Friday, March 29, 2019

Assignment In Client Server Architecture Information Technology Essay

grant In leaf node emcee Architecture reading Technology look forThis report foc engrosss on understanding the problems being faced by the In manikination System (IS) surgical incision of Hures as well up as separate Organisations traffic with human resource and management. Such schemes, close or public, continuously suck and process info ( schooling) using technologies available at an increased consider and store the reading in computerized remainss.To maintain much(prenominal) information systems moves laborious and extremely complex, especi everyy as scalability-issues arise. Such problems identified argon essential to be sorted and find out the solutions.Therefore from the scenario given, the measures were taken into considerations to denig value problems in chat mechanism. The client legion computer architecture was established in the beginning to improve productivity, efficiency and information handling. Nevertheless, the Hures Information System depar tment experienced difficulties as the stored information grew leading to the need of establishing companion to lucifer architecture, intranets and extranets for security purposes.QUESTION ONEDo you see the problems faced by Hures argon queer? Why or why not?The trouble faced by Hures IS department is not peculiar to them rather the inherent engineering. In a distributed environment they were disciplineing on, the client waiter technology had problems when it comes to the extension or scaling waiters to accommodate additional cuts that were initially not envisaged. client- master of ceremonies architecture consists of series of clients mergeed to a car park innkeeper mounted at some remote or nearby location. therefrom when there argon load increments in thedistributed environment, it usually tends to ca pulmonary tuberculosis problems that string the architecture difficult to scale accordingly. Moreover, for all users on the cyberspace the rate of data transfer migh t go down, and sometimes a effective and expensive computer needs to be installed and shuffled into the system in an attempt to improve scalability and availability of the server.Nevertheless, for every application under gruelling loading, numerous computers may be needed. It is customary to utilise one computer to each server application under medium loading, so as to prevent the extent of damage, for example in the occasion of system visitation or violation of privacy and security. Client and servers when connected together to form a network that would facilitate better confabulation is referred to as a client server architecture. A client is an application or system that accesses a (remote) service on an some other computer system cognize as a server by way of a network. indeed servers by their operation receive a message from client and work on them and then return the responses to the client. For instance, file server, electronic network server, mail server and meshing browser argon servers and client respectively (Harkey et aL, 1999).QUESTION twainSuggest alternative architectures that could be used to overcome the problems faced by Hures current Client/Server technology.Increasingly need of users accessing to network resources (i.e. information) just almost for allthing held on a database through a common embrasure. The network supports amidst the user and that information. Therefore, distributed system is one of the most ideal for location of resources or database transp arency.In general, a server and client systems consist of two major parts which are software and related hardware. On a controlled and shared out ground to the clients, servers host resources and make them available. This allows access to server content to be controlled in a much better and secured manner. Basically, client/server architecture is a two stage technology which kernel that it has two nodes videlicet a client and a server. In secern to improve confe rence between the client and the server, a third node or interface called a middleware is introduced between the client and the server. This is technically a better excogitate as the middleware which is a form of software between the client and the server processes data for clients such as web browsers e.g. internet explorer, mozilla firefox and safari which are all web client. Middleware store data for user applications enabling a comparatively better figure of speech that facilitate server scalability as the touch on of requests has been separated by balancing the load on different servers (Harkey, et al, 1999).The exercise of Middleware in a Client-Server Architecture is illustrated in the figure belowIntroducing the middleware results in the design of a tether-tier architecture which later can be panoptic to an n-tier. The n-tier architecture has the disadvantages of impacting or increasing traffic congestion and reducing the design robustness. N-tier architecture becomes more difficult to run and test software than the two-tier architecture due to device congestion resulting in communication difficulties. The increased load in n-tier architecture could lead to overloading of the network. Apart from the mentioned disadvantages n-tier architecture has return of advantages which accept better security control, increased flexibility, user friendly, easy