SlideShare a Scribd company logo
1 of 2
Download to read offline
Client/Server Model
Applications may vary from single-tier desktop applications          (applications that follow the single-tier
architecture) to multi-tier applications (applications that follow the two-, three-,         or         n-tier
architecture).Based on the processing scenario, a business application can have the following elements:
     The User Interface or the presentation elements through which data is entered.
     The application logic or the business rule element, which helps in validating the entered data.
     The data storage or the data management element, which manages the storage and retrieval of data.

These elements form the base of the models or architectures used in application development. All these
elements can exist on the same computer as a single process or on different computers as different
processes. Depending on the placement of these elements the application architecture can be categorized
as:

    1.   Single-tier architecture
    2.   Two-tier architecture
    3.   Three-tier architecture
    4.   N-tier architecture

    1. Single-tier architecture
A single executable file handles all functions relating to the user, business, and data service layers. All
elements of a business application are combined as a single process. If multiple users need to work on this
application then it needs to be installed on the computer of every user. This type of architecture has one
disadvantage. In case some errors are identified in the application then after rectifying the same, the
application has to be installed again on the system of every user. This is time-consuming process.




                                    Figure 1.0 Single-tier architecture

    2. Two-tier architecture
In two tier architecture, the application is divided in to two parts. One part handles data, while the other
provides the user interface. Therefore, this architecture is called two-tier architecture. The part that handles
the UI is called the client tier. The part that implements the application logic and validates the input data
based on the business rules is called the Server tier, as shown in the following figure.




                                    Figure 1.1 Two-tier architecture
In this architecture, the mainteanance, upgrade and general administration of data is easier, as it exists only
on the server and not on all the clients.Two tier architecture is called the client server architecture. A client
sends the request for services and a server provides the service. Most RDBMS, such as Microsoft Access,
SQL Server, and Oracle, support client-server architecture. RDBMS provides centralized functionality
while supporting many users.
3. Three-tier architecture
When implementing complex business solutions in two-tier architecture, the tier on which the business
logic is implemented becomes over loaded. As a result, it takes more time to execute. Therefore, to provide
further flexibility, the two-tier architecture can be split into three tiers. In three tier architecture, the first
tier is the client tier. The second or the middle tier is called the business tier. The third tier is called the
Server tier. The server tier contains a database server that manages the data. All the three service layers
reside separately, either on the same machine or on different machines. In this architecture, an additional
tier called a business tier has been added between the client tier and the server tier, as shown in the
following figure.




                                   Figure 1.2 Three-tier architecture

The business tier consists of all the business rules. It consists of the application logic that implements
business rules and validates the data. The advantage of a three tier application is that it allows you to change
the business rules without affecting the other two tiers.

    4. N-tier architecture
As the business complexities increased, the business tier became larger and unmanageable. This led to the
evolution of n-tier architecture, where the business services model was divided into smaller manageable
units. N-tier is also called multi tier architecture. In this architecture, one components near the client tier is
responsible to do the client side validation and send the data to the presentation tier. Therefore, it is possible
to keep the UI-centric processing component on a computer near the client. The UI-centric processing
component is responsible for processing the data received from and sent to the presentation tier. Data-
centric processing components are responsible for accessing the data tier to retrieve, modify, and delete
data to and from the database server.The N-tier architecture consists of the following layers:

       Client tier
       UI-Centric processing components
       Data-Centric processing object
       Database Server

Applications that follow multi tier can be used across various locations. For example, in Web application,
an application is stored on the Web server. The clients access the applications from any location through
a browser. The clients make requests to the web server and receive responses.

More Related Content

What's hot

Project Plan And Srs Final
Project Plan And Srs FinalProject Plan And Srs Final
Project Plan And Srs Finalguest24783f
 
BUS PASS MANAGEMENT SYSTEM
BUS PASS MANAGEMENT SYSTEMBUS PASS MANAGEMENT SYSTEM
BUS PASS MANAGEMENT SYSTEMKeerthi Keerthi
 
Software Design Document
Software Design DocumentSoftware Design Document
Software Design DocumentNadia Nahar
 
