SlideShare a Scribd company logo
1 of 48
Fundamentals of Business Data
      Communications
                11th Edition

Alan Dennis & Alexandra Durcikova

         John Wiley & Sons, Inc


         Dwayne Whitten, D.B.A
         Mays Business School
         Texas A&M University
          Copyright 2011 John Wiley & Sons, Inc   2-1
Chapter 2
Network Applications



    Copyright 2011 John Wiley & Sons, Inc   2-2
Chapter 2 Outline
2.1 - Introduction
2.2 - Application Architectures
    – Host-Based, Client-Based, Client-Server and Peer-to-Peer
      Architectures
    – Choosing Architectures
2.3 - World Wide Web
    – How the Web Works
    – Inside an HTTP Request & HTTP Response
2.4 - Electronic Mail
    – How E-Mail Works and Inside an SMTP Packet
    – Attachments in MIME
2.5 - Other Applications
    – Telnet, Instant Messaging, and Videoconferencing
    2.6 – Implications for Management

                     Copyright 2011 John Wiley & Sons, Inc       2-3
1.1 Introduction
                        Applications                  Application Layer
                      (e.g., email, web,
                      word processing)
                                                       Transport Layer
                                                        Network Layer
•Application architecture
    •The way in which the functions of the application layer software are spread
    among the clients and servers on the network
•Functions of Application Layer
    – Data storage - Storing of data generated by programs (e.g., files, records)
    – Data access logic - Processing required to access stored data (e.g., SQL)
    – Application logic - Business logic such as word processors, spreadsheets
    – Presentation logic - Presentation of info to user & acceptance of user commands



                          Copyright 2011 John Wiley & Sons, Inc            2-4
• Clients                         • Servers
  - Personal computer                   - Mainframe
  - Terminal                            - Personal computer
  - Network computer                    - Cluster
  - Transaction terminal                - Virtual server
  - Handheld




               Copyright 2011 John Wiley & Sons, Inc       2-5
2.2 Application Architectures
• Determined by how functions of
  application programs are spread among
  clients and servers
  – Host-based Architectures
     • Server performs almost all functions
  – Client-based architectures
     • Client performs most functions
  – Client-server architectures
     • Functions shared between client and server

              Copyright 2011 John Wiley & Sons, Inc   2-6
Host-Based Architectures




– Client captures key strokes
  then sends them to the
  mainframe
– Client displays information
  according to the server’s
  instructions
                   Copyright 2011 John Wiley & Sons, Inc   2-7
Host-based Architecture Problems
• Host becoming a bottleneck
  – All processing done by the host, which can
    severely limit network performance
• Host upgrades typically expensive and “lumpy”
  – Available upgrades require large scale and
    often costly jumps in processing and memory
  – Network demand grows more incrementally
    than does the host capacity
  – May see poor fit (too much or too little)
    between host performance and network
    demand
              Copyright 2011 John Wiley & Sons, Inc   2-8
Client-Based Architectures

      Example: Using a word
      processing package on a PC
      and storing data files on a
      server




      Copyright 2011 John Wiley & Sons, Inc   2-9
Client-Based Architecture Problems
• Data traffic must travel back and forth
  between server and client
  – Example: when the client program is making a
    database query, the ENTIRE database must
    travel to the client before the query can be
    processed
  – Often the large file sizes moving across the
    LAN can yield a poor result in network
    performance



              Copyright 2011 John Wiley & Sons, Inc   2 - 10
Client-Server Architectures

     Example: Using a Web
     browser to obtain web pages
     uses logic balanced between
     the client and server




                                  gic
                          tio n lo t
                 Ap  plica n clien
                         eo
                  c an b server
                          r
                   a nd/o



      Copyright 2011 John Wiley & Sons, Inc   2 - 11
Client-Server Architectures
• Advantages
  – More efficient because of distributed
    processing
  – Allow hardware and software from different
    vendors to be used together
  – Enables cloud computing
• Disadvantages
  – Difficulty in getting software from different
    vendors to work together smoothly
  – May require Middleware, a third category of
    software
              Copyright 2011 John Wiley & Sons, Inc   2 - 12
Middleware
              client application programs
a standard                                                 – Manages
way of                                                       message
translating                                                  transfers
between               Middleware                           – Insulates network
software                                                     changes from the
from                                                         clients (e.g.,
different                                                    adding a new
vendors                                                      server)
              server application programs

