panko_bdnt7e_ch11

Upload: rockstar104

Post on 14-Apr-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/27/2019 panko_bdnt7e_ch11

    1/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall

    NetworkedApplications

    Chapter 11Updated January 2009

    Raymond PankosBusiness Data Networks and Telecommunications, 7th edition

    May only be used by adopters of the book

  • 7/27/2019 panko_bdnt7e_ch11

    2/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall

    ApplicationArchitectures

    An application architecture describes howapplication layer functions are distributed

    among computers to deliver service to users.

  • 7/27/2019 panko_bdnt7e_ch11

    3/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-3

    11-1: Simple TerminalHost System

  • 7/27/2019 panko_bdnt7e_ch11

    4/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-4

    Client/Server Computing

    The client does at least some of the work

    Made possible by growing PC processing power

    ServerClient PC

    Client ProgramServer Program

  • 7/27/2019 panko_bdnt7e_ch11

    5/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-5

    11-2: Client/Server Computing

    File Server

    Client PC

    Highly scalable: Use larger server as number of clients increases

    Client/Server Processing with Request-Response Cycle

    Client Program Server Program

    Request Message

    Response Message

    Does Light I/O andPost-DownloadProcessing

    Does HeavyDatabase

    and Other HeavyProcessing

    3

  • 7/27/2019 panko_bdnt7e_ch11

    6/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-6

    11-3: Web-Enabled Application (E-Mail)

    E-Mail Server

    Client PC

    Client is Browser Server Program

    HTTP Request Message

    HTTP Response Message

    Web-enabled applications:Form of client server processing

    that uses browsers as clients.Almost all client PCs

    now have browsers.No need to install new software.

  • 7/27/2019 panko_bdnt7e_ch11

    7/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall

    E-Mail

  • 7/27/2019 panko_bdnt7e_ch11

    8/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-8

    Each e-mail user has a mail server.

    The sender transmits a message to its mail server.

    The senders mail server delivers the messageto the receivers mail server.

    The receivers mail server delivers the messageto the receiver.

    The E-Mail Delivery Process

    SendingE-MailClient

    ReceivingE-MailClient

    Senders MailServer

    Receivers MailServer

  • 7/27/2019 panko_bdnt7e_ch11

    9/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-9

    11-5: E-Mail Standards: Sending

    2.SMTP

    To Send1.SMTP

    To Send

    SendingE-Mail Client

    (Outlook, etc.)

    ReceivingE-Mail Client

    (Outlook, etc.)

    Senders MailServer

    Receivers MailServer

    Simple Mail Transfer Protocol

    (SMTP) is used to transmit mailin real time to a users mail

    server or between mail servers

    Sender-initiated

  • 7/27/2019 panko_bdnt7e_ch11

    10/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-10

    11-5: E-Mail Standards: Receiving

    Senders MailServer

    Receivers MailServer

    3.POP orIMAP

    to Receive

    POP or IMAP to download mail to

    receiver when the receiver next

    downloads mail

    Receiver-initiated

    Sending

    E-Mail Client(Outlook, etc.)

    Receiving

    E-Mail Client(Outlook, etc.)

  • 7/27/2019 panko_bdnt7e_ch11

    11/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-11

    Figure 11-5: E-Mail Standards

    SendingE-MailClient

    ReceivingE-MailClient

    Senders MailServer

    Receivers MailServer

    MessageRFC 822 or 2822HTML bodyUNICODE

    Message Body Format Standard

    Most applications have standards for delivery and also document syntax.

    For e-mail, the document (message) syntax usually is one of three standards

  • 7/27/2019 panko_bdnt7e_ch11

    12/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-12

    On the left, we have just seen thattraditional e-mail clients send withSMTP and receive with POP or IMAP.

    On the right, Web-based e-mail clientsonly need a browser and use HTTPboth to send and to receive.

    Server-server communication alwaysuses SMTP.

    11-5: E-Mail Standards: Web-Based E-Mail

    TraditionalE-Mail Client

    (Outlook, etc.)

    Web-BasedE-Mail

    ClientBrowser

    SMTP

    POP or

    IMAP

    HTTP

    SMTP

  • 7/27/2019 panko_bdnt7e_ch11

    13/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-13

    Figure 11-5: E-Mail Standards

    Message Body Standards RFC 822 and RFC 2822 for all-text bodies

    HTML bodies

    All of the richness of a webpage UNICODE

    Can represents the characters in multiple languages

    Chinese, Japanese, Sanskrit, German, Arabic, etc.

