Tuesday, April 2, 2019
Client Server Network Architecture Essay
lymph gland horde Network Architecture EssayAbstractThis report is somewhat the customer waiter network architecture in which each calculator or process on the network is either a client which is low end reckoner which bespeak services and or a server which is high end powerful computer which is highly assailable of providing services to some different clients at the equal time. The task which servers performs argon like managing disk drives which ar c all in all(a)ed file servers, managing printers which argon called print servers or managing network entropy traffic k right awayn as network server. Clients are PCs which require or work these facilities from servers which include sacramental manduction files, printers, storage and sometimes processing. All the clients and servers in a network communicate by utilize different protocols which are set of rules or standards which govern the communication betwixt either computers or devices connected in a network. This client server architecture is withal known as two- class architecture.(1)IntroductionThe advent of in-person computers gave birth to the idea of client/server architecture. Before personal computers, programs were pen for telephone exchange processors. Software written for mainframes was often coded in a monolithic coif that is the user interface, business logic and information access functionality are all contained in a single industriousness. Because the entire application ran within the mainframe this was not a trouble.(2)Client/server model, needed to share many a(prenominal) kind of services. As time passed the need of these services increased so servers alike evolved. Many clients started overlap services of common server. Example flowerpot be of our vane browser which is a client and requests services from web server like web pages or files. This is sometime overly knows as Hyper Text Transfer communications protocol server (HTTP) in addition for compute r to view requests like a client Transfer Control Protocol/ profits Protocol (TCP/IP) and for transfer of files over internet File Transfer Protocol (FTP).Protocols are set of rules or standard that which governs the communication of two or more than knobs in a network.(3)The relationship between two computer programs in which one program shits a request and other which house the required service is called a client/server relationship. It is a spine of interconnection of two or more programs or computers anywhere crossways the network. Example could be an ATM car in which we send request for balance check or money withdrawal and through this machine which is like a client and bank has supercomputers which acts as servers and the transaction are handled by them and result is sent back to the client to display in front of user.(4)Client horde Architecture has two common architectural models. The two tier and the three tier architecture. In two tier architecture the applicatio n allow for be on the server instead of client because server has more disk space and power as compare to PC alike the data impart also be in server along with the application. In three-tier architecture the load is separate between two different servers instead of putting load on one and jamming other clients. These servers are database server and application server. The data and application are divided between these servers. Client would only request and display data. In this tier more manageable and less quarrel system for resources pull up s tackles be available because each server depart be apply either to process data or application requests.(6)Literature ReviewIn modern world because of rapid changes in user requirements and increasing amount on daily basis of users sharing data among them the needs of faster and get around network system development tremendously companies are bound to upgrade their system ein truth sixsome months. Now Hures is also facing same pro blems. This is very common problem in any party because of the rapid development of business systems so to cater these problems any alliance should keep this in mind age developing new system is that they may need to upgrade very soon. Hures analyst did not plan the future scenarios properly and because that even natural and external environment is affecting the company.The business is affected by many changes like political, social and technological. Client/Server technology is often introduced for tractableness of coping with these changes. However it comes with its own challenges which we will discuss here.Client/Server is built on three basic building block they are client which is a small or less capable ironware or software then middleware which is a software which lies in between and server more powerful then client.The first block client runs different applications on its operating system which provides graphic user interface. Clients could conduct web browser for exa mple as an application requesting services now operating system transfers these request to the middleware. Client also runs a DSM (Distributed dodging Management) it could be simple element to the entire front-end managing application.Middleware is application which has three categories impart stack, network operating system (NOS) and server-specific middleware. It runs on both the client and the server. It also have DSM like clients and is the backbone of client/server architecture.Server is typically intelligent software or hardware it runs some application to make an interface with middleware. Server consists of five main components SQL database, TP Monitors, groupware , object and the web. Server also has DSM in it which female genitalia be a simple agent or entire back-end of the system. The Distributed System Management application runs on every node in the Client/Server network.The additional server like netmail could be used depending on size and usage of the network. Hu res could also use similar OS in all industrial planttations it also plays very consequential part in Client/Server. Same OS on all sides in network can reduce a lot of problems and it will increase server efficiency and will cause less twine on servers.The Alternative architecture which could overcome Hures problem can be client queue client or another one called ally to peer architecture. Client queue client Architecture is also called peaceful queue Architecture.In Client queue client all points including servers are simple clients. It was create to continue on traditional Client Server Architecture. In this they were trying to make one client as a server for different clients to multiply the usage for clients. Hures could benefit from this track and station number of clients for better efficiency also there will be better resources distribution and sharing. Example is search engine which uses spidering for faster and better results.Peer-to-Peer Architecture rather than fo cusing on power of server it distinguishes itself by distributing power and function. It depends totally on bandwidth and power of different nodes in the network. This architecture goes against previous client server architecture where there is one central server it replaces it with nodes which function as clients and servers simultaneously. Hures could use this architecture because due to its encapsulation it makes it easier to hearten or upgrade without clients being affected and its more secure and easygoing to maintain.Intranet is one of the oldest and safest way for any company to have communication among themselves. It works just like website on internet. It gives you options to log ons to access only crystalise data at your level in company. Most of the corporations use intranet for sharing important data among the employees. Intranet is a kind of network which is built by using same tools and protocols used by internet or populace Wide Web (WWW) but is only restricted to the network of this company only. It uses same HTML, Java and CSS and also provide same database to store data within network server. Security features are fully customizable so its your pick whether you want to change password every 30 day or to set different accessibility for employee depending their post and work in the company. both outside person trying to access company files will be blocked by firewalls.The Advantages of this internal network is that inside employees can do very important information interchange very quick and secure. It makes the data sharing more effective, easier and effective manner. It can also be used for internal applications such as newsletters, policy manuals, and price list and so on It can also gather information related to expense and programs that can help to transact application. As it is a private place on internet its safer and secured because only authority can access the website.The Disadvantages of this intranet to be considered would b e like firstly it is very expensive to setup and maintain because a special team of people need to be hired and deft for handling the process of managing resources of this particular company and organizing them in the website. This process will also be very time consuming to develop and also the number of individual users would have to be considered in the overall cypher for planning, designing, implementing. Also to maintain the quality, testing and maintenance needs to be through with(p) at all time. Obviously once whole site is developed now each user in company needs to be trained also how to use and set up your passwords which will also affect overall budget.It is very true that the popularity of intranet software and the internet mannerism threats towards traditional client/server system because intranet software have more advantages as compared to peer to peer or client/server architectures. It takes the some advantage of networking technology in the business world and b ecause it enables us to take full use of wireless and internet technology at the same time it is the most flexible most secure and gives more loneliness as compared to offered by traditional client/server system. As a result it is the most popular choice among many companies. However it is also very important to keep in consideration that even though intranet is the most popular and successfully used and accepted worldwide, there are still parts in the system or particular company which needs to use traditional client server system. As faraway as security is considered there are always threats to any blossom out network system. To reduce the risk of infiltration from outside sources proper observe of network on continues level is severely needed. The most important conniption of any company/corporation should be the network security. Cctv could be installed in various places to remotely monitor all the activities of users within the office and no one should be allowed to use th eir plug n play devices to any individual workstation. Maintaining the network integrity should be of the highest priority and could reduce the chance(prenominal) damages to revenue but again the cost of doing all these procedures will be substantial.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment