Monday, June 3, 2019

Assignment In Client Server Architecture Information Technology Essay

Assignment In Client Server Architecture tuition Technology EssayThis report focuses on understanding the problems being face by the Information System (IS) department of Hures as well as early(a) Organisations dealing with human resource and management. Such organizations, private or public, continuously collect and process data (information) apply technologies available at an increased point and store the information in computerized systems.To maintain such information systems becomes difficult and extremely complex, especially as scalability-issues arise. Such problems identified are required to be sorted and find let on the solutions.Therefore from the scenario given, the measures were taken into considerations to minimize problems in communication mechanism. The node horde architecture was established in the beginning to mitigate productivity, efficiency and information handling. Nevertheless, the Hures Information System department experienced difficulties as the st ored information grew deuce-aceing to the need of establishing peer to peer architecture, intranets and extranets for security purposes.QUESTION iodineDo you think the problems faced by Hures are unique? Why or why non?The difficulty faced by Hures IS department is not peculiar to them rather the underlying technology. In a distributed environment they were working on, the leaf node server technology had problems when it comes to the extension or leveling servers to accommodate supererogatory loads that were initially not envisaged. Client-server architecture consists of series of clients connected to a commonality server mounted at some remote or nigh location. Hence when there are load increments in thedistributed environment, it usually tends to cause problems that make the architecture difficult to scale accordingly. More eitherplace, for all substance abusers on the web the regulate of data transfer might go down, and sometimes a powerful and expensive computer needs to be installed and integrated into the system in an search to improve scalability and availability of the server.Nevertheless, for every application under heavy loading, numerous computers may be needed. It is customary to utilise one computer to each server application under medium loading, so as to prevent the extent of damage, for example in the occasion of system failure or violation of covert and security. Client and servers when connected together to form a network that would facilitate better communication is referred to as a client server architecture. A client is an application or system that feeleres a (remote) service on another computer system known as a server by trend of a network. Hence servers by their operation receive a message from client and work on them and then return the responses to the client. For instance, file server, web server, send server and web browser are servers and client respectively (Harkey et aL, 1999).QUESTION TWOSuggest alternative arch itectures that could be used to overcome the problems faced by Hures current Client/Server technology.Increasingly need of users accessing to network resources (i.e. information) virtually for anything held on a database through a common interface. The network supports between the user and that information. Therefore, distributed system is one of the most ideal for location of resources or database transparency.In general, a server and client systems consist of two major parts which are software and related hardware. On a controlled and percentaged ground to the clients, servers host resources and make them available. This allows access to server content to be controlled in a very much better and secured manner. Basically, client/server architecture is a two tier technology which means that it has two nodes namely a client and a server. In order to improve communication between the client and the server, a third node or interface called a middleware is introduced between the clien t and the server. This is technically a better chassis as the middleware which is a form of software between the client and the server processes data for clients such as web browsers e.g. internet explorer, mozilla firefox and hunting expedition which are all web client. Middleware store data for user applications enabling a comparatively better design that facilitate server scalability as the treat of requests has been separated by balancing the load on different servers (Harkey, et al, 1999).The role of Middleware in a Client-Server Architecture is illustrated in the figure belowIntroducing the middleware results in the design of a three-tier architecture which later can be extended to an n-tier. The n-tier architecture has the disadvantages of impacting or increasing traffic congestion and reducing the design robustness. N-tier architecture becomes more difficult to run and test software than the two-tier architecture due to device congestion resulting in communication diffic ulties. The increased load in n-tier architecture could lead to overloading of the network. Apart from the mentioned disadvantages n-tier architecture has number of advantages which include better security control, increased flexibility, user friendly, easy upgradeability and scalability compared to the two tier architecture (Harkey, et al, 1999)The implementation of an n-tier distributed computing architecture will be a solution to overcome problems faced by Hures. N-tier architecture has the potential to provide better, more timely information across the try at a lower cost than the current combination of PC LAN, two-tier client/server, or mainframe applications that necessitate been developed in most organizations. For n-tier architecture to be effective, three key components need to be presentEmpowerment of the developer to integrate a distributed computing architecture at bottom existing databases, tools, and components.Certainty of streamlined network traffic.Mechanisms to handle load balancing to distribute the work across many servers.The n-tier client/server architecture provides an environment which supports all the benefits of two the one-tier border on and the two-tier approach, and also supports the goals of a flexible architecture.The three tiers refer to the three logical component parts of an application, not to the number of machines used by the application. An n-tier application archetype splits an application into its three logical component types-presentation logic, blood logic, and data access logic, where there may be any number of each of the component types inwardly an application. The application components communicate with each other using an abstract interface, which hides the underlying function performed by the component. This infrastructure provides location, security, and communication services for the application components.The n-tier client/server architecture provides an environment which supports all the benefits of both the one-tier approach and the two-tier approach, and also supports the goals of a flexible architecture.The technology should be able to handle future growth. Hures should carry out n-tier client/server technology to solve their partitioning problems. N-tier client/server architecture is an evolution of the conventional 2-tier and 3-tier models, and is suitable for large profession applications where many users share common data and trading operations on them.Peer to PeerThe structure of peer to peer network architectures, they do not have a mulish server responsible for blocking and routing request to and from nodes unlike client server architecture. Peer-to-peer networks are simple and easy to implement. However they fail to render the same executing under heavy loads. Distributed computing, instant messaging and affinity communities are all examples of peer to peer network architecture (Deal, 2005).QUESTION THREEOne of the suggestions proposed by Hures IS department is the use of intra net web technology. Examine the pros and cons of such an idea.Intranet can be described as a private version of the internet or network connectivity. It is based on TCPIIP communications protocols configured for a particular organization system, usually a corporation, accessible only by the organizations members, employees, or others with permission to do so. An intranet website looks and acts just like any other Web sites, but the firewall surrounding an intranet fends off unauthorized access. Like the cyberspace, intranets are used to share information over a network (Douglas, 2005). Intranet is privately owned computer network that utilizes net profit protocols and network connectivity. It is safe and secure in sharing part of organizational operations such as marketing, administrative information or other matters concerned with the organization and its employees. The techniques, concepts and technologies associated with the internet such as clients and servers running on the Internet protocol suite are employed in building an intranet. HTTP, FTP, e-mail and other Internet protocols are also applied.Usually intranets are restricted to employees of the particular firm, go extranets tend to have wider scope so that they can be accessed by customers, suppliers or other authorized agents. On the other hand, intranets like other technologies have their own merits and demerits. Below are some of the advantages and disadvantages of this technology (Stallings and Slyke, 1998).The pros and cons (advantages and disadvantages respectively) for Hures using intranet web Technology were accounted for as followsAdvantagesIntranet serves as an effective communication tool indoors the organization, both vertically and horizontally thereby promoting a common corporate culture where every user is accessing the same information available on a common platform. Intranet enables proper time management, since organizations are capable to make adequate informat ion available to employees on the intranet. This way, employees are able to connect to relevant information within the effective time.Increases the productivity levels of workforce by allowing them to locate and view information faster. It also enables them to use applications relevant to the task at hand. Also, web browsers such as Internet Explorer or Firefox help users to readily access data from any database the organization makes available, subject to security provisions within the companys workstations thereby ameliorate services to users.Intranets have cross-platform capability which enables it to adequately support different types of web browsers irrespective of their backbone be it Java, Mac or UNIX. This ability enhances