Components of client server application

Ashwin Ananthapadmanabhan
Ashwin AnanthapadmanabhanSAP UI5 (Fiori) Consultant um Blueprint Technologies Pvt Ltd
COMPONENTS OF CLIENT/SERVER
APPLICATIONII ME CSE
2015-16 ODD SEMESTER (III SEMESTER)
TOPICS
 Client services
Request for services
RPC
Windows services
Fax /Print services
Other remote services
Utility services & other services
Dynamic Data Exchange(DDE)
Object Linking and Embedding(OLE)
Common Object Request Broker Architecture(CORBA)
TOPICS (CONT)
 Server Services
Detailed server functionality
The network operating system
Available platforms
The server operating system
CLIENT SERVICES
• Responsible for managing the user interface
• Provides presentation services
• Accepts and checks the syntax of user inputs
• Acts as a consumer of services
• Processes application logic
• Extended at the client by adding logic that is not implemented in the host server application
Like
 Local editing,
 automatic data entry,
 help capabilities, and other logic processes
• Generates database request and transmits to server
• Passes response back to the server
REQUEST FOR SERVICES
A client workstation requests services form the attached server.
whatever may be the type of processor the format of request is the
same.
It is the job if the NOS software to translate or add the necessary details
as required by the targeted requester to the application request.
MESSAGE PASSING
 Allows process to communicate without restoring the shared data
 Two processes involved in an IPC
Sending process for sending the message
Receiving process for receiving the message
 Messages sent by the processes are classified into:
Fixed
Variable
DIRECT COMMUNICATION
Processes have to specify the name of sender and recipient process name.
A link is established in between the sender and receiver along with full known
information of their names and addresses.
Link must be established in between the processes.
There is symmetry in between the communication of the processes.
INDIRECT COMMUNICATION
• Messages are sent to the mail box and then they are retrieved from mailbox.
• Communicate with other processes via one or more mailbox.
INDIRECT COMMUNICATION(CONT)
• Role of Mail Box is similar to
INDIRECT COMMUNICATION(CONT)
Features
•A link is established between a pair of processes, if they share a mailbox.
•A link is established between more then one processes.
•Different number of links can be established in between the two
communicating process.
INDIRECT COMMUNICATION(CONT)
Possible combinations of send and receive can be
•Blocking Send – Returns control to the user only after the message has
been sent or until ACK has been received.
•Non-blocking Send – Returns control as soon as the message queued or
copied.
•Blocking Receive – Returns only after message has been received.
•Non-blocking Receive – Receiver receives either a valid message or a
NULL.
REMOTE PROCEDURES CALL (RPC)
RPC allow programs on different machines to interact using simple procedure call or
return semantics.
It appears as if the two programs were on the same machine.
It is based on extending the notion of conventional or local procedure calling.
So that the called procedure need not exist in the same address space as the calling
procedure.
The two processes may be on the same system, or they may be on different systems with
a network connecting them.
Marshalling − transferring data structure used in remote procedure call from one
address space to another.
RPC (CONT)
General Architecture
RPC MECHANISM
1. Client calls a local procedure on the client
stub
2. The client stub acts as a proxy and
marshalls the call and the args.
3. The client stub send this to the remote
system (via TCP/UDP)
4. The server stub unmarshalls the call and
args from the client
5. The server stub calls the actual procedure
on the server
6. The server stub marshalls the reply and sends
it back to the client
WINDOW SERVICES
A client workstation may have several windows open on-screen at any time
Capability to provide activate, view, move, resize or hide a particular
window->Essential Services.
They interact with message services provided to notify the user of events that
occur on a server. 
Each application is written with the assumption that it has a virtual screen.
This virtual screen can be an arbitrary size and can even be larger than the
physical screen
CLIENT SERVER COMPUTING / UNIT I15
WINDOW SERVICES(CONT’D)
The application using GUI software places data into the virtual screen.
Then the windowing services handle placement and manipulation of the
application window.
There is no need for the developer to build or manage the windowing services.
The client user is totally in control of his or her desktop and can give priority to
the most important tasks.
The NOS(Network Operating System) provides software on the client
workstation to manage the creation of pop-up windows that display alerts
generated from remote servers.
CLIENT SERVER COMPUTING / UNIT I16
WINDOW SERVICES(CONT’D)
SAFE TO DISABLE SERVICES
Tablet PC Input Service
Windows Time
Secondary logon
Fax
Microsoft iSCSI Initiator Service
Encrypting File System
Certificate Propagation
CLIENT SERVER COMPUTING / UNIT I18
PRINT/FAX SERVICES
The NOS enables the client to generate print requests even when the
printer is busy.
The NOS redirector software redirects it and the print server queue
manage further manage it.
The client has facility to view the status of the print queue at any time and
client is also notified when the print is completed.
The fax server also works like print server.
OTHER REMOTE SERVICES
Apps can be invoked from the client to execute remotely on a server .
E.g Backup Services.
Business functions such as downloading data from a host or checking a
list of stock prices might also be invoked locally to run remotely.
Software is provided by the NOS to run on the client workstation to
initiate these remote applications.
OTHER REMOTE SERVICES(CONT’D)
Mobile computing is increasingly being used to remain functional while
out of the office.
With appropriate architectural forethought, applications can be built to
operate effectively from the office LAN or the remote laptop.
The IPC protocol of choice for mobile access is TCP/IP based. 
OTHER REMOTE SERVICES(CONT’D)
UTILTY AND OTHER SERVICES
Utility Services
The operating system facilitates some local functions which are very often used to perform actions like
edit, copy, move, compare and help which works on the client end.
Message Services
Messages can be sent and received to or from the network synchronously.
The message services provide the buffering, scheduling and arbitration services to support this function.
Network Services
  The client workstation communicates with the network through protocol, some set of service and