     Examples of standards for Middleware:
         – Distributed Computing Environment (DCE)
         – Common Object Request Broker Architecture (CORBA)
         – Open Database Connectivity (ODBC)
                   Copyright 2011 John Wiley & Sons, Inc             2 - 13
Multi-tier Architectures
• Involve more than two computers in
  distributing application program logic
  – 2-tier architecture
     • Uses clients and servers in a balance, very
       popular approach in simple LANs
  – 3-tier architecture
     • 3 sets of computers involved
  – N-tier architecture
     • More than three sets of computers used,
       more typical across complex organizations
     • Allows load balancing across servers
              Copyright 2011 John Wiley & Sons, Inc   2 - 14
3-tier Architecture




  Copyright 2011 John Wiley & Sons, Inc   2 - 15
N-tier Architecture




  Copyright 2011 John Wiley & Sons, Inc   2 - 16
Multi-tier Architectures
• Advantages
  – Better load balancing:
     • More evenly distributed processing. (e.g., application
       logic distributed between several servers.)
  – More scalable:
     • Only servers experiencing high demand need be
       upgraded
• Disadvantages
  – Heavily loaded network:
     • More distributed processing necessitates more data
        exchanges
  – Difficult to program and test due to increased
    complexity

                Copyright 2011 John Wiley & Sons, Inc    2 - 17
Thin and Thick Clients
• Classification depends on how much of the
  application logic resides on the client or server
• Thin client:
      • Little or no application logic on client
      • Becoming popular because easier to manage, (only
        the server application logic generally needs to be
        updated)
      • The best example: World Wide Web architecture
        (uses a two-tier, thin client architecture)
• Thick client:
      • All or most of the application logic resides on the
        client
                  Copyright 2011 John Wiley & Sons, Inc       2 - 18
Thin-Client Example: Web Architecture




           Copyright 2011 John Wiley & Sons, Inc   2 - 19
Peer to Peer Architecture
• All computers can serve as a client and a server
• Increased popularity in the last decade due to the
  rise of P2P services such as Napster
• Advantages:
   • Data can be stored anywhere on the network
   • Very resilient to failure
• Disadvantages:
   • Finding data
   • Security



                Copyright 2011 John Wiley & Sons, Inc   2 - 20
Criteria for Choosing Architecture
• Infrastructure Cost
   – Cost of servers, clients, and circuits
   – Mainframes: very expensive; terminals, PCs:
     inexpensive
• Development Cost
   – Mainly cost of software development
   – Software: expensive to develop; off-the-shelf software:
     inexpensive
• Scalability
   – Ability to increase (or decrease) in computing capacity
     as network demand changes
   – Mainframes: not scalable; PCs: highly scalable

                 Copyright 2011 John Wiley & Sons, Inc    2 - 21
Choosing an Architecture


                 Host-Based           Client-Based       Client-Server

Cost of
Infrastructure       High                 Medium             Low

Cost of
Development          Low                  Medium           Medium


Scalability          Low                  Medium             High




                 Copyright 2011 John Wiley & Sons, Inc          2 - 22
Applications Layer Examples
• World Wide Web
• E-mail
• File Transfer
• Videoconferencing
• Instant Messaging




             Copyright 2011 John Wiley & Sons, Inc   2 - 23
2.3 World Wide Web
• Web began with two innovative ideas:
      – Hypertext
             • A document containing links to other documents
      – Uniform Resource Locators (URLs)
             • A formal way of identifying links to other documents
• Invention of WWW (1989)
      – By Tim Berners-Lee at CERN in Switzerland
• First graphical browser, Mosaic, (1993)
      – By Marc Andressen at NCSA in USA; later founded
        Netscape
CERN - Conseil Européen pour la Rechèrche Nucléaire (Berners-Lee, T. (2000) Weaving the Web. New York:   HarperCollins. P. 4)

