Sunteți pe pagina 1din 10

23/07/2018

BUSINESS DATA Outline of objectives – students to understand …


COMMUNICATIONS &
• Application Architectures
NETWORKING • The Web
• Email
Chapter 2 • Other Application-Layer Protocols
Application Layer • Implications for Management

FitzGerald ● Dennis ● Durcikova


Prepared by Taylor M. Wells: College of Business Administration, California State University, Sacramento
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.

Application Layer Application Architecture


Internet Model
• Layer 5 in the Internet model • The way the functions of the application layer are spread
Application out across the client and server
• The software that enables
users to interact with the • Four components of applications:
network and accomplish tasks Transport 1. Presentation logic
2. Application logic
Network 3. Data access logic
4. Data Storage
Data Link
Physical

Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.

1
23/07/2018

Host-Based Architecture Host-Based Architecture

• Server contains all components (“server-based”) (Be able to explain each of these)
• Common in the 1960s with mainframes and terminals
• Advantages –
– Very simple
CLIENT SERVER – Single point of control
• Disadvantages
– Host (server) can become a bottleneck
– Upgrades typically expensive

Presentation Logic
Application Logic
Data Access Logic
Data Storage
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.

Client-Based Architecture
Client-Based Architecture

• Client contains presentation, application, and data access (Be able to explain each of these)
logic
• Most common in the 1980s • Advantages
– Hardware and applications less expensive
CLIENT SERVER
– Simple architecture
• Disadvantages
– Data must travel back and forth between server and
client

Presentation Logic Data Storage


Application Logic
Data Access Logic

Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.

2
23/07/2018

Client-Server Architecture
Client-Server Architecture
• Thin clients are easier to manage, thick clients have more
• Most common architecture today functionality

Thick-Client Architecture Thin-Client Architecture

CLIENT SERVER
CLIENT SERVER CLIENT SERVER

OR

Presentation Logic Application Logic


Application Logic Data Access Logic Presentation Logic Data Access Logic Presentation Logic Application Logic
Data Storage Application Logic Data Storage Data Access Logic
Data Storage
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.

Client-Server Architecture Client-Server Architecture


(Be able to explain each of these) • Middleware is software acts as an intermediary by “sitting
between” client and server applications
• Advantages • Provides a standard way of translating between software from
– More efficient because of distributed processing different vendors
– Allows hardware/software from different vendors to be • Manages message transfers
used together • Insulates network changes from the clients (e.g., adding a
– Less bandwidth required new server)
• Disadvantages
– May be challenges in configuring hardware/software
from different vendors to work together Client Server
Middleware
– In many cases, middleware is required Applications Applications

Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.

3
23/07/2018

Client-Server Architecture Tiered Client-Server Architecture

• Example of three-tier
two-tier
n-tier architecture (Be able to explain each of these)

Application
Web Application
Database Database • Advantages
CLIENT SERVER
SERVER SERVER SERVER – Load balancing
– More scalable
• Disadvantages
– Each tier increases network load
– More complex and difficult to develop applications
Presentation Logic Application Logic Application
Data Access Logic Data Access Logic
Data Access Logic Data Storage Data Storage
Data Storage

Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.

Peer-to-Peer Architecture Peer-to-Peer Architecture

• An older architecture that became popular again with (Be able to explain each of these)
Napster, BitTorrent, etc.
• All devices can act as client and server • Advantages
– Resilient to failure
CLIENT/SERVER CLIENT/SERVER
– Data can be stored anywhere on network
– Distributes bandwidth requirements
• Disadvantages
– Finding the stored data
Presentation Logic Presentation Logic
– Security
Application Logic Application Logic
Data Access Logic Data Access Logic
Data Storage Data Storage

Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.

4
23/07/2018

Cloud Computing Cloud Computing

• Cloud Computing is the general term for enabling access • Cloud Computing Models
to computing services over the network (most commonly – Software as a Service (SaaS)
the Internet) • All application components and associated
• Models of cloud computing define who manages each hardware/software outsourced
application function and associated hardware/software • Based on multitenancy
• e.g. Salesforce.com
– Platform as a Service (PaaS)
• Application logic and data are managed internally
• e.g., Microsoft Azure
– Infrastructure as a Service (IaaS)
• All hardware is outsourced

Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.

Cloud Computing Criteria for Choosing Architecture


Traditional Thin-Client Infrastructure as a Platform as a Service Software as a Service
Client-Server Service (IaaS) (Paas) (SaaS)
• Infrastructure
Internal Outsourced Internal Outsourced Internal Outsourced Internal Outsourced

Application
– Cost of servers, clients, and circuits
Logic X X X X
– Reliability
Data Storage X X X X
Data Access
• Development Costs
Logic X X X X
– Software; cheaper on host-based architectures
Operating
System X X X X • Scalability
Virtualization
Software X X X X – Ability to increase (or decrease) in computing capacity
Server
X X X X
as network demand changes
Hardware
Storage
– Easier in client-server architectures
Hardware X X X X
Network
Hardware X X X X

Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.

