SlideShare a Scribd company logo
INCLUDING
BASIC NETWORKING
• 3 primary logical architectures
1. Host-based
• Traditional mainframe / central computer model
2. Client-based / Peer-to-Peer
• Historically most home-based and many small office
networks
3. Client-server
• Microsoft model – or what we commonly see today
• Fairly powerful clients interacting with some number
of servers
• Model used on campus
WE WILL ONLY FOCUS ON CLIENT/ SERVER
ARCHITECTURE.
C/S archtecture including basic networking
A network architecture
in which each computer
or process on the
network is either
a client or a server.
A simple definition
A simple definition of CS is
“ server software accepts requests for data
from client software and returns the
results to the client.”
• Clients
• Servers
• Communication Networks
Server
Server
Client
• CS model distinguishes between client
/ server devices and applications.
• Clients request specific services.
• Servers respond to individual client
requests for services.
– Functionality implemented in software
• Depending on services the server provides,
physical server computers can be different than
other servers and client computers (i.e. more
processing power, more memory, etc.)
C/S archtecture including basic networking
• Structured architecture with specific roles
for specific devices using specific
applications.
– File server, printer server.
• A “managed” network .
– Unlike P2P will have a network admin.
• CS is the most commonly observed
architecture.
– Most applications are designed to be used on
CS architecture.
• Balance processing between clients and
server(s) by dividing functions.
– Client – presentation and application logic.
– Server – Data access logic, data storage,
application logic.
• Applications that run on computers.
• Rely on servers for
– Files.
– Devices. Clients are Applications
– Processing power.
• Example: E-mail client
– An application that enables you to send and
receive e-mail.
• Computers or processes that manage
network resources
– Disk drives (file servers) Servers Manage
– Printers (print servers) Resources
– Network traffic (network servers)
• Example: Database Server
– A computer system that processes database
queries.
• Data Server
• Communication Server
• Internet Server
• Data-oriented; used only for data storage
and management.
• Since a data server can serve more than
one compute server, compute-intensive
applications can be spread among multiple
severs.
• Does not prefer any application logic
processing.
• Performs processes such as data validation,
required as part of the data management
function.
• Requires fast processor, large amount of
memory and substantial Hard disk capacity..
Data
Server
Computer
Server
Provides gateway to other LANs, networks &
Computers.
E-mail Server & internet server.
Modest system requirements .
 multiple slots.
 fast processor to translate
networking protocols.
Internet Server
PC client
UNIX workstations
Local Area
Network
Networks Connect
Clients and
Servers.
C/S archtecture including basic networking
o Client-server is a computing architecture which
separates a client from a server.
o It is almost always implemented over a computer
network.
o The most basic type of client-server architecture
employs only two types of nodes: clients and servers.
This type of architecture is sometimes referred to
as two-tier.
It allows devices to share files and resources.
o Server provides the service.
o Client is considered as the customer requesting the
service.
o The server service can be shared among a number of
clients.
o Clients must request or initiate the service.
o The location of the server in the network is transparent
to clients.
• File servers
– File sharing and file processing.
• Data base servers
– Passing file results
– Example: Query in DBMS server
– Typically one single request/reply
• Transaction servers
– Transaction server includes DBMS and transaction monitoring.
– Server has remote procedures run online by the client.
• web servers
– Super-fat servers and thin clients.
– Uses HTTP protocol.
– Java was first to introduce interactive C/S forms.
Client
Client
Server
Server
InternetClient
JAVA
Client
HTML
Application
• Where to push the application to
• Fat clients
– The bulk of the application is running on the client .
– The client knows how the data is organized and where it is .
– Different clients access the same applications different ways .
• Fat servers
– The server more complicated.
– The clients are less complex .
– More of the code runs on the server .
– The network interaction is minimized.
ServerClient
Application
It is the (/) between client and server which glues them
together.
– Allowing the client request for a service and the server
providing it.
• Middleware can also be between server/server.
• Two broad classes
– General
• LAN servers, TCP/IP, Communication stacks,
Queuing services, etc.
– Application specific
• Used to accomplish a specific task
• Groupware specific: SMTP
• Internet specific: HTTP
• Database specific: SQL.
• Purpose
– To divide the application
between the client and server
– Different functionalities of
client and server
• Basic client server model
– Fits various applications
• Small office
• Small business
• Enterprise
• Global
Client
Server
Server
Client Server
Middle
ware
Single Machine
Client Server
Middle
ware
Client Middle
ware
C/S
Middle
ware
C/S
C/S
C/S
Web Browser
