SlideShare a Scribd company logo
1 of 21
EVOLUTION OF COMPUTING ARCHITECTURES 
Aim: To discuss the evolution of client server 
architecture for various computing models. 
There are three system architectures, 
1. Centralized system 
2. File Server Architecture 
3. Client server system
CENTRALIZED SYSTEM ARCHITECTURE 
Companies that needed real computing 
power turned to the mainframe computer, 
which is a centralized system architecture. 
Salient feature: Only movement of 
marshalling are the keystrokes between the 
client and the host machine. 
Marshalling is the process of packaging 
interface elements and sending them across process 
boundaries.
In Centralized System, keystrokes are marshalled 
from the terminal to the host. 
Network Server 
DATA 
Terminal 1 Terminal 2 Terminal 3 Terminal 4
Merits 
 Excellent security 
 Centralized administration as both application 
logic and data reside on the same machine 
Demerits 
 Expensive to buy, lease, maintain and use. 
 Both the application and the database are housed 
within the same machine process thereby offering no 
way to truly partition the application logic beyond the 
physical of the mainframe.
FILE SERVER ARCHITECTURE 
• This brought a complete change in the 
implementation of the computer architecture 
• In this system, the application logic was 
executed on the client workstation instead of 
the server. 
• These servers provide access to computing 
resources like printers and large hard drives
File server architecture 
Disk I/O Requests 
Disk Blocks 
DATA 
Network Server 
Workstation 1 Workstation 2 Workstation 3 Workstation 4 
Application 
Logic 1 
Application 
Logic 4 
Application 
Logic 3 
Application 
Logic 2
MERITS: 
It has the low cost entry point with flexible 
arrangement 
Computer resources can be added or 
reduced as and when necessary using this 
system. 
DEMERITS: 
All application logic is executed on the 
client machine. This results in the client 
machine’s need for a large amount of power 
to run the application.
CLIENT SERVER MODEL 
This is a process involving a minimum of 
two independent entities, one is the client and 
the other is the server. 
The client makes a request to the server 
and the server services the requests and the 
resulting data is sent to the client. 
In this application, two separate applications 
operating independently could work together 
to complete a task.
SQL (Structured Query Language based Database 
Management System)is the implementation of this 
concept. 
Disk I/O 
Requests 
Disk 
DATA 
Network Server 
Workstation 1 Workstation 2 Workstation 3 Workstation 4 
Application 
Logic 
Application 
Logic 
Application 
Logic 
Application 
Logic 
Application 
logic
The most popular client server applications 
revolve round the use of DBMS such as Oracle 
and Microsoft SQL server. These applications 
are referred to as back-ends and offer support 
for storage, manipulation and retrieval of 
business persistent data. They use SQL as a 
standard method for submitting client 
requests. 
The significance of distributing the 
application logic between the client and 
server offers a faster and more cost-effective 
performance.
File Server v/s Client Server Database 
Deployment 
With the advent and popularity of 
Microsoft Access using the Microsoft 
Database file(MDB) to store data, this is not 
a client server implementation but a file 
server implementation.
CASE STUDY 
Assume that we have a set of data stored 
in an MDB file namely Student_Info.mdb. This 
file holds the details of the marks scored in 
different subjects by students. A client want to 
know as how many students scored 100% in 
more than two subjects. 
A query is sent to obtain the results.
Query Sent to a File Server System 
• In this case, the query is not sent to the server. 
• The logic of the query is processed and 
evaluated at the client end itself. 
• The query logic realizes that it needs to access a 
table namely Student_Info in the MDB in order 
to process the request. 
• No logic is executed at the server end except the 
transferring of file disk blocks.
Query Sent to a Client Server System 
• Here the actual SQL statement is sent across the 
network and processed by an application running 
locally on the server machine 
• As the SQL statements is processed on the server, 
only the results need to be sent back to the client. 
• Advantage: Reduced network traffic and an 
incredibly quick execution time. 
To meet the challenges presented by a 
business environment, a new three-tier or n-tier 
client server approach has been introduced
Two-Tier Client Server Model 
• In this mode, a desktop machine operates as a 
client and a network server functions as a back-end 
database engine. 
• The logic in a two-tier model is split between the 
two physical locations namely the server and the 
client. 
• In Visual Basic, using any of the data controls 
that provide a graphical link to the back-end 
data source creates a two-tier client server 
relationship.
Limitations of Two-Tier Client Server 
Model 
• Not Scalable Inability of a two-tier approach to 
grow beyond the physical boundaries of a client 
and server machine 
• Unmanageable Business rules cannot be 
encapsulated and deployed centrally because of 
which sharing common processes and re-using 
work becomes difficult 
• Poor Performance The graphical interface 
binding to the data consumes major resources 
on the client machine which results in poor 
performance and dissatisfied clients.
Three-Tier Client Server Model 
• This model is based on the ability to build 
partitioned applications. 
• Partitioning an application breaks the code 
into logical components. 
• Each tier is called a service. These services are 
shared between that client and the servers. 
• The components can be logically grouped into 
three tiers: user services, business services and 
data services.
Service Location 
User Services Client 
Business logic Server 
Data Services Server 
The three-tier logic can be extended to 
any number of tiers/services known as Multi- 
Tier or n-tier architecture.
Values of the Three-Tier Client Server 
Development 
• Reuse The time invested in designing and 
implementing components is not wasted as they 
can be shared among applications. 
• Performance As components can be placed on 
machines other than the client workstation, load 
processing can be shifted from a client machine 
that may be underpowered to a server with extra 
horsepower. This offers the user best possible 
methods for each aspect of an application’s 
execution, resulting in better performance.
• Manageability Encapsulation of application’s 
services into components allows the user to 
break down large, complex application’s into 
more manageable parts. 
• Maintenance Centralizing components for 
reuse has an added benefit. They become 
easier to redeploy after any amendments are 
made in the order to keep pace with business 
needs.

