of client – server model

• Dependability - when the server goes down, operations cease

• Maintenance cost

• Training cost

• Hardware cost

• Software cost

• Complexity

• Can cause network congestion
Evolution of c-s computing in future

 The future of computing is not the desktop, it's the Internet and the World Wide
  Web.

 The emerging Internet-standards-based architecture is Network-
  Centric Computing -- Applications that only exist on Networks and that can be
  made available to anyone, anywhere, anytime.

 N-Tier network-based computing allows lightweight thin-client devices such as
  Internet Browsers, Web-TV, Smart-Phones, Personal Digital Assistants (PDA's) and
  Networked Appliances to harness the virtually limitless power of the Internet.

 Net-Centric N-Tier architectures are rapidly becoming the cornerstone for
  enterprise application development and companies around the world are adopting
  it in order to get ahead in the emerging net economy.
Conclusion
 N-Tier systems use component based development techniques combined
  with the open industry standards of the Internet, to build powerful cross-
  platform applications which lower costs, are easier to maintain, provide
  greater efficiencies and fuel competitive advantage.

 To Infinity and Beyond! The new thing in the N-Tier model of computing is
  the ability to distribute independent objects over as many tiers as makes
  sense and then link them dynamically, as required, to
  provide unlimited application flexibility.

 Thus The future of client / server computing is to dynamically determine
  and assign where the computing resources for an application will reside.
References
http://www.scribd.com/doc/19101563/An-Introduction-
  to-Client-Server-Computing

file:///I:/ppt/ppt/Introduction%20to%20N%20Tier%20
   Architecture%20Design%20Approach%20-
   %20Developer%20Geeks.htm
Thank you

More Related Content

What's hot

Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed SystemSunita Sahu
 
Case tools(computer Aided software Engineering)
Case tools(computer Aided software Engineering)Case tools(computer Aided software Engineering)
Case tools(computer Aided software Engineering)Self-employed
 
Unit 1 architecture of distributed systems
Unit 1 architecture of distributed systemsUnit 1 architecture of distributed systems
Unit 1 architecture of distributed systemskaran2190
 
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddelCHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddelmohamed khalaf alla mohamedain
 
Design Concept software engineering
Design Concept software engineeringDesign Concept software engineering
Design Concept software engineeringDarshit Metaliya
 
System models in distributed system
System models in distributed systemSystem models in distributed system
System models in distributed systemishapadhy
 
Software process and project metrics
Software process and project metricsSoftware process and project metrics
Software process and project metricsIndu Sharma Bhardwaj
 
Levels of Virtualization.docx
Levels of Virtualization.docxLevels of Virtualization.docx
Levels of Virtualization.docxkumari36
 
Software engineering layers
Software engineering layersSoftware engineering layers
Software engineering layersSelf-employed
 
Lecture 3 software process model
Lecture 3   software process modelLecture 3   software process model
Lecture 3 software process modelIIUI
 
Non Functional Requirement.
Non Functional Requirement.Non Functional Requirement.
Non Functional Requirement.Khushboo Shaukat
 
Unit 5 usability and satisfaction test
Unit 5 usability and satisfaction testUnit 5 usability and satisfaction test
Unit 5 usability and satisfaction testgopal10scs185
 
Secondary storage management in os
Secondary storage management in osSecondary storage management in os
Secondary storage management in osSumant Diwakar
 
3 tier architecture
3 tier architecture3 tier architecture
3 tier architecturetahir khan
 
Software Measurement and Metrics.pptx
Software Measurement and Metrics.pptxSoftware Measurement and Metrics.pptx
Software Measurement and Metrics.pptxubaidullah75790
 

What's hot (20)

Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed System
 
Case tools(computer Aided software Engineering)
Case tools(computer Aided software Engineering)Case tools(computer Aided software Engineering)
Case tools(computer Aided software Engineering)
 
Student information system
Student information systemStudent information system
Student information system
 
Unit 1 architecture of distributed systems
Unit 1 architecture of distributed systemsUnit 1 architecture of distributed systems
Unit 1 architecture of distributed systems
 
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddelCHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
 
Design Concept software engineering
Design Concept software engineeringDesign Concept software engineering
Design Concept software engineering
 
