SlideShare a Scribd company logo
1 of 36
Download to read offline
1




Chapter 9: Clients and
 Servers Interactions
2



   The Client Server Architecture
• Is a network architecture
   – Which separates a client (often an application that
     uses a GUI) from a server. Each instance of the client
     software can send requests to a server.



• Specific Types of servers include:
     • application servers
     • file servers
     • terminal servers
     • mail servers
3



   The Client Server Architecture
• Client/server is network architecture
   – Which separates a client (often an application that uses
     a GUI) from a server. Each instance of the client
     software can send requests to a server.
   –
   – Specific Types of servers include:
      • application servers
      • file servers
      • terminal servers
      • mail servers

   – Properties of a server:
      • Passive (Slave)
      • Waiting for requests
      • On requests serves them and send a reply
4




• Properties of a client:
  – Active (Master)
  – Sending requests
  – Waits until reply arrives
• A popular client in widespread use today is
  the web browser which communicates with
  web servers over the internet to fetch and
  display web page content.
5
                                                              5

       EXTENDING BROWSER
• The designer of a particular browser may not be able to
  sustain the development effort required to support all of the
  possible document formats that the browser might be used
  to view
• In the case of proprietary document formats (e.g., Adobe
  PDF, Real Audio and others), the owners of a format may
  not want to expose its encoding.
• To accommodate these requirements, browsers typically
  incorporate features that allow new functionality to be
  added to them without recompilation. We say that
  applications that can be extended in this manner are
  extensible
  (Helper Applications, Plug-ins and Java Applets)
6
                                                               6


       HELPER APPLICATIONS
• The response to a HTTP request contains MIME headers
  describing the type of document being fetched.
• We simulate the effect of getting the headers we would see
  when fetching the URL
  http://eftmk.kutkm.edu.my/bits2513/lectures/Lecture7.pdf
   – The Content-Type of the document is application/pdf
• A browser can use this type to index into a table and locate
  a helper application that can be used to display the
  contents of the document. This table can be configured by
  the user to associate helper applications with MIME types.
• This provides a simple mechanism that allows the browser
  functionality to be extended by allowing it to invoke external
  applications (Adobe Reader) to display documents.
7
                                                                      7


                         PLUGIN
• A plugin is a piece of code that can be loaded into same
  address space as the browser process.
• Because plugins run in the same address space as the
  browser, they have to be carefully constructed. A faulty
  plugin could corrupt some of the browser’s internal data
  structures. In general, writing plugins requires a great deal
  of care.
• To use plugins, the browser configured with:
   – The pathname of a directory that contains he available plugins
   – A table that describes which plugins to use with which MIME types.
8

   Understanding How Clients and
          Servers Interact
• Client/server is a computational architecture that involves
  client processes requesting service from server processes

• A server can be software application that provides a
  service to other software or the computer on which the
  server software is running.

• A server (software application) must be installed and
  managed by someone with the title of system
  administrator, network administrator or for Web servers-
  Webmaster.
9



               All-in-One Clients
• As the number of applications that use the Internet
  grows, the need for client software on computers to use
  these applications also arises.
• One solution to the growing number of Internet
  applications is an all-in-one client or universal client.
   – can handle several applications and adjust appropriately
   – changing buttons and functions to accommodate each
     application.
• Microsoft Internet Explorer is a good example of an all-
  in-one client.
10




Client            Client
host              host




         Server
         host
11

   Client/Server Applications

Some of the most popular applications on the Internet
follow the client/server design:

– Email clients
– FTP (File transfer) clients
– Web browsers
12




                              “I want to
                              collaborate
                               with my
 “I want to access            colleague”
some information”

                     Client

                                            Server   Peer-to-peer




                      Client/server
13

                  Distinctions

• Client-server
  – Asymmetric relationship
  – Client predominately makes requests, server
    makes replies
• Peer-to-peer
  – Symmetric relationship
14



        Client/Server Sessions
• As shown in Figure 7.1,
  TCP (Transmission
  Control Protocol)
  manages the three-way
  handshake that
  establishes a session to
  be used by application
  protocols, such as HTTP
  or FTP.
15


• Like most application programs, a client and a server use a transport
  protocol to communicate.
• Figure 7.2 illustrates a client and a server using the TCP/IP protocol
  stack.




