SlideShare a Scribd company logo
1 of 9
Download to read offline
Client-Server Architecture
Client-Server
Architecture
Anil Nembang
Assignment: Client-Server Architecture
1 | P a g e
ANALYSING THE SCENARIO:
What is mainframe computer and dumb terminal?
Mainframe computer is the form of computing in which a single
centralize computer performs the processing for multiple computer
(crfonline.org). Dumb terminal is a display monitor that has no
processing capabilities attached to mainframe computer. Dumb
terminal is simply an output device that accepts data from mainframe
computer (webopedia.com). Here, as Hures Company implemented its
first information system in 1987 purchasing mainframe computer that
served dumb terminals we can easily anticipate that the system has
embedded database system which cannot run in individual process.
Fig: Mainframe and dumb terminals.
In 1999 to cope with changes in both business and Information System
environment and also to accommodate Y2K demands, the Hures Company
ported applications to client/server system which contributed large
to efficiency and profit.
What is client/server application?
Client/server application is a piece of software in client and makes
requests to a remote server via network. Client/server application
Assignment: Client-Server Architecture
2 | P a g e
is written in high-level visual programming languages where user
interfaces and most of the business logics reside in client
application. One of the examples of client/server applications is
database application that makes database queries to a remote central
database server. This type of application grew in popularity many
years ago as personal computers became common alternative to older
mainframe computers (compnetwroking.about.com).
Fig: Client/server application system
Current situation:
The company continued to grow rapidly ever since but has
noticed that the network has problems such as difficulty in
scaling the servers to respond to the increased load in the
distributed environment and a continual requirement for
increasingly powerful desktop machines.
1. Do you think the problems faced by Hures, both past and
present, are unique? Why or why not?
The problem faced by Hures, both past and present, are unique in
term of price, space and operation because mainframe system requires
intense resources consumption, intense human attention and intense
occupying space in comparison to client/server application system.
Moreover, the mainframe system is not reliable if too many users are
logged on or if the network is out as the terminals have no its own
computational power. But in client/server system, terminals are
intelligent. However, the problems are not unique in term of
scalability, meeting future demands, interoperability, and
maintainability.
In mainframe time, the system is not scalable in distributed
environment because of embedded system and dumb terminals. In
client/server application system as well, the system is not scalable
Assignment: Client-Server Architecture
3 | P a g e
as interfaces and most of the business logics are resided in client
application. The company could expand the system in both situation,
but it costs lot in upgrading all the clients and upgrading the
server side with respect to clients.
In Hures Company, both mainframe and client/server systems are not
flexible enough to meet future demands. The case study implies the
growing business trend in the company but the systems are not well
designed to cater future demands. The company cannot adjust the
system as per the way the business expands. The both system cannot
tackle the changes brought about by change in internal and external
environment.
Maintainability is very hard in both embedded mainframe system and
client/server application system. Whole the system need to be
reviewed in order to modify to correct faults, improve performance,
or adapt to changed environment. As there is no middleware in both
the mainframe and client-server system, there is no expectation of
interoperability.
2. Suggest alternative architectures that could be used to
overcome the problems faced by Hures’ current Client/Server
technology.
The alternative architecture suggested to Hures Company to overcome
all problems is three-tier architecture.
Three-tier client/server architecture
Three-tier architecture is the component-oriented approach of
architectural deployment style that describes the separation of
functionality into layers. Each segment is a tier and is located in
different physical computer. In this architecture, the software is
divided into 3 different tiers: presentation tier, logic tier and
data tier. Each tier is developed and maintained independently.
There is very low interdependency between layers because only layer
immediate to other can access its public components.
Assignment: Client-Server Architecture
4 | P a g e
Fig: Three-tier client-server architecture (www.en.wikipedia.com)
Presentation tier: Presentation tier provides application’s user
interface to users. It involves Graphical User Interface in smart
client interaction while web based technology in browser-based
technology. It is also called as client.
Logic layer: This layer encapsulates business logic (business
rules, data validation), data access logic etc. It controls the
functionality of application by detailed processing. It is also
known as middle layer. Business logic resides sometimes both in
client side and server side and sometimes in either client side
or server side. But middleware like MOM and OOM help in
conversation between client and server.
Data layer: Data layer consists of database server. Here
information is stored and retrieved.
Note: This three-architecture is based on (www.en.wikipedia.com).
Assignment: Client-Server Architecture
5 | P a g e
Why three-tier architecture is suggested as alternative
architecture for Hures Company?
The main problem of Hures Company is difficulty in scaling the
servers to respond to the increased load in the distributed
environment and a continual requirement for increasingly powerful
desktop machines because of rapid growth of the company. So, if
the Hures Company introduces Three-tier client-server
architecture the company in question will be benefited from
scalability, maintainability, flexibility, interoperability, and
usability.