GUI
DSM
OS
Service-Specific; DSM
NOS (security, peer-to-peer,
directory, distributed files);
Transport stack (TCP/IP)
Web server
Groupware
DMBS
Etc.
Client
Middleware
Server
PC Server 
Asymmetric Multi-
processing 
Superserver
symmetric Multi-
processing 
Superserver
Multiservers
• Superserver
– A very powerful server.
– Single-server or multiserver.
– Each server can have a single processor or multiprocessor.
– Multiprocessing can be Asymmetric or Symmetric.
• Multiprocessing
• Asymmetric: each processor is dedicated to a
specific task
• Fully symmetric (SMP): applications are divided
into threads and threads are sent to available
processors
– Examples: 32-bit NT, Unix, NetWare
– Requires 3 basic functionalities:
» Global scheduling
» I/O sharing structure
» OS access sharing
• Multi servers
– Pool of servers, providing more processing
power (also called a cluster).
– They divide the task between different servers.
• Server lite
– As opposed to full blown servers.
– Provides a background process on the client
machine that can accept unsolicited networks
request (refreshing database, synchronizing
time, etc.)
• Network services (in general) are the
specific functions/tasks/jobs provided by
the network
– File sharing
– Printing
– Communication
– Mail
– Internet
– Management.
• File and print services
– Allow sharing of data files and printers
• Communications services
– Such as mail services
• Coordination and storage of email
• Internet services
– WWW, FTP, some security
• Access services
– Allow remote users to connect to network
• Login (authorization / authentication)
• Network Management Services
– Traffic monitoring, load balancing, diagnostics
• Networking in Linux follows the client/server
model
– Server provides the resource (web server).
– Client talks to the server (browser, e-mail
program).
• Server has a corresponding program that
communicates with the client (runs in the
background)
– In Windows the server program called service .
– In Linux the server program called daemon.
BASIC NETWORKING
• 1) Local Area Network (LAN)
• 2) Wide Area Network (WAN)
• 3) Metropolitan Area Network (MAN)
• A LAN is a group of computers located in a relatively small
geographical area (like a building or group of buildings).
– Typically owned by a single organization
• A local area network (LAN) is a computer network that
interconnects computers within a limited area such as a home,
school, computer laboratory, or office building, using network
media.[1] The defining characteristics of LANs, in contrast to wide
area networks (WANs), include their smaller geographic area,
and non-inclusion of leased telecommunication lines.
• A group of computers connected within a confined geographic
area.
• Commonly used for intra office communication.
• Various configurations, called topologies,
have been used to administer LANs.
– Ring topology A configuration that connects all
nodes in a closed loop on which messages travel in
one direction.
– Star topology A configuration that centers
around one node to which all others are connected
and through which all messages are sent.
– Bus topology All nodes are connected to a
single communication line that carries messages in
both directions.
C/S archtecture including basic networking
Switch
PC PC PC
PrinterPC
?
• A wide area network (WAN) is a network that covers a
broad area (i.e., any telecommunications network that
links across metropolitan, regional, national or
international boundaries) using leased
telecommunication lines. Business and government
entities utilize WANs to relay data among employees,
clients, buyers, and suppliers from various geographical
locations. In essence, this mode of telecommunication
allows a business to effectively carry out its daily function
regardless of location. The Internet can be considered a
WAN as well, and is used by businesses, governments,
organizations, and individuals for almost any purpose
imaginable.[1]
Leased lines from a larger provider form part of the WAN
LAN
• High speed (≥1000 mbps)
• Tend to primarily use Ethernet and
Wi Fi, but also use Token Passing.
• Generally consist of layer 2 devices
like switches, bridges. To a lesser
extent layer1 devices like hubs &
repeaters.
• Typically owned, controlled, and
managed by a single organization.
• Cost is Low as compared to WAN.
WAN
• Low speed (≤ 155 mbps)
• WANs tend to use technology like
MPLS and ATM, and to a lesser
extent (Frame Relay & X.25) for
connectivity over the longer
distances.
• Layer 3 (+) devices such as routers,
multi-layer switches and technology
specific devices like ATM or Frame-
relay Switches etc.
• WANs are typically not owned by
any one organization but exist under
collective or distributed ownership
and management over long
distances.
• Cost is high as compared to LAN.
• A metropolitan area network (MAN)
is a computer network in which two or
more computers or communicating
devices or networks which are
geographically separated but in same
metropolitan city and are connected to
each other are said to be connected on
MAN. Metropolitan limits are
determined by local municipal
corporations; the larger city, bigger
then MAN, the smaller a metro city,
smaller the MAN. [1]
C/S archtecture including basic networking
C/S archtecture including basic networking
C/S archtecture including basic networking
A presentation by:-
Abhinav singh
Class:- 9th ‘B’
Roll no:- 01
Ad