API’s that creates, send and receive and format network messages.
Application Services
In addition to the remote execution services that the NOS provide, custom applications will use
their own API’s embedded in an RPC to invoke specialized services form a remote server.
DYNAMIC DATA EXCHANGE(DDE)
• DDE -A conversation between two applications(a client application and a
server application)
• It is a feature of some operating systems (like Windows 98, OS/2)
presentation manager that enable users to pass data between applications
to application.
• Eg1: If an application wants to connect a Microsoft Excel spreadsheet
with Microsoft Word for windows report in such a way that changes to
the spreadsheet are reflected automatically in the report
• In the above case, Microsoft Word for windows is the client and
Microsoft Excel is the server.
• Primary function of DDE is to allow Windows applications to share data.
DDE(CONT)
Eg2: A charting package can be linked to a database to provide the latest chart data
whenever the chart is reference
Concerned about a particular topic and a particular item.
The topic and item is the nature of the information that the client wants.
HOW TO SET UP A DDE LINK?
• Eg: If the Word for Windows document is to receive data automatically
from a range named IBM in a Microsoft Excel worksheet, named
STOCKS.XLS
• Then STOCKS.XLS is the topic and IBM is the item.
• Simplest way to set up a DDE link is
Copy a block of data from the server application to the clipboard
Activate the client application
Move the insertion point to the location in the receiving document where
you want the information to go
DDE(CONT)
 Then use a Paste Link command (With most server programs, some
times it requires to save data in a disk file before pasting).
 A DDE link may be automatic or manual.
 An automatic link is refreshed whenever the source data changes,
provided both the client and server applications are running.
 A manual link is refreshed only when you issue a command in the
client application.
OBJECT LINKING AND EMBEDDING(OLE)
OLE is an extension to DDE that enables objects to be created with the object components
software aware.
Aware -a reference to the object or one of its components automatically launches the
appropriate software that manipulate the data.
OLE(CONT)
For example, a document created with a word processor may include an image created by
a graphics package.
The image can be converted to the internal graphics form of the word processor, such as
WPG form for WordPerfect.
STEPS INVOLVED IN OLE
OLE(CONT)
With OLE, the image can be included in its original form within the document object; whenever the
image is selected or highlighted, the graphics package will take control to manipulate the image.
Viewer or launcher is the one by which software package accesses data created from another one.
It is custom built
Viewer-users can see data from one software package while they are running another package.
Launchers -invoke the software package that created the data and thus provide the full functionality of
the launched software.
Advantage: any DDE- or OLE-enabled application can use any software that supports these data
interchange APIs.
Eg: Microsoft has released its OLE 2.0 software development kit (SDK)
OLE 2.0
•OLE 2.0 extends OLE capabilities to enable a group of data to be defined as an object and
saved into a database.
•This object can then be dragged and dropped into other applications and edited without
the need to switch back to the application which created it.
• This provides a more seamless interface for the user.
ADVANTAGE OF OLE2.0 OVER OLE1.x:
•In OLE 1.x, double-clicking a Lotus 1-2-3 for Windows spreadsheet embedded in a
Microsoft Word for Windows document launches 1-2-3 and opens the document in a 1-2-
3 window.
• Under OLE 2.0, the active window (Word's) menu and toolbar change to that of 1-2-3.
• The user deals only with the object.
COMMON OBJECT REQUEST BROKER
ARCHITECTURE (CORBA)
• CORBA is an object oriented architecture.
• It has the mechanism that allows various clients to share/call the
objects over mixed networks.
• The objects are the applications.
• In specific CORBA is a process of moving objects over networks
with cross platform data transfer.
• For the process to take place the client sends the request to an object
request broker(ORB).
CORBA(CONT)
• The client that needs the service sends the request to ORB acting as a
directory of all the remote services available on the network.
• The representation of ORB is given as
CORBA(CONT)
The broker calls the relevant object and passes the relevant data.
The remote object services the request and replies to the broker
which in turn responses the client.
The object communication may rely on an RPC structure.
CORBA architecture is similar to the client server architecture.
In this a component can act as client and a server.
CORBA(CONT)
• How the component is considered as sever/client is given as,
• A component is considered as server if it contains CORBA objects
whose services are accessible from other CORBA objects.
• A component is considered a client if it accesses services from other
CORBA objects.
CORBA(CONT)
In case of single remote method invocation the role of client server
can be temporarily reversed.
This is possible because a single CORBA object can participate in
multiple interactions simultaneously.
Furthermore, any component that provides an implementation for an
object is considered as a server.
 If a component creates an object and provides other components
with visibility to that object (i.e., allows other components to obtain
references to that object).
CORBA(CONT)
• Then that components acts as server for that object.
• Any requests made on that object by other components will be
processed by the components that creates the object.
• Thus, a CORBA server means the components execute methods for
a particular object on behalf of other components (Clients).
CORBA(CONT)
• An application component can provide services to other application
components while accessing services from other components.
• In that scenario, the components is acting as a client of one
component and as a server to the other components i.e., two
components can simultaneously act as client and server to each
other.
COMPONENT ACTING AS CLIENT/SERVER
REQUEST PROCESSING 
Requests are issued by a client to the NOS services software resident on
the client machine.
These services format the request into an appropriate RPC and issue
the request to the application layer of the client protocol stack.
This request is received by the application layer of the protocol stack on
the server.
FILE SERVICES
File services handle access to the virtual directories and files located on the client
workstation and to the server's permanent storage.
