Wednesday, April 3, 2019

The client server architecture

The leaf node arranger architectureAbstractIn this assignment we talk active the customer waiter architecture and its model and about its prefer and equation them with each other. Also provide some response and comments about Hures Comp some(prenominal). retrieve-We are now in modern age of technology. Like over-the-hill m we do not charter to do our fooling things with save and paper now. Modern technology gives us the power to saves the measure and institute become more easy without any hassle .Now multinational companies development computer for their all task. So its become more essential for everybody for their daily needs and work. Everybody now depending on computer so its very definitive to build up relation between computers to computers and then we besides need a master of ceremonies convey powerful computer with high emergency .Server serve leaf node message the user .If server crappernot control the invitee implore then its become more complic ated for every ace users for that regain system can be crash .and technology update time by time so the system needs to be updated. If any company crate a system that can serve 100 employee but they strike same 300 employee its not manageable to cover everyone needs excessively its become pain for everyone to work with that system. So we need better system design means Better customer server architecture. With the right level of attention to client/ server systems and industriousness design. But poor design can ruin this utopian peck making upgrades every bit as painful, time-consuming, and costly as put in a unexampled mainframe.Colin White writes that the benefit of client/server computer science is the availability ofHardware servers that scale from a small uni-processor machine to a massively parallelMachine containing hundreds, possibly thousands of processors. Corporations can now fit the computing power of the server to the job at hand. If a server runs out ofcapac ity, the old server can simply be replaced by a larger one. This salmagundi can bemade without impact existing client workstation users or the tools they employ. Thisprovides not only scalability, but also flexibility in handling hardware growth as comparedwith rally mainframes where an upgrade is a major undertaking that is both costly andtime consuming.(Colin White, Supporting High-Performance DSS Applications, InfoDB 8(2) (1994), 27. )Client-server architectureA vane rogue (HTML page) that contains the identical information for all users. Although it may be periodically updated from time to time, it does not change with each user retrieval.A program / script consign executed on the web server in response to a user request. A CGI script is usually executed to process the entropy sent when a form filled in by a user is sent back to the web server.Server side scripting means that all of the code is executed on the server before the selective information is passed to the use rs browser. In the case of PHP this means that no PHP code ever reaches the user, it is kind of executed and only the information it outputs is sent to the web browserPHP Hypertext Preprocessor.PHP pages typically have .phtml,php or .php3 file name extensions. An open source technology. asp Active Server Pages .A Microsoft technology. Extension .asp.JSP coffee bean Server Pages .jsp pages contain Java code.SSI Server Side Includes. Involves the embedding of small code snippets inside the HTML page. An SSI page typically has .shtml as its file extension.With this technology now its become really easy to create large web identify and maintain it easily.Introduction to 2-Tier ArchitectureTwo-tier client/server architectures have 2 essential componentsA Client PC andA Database ServerTier Considerations Client program accesses database directly. Requires to code change to port to a different database. Potential bottleneck for data requests .High slew of work due to data shipping. Cli ent program executes application logic. express by processing capability of client workstation (memory, CPU) .Requires application code to be distributed to each client workstation. (Less than 50 users).Introduction to 3-Tier Architecture3-Tier client-server architectures have 3 essential componentsA Client PCAn Application ServerA Database Server3-Tier Architecture ConsiderationsClient program contains presentation logic onlyLess resources needed for client workstationNo client modification if database status changesLess code to distribute to client workstationsOne server handles galore(postnominal) client requestsMore resources available for server programReduces data traffic on the electronic net incomeComparing both types of architectureTier 2 architecture is therefore a client-server architecture where the server is versatile means it is capable of directly responding to all of the clients resource requests. In tier 3 architecture however, the server-level applications are remote from one another, i.e. each server is narrow down with a certain task eg- web server/database server. Tier 3 architecture provides Flexibility.Increased security at each level.Increased performance.Benefits