  • 7/27/2019 panko_bdnt7e_ch11

    14/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-14

    11-6: Interactions in the Simple Mail Transfer

    Protocol (SMTP)

    Actor Command Comment

    ReceivingSMTPProcess

    220 Mail.Panko.ComReady

    When a TCP connection isopened, the receiver signals thatit is ready.

    SendingSMTPProcess

    HELOvoyager.cba.hawaii.edu

    Sender asks to begin sending amessage. Gives own identity.(Yes, HELO, not HELLO.)

    Receiver 250 Mail.Panko.Com Receiver signals that it is readyto begin receiving a message.

    Opening a connection

  • 7/27/2019 panko_bdnt7e_ch11

    15/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-15

    11-6: Interactions in the Simple Mail Transfer

    Protocol (SMTP)

    Actor Command Comment

    Sender MAIL FROM: [email protected]

    Sender identifies the sender (mailauthor, not SMTP process).

    Receiver 250 OK Accepts author. However, mayreject mail from others.

    Sender RCPT TO:

    [email protected]

    Identifies first mail recipient.

    Receiver 250 OK Accepts first recipient.Sender RCPT TO:

    [email protected] second mail recipient.

    Receiver 550 No such user here Does not accept second recipient.

    However, will deliver to firstrecipient.

    Identifying recipients

  • 7/27/2019 panko_bdnt7e_ch11

    16/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-16

    11-6: Interactions in the Simple Mail Transfer

    Protocol (SMTP)

    Actor Command Comment

    Sender DATA Message will follow.Receiver 354 Start mail input; end with

    .Gives permission to sendmessage.

    Sender When in the course The message. Multiplelines of text. Ends with line

    containing only a singleperiod: .

    Receiver 250 OK Receiver accepts message.Sender QUIT Requests termination of

    session.

    Receiver 221 Mail.Panko.Com Serviceclosing transmission channel

    End of transaction.

    Sending the message.Ending the connection.

  • 7/27/2019 panko_bdnt7e_ch11

    17/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-17

    11-4: E-Mail

    Viruses, Worms, and Trojan Horses Widespread problems; often delivered through e-mail

    attachments

    Use of antivirus software is almost universal, but it isnever fully ineffective

  • 7/27/2019 panko_bdnt7e_ch11

    18/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-18

    11-4: E-Mail

    Viruses, Worms, and Trojan Horses Where to do scanning for viruses, worms, and Trojan

    horses?

    On the client PC, but users often turn off or fail toupdate their software

    On the corporate mail server and application firewall;users cannot turn off

    At an antivirus outsourcing company before mailreaches the corporation

    Defense in depth: Filter at two or more locations withdifferent filtering software

  • 7/27/2019 panko_bdnt7e_ch11

    19/75

  • 7/27/2019 panko_bdnt7e_ch11

    20/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-20

    11-4: E-Mail

    Spam Separating spam from legitimate messages is very

    difficult

    Many spam messages get through to users

    Some legitimate messages are deleted

    Some firms merely mark messages as probable spamand then deliver them to the user

    Others periodically send a list of deleted spammessages that users can recover if they wish

  • 7/27/2019 panko_bdnt7e_ch11

    21/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-21

    11-4: E-Mail

    Spam Reputation-Based Filtering

    Some domains are white-listed, and messages fromthem either bypass spam filtering or get limitedfiltering

    Some domains are black-listed, and messages fromthem are either deleted automatically or filteredheavily

    New:Not in the book.

  • 7/27/2019 panko_bdnt7e_ch11

    22/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall

    HTML and HTTP

  • 7/27/2019 panko_bdnt7e_ch11

    23/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-23

    11-7: HTML and HTTP

    The Hypertext Transfer Protocol (HTTP)is the standard for transferring messages between

    the client (browser) and the server (webserver.