System models in distributed system
System models in distributed systemSystem models in distributed system
System models in distributed system
 
Software process and project metrics
Software process and project metricsSoftware process and project metrics
Software process and project metrics
 
Groupware
GroupwareGroupware
Groupware
 
Levels of Virtualization.docx
Levels of Virtualization.docxLevels of Virtualization.docx
Levels of Virtualization.docx
 
Software engineering layers
Software engineering layersSoftware engineering layers
Software engineering layers
 
Uml restaurant (group 1)
Uml restaurant (group 1)Uml restaurant (group 1)
Uml restaurant (group 1)
 
Lecture 3 software process model
Lecture 3   software process modelLecture 3   software process model
Lecture 3 software process model
 
Deployment Diagram
Deployment DiagramDeployment Diagram
Deployment Diagram
 
Non Functional Requirement.
Non Functional Requirement.Non Functional Requirement.
Non Functional Requirement.
 
Online attendance management system
Online attendance management systemOnline attendance management system
Online attendance management system
 
Unit 5 usability and satisfaction test
Unit 5 usability and satisfaction testUnit 5 usability and satisfaction test
Unit 5 usability and satisfaction test
 
Secondary storage management in os
Secondary storage management in osSecondary storage management in os
Secondary storage management in os
 
3 tier architecture
3 tier architecture3 tier architecture
3 tier architecture
 
Software Measurement and Metrics.pptx
Software Measurement and Metrics.pptxSoftware Measurement and Metrics.pptx
Software Measurement and Metrics.pptx
 

Viewers also liked

Client Server Computing Slides by Puja Dhar
Client Server Computing Slides by Puja DharClient Server Computing Slides by Puja Dhar
Client Server Computing Slides by Puja Dharpuja_dhar
 
Bluetooth an introduction
Bluetooth an introductionBluetooth an introduction
Bluetooth an introductionTech_MX
 
Eight ways to optimise your website
Eight ways to optimise your websiteEight ways to optimise your website
Eight ways to optimise your websiteNed Wells
 
Technology development of horticultural production perhorti
Technology development of horticultural production perhortiTechnology development of horticultural production perhorti
Technology development of horticultural production perhortiArjunawiwaha Pandawa
 
Collective identity
Collective identityCollective identity
Collective identityStellaK17
 
יסודות האימון היהודי
יסודות האימון היהודייסודות האימון היהודי
יסודות האימון היהודיBSDjewishcoaching
 
Ceragem jade bed presentation
Ceragem jade bed presentationCeragem jade bed presentation
Ceragem jade bed presentationAhmed Bahaa
 
Smart Client Development
Smart Client DevelopmentSmart Client Development
Smart Client DevelopmentTamir Khason
 
Client server computing_keypoint_and_questions
Client server computing_keypoint_and_questionsClient server computing_keypoint_and_questions
Client server computing_keypoint_and_questionslucky94527
 
Memory dbms
Memory dbmsMemory dbms
Memory dbmsTech_MX
 
Chapter 2 database architecture
Chapter 2 database architectureChapter 2 database architecture
Chapter 2 database architectureUra Euro
 
Merging files (Data Structure)
Merging files (Data Structure)Merging files (Data Structure)
Merging files (Data Structure)Tech_MX
 
Architecture of dbms(lecture 3)
Architecture of dbms(lecture 3)Architecture of dbms(lecture 3)
Architecture of dbms(lecture 3)Ravinder Kamboj
 
Introduction to the client server computing By Attaullah Hazrat
Introduction to the client server computing By Attaullah HazratIntroduction to the client server computing By Attaullah Hazrat
Introduction to the client server computing By Attaullah HazratAttaullah Hazrat
 
Client server-computing
Client server-computingClient server-computing
Client server-computingjayasreep3
 
Client-Server Computing
Client-Server ComputingClient-Server Computing
Client-Server ComputingCloudbells.com
 
Theory of estimation
Theory of estimationTheory of estimation
Theory of estimationTech_MX
 

Viewers also liked (20)

Client Server Computing : unit 1
Client Server Computing : unit 1Client Server Computing : unit 1
Client Server Computing : unit 1
 