NCSA - National Center for Supercomputing Applications

                               Copyright 2011 John Wiley & Sons, Inc                                 2 - 24
How the Web Works




  Copyright 2011 John Wiley & Sons, Inc   2 - 25
HTTP Request Message
                              Request line
                 (command, URL, HTTP version number) required
(If the user
types in the               Request header                   optional
URL by                (information on the browser,
themselves,            date, and the referring page )
then the
referring page
is blank.)
                             Request body
                     (information sent to the server,       optional
                           such as from a form)


                    Copyright 2011 John Wiley & Sons, Inc    2 - 26
Example of an HTTP Request




Note that this HTTP Request message has no “Body” part.

                 Copyright 2011 John Wiley & Sons, Inc    2 - 27
HTTP Response Message
         Response status
(http version number, status code, reason) optional

        Response header                          optional
    (information on the server, date,
 URL of the page retrieved, format used )




          Response body                          required
          (requested web page)



         Copyright 2011 John Wiley & Sons, Inc         2 - 28
Example of an HTTP Response




       Copyright 2011 John Wiley & Sons, Inc   2 - 29
HTML - Hypertext Markup Language
• A language used to create Web pages
• Also developed at CERN (initially for text
  files)
• Tags are embedded in HTML documents
  – include information on how to format the file
• Extensions to HTML needed to format
  multimedia files
• XML - Extensible Markup Language
  – A new markup language becoming popular
              Copyright 2011 John Wiley & Sons, Inc   2 - 30
2.4 Electronic Mail




          Copyright 2011 John Wiley & Sons, Inc   2 - 31
E-mail Standards
• SMTP - Simple Mail Transfer Protocol
   – Main e-mail standard for
      • Originating user agent and the mail transfer agent
      • Between mail transfer agents
   – Originally written to handle only text files
   – Usually used in two-tier client-server architectures
• Post Office Protocol (POP) and Internet Mail
  Access Protocol (IMAP)
   – Main protocols used between the receiver user agent
     and mail transfer agent
   – Main difference: with IMAP, messages can be left at the
     server after downloading them to the client
• Other competing standards
   – Common Messaging Calls (CMC), X.400
                 Copyright 2011 John Wiley & Sons, Inc   2 - 32
Two-Tier E-mail Architecture
• User agent is another word for an e-mail client
  application
   – Run on client computers
   – Send e-mail to e-mail servers
   – Download e-mail from mailboxes on those servers
   – Examples: Eudora, Outlook, Netscape Messenger
• Mail transfer agent is another word for the mail
  server application
   – Used by e-mail servers
   – Send e-mail between e-mail servers
   – Maintain individual mailboxes.

                 Copyright 2011 John Wiley & Sons, Inc   2 - 33
Host Based e-mail Architectures
• An old method used on UNIX based hosts
• Similar to client-server architecture, except
   – Client PC replaced by a terminal (or terminal emulator)
      • Sends all keystrokes to the server
      • Display characters received from the server
   – All software resides on the server
      • Takes client keystrokes and understand user’s
        commands
      • Creates SMTP packets and sends them to next mail
        server
      • Useful when traveling in locations with poor internet
        facilities
                 Copyright 2011 John Wiley & Sons, Inc    2 - 34
Web-based e-mail




 Copyright 2011 John Wiley & Sons, Inc   2 - 35
Sample SMTP Message




Note that this SMTP message has no attachments.
                  Copyright 2011 John Wiley & Sons, Inc   2 - 36
MIME
• Multipurpose Internet Mail Extension
   – A graphics capable mail transfer agent protocol (to send
     graphical information in addition to text)
      • SMTP was designed years ago for text transfer only
   – MIME software is included as part of an e-mail client
   – Translates graphical information into text allowing the
     graphic to be sent as part of an SMTP message (as a
     special attachment)
   – Receiver’s e-mail client then translates the MIME
     attachment from text back into graphical format
   – MIME example