    The Hypertext Markup Language (HTML)is a standard for text documents that have tags to indicate

    formatting and other files to be downloaded

  • 7/27/2019 panko_bdnt7e_ch11

    24/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-24

    11-8: Downloading a Complex Webpage with Two

    Graphics Files

    Client PC

    BrowserWebserver

    Application

    Webserver

    Webpage Consists of Three Files

    Rendered as a Single Page On-ScreenWebpage as

    Displayed

    TwoGraphics

    Files

    HTML

    Document

    C

  • 7/27/2019 panko_bdnt7e_ch11

    25/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-25

    11-8: Downloading a Complex Webpage with Two

    Graphics Files

    1.HTML Document

    Client PC

    Browser Webserver

    Application

    Webserver

    Download Requires 3

    HTTP Request-Response Cycles;

    Downloads HTML Page First

    HTML Page Has Tags to Identify Other Files

    AsDisplayed

    2Graphics

    Files

    HTML Document

    11 8 D l di C l W b ith T

  • 7/27/2019 panko_bdnt7e_ch11

    26/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-26

    11-8: Downloading a Complex Webpage with Two

    Graphics Files

    Client PC

    Browser WebserverApplication

    Webserver

    Based on Tags in HTML Document,Browser Requests Downloads of

    Remaining Graphics or Other Files

    Browser Renders Combined Webpage on Screen

    AsDisplayed

    2Graphics

    Files

    2.

    3.

    11 8 D l di C l W b

  • 7/27/2019 panko_bdnt7e_ch11

    27/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-27

    11-8: Downloading a Complex Webpage

    with Two Graphics Files

    Quiz: Your browser downloads a webpage with threegraphics images, a sound sequence, and a Java applet.

    How many files will your browser have to download?

    11 9: Examples of HTTP Request and

  • 7/27/2019 panko_bdnt7e_ch11

    28/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-28

    11-9: Examples of HTTP Request and

    Response Messages

    HTTP Request Message GET /panko/home.htm HTTP/1.1[CRLF]

    Host: voyager.cba.hawaii.edu

    Notes Two lines, all text

    GET = method

    /panko/home is the file to get

    HTTP/1.1 is the version of HTTP the sender speaks CRLF (carriage return/line feed) starts a new line

    Next Line: keyword, colon, value

    11 9: Examples of HTTP Request and

  • 7/27/2019 panko_bdnt7e_ch11

    29/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-29

    11-9: Examples of HTTP Request and

    Response Messages

    HTTP Response Message HTTP/1.1 200 OK[CRLF]

    Date: Tuesday, 20-MAR-2009 18:32:15 GMT[CRLF]

    Server: name of server software[CRLF] MIME-version: 1.0[CRLF]

    Content-type: text/plain[CRLF]

    [CRLF]

    File to be downloaded. A string of bits that may be text,graphics, sound, video, or other content.

    11 9: Examples of HTTP Request and

  • 7/27/2019 panko_bdnt7e_ch11

    30/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-30

    11-9: Examples of HTTP Request and

    Response Messages (Cont.)

    MIME Multipurpose Internet Mail Extensions

    Naming system for type of file contained in the responsemessage

    Allows the receiver to know what type of file it will bereceiving so that the receiver can handle the file properly

    Must specify MIME version and type of content

    MIME-version: 1.0[CRLF]

    Content-type: text/plain[CRLF]

  • 7/27/2019 panko_bdnt7e_ch11

    31/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall

    E-Commerce

  • 7/27/2019 panko_bdnt7e_ch11

    32/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-32

    11-10: Electronic Commerce Functions

    CustomerPC

    Browser Webserver

    Application

    E-Commerce

    Server

    ExternalDatabase

    InternalDatabase

  • 7/27/2019 panko_bdnt7e_ch11

    33/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-33

    11-10: EC Functions

    Webserver Functionality, Plus

    E-Commerce functionality

    Online catalog

    Shopping cart Checkout, including payment

    Customer resource management (CRM)

    Links to External Systems

    Credit card number checking

    Bank settlement

  • 7/27/2019 panko_bdnt7e_ch11

    34/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-34

    11-10: EC Functions

    E-Commerce functionality Links to internal systems

    Accounting

    Pricing Warehousing (product availability)

    Shipment

    Etc.

  • 7/27/2019 panko_bdnt7e_ch11

    35/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-35

    11-11: Application Server (3-Tier Architecture)

    Client PCwithBrowser 1.