Client Server Computing Slides by Puja Dhar
Client Server Computing Slides by Puja DharClient Server Computing Slides by Puja Dhar
Client Server Computing Slides by Puja Dhar
 
Mood board
Mood boardMood board
Mood board
 
Bluetooth an introduction
Bluetooth an introductionBluetooth an introduction
Bluetooth an introduction
 
Eight ways to optimise your website
Eight ways to optimise your websiteEight ways to optimise your website
Eight ways to optimise your website
 
Technology development of horticultural production perhorti
Technology development of horticultural production perhortiTechnology development of horticultural production perhorti
Technology development of horticultural production perhorti
 
Collective identity
Collective identityCollective identity
Collective identity
 
יסודות האימון היהודי
יסודות האימון היהודייסודות האימון היהודי
יסודות האימון היהודי
 
Ceragem jade bed presentation
Ceragem jade bed presentationCeragem jade bed presentation
Ceragem jade bed presentation
 
Smart Client Development
Smart Client DevelopmentSmart Client Development
Smart Client Development
 
Client server computing_keypoint_and_questions
Client server computing_keypoint_and_questionsClient server computing_keypoint_and_questions
Client server computing_keypoint_and_questions
 
Memory dbms
Memory dbmsMemory dbms
Memory dbms
 
Chapter 2 database architecture
Chapter 2 database architectureChapter 2 database architecture
Chapter 2 database architecture
 
Database model BY ME
Database model BY MEDatabase model BY ME
Database model BY ME
 
Merging files (Data Structure)
Merging files (Data Structure)Merging files (Data Structure)
Merging files (Data Structure)
 
Architecture of dbms(lecture 3)
Architecture of dbms(lecture 3)Architecture of dbms(lecture 3)
Architecture of dbms(lecture 3)
 
Introduction to the client server computing By Attaullah Hazrat
Introduction to the client server computing By Attaullah HazratIntroduction to the client server computing By Attaullah Hazrat
Introduction to the client server computing By Attaullah Hazrat
 
Client server-computing
Client server-computingClient server-computing
Client server-computing
 
Client-Server Computing
Client-Server ComputingClient-Server Computing
Client-Server Computing
 
Theory of estimation
Theory of estimationTheory of estimation
Theory of estimation
 

Similar to Evolution of Client-Server Computing Architectures

Similar to Evolution of Client-Server Computing Architectures (20)

Clientserver
ClientserverClientserver
Clientserver
 
Odbc and data access objects
Odbc and data access objectsOdbc and data access objects
Odbc and data access objects
 
Client server computing
Client server computingClient server computing
Client server computing
 
Chapter2
Chapter2Chapter2
Chapter2
 
Client server computing
Client server computingClient server computing
Client server computing
 
Client/Server Architecture By Faisal Shahzad
Client/Server Architecture By Faisal Shahzad Client/Server Architecture By Faisal Shahzad
Client/Server Architecture By Faisal Shahzad
 
client-server-architecture.ppt
client-server-architecture.pptclient-server-architecture.ppt
client-server-architecture.ppt
 
client-server-architecture ss.ppt
client-server-architecture ss.pptclient-server-architecture ss.ppt
client-server-architecture ss.ppt
 
SOFTWARE COMPUTING
SOFTWARE COMPUTINGSOFTWARE COMPUTING
SOFTWARE COMPUTING
 
Client Server Architecture
Client Server ArchitectureClient Server Architecture
Client Server Architecture
 
Technical Architectures
Technical ArchitecturesTechnical Architectures
Technical Architectures
 
Part 1 network computing
Part 1 network computingPart 1 network computing
Part 1 network computing
 
Anil Nembang: Hures Company Case Study
 Anil Nembang: Hures Company Case Study Anil Nembang: Hures Company Case Study
Anil Nembang: Hures Company Case Study
 
Client server based computing
Client server based computingClient server based computing
Client server based computing
 
Client server
Client serverClient server
Client server
 
Client-Server Model
Client-Server ModelClient-Server Model
Client-Server Model
 
Client server architecture in .net by varun tiwari
Client server architecture in .net by varun tiwariClient server architecture in .net by varun tiwari
Client server architecture in .net by varun tiwari
 