                 Copyright 2011 John Wiley & Sons, Inc       2 - 37
2.5 Other Applications




         Copyright 2011 John Wiley & Sons, Inc   2 - 38
Telnet
• Allows one computer to log into another
  computer
   – Remote login enabling full control of the host
• Requires an application program on the client
  computer and a Telnet server program on the
  server
   – Client program emulates a “dumb” terminal off the
     server
• Most popular Telnet software is PuTTY
   – Open source
   – Uses SSH encryption for security
• Requires account name and password
   – Anonymous sites similar to FTP approach


                    Copyright 2011 John Wiley & Sons, Inc   2 - 39
Instant Messaging (IM)
• A client-server program that allows real-time
  typed messages to be exchanged
   – Client needs an IM client software
   – Server needs an IM server package
• Some types allow voice and video packets to be
  sent
   – Like a telephone
• Examples include AOL and ICQ
• Two step process:
   – Telling IM server that you are online
   – Chatting
                 Copyright 2011 John Wiley & Sons, Inc   2 - 40
How Instant Messaging Works




       Copyright 2011 John Wiley & Sons, Inc   2 - 41
Videoconferencing
• Provides real time transmission of video and audio
  signals between two or more locations
   – Allows people to meet at the same time in different locations
   – Saves money and time by not having to move people around
   – Typically involves matched special purpose rooms with
     cameras and displays
• Desktop videoconferencing
   – Low cost application linking small video cameras and
     microphones together over the Internet
   – No need for special rooms
   – Example: Net Meeting software on clients communicating
     through a common videoconference server
                 Copyright 2011 John Wiley & Sons, Inc    2 - 42
Cisco Videoconferencing




     Copyright 2011 John Wiley & Sons, Inc   2 - 43
Cisco Videoconferencing




     Copyright 2011 John Wiley & Sons, Inc   2 - 44
Videoconferencing Standards
• Proprietary early systems
• Common standards in use today
   – H.320
      • Designed for room-to-room videoconferencing over
        high-speed phone lines
   – H.323
      • Family of standards designed for desktop
        videoconferencing and just simple audio
        conferencing over Internet
   – MPEG-2
      • Designed for faster connections such as LAN or
        privately owned WANs

                Copyright 2011 John Wiley & Sons, Inc    2 - 45
Webcasting
• Special type of uni-directional
  videoconferencing
  – Content is sent from the server to users
• Process
  – Content created by developer
  – Downloaded as needed by the user
  – Played by a plug-in to a Web browser
• No standards for webcasting yet
  – Defacto standards: products by RealNetworks

              Copyright 2011 John Wiley & Sons, Inc   2 - 46
2.6 Implications for Management
• Network may be used to provide a worry-free
  environment for applications
   – Network is the critical infrastructure over which the
     wide variety of strategic applications enable an
     organization to compete in its environment
   – The applications running on the network have the
     potential for changing the organization
• Dramatic increase in number and type of
  applications
   – Rapid growth in amount and type of networking traffic
     over time
      • Different implication on network design and
        management
      • Increased operating cost for the network function


                 Copyright 2011 John Wiley & Sons, Inc       2 - 47
Copyright 2011 John Wiley & Sons, Inc.

 All rights reserved. Reproduction or translation of
 this work beyond that permitted in section 117 of
 the 1976 United States Copyright Act without
 express permission of the copyright owner is
 unlawful. Request for further information should
 be addressed to the Permissions Department,
 John Wiley & Sons, Inc. The purchaser may make
 back-up copies for his/her own use only and not
 for distribution or resale. The Publisher assumes
 no responsibility for errors, omissions, or
 damages caused by the use of these programs or
 from the use of the information herein.

              Copyright 2011 John Wiley & Sons, Inc   2 - 48

More Related Content

What's hot

client server architecture
client server architecture client server architecture
client server architecture Saurabh Soni
 
Client server-computing
Client server-computingClient server-computing
Client server-computingjayasreep3
 
Client server component
Client server componentClient server component
Client server componentSatya P. Joshi
 
Khrurram_Khan_Resume BMO IBM MCSE CCNA M.Eng -
Khrurram_Khan_Resume BMO IBM MCSE CCNA M.Eng -Khrurram_Khan_Resume BMO IBM MCSE CCNA M.Eng -
Khrurram_Khan_Resume BMO IBM MCSE CCNA M.Eng -Khurram Khan
 