Srs sample
Srs sampleSrs sample
Srs samplesriniefs
 
2023 January Patch Tuesday
2023 January Patch Tuesday2023 January Patch Tuesday
2023 January Patch TuesdayIvanti
 
Software Requirement Specification (SRS) on Result Analysis Tool
Software Requirement Specification (SRS) on Result Analysis ToolSoftware Requirement Specification (SRS) on Result Analysis Tool
Software Requirement Specification (SRS) on Result Analysis ToolMinhas Kamal
 
標的型攻撃からどのように身を守るのか
標的型攻撃からどのように身を守るのか標的型攻撃からどのように身を守るのか
標的型攻撃からどのように身を守るのかabend_cve_9999_0001
 
Process Monitor の使い方
Process Monitor の使い方Process Monitor の使い方
Process Monitor の使い方彰 村地
 
IT エンジニアのための 流し読み Windows - Microsoft Defender ウイルス対策
IT エンジニアのための 流し読み Windows - Microsoft Defender ウイルス対策IT エンジニアのための 流し読み Windows - Microsoft Defender ウイルス対策
IT エンジニアのための 流し読み Windows - Microsoft Defender ウイルス対策TAKUYA OHTA
 
Active Directory のクラウド武装化計画 V2~"AD on Azure IaaS" or "Windows Azure Active Di...
Active Directory のクラウド武装化計画 V2~"AD on Azure IaaS" or "Windows Azure Active Di...Active Directory のクラウド武装化計画 V2~"AD on Azure IaaS" or "Windows Azure Active Di...
Active Directory のクラウド武装化計画 V2~"AD on Azure IaaS" or "Windows Azure Active Di...junichi anno
 
Online Airway Reservation System
Online Airway Reservation SystemOnline Airway Reservation System
Online Airway Reservation SystemHari Wiz
 
A10_日本電産マシンツールが提案する「デジタルトランスフォーメーションによる “ものづくりソリューション”」 お客様との共存・共生・共創を支える Azu...
A10_日本電産マシンツールが提案する「デジタルトランスフォーメーションによる “ものづくりソリューション”」 お客様との共存・共生・共創を支える Azu...A10_日本電産マシンツールが提案する「デジタルトランスフォーメーションによる “ものづくりソリューション”」 お客様との共存・共生・共創を支える Azu...
A10_日本電産マシンツールが提案する「デジタルトランスフォーメーションによる “ものづくりソリューション”」 お客様との共存・共生・共創を支える Azu...日本マイクロソフト株式会社
 
Hotel Management System
Hotel Management SystemHotel Management System
Hotel Management Systemcolimmy
 
Process control system of bus ticket booking (closed loop)
Process control system of bus ticket booking (closed loop)Process control system of bus ticket booking (closed loop)
Process control system of bus ticket booking (closed loop)Jigar Nayak
 
Actions and menus in odoo 16
Actions and menus in odoo 16Actions and menus in odoo 16
Actions and menus in odoo 16Celine George
 
Creating books app with react native
Creating books app with react nativeCreating books app with react native
Creating books app with react nativeAli Sa'o
 

What's hot (20)

Srs sample
Srs sampleSrs sample
Srs sample
 
Project Plan And Srs Final
Project Plan And Srs FinalProject Plan And Srs Final
Project Plan And Srs Final
 
BUS PASS MANAGEMENT SYSTEM
BUS PASS MANAGEMENT SYSTEMBUS PASS MANAGEMENT SYSTEM
BUS PASS MANAGEMENT SYSTEM
 
ICQ
ICQICQ
ICQ
 
WIX VS WORDPRESS
WIX VS WORDPRESSWIX VS WORDPRESS
WIX VS WORDPRESS
 
Software Design Document
Software Design DocumentSoftware Design Document
Software Design Document
 
Software requirement specification(SRS)
Software requirement specification(SRS)Software requirement specification(SRS)
Software requirement specification(SRS)
 
Srs sample
Srs sampleSrs sample
Srs sample
 
2023 January Patch Tuesday
2023 January Patch Tuesday2023 January Patch Tuesday
2023 January Patch Tuesday
 
Software Requirement Specification (SRS) on Result Analysis Tool
Software Requirement Specification (SRS) on Result Analysis ToolSoftware Requirement Specification (SRS) on Result Analysis Tool
Software Requirement Specification (SRS) on Result Analysis Tool
 
標的型攻撃からどのように身を守るのか
標的型攻撃からどのように身を守るのか標的型攻撃からどのように身を守るのか
標的型攻撃からどのように身を守るのか
 
Process Monitor の使い方
Process Monitor の使い方Process Monitor の使い方
Process Monitor の使い方
 