Introduction and Basics to web technology .pptx
Introduction and Basics to web technology .pptxIntroduction and Basics to web technology .pptx
Introduction and Basics to web technology .pptx
 
client-server.pptx
client-server.pptxclient-server.pptx
client-server.pptx
 
Lecture5 architecture styles.pdf
Lecture5 architecture styles.pdfLecture5 architecture styles.pdf
Lecture5 architecture styles.pdf
 

More from Tech_MX

Virtual base class
Virtual base classVirtual base class
Virtual base classTech_MX
 
Templates in C++
Templates in C++Templates in C++
Templates in C++Tech_MX
 
String & its application
String & its applicationString & its application
String & its applicationTech_MX
 
Statistical quality__control_2
Statistical  quality__control_2Statistical  quality__control_2
Statistical quality__control_2Tech_MX
 
Stack data structure
Stack data structureStack data structure
Stack data structureTech_MX
 
Stack Data Structure & It's Application
Stack Data Structure & It's Application Stack Data Structure & It's Application
Stack Data Structure & It's Application Tech_MX
 
Spanning trees & applications
Spanning trees & applicationsSpanning trees & applications
Spanning trees & applicationsTech_MX
 
Set data structure 2
Set data structure 2Set data structure 2
Set data structure 2Tech_MX
 
Set data structure
Set data structure Set data structure
Set data structure Tech_MX
 
Real time Operating System
Real time Operating SystemReal time Operating System
Real time Operating SystemTech_MX
 
Mouse interrupts (Assembly Language & C)
Mouse interrupts (Assembly Language & C)Mouse interrupts (Assembly Language & C)
Mouse interrupts (Assembly Language & C)Tech_MX
 
Motherboard of a pc
Motherboard of a pcMotherboard of a pc
Motherboard of a pcTech_MX
 
More on Lex
More on LexMore on Lex
More on LexTech_MX
 
MultiMedia dbms
MultiMedia dbmsMultiMedia dbms
MultiMedia dbmsTech_MX
 
Linear regression
Linear regressionLinear regression
Linear regressionTech_MX
 
Keyboard interrupt
Keyboard interruptKeyboard interrupt
Keyboard interruptTech_MX
 

More from Tech_MX (20)

Virtual base class
Virtual base classVirtual base class
Virtual base class
 
Uid
UidUid
Uid
 
Templates in C++
Templates in C++Templates in C++
Templates in C++
 
String & its application
String & its applicationString & its application
String & its application
 
Statistical quality__control_2
Statistical  quality__control_2Statistical  quality__control_2
Statistical quality__control_2
 
Stack data structure
Stack data structureStack data structure
Stack data structure
 
Stack Data Structure & It's Application
Stack Data Structure & It's Application Stack Data Structure & It's Application
Stack Data Structure & It's Application
 
Spss
SpssSpss
Spss
 
Spanning trees & applications
Spanning trees & applicationsSpanning trees & applications
Spanning trees & applications
 
Set data structure 2
Set data structure 2Set data structure 2
Set data structure 2
 
Set data structure
Set data structure Set data structure
Set data structure
 
Real time Operating System
Real time Operating SystemReal time Operating System
Real time Operating System
 
Parsing
ParsingParsing
Parsing
 
Mouse interrupts (Assembly Language & C)
Mouse interrupts (Assembly Language & C)Mouse interrupts (Assembly Language & C)
Mouse interrupts (Assembly Language & C)
 
Motherboard of a pc
Motherboard of a pcMotherboard of a pc
Motherboard of a pc
 
More on Lex
More on LexMore on Lex
More on Lex
 
MultiMedia dbms
MultiMedia dbmsMultiMedia dbms
MultiMedia dbms
 
Linkers
LinkersLinkers
Linkers
 
Linear regression
Linear regressionLinear regression
Linear regression
 
Keyboard interrupt
Keyboard interruptKeyboard interrupt
Keyboard interrupt
 

Recently uploaded

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Recently uploaded (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Evolution of Client-Server Computing Architectures