 All requests are mapped into the virtual pool of resources and redirected as
necessary to the appropriate local or remote server
FAX/PRINT/IMAGE SERVICES
High-quality printers, workstation-generated faxes, and plotters are natural
candidates for support from a shared server.
The server can accept input from many clients, queue it according to the
priority of the request and handle it when the device is available.
Incoming faxes can be queued at the server and transmitted to the
appropriate client either on receipt or on request.
In concert with workflow management techniques, images can be captured
and distributed to the appropriate client workstation from the image server
THE NETWORK OPERATING SYSTEM 
Novell NetWare 
LAN Manager 
IBM LAN Server 
Banyan VINES
PC Network File Services (NFS) 
NOVELL NETWARE
NetWare is a family of LAN products with support for IBM PC-compatible
and Apple Macintosh clients, and IBM PC-compatible servers.
 NetWare is a proprietary NOS in the strict sense that it does not require
another OS, such as DOS, Windows
NETWARE ARCHITECTURE
 NetWare to an open architecture
NetWare evolved from a very simple
concept: file sharing instead of disk
sharing.
 In 1983 when the first versions of
NetWare originated, all other competing
products were based on the concept of
providing shared direct disk access.
Novell's alternative approach was
validated by IBM in 1984, which helped
promote the NetWare product.
LAN MANAGER
LAN Manager was a Network Operating
System (NOS) available from multiple
vendors and developed by Microsoft in
cooperation with 3Com Corporation.
IBM LAN Server 
Banyan VINES
PC Network File Services (NFS)
WHAT ARE THE AVAILABLE PLATFORMS? 
Workstations in LAN Configuration
LAN-to-LAN/WAN Configuration
OLTP on a LAN
OLTP with UNIX 
WORKSTATIONS IN LAN CONFIGURATION
This model is the most basic
implementation providing the
standard LAN services for file
and printer sharing. 
LAN-TO-LAN/WAN CONFIGURATION
• Routers and communication servers will be used to provide communication
services between LANs and into the WAN
• In the client/server model, these connections will be provided transparently by
the SDE tools.
• There are significant performance implications if the traffic volumes are large.
IBM's LU6.2 implementation in APPC and TCP/IP provides the best support for
high-volume, LAN-to-LAN/WAN communications.
• DEC's implementation of DECnet always has provided excellent LAN-to-WAN
connectivity.
• Integrated support for TCP/IP, LU6.2, and IPX provides a solid platform for
client/server LAN-to-WAN implementation within DECnet. Novell 4.x provides
support for TCP/IP as both the LAN and WAN protocol. Internetworking also is
supported between IPX and TCP/IP.
OLTP ON A LAN
Online Transaction Processing applications are found in such industries
as insurance, finance, government, and sales—all of which process
large numbers of transactions.
OLTP has traditionally been the domain of the large mainframe
vendors—such as IBM and DEC—and of special-purpose, fault-tolerant
processors from vendors such as Tandem and Stratus. The client/server
model has the capability to provide all the services required for OLTP
at much lower cost than the traditional platforms.. 
OLTP WITH UNIX
As UNIX has matured, it has added many of the features found in other
commercial operating systems such as VMS and MVS.
There are now several offerings for OLTP with UNIX. IBM is promoting
CICS 6000 as a downsizing strategy for CICS MVS.
Database services will be provided by a combination of AIX and MVS
servers.
Novell purchased the Tuxedo product from AT&T with its acquisition of
USL. OSF selected the Transarc Ensina product as the basis for OLTP with
DCE
THE SERVER OPERATING SYSTEM
NetWare
OS/2
Windows NT 
UNIX 
NETWARE 
• NetWare is used by many organizations, large and small, for the
provision of file, printer, and network services.
• NetWare is a self-contained operating system. It does not require a
separate OS (as do Windows NT, OS/2, and UNIX) to run.
• Novell is taking steps to allow NetWare to run on servers with UNIX.
• Novell purchased USL and will develop shrink-wrapped products to
run under both NetWare and UNIX System V, Release 4.2.
• The products will enable UNIX to simultaneously access information
from both a NetWare and a UNIX server. 
OS/2 
OS/2 is the server platform for Intel products provided by IBM in the
System Application Architecture (SAA) model.
OS/2 provides the storage protection and preemptive multitasking services
needed for the server platform.
 Several database and many application products have been ported to OS/2.
T
he only network operating systems directly supported with OS/2 are LAN
Manager and LAN Server.. 
Windows NT
Windows NT is a family
of operating systems produced
by Microsoft, the first version of
which was released in July 1993.
It is a processor- independent,
multiprocessing, multi-
user operating system.
UNIX
Unix (all-caps UNIX for the trademark) is a family of multitasking,
multiuser computer operating systems that derive from the original
AT&T Unix, developed in the 1970s at the Bell Labs research centre
by Ken Thompson, Dennis Ritchie, and others.
UNIX ARCHITECTURE
A Unix architecture is a computer
operating system system architecture
that embodies the Unix philosophy.
It may adhere to standards such as the
Single UNIX Specification (SUS) or
similar POSIX IEEE standard.
No single published standard describes
all Unix architecture computer operating
systems - this is in part a legacy of the
Unix wars.
UNIX ARCHITECTURE(CONT)
• Unix systems use a centralized operating system kernel which manages system and
process activities.
• All non-kernel software is organized into separate, kernel-managed processes.
• Unix systems are pre-emptively multitasking: multiple processes can run at the same
time, or within small time slices and nearly at the same time, and any process can be
interrupted and moved out of execution by the kernel. This is known
as thread management.
• Files are stored on disk in a hierarchical file system, with a single top location throughout
the system (root, or "/"), with both files and directories, subdirectories, sub-
subdirectories, and so on below it.
• With few exceptions, devices and some types of communications between processes are
managed and visible as files or pseudo-files within the file system hierarchy. This is known
as everything is a file. However, Linus Torvalds states that this is inaccurate and may be
better rephrased as "everything is a stream of bytes"
UNIX Features
Multitasking and multiuser
Programming interface
Use of files as abstractions of devices and other objects
Built-in networking (TCP/IP is standard)
Persistent system service processes called "daemons" and managed by
init or inet
1 von 60