IT エンジニアのための 流し読み Windows - Microsoft Defender ウイルス対策
IT エンジニアのための 流し読み Windows - Microsoft Defender ウイルス対策IT エンジニアのための 流し読み Windows - Microsoft Defender ウイルス対策
IT エンジニアのための 流し読み Windows - Microsoft Defender ウイルス対策
 
Active Directory のクラウド武装化計画 V2~"AD on Azure IaaS" or "Windows Azure Active Di...
Active Directory のクラウド武装化計画 V2~"AD on Azure IaaS" or "Windows Azure Active Di...Active Directory のクラウド武装化計画 V2~"AD on Azure IaaS" or "Windows Azure Active Di...
Active Directory のクラウド武装化計画 V2~"AD on Azure IaaS" or "Windows Azure Active Di...
 
Online Airway Reservation System
Online Airway Reservation SystemOnline Airway Reservation System
Online Airway Reservation System
 
A10_日本電産マシンツールが提案する「デジタルトランスフォーメーションによる “ものづくりソリューション”」 お客様との共存・共生・共創を支える Azu...
A10_日本電産マシンツールが提案する「デジタルトランスフォーメーションによる “ものづくりソリューション”」 お客様との共存・共生・共創を支える Azu...A10_日本電産マシンツールが提案する「デジタルトランスフォーメーションによる “ものづくりソリューション”」 お客様との共存・共生・共創を支える Azu...
A10_日本電産マシンツールが提案する「デジタルトランスフォーメーションによる “ものづくりソリューション”」 お客様との共存・共生・共創を支える Azu...
 
Hotel Management System
Hotel Management SystemHotel Management System
Hotel Management System
 
Process control system of bus ticket booking (closed loop)
Process control system of bus ticket booking (closed loop)Process control system of bus ticket booking (closed loop)
Process control system of bus ticket booking (closed loop)
 
Actions and menus in odoo 16
Actions and menus in odoo 16Actions and menus in odoo 16
Actions and menus in odoo 16
 
Creating books app with react native
Creating books app with react nativeCreating books app with react native
Creating books app with react native
 

Viewers also liked

8 Characteristics of good user requirements
8 Characteristics of good user requirements8 Characteristics of good user requirements
8 Characteristics of good user requirementsguest24d72f
 
.NET Framework Overview
.NET Framework Overview.NET Framework Overview
.NET Framework OverviewDoncho Minkov
 
Introduction to .net framework
Introduction to .net frameworkIntroduction to .net framework
Introduction to .net frameworkArun Prasad
 
Introduction to Web Architecture
Introduction to Web ArchitectureIntroduction to Web Architecture
Introduction to Web ArchitectureChamnap Chhorn
 
Architecture of a Modern Web App
Architecture of a Modern Web AppArchitecture of a Modern Web App
Architecture of a Modern Web Appscothis
 
Pengembangan sbi
Pengembangan sbiPengembangan sbi
Pengembangan sbismkfarmasi
 
15 web tools for administrators
15 web tools for administrators15 web tools for administrators
15 web tools for administratorsBrandon Raymo
 
Presentación2
Presentación2Presentación2
Presentación2mile
 
Una Igualdad Merecida; Jacinta Martínez Sánchez 4ºB
Una Igualdad Merecida; Jacinta Martínez Sánchez 4ºB Una Igualdad Merecida; Jacinta Martínez Sánchez 4ºB
Una Igualdad Merecida; Jacinta Martínez Sánchez 4ºB sabinamora
 
Why Form a Health Professions Training Program at Your Federally Qualified H...
Why Form a Health Professions Training Program at Your  Federally Qualified H...Why Form a Health Professions Training Program at Your  Federally Qualified H...
Why Form a Health Professions Training Program at Your Federally Qualified H...CHC Connecticut
 
50 sites 21st century skills
50 sites 21st century skills50 sites 21st century skills
50 sites 21st century skillsBrandon Raymo
 
Introducing PhoneGap to SproutCore 2
Introducing PhoneGap to SproutCore 2Introducing PhoneGap to SproutCore 2
Introducing PhoneGap to SproutCore 2mwbrooks
 

Viewers also liked (20)