More Related Content

What's hot (20)

Basic networking
Basic networkingBasic networking
Basic networking
worr1244
 
networking devices
networking devicesnetworking devices
networking devices
harish pillai
 
Basic Networking
Basic NetworkingBasic Networking
Basic Networking
lucita cabral
 
Concept of Networking and Operating System.
Concept of Networking and Operating System.Concept of Networking and Operating System.
Concept of Networking and Operating System.
AnshulAnand21
 
NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTS
bwire sedrick
 
Networking devices
Networking devicesNetworking devices
Networking devices
NetProtocol Xpert
 
Networking devices
Networking devicesNetworking devices
Networking devices
frestoadi
 
Computer network basics
Computer network basicsComputer network basics
Computer network basics
JAI MCA-STUDENT
 
Networking devices
Networking devicesNetworking devices
Networking devices
Ravi KC
 
Networking basics PPT
Networking basics PPTNetworking basics PPT
Networking basics PPT
Ehsan Ullah Kakar
 
Network Device
Network DeviceNetwork Device
Network Device
Prabhat Jain
 
Network devices
Network devicesNetwork devices
Network devices
Aryan Kabra
 
Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devices
Numaan Tole
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network Device
Rubal Sagwal
 
Basic networking
Basic networkingBasic networking
Basic networking
PredieCatherynestrella Reyes
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
nnmaurya
 
Hubs vs switches vs routers
Hubs vs switches vs routersHubs vs switches vs routers
Hubs vs switches vs routers
3Anetwork com
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
Jitendra Kumar Sharma
 
Neetika (ppt)
Neetika (ppt)Neetika (ppt)
Neetika (ppt)
howare
 
Basics of Gateway By Naveen Karn
 Basics of Gateway By Naveen Karn Basics of Gateway By Naveen Karn
Basics of Gateway By Naveen Karn
Naveen Karn
 
Basic networking
Basic networkingBasic networking
Basic networking
worr1244
 
Concept of Networking and Operating System.
Concept of Networking and Operating System.Concept of Networking and Operating System.
Concept of Networking and Operating System.
AnshulAnand21
 
Networking devices
Networking devicesNetworking devices
Networking devices
frestoadi
 
Networking devices
Networking devicesNetworking devices
Networking devices
Ravi KC
 
Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devices
Numaan Tole
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network Device
Rubal Sagwal
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
nnmaurya
 
Hubs vs switches vs routers
Hubs vs switches vs routersHubs vs switches vs routers
Hubs vs switches vs routers
3Anetwork com
 
Neetika (ppt)
Neetika (ppt)Neetika (ppt)
Neetika (ppt)
howare
 
Basics of Gateway By Naveen Karn
 Basics of Gateway By Naveen Karn Basics of Gateway By Naveen Karn
Basics of Gateway By Naveen Karn
Naveen Karn
 

Viewers also liked (20)

Basic To Advanced Networking
Basic To Advanced NetworkingBasic To Advanced Networking
Basic To Advanced Networking
Beth Bridges Author, Speaker, Technology Marketer
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
Hj Habib
 