Client Server System Development
Client Server System DevelopmentClient Server System Development
Client Server System DevelopmentManjuShanmugam1593
 
Client computing evolution ppt11
Client computing evolution ppt11Client computing evolution ppt11
Client computing evolution ppt11Tech_MX
 
Client Server Architecture
Client Server ArchitectureClient Server Architecture
Client Server ArchitectureRence Montanes
 
Client server computing_keypoint_and_questions
Client server computing_keypoint_and_questionsClient server computing_keypoint_and_questions
Client server computing_keypoint_and_questionslucky94527
 
Server vs Client in real life and in programming world
Server vs Client in real life and in programming worldServer vs Client in real life and in programming world
Server vs Client in real life and in programming worldManoj Kumar
 
Client Server Computing Slides by Puja Dhar
Client Server Computing Slides by Puja DharClient Server Computing Slides by Puja Dhar
Client Server Computing Slides by Puja Dharpuja_dhar
 
Client server architecture
Client server architectureClient server architecture
Client server architectureRituBhargava7
 
IBM Managed File Transfer Solutions Overview
IBM Managed File Transfer Solutions OverviewIBM Managed File Transfer Solutions Overview
IBM Managed File Transfer Solutions OverviewLightwell
 
Client/Server Architecture By Faisal Shahzad
Client/Server Architecture By Faisal Shahzad Client/Server Architecture By Faisal Shahzad
Client/Server Architecture By Faisal Shahzad Faisal Shehzad
 
Client Server models in JAVA
Client Server models in JAVAClient Server models in JAVA
Client Server models in JAVATech_MX
 
ConnectED 2015 BP302: Future-Proofing Enterprise IT
ConnectED 2015 BP302: Future-Proofing Enterprise ITConnectED 2015 BP302: Future-Proofing Enterprise IT
ConnectED 2015 BP302: Future-Proofing Enterprise ITDaniel Reimann
 

What's hot (20)

Csc concepts
Csc conceptsCsc concepts
Csc concepts
 
client server architecture
client server architecture client server architecture
client server architecture
 
Client Server Architecture1
Client Server Architecture1Client Server Architecture1
Client Server Architecture1
 
Client server-computing
Client server-computingClient server-computing
Client server-computing
 
Client server component
Client server componentClient server component
Client server component
 
Csc network
Csc networkCsc network
Csc network
 
Khrurram_Khan_Resume BMO IBM MCSE CCNA M.Eng -
Khrurram_Khan_Resume BMO IBM MCSE CCNA M.Eng -Khrurram_Khan_Resume BMO IBM MCSE CCNA M.Eng -
Khrurram_Khan_Resume BMO IBM MCSE CCNA M.Eng -
 
Client Server System Development
Client Server System DevelopmentClient Server System Development
Client Server System Development
 
Client computing evolution ppt11
Client computing evolution ppt11Client computing evolution ppt11
Client computing evolution ppt11
 
Client Server Architecture
Client Server ArchitectureClient Server Architecture
Client Server Architecture
 
Client server computing_keypoint_and_questions
Client server computing_keypoint_and_questionsClient server computing_keypoint_and_questions
Client server computing_keypoint_and_questions
 
Server vs Client in real life and in programming world
Server vs Client in real life and in programming worldServer vs Client in real life and in programming world
Server vs Client in real life and in programming world
 
Resume-518
Resume-518Resume-518
Resume-518
 
Client Server Computing Slides by Puja Dhar
Client Server Computing Slides by Puja DharClient Server Computing Slides by Puja Dhar
Client Server Computing Slides by Puja Dhar
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
 
IBM Managed File Transfer Solutions Overview
IBM Managed File Transfer Solutions OverviewIBM Managed File Transfer Solutions Overview
IBM Managed File Transfer Solutions Overview
 
Client/Server Architecture By Faisal Shahzad
Client/Server Architecture By Faisal Shahzad Client/Server Architecture By Faisal Shahzad
Client/Server Architecture By Faisal Shahzad
 
Network operating system
Network operating systemNetwork operating system
Network operating system
 