Scalability: Because each tier is independent of the other tiers,
scaling either server side or client side is pretty
straightforward. The Hures Company can scale its system as per
the future demand.
Maintainability: As there is very less interdependency between
layers, the Hures Company can update, upgrade or bring about
changes according to the demand without affecting the system as a
whole.
Flexibility: Because each layer can be scaled and managed,
flexibility can be increased.
Interoperability: Hures Company can be benefited of
Interoperability in three-tier architecture because back-end
processes like complex computation and business logics are
handled by application server without the presence of Human
being. On top of that there is automatic communication between
immediate layers due to which users do not need to understand the
complex communications. Middleware helps for interoperability.
Usability: This architecture allows users to request, access and
present data through familiar desktop interfaces.
3. One of the suggestions proposed by Hures’ IS department is
the use of intranet web technology. Examine the pros and
cons of such an idea.
Intranet web Technology: A network based on internet protocols
(TCP/IP Protocols) belonging to an organization, usually a
corporation, accessible only member, employee, or other
authorizations is called Intranet technology (webopedia.com).
Intranet sometimes also called as organization’s internal
website. Intranet technology is generally based on three-tier
architecture (en.kioskea.net).
Pros of Intranet web technology:
Advantage of security
Assignment: Client-Server Architecture
6 | P a g e
An intranet web technology is a private and internal local
network technology that uses typical internet protocols. As
intranet is closed private network open only to selected
groups, it more secure to outside world. It uses the same
internet software due to which we don’t need to deploy
entirely new and untried software. All information is password
protected, but intranets are able to be customized to the
individual employee, to reduce the possibility of unauthorised
accessed to sensitive information (www.ehow.co.uk).
Advantage of sharing information
The functionality of intranet enables greater sharing of
information and collaboration across the organization.
Documents are stored centrally but can be accessed by anyone
with appropriate clearance. Printers and other peripheral
devices can also be controlled centrally. Moreover, other
functions like calendars, task-management functions can also
be added to make the flow of information effective
(www.ehow.co.uk).
Cons of intranet web technology:
Disadvantage of cost:
The cost is considerable during the initial set-up of the
intranet. The size and complexity also determines the cost of
intranet. Furthermore, upgrading and maintenance cost and also
the cost to train the staffs makes intranet technology
expensive.
Disadvantage of complexity:
Sometimes despite of effort to train staffs, they can’t
effectively use the intranet web technology. So, the intranet
web technology is not utilized to its maximum effectiveness.
Staffs sometimes feel overloaded information. It also adds
burdens to IT department.
Conclusion: Despite of some disadvantages, intranet web
technology enables effective communication within the
organization. An intranet can be configured personally for
every employee, giving them access to only the required
information via various mechanisms.
4. Do you think the popularity of intranet software and the
Internet pose threats to traditional Client/Server systems?
Yes, the popularity of intranet software and the Internet pose
threats to traditional client/server system.
Intranet: According to en.kioskea.net, an intranet is a set of
internet inside a local network. It involves the use of
client/server standards (TCP/IP) protocols and web server protocol
(HTTP protocol) to create information system inside an organization
or enterprise.
Assignment: Client-Server Architecture
7 | P a g e
Internet: Internet sometimes simple called Net is a worldwide system
of computer networks-a network of networks in which a user in any
computer can get information from any computer in the world if
former has permission (searchwindevelopment.techtarget.com). It is
network between Organizations. The technology uses a set of protocol
called TCP/IP protocol (acronym for Transmission Control
Protocol/Internet protocol.)
How intranet and internet cause threats to traditional client/server
architecture?
Traditional Client/Server architecture is somehow outdated
architecture in this advance technological era because of defect in:
 Scalability
 Maintainability
 Flexibility
 Interoperability and
 Usability
The emerging architecture called three-tier architecture far
surpasses traditional Client/Server architecture because later
architecture overcomes all the problems in former architecture.
According to en.kioskea.net, an intranet and internet are generally
based on three-tier architecture, comprising:
 Client (generally web browsers);
 One or several application server (middleware) and
 A database server.
The network makes possible to exchange queries and the responses
between clients and servers. Both intranet and internet are based on
same technology but the difference is intranet is secured from
outside world by firewall while internet is open to outside world.
As both intranet and internet are based on three-tier architecture,
the systems are scalable, flexible, maintainable, usable and cost
effective. The components can be managed and enhanced easily without
affecting the other components. The systems can be scaled according
to the change in internal and external environment easily because of
less dependency among software architectures. Moreover, this
architecture increases performances of network and throughput as
well. On the other hand, in traditional client/server architecture
as business logic is resided in client side, it is very ineffective,
expensive to scale according to the need of Company.
Assignment: Client-Server Architecture
8 | P a g e
References:
(crfonline.org)
(compnetwroking.about.com)
(en.kioskea.net)
(webopedia.com)
(www.ehow.co.uk)
(www.en.wikipedia.com)
(searchwindevelopment.techtarget.com)
(www.ukessays.co.uk)
(www.americanessays.com)
THANK YOU