More Related Content

What's hot

Abstract class
Abstract classAbstract class
Abstract class
Tony Nguyen
 
Sdi & mdi
Sdi & mdiSdi & mdi
Sdi & mdi
BABAVALI S
 
trigger dbms
trigger dbmstrigger dbms
trigger dbms
kuldeep100
 
Looping statements in Java
Looping statements in JavaLooping statements in Java
Looping statements in Java
Jin Castor
 

What's hot (20)

Oops concept on c#
Oops concept on c#Oops concept on c#
Oops concept on c#
 
Python: Multiple Inheritance
Python: Multiple InheritancePython: Multiple Inheritance
Python: Multiple Inheritance
 
Constructor and Types of Constructors
Constructor and Types of ConstructorsConstructor and Types of Constructors
Constructor and Types of Constructors
 
Abstract class and Interface
Abstract class and InterfaceAbstract class and Interface
Abstract class and Interface
 
Applets in java
Applets in javaApplets in java
Applets in java
 
Python Flow Control
Python Flow ControlPython Flow Control
Python Flow Control
 
Advanced Programming C++
Advanced Programming C++Advanced Programming C++
Advanced Programming C++
 
Abstract class
Abstract classAbstract class
Abstract class
 
Sdi & mdi
Sdi & mdiSdi & mdi
Sdi & mdi
 
Objects and classes in Visual Basic
Objects and classes in Visual BasicObjects and classes in Visual Basic
Objects and classes in Visual Basic
 
Transaction states and properties
Transaction states and propertiesTransaction states and properties
Transaction states and properties
 
Command line-arguments-in-java-tutorial
Command line-arguments-in-java-tutorialCommand line-arguments-in-java-tutorial
Command line-arguments-in-java-tutorial
 
trigger dbms
trigger dbmstrigger dbms
trigger dbms
 
Looping statements in Java
Looping statements in JavaLooping statements in Java
Looping statements in Java
 
DATABASE MANAGEMENT SYSTEM LAB.pdf
DATABASE MANAGEMENT SYSTEM LAB.pdfDATABASE MANAGEMENT SYSTEM LAB.pdf
DATABASE MANAGEMENT SYSTEM LAB.pdf
 
sql function(ppt)
sql function(ppt)sql function(ppt)
sql function(ppt)
 
Object-oriented concepts
Object-oriented conceptsObject-oriented concepts
Object-oriented concepts
 
CONTROL STRUCTURE IN VB
CONTROL STRUCTURE IN VBCONTROL STRUCTURE IN VB
CONTROL STRUCTURE IN VB
 
DBMS: Types of keys
DBMS:  Types of keysDBMS:  Types of keys
DBMS: Types of keys
 
Integrity constraints in dbms
Integrity constraints in dbmsIntegrity constraints in dbms
Integrity constraints in dbms
 

Similar to Odbc and data access objects

Client computing evolution ppt11
Client computing evolution ppt11Client computing evolution ppt11
Client computing evolution ppt11
Tech_MX
 