    Form

    Web-server Application

    Server

    Mainframe

    DatabaseServer

    Server ofExternal Company

    2.Data

    1.User fills in a formusing a browser

    2.Webserver sendsform data onto anapplication server

  • 7/27/2019 panko_bdnt7e_ch11

    36/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-36

    11-11: Application Server (3-Tier Architecture)

    Client PCwith

    Browser

    Web-server Application

    Server

    3.MainframeQuery andResponse

    Mainframe

    DatabaseServer

    Server ofExternal Company

    3.To get data needed to serve

    the customer,the application server

    queries a mainframe databaseand reads the information

    in the response

  • 7/27/2019 panko_bdnt7e_ch11

    37/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-37

    11-11: Application Server (3-Tier Architecture)

    Client PCwithBrowser

    Web-server Application

    Server

    Mainframe

    4.

    DB ServerQuery andResponse

    DatabaseServer

    Server ofExternal Company

    5. External Query/Response

    Database Sever Interactions (4, 5)Application program interfaces (API)

    Both internal and external database hosts

  • 7/27/2019 panko_bdnt7e_ch11

    38/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-38

    11-11: Application Server (3-Tier Architecture)

    Client PCwith

    Browser 7.Webpage

    Web-server Application

    Server

    Mainframe

    DatabaseServer

    Server ofExternal Company

    6.New

    Webpage

    6.From the

    retrieved data, theApplication Server

    creates a new webpage

    7.Webserver sendsthe webpage to

    the browser

  • 7/27/2019 panko_bdnt7e_ch11

    39/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall

    Web Services

  • 7/27/2019 panko_bdnt7e_ch11

    40/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-40

    11-12: Web Service Versus Web Services

    HTTP Response

    HTTP Request

    HTML or Other DocumentClient PC

    Webserver

    Browser WebserverApplication

    Ordinary Webservice

    Ordinary webservice was created to download documents

  • 7/27/2019 panko_bdnt7e_ch11

    41/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-41

    11-12: Web Service Versus Web Services

    HTTP Response

    HTTP Request

    Client PCWebserver

    SOAP-CapableBrowser

    ServiceObject

    SOAP MessageUsing XML Syntax

    Web services, in contrast to webservice,provide program-to-program communication.

    Programs on the webserver are called service objects.

    Messages follow the SOAP format.

  • 7/27/2019 panko_bdnt7e_ch11

    42/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-42

    11-12: Web Service Versus Web Services

    Result of Calculation

    Parameters

    Client PCWebserver

    SOAP-CapableBrowser

    ServiceObject

    SOAP MessageUsing XML Syntax

    The sending program sends parameters for the calculation.The service object does the calculations and sends back results.

    11-12: Web Service Versus Web

  • 7/27/2019 panko_bdnt7e_ch11

    43/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall

    11 12: Web Service Versus Web

    Services

    Question: Distinguish between what the serverdoes when a webservice request arrives and whena Web service request arrives.

    11-43

    11-13: Simple SOAP Request and

  • 7/27/2019 panko_bdnt7e_ch11

    44/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-44

    11-13: Simple SOAP Request andResponse

    Simple Object Access Protocol (SOAP) Message

    Carried in HTTP request or response message

    Formatted using XML Syntax

    Similar to HTML syntax but

    the sender and receiver can

    create new tags that

    they can then use intransactions, such as

    $33

    HTTP Header

    SOAPBody

    XMLFormatting

    11-13: Simple SOAP Request and

  • 7/27/2019 panko_bdnt7e_ch11

    45/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-45

    11 13: Simple SOAP Request andResponse

    Situation There is a pricing object that returns the price if another

    object sends the part number, quantity, and shippingtype (rush, etc.) on an interface

    Objects can be on different computers

    SendingObject

    PricingObject

    Request(PartNum, Quantity, ShippingType)

    Response(Price)

    11 13 Simplified SOAP Req est and

  • 7/27/2019 panko_bdnt7e_ch11

    46/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-46

    11-13: Simplified SOAP Request and

    Response

    SOAP Request Message

    HTTP Request Header pointing to program

    QA78d47Rush

    Note: xmlns specifies an XML namespace for the object

    Asks for price,

    given part number, quantity,and shipping type

    11-13: Simple SOAP Request and

  • 7/27/2019 panko_bdnt7e_ch11

    47/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-47

    11 13: Simple SOAP Request and

    Response

    SOAP Response Message

    HTTP Response Header

    $750.33

    Response givesthe price quote

    11 14 WSDL d UDDI

  • 7/27/2019 panko_bdnt7e_ch11

    48/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-48

    11-14: WSDL and UDDI

  • 7/27/2019 panko_bdnt7e_ch11

    49/75

  • 7/27/2019 panko_bdnt7e_ch11

    50/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall

    Peer-to-PeerComputing

  • 7/27/2019 panko_bdnt7e_ch11

    51/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall11-51

    11-15: Traditional Client/Server Application

    Client PC Client PC Client PC Client PCClient PC

    Server Does Heavy Processing Work

    Disadvantages:Network Overload at Server

    Underused Client PowerCentral Control

    Advantage:Central Control

    P2P Applications

  • 7/27/2019 panko_bdnt7e_ch11

    52/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall11-52

    P2P Applications

    Direct service, although most P2P systems usefacilitating servers for some of the work