Recomendados

Client Server Architecture ppt von
Client Server Architecture pptClient Server Architecture ppt
Client Server Architecture pptOECLIB Odisha Electronics Control Library
16.6K views15 Folien
Application layer protocols von
Application layer protocolsApplication layer protocols
Application layer protocolsJUW Jinnah University for Women
14.7K views30 Folien
Client server model von
Client server modelClient server model
Client server modelGd Goenka University
12.6K views16 Folien
RPC: Remote procedure call von
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure callSunita Sahu
16.4K views26 Folien
Naming in Distributed System von
Naming in Distributed SystemNaming in Distributed System
Naming in Distributed SystemMNM Jain Engineering College
12.8K views15 Folien
Chat application von
Chat applicationChat application
Chat applicationMudasir Sunasara
34.5K views19 Folien

Más contenido relacionado

Was ist angesagt?

Communication primitives von
Communication primitivesCommunication primitives
Communication primitivesStudent
24.5K views18 Folien
Lecture 4 mobile database system von
Lecture 4 mobile database systemLecture 4 mobile database system
Lecture 4 mobile database systemsalbiahhamzah
767 views34 Folien
Publish subscribe model overview von
Publish subscribe model overviewPublish subscribe model overview
Publish subscribe model overviewIshraq Al Fataftah
27.9K views35 Folien
Web Service Presentation von
Web Service PresentationWeb Service Presentation
Web Service Presentationguest0df6b0
36K views18 Folien
Client Server Architecture von
Client Server ArchitectureClient Server Architecture
Client Server ArchitectureRence Montanes
7.2K views132 Folien
Entity beans in java von
Entity beans in javaEntity beans in java
Entity beans in javaAcp Jamod
11.6K views25 Folien

Was ist angesagt?(20)

Communication primitives von Student
Communication primitivesCommunication primitives
Communication primitives
Student24.5K views
Lecture 4 mobile database system von salbiahhamzah
Lecture 4 mobile database systemLecture 4 mobile database system
Lecture 4 mobile database system
salbiahhamzah767 views
Web Service Presentation von guest0df6b0
Web Service PresentationWeb Service Presentation
Web Service Presentation
guest0df6b036K views
Entity beans in java von Acp Jamod
Entity beans in javaEntity beans in java
Entity beans in java
Acp Jamod11.6K views
Client Server models in JAVA von Tech_MX
Client Server models in JAVAClient Server models in JAVA
Client Server models in JAVA
Tech_MX7.9K views
File transfer protocol von Vipin Rai
File transfer protocolFile transfer protocol
File transfer protocol
Vipin Rai2.7K views
Protocols and the TCP/IP Protocol Suite von Atharaw Deshmukh
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
Atharaw Deshmukh17.5K views
Client Centric Consistency Model von Rajat Kumar
Client Centric Consistency ModelClient Centric Consistency Model
Client Centric Consistency Model
Rajat Kumar4.9K views
Distributed system architecture von Yisal Khan
Distributed system architectureDistributed system architecture
Distributed system architecture
Yisal Khan754 views
Distributed document based system von Chetan Selukar
Distributed document based systemDistributed document based system
Distributed document based system
Chetan Selukar4K views
Mobile Computing UNIT-6 von Ramesh Babu
Mobile Computing UNIT-6Mobile Computing UNIT-6
Mobile Computing UNIT-6
Ramesh Babu18.7K views
Hypertext transfer protocol (http) von Shimona Agarwal
Hypertext transfer protocol (http)Hypertext transfer protocol (http)
Hypertext transfer protocol (http)
Shimona Agarwal2.7K views
Server system architecture von Faiza Hafeez
Server system architectureServer system architecture
Server system architecture
Faiza Hafeez1.1K views

Destacado

Client server component von
Client server componentClient server component
Client server componentSatya P. Joshi
1.9K views9 Folien
Client Server Architecture von
Client Server ArchitectureClient Server Architecture
Client Server Architecturesuks_87
81.3K views65 Folien
Client server computing_keypoint_and_questions von
Client server computing_keypoint_and_questionsClient server computing_keypoint_and_questions
Client server computing_keypoint_and_questionslucky94527
8.3K views20 Folien
Client-Server Computing von
Client-Server ComputingClient-Server Computing
Client-Server ComputingCloudbells.com
19.1K views20 Folien
remote procedure calls von
  remote procedure calls  remote procedure calls
remote procedure callsAshish Kumar
53.5K views80 Folien
Client server architecture von
Client server architectureClient server architecture
Client server architectureWhitireia New Zealand
28.9K views16 Folien

Destacado(20)

Client Server Architecture von suks_87
Client Server ArchitectureClient Server Architecture
Client Server Architecture
suks_8781.3K views
Client server computing_keypoint_and_questions von lucky94527
Client server computing_keypoint_and_questionsClient server computing_keypoint_and_questions
Client server computing_keypoint_and_questions
lucky945278.3K views
remote procedure calls von Ashish Kumar
  remote procedure calls  remote procedure calls
remote procedure calls
Ashish Kumar53.5K views
Client server-computing von jayasreep3
Client server-computingClient server-computing
Client server-computing
jayasreep314.2K views
Next gen file server emining es series 簡報 von James Yang
Next  gen file server emining es series 簡報Next  gen file server emining es series 簡報
Next gen file server emining es series 簡報
James Yang667 views
Invocación de métodos remotos (rmi) von Matias Yima
Invocación de métodos remotos (rmi)Invocación de métodos remotos (rmi)
Invocación de métodos remotos (rmi)
Matias Yima3.6K views
communication Mechanism in Client Server Model von Junaid Lodhi
communication Mechanism in Client Server Model communication Mechanism in Client Server Model
communication Mechanism in Client Server Model
Junaid Lodhi3.3K views
New File Server Features Of Windows Server 2008 von Microsoft TechNet
New File Server Features Of Windows Server 2008New File Server Features Of Windows Server 2008
New File Server Features Of Windows Server 2008
Microsoft TechNet5.8K views
Client server chat application von Piyush Rawat
Client server chat applicationClient server chat application
Client server chat application
Piyush Rawat4.9K views