More Related Content

What's hot

Propalms Centralized Computing Solution Document
Propalms Centralized Computing   Solution DocumentPropalms Centralized Computing   Solution Document
Propalms Centralized Computing Solution Document
Vijender Yadav
 
Bsit – integration styles (intra + inter)
Bsit – integration styles (intra + inter)Bsit – integration styles (intra + inter)
Bsit – integration styles (intra + inter)
kyroskoh
 
Ch 8 Client Server
Ch 8  Client  ServerCh 8  Client  Server
Ch 8 Client Server
guest8fdbdd
 
Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)
rosu555
 
Middleware Basics
Middleware BasicsMiddleware Basics
Middleware Basics
Varun Arora
 

What's hot (20)

Propalms Centralized Computing Solution Document
Propalms Centralized Computing   Solution DocumentPropalms Centralized Computing   Solution Document
Propalms Centralized Computing Solution Document
 
Clientserver
ClientserverClientserver
Clientserver
 
Bsit – integration styles (intra + inter)
Bsit – integration styles (intra + inter)Bsit – integration styles (intra + inter)
Bsit – integration styles (intra + inter)
 
3 tier architecture
3 tier architecture3 tier architecture
3 tier architecture
 
Office automation system for scholl (oasfs) by vikas sharma
Office automation system for scholl (oasfs) by vikas sharmaOffice automation system for scholl (oasfs) by vikas sharma
Office automation system for scholl (oasfs) by vikas sharma
 
3 tier architecture
3 tier architecture3 tier architecture
3 tier architecture
 
Ch 8 Client Server
Ch 8  Client  ServerCh 8  Client  Server
Ch 8 Client Server
 
J2 ee archi
J2 ee archiJ2 ee archi
J2 ee archi
 
3 tier architecture in Asp.Net
3 tier architecture in Asp.Net3 tier architecture in Asp.Net
3 tier architecture in Asp.Net
 
Chapter 1 introduction to scaling networks
Chapter 1   introduction to scaling networksChapter 1   introduction to scaling networks
Chapter 1 introduction to scaling networks
 
08 message and_queues_dieter_gawlick
08 message and_queues_dieter_gawlick08 message and_queues_dieter_gawlick
08 message and_queues_dieter_gawlick
 
Presentation2
Presentation2Presentation2
Presentation2
 
Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)
 
Cloud strategy in fe final version
Cloud strategy in fe final versionCloud strategy in fe final version
Cloud strategy in fe final version
 