Client Server models in JAVA
Client Server models in JAVAClient Server models in JAVA
Client Server models in JAVA
 
ConnectED 2015 BP302: Future-Proofing Enterprise IT
ConnectED 2015 BP302: Future-Proofing Enterprise ITConnectED 2015 BP302: Future-Proofing Enterprise IT
ConnectED 2015 BP302: Future-Proofing Enterprise IT
 

Viewers also liked

Viewers also liked (8)

AUS IT Handbook - Fall 2012
AUS IT Handbook - Fall 2012AUS IT Handbook - Fall 2012
AUS IT Handbook - Fall 2012
 
Ch05
Ch05Ch05
Ch05
 
Ch12
Ch12Ch12
Ch12
 
Ch10
Ch10Ch10
Ch10
 
Ch06
Ch06Ch06
Ch06
 
Ch01
Ch01Ch01
Ch01
 
Ch03
Ch03Ch03
Ch03
 
Ch04
Ch04Ch04
Ch04
 

Similar to Ch02

Ch2_Ed7_Network_Applications.ppt
Ch2_Ed7_Network_Applications.pptCh2_Ed7_Network_Applications.ppt
Ch2_Ed7_Network_Applications.pptFernandoLipardoJr
 
Application layer
Application layerApplication layer
Application layerFarah Hunny
 
Lecture 11 client_server_interaction
Lecture 11 client_server_interactionLecture 11 client_server_interaction
Lecture 11 client_server_interactionSerious_SamSoul
 
Introduction and Basics to web technology .pptx
Introduction and Basics to web technology .pptxIntroduction and Basics to web technology .pptx
Introduction and Basics to web technology .pptxLEENASAHU42
 
OIT552 Cloud Computing Material
OIT552 Cloud Computing MaterialOIT552 Cloud Computing Material
OIT552 Cloud Computing Materialpkaviya
 
C/S archtecture including basic networking
C/S archtecture including basic networkingC/S archtecture including basic networking
C/S archtecture including basic networkingabhinav2727
 
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...edirin aphunu
 
Data & Computation Interoperability in Cloud Services - Seamless Computations
Data & Computation Interoperability in Cloud Services - Seamless ComputationsData & Computation Interoperability in Cloud Services - Seamless Computations
Data & Computation Interoperability in Cloud Services - Seamless ComputationsSergey Boldyrev
 
Workload migration on the cloud
Workload migration on the cloudWorkload migration on the cloud
Workload migration on the cloudAlex Amies
 
Cloud Computing basic concept to understand
Cloud Computing basic concept to understandCloud Computing basic concept to understand
Cloud Computing basic concept to understandRahulBhole12
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdfGrigoryShkolnik1
 
Data center proposal
Data center proposalData center proposal
Data center proposalMuhammad Ahad
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Cisco Canada
 
4. system models
4. system models4. system models
4. system modelsAbDul ThaYyal
 
Web-Server & It's Architecture.pptx
Web-Server & It's Architecture.pptxWeb-Server & It's Architecture.pptx
Web-Server & It's Architecture.pptxAlokKumar250045
 
Introduction to Docker - 2017
Introduction to Docker - 2017Introduction to Docker - 2017
Introduction to Docker - 2017Docker, Inc.
 
The introduction of nexaweb flatform v4
The introduction of nexaweb flatform v4The introduction of nexaweb flatform v4
The introduction of nexaweb flatform v4Duc Nguyen
 
Cloud computing introduction
Cloud computing introductionCloud computing introduction
Cloud computing introductionLap Doan
 

Similar to Ch02 (20)

Ch11
Ch11Ch11
Ch11
 
Ch2_Ed7_Network_Applications.ppt
Ch2_Ed7_Network_Applications.pptCh2_Ed7_Network_Applications.ppt
Ch2_Ed7_Network_Applications.ppt
 
Application layer
Application layerApplication layer
Application layer
 
Lecture 11 client_server_interaction
Lecture 11 client_server_interactionLecture 11 client_server_interaction
Lecture 11 client_server_interaction
 
Introduction and Basics to web technology .pptx
Introduction and Basics to web technology .pptxIntroduction and Basics to web technology .pptx
Introduction and Basics to web technology .pptx
 
OIT552 Cloud Computing Material
OIT552 Cloud Computing MaterialOIT552 Cloud Computing Material
OIT552 Cloud Computing Material
 
C/S archtecture including basic networking
C/S archtecture including basic networkingC/S archtecture including basic networking
C/S archtecture including basic networking
 
Network operating system
Network operating systemNetwork operating system
Network operating system
 
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...
 