Technical Architectures
Technical ArchitecturesTechnical Architectures
Technical Architectures
Damian T. Gordon
 
Client server computing
Client server computingClient server computing
Client server computing
StudsPlanet.com
 
Client server computing
Client server computingClient server computing
Client server computing
jorge cabiao
 
Client Server Architecture
Client Server ArchitectureClient Server Architecture
Client Server Architecture
suks_87
 
enterprisejavaunit-1chapter-2-210914075956.pdf
enterprisejavaunit-1chapter-2-210914075956.pdfenterprisejavaunit-1chapter-2-210914075956.pdf
enterprisejavaunit-1chapter-2-210914075956.pdf
EidTahir
 

Similar to Odbc and data access objects (20)

Client computing evolution ppt11
Client computing evolution ppt11Client computing evolution ppt11
Client computing evolution ppt11
 
Technical Architectures
Technical ArchitecturesTechnical Architectures
Technical Architectures
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
 
Client server computing
Client server computingClient server computing
Client server computing
 
Introduction and Basics to web technology .pptx
Introduction and Basics to web technology .pptxIntroduction and Basics to web technology .pptx
Introduction and Basics to web technology .pptx
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
 
Ch2_Ed7_Network_Applications.ppt
Ch2_Ed7_Network_Applications.pptCh2_Ed7_Network_Applications.ppt
Ch2_Ed7_Network_Applications.ppt
 
Client server computing
Client server computingClient server computing
Client server computing
 
Clientserver
ClientserverClientserver
Clientserver
 
Client Server Architecture
Client Server ArchitectureClient Server Architecture
Client Server Architecture
 
UNIT3 DBMS.pptx operation nd management of data base
UNIT3 DBMS.pptx operation nd management of data baseUNIT3 DBMS.pptx operation nd management of data base
UNIT3 DBMS.pptx operation nd management of data base
 
Advanced database protocols
Advanced database protocolsAdvanced database protocols
Advanced database protocols
 
Slides ch-5-the definitive guide to cloud computing -by- dan sullivan
Slides  ch-5-the definitive guide to cloud computing -by- dan sullivanSlides  ch-5-the definitive guide to cloud computing -by- dan sullivan
Slides ch-5-the definitive guide to cloud computing -by- dan sullivan
 
SOFTWARE COMPUTING
SOFTWARE COMPUTINGSOFTWARE COMPUTING
SOFTWARE COMPUTING
 
Case Study For Replication For PCMS
Case Study For Replication For PCMSCase Study For Replication For PCMS
Case Study For Replication For PCMS
 
Client Server Architecture...pptx
Client Server Architecture...pptxClient Server Architecture...pptx
Client Server Architecture...pptx
 
Enterprise java unit-1_chapter-2
Enterprise java unit-1_chapter-2Enterprise java unit-1_chapter-2
Enterprise java unit-1_chapter-2
 
enterprisejavaunit-1chapter-2-210914075956.pdf
enterprisejavaunit-1chapter-2-210914075956.pdfenterprisejavaunit-1chapter-2-210914075956.pdf
enterprisejavaunit-1chapter-2-210914075956.pdf
 
client-server-architecture.ppt
client-server-architecture.pptclient-server-architecture.ppt
client-server-architecture.ppt
 
client-server-architecture ss.ppt
client-server-architecture ss.pptclient-server-architecture ss.ppt
client-server-architecture ss.ppt
 

Recently uploaded

Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Bert Jan Schrijver
 

Recently uploaded (20)

Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 

Odbc and data access objects

  • 1.
  • 2. EVOLUTION OF COMPUTING ARCHITECTURES Aim: To discuss the evolution of client server architecture for various computing models. There are three system architectures, 1. Centralized system 2. File Server Architecture 3. Client server system
  • 3. CENTRALIZED SYSTEM ARCHITECTURE Companies that needed real computing power turned to the mainframe computer, which is a centralized system architecture. Salient feature: Only movement of marshalling are the keystrokes between the client and the host machine. Marshalling is the process of packaging interface elements and sending them across process boundaries.
  • 4. In Centralized System, keystrokes are marshalled from the terminal to the host. Network Server DATA Terminal 1 Terminal 2 Terminal 3 Terminal 4
  • 5. Merits  Excellent security  Centralized administration as both application logic and data reside on the same machine Demerits  Expensive to buy, lease, maintain and use.  Both the application and the database are housed within the same machine process thereby offering no way to truly partition the application logic beyond the physical of the mainframe.
  • 6. FILE SERVER ARCHITECTURE • This brought a complete change in the implementation of the computer architecture • In this system, the application logic was executed on the client workstation instead of the server. • These servers provide access to computing resources like printers and large hard drives
  • 7. File server architecture Disk I/O Requests Disk Blocks DATA Network Server Workstation 1 Workstation 2 Workstation 3 Workstation 4 Application Logic 1 Application Logic 4 Application Logic 3 Application Logic 2
  • 8. MERITS: It has the low cost entry point with flexible arrangement Computer resources can be added or reduced as and when necessary using this system. DEMERITS: All application logic is executed on the client machine. This results in the client machine’s need for a large amount of power to run the application.
  • 9. CLIENT SERVER MODEL This is a process involving a minimum of two independent entities, one is the client and the other is the server. The client makes a request to the server and the server services the requests and the resulting data is sent to the client. In this application, two separate applications operating independently could work together to complete a task.
  • 10. SQL (Structured Query Language based Database Management System)is the implementation of this concept. Disk I/O Requests Disk DATA Network Server Workstation 1 Workstation 2 Workstation 3 Workstation 4 Application Logic Application Logic Application Logic Application Logic Application logic
  • 11. The most popular client server applications revolve round the use of DBMS such as Oracle and Microsoft SQL server. These applications are referred to as back-ends and offer support for storage, manipulation and retrieval of business persistent data. They use SQL as a standard method for submitting client requests. The significance of distributing the application logic between the client and server offers a faster and more cost-effective performance.
  • 12. File Server v/s Client Server Database Deployment With the advent and popularity of Microsoft Access using the Microsoft Database file(MDB) to store data, this is not a client server implementation but a file server implementation.
  • 13. CASE STUDY Assume that we have a set of data stored in an MDB file namely Student_Info.mdb. This file holds the details of the marks scored in different subjects by students. A client want to know as how many students scored 100% in more than two subjects. A query is sent to obtain the results.
  • 14. Query Sent to a File Server System • In this case, the query is not sent to the server. • The logic of the query is processed and evaluated at the client end itself. • The query logic realizes that it needs to access a table namely Student_Info in the MDB in order to process the request. • No logic is executed at the server end except the transferring of file disk blocks.
  • 15. Query Sent to a Client Server System • Here the actual SQL statement is sent across the network and processed by an application running locally on the server machine • As the SQL statements is processed on the server, only the results need to be sent back to the client. • Advantage: Reduced network traffic and an incredibly quick execution time. To meet the challenges presented by a business environment, a new three-tier or n-tier client server approach has been introduced
  • 16. Two-Tier Client Server Model • In this mode, a desktop machine operates as a client and a network server functions as a back-end database engine. • The logic in a two-tier model is split between the two physical locations namely the server and the client. • In Visual Basic, using any of the data controls that provide a graphical link to the back-end data source creates a two-tier client server relationship.
  • 17. Limitations of Two-Tier Client Server Model • Not Scalable Inability of a two-tier approach to grow beyond the physical boundaries of a client and server machine • Unmanageable Business rules cannot be encapsulated and deployed centrally because of which sharing common processes and re-using work becomes difficult • Poor Performance The graphical interface binding to the data consumes major resources on the client machine which results in poor performance and dissatisfied clients.
  • 18. Three-Tier Client Server Model • This model is based on the ability to build partitioned applications. • Partitioning an application breaks the code into logical components. • Each tier is called a service. These services are shared between that client and the servers. • The components can be logically grouped into three tiers: user services, business services and data services.
  • 19. Service Location User Services Client Business logic Server Data Services Server The three-tier logic can be extended to any number of tiers/services known as Multi- Tier or n-tier architecture.
  • 20. Values of the Three-Tier Client Server Development • Reuse The time invested in designing and implementing components is not wasted as they can be shared among applications. • Performance As components can be placed on machines other than the client workstation, load processing can be shifted from a client machine that may be underpowered to a server with extra horsepower. This offers the user best possible methods for each aspect of an application’s execution, resulting in better performance.
  • 21. • Manageability Encapsulation of application’s services into components allows the user to break down large, complex application’s into more manageable parts. • Maintenance Centralizing components for reuse has an added benefit. They become easier to redeploy after any amendments are made in the order to keep pace with business needs.