                  Figure 7.2: A client and a server
16
• The client and server each interact with a protocol in the transport
  layer of the stack. A sufficiently powerful computer can run multiple
  servers and clients at the same time. Such a computer must have
  the necessary hardware resources (e.g. a fast CPU and sufficient
  memory) and have an operating system capable of running multiple
  applications concurrently (e.g. UNIX or Windows).

Figure 7.3 illustrates such a setup.




 • The computer in the middle might be running an FTP server and a
 WWW server. Modern computers are often capable of running many
 servers at the same time.
17



            Tiered Architecture
• Two-tier architecture:
   – A generic Client/Server architecture has two types of
     nodes on the network: clients and servers.

• Problems with a two-tier system:
   – Because the relative power of clients has grown
     considerably, we could shift processing to the client,
     but then maintaining data integrity is difficult
18



                 Three-tier client/server
                        Local-area network
                                             Application
                                             logic




Presentation

Note: many clients per              Shared
application server, several         data
application servers per data
server
19
                                       19


3-TIER ARCHITECTURE
   C lient tie r




   M id dle tier      App lic a tion




 Inform ation tie r
                      Da ta ba se
20




      3-TIER ARCHITECTURE
• Information tier
   – Referred to as data tier or bottom tier
   – Maintains data for application
   – Stores data in relational database management system
• Middle tier
   – Implements business logic and presentation logic
   – Controls interactions between application clients and
     application data
   – Acts as intermediary between data in information tier
     and application clients
21



       3-TIER ARCHITECTURE
• Client tier
   – Referred to as top tier
   – Application’s user interface
   – Users interact with application through user interface
   – Interacts with middle tier to make requests and to
     retrieve data from information tier
   – Displays data to user
22



                    Servers
•   Web Server
•   DNS Server
•   DHCP Server
•   WINS Server
•   RAS Server
•   Printer Server
•   Domain Controller Server
23

          Web Server (cont)
• Running program
• Stores set of Web documents
• Responds to request from browser by sending
  copy of document
24



      Basic Common Features
A Web server programs may differ in detail among them,
But they all share some basic common features:

• HTTP responses to HTTP requests:
   – every Web server program operates by accepting HTTP requests from
     the network and providing an HTTP response to the requester.
   – The HTTP response typically consists of an HTML document, but can
     also be a raw text file, an image, or some other type of document.
   – if something bad is found in client request or while trying to serve the
     request,
       • a Web server has to send an error response which may include some
         custom HTML or text messages to better explain the problem to end users.
• Logging:
   – usually Web servers have also the capability of logging some detailed
     information about client requests and server responses to log files.
   – this allows the Webmaster to collect statistics by running log analyzers
     on log files.
25


                               Extra features
•   Configurability of available features by configuration files or even by an external
    user interface.

•   Authentication - optional authorization request (request of user name and
    password) before allowing access to some or all kind of resources.

•   Handling of static content and dynamic content

•   Module support, in order to allow the extension of server capabilities by adding or
    modifying software modules which are linked to the server software or that are
    dynamically loaded (on demand) by the core server.

•   HTTPS - support (by SSL or TLS) in order to allow secure (encrypted) connections to
    the server on the standard port 443 instead of usual port 80.
•   Content compression (i.e. by gzip encoding) to reduce the size of the responses (to
    lower bandwidth usage, etc.).