5
23/07/2018

The Web
The Web
• Hypertext Transfer Protocol (HTTP)
• HTTP Request and Response • HTTP Request

HTTP
Client computer Response
with Web
browser
software

HTTP
Web Server
Request

Type of application architecture?

Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.

The Web Email

• HTTP Response • Mail Transfer Agent (MTA)


– Formal name for mail server software
– e.g., Sendmail, Postfix,
• Mail User Agent (MUA)
– Formal name for mail client software
– e.g., Outlook, Apple Mail, Thunderbird
• Simple Mail Transfer Protocol (SMTP)
– Protocol used to send a message to a MTA
– Originally only handled text files
• Internet Message Access Protocol (IMAP) or Post Office Protocol
(POP)
– Protocols used by a MUA to retrieve messages from an MTA
• American Standard Code for Information Interchange (ASCII)
– A standard for encoding text characters (a-z, A-Z, 0-9, a few symbols)

Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.

6
23/07/2018

Email Email

• How a message is sent (2-tier, thick client)


• Sending Client → Sender’s Mail Server (SMTP)
• Sender’s Mail Server → Receiver’s Mail Server (SMTP)
• Message waits on Receiver’s Mail Server in “mailbox”
• Receiving Client → Receiver’s Mail Server (IMAP or
Type of application architecture?
POP)
• Receiver’s Mail Server → Receiving Client (IMAP or
POP)

Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.

Email Email
• How a message is sent via webmail (3-tier, thin client)
1. Sending Client → Sender’s Web Server (HTTP)
2. Sender’s Web Server → Sender’s Mail Server (SMTP)
3. Sender’s Mail Server → Receiver’s Mail Server (SMTP)
4. Mail waits on Receiver’s Mail Server in “mailbox”
5. Receiving Client → Receiver’s Web Server (HTTP)
Type of application architecture?
6. Receiver’s Web Server → Receiver’s Mail Server (IMAP
or POP)
7. Receiver’s Mail Server → Receiver’s Web Server (IMAP
or POP)
8. Receiver’s Web Server → Receiving Client (HTTP)

Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.

7
23/07/2018

Email Email
• SMTP Message Format • Inside an SMTP packet
– RFC 822: Standard for text Header – Header: source, destination, date, subject, etc.
message format
• Header lines – Body: keyword “DATA”, then email message
– Contain information about the
message such as To, From, and
Subject Body
• Body section
– Contains the “content of the
message
– Begins with the “DATA”
keyword
– Only uses ASCII characters

Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.

Email Other Application-Layer Protocols

• SMTP is a simple protocol to send plain text • File Transfer Protocol (FTP) - for moving files between
• Not designed to send images or attachments clients and servers
• Multipurpose Internet Mail Extension (MIME) • Telnet, Secure Shell (SSH) - for executing commands on
– A standard to extend support for attachments and non- a remote system
ASCII characters in email • Internet Relay Chat (IRC), Extensible Messaging and
– Used by sender to convert (encode) any non-ASCII Presence Protocol (XMPP) - for real-time text chat
content into ASCII (instant messaging)
– Receivers then convert (decode) the ASCII back to its • Domain Name System (DNS) - for mapping domain
original format names to IP addresses

Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.

8
23/07/2018

Instant Messaging Video Conferencing

Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.

Implications for Management Example of a question

• Primary purpose of networks is to provide environment • Can a mail sender use a two-tier architecture to send mail
for applications to a receiver using a three-tier architecture? Explain.
• The number and types of applications on the network is
dramatically increasing
• Design of architecture and managing network traffic and
security
• Network resilience and expansion
• Etc.

Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.

9
23/07/2018

Example of a question To read….


• Yes. • Find examples of Middleware including where and how
• With e-mail, users with the two-tier architecture will use they function
the user agent software to interface with their email server, • Client-Server architecture in Cloud computing
which will send out web based, SMTP packets to the far environment
end receiver’s server computer with mail server software.
• The server at the far end will issue an IMAP or SMTP • What factors organisations should consider in deciding on
packet to the receiver’s server computer, which will then client-server architecture solution using the Cloud
arrive at the receiver when they ask for the email with an • Examples of other application layer protocols and their
HTTP request to the web based email application. function
• Thus, a 2-tiered system easily interfaces with a three- • Read chapter 2 of the prescribed textbook
tiered architecture over the internet using the appropriate
protocols.

Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.

Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.

10

S-ar putea să vă placă și