Ektron 3-Tier Architecture
Ektron 3-Tier ArchitectureEktron 3-Tier Architecture
Ektron 3-Tier Architecture
 
Middleware Basics
Middleware BasicsMiddleware Basics
Middleware Basics
 
3 tier architecture
3 tier architecture3 tier architecture
3 tier architecture
 
Mobile Responsive Social Corporate Intranet Portal Application
Mobile Responsive Social Corporate Intranet Portal ApplicationMobile Responsive Social Corporate Intranet Portal Application
Mobile Responsive Social Corporate Intranet Portal Application
 
Client Server Model and Distributed Computing
Client Server Model and Distributed ComputingClient Server Model and Distributed Computing
Client Server Model and Distributed Computing
 
Resume
ResumeResume
Resume
 

Viewers also liked

Finalización proyecto emocionarte fuenlabrada-murcia
Finalización proyecto emocionarte fuenlabrada-murciaFinalización proyecto emocionarte fuenlabrada-murcia
Finalización proyecto emocionarte fuenlabrada-murcia
Jose Blas Garcia Pérez
 
Manual de entrenamiento panacur y coopersol msd antiparasitarios finca produc...
Manual de entrenamiento panacur y coopersol msd antiparasitarios finca produc...Manual de entrenamiento panacur y coopersol msd antiparasitarios finca produc...
Manual de entrenamiento panacur y coopersol msd antiparasitarios finca produc...
MSD Salud Animal
 
Subnetting pablo gil
Subnetting pablo gilSubnetting pablo gil
Subnetting pablo gil
pablgil
 
2014: The year in pictures
2014: The year in pictures2014: The year in pictures
2014: The year in pictures
guimera
 
Ciclo eficiencia energ triptikoa
Ciclo eficiencia energ triptikoaCiclo eficiencia energ triptikoa
Ciclo eficiencia energ triptikoa
Tic Eraiken
 
Antonio Machado
Antonio MachadoAntonio Machado
Antonio Machado
mvaldesr
 

Viewers also liked (20)

Patronales 2012, parroquia santuario santa maría reina de los ángeles
Patronales 2012, parroquia santuario santa maría reina de los ángelesPatronales 2012, parroquia santuario santa maría reina de los ángeles
Patronales 2012, parroquia santuario santa maría reina de los ángeles
 
0.2 introducción a la psicología 3
0.2 introducción a la psicología 30.2 introducción a la psicología 3
0.2 introducción a la psicología 3
 
(2015) Indigenous Peoples of Canada (33.0 MB)
(2015) Indigenous Peoples of Canada (33.0 MB)(2015) Indigenous Peoples of Canada (33.0 MB)
(2015) Indigenous Peoples of Canada (33.0 MB)
 
Finalización proyecto emocionarte fuenlabrada-murcia
Finalización proyecto emocionarte fuenlabrada-murciaFinalización proyecto emocionarte fuenlabrada-murcia
Finalización proyecto emocionarte fuenlabrada-murcia
 
Using Cloud Tech and Social Network Tools to Keep Your Career in the Game
Using Cloud Tech and Social Network Tools to Keep Your Career in the GameUsing Cloud Tech and Social Network Tools to Keep Your Career in the Game
Using Cloud Tech and Social Network Tools to Keep Your Career in the Game
 
Resumen Ranking Máster 2011
Resumen Ranking Máster 2011Resumen Ranking Máster 2011
Resumen Ranking Máster 2011
 
Vogue Belleza Mayo 2012
Vogue Belleza Mayo 2012Vogue Belleza Mayo 2012
Vogue Belleza Mayo 2012
 
JamesMullett_CV_15
JamesMullett_CV_15JamesMullett_CV_15
JamesMullett_CV_15
 
Manual de entrenamiento panacur y coopersol msd antiparasitarios finca produc...
Manual de entrenamiento panacur y coopersol msd antiparasitarios finca produc...Manual de entrenamiento panacur y coopersol msd antiparasitarios finca produc...
Manual de entrenamiento panacur y coopersol msd antiparasitarios finca produc...
 