Designing an IT Solution
Designing an IT SolutionDesigning an IT Solution
Designing an IT Solution
Philippe Julio
 
Flex with AMFPHP
Flex with AMFPHPFlex with AMFPHP
Flex with AMFPHP
tusay
 
Fundamental of networking in PROJECT INFRASTRUCTURE
Fundamental of networking in PROJECT INFRASTRUCTURE Fundamental of networking in PROJECT INFRASTRUCTURE
Fundamental of networking in PROJECT INFRASTRUCTURE
Pruthvi Cholleti
 
Cloud computing saas
Cloud computing   saasCloud computing   saas
Cloud computing saas
Yukti Kaura
 
Quantum NDX - NAS Based Data Protection
Quantum NDX - NAS Based Data Protection Quantum NDX - NAS Based Data Protection
Quantum NDX - NAS Based Data Protection
Quantum
 
Networking Basics and Cisco
Networking Basics and CiscoNetworking Basics and Cisco
Networking Basics and Cisco
Shoaib Iqbal
 
Presentation on basic networking
Presentation on basic networkingPresentation on basic networking
Presentation on basic networking
qshamim07
 
basic networking
basic networkingbasic networking
basic networking
Anmol Bagga
 
Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)
Ravindra Dastikop
 
IT Infrastructure and Platforms
IT Infrastructure and PlatformsIT Infrastructure and Platforms
IT Infrastructure and Platforms
Angelica Angelo Ocon
 
Networking Basic and Cisco History
Networking Basic and Cisco History Networking Basic and Cisco History
Networking Basic and Cisco History
Er Aadarsh Srivastava
 
Chapter02 -- networking standards and the osi model
Chapter02  -- networking standards and the osi modelChapter02  -- networking standards and the osi model
Chapter02 -- networking standards and the osi model
Raja Waseem Akhtar
 
MIS - IT Infrastructure (Part I)
MIS  - IT Infrastructure (Part I)MIS  - IT Infrastructure (Part I)
MIS - IT Infrastructure (Part I)
Soetam Rizky
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
 
Iaas.paas.saas
Iaas.paas.saasIaas.paas.saas
Iaas.paas.saas
Alex Tregubov
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
Allan Pratt MBA
 
Network security
Network securityNetwork security
Network security
Gichelle Amon
 
Network ppt
Network pptNetwork ppt
Network ppt
hlalu861
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
Hj Habib
 
Designing an IT Solution
Designing an IT SolutionDesigning an IT Solution
Designing an IT Solution
Philippe Julio
 
Flex with AMFPHP
Flex with AMFPHPFlex with AMFPHP
Flex with AMFPHP
tusay
 
Fundamental of networking in PROJECT INFRASTRUCTURE
Fundamental of networking in PROJECT INFRASTRUCTURE Fundamental of networking in PROJECT INFRASTRUCTURE
Fundamental of networking in PROJECT INFRASTRUCTURE
Pruthvi Cholleti
 
Cloud computing saas
Cloud computing   saasCloud computing   saas
Cloud computing saas
Yukti Kaura
 
Quantum NDX - NAS Based Data Protection
Quantum NDX - NAS Based Data Protection Quantum NDX - NAS Based Data Protection
Quantum NDX - NAS Based Data Protection
Quantum
 
Networking Basics and Cisco
Networking Basics and CiscoNetworking Basics and Cisco
Networking Basics and Cisco
Shoaib Iqbal
 
Presentation on basic networking
Presentation on basic networkingPresentation on basic networking
Presentation on basic networking
qshamim07
 
basic networking
basic networkingbasic networking
basic networking
Anmol Bagga
 
Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)
Ravindra Dastikop
 
Chapter02 -- networking standards and the osi model
Chapter02  -- networking standards and the osi modelChapter02  -- networking standards and the osi model
Chapter02 -- networking standards and the osi model
Raja Waseem Akhtar
 
MIS - IT Infrastructure (Part I)
MIS  - IT Infrastructure (Part I)MIS  - IT Infrastructure (Part I)
MIS - IT Infrastructure (Part I)
Soetam Rizky
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
Allan Pratt MBA
 