4 sdlc and stlc
4 sdlc and stlc4 sdlc and stlc
4 sdlc and stlc
 
8 Characteristics of good user requirements
8 Characteristics of good user requirements8 Characteristics of good user requirements
8 Characteristics of good user requirements
 
.NET Framework Overview
.NET Framework Overview.NET Framework Overview
.NET Framework Overview
 
Introduction to .net framework
Introduction to .net frameworkIntroduction to .net framework
Introduction to .net framework
 
Introduction to Web Architecture
Introduction to Web ArchitectureIntroduction to Web Architecture
Introduction to Web Architecture
 
Architecture of a Modern Web App
Architecture of a Modern Web AppArchitecture of a Modern Web App
Architecture of a Modern Web App
 
Pengembangan sbi
Pengembangan sbiPengembangan sbi
Pengembangan sbi
 
15 web tools for administrators
15 web tools for administrators15 web tools for administrators
15 web tools for administrators
 
Beni culturali - Daniela Fiore
Beni culturali  - Daniela FioreBeni culturali  - Daniela Fiore
Beni culturali - Daniela Fiore
 
Daur baur Digital activation
Daur baur Digital activationDaur baur Digital activation
Daur baur Digital activation
 
Presentación2
Presentación2Presentación2
Presentación2
 
Thesis
ThesisThesis
Thesis
 
Una Igualdad Merecida; Jacinta Martínez Sánchez 4ºB
Una Igualdad Merecida; Jacinta Martínez Sánchez 4ºB Una Igualdad Merecida; Jacinta Martínez Sánchez 4ºB
Una Igualdad Merecida; Jacinta Martínez Sánchez 4ºB
 
J query 17-visual-cheat-sheet
J query 17-visual-cheat-sheetJ query 17-visual-cheat-sheet
J query 17-visual-cheat-sheet
 
Resume1
Resume1Resume1
Resume1
 
ValeryBassenkoResume
ValeryBassenkoResumeValeryBassenkoResume
ValeryBassenkoResume
 
Why Form a Health Professions Training Program at Your Federally Qualified H...
Why Form a Health Professions Training Program at Your  Federally Qualified H...Why Form a Health Professions Training Program at Your  Federally Qualified H...
Why Form a Health Professions Training Program at Your Federally Qualified H...
 
50 sites 21st century skills
50 sites 21st century skills50 sites 21st century skills
50 sites 21st century skills
 
Bid’ah, apakah itu
Bid’ah, apakah ituBid’ah, apakah itu
Bid’ah, apakah itu
 
Introducing PhoneGap to SproutCore 2
Introducing PhoneGap to SproutCore 2Introducing PhoneGap to SproutCore 2
Introducing PhoneGap to SproutCore 2
 

Similar to Client server architecture in .net by varun tiwari

2-Tier and 3-Tier Architecture of Enterprise Resource Planning
2-Tier and 3-Tier Architecture of Enterprise Resource Planning2-Tier and 3-Tier Architecture of Enterprise Resource Planning
2-Tier and 3-Tier Architecture of Enterprise Resource PlanningS M Qamar Abbas
 
Introductuction of sql server gain america
Introductuction of sql server  gain americaIntroductuction of sql server  gain america
Introductuction of sql server gain americaGainAmerica
 
Chapter2
Chapter2Chapter2
Chapter2suks_87
 
Client computing evolution ppt11
Client computing evolution ppt11Client computing evolution ppt11
Client computing evolution ppt11Tech_MX
 
Client/Server Architecture By Faisal Shahzad
Client/Server Architecture By Faisal Shahzad Client/Server Architecture By Faisal Shahzad
Client/Server Architecture By Faisal Shahzad Faisal Shehzad
 
Web Based Application for Rent or Sale
Web Based Application for Rent or SaleWeb Based Application for Rent or Sale
Web Based Application for Rent or SaleMike Taylor
 
Client server architecture
Client server architectureClient server architecture
Client server architectureBhargav Amin
 
two tier and three tier
two tier and three tiertwo tier and three tier
two tier and three tierKashafnaz2
 
Dispute Resolution Web Application
Dispute Resolution Web ApplicationDispute Resolution Web Application
Dispute Resolution Web ApplicationMike Taylor
 
Differences Between Architectures
Differences Between ArchitecturesDifferences Between Architectures
Differences Between Architecturesprasadsmn
 
