Documente Academic
Documente Profesional
Documente Cultură
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
1
23/07/2018
• Server contains all components (“server-based”) (Be able to explain each of these)
• Common in the 1960s with mainframes and terminals
• Advantages –
– Very simple
CLIENT SERVER – Single point of control
• Disadvantages
– Host (server) can become a bottleneck
– Upgrades typically expensive
Presentation Logic
Application Logic
Data Access Logic
Data Storage
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Client-Based Architecture
Client-Based Architecture
• Client contains presentation, application, and data access (Be able to explain each of these)
logic
• Most common in the 1980s • Advantages
– Hardware and applications less expensive
CLIENT SERVER
– Simple architecture
• Disadvantages
– Data must travel back and forth between server and
client
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
2
23/07/2018
Client-Server Architecture
Client-Server Architecture
• Thin clients are easier to manage, thick clients have more
• Most common architecture today functionality
CLIENT SERVER
CLIENT SERVER CLIENT SERVER
OR
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
3
23/07/2018
• Example of three-tier
two-tier
n-tier architecture (Be able to explain each of these)
Application
Web Application
Database Database • Advantages
CLIENT SERVER
SERVER SERVER SERVER – Load balancing
– More scalable
• Disadvantages
– Each tier increases network load
– More complex and difficult to develop applications
Presentation Logic Application Logic Application
Data Access Logic Data Access Logic
Data Access Logic Data Storage Data Storage
Data Storage
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
• An older architecture that became popular again with (Be able to explain each of these)
Napster, BitTorrent, etc.
• All devices can act as client and server • Advantages
– Resilient to failure
CLIENT/SERVER CLIENT/SERVER
– Data can be stored anywhere on network
– Distributes bandwidth requirements
• Disadvantages
– Finding the stored data
Presentation Logic Presentation Logic
– Security
Application Logic Application Logic
Data Access Logic Data Access Logic
Data Storage Data Storage
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
4
23/07/2018
• Cloud Computing is the general term for enabling access • Cloud Computing Models
to computing services over the network (most commonly – Software as a Service (SaaS)
the Internet) • All application components and associated
• Models of cloud computing define who manages each hardware/software outsourced
application function and associated hardware/software • Based on multitenancy
• e.g. Salesforce.com
– Platform as a Service (PaaS)
• Application logic and data are managed internally
• e.g., Microsoft Azure
– Infrastructure as a Service (IaaS)
• All hardware is outsourced
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Application
– Cost of servers, clients, and circuits
Logic X X X X
– Reliability
Data Storage X X X X
Data Access
• Development Costs
Logic X X X X
– Software; cheaper on host-based architectures
Operating
System X X X X • Scalability
Virtualization
Software X X X X – Ability to increase (or decrease) in computing capacity
Server
X X X X
as network demand changes
Hardware
Storage
– Easier in client-server architectures
Hardware X X X X
Network
Hardware X X X X
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
5
23/07/2018
The Web
The Web
• Hypertext Transfer Protocol (HTTP)
• HTTP Request and Response • HTTP Request
HTTP
Client computer Response
with Web
browser
software
HTTP
Web Server
Request
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
6
23/07/2018
Email Email
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Email Email
• How a message is sent via webmail (3-tier, thin client)
1. Sending Client → Sender’s Web Server (HTTP)
2. Sender’s Web Server → Sender’s Mail Server (SMTP)
3. Sender’s Mail Server → Receiver’s Mail Server (SMTP)
4. Mail waits on Receiver’s Mail Server in “mailbox”
5. Receiving Client → Receiver’s Web Server (HTTP)
Type of application architecture?
6. Receiver’s Web Server → Receiver’s Mail Server (IMAP
or POP)
7. Receiver’s Mail Server → Receiver’s Web Server (IMAP
or POP)
8. Receiver’s Web Server → Receiving Client (HTTP)
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
7
23/07/2018
Email Email
• SMTP Message Format • Inside an SMTP packet
– RFC 822: Standard for text Header – Header: source, destination, date, subject, etc.
message format
• Header lines – Body: keyword “DATA”, then email message
– Contain information about the
message such as To, From, and
Subject Body
• Body section
– Contains the “content of the
message
– Begins with the “DATA”
keyword
– Only uses ASCII characters
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
• SMTP is a simple protocol to send plain text • File Transfer Protocol (FTP) - for moving files between
• Not designed to send images or attachments clients and servers
• Multipurpose Internet Mail Extension (MIME) • Telnet, Secure Shell (SSH) - for executing commands on
– A standard to extend support for attachments and non- a remote system
ASCII characters in email • Internet Relay Chat (IRC), Extensible Messaging and
– Used by sender to convert (encode) any non-ASCII Presence Protocol (XMPP) - for real-time text chat
content into ASCII (instant messaging)
– Receivers then convert (decode) the ASCII back to its • Domain Name System (DNS) - for mapping domain
original format names to IP addresses
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
8
23/07/2018
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
• Primary purpose of networks is to provide environment • Can a mail sender use a two-tier architecture to send mail
for applications to a receiver using a three-tier architecture? Explain.
• The number and types of applications on the network is
dramatically increasing
• Design of architecture and managing network traffic and
security
• Network resilience and expansion
• Etc.
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
9
23/07/2018
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
10