Subnetting pablo gil
Subnetting pablo gilSubnetting pablo gil
Subnetting pablo gil
 
Abaka 01 04-2013
Abaka 01 04-2013Abaka 01 04-2013
Abaka 01 04-2013
 
gobierno digital y ciberjusticia
gobierno digital y ciberjusticiagobierno digital y ciberjusticia
gobierno digital y ciberjusticia
 
Oodesk
OodeskOodesk
Oodesk
 
2014: The year in pictures
2014: The year in pictures2014: The year in pictures
2014: The year in pictures
 
Ciclo eficiencia energ triptikoa
Ciclo eficiencia energ triptikoaCiclo eficiencia energ triptikoa
Ciclo eficiencia energ triptikoa
 
Antonio Machado
Antonio MachadoAntonio Machado
Antonio Machado
 
Notas Mateo 1
Notas Mateo 1 Notas Mateo 1
Notas Mateo 1
 
Patrimonio Paleocristiano de Aragón
Patrimonio Paleocristiano de AragónPatrimonio Paleocristiano de Aragón
Patrimonio Paleocristiano de Aragón
 
Bioelementos
BioelementosBioelementos
Bioelementos
 
Script psp
Script pspScript psp
Script psp
 

Similar to Anil Nembang: Hures Company Case Study

Chapter2
Chapter2Chapter2
Chapter2
suks_87
 

Similar to Anil Nembang: Hures Company Case Study (20)

HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfHOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
 
Chapter2
Chapter2Chapter2
Chapter2
 
Appathika.ppt
Appathika.pptAppathika.ppt
Appathika.ppt
 
E-Business And Technology Essay
E-Business And Technology EssayE-Business And Technology Essay
E-Business And Technology Essay
 
TermPaper
TermPaperTermPaper
TermPaper
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
 
Distributed architecture (SAD)
Distributed architecture (SAD)Distributed architecture (SAD)
Distributed architecture (SAD)
 
Web Based Application for Rent or Sale
Web Based Application for Rent or SaleWeb Based Application for Rent or Sale
Web Based Application for Rent or Sale
 
106248842 cc
106248842 cc106248842 cc
106248842 cc
 
publishable paper
publishable paperpublishable paper
publishable paper
 
E commerce technologies
E commerce technologiesE commerce technologies
E commerce technologies
 
Distributed Software Engineering with Client-Server Computing
Distributed Software Engineering with Client-Server ComputingDistributed Software Engineering with Client-Server Computing
Distributed Software Engineering with Client-Server Computing
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
 
Distributed Operating System
Distributed Operating SystemDistributed Operating System
Distributed Operating System
 
An in-building multi-server cloud system based on shortest Path algorithm dep...
An in-building multi-server cloud system based on shortest Path algorithm dep...An in-building multi-server cloud system based on shortest Path algorithm dep...
An in-building multi-server cloud system based on shortest Path algorithm dep...
 
H017113842
H017113842H017113842
H017113842
 
cloud computing basics
cloud computing basicscloud computing basics
cloud computing basics
 
Distributed system
Distributed systemDistributed system
Distributed system
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Anil Nembang: Hures Company Case Study