    Peer Peer

    Peer

    PeerPeer

    Peer

    Figure 11-16: Simple Peer-to-Peer (P2P)

  • 7/27/2019 panko_bdnt7e_ch11

    53/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall11-53

    Figure 11-16: Simple Peer-to-Peer (P2P)

    Application

    Client PC Client PC

    Request

    Response

    Benefits:End User Freedom

    No Network Bottleneck at ServerUses Client Capacity Better

    Problems:Transient Presence of ClientsTransient Client IP AddressesSecurity (No Central Control)

    Figure 11-17: Gnutella: Pure P2P Protocol

  • 7/27/2019 panko_bdnt7e_ch11

    54/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall11-54

    Figure 11 17: Gnutella: Pure P2P Protocol

    with Viral Networking

    GnutellaClient

    (Carol)Gnutella

    Client (XYZ)Gnutella

    Client (GHI)

    GnutellaClient (ABC)

    Gnutella

    Client (DEF)

    1. Init orSearch

    Message

    2.Init or Search

    Message

    3.Init or Search

    Message

    3. Init or

    SearchMessage

    4.

    P2P File DownloadHTTP Request-ResponseCycle

    2. Init orSearch

    Message 3. Init orSearch

    Message

    3

  • 7/27/2019 panko_bdnt7e_ch11

    55/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall11-55

    Figure 11-18: Napster

    NapsterIndex Server

    2.Search Query

    3.Response

    1.Uploads List

    Of Available FilesWhen Connects

    4.Large P2P

    Download

    File List

    List ofAvailable

    Files

    From AllCurrent Clients

    User A User B User C

    2

    11 19: Use of Servers in Instant Messaging

  • 7/27/2019 panko_bdnt7e_ch11

    56/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall11-56

    11-19: Use of Servers in Instant Messaging

    Client PC A Client PC B

    Pure P2P IM

    Ongoing IM

    Communication

    In pure P2P IM, there are no servers.The clients communicate directly.

    Finding each other can be difficult because DHCP maygive each client PC a different IP address

    each time the client uses the Internet.

    Setup

    11 19: Use of Servers in Instant Messaging

  • 7/27/2019 panko_bdnt7e_ch11

    57/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-57

    11-19: Use of Servers in Instant Messaging

    Client PC C Client PC D

    Use of a Presence Server

    3.Ongoing IM

    Communication

    1.Presence

    Information

    2.Presence

    Information

    Clients register with presence servers.Presence servers notify other clients as appropriate.Clients use this information to communicate directly.

    Ongoing communication dominates.Most communication is peer-to-peer.

    Presence Server

    11 19: Use of Servers in Instant Messaging

  • 7/27/2019 panko_bdnt7e_ch11

    58/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall 11-58

    11-19: Use of Servers in Instant Messaging

    Client PC E Client PC F

    Use of a Relay Server

    All Communication

    Goes through theRelay Server

    IMCommunication

    Relay servers route all IM messages.This permits security filtering and other services.

    It limits privacy because the relay server sees everything.

    Relay Server

    IMCommunication

    11 20: SETI@home Client PC Processor Sharing

  • 7/27/2019 panko_bdnt7e_ch11

    59/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall11-59

    11-20: SETI@home Client PC Processor Sharing

    Perspective on Application

  • 7/27/2019 panko_bdnt7e_ch11

    60/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall11-60

    Perspective on ApplicationArchitectures

    Driven primarily by the evolution of clientprocessing power

    Terminal-Host: Client processing power was

    uneconomical

    Client/Server: Client PCs could handle some ofthe load

    P2P: Clients have rich power to do most things

  • 7/27/2019 panko_bdnt7e_ch11

    61/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall

    Cloud Computing

    11-61

    New:Not in the book.