upgradeability and scalability compared to the two tier architecture (Harkey, et al, 1999)The implementation of an n-tier distributed computing architecture will be a solution to overcome problems faced by Hures. N-tier architecture has the potential to cater better, more timely information crosswise the enterprise at a lower cost than the current combination of PC LAN, two-tier client/server, or mainframe applications that have been developed in most presidencys. For n-tier architecture to be effective, three key components need to be presentEmpowerment of the developer to integrate a distributed co mputing architecture within existing databases, tools, and components.Certainty of efficacious network traffic.Mechanisms to handle load balancing to distribute the work across many servers.The n-tier client/server architecture provides an environment which supports all the benefits of two the one-tier approach and the two-tier approach, and also supports the goals of a flexible architecture.The three tiers refer to the three logical component parts of an application, not to the number of machines used by the application. An n-tier application model splits an application into its three logical component types-presentation logic, fear logic, and data access logic, where there may be any number of each of the component types within an application. The application components communicate with each other using an abstract interface, which hides the underlying function performed by the component. This infrastructure provides location, security, and communication services for the applic ation components.The n-tier client/server architecture provides an environment which supports all the benefits of both the one-tier approach and the two-tier approach, and also supports the goals of a flexible architecture.The technology should be able to handle future branch. Hures should carry out n-tier client/server technology to solve their partitioning problems. N-tier client/server architecture is an evolution of the traditional 2-tier and 3-tier models, and is suitable for large business applications where many users share common data and operations on them.Peer to PeerThe structure of peer to peer network architectures, they do not have a laid server responsible for blocking and routing request to and from nodes un handle client server architecture. Peer-to-peer networks are simple and easy to implement. However they fail to render the like performance under heavy loads. Distributed computing, instant messaging and affinity communities are all examples of peer to peer n etwork architecture (Deal, 2005).QUESTION tripletOne of the suggestions proposed by Hures IS department is the use of intra net web technology. reckon the pros and cons of such an idea.Intranet can be described as a private version of the internet or network connectivity. It is based on TCPIIP communications protocols piece for a contingent organization system, usually a corporation, accessible besides by the organizations members, employees, or others with permission to do so. An intranet website looks and acts just like any other Web sites, but the firewall surrounding an intranet fends off unauthorized access. similar the earnings, intranets are used to share information over a network (Douglas, 2005). Intranet is privately owned computer network that utilizes Internet protocols and network connectivity. It is unassailable and secure in sharing part of organizational operations such as marketing, administrative information or other matters concerned with the organization and its employees. The techniques, concepts and technologies associated with the internet such as clients and servers running on the Internet protocol suite are employed in takeing an intranet. HTTP, FTP, e-mail and other Internet protocols are also applied.Usually intranets are restricted to employees of the particular firm, while extranets tend to have wider scope so that they can be accessed by customers, suppliers or other authorized agents. On the other hand, intranets like other technologies have their own merits and demerits. Below are some of the advantages and disadvantages of this technology (Stallings and Slyke, 1998).The pros and cons (advantages and disadvantages respectively) for Hures using intranet web Technology were accounted for as followsAdvantagesIntranet serves as an effective communication tool within the organization, both vertically and horizontally thereby promoting a common integrated culture where every user is accessing the same information available o n a common platform. Intranet enables proper time management, since organizations are capable to make adequate information available to employees on the intranet. This way, employees are able to connect to relevant information within the effective time.Increases the productivity levels of workforce by allowing them to locate and view information faster. It also enables them to use applications relevant to the task at hand. Also, web browsers such as Internet Explorer or Firefox help users to readily access data from any database the organization makes available, subject to security provisions within the companys workstations thereby up(p) services to users.Intranets have cross-platform capability which enables it to adequately support different types of web browsers irrespective of their backbone be it Java, Mac