  • 2. Assignment: Client-Server Architecture 1 | P a g e ANALYSING THE SCENARIO: What is mainframe computer and dumb terminal? Mainframe computer is the form of computing in which a single centralize computer performs the processing for multiple computer (crfonline.org). Dumb terminal is a display monitor that has no processing capabilities attached to mainframe computer. Dumb terminal is simply an output device that accepts data from mainframe computer (webopedia.com). Here, as Hures Company implemented its first information system in 1987 purchasing mainframe computer that served dumb terminals we can easily anticipate that the system has embedded database system which cannot run in individual process. Fig: Mainframe and dumb terminals. In 1999 to cope with changes in both business and Information System environment and also to accommodate Y2K demands, the Hures Company ported applications to client/server system which contributed large to efficiency and profit. What is client/server application? Client/server application is a piece of software in client and makes requests to a remote server via network. Client/server application
  • 3. Assignment: Client-Server Architecture 2 | P a g e is written in high-level visual programming languages where user interfaces and most of the business logics reside in client application. One of the examples of client/server applications is database application that makes database queries to a remote central database server. This type of application grew in popularity many years ago as personal computers became common alternative to older mainframe computers (compnetwroking.about.com). Fig: Client/server application system Current situation: The company continued to grow rapidly ever since but has noticed that the network has problems such as difficulty in scaling the servers to respond to the increased load in the distributed environment and a continual requirement for increasingly powerful desktop machines. 1. Do you think the problems faced by Hures, both past and present, are unique? Why or why not? The problem faced by Hures, both past and present, are unique in term of price, space and operation because mainframe system requires intense resources consumption, intense human attention and intense occupying space in comparison to client/server application system. Moreover, the mainframe system is not reliable if too many users are logged on or if the network is out as the terminals have no its own computational power. But in client/server system, terminals are intelligent. However, the problems are not unique in term of scalability, meeting future demands, interoperability, and maintainability. In mainframe time, the system is not scalable in distributed environment because of embedded system and dumb terminals. In client/server application system as well, the system is not scalable
  • 4. Assignment: Client-Server Architecture 3 | P a g e as interfaces and most of the business logics are resided in client application. The company could expand the system in both situation, but it costs lot in upgrading all the clients and upgrading the server side with respect to clients. In Hures Company, both mainframe and client/server systems are not flexible enough to meet future demands. The case study implies the growing business trend in the company but the systems are not well designed to cater future demands. The company cannot adjust the system as per the way the business expands. The both system cannot tackle the changes brought about by change in internal and external environment. Maintainability is very hard in both embedded mainframe system and client/server application system. Whole the system need to be reviewed in order to modify to correct faults, improve performance, or adapt to changed environment. As there is no middleware in both the mainframe and client-server system, there is no expectation of interoperability. 2. Suggest alternative architectures that could be used to overcome the problems faced by Hures’ current Client/Server technology. The alternative architecture suggested to Hures Company to overcome all problems is three-tier architecture. Three-tier client/server architecture Three-tier architecture is the component-oriented approach of architectural deployment style that describes the separation of functionality into layers. Each segment is a tier and is located in different physical computer. In this architecture, the software is divided into 3 different tiers: presentation tier, logic tier and data tier. Each tier is developed and maintained independently. There is very low interdependency between layers because only layer immediate to other can access its public components.
  • 5. Assignment: Client-Server Architecture 4 | P a g e Fig: Three-tier client-server architecture (www.en.wikipedia.com) Presentation tier: Presentation tier provides application’s user interface to users. It involves Graphical User Interface in smart client interaction while web based technology in browser-based technology. It is also called as client. Logic layer: This layer encapsulates business logic (business rules, data validation), data access logic etc. It controls the functionality of application by detailed processing. It is also known as middle layer. Business logic resides sometimes both in client side and server side and sometimes in either client side or server side. But middleware like MOM and OOM help in conversation between client and server. Data layer: Data layer consists of database server. Here information is stored and retrieved. Note: This three-architecture is based on (www.en.wikipedia.com).