  • 1.
  • 2. Agenda  Evolution of client computing  Mainframe computers  Personal computers  File server • Client –Server Computing • Two-tier Architecture • Three-tier Architecture • N-tier Architecture • Evolution of c-s computing in future • Conclusion
  • 3. DUMP TERMINAL MAINFRAME STILL PROCESSING ON MAIN FRAME PERSONAL COMPUTERS FILE SERVER CLIENT/SERVER 2-TIER 3-TIER N-TIER
  • 4. Mainframe –based Environment  In these networks, one large server (a mainframe computer) handled all aspects of the network, while each user accessed the main server from a terminal.  The data is processed on the mainframe and then delivered to the terminal.  The data transfer between the terminal and the mainframe increases network traffic and slows down requests from other terminals.
  • 5. Mainframe –based Environment contd…  There are some major problems with this approach:  Mainframe system are very inflexible.  Centralized DP department was unable to keep up with the demand for new applications.  high cost of purchase, maintenance and support.
  • 6. Personal Computer  Through the years, personal computers started to evolve and replaced these terminals but the processing is still process on the mainframes.  With the improvement in computer technology, the processing demands started to split between personal computers and mainframes.
  • 7. Contd…  The first PC networks were based on the file sharing.  In file sharing, the server simply downloads or transfers files from the shared location to your desktop  File sharing is simple and works as long as shared usage is low, update contention is very low, and the volume of data to be transferred is low compared with LAN capacity.
  • 8. Driving Forces Behind Client/server computing • Forces that drives the move to Client/Server computing widely can be classified in two general categories based on:  Business perspective.  Technology perspective.
  • 9. Business Perspective • Basically the business perspective should be kept in mind for obtaining the following achievements through the system:  For increased productivity.  Superior quality.  Improved responsiveness.  Focus on core business.
  • 10. Business Perspective contd… • The effective factors that govern the driving forces are given below:  The changing business environment.  Globalization: The world as a market.  The growing need for enterprise data access.  The demand for end user productivity gains based on the efficient use of data resources.
  • 11. Technology Perspective  Technological advances that have made Client/Server computing practical by proper use of the following:  Intelligent desktop devices.  Computer network architectures.  Technical advances like microprocessor technology, data communication and Internet Database system, operating system and graphical user interface.  Growing cost and performance advantages of PC-based platforms.  Enterprise network management.
  • 12. Client –Server Computing  The main emphasis of Client-Server Architecture is to allow large application to be split into smaller tasks and to perform the tasks among host (server machine) and desktops (client machine) in the network.  Client-Server Computing is divided into three components, a  Client Process  Server Process  Middleware
  • 13. Client –Server Computing contd… Client :  A Client is any process that requests specific services from the server process. The main operations of the client system are listed below:  Managing the user interface.  Accepts and checks the syntax of user inputs.  Processes application logic.  Generates database request and transmits to server.  Passes response back to server.
  • 14. Client –Server Computing contd… Server : • A Server is a process that provides requested services for the Client. The main operations of the server are listed below:  Accepts and processes database requests from client.  Checks authorization.  Ensures that integrity constraints are not violated.  Performs query/update processing and transmits responses to client.  Maintains system catalogue.  Provide concurrent database access.  Provides recovery control.
  • 15. Middleware • Middleware is software that runs between client and server processes. • It is the "glue" between the client and server, which makes it possible for them to communicate to each other. • Middleware is written in such a way that the user never notices it's presence. • It delivers secure and transparent services to users.
  • 16. Elements of C-S Computing Client Server Network Client machine Server machine
  • 17. Client/Server :Fat /Thin  A Client or a Server is so named depending on the extent to which the processing is shared between the client and server.  The concept of Fat Clients or Fat Servers is given by one of the important criterion, that is, how much of an application is placed at the client end vs. the server end.  Thin Client :  A thin client is one that conducts a minimum of processing on the client side . • Fat Client :  Fat client is one that carries a relatively larger proportion of processing load.
  • 18.  Thin server:  This architecture places less application functionality on the server machine.  For example file servers.  Fat Servers:  This architecture places more application functionality on the server machine(s).  Typically, the server provides more abstract, higher level services.  The current trend is more towards fat servers in Client/Server Systems.  The biggest advantage of using the fat server is that it is easier to manage because only the software on the servers needs to be changed.