Mobile Responsive Social Corporate Intranet Portal Application
Mobile Responsive Social Corporate Intranet Portal ApplicationMobile Responsive Social Corporate Intranet Portal Application
Mobile Responsive Social Corporate Intranet Portal ApplicationMike Taylor
 
Odbc and data access objects
Odbc and data access objectsOdbc and data access objects
Odbc and data access objectsSangeetha Sg
 
N tier architecture
N tier architectureN tier architecture
N tier architectureNidhi Saurav
 
N tier architecture
N tier architectureN tier architecture
N tier architectureNidhi Saurav
 
N tier architecture
N tier architectureN tier architecture
N tier architectureNidhi Saurav
 
N tier architecture
N tier architectureN tier architecture
N tier architectureNidhi Saurav
 

Similar to Client server architecture in .net by varun tiwari (20)

2-Tier and 3-Tier Architecture of Enterprise Resource Planning
2-Tier and 3-Tier Architecture of Enterprise Resource Planning2-Tier and 3-Tier Architecture of Enterprise Resource Planning
2-Tier and 3-Tier Architecture of Enterprise Resource Planning
 
Introductuction of sql server gain america
Introductuction of sql server  gain americaIntroductuction of sql server  gain america
Introductuction of sql server gain america
 
Chapter2
Chapter2Chapter2
Chapter2
 
Client computing evolution ppt11
Client computing evolution ppt11Client computing evolution ppt11
Client computing evolution ppt11
 
Client/Server Architecture By Faisal Shahzad
Client/Server Architecture By Faisal Shahzad Client/Server Architecture By Faisal Shahzad
Client/Server Architecture By Faisal Shahzad
 
Web Based Application for Rent or Sale
Web Based Application for Rent or SaleWeb Based Application for Rent or Sale
Web Based Application for Rent or Sale
 
Appathika.ppt
Appathika.pptAppathika.ppt
Appathika.ppt
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
 
two tier and three tier
two tier and three tiertwo tier and three tier
two tier and three tier
 
Dispute Resolution Web Application
Dispute Resolution Web ApplicationDispute Resolution Web Application
Dispute Resolution Web Application
 
Differences Between Architectures
Differences Between ArchitecturesDifferences Between Architectures
Differences Between Architectures
 
A
AA
A
 
Mobile Responsive Social Corporate Intranet Portal Application
Mobile Responsive Social Corporate Intranet Portal ApplicationMobile Responsive Social Corporate Intranet Portal Application
Mobile Responsive Social Corporate Intranet Portal Application
 
Odbc and data access objects
Odbc and data access objectsOdbc and data access objects
Odbc and data access objects
 
J2 ee archi
J2 ee archiJ2 ee archi
J2 ee archi
 
3 tier architecture
3 tier architecture3 tier architecture
3 tier architecture
 
N tier architecture
N tier architectureN tier architecture
N tier architecture
 
N tier architecture
N tier architectureN tier architecture
N tier architecture
 
N tier architecture
N tier architectureN tier architecture
N tier architecture
 
N tier architecture
N tier architectureN tier architecture
N tier architecture
 

More from Bosco Technical Training Society, Don Bosco Technical School (Aff. GGSIP University, New Delhi)

More from Bosco Technical Training Society, Don Bosco Technical School (Aff. GGSIP University, New Delhi) (20)

String Manipulation Function and Header File Functions
String Manipulation Function and Header File FunctionsString Manipulation Function and Header File Functions
String Manipulation Function and Header File Functions
 
C Structure and Union in C
C Structure and Union in CC Structure and Union in C
C Structure and Union in C
 
Preprocessor Directive in C
Preprocessor Directive in CPreprocessor Directive in C
Preprocessor Directive in C
 
File Handling in C Programming
File Handling in C ProgrammingFile Handling in C Programming
File Handling in C Programming
 
Bit field enum and command line arguments
Bit field enum and command line argumentsBit field enum and command line arguments
Bit field enum and command line arguments
 
Pointers in C and Dynamic Memory Allocation
Pointers in C and Dynamic Memory AllocationPointers in C and Dynamic Memory Allocation
Pointers in C and Dynamic Memory Allocation
 
Array in C
Array in CArray in C
Array in C
 
C storage class
C storage classC storage class
C storage class
 
Function in C Programming
Function in C ProgrammingFunction in C Programming
Function in C Programming
 