  • 6. Assignment: Client-Server Architecture 5 | P a g e Why three-tier architecture is suggested as alternative architecture for Hures Company? The main problem of Hures Company is difficulty in scaling the servers to respond to the increased load in the distributed environment and a continual requirement for increasingly powerful desktop machines because of rapid growth of the company. So, if the Hures Company introduces Three-tier client-server architecture the company in question will be benefited from scalability, maintainability, flexibility, interoperability, and usability. Scalability: Because each tier is independent of the other tiers, scaling either server side or client side is pretty straightforward. The Hures Company can scale its system as per the future demand. Maintainability: As there is very less interdependency between layers, the Hures Company can update, upgrade or bring about changes according to the demand without affecting the system as a whole. Flexibility: Because each layer can be scaled and managed, flexibility can be increased. Interoperability: Hures Company can be benefited of Interoperability in three-tier architecture because back-end processes like complex computation and business logics are handled by application server without the presence of Human being. On top of that there is automatic communication between immediate layers due to which users do not need to understand the complex communications. Middleware helps for interoperability. Usability: This architecture allows users to request, access and present data through familiar desktop interfaces. 3. One of the suggestions proposed by Hures’ IS department is the use of intranet web technology. Examine the pros and cons of such an idea. Intranet web Technology: A network based on internet protocols (TCP/IP Protocols) belonging to an organization, usually a corporation, accessible only member, employee, or other authorizations is called Intranet technology (webopedia.com). Intranet sometimes also called as organization’s internal website. Intranet technology is generally based on three-tier architecture (en.kioskea.net). Pros of Intranet web technology: Advantage of security
  • 7. Assignment: Client-Server Architecture 6 | P a g e An intranet web technology is a private and internal local network technology that uses typical internet protocols. As intranet is closed private network open only to selected groups, it more secure to outside world. It uses the same internet software due to which we don’t need to deploy entirely new and untried software. All information is password protected, but intranets are able to be customized to the individual employee, to reduce the possibility of unauthorised accessed to sensitive information (www.ehow.co.uk). Advantage of sharing information The functionality of intranet enables greater sharing of information and collaboration across the organization. Documents are stored centrally but can be accessed by anyone with appropriate clearance. Printers and other peripheral devices can also be controlled centrally. Moreover, other functions like calendars, task-management functions can also be added to make the flow of information effective (www.ehow.co.uk). Cons of intranet web technology: Disadvantage of cost: The cost is considerable during the initial set-up of the intranet. The size and complexity also determines the cost of intranet. Furthermore, upgrading and maintenance cost and also the cost to train the staffs makes intranet technology expensive. Disadvantage of complexity: Sometimes despite of effort to train staffs, they can’t effectively use the intranet web technology. So, the intranet web technology is not utilized to its maximum effectiveness. Staffs sometimes feel overloaded information. It also adds burdens to IT department. Conclusion: Despite of some disadvantages, intranet web technology enables effective communication within the organization. An intranet can be configured personally for every employee, giving them access to only the required information via various mechanisms. 4. Do you think the popularity of intranet software and the Internet pose threats to traditional Client/Server systems? Yes, the popularity of intranet software and the Internet pose threats to traditional client/server system. Intranet: According to en.kioskea.net, an intranet is a set of internet inside a local network. It involves the use of client/server standards (TCP/IP) protocols and web server protocol (HTTP protocol) to create information system inside an organization or enterprise.
  • 8. Assignment: Client-Server Architecture 7 | P a g e Internet: Internet sometimes simple called Net is a worldwide system of computer networks-a network of networks in which a user in any computer can get information from any computer in the world if former has permission (searchwindevelopment.techtarget.com). It is network between Organizations. The technology uses a set of protocol called TCP/IP protocol (acronym for Transmission Control Protocol/Internet protocol.) How intranet and internet cause threats to traditional client/server architecture? Traditional Client/Server architecture is somehow outdated architecture in this advance technological era because of defect in:  Scalability  Maintainability  Flexibility  Interoperability and  Usability The emerging architecture called three-tier architecture far surpasses traditional Client/Server architecture because later architecture overcomes all the problems in former architecture. According to en.kioskea.net, an intranet and internet are generally based on three-tier architecture, comprising:  Client (generally web browsers);  One or several application server (middleware) and  A database server. The network makes possible to exchange queries and the responses between clients and servers. Both intranet and internet are based on same technology but the difference is intranet is secured from outside world by firewall while internet is open to outside world. As both intranet and internet are based on three-tier architecture, the systems are scalable, flexible, maintainable, usable and cost effective. The components can be managed and enhanced easily without affecting the other components. The systems can be scaled according to the change in internal and external environment easily because of less dependency among software architectures. Moreover, this architecture increases performances of network and throughput as well. On the other hand, in traditional client/server architecture as business logic is resided in client side, it is very ineffective, expensive to scale according to the need of Company.
  • 9. Assignment: Client-Server Architecture 8 | P a g e References: (crfonline.org) (compnetwroking.about.com) (en.kioskea.net) (webopedia.com) (www.ehow.co.uk) (www.en.wikipedia.com) (searchwindevelopment.techtarget.com) (www.ukessays.co.uk) (www.americanessays.com) THANK YOU