Similar a Components of client server application

Chapter3 von
Chapter3Chapter3
Chapter3suks_87
764 views47 Folien
Client server computing von
Client server computingClient server computing
Client server computingStudsPlanet.com
466 views4 Folien
Introduction to the client server computing By Attaullah Hazrat von
Introduction to the client server computing By Attaullah HazratIntroduction to the client server computing By Attaullah Hazrat
Introduction to the client server computing By Attaullah HazratAttaullah Hazrat
1.9K views21 Folien
Middleware Technologies ppt von
Middleware Technologies pptMiddleware Technologies ppt
Middleware Technologies pptOECLIB Odisha Electronics Control Library
6.3K views36 Folien
Peoplesoft PIA architecture von
Peoplesoft PIA architecturePeoplesoft PIA architecture
Peoplesoft PIA architectureAmit rai Raaz
7.4K views18 Folien
Cloud von
CloudCloud
CloudGirish Menon
163 views19 Folien

Similar a Components of client server application(20)

Chapter3 von suks_87
Chapter3Chapter3
Chapter3
suks_87764 views
Introduction to the client server computing By Attaullah Hazrat von Attaullah Hazrat
Introduction to the client server computing By Attaullah HazratIntroduction to the client server computing By Attaullah Hazrat
Introduction to the client server computing By Attaullah Hazrat
Attaullah Hazrat1.9K views
Peoplesoft PIA architecture von Amit rai Raaz
Peoplesoft PIA architecturePeoplesoft PIA architecture
Peoplesoft PIA architecture
Amit rai Raaz7.4K views
SOA Fundamentals von abhi1112
SOA  FundamentalsSOA  Fundamentals
SOA Fundamentals
abhi11126.1K views
An in-building multi-server cloud system based on shortest Path algorithm dep... von IOSR Journals
An in-building multi-server cloud system based on shortest Path algorithm dep...An in-building multi-server cloud system based on shortest Path algorithm dep...
An in-building multi-server cloud system based on shortest Path algorithm dep...
IOSR Journals116 views
Building Intranet Assignment 2009 03 14 roshan basnet (1) von rosu555
Building Intranet Assignment 2009 03 14 roshan basnet (1)Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)
rosu555318 views
Module1 Mobile Computing Architecture von raksharao
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architecture
raksharao7.8K views
Cloud Foundry Technical Overview von cornelia davis
Cloud Foundry Technical OverviewCloud Foundry Technical Overview
Cloud Foundry Technical Overview
cornelia davis96.5K views
Cloud Foundry - Second Generation Code (CCNG). Technical Overview von Nima Badiey
Cloud Foundry - Second Generation Code (CCNG). Technical Overview Cloud Foundry - Second Generation Code (CCNG). Technical Overview
Cloud Foundry - Second Generation Code (CCNG). Technical Overview
Nima Badiey10.6K views
Highly Available XenApp Cloud von ijitcs
Highly Available XenApp CloudHighly Available XenApp Cloud
Highly Available XenApp Cloud
ijitcs559 views
middleware-technologies-8871-AmKEtL9-_1_.ppt von BinduBindu57
middleware-technologies-8871-AmKEtL9-_1_.pptmiddleware-technologies-8871-AmKEtL9-_1_.ppt
middleware-technologies-8871-AmKEtL9-_1_.ppt
BinduBindu579 views

Más de Ashwin Ananthapadmanabhan

Hat app document von
Hat app documentHat app document
Hat app documentAshwin Ananthapadmanabhan
142 views81 Folien
Ashwin resume von
Ashwin   resumeAshwin   resume
Ashwin resumeAshwin Ananthapadmanabhan
88 views2 Folien
Virtual reality with glove one – enabling technology von
Virtual reality with glove one – enabling technologyVirtual reality with glove one – enabling technology
Virtual reality with glove one – enabling technologyAshwin Ananthapadmanabhan
544 views13 Folien
Survey of client tools von
Survey of client toolsSurvey of client tools
Survey of client toolsAshwin Ananthapadmanabhan
560 views51 Folien
Csc sys development von
Csc sys developmentCsc sys development
Csc sys developmentAshwin Ananthapadmanabhan
437 views40 Folien
Data storage csc von
Data storage cscData storage csc
Data storage cscAshwin Ananthapadmanabhan
1.2K views56 Folien

Último

ICS3211_lecture 08_2023.pdf von
ICS3211_lecture 08_2023.pdfICS3211_lecture 08_2023.pdf
ICS3211_lecture 08_2023.pdfVanessa Camilleri
103 views30 Folien
OEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptx von
OEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptxOEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptx
OEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptxInge de Waard
167 views29 Folien
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdf von
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdfCWP_23995_2013_17_11_2023_FINAL_ORDER.pdf
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdfSukhwinderSingh895865
507 views6 Folien
Education and Diversity.pptx von
Education and Diversity.pptxEducation and Diversity.pptx
Education and Diversity.pptxDrHafizKosar
118 views16 Folien
UWP OA Week Presentation (1).pptx von
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxJisc
74 views11 Folien
The Accursed House by Émile Gaboriau von
The Accursed House  by Émile GaboriauThe Accursed House  by Émile Gaboriau
The Accursed House by Émile GaboriauDivyaSheta
158 views15 Folien

Último(20)

OEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptx von Inge de Waard
OEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptxOEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptx
OEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptx
Inge de Waard167 views
Education and Diversity.pptx von DrHafizKosar
Education and Diversity.pptxEducation and Diversity.pptx
Education and Diversity.pptx
DrHafizKosar118 views
UWP OA Week Presentation (1).pptx von Jisc
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptx
Jisc74 views
The Accursed House by Émile Gaboriau von DivyaSheta
The Accursed House  by Émile GaboriauThe Accursed House  by Émile Gaboriau
The Accursed House by Émile Gaboriau
DivyaSheta158 views
The Open Access Community Framework (OACF) 2023 (1).pptx von Jisc
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
Jisc85 views
AI Tools for Business and Startups von Svetlin Nakov
AI Tools for Business and StartupsAI Tools for Business and Startups
AI Tools for Business and Startups
Svetlin Nakov101 views
Ch. 7 Political Participation and Elections.pptx von Rommel Regala
Ch. 7 Political Participation and Elections.pptxCh. 7 Political Participation and Elections.pptx
Ch. 7 Political Participation and Elections.pptx
Rommel Regala72 views
Narration ppt.pptx von TARIQ KHAN
Narration  ppt.pptxNarration  ppt.pptx
Narration ppt.pptx
TARIQ KHAN119 views
Narration lesson plan.docx von TARIQ KHAN
Narration lesson plan.docxNarration lesson plan.docx
Narration lesson plan.docx
TARIQ KHAN104 views
Class 10 English lesson plans von TARIQ KHAN
Class 10 English  lesson plansClass 10 English  lesson plans
Class 10 English lesson plans
TARIQ KHAN257 views
Compare the flora and fauna of Kerala and Chhattisgarh ( Charttabulation) von AnshulDewangan3
 Compare the flora and fauna of Kerala and Chhattisgarh ( Charttabulation) Compare the flora and fauna of Kerala and Chhattisgarh ( Charttabulation)
Compare the flora and fauna of Kerala and Chhattisgarh ( Charttabulation)
AnshulDewangan3316 views
Use of Probiotics in Aquaculture.pptx von AKSHAY MANDAL
Use of Probiotics in Aquaculture.pptxUse of Probiotics in Aquaculture.pptx
Use of Probiotics in Aquaculture.pptx
AKSHAY MANDAL89 views