C Constructs (C Statements & Loop)
C Constructs (C Statements & Loop)C Constructs (C Statements & Loop)
C Constructs (C Statements & Loop)
 
C Operators
C OperatorsC Operators
C Operators
 
C programming Basics
C programming BasicsC programming Basics
C programming Basics
 
Software Development Skills and SDLC
Software Development Skills and SDLCSoftware Development Skills and SDLC
Software Development Skills and SDLC
 
Mobile commerce
Mobile commerceMobile commerce
Mobile commerce
 
E commerce application
E commerce applicationE commerce application
E commerce application
 
Data normalization
Data normalizationData normalization
Data normalization
 
Html Form Controls
Html Form ControlsHtml Form Controls
Html Form Controls
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
ER to Relational Mapping
ER to Relational MappingER to Relational Mapping
ER to Relational Mapping
 
Entity Relationship Model
Entity Relationship ModelEntity Relationship Model
Entity Relationship Model
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Client server architecture in .net by varun tiwari

  • 1. Client/Server Model Applications may vary from single-tier desktop applications (applications that follow the single-tier architecture) to multi-tier applications (applications that follow the two-, three-, or n-tier architecture).Based on the processing scenario, a business application can have the following elements:  The User Interface or the presentation elements through which data is entered.  The application logic or the business rule element, which helps in validating the entered data.  The data storage or the data management element, which manages the storage and retrieval of data. These elements form the base of the models or architectures used in application development. All these elements can exist on the same computer as a single process or on different computers as different processes. Depending on the placement of these elements the application architecture can be categorized as: 1. Single-tier architecture 2. Two-tier architecture 3. Three-tier architecture 4. N-tier architecture 1. Single-tier architecture A single executable file handles all functions relating to the user, business, and data service layers. All elements of a business application are combined as a single process. If multiple users need to work on this application then it needs to be installed on the computer of every user. This type of architecture has one disadvantage. In case some errors are identified in the application then after rectifying the same, the application has to be installed again on the system of every user. This is time-consuming process. Figure 1.0 Single-tier architecture 2. Two-tier architecture In two tier architecture, the application is divided in to two parts. One part handles data, while the other provides the user interface. Therefore, this architecture is called two-tier architecture. The part that handles the UI is called the client tier. The part that implements the application logic and validates the input data based on the business rules is called the Server tier, as shown in the following figure. Figure 1.1 Two-tier architecture In this architecture, the mainteanance, upgrade and general administration of data is easier, as it exists only on the server and not on all the clients.Two tier architecture is called the client server architecture. A client sends the request for services and a server provides the service. Most RDBMS, such as Microsoft Access, SQL Server, and Oracle, support client-server architecture. RDBMS provides centralized functionality while supporting many users.
  • 2. 3. Three-tier architecture When implementing complex business solutions in two-tier architecture, the tier on which the business logic is implemented becomes over loaded. As a result, it takes more time to execute. Therefore, to provide further flexibility, the two-tier architecture can be split into three tiers. In three tier architecture, the first tier is the client tier. The second or the middle tier is called the business tier. The third tier is called the Server tier. The server tier contains a database server that manages the data. All the three service layers reside separately, either on the same machine or on different machines. In this architecture, an additional tier called a business tier has been added between the client tier and the server tier, as shown in the following figure. Figure 1.2 Three-tier architecture The business tier consists of all the business rules. It consists of the application logic that implements business rules and validates the data. The advantage of a three tier application is that it allows you to change the business rules without affecting the other two tiers. 4. N-tier architecture As the business complexities increased, the business tier became larger and unmanageable. This led to the evolution of n-tier architecture, where the business services model was divided into smaller manageable units. N-tier is also called multi tier architecture. In this architecture, one components near the client tier is responsible to do the client side validation and send the data to the presentation tier. Therefore, it is possible to keep the UI-centric processing component on a computer near the client. The UI-centric processing component is responsible for processing the data received from and sent to the presentation tier. Data- centric processing components are responsible for accessing the data tier to retrieve, modify, and delete data to and from the database server.The N-tier architecture consists of the following layers:  Client tier  UI-Centric processing components  Data-Centric processing object  Database Server Applications that follow multi tier can be used across various locations. For example, in Web application, an application is stored on the Web server. The clients access the applications from any location through a browser. The clients make requests to the web server and receive responses.