or UNIX. This ability enhances collaboration since every authorized user is capable of viewing information on the site thereby promoting teamwork.Provide a comparatively cost-effective means for network users to access information or data through a web-browser instead of preparing physical documents like manuals, internal phone list or even ledges and requisition forms.Publishing on the web permits critical corporate knowledge such as company policies, business standards, training manuals etc to be secured and easily accessed throughout the company using hypermedia and other web technologies.It facilitates the business operations and management. Increasingly they are being used as a platform for developing and deploying applications that support business operations and closing making across the whole enterprise. (Goldberg, 1996)QUESTION FOURDo you think the popularity of intranets and the Internet pose threats to traditional Client/Server systems?Intranet and Internet become popular to some extent because they pose some threats to the traditional Client/server systems.It is true that Internet and intranet are both web technologies. A few years ago, the typical office environment consisted of PCs were connected to a network, with servers providing file and print services. Remote access was awkward, and profitability was achieved by use of laptop computers. Terminals attached to mainframes were prevalent at many companies as well with even fewer remote access and portability options. (Silberschtuz, 2004)Currently the secure intranets are the fastest-growing segment of the Internet comparatively much less expensive to build and manage compared to the private networks. Usually private networks are based on proprietary protocols with mostly client server architecture. An extranet creates a secure dig between two companies over the public Internet. It is also used to connect remote employees to corporate network by the use of Virtual hugger-mugger Networks (VPNs).Also intranets are increasingly being used for tools and applications delivery, which facilitate classify work and teleconferencing to an enhanced collaboration within the organizations. In order to increase productivity of organizations, sophisticated corporate directories, sales and CRM tools and project management, are all taking advantage of intranet technology (Robert, et al, 1999).ConclusionThe problems faced by Hures like other organization including private and public,which are continuosly collecting and storing data in accelerated rate. The above answers on respective four questions discussed on as follows If the problems experienced by Hures since 1985 up to now are unique or not, comparing to other organizations, such problems experienced were due to growth of business demands in information systems (IS). For example, Hures was forced to downsize the IS from mainframe to Client/Server network resulted in higher efficiency and profit. Nevertheless the problems arise on the server scaling due to loading capacity, forced the company to obtain much cost on implementation of distributed environment with more puissant desktop machines. These problems are not unique because all organizations demand changes in IS while they grow up in business.Secondly, the alternative architectures have been discussed about solving the problems of Heures as well as other organizations in information systems. Therefore, distributed system has been suggested which is the most ideal for location of resources or database transparency in networking environment.Thirdly, the intranet web technology as the special network for special organization suggested by Hures IS department, was discussed on its pros and cons which can be relied on for proper pull of networks in any organization.Finally, we have seen that the popularity of intranets and the Internet pose threats to traditional Client/Server systems since the most fastest growing firms with sophisticated systems have taken advantages of Intranet and Internet technologies to facilitate the efficiency in networking and higher production.BibliographyDouglas, E. Corner (2000). THE INTERNET. t ertiary ed. Prentice Hall Publishing.Emmerich, W. (2003). Engineering Distributed objects. Wiley publishingGralla, P. (2005). How the Internet Works .3rd ed. Addison WesleyNorton. P. (2003). admission to computers. 5th ed.http//www .firstauthor .orglDownloadsIP2P. pdfWikipedia (2007), Client server architecture, accessed 18th September, 2008 http//en.wikipedia.orglwiki/Client-server _architectureREFERENCESDouglas, E. C. (2005). Internetworking with TCPIIP Principles, Protocols and Architecture. 5th ed. momma Institute of Technology, pp.349-359Goldberg, C. J. (1996). Entrepreneur Business Service Industry October.(http//findarticles.coIIUp articles/mi mODTVis /ai 18726414), accessed on 09/10/2008.Harkey, D., Edwards, J. and Orfali, R. (1999). Client/server Survival Guide. 3rd ed., Canada, Pp 7-10, 12, 199-201 and 349Silberschatz, A. (2004). direct System Concepts with Java. 6th ed. USA John WHey Sons, Inc. p.23.Stallings, W. and Slyke, R. V. (1998). Business entropy Communicati ons. 3rd ed. Prentice-Hall International. Pp.422, 429-433.Beal, V. (2005). All about Peer to Peer. Date accessed-12th September, 2008 http//www.webopedia.comIDidY ouKnowlInternet/2005/peer to peer.asp

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.