Components of client server application

  • 1. COMPONENTS OF CLIENT/SERVER APPLICATIONII ME CSE 2015-16 ODD SEMESTER (III SEMESTER)
  • 2. TOPICS  Client services Request for services RPC Windows services Fax /Print services Other remote services Utility services & other services Dynamic Data Exchange(DDE) Object Linking and Embedding(OLE) Common Object Request Broker Architecture(CORBA)
  • 3. TOPICS (CONT)  Server Services Detailed server functionality The network operating system Available platforms The server operating system
  • 4. CLIENT SERVICES • Responsible for managing the user interface • Provides presentation services • Accepts and checks the syntax of user inputs • Acts as a consumer of services • Processes application logic • Extended at the client by adding logic that is not implemented in the host server application Like  Local editing,  automatic data entry,  help capabilities, and other logic processes • Generates database request and transmits to server • Passes response back to the server
  • 5. REQUEST FOR SERVICES A client workstation requests services form the attached server. whatever may be the type of processor the format of request is the same. It is the job if the NOS software to translate or add the necessary details as required by the targeted requester to the application request.
  • 6. MESSAGE PASSING  Allows process to communicate without restoring the shared data  Two processes involved in an IPC Sending process for sending the message Receiving process for receiving the message  Messages sent by the processes are classified into: Fixed Variable
  • 7. DIRECT COMMUNICATION Processes have to specify the name of sender and recipient process name. A link is established in between the sender and receiver along with full known information of their names and addresses. Link must be established in between the processes. There is symmetry in between the communication of the processes.
  • 8. INDIRECT COMMUNICATION • Messages are sent to the mail box and then they are retrieved from mailbox. • Communicate with other processes via one or more mailbox.
  • 9. INDIRECT COMMUNICATION(CONT) • Role of Mail Box is similar to
  • 10. INDIRECT COMMUNICATION(CONT) Features •A link is established between a pair of processes, if they share a mailbox. •A link is established between more then one processes. •Different number of links can be established in between the two communicating process.
  • 11. INDIRECT COMMUNICATION(CONT) Possible combinations of send and receive can be •Blocking Send – Returns control to the user only after the message has been sent or until ACK has been received. •Non-blocking Send – Returns control as soon as the message queued or copied. •Blocking Receive – Returns only after message has been received. •Non-blocking Receive – Receiver receives either a valid message or a NULL.
  • 12. REMOTE PROCEDURES CALL (RPC) RPC allow programs on different machines to interact using simple procedure call or return semantics. It appears as if the two programs were on the same machine. It is based on extending the notion of conventional or local procedure calling. So that the called procedure need not exist in the same address space as the calling procedure. The two processes may be on the same system, or they may be on different systems with a network connecting them. Marshalling − transferring data structure used in remote procedure call from one address space to another.
  • 14. RPC MECHANISM 1. Client calls a local procedure on the client stub 2. The client stub acts as a proxy and marshalls the call and the args. 3. The client stub send this to the remote system (via TCP/UDP) 4. The server stub unmarshalls the call and args from the client 5. The server stub calls the actual procedure on the server 6. The server stub marshalls the reply and sends it back to the client
  • 15. WINDOW SERVICES A client workstation may have several windows open on-screen at any time Capability to provide activate, view, move, resize or hide a particular window->Essential Services. They interact with message services provided to notify the user of events that occur on a server.  Each application is written with the assumption that it has a virtual screen. This virtual screen can be an arbitrary size and can even be larger than the physical screen CLIENT SERVER COMPUTING / UNIT I15
  • 16. WINDOW SERVICES(CONT’D) The application using GUI software places data into the virtual screen. Then the windowing services handle placement and manipulation of the application window. There is no need for the developer to build or manage the windowing services. The client user is totally in control of his or her desktop and can give priority to the most important tasks. The NOS(Network Operating System) provides software on the client workstation to manage the creation of pop-up windows that display alerts generated from remote servers. CLIENT SERVER COMPUTING / UNIT I16
  • 18. SAFE TO DISABLE SERVICES Tablet PC Input Service Windows Time Secondary logon Fax Microsoft iSCSI Initiator Service Encrypting File System Certificate Propagation CLIENT SERVER COMPUTING / UNIT I18
  • 19. PRINT/FAX SERVICES The NOS enables the client to generate print requests even when the printer is busy. The NOS redirector software redirects it and the print server queue manage further manage it. The client has facility to view the status of the print queue at any time and client is also notified when the print is completed. The fax server also works like print server.
  • 20. OTHER REMOTE SERVICES Apps can be invoked from the client to execute remotely on a server . E.g Backup Services. Business functions such as downloading data from a host or checking a list of stock prices might also be invoked locally to run remotely. Software is provided by the NOS to run on the client workstation to initiate these remote applications.
  • 21. OTHER REMOTE SERVICES(CONT’D) Mobile computing is increasingly being used to remain functional while out of the office. With appropriate architectural forethought, applications can be built to operate effectively from the office LAN or the remote laptop. The IPC protocol of choice for mobile access is TCP/IP based. 
  • 23. UTILTY AND OTHER SERVICES Utility Services The operating system facilitates some local functions which are very often used to perform actions like edit, copy, move, compare and help which works on the client end. Message Services Messages can be sent and received to or from the network synchronously. The message services provide the buffering, scheduling and arbitration services to support this function. Network Services   The client workstation communicates with the network through protocol, some set of service and API’s that creates, send and receive and format network messages. Application Services In addition to the remote execution services that the NOS provide, custom applications will use their own API’s embedded in an RPC to invoke specialized services form a remote server.
  • 24. DYNAMIC DATA EXCHANGE(DDE) • DDE -A conversation between two applications(a client application and a server application) • It is a feature of some operating systems (like Windows 98, OS/2) presentation manager that enable users to pass data between applications to application. • Eg1: If an application wants to connect a Microsoft Excel spreadsheet with Microsoft Word for windows report in such a way that changes to the spreadsheet are reflected automatically in the report • In the above case, Microsoft Word for windows is the client and Microsoft Excel is the server. • Primary function of DDE is to allow Windows applications to share data.
  • 25. DDE(CONT) Eg2: A charting package can be linked to a database to provide the latest chart data whenever the chart is reference Concerned about a particular topic and a particular item. The topic and item is the nature of the information that the client wants.
  • 26. HOW TO SET UP A DDE LINK? • Eg: If the Word for Windows document is to receive data automatically from a range named IBM in a Microsoft Excel worksheet, named STOCKS.XLS • Then STOCKS.XLS is the topic and IBM is the item. • Simplest way to set up a DDE link is Copy a block of data from the server application to the clipboard Activate the client application Move the insertion point to the location in the receiving document where you want the information to go
  • 27. DDE(CONT)  Then use a Paste Link command (With most server programs, some times it requires to save data in a disk file before pasting).  A DDE link may be automatic or manual.  An automatic link is refreshed whenever the source data changes, provided both the client and server applications are running.  A manual link is refreshed only when you issue a command in the client application.
  • 28. OBJECT LINKING AND EMBEDDING(OLE) OLE is an extension to DDE that enables objects to be created with the object components software aware. Aware -a reference to the object or one of its components automatically launches the appropriate software that manipulate the data.
  • 29. OLE(CONT) For example, a document created with a word processor may include an image created by a graphics package. The image can be converted to the internal graphics form of the word processor, such as WPG form for WordPerfect.
  • 31. OLE(CONT) With OLE, the image can be included in its original form within the document object; whenever the image is selected or highlighted, the graphics package will take control to manipulate the image. Viewer or launcher is the one by which software package accesses data created from another one. It is custom built Viewer-users can see data from one software package while they are running another package. Launchers -invoke the software package that created the data and thus provide the full functionality of the launched software. Advantage: any DDE- or OLE-enabled application can use any software that supports these data interchange APIs. Eg: Microsoft has released its OLE 2.0 software development kit (SDK)