  • 19. Client/Server Application  Has three functional units:  Presentation logic or user interface (for example, ATM machines)  Business logic (for example software that enables a customer to request an account balance)  Data (for example, records of customer accounts)  Functional units can reside on the client or on multiple servers
  • 20. Two-Tier Architecture  In the two-tier architecture, if the Client/Server application has a number of business rules needed to be processed, then those rules can reside at either the Client or at the Server.  The architecture of any client/server environment is by definition at least a two-tier system, the client being the first tier and the server being the second.  The Client requests services directly from server i.e. client communicates directly with the server without the help of another server or server process.  For bigger, enterprise-class problems, use of this 2-tier approach has generated some problems.
  • 21. Contd…  As the application development is done on client side, maintenance cost of application, as well as client side tools etc. is expensive.  That is why in 2-tier architecture the client is called ‘fat client’.  Increased network load: Since actual processing of data takes on the remote client, the data has to be transported over the network.  This leads to the increased network stress.  As all the application logic is executed on the PCs, all these machine have to be updated in case of a new release.  The procedure is complicated, expensive, prone to errors and time consuming.
  • 23. Three -Tier Architecture  Reusability is hard to achieve if pieces of business logic must be distributed across systems and several databases are involved.  To avoid embedding the application’s logic at both the database side and the client side, a third software tier is inserted in between  In the three-tier architecture, most of the business logic is located in the middle tier.  In this structure, when the business activity or business rules change, only the middle tier must be modified.  In three-tier client/server system the client request are handled by intermediate servers which coordinate the execution of the client request with subordinate servers.
  • 25. Three -Tier Architecture  The Middle Tier can be  A Transaction Processing Monitor  A Message Server  An Application Server  An Object Server
  • 27. N-tier Architecture  As the 3-tier applications grew more complex, the basic 3 tiers got further sub-divided into many more logically distinct tiers.  It is mostly the Business Tier that gets further divided into scalable and easily deployable sub-tiers.
  • 28. Contd…  Some of the benefits in moving from 3-tier to n-tier is as below:  Easier maintenance and scalability of each tier, independent of the other tiers  Distribution of processing intensive sub-layers on a separate high-end processor  Development and deployment of each tier in the most suitable environment and technology.  A lower tier can be used in more than one ways by multiple tiers in the upper layer for different environments like Web or client application UI.
  • 31. Advantages of client - server  Centralization - access, resources, and data security are controlled through the server  Scalability - any element can be upgraded when needed  Flexibility - new technology can be easily integrated into the system  Interoperability - all components (clients, network, servers) work together
  • 32.  Accessibility - server can be accessed remotely and across multiple platforms  Ease of application development  Lower total costs than “mainframe legacy systems”.  User friendly - familiar point and click interface
  • 33. Disadvantages of client – server model • Dependability - when the server goes down, operations cease • Maintenance cost • Training cost • Hardware cost • Software cost • Complexity • Can cause network congestion
  • 34. Evolution of c-s computing in future  The future of computing is not the desktop, it's the Internet and the World Wide Web.  The emerging Internet-standards-based architecture is Network- Centric Computing -- Applications that only exist on Networks and that can be made available to anyone, anywhere, anytime.  N-Tier network-based computing allows lightweight thin-client devices such as Internet Browsers, Web-TV, Smart-Phones, Personal Digital Assistants (PDA's) and Networked Appliances to harness the virtually limitless power of the Internet.  Net-Centric N-Tier architectures are rapidly becoming the cornerstone for enterprise application development and companies around the world are adopting it in order to get ahead in the emerging net economy.
  • 35. Conclusion  N-Tier systems use component based development techniques combined with the open industry standards of the Internet, to build powerful cross- platform applications which lower costs, are easier to maintain, provide greater efficiencies and fuel competitive advantage.  To Infinity and Beyond! The new thing in the N-Tier model of computing is the ability to distribute independent objects over as many tiers as makes sense and then link them dynamically, as required, to provide unlimited application flexibility.  Thus The future of client / server computing is to dynamically determine and assign where the computing resources for an application will reside.