    Cloud Computing New:

  • 7/27/2019 panko_bdnt7e_ch11

    62/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall

    Cloud Computing

    A Term that Emerged Just as the Book was Goingto Press

    Characteristics

    All services are provided by servers owned by service

    providers

    Software is executed on servers or downloaded to theclient

    11-62

    New:Not in the book.

    Cloud Computing

  • 7/27/2019 panko_bdnt7e_ch11

    63/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall

    Cloud Computing

    Advantages

    The user organization is freed from maintaining theservers and applications that run on them

    Browser-based, so no need to install or configure

    applications on client PCs

    11-63

    New:Not in the book.

    Cloud Computing

  • 7/27/2019 panko_bdnt7e_ch11

    64/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall

    Cloud Computing

    Pricing Subscription-based pricing (fixed cost per month or year)

    Up to a maximum amount of use

    This gives predictability spending for customers

    Pay per minute (hour, day, etc.)

    11-64

    New:Not in the book.

    Cloud Computing

  • 7/27/2019 panko_bdnt7e_ch11

    65/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall

    Cloud Computing

    Other Characteristics Use of Web services interaction standards to simplify

    use

    If large increases are needed for a short time, the serviceprovider can provide it

    11-65

    New:Not in the book.

    Cloud Computing

  • 7/27/2019 panko_bdnt7e_ch11

    66/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall

    Cloud Computing

    Concerns

    What happens when the network is unavailable?

    Quality of service concerns: response time, etc.

    Comprehensibility of pricing schemes

    Security of corporate information stored in the cloud

    Vendor bankruptcies

    11-66

    New:Not in the book.

  • 7/27/2019 panko_bdnt7e_ch11

    67/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall

    Topics Covered

    Topics Covered

  • 7/27/2019 panko_bdnt7e_ch11

    68/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall

    11-68

    Topics Covered

    Application Architectures Terminal-host

    Client/server

    Client/server processing with request/response cycle Web-based client/server processing only needs a

    browser

    Peer-to-peer (P2P)

    Evolution of architectures driven by growing desktopcomputer power

    Topics Covered

  • 7/27/2019 panko_bdnt7e_ch11

    69/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall

    11-69

    Topics Covered

    E-Mail Sending: Simple Mail Transfer Protocol (SNMP)

    Retrieving: POP and IMAP

    Document format standards: RFC 822/2822, HTML, andUNICODE

    Viruses, worms, and Trojan horses

    Where to do antivirus filtering?

    Spam

    Topics Covered

  • 7/27/2019 panko_bdnt7e_ch11

    70/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall

    11-70

    Topics Covered

    HTTP and HTML Webpages consist of an HTML document and multiple

    graphics, etc., files

    Message transfer: HTTP

    Multiple downloads for the multiple files in a webpage

    MIME

    Topics Covered

  • 7/27/2019 panko_bdnt7e_ch11

    71/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall

    11-71

    Topics Covered

    E-Commerce E-Commerce : webservice with additional functionality

    Webserver interacts with customer browser

    Application server interacts with back-end databases,passes webified response to the webserver for deliveryto the customer

    Topics Covered

  • 7/27/2019 panko_bdnt7e_ch11

    72/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall

    11-72

    Topics Covered

    Web Services Regular webservice: retrieve stored files

    Web Services: use HTTP and extended HTML tohandle program-to-program interactions on different

    machines

    SOAP request message passes parameters to aservice object on another machine

    SOAP response message brings the reply SOAP messages are written in XML

    WSDL and UDDI for documenting actions

    Peer-to-Peer (P2P) Applications

  • 7/27/2019 panko_bdnt7e_ch11

    73/75

    2009 Pearson Education, Inc. Publishing as Prentice Hall

    11-73

    Peer to Peer (P2P) Applications

    Clients provide services to other clients Facilitating servers may provide some functionality

    However, MOST work is done by the peer PCs

    File sharing

    Instant messaging

    Processor sharing

  • 7/27/2019 panko_bdnt7e_ch11

    74/75

  • 7/27/2019 panko_bdnt7e_ch11

    75/75

    All rights reserved. No part of this publication may be reproduced, stored in aretrieval system, or transmitted, in any form or by any means, electronic,

    mechanical, photocopying, recording, or otherwise, without the prior writtenpermission of the publisher. Printed in the United States of America.

    Copyright 2009 Pearson Education, Inc.Publishing as Prentice Hall