•   Virtual Host to serve many web sites using one IP address

•   Large file support to be able to serve files whose size is greater than 2 GB on 32 bit
    OS

•   Bandwidth throttling - limit the speed of responses in order to not saturate the
    network and to be able to serve more clients.
26

    Exploring the Features and
    Functions of Web Servers
Some popular Web servers which it is free for download
include the following:

– Apache Web Server

– Microsoft Internet Information Services (IIS)

– Tomcat

– Netscape Enterprise Server (NES)
27

  Ability to Support Virtual Servers
           and Virtual Hosts
• A Web server should be able to support virtual servers
  and virtual hosting.

• Most virtual hosts handle multiple domain names on the
  same server by having the Uniform Resource Locator
  (URL) serve as a path to a file.

• Figure 7.5 illustrates the difference between virtual
  servers and virtual hosting.
28

Ability to Support Virtual Servers
 and Virtual Hosts (Continued)
29



          Access Control Method
Based on the user’s IP address or user ID
1.   access control allows the Web server to limit to which
     files a user can read or write. User Ids are associated
     with passwords to verify a user’s identity.
2.   It can changing the port at which a server is listening.
     –   Port 80 is the default port for Web servers.
     –   Apache Web Server controls access to its
         resources via a process known as authentication,
         which requires a user to enter a valid user ID and
         password to access a Web site.
30



Access Control (Continued)
31



          Encrypting Protocols
• A secure protocol used by Web servers is SSL (Secure
  Sockets Layer).


• When you see a URL with https: at the beginning instead
  of http:, you know that this Web server is using the SSL
  protocol for security.
32



           Database Interfaces
• Before selecting a Web server or a virtual hosting
  service, find out what databases the server supports and
  what tools can exchange information with the database.


• Popular databases are MS Access, MySQL, Oracle, and
  SQL Server.
33



  Ability to Monitor Performance
• Microsoft IIS uses Performance Monitor, a program that
  comes with Windows Server 2003 and Windows 2000
  Server, to monitor performance.


• Other utility programs are Microsoft Web Capacity
  Analysis Tool (WCAT) and Server Check Pro by
  NetMechanic.
34



         Web Server Protocols
• HTTP and TCP/IP are the two main protocols used with
  Web servers.

• HTTP methods used for browser requests are GET,
  POST, HEAD, PUT, and DELETE.

• The most frequently used method is GET, which
  requests files from the Web server.

• A dialog is a series of commands from the sender to the
  receiver and replies from the receiver to the sender.
35




COMMON HTTP REQUEST TYPES
• Also known as request methods
• Most popular are get and post
   – Retrieve and send client form data to Web server
   – get request
      • Sends form content as part of URL
      • Retrieves appropriate resource from Web server
      • Limits query to 1024 characters
   – post request
      • Updates contents of Web server (posting new messages to
        forum)
      • Has no limit for length of query
      • Not part of URL and cannot be seen by user
36



                       IIS
• Internet Information Services is a set of
  Internet-based services for servers using
  Microsoft Windows.

• It is the world's second most popular web server
  in terms of overall websites behind the Apache
  HTTP Server

• The servers currently include FTP, SMTP, NNTP
  and HTTP/HTTPS.

More Related Content

What's hot

ScalabilityAvailability
ScalabilityAvailabilityScalabilityAvailability
ScalabilityAvailability
webuploader
 
Codero Managed Hosting
Codero Managed HostingCodero Managed Hosting
Codero Managed Hosting
Codero
 
Client Server Architecture
Client Server ArchitectureClient Server Architecture
Client Server Architecture
suks_87
 
Messaging With Apache ActiveMQ
Messaging With Apache ActiveMQMessaging With Apache ActiveMQ
Messaging With Apache ActiveMQ
Bruce Snyder
 
Enterprise Messaging With ActiveMQ and Spring JMS
Enterprise Messaging With ActiveMQ and Spring JMSEnterprise Messaging With ActiveMQ and Spring JMS
Enterprise Messaging With ActiveMQ and Spring JMS
Bruce Snyder
 

What's hot (20)