Data & Computation Interoperability in Cloud Services - Seamless Computations
Data & Computation Interoperability in Cloud Services - Seamless ComputationsData & Computation Interoperability in Cloud Services - Seamless Computations
Data & Computation Interoperability in Cloud Services - Seamless Computations
 
Workload migration on the cloud
Workload migration on the cloudWorkload migration on the cloud
Workload migration on the cloud
 
Cloud Computing basic concept to understand
Cloud Computing basic concept to understandCloud Computing basic concept to understand
Cloud Computing basic concept to understand
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdf
 
Data center proposal
Data center proposalData center proposal
Data center proposal
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
 
4. system models
4. system models4. system models
4. system models
 
Web-Server & It's Architecture.pptx
Web-Server & It's Architecture.pptxWeb-Server & It's Architecture.pptx
Web-Server & It's Architecture.pptx
 
Introduction to Docker - 2017
Introduction to Docker - 2017Introduction to Docker - 2017
Introduction to Docker - 2017
 
The introduction of nexaweb flatform v4
The introduction of nexaweb flatform v4The introduction of nexaweb flatform v4
The introduction of nexaweb flatform v4
 
Cloud computing introduction
Cloud computing introductionCloud computing introduction
Cloud computing introduction
 

Recently uploaded

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂşjo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Ch02