collaboration since every authorized user is capable of viewing information on the site thereby promoting teamwork.Provide a comparatively cost-effective means for network users to access information or data through a web-browser instead of preparing ph ysical documents like manuals, internal phone list or even ledges and requisition forms.publication on the web permits critical corporate knowledge such as company policies, business standards, training manuals etc to be secured and easily accessed throughout the company using hypermedia and other web technologies.It facilitates the business operations and management. Increasingly they are being used as a platform for developing and deploying applications that support business operations and decision making across the whole enterprise. (Goldberg, 1996)QUESTION FOURDo you think the popularity of intranets and the Internet pose threats to traditional Client/Server systems?Intranet and Internet become popular to some extent because they pose some threats to the traditional Client/server systems.It is true that Internet and intranet are both web technologies. A few years ago, the typical office environment consisted of PCs were connected to a network, with servers providing file and pri nt services. Remote access was awkward, and profitability was achieved by use of laptop computers. Terminals attached to mainframes were prevalent at many companies as well with even fewer remote access and portability options. (Silberschtuz, 2004)Currently the secure intranets are the fastest-growing segment of the Internet comparatively much less expensive to build and manage compared to the private networks. Usually private networks are based on proprietary protocols with mostly client server architecture. An extranet creates a secure tunnel between two companies over the public Internet. It is also used to connect remote employees to corporate network by the use of Virtual Private Networks (VPNs).Also intranets are increasingly being used for tools and applications delivery, which facilitate group work and teleconferencing to an enhanced collaboration within the organizations. In order to increase productivity of organizations, sophisticated corporate directories, sales and CRM tools and project management, are all taking advantage of intranet technology (Robert, et al, 1999).ConclusionThe problems faced by Hures like other organization including private and public,which are continuosly collecting and storing data in accelerated rate. The above answers on respective four questions discussed on as follows If the problems experienced by Hures since 1985 up to now are unique or not, comparing to other organizations, such problems experienced were due to growth of business demands in information systems (IS). For example, Hures was forced to downsize the IS from mainframe to Client/Server network resulted in higher efficiency and profit. Nevertheless the problems arise on the server scaling due to loading capacity, forced the company to incur much cost on implementation of distributed environment with more powerful desktop machines. These problems are not unique because all organizations demand changes in IS while they grow up in business.Secondly, the alterna tive architectures have been discussed about solving the problems of Heures as well as other organizations in information systems. Therefore, distributed system has been suggested which is the most ideal for location of resources or database transparency in networking environment.Thirdly, the intranet web technology as the special network for special organization suggested by Hures IS department, was discussed on its pros and cons which can be relied on for proper construction of networks in any organization.Finally, we have seen that the popularity of intranets and the Internet pose threats to traditional Client/Server systems since the most fastest growing firms with sophisticated systems have taken advantages of Intranet and Internet technologies to facilitate the efficiency in networking and higher production.BibliographyDouglas, E. Corner (2000). THE INTERNET. tertiary ed. Prentice Hall Publishing.Emmerich, W. (2003). Engineering Distributed objects. Wiley publishingGralla, P. (2005). How the Internet Works .3rd ed. Addison WesleyNorton. P. (2003). Introduction to computers. 5th ed.http//www .firstauthor .orglDownloadsIP2P. pdfWikipedia (2007), Client server architecture, accessed 18th September, 2008 http//en.wikipedia.orglwiki/Client-server _architectureREFERENCESDouglas, E. C. (2005). Internetworking with TCPIIP Principles, Protocols and Architecture. 5th ed. Massachusetts comprise of Technology, pp.349-359Goldberg, C. J. (1996). Entrepreneur Business Service Industry October.(http//findarticles.coIIUp articles/mi mODTVis /ai 18726414), accessed on 09/10/2008.Harkey, D., Edwards, J. and Orfali, R. (1999). Client/server Survival Guide. 3rd ed., Canada, Pp 7-10, 12, 199-201 and 349Silberschatz, A. (2004). Operating System Concepts with Java. sixth ed. USA John WHey Sons, Inc. p.23.Stallings, W. and Slyke, R. V. (1998). Business Data Communications. 3rd ed. Prentice-Hall International. Pp.422, 429-433.Beal, V. (2005). All about Peer to Peer. Date acce ssed-12th September, 2008 http//www.webopedia.comIDidY ouKnowlInternet/2005/peer to peer.asp

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.