Tuesday, June 4, 2019

Client Server Network Architecture Essay

Client host Network Architecture EssayAbstractThis report is about the invitee master of ceremonies earnings architecture in which each ready reckoner or process on the network is either a client which is low end reckoner which request services and or a innkeeper which is high end powerful computer which is highly capable of providing services to m some(prenominal) different clients at the akin cadence. The task which servers performs are like managing disk drives which are called file servers, managing printers which are called print servers or managing network data traffic known as network server. Clients are PCs which require or use these facilities from servers which include sharing files, printers, storage and sometimes processing. All the clients and servers in a network communicate by using different protocols which are set of rules or standards which govern the communication between any computers or devices connected in a network. This client server architecture is overly known as two- form architecture.(1)IntroductionThe advent of personal computers gave birth to the idea of client/server architecture. Before personal computers, programs were written for mainframes. parcel written for mainframes was often coded in a monolithic format that is the user interface, business logic and data access functionality are all contained in a single application. Because the total application ran within the mainframe this was not a problem.(2)Client/server model, needed to share many variety of services. As time passed the need of these services increased so servers also evolved. Many clients started sharing services of common server. Example can be of our web browser which is a client and requests services from web server like web pages or files. This is sometime also knows as Hyper Text exile Protocol server (HTTP) also for computer to make requests like a client Transfer Control Protocol/Internet Protocol (TCP/IP) and for transfer of files over in ternet File Transfer Protocol (FTP).Protocols are set of rules or standard that which governs the communication of two or more(prenominal) leaf nodes in a network.(3)The relationship between two computer programs in which one program makes a request and other which provide the required service is called a client/server relationship. It is a backbone of interconnection of two or more programs or computers anywhere across the network. Example could be an ATM machine in which we send request for balance mark or money withdrawal and through this machine which is like a client and bank has supercomputers which acts as servers and the transaction are handled by them and result is send back to the client to display in front of user.(4)Client Server Architecture has two common architectural models. The two tier and the three tier architecture. In two tier architecture the application will be on the server instead of client because server has more disk quadrangle and power as compare to PC also the data will also be in server along with the application. In three-tier architecture the turn on is divided between two different servers instead of putting load on one and jamming other clients. These servers are database server and application server. The data and application are divided between these servers. Client would only request and display data. In this tier more manageable and less contention dust for resources will be available because each server will be used either to process data or application requests.(6)Literature freshenIn modern world because of rapid changes in user requirements and increasing amount on daily basis of users sharing data among them the needs of express and repair network system growing tremendously companies are bound to enhance their system e real six months. Now Hures is also facing same problems. This is very common problem in any company because of the rapid development of business systems so to cater these problems any compa ny should keep this in mind while developing new system is that they may need to upgrade very soon. Hures analyst did not plan the future scenarios properly and because that level(p) internal and external environment is busheling the company.The business is affected by many changes like political, social and technological. Client/Server technology is often introduced for tractability of coping with these changes. However it comes with its own challenges which we will discuss here.Client/Server is built on three basic building block they are client which is a small or less capable hardware or software then middleware which is a software which lies in between and server more powerful then client.The first block client runs different applications on its operating system which provides graphic user interface. Clients could have web browser for cause as an application requesting services now operating system transfers these request to the middleware. Client also runs a DSM (Distri pr ovideded System Management) it could be simple element to the entire front-end managing application.Middleware is application which has three categories transport stack, network operating system (NOS) and server-specific middleware. It runs on both the client and the server. It also have DSM like clients and is the backbone of client/server architecture.Server is typically intelligent software or hardware it runs some application to make an interface with middleware. Server consists of five main components SQL database, TP Monitors, groupware , object and the web. Server also has DSM in it which can be a simple agent or entire back-end of the system. The Distributed System Management application runs on every node in the Client/Server network.The additional server like email could be used depending on size and usage of the network. Hures could also use akin OS in all workstations it also plays very important part in Client/Server. Same OS on all sides in network can reduce a lot of problems and it will increase server efficiency and will cause less strain on servers.The Alternative architecture which could overcome Hures problem can be client queue client or another one called comrade to peer architecture. Client queue client Architecture is also called passive queue Architecture.In Client queue client all points including servers are simple clients. It was highly-developed to continue on conventional Client Server Architecture. In this they were trying to make one client as a server for different clients to multiply the usage for clients. Hures could benefit from this put over and order number of clients for better efficiency also there will be better resources distribution and sharing. Example is search engine which uses spidering for faster and better results.Peer-to-Peer Architecture rather than focusing on power of server it distinguishes itself by distributing power and function. It depends totally on bandwidth and power of different nodes in the net work. This architecture goes against anterior client server architecture where there is one central server it replaces it with nodes which function as clients and servers simultaneously. Hures could use this architecture because due to its encapsulation it makes it easier to repair or upgrade without clients being affected and its more secure and easy to maintain.Intranet is one of the oldest and safest way for any company to have communication among themselves. It works just like website on internet. It gives you options to log ons to access only authorize data at your level in company. Most of the corporations use intranet for sharing important data among the employees. Intranet is a kind of network which is built by using same tools and protocols used by internet or World Wide Web (WWW) but is only dependent to the network of this company only. It uses same HTML, Java and CSS and also provide same database to store data within network server. Security features are fully customi zable so its your preference whether you want to change password every 30 day or to set different accessibility for employee depending their post and work in the company. both outside person trying to access company files will be blocked by firewalls.The Advantages of this internal network is that inside employees can do very important information interchange very quick and secure. It makes the data sharing more effective, easier and effective manner. It can also be used for internal applications much(prenominal) as newsletters, policy manuals, and price list etc. It can also gather information related to expense and programs that can help to transact application. As it is a private place on internet its safer and secured because only authority can access the website.The Disadvantages of this intranet to be considered would be like firstly it is very pricey to setup and maintain because a special team of people need to be hired and trained for handling the process of managing res ources of this crabby company and organizing them in the website. This process will also be very time consuming to develop and also the number of individual users would have to be considered in the overall budget for planning, designing, implementing. Also to maintain the quality, testing and maintenance needs to be done at all time. Obviously once whole site is developed now each user in company needs to be trained also how to use and set up your passwords which will also affect overall budget.It is very true that the popularity of intranet software and the internet pose threats towards traditional client/server system because intranet software have more advantages as compared to peer to peer or client/server architectures. It takes the most advantage of networking technology in the business world and because it enables us to take full use of radiocommunication and internet technology at the same time it is the most flexible most secure and gives more privacy as compared to offe red by traditional client/server system. As a result it is the most popular choice among many companies. However it is also very important to keep in stipulation that even though intranet is the most popular and successfully used and accepted worldwide, there are still parts in the system or particular company which needs to use traditional client server system. As far as security is considered there are always threats to any blustering network system. To reduce the risk of infiltration from outside sources proper monitoring of network on continues level is severely needed. The most important aspect of any company/corporation should be the network security. Cctv could be installed in various places to remotely monitor all the activities of users within the office and no one should be allowed to use their plug n play devices to any individual workstation. Maintaining the network integrity should be of the highest priority and could reduce the unplanned damages to revenue but again the cost of doing all these procedures will be substantial.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.