Network ppt
Network pptNetwork ppt
Network ppt
hlalu861
 
Ad

Similar to C/S archtecture including basic networking (20)

network fundamentals
network fundamentalsnetwork fundamentals
network fundamentals
Sithu PM
 
CNE CHP1.pdf
CNE CHP1.pdfCNE CHP1.pdf
CNE CHP1.pdf
Nehaam3
 
Networking
Networking Networking
Networking
FLYMAN TECHNOLOGY LIMITED
 
Network administration Book
Network administration BookNetwork administration Book
Network administration Book
Muhammad Jawwad Hashmi
 
Computer network
Computer networkComputer network
Computer network
Rahul Das
 
CSS12 LESSON 02.pptx
CSS12 LESSON 02.pptxCSS12 LESSON 02.pptx
CSS12 LESSON 02.pptx
RGSMags
 
Chapter One Network nile.pptx
Chapter One Network nile.pptxChapter One Network nile.pptx
Chapter One Network nile.pptx
MohamedAbdi347025
 
Lecture 2 types of network
Lecture 2 types of networkLecture 2 types of network
Lecture 2 types of network
Albert Abbosey
 
Introduction to networks
Introduction to networksIntroduction to networks
Introduction to networks
Sagar Gor
 
basic networking and topologies explained.ppt
basic networking and topologies explained.pptbasic networking and topologies explained.ppt
basic networking and topologies explained.ppt
LahiruRatnayake2
 
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxUNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
LeahRachael
 
ccs335cloudcomputing-231217103625-aae5b1a9 (1).pptx
ccs335cloudcomputing-231217103625-aae5b1a9 (1).pptxccs335cloudcomputing-231217103625-aae5b1a9 (1).pptx
ccs335cloudcomputing-231217103625-aae5b1a9 (1).pptx
aravym456
 
Iso model
Iso modelIso model
Iso model
Aileen Ereño
 
Computer communication network
Computer communication networkComputer communication network
Computer communication network
himz676987
 
CCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructureCCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructure
NiviV4
 
chapter one introduction to computer network maruf.pptx
chapter one  introduction to computer network maruf.pptxchapter one  introduction to computer network maruf.pptx
chapter one introduction to computer network maruf.pptx
MohamedAbdi347025
 
VTU V SEM CNS Module 1 PPT 2018 Batch students
VTU V SEM CNS Module 1 PPT 2018 Batch studentsVTU V SEM CNS Module 1 PPT 2018 Batch students
VTU V SEM CNS Module 1 PPT 2018 Batch students
VENKATESHBHAT25
 
Technical Architectures
Technical ArchitecturesTechnical Architectures
Technical Architectures
Damian T. Gordon
 
Class work 2,computer_network_317
Class work 2,computer_network_317Class work 2,computer_network_317
Class work 2,computer_network_317
Khondoker Sadia
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
doaatahoun2
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentals
Sithu PM
 
CNE CHP1.pdf
CNE CHP1.pdfCNE CHP1.pdf
CNE CHP1.pdf
Nehaam3
 
Computer network
Computer networkComputer network
Computer network
Rahul Das
 
CSS12 LESSON 02.pptx
CSS12 LESSON 02.pptxCSS12 LESSON 02.pptx
CSS12 LESSON 02.pptx
RGSMags
 
Chapter One Network nile.pptx
Chapter One Network nile.pptxChapter One Network nile.pptx
Chapter One Network nile.pptx
MohamedAbdi347025
 
Lecture 2 types of network
Lecture 2 types of networkLecture 2 types of network
Lecture 2 types of network
Albert Abbosey
 
Introduction to networks
Introduction to networksIntroduction to networks
Introduction to networks
Sagar Gor
 
basic networking and topologies explained.ppt
basic networking and topologies explained.pptbasic networking and topologies explained.ppt
basic networking and topologies explained.ppt
LahiruRatnayake2
 
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxUNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
LeahRachael
 
ccs335cloudcomputing-231217103625-aae5b1a9 (1).pptx
ccs335cloudcomputing-231217103625-aae5b1a9 (1).pptxccs335cloudcomputing-231217103625-aae5b1a9 (1).pptx
ccs335cloudcomputing-231217103625-aae5b1a9 (1).pptx
aravym456
 
Computer communication network
Computer communication networkComputer communication network
Computer communication network
himz676987
 
CCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructureCCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructure
NiviV4
 
chapter one introduction to computer network maruf.pptx
chapter one  introduction to computer network maruf.pptxchapter one  introduction to computer network maruf.pptx
chapter one introduction to computer network maruf.pptx
MohamedAbdi347025
 
VTU V SEM CNS Module 1 PPT 2018 Batch students
VTU V SEM CNS Module 1 PPT 2018 Batch studentsVTU V SEM CNS Module 1 PPT 2018 Batch students
VTU V SEM CNS Module 1 PPT 2018 Batch students
VENKATESHBHAT25
 
Class work 2,computer_network_317
Class work 2,computer_network_317Class work 2,computer_network_317
Class work 2,computer_network_317
Khondoker Sadia
 
Ad

Recently uploaded (20)

Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Mastering Advance Window Functions in SQL.pdf
Mastering Advance Window Functions in SQL.pdfMastering Advance Window Functions in SQL.pdf
Mastering Advance Window Functions in SQL.pdf
Spiral Mantra
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Social Media App Development Company-EmizenTech
Social Media App Development Company-EmizenTechSocial Media App Development Company-EmizenTech
Social Media App Development Company-EmizenTech
Steve Jonas
 
TrsLabs Consultants - DeFi, WEb3, Token Listing
TrsLabs Consultants - DeFi, WEb3, Token ListingTrsLabs Consultants - DeFi, WEb3, Token Listing
TrsLabs Consultants - DeFi, WEb3, Token Listing
Trs Labs
 
Unlocking the Power of IVR: A Comprehensive Guide
Unlocking the Power of IVR: A Comprehensive GuideUnlocking the Power of IVR: A Comprehensive Guide
Unlocking the Power of IVR: A Comprehensive Guide
vikasascentbpo
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdfAre Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Telecoms Supermarket
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Vaibhav Gupta BAML: AI work flows without Hallucinations
Vaibhav Gupta BAML: AI work flows without HallucinationsVaibhav Gupta BAML: AI work flows without Hallucinations
Vaibhav Gupta BAML: AI work flows without Hallucinations
john409870
 
Web and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in RajpuraWeb and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in Rajpura
Erginous Technology
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Top 10 IT Help Desk Outsourcing Services
Top 10 IT Help Desk Outsourcing ServicesTop 10 IT Help Desk Outsourcing Services
Top 10 IT Help Desk Outsourcing Services
Infrassist Technologies Pvt. Ltd.
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Mastering Advance Window Functions in SQL.pdf
Mastering Advance Window Functions in SQL.pdfMastering Advance Window Functions in SQL.pdf
Mastering Advance Window Functions in SQL.pdf
Spiral Mantra
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Social Media App Development Company-EmizenTech
Social Media App Development Company-EmizenTechSocial Media App Development Company-EmizenTech
Social Media App Development Company-EmizenTech
Steve Jonas
 
TrsLabs Consultants - DeFi, WEb3, Token Listing
TrsLabs Consultants - DeFi, WEb3, Token ListingTrsLabs Consultants - DeFi, WEb3, Token Listing
TrsLabs Consultants - DeFi, WEb3, Token Listing
Trs Labs
 
Unlocking the Power of IVR: A Comprehensive Guide
Unlocking the Power of IVR: A Comprehensive GuideUnlocking the Power of IVR: A Comprehensive Guide
Unlocking the Power of IVR: A Comprehensive Guide
vikasascentbpo
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdfAre Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Telecoms Supermarket
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Vaibhav Gupta BAML: AI work flows without Hallucinations
Vaibhav Gupta BAML: AI work flows without HallucinationsVaibhav Gupta BAML: AI work flows without Hallucinations
Vaibhav Gupta BAML: AI work flows without Hallucinations
john409870
 
Web and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in RajpuraWeb and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in Rajpura
Erginous Technology
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 

C/S archtecture including basic networking

  • 2. • 3 primary logical architectures 1. Host-based • Traditional mainframe / central computer model 2. Client-based / Peer-to-Peer • Historically most home-based and many small office networks 3. Client-server • Microsoft model – or what we commonly see today • Fairly powerful clients interacting with some number of servers • Model used on campus WE WILL ONLY FOCUS ON CLIENT/ SERVER ARCHITECTURE.
  • 4. A network architecture in which each computer or process on the network is either a client or a server.
  • 5. A simple definition A simple definition of CS is “ server software accepts requests for data from client software and returns the results to the client.”
  • 6. • Clients • Servers • Communication Networks Server Server Client
  • 7. • CS model distinguishes between client / server devices and applications. • Clients request specific services. • Servers respond to individual client requests for services. – Functionality implemented in software • Depending on services the server provides, physical server computers can be different than other servers and client computers (i.e. more processing power, more memory, etc.)
  • 9. • Structured architecture with specific roles for specific devices using specific applications. – File server, printer server. • A “managed” network . – Unlike P2P will have a network admin. • CS is the most commonly observed architecture. – Most applications are designed to be used on CS architecture.
  • 10. • Balance processing between clients and server(s) by dividing functions. – Client – presentation and application logic. – Server – Data access logic, data storage, application logic.
  • 11. • Applications that run on computers. • Rely on servers for – Files. – Devices. Clients are Applications – Processing power. • Example: E-mail client – An application that enables you to send and receive e-mail.
  • 12. • Computers or processes that manage network resources – Disk drives (file servers) Servers Manage – Printers (print servers) Resources – Network traffic (network servers) • Example: Database Server – A computer system that processes database queries.
  • 13. • Data Server • Communication Server • Internet Server
  • 14. • Data-oriented; used only for data storage and management. • Since a data server can serve more than one compute server, compute-intensive applications can be spread among multiple severs. • Does not prefer any application logic processing. • Performs processes such as data validation, required as part of the data management function. • Requires fast processor, large amount of memory and substantial Hard disk capacity.. Data Server Computer Server
  • 15. Provides gateway to other LANs, networks & Computers. E-mail Server & internet server. Modest system requirements .  multiple slots.  fast processor to translate networking protocols.
  • 16. Internet Server PC client UNIX workstations Local Area Network
  • 19. o Client-server is a computing architecture which separates a client from a server. o It is almost always implemented over a computer network. o The most basic type of client-server architecture employs only two types of nodes: clients and servers. This type of architecture is sometimes referred to as two-tier. It allows devices to share files and resources. o Server provides the service. o Client is considered as the customer requesting the service. o The server service can be shared among a number of clients. o Clients must request or initiate the service. o The location of the server in the network is transparent to clients.
  • 20. • File servers – File sharing and file processing. • Data base servers – Passing file results – Example: Query in DBMS server – Typically one single request/reply • Transaction servers – Transaction server includes DBMS and transaction monitoring. – Server has remote procedures run online by the client. • web servers – Super-fat servers and thin clients. – Uses HTTP protocol. – Java was first to introduce interactive C/S forms. Client Client Server Server InternetClient JAVA Client HTML Application
  • 21. • Where to push the application to • Fat clients – The bulk of the application is running on the client . – The client knows how the data is organized and where it is . – Different clients access the same applications different ways . • Fat servers – The server more complicated. – The clients are less complex . – More of the code runs on the server . – The network interaction is minimized. ServerClient Application
  • 22. It is the (/) between client and server which glues them together. – Allowing the client request for a service and the server providing it. • Middleware can also be between server/server. • Two broad classes – General • LAN servers, TCP/IP, Communication stacks, Queuing services, etc. – Application specific • Used to accomplish a specific task • Groupware specific: SMTP • Internet specific: HTTP • Database specific: SQL.
  • 23. • Purpose – To divide the application between the client and server – Different functionalities of client and server • Basic client server model – Fits various applications • Small office • Small business • Enterprise • Global Client Server Server Client Server Middle ware Single Machine Client Server Middle ware Client Middle ware C/S Middle ware C/S C/S C/S
  • 24. Web Browser GUI DSM OS Service-Specific; DSM NOS (security, peer-to-peer, directory, distributed files); Transport stack (TCP/IP) Web server Groupware DMBS Etc. Client Middleware Server
  • 25. PC Server  Asymmetric Multi- processing  Superserver symmetric Multi- processing  Superserver Multiservers
  • 26. • Superserver – A very powerful server. – Single-server or multiserver. – Each server can have a single processor or multiprocessor. – Multiprocessing can be Asymmetric or Symmetric. • Multiprocessing • Asymmetric: each processor is dedicated to a specific task • Fully symmetric (SMP): applications are divided into threads and threads are sent to available processors – Examples: 32-bit NT, Unix, NetWare – Requires 3 basic functionalities: » Global scheduling » I/O sharing structure » OS access sharing
  • 27. • Multi servers – Pool of servers, providing more processing power (also called a cluster). – They divide the task between different servers. • Server lite – As opposed to full blown servers. – Provides a background process on the client machine that can accept unsolicited networks request (refreshing database, synchronizing time, etc.)
  • 28. • Network services (in general) are the specific functions/tasks/jobs provided by the network – File sharing – Printing – Communication – Mail – Internet – Management.
  • 29. • File and print services – Allow sharing of data files and printers • Communications services – Such as mail services • Coordination and storage of email • Internet services – WWW, FTP, some security • Access services – Allow remote users to connect to network • Login (authorization / authentication) • Network Management Services – Traffic monitoring, load balancing, diagnostics
  • 30. • Networking in Linux follows the client/server model – Server provides the resource (web server). – Client talks to the server (browser, e-mail program). • Server has a corresponding program that communicates with the client (runs in the background) – In Windows the server program called service . – In Linux the server program called daemon.
  • 32. • 1) Local Area Network (LAN) • 2) Wide Area Network (WAN) • 3) Metropolitan Area Network (MAN)
  • 33. • A LAN is a group of computers located in a relatively small geographical area (like a building or group of buildings). – Typically owned by a single organization • A local area network (LAN) is a computer network that interconnects computers within a limited area such as a home, school, computer laboratory, or office building, using network media.[1] The defining characteristics of LANs, in contrast to wide area networks (WANs), include their smaller geographic area, and non-inclusion of leased telecommunication lines. • A group of computers connected within a confined geographic area. • Commonly used for intra office communication.
  • 34. • Various configurations, called topologies, have been used to administer LANs. – Ring topology A configuration that connects all nodes in a closed loop on which messages travel in one direction. – Star topology A configuration that centers around one node to which all others are connected and through which all messages are sent. – Bus topology All nodes are connected to a single communication line that carries messages in both directions.
  • 37. • A wide area network (WAN) is a network that covers a broad area (i.e., any telecommunications network that links across metropolitan, regional, national or international boundaries) using leased telecommunication lines. Business and government entities utilize WANs to relay data among employees, clients, buyers, and suppliers from various geographical locations. In essence, this mode of telecommunication allows a business to effectively carry out its daily function regardless of location. The Internet can be considered a WAN as well, and is used by businesses, governments, organizations, and individuals for almost any purpose imaginable.[1]
  • 38. Leased lines from a larger provider form part of the WAN
  • 39. LAN • High speed (≥1000 mbps) • Tend to primarily use Ethernet and Wi Fi, but also use Token Passing. • Generally consist of layer 2 devices like switches, bridges. To a lesser extent layer1 devices like hubs & repeaters. • Typically owned, controlled, and managed by a single organization. • Cost is Low as compared to WAN. WAN • Low speed (≤ 155 mbps) • WANs tend to use technology like MPLS and ATM, and to a lesser extent (Frame Relay & X.25) for connectivity over the longer distances. • Layer 3 (+) devices such as routers, multi-layer switches and technology specific devices like ATM or Frame- relay Switches etc. • WANs are typically not owned by any one organization but exist under collective or distributed ownership and management over long distances. • Cost is high as compared to LAN.
  • 40. • A metropolitan area network (MAN) is a computer network in which two or more computers or communicating devices or networks which are geographically separated but in same metropolitan city and are connected to each other are said to be connected on MAN. Metropolitan limits are determined by local municipal corporations; the larger city, bigger then MAN, the smaller a metro city, smaller the MAN. [1]
  • 44. A presentation by:- Abhinav singh Class:- 9th ‘B’ Roll no:- 01