Introduction to NServiceBus
Introduction to NServiceBusIntroduction to NServiceBus
Introduction to NServiceBus
 
What to consider when monitoring microservices
What to consider when monitoring microservicesWhat to consider when monitoring microservices
What to consider when monitoring microservices
 
Client server technology
Client server technologyClient server technology
Client server technology
 
Chef conf-2015-chef-patterns-at-bloomberg-scale
Chef conf-2015-chef-patterns-at-bloomberg-scaleChef conf-2015-chef-patterns-at-bloomberg-scale
Chef conf-2015-chef-patterns-at-bloomberg-scale
 
Scalable Web Architecture and Distributed Systems
Scalable Web Architecture and Distributed SystemsScalable Web Architecture and Distributed Systems
Scalable Web Architecture and Distributed Systems
 
Do we need JMS in 21st century?
Do we need JMS in 21st century?Do we need JMS in 21st century?
Do we need JMS in 21st century?
 
ScalabilityAvailability
ScalabilityAvailabilityScalabilityAvailability
ScalabilityAvailability
 
XMPP Academy #1
XMPP Academy #1XMPP Academy #1
XMPP Academy #1
 
NServiceBus - building a distributed system based on a messaging infrastructure
NServiceBus - building a distributed system based on a messaging infrastructureNServiceBus - building a distributed system based on a messaging infrastructure
NServiceBus - building a distributed system based on a messaging infrastructure
 
Coolie @ call
Coolie @ callCoolie @ call
Coolie @ call
 
Writing Scalable Software in Java
Writing Scalable Software in JavaWriting Scalable Software in Java
Writing Scalable Software in Java
 
Choosing the right high availability strategy
Choosing the right high availability strategyChoosing the right high availability strategy
Choosing the right high availability strategy
 
client server protocol
client server protocolclient server protocol
client server protocol
 
8 application servers_v2
8 application servers_v28 application servers_v2
8 application servers_v2
 
Codero Managed Hosting
Codero Managed HostingCodero Managed Hosting
Codero Managed Hosting
 
IBM MQ Disaster Recovery
IBM MQ Disaster RecoveryIBM MQ Disaster Recovery
IBM MQ Disaster Recovery
 
Client Server Architecture
Client Server ArchitectureClient Server Architecture
Client Server Architecture
 
Messaging With Apache ActiveMQ
Messaging With Apache ActiveMQMessaging With Apache ActiveMQ
Messaging With Apache ActiveMQ
 
Enterprise Messaging With ActiveMQ and Spring JMS
Enterprise Messaging With ActiveMQ and Spring JMSEnterprise Messaging With ActiveMQ and Spring JMS
Enterprise Messaging With ActiveMQ and Spring JMS
 
A Comprehensive Guide for DNS Cluster Configurations
A Comprehensive Guide for DNS Cluster ConfigurationsA Comprehensive Guide for DNS Cluster Configurations
A Comprehensive Guide for DNS Cluster Configurations
 

Viewers also liked

Windows 8 Consumer Preview
Windows 8 Consumer PreviewWindows 8 Consumer Preview
Windows 8 Consumer Preview
Rence Montanes
 
Computer Network
Computer NetworkComputer Network
Computer Network
eShikshak
 
Network Client Server
Network Client ServerNetwork Client Server
Network Client Server
eShikshak
 
Cilent to server network plan
Cilent to server network planCilent to server network plan
Cilent to server network plan
Ricky Asher
 
Networking and Computer Troubleshooting
Networking and Computer TroubleshootingNetworking and Computer Troubleshooting
Networking and Computer Troubleshooting
Rence Montanes
 
Career paths in information technology
Career paths in information technologyCareer paths in information technology
Career paths in information technology
Rence Montanes
 
Client Server Architecture
Client Server ArchitectureClient Server Architecture
Client Server Architecture
Rence Montanes
 

Viewers also liked (15)