of the Client/Server ModelCost savings.Scalability.Manage workflow.Provide multi-tier serviceinstrumentationDisadvantages of the client/server modelClient/Server architecture also has the following drawbacksincreased cost due to the technical complexity of the servera weak radio link the server is the only weak link in the client/server network, given that the entire network is efficacyened around it Fortunately, the server is highly fault tolerant (primarily thanks to the raid system) (http//en.kioskea.net/contents/cs/csintro.php3)Problem Faced by Hures Company and its solution-According to the problems faced by Hures, its Primarily, its not that system they made for emerging use .it did not have that capability to the handle the future demands or needs of the comp any. the developer of the system did not focused on the future strength of the system or the adjustment of the system, different changes on both remote and internal environment which change the over flow of information in the company. In prepare to come up with the current problem of Hures system, Client-Queue-Client can be employ as alternative architecture. This uses a passive find which allows the client instances to communicate directly with each other, which will refine their request from the services. This is helpful for Hures because it can help to support and prevent any problems that are related with the server (Exforsys Inc n.d.).. Client queue is used in order to lay down track of the number of client familiaritys. Therefore, the server can be which resources the client has obtained, and the server can release the resources after the client connection breaks down (Chan Leong 2003).Intranet is a network that is built by utilise the similar tools and protocols tha t are used by the global Internet but applied instead to the internal network of an organization. It can be describe like a closed-circuit television system, which can be viewed only by those slew deep down the organization that owns the system (Lowe 2009).Intranet site is a web site that is viewable only to those within the network of an organization. Even though based on the same protocols as the World Wide Web, an intranet is protect from the outside world either by not being attached to the outside or through a series of hardware and software system obstacles known as a firewalll (Matthews Matthews 2003, p. 64).The development of an intranet web site use secure log cons to access the information is not a new idea. Many corporate locations use a secure internal site for vital information to be used by employees of the corporation and charge only. The design of such a site could be simple using HTML, Java and CSS and may provide a variety of links to miscellaneous database s stored within the network server(s). Security features can be enhanced by requiring the changing of passwords on one-on-one users every thirty (30) days. Obviously, one promise position of establishing an internal web site would be that of cost and implementation. Depending upon the OS of the server, it would be necessary to create the web site and establish users with passwords to access the site. This would take some time to develop and the amount of individuals accessing the site would have to be considered in the overall budget required for implementation.Threats to the security of any open network system will always exist. Proper network monitoring on a continuous level severely reduces the risk of infiltration from outside sources. Network security should be the most master(prenominal) aspect of any company/corporation within the network structure. reduction allowable events such as user abilities to plug in devices to their individual workstations, remote monitoring us ing camera feeds in various places within the office. Again, the cost of this will be substantial however, to maintain the integrity of the network should be of the highest priority and can reduce the severity of lost revenue. Disadvantages in intranet that its really expensive to maintain and setup. Need high qualified people or team to maintain its resources. Peer-to-peer and client-server architecture have different advantages and pros. It enables to take advantage of the wireless and Internet technology, at the same time, take advantage of the privacy and security which can be offered by client/server system. Intranet and internet both are famous worldwide so i will develop daily basis and needs to upgrade time wise.ReferencesBooks-Colin White, Supporting High-Performance DSS Applications, InfoDB 8(2) (1994), 27.Chan, A T S Leong, H V 2003, Cooperative Internet Computing, Springer.Lowe, D 2009, Networking for Dummies, For Dummies.Matthews, M, Matthews, C B Poulsen, E 2003, Mic rosoft Office FrontPage 2003 The Complete Reference, McGraw-Hill Professional.Website-http//members.tripod.com/ChannuKambalyal/NTierArchitecture.pdfhttp//www.webdevelopersnotes.com/basics/client_server_architecture.php3Exforsy-Peer-to-Peer and Client-Queue-Client Architecture, http//www.exforsys.com/tutorials/client-server/peer-to-peer-and-client-queue-client-architecture.html Accessed 17 February 2010

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.