  • 32. OLE 2.0 •OLE 2.0 extends OLE capabilities to enable a group of data to be defined as an object and saved into a database. •This object can then be dragged and dropped into other applications and edited without the need to switch back to the application which created it. • This provides a more seamless interface for the user. ADVANTAGE OF OLE2.0 OVER OLE1.x: •In OLE 1.x, double-clicking a Lotus 1-2-3 for Windows spreadsheet embedded in a Microsoft Word for Windows document launches 1-2-3 and opens the document in a 1-2- 3 window. • Under OLE 2.0, the active window (Word's) menu and toolbar change to that of 1-2-3. • The user deals only with the object.
  • 33. COMMON OBJECT REQUEST BROKER ARCHITECTURE (CORBA) • CORBA is an object oriented architecture. • It has the mechanism that allows various clients to share/call the objects over mixed networks. • The objects are the applications. • In specific CORBA is a process of moving objects over networks with cross platform data transfer. • For the process to take place the client sends the request to an object request broker(ORB).
  • 34. CORBA(CONT) • The client that needs the service sends the request to ORB acting as a directory of all the remote services available on the network. • The representation of ORB is given as
  • 35. CORBA(CONT) The broker calls the relevant object and passes the relevant data. The remote object services the request and replies to the broker which in turn responses the client. The object communication may rely on an RPC structure. CORBA architecture is similar to the client server architecture. In this a component can act as client and a server.
  • 36. CORBA(CONT) • How the component is considered as sever/client is given as, • A component is considered as server if it contains CORBA objects whose services are accessible from other CORBA objects. • A component is considered a client if it accesses services from other CORBA objects.
  • 37. CORBA(CONT) In case of single remote method invocation the role of client server can be temporarily reversed. This is possible because a single CORBA object can participate in multiple interactions simultaneously. Furthermore, any component that provides an implementation for an object is considered as a server.  If a component creates an object and provides other components with visibility to that object (i.e., allows other components to obtain references to that object).
  • 38. CORBA(CONT) • Then that components acts as server for that object. • Any requests made on that object by other components will be processed by the components that creates the object. • Thus, a CORBA server means the components execute methods for a particular object on behalf of other components (Clients).
  • 39. CORBA(CONT) • An application component can provide services to other application components while accessing services from other components. • In that scenario, the components is acting as a client of one component and as a server to the other components i.e., two components can simultaneously act as client and server to each other.
  • 40. COMPONENT ACTING AS CLIENT/SERVER
  • 41. REQUEST PROCESSING  Requests are issued by a client to the NOS services software resident on the client machine. These services format the request into an appropriate RPC and issue the request to the application layer of the client protocol stack. This request is received by the application layer of the protocol stack on the server.
  • 42. FILE SERVICES File services handle access to the virtual directories and files located on the client workstation and to the server's permanent storage.  All requests are mapped into the virtual pool of resources and redirected as necessary to the appropriate local or remote server
  • 43. FAX/PRINT/IMAGE SERVICES High-quality printers, workstation-generated faxes, and plotters are natural candidates for support from a shared server. The server can accept input from many clients, queue it according to the priority of the request and handle it when the device is available. Incoming faxes can be queued at the server and transmitted to the appropriate client either on receipt or on request. In concert with workflow management techniques, images can be captured and distributed to the appropriate client workstation from the image server
  • 44. THE NETWORK OPERATING SYSTEM  Novell NetWare  LAN Manager  IBM LAN Server  Banyan VINES PC Network File Services (NFS) 
  • 45. NOVELL NETWARE NetWare is a family of LAN products with support for IBM PC-compatible and Apple Macintosh clients, and IBM PC-compatible servers.  NetWare is a proprietary NOS in the strict sense that it does not require another OS, such as DOS, Windows
  • 46. NETWARE ARCHITECTURE  NetWare to an open architecture NetWare evolved from a very simple concept: file sharing instead of disk sharing.  In 1983 when the first versions of NetWare originated, all other competing products were based on the concept of providing shared direct disk access. Novell's alternative approach was validated by IBM in 1984, which helped promote the NetWare product.
  • 47. LAN MANAGER LAN Manager was a Network Operating System (NOS) available from multiple vendors and developed by Microsoft in cooperation with 3Com Corporation. IBM LAN Server  Banyan VINES PC Network File Services (NFS)
  • 48. WHAT ARE THE AVAILABLE PLATFORMS?  Workstations in LAN Configuration LAN-to-LAN/WAN Configuration OLTP on a LAN OLTP with UNIX 
  • 49. WORKSTATIONS IN LAN CONFIGURATION This model is the most basic implementation providing the standard LAN services for file and printer sharing. 
  • 50. LAN-TO-LAN/WAN CONFIGURATION • Routers and communication servers will be used to provide communication services between LANs and into the WAN • In the client/server model, these connections will be provided transparently by the SDE tools. • There are significant performance implications if the traffic volumes are large. IBM's LU6.2 implementation in APPC and TCP/IP provides the best support for high-volume, LAN-to-LAN/WAN communications. • DEC's implementation of DECnet always has provided excellent LAN-to-WAN connectivity. • Integrated support for TCP/IP, LU6.2, and IPX provides a solid platform for client/server LAN-to-WAN implementation within DECnet. Novell 4.x provides support for TCP/IP as both the LAN and WAN protocol. Internetworking also is supported between IPX and TCP/IP.
  • 51. OLTP ON A LAN Online Transaction Processing applications are found in such industries as insurance, finance, government, and sales—all of which process large numbers of transactions. OLTP has traditionally been the domain of the large mainframe vendors—such as IBM and DEC—and of special-purpose, fault-tolerant processors from vendors such as Tandem and Stratus. The client/server model has the capability to provide all the services required for OLTP at much lower cost than the traditional platforms.. 
  • 52. OLTP WITH UNIX As UNIX has matured, it has added many of the features found in other commercial operating systems such as VMS and MVS. There are now several offerings for OLTP with UNIX. IBM is promoting CICS 6000 as a downsizing strategy for CICS MVS. Database services will be provided by a combination of AIX and MVS servers. Novell purchased the Tuxedo product from AT&T with its acquisition of USL. OSF selected the Transarc Ensina product as the basis for OLTP with DCE
  • 53. THE SERVER OPERATING SYSTEM NetWare OS/2 Windows NT  UNIX 
  • 54. NETWARE  • NetWare is used by many organizations, large and small, for the provision of file, printer, and network services. • NetWare is a self-contained operating system. It does not require a separate OS (as do Windows NT, OS/2, and UNIX) to run. • Novell is taking steps to allow NetWare to run on servers with UNIX. • Novell purchased USL and will develop shrink-wrapped products to run under both NetWare and UNIX System V, Release 4.2. • The products will enable UNIX to simultaneously access information from both a NetWare and a UNIX server. 
  • 55. OS/2  OS/2 is the server platform for Intel products provided by IBM in the System Application Architecture (SAA) model. OS/2 provides the storage protection and preemptive multitasking services needed for the server platform.  Several database and many application products have been ported to OS/2. T he only network operating systems directly supported with OS/2 are LAN Manager and LAN Server.. 
  • 56. Windows NT Windows NT is a family of operating systems produced by Microsoft, the first version of which was released in July 1993. It is a processor- independent, multiprocessing, multi- user operating system.
  • 57. UNIX Unix (all-caps UNIX for the trademark) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, developed in the 1970s at the Bell Labs research centre by Ken Thompson, Dennis Ritchie, and others.
  • 58. UNIX ARCHITECTURE A Unix architecture is a computer operating system system architecture that embodies the Unix philosophy. It may adhere to standards such as the Single UNIX Specification (SUS) or similar POSIX IEEE standard. No single published standard describes all Unix architecture computer operating systems - this is in part a legacy of the Unix wars.
  • 59. UNIX ARCHITECTURE(CONT) • Unix systems use a centralized operating system kernel which manages system and process activities. • All non-kernel software is organized into separate, kernel-managed processes. • Unix systems are pre-emptively multitasking: multiple processes can run at the same time, or within small time slices and nearly at the same time, and any process can be interrupted and moved out of execution by the kernel. This is known as thread management. • Files are stored on disk in a hierarchical file system, with a single top location throughout the system (root, or "/"), with both files and directories, subdirectories, sub- subdirectories, and so on below it. • With few exceptions, devices and some types of communications between processes are managed and visible as files or pseudo-files within the file system hierarchy. This is known as everything is a file. However, Linus Torvalds states that this is inaccurate and may be better rephrased as "everything is a stream of bytes"
  • 60. UNIX Features Multitasking and multiuser Programming interface Use of files as abstractions of devices and other objects Built-in networking (TCP/IP is standard) Persistent system service processes called "daemons" and managed by init or inet