서버 성능에 대한 정의와 이해
서버 성능에 대한 정의와 이해서버 성능에 대한 정의와 이해
서버 성능에 대한 정의와 이해
 
Windows 8 Consumer Preview
Windows 8 Consumer PreviewWindows 8 Consumer Preview
Windows 8 Consumer Preview
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Network Client Server
Network Client ServerNetwork Client Server
Network Client Server
 
Cilent to server network plan
Cilent to server network planCilent to server network plan
Cilent to server network plan
 
Networking and Computer Troubleshooting
Networking and Computer TroubleshootingNetworking and Computer Troubleshooting
Networking and Computer Troubleshooting
 
Career paths in information technology
Career paths in information technologyCareer paths in information technology
Career paths in information technology
 
Client Server Network By Usman Ihsan
Client Server Network By Usman IhsanClient Server Network By Usman Ihsan
Client Server Network By Usman Ihsan
 
04 Client Server Technology
04 Client Server Technology04 Client Server Technology
04 Client Server Technology
 
Client Server Architecture
Client Server ArchitectureClient Server Architecture
Client Server Architecture
 
Client Server Architecture
Client Server ArchitectureClient Server Architecture
Client Server Architecture
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
 
CBSE XII Communication And Network Concepts
CBSE XII Communication And Network ConceptsCBSE XII Communication And Network Concepts
CBSE XII Communication And Network Concepts
 
Client server technology main
Client server technology mainClient server technology main
Client server technology main
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 

Similar to Lecture 11 client_server_interaction

Part 1 network computing
Part 1 network computingPart 1 network computing
Part 1 network computing
Linh Nguyen
 
Peoplesoft PIA architecture
Peoplesoft PIA architecturePeoplesoft PIA architecture
Peoplesoft PIA architecture
Amit rai Raaz
 
WEB-DBMS A quick reference
WEB-DBMS A quick referenceWEB-DBMS A quick reference
WEB-DBMS A quick reference
Marc Dy
 
Introduction to the client server computing By Attaullah Hazrat
Introduction to the client server computing By Attaullah HazratIntroduction to the client server computing By Attaullah Hazrat
Introduction to the client server computing By Attaullah Hazrat
Attaullah Hazrat
 

Similar to Lecture 11 client_server_interaction (20)

Web-Server & It's Architecture.pptx
Web-Server & It's Architecture.pptxWeb-Server & It's Architecture.pptx
Web-Server & It's Architecture.pptx
 
Part 1 network computing
Part 1 network computingPart 1 network computing
Part 1 network computing
 
Introduction and Basics to web technology .pptx
Introduction and Basics to web technology .pptxIntroduction and Basics to web technology .pptx
Introduction and Basics to web technology .pptx
 
server-131210061249-phpapp02.pdf
server-131210061249-phpapp02.pdfserver-131210061249-phpapp02.pdf
server-131210061249-phpapp02.pdf
 
Basic Server PPT (THDC)
Basic Server PPT (THDC)Basic Server PPT (THDC)
Basic Server PPT (THDC)
 
Server its functions and types.pptx
Server its functions and types.pptxServer its functions and types.pptx
Server its functions and types.pptx
 
Module notes artificial intelligence and
Module notes artificial intelligence andModule notes artificial intelligence and
Module notes artificial intelligence and
 
Clients and Servers.ppt
Clients and Servers.pptClients and Servers.ppt
Clients and Servers.ppt
 
Modern API's.pptx
Modern API's.pptxModern API's.pptx
Modern API's.pptx
 
Web Fendamentals
Web FendamentalsWeb Fendamentals
Web Fendamentals
 
Peoplesoft PIA architecture
Peoplesoft PIA architecturePeoplesoft PIA architecture
Peoplesoft PIA architecture
 
Ch2_Ed7_Network_Applications.ppt
Ch2_Ed7_Network_Applications.pptCh2_Ed7_Network_Applications.ppt
Ch2_Ed7_Network_Applications.ppt
 
WEB-DBMS A quick reference
WEB-DBMS A quick referenceWEB-DBMS A quick reference
WEB-DBMS A quick reference
 
1-1.pdf
1-1.pdf1-1.pdf
1-1.pdf
 
4. system models
4. system models4. system models
4. system models
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
 
Data center proposal
Data center proposalData center proposal
Data center proposal
 
Cloud description
Cloud descriptionCloud description
Cloud description
 
C/S archtecture including basic networking
C/S archtecture including basic networkingC/S archtecture including basic networking
C/S archtecture including basic networking
 
Introduction to the client server computing By Attaullah Hazrat
Introduction to the client server computing By Attaullah HazratIntroduction to the client server computing By Attaullah Hazrat
Introduction to the client server computing By Attaullah Hazrat
 

More from Serious_SamSoul (11)

Lecture 13 -_e-commmerce_e-banking_and_advanced_tech
Lecture 13 -_e-commmerce_e-banking_and_advanced_techLecture 13 -_e-commmerce_e-banking_and_advanced_tech
Lecture 13 -_e-commmerce_e-banking_and_advanced_tech
 
Lecture 12 -_internet_security
Lecture 12 -_internet_securityLecture 12 -_internet_security
Lecture 12 -_internet_security
 
Lecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferLecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transfer
 
Lecture 7 -_ftp,_tftp,_telnet_and_ssh
Lecture 7 -_ftp,_tftp,_telnet_and_sshLecture 7 -_ftp,_tftp,_telnet_and_ssh
Lecture 7 -_ftp,_tftp,_telnet_and_ssh
 
Lecture 6 -_presentation_layer
Lecture 6 -_presentation_layerLecture 6 -_presentation_layer
Lecture 6 -_presentation_layer
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignments
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011
 
Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notes
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Lecture 11 client_server_interaction

  • 1. 1 Chapter 9: Clients and Servers Interactions
  • 2. 2 The Client Server Architecture • Is a network architecture – Which separates a client (often an application that uses a GUI) from a server. Each instance of the client software can send requests to a server. • Specific Types of servers include: • application servers • file servers • terminal servers • mail servers
  • 3. 3 The Client Server Architecture • Client/server is network architecture – Which separates a client (often an application that uses a GUI) from a server. Each instance of the client software can send requests to a server. – – Specific Types of servers include: • application servers • file servers • terminal servers • mail servers – Properties of a server: • Passive (Slave) • Waiting for requests • On requests serves them and send a reply
  • 4. 4 • Properties of a client: – Active (Master) – Sending requests – Waits until reply arrives • A popular client in widespread use today is the web browser which communicates with web servers over the internet to fetch and display web page content.
  • 5. 5 5 EXTENDING BROWSER • The designer of a particular browser may not be able to sustain the development effort required to support all of the possible document formats that the browser might be used to view • In the case of proprietary document formats (e.g., Adobe PDF, Real Audio and others), the owners of a format may not want to expose its encoding. • To accommodate these requirements, browsers typically incorporate features that allow new functionality to be added to them without recompilation. We say that applications that can be extended in this manner are extensible (Helper Applications, Plug-ins and Java Applets)
  • 6. 6 6 HELPER APPLICATIONS • The response to a HTTP request contains MIME headers describing the type of document being fetched. • We simulate the effect of getting the headers we would see when fetching the URL http://eftmk.kutkm.edu.my/bits2513/lectures/Lecture7.pdf – The Content-Type of the document is application/pdf • A browser can use this type to index into a table and locate a helper application that can be used to display the contents of the document. This table can be configured by the user to associate helper applications with MIME types. • This provides a simple mechanism that allows the browser functionality to be extended by allowing it to invoke external applications (Adobe Reader) to display documents.
  • 7. 7 7 PLUGIN • A plugin is a piece of code that can be loaded into same address space as the browser process. • Because plugins run in the same address space as the browser, they have to be carefully constructed. A faulty plugin could corrupt some of the browser’s internal data structures. In general, writing plugins requires a great deal of care. • To use plugins, the browser configured with: – The pathname of a directory that contains he available plugins – A table that describes which plugins to use with which MIME types.
  • 8. 8 Understanding How Clients and Servers Interact • Client/server is a computational architecture that involves client processes requesting service from server processes • A server can be software application that provides a service to other software or the computer on which the server software is running. • A server (software application) must be installed and managed by someone with the title of system administrator, network administrator or for Web servers- Webmaster.
  • 9. 9 All-in-One Clients • As the number of applications that use the Internet grows, the need for client software on computers to use these applications also arises. • One solution to the growing number of Internet applications is an all-in-one client or universal client. – can handle several applications and adjust appropriately – changing buttons and functions to accommodate each application. • Microsoft Internet Explorer is a good example of an all- in-one client.
  • 10. 10 Client Client host host Server host
  • 11. 11 Client/Server Applications Some of the most popular applications on the Internet follow the client/server design: – Email clients – FTP (File transfer) clients – Web browsers
  • 12. 12 “I want to collaborate with my “I want to access colleague” some information” Client Server Peer-to-peer Client/server
  • 13. 13 Distinctions • Client-server – Asymmetric relationship – Client predominately makes requests, server makes replies • Peer-to-peer – Symmetric relationship
  • 14. 14 Client/Server Sessions • As shown in Figure 7.1, TCP (Transmission Control Protocol) manages the three-way handshake that establishes a session to be used by application protocols, such as HTTP or FTP.
  • 15. 15 • Like most application programs, a client and a server use a transport protocol to communicate. • Figure 7.2 illustrates a client and a server using the TCP/IP protocol stack. Figure 7.2: A client and a server
  • 16. 16 • The client and server each interact with a protocol in the transport layer of the stack. A sufficiently powerful computer can run multiple servers and clients at the same time. Such a computer must have the necessary hardware resources (e.g. a fast CPU and sufficient memory) and have an operating system capable of running multiple applications concurrently (e.g. UNIX or Windows). Figure 7.3 illustrates such a setup. • The computer in the middle might be running an FTP server and a WWW server. Modern computers are often capable of running many servers at the same time.
  • 17. 17 Tiered Architecture • Two-tier architecture: – A generic Client/Server architecture has two types of nodes on the network: clients and servers. • Problems with a two-tier system: – Because the relative power of clients has grown considerably, we could shift processing to the client, but then maintaining data integrity is difficult
  • 18. 18 Three-tier client/server Local-area network Application logic Presentation Note: many clients per Shared application server, several data application servers per data server
  • 19. 19 19 3-TIER ARCHITECTURE C lient tie r M id dle tier App lic a tion Inform ation tie r Da ta ba se
  • 20. 20 3-TIER ARCHITECTURE • Information tier – Referred to as data tier or bottom tier – Maintains data for application – Stores data in relational database management system • Middle tier – Implements business logic and presentation logic – Controls interactions between application clients and application data – Acts as intermediary between data in information tier and application clients
  • 21. 21 3-TIER ARCHITECTURE • Client tier – Referred to as top tier – Application’s user interface – Users interact with application through user interface – Interacts with middle tier to make requests and to retrieve data from information tier – Displays data to user
  • 22. 22 Servers • Web Server • DNS Server • DHCP Server • WINS Server • RAS Server • Printer Server • Domain Controller Server
  • 23. 23 Web Server (cont) • Running program • Stores set of Web documents • Responds to request from browser by sending copy of document
  • 24. 24 Basic Common Features A Web server programs may differ in detail among them, But they all share some basic common features: • HTTP responses to HTTP requests: – every Web server program operates by accepting HTTP requests from the network and providing an HTTP response to the requester. – The HTTP response typically consists of an HTML document, but can also be a raw text file, an image, or some other type of document. – if something bad is found in client request or while trying to serve the request, • a Web server has to send an error response which may include some custom HTML or text messages to better explain the problem to end users. • Logging: – usually Web servers have also the capability of logging some detailed information about client requests and server responses to log files. – this allows the Webmaster to collect statistics by running log analyzers on log files.
  • 25. 25 Extra features • Configurability of available features by configuration files or even by an external user interface. • Authentication - optional authorization request (request of user name and password) before allowing access to some or all kind of resources. • Handling of static content and dynamic content • Module support, in order to allow the extension of server capabilities by adding or modifying software modules which are linked to the server software or that are dynamically loaded (on demand) by the core server. • HTTPS - support (by SSL or TLS) in order to allow secure (encrypted) connections to the server on the standard port 443 instead of usual port 80. • Content compression (i.e. by gzip encoding) to reduce the size of the responses (to lower bandwidth usage, etc.). • Virtual Host to serve many web sites using one IP address • Large file support to be able to serve files whose size is greater than 2 GB on 32 bit OS • Bandwidth throttling - limit the speed of responses in order to not saturate the network and to be able to serve more clients.
  • 26. 26 Exploring the Features and Functions of Web Servers Some popular Web servers which it is free for download include the following: – Apache Web Server – Microsoft Internet Information Services (IIS) – Tomcat – Netscape Enterprise Server (NES)
  • 27. 27 Ability to Support Virtual Servers and Virtual Hosts • A Web server should be able to support virtual servers and virtual hosting. • Most virtual hosts handle multiple domain names on the same server by having the Uniform Resource Locator (URL) serve as a path to a file. • Figure 7.5 illustrates the difference between virtual servers and virtual hosting.
  • 28. 28 Ability to Support Virtual Servers and Virtual Hosts (Continued)
  • 29. 29 Access Control Method Based on the user’s IP address or user ID 1. access control allows the Web server to limit to which files a user can read or write. User Ids are associated with passwords to verify a user’s identity. 2. It can changing the port at which a server is listening. – Port 80 is the default port for Web servers. – Apache Web Server controls access to its resources via a process known as authentication, which requires a user to enter a valid user ID and password to access a Web site.
  • 31. 31 Encrypting Protocols • A secure protocol used by Web servers is SSL (Secure Sockets Layer). • When you see a URL with https: at the beginning instead of http:, you know that this Web server is using the SSL protocol for security.
  • 32. 32 Database Interfaces • Before selecting a Web server or a virtual hosting service, find out what databases the server supports and what tools can exchange information with the database. • Popular databases are MS Access, MySQL, Oracle, and SQL Server.
  • 33. 33 Ability to Monitor Performance • Microsoft IIS uses Performance Monitor, a program that comes with Windows Server 2003 and Windows 2000 Server, to monitor performance. • Other utility programs are Microsoft Web Capacity Analysis Tool (WCAT) and Server Check Pro by NetMechanic.
  • 34. 34 Web Server Protocols • HTTP and TCP/IP are the two main protocols used with Web servers. • HTTP methods used for browser requests are GET, POST, HEAD, PUT, and DELETE. • The most frequently used method is GET, which requests files from the Web server. • A dialog is a series of commands from the sender to the receiver and replies from the receiver to the sender.
  • 35. 35 COMMON HTTP REQUEST TYPES • Also known as request methods • Most popular are get and post – Retrieve and send client form data to Web server – get request • Sends form content as part of URL • Retrieves appropriate resource from Web server • Limits query to 1024 characters – post request • Updates contents of Web server (posting new messages to forum) • Has no limit for length of query • Not part of URL and cannot be seen by user
  • 36. 36 IIS • Internet Information Services is a set of Internet-based services for servers using Microsoft Windows. • It is the world's second most popular web server in terms of overall websites behind the Apache HTTP Server • The servers currently include FTP, SMTP, NNTP and HTTP/HTTPS.