  • 1. Fundamentals of Business Data Communications 11th Edition Alan Dennis & Alexandra Durcikova John Wiley & Sons, Inc Dwayne Whitten, D.B.A Mays Business School Texas A&M University Copyright 2011 John Wiley & Sons, Inc 2-1
  • 2. Chapter 2 Network Applications Copyright 2011 John Wiley & Sons, Inc 2-2
  • 3. Chapter 2 Outline 2.1 - Introduction 2.2 - Application Architectures – Host-Based, Client-Based, Client-Server and Peer-to-Peer Architectures – Choosing Architectures 2.3 - World Wide Web – How the Web Works – Inside an HTTP Request & HTTP Response 2.4 - Electronic Mail – How E-Mail Works and Inside an SMTP Packet – Attachments in MIME 2.5 - Other Applications – Telnet, Instant Messaging, and Videoconferencing 2.6 – Implications for Management Copyright 2011 John Wiley & Sons, Inc 2-3
  • 4. 1.1 Introduction Applications Application Layer (e.g., email, web, word processing) Transport Layer Network Layer •Application architecture •The way in which the functions of the application layer software are spread among the clients and servers on the network •Functions of Application Layer – Data storage - Storing of data generated by programs (e.g., files, records) – Data access logic - Processing required to access stored data (e.g., SQL) – Application logic - Business logic such as word processors, spreadsheets – Presentation logic - Presentation of info to user & acceptance of user commands Copyright 2011 John Wiley & Sons, Inc 2-4
  • 5. • Clients • Servers - Personal computer - Mainframe - Terminal - Personal computer - Network computer - Cluster - Transaction terminal - Virtual server - Handheld Copyright 2011 John Wiley & Sons, Inc 2-5
  • 6. 2.2 Application Architectures • Determined by how functions of application programs are spread among clients and servers – Host-based Architectures • Server performs almost all functions – Client-based architectures • Client performs most functions – Client-server architectures • Functions shared between client and server Copyright 2011 John Wiley & Sons, Inc 2-6
  • 7. Host-Based Architectures – Client captures key strokes then sends them to the mainframe – Client displays information according to the server’s instructions Copyright 2011 John Wiley & Sons, Inc 2-7
  • 8. Host-based Architecture Problems • Host becoming a bottleneck – All processing done by the host, which can severely limit network performance • Host upgrades typically expensive and “lumpy” – Available upgrades require large scale and often costly jumps in processing and memory – Network demand grows more incrementally than does the host capacity – May see poor fit (too much or too little) between host performance and network demand Copyright 2011 John Wiley & Sons, Inc 2-8
  • 9. Client-Based Architectures Example: Using a word processing package on a PC and storing data files on a server Copyright 2011 John Wiley & Sons, Inc 2-9
  • 10. Client-Based Architecture Problems • Data traffic must travel back and forth between server and client – Example: when the client program is making a database query, the ENTIRE database must travel to the client before the query can be processed – Often the large file sizes moving across the LAN can yield a poor result in network performance Copyright 2011 John Wiley & Sons, Inc 2 - 10
  • 11. Client-Server Architectures Example: Using a Web browser to obtain web pages uses logic balanced between the client and server gic tio n lo t Ap plica n clien eo c an b server r a nd/o Copyright 2011 John Wiley & Sons, Inc 2 - 11
  • 12. Client-Server Architectures • Advantages – More efficient because of distributed processing – Allow hardware and software from different vendors to be used together – Enables cloud computing • Disadvantages – Difficulty in getting software from different vendors to work together smoothly – May require Middleware, a third category of software Copyright 2011 John Wiley & Sons, Inc 2 - 12
  • 13. Middleware client application programs a standard – Manages way of message translating transfers between Middleware – Insulates network software changes from the from clients (e.g., different adding a new vendors server) server application programs Examples of standards for Middleware: – Distributed Computing Environment (DCE) – Common Object Request Broker Architecture (CORBA) – Open Database Connectivity (ODBC) Copyright 2011 John Wiley & Sons, Inc 2 - 13
  • 14. Multi-tier Architectures • Involve more than two computers in distributing application program logic – 2-tier architecture • Uses clients and servers in a balance, very popular approach in simple LANs – 3-tier architecture • 3 sets of computers involved – N-tier architecture • More than three sets of computers used, more typical across complex organizations • Allows load balancing across servers Copyright 2011 John Wiley & Sons, Inc 2 - 14
  • 15. 3-tier Architecture Copyright 2011 John Wiley & Sons, Inc 2 - 15
  • 16. N-tier Architecture Copyright 2011 John Wiley & Sons, Inc 2 - 16
  • 17. Multi-tier Architectures • Advantages – Better load balancing: • More evenly distributed processing. (e.g., application logic distributed between several servers.) – More scalable: • Only servers experiencing high demand need be upgraded • Disadvantages – Heavily loaded network: • More distributed processing necessitates more data exchanges – Difficult to program and test due to increased complexity Copyright 2011 John Wiley & Sons, Inc 2 - 17
  • 18. Thin and Thick Clients • Classification depends on how much of the application logic resides on the client or server • Thin client: • Little or no application logic on client • Becoming popular because easier to manage, (only the server application logic generally needs to be updated) • The best example: World Wide Web architecture (uses a two-tier, thin client architecture) • Thick client: • All or most of the application logic resides on the client Copyright 2011 John Wiley & Sons, Inc 2 - 18
  • 19. Thin-Client Example: Web Architecture Copyright 2011 John Wiley & Sons, Inc 2 - 19
  • 20. Peer to Peer Architecture • All computers can serve as a client and a server • Increased popularity in the last decade due to the rise of P2P services such as Napster • Advantages: • Data can be stored anywhere on the network • Very resilient to failure • Disadvantages: • Finding data • Security Copyright 2011 John Wiley & Sons, Inc 2 - 20
  • 21. Criteria for Choosing Architecture • Infrastructure Cost – Cost of servers, clients, and circuits – Mainframes: very expensive; terminals, PCs: inexpensive • Development Cost – Mainly cost of software development – Software: expensive to develop; off-the-shelf software: inexpensive • Scalability – Ability to increase (or decrease) in computing capacity as network demand changes – Mainframes: not scalable; PCs: highly scalable Copyright 2011 John Wiley & Sons, Inc 2 - 21
  • 22. Choosing an Architecture Host-Based Client-Based Client-Server Cost of Infrastructure High Medium Low Cost of Development Low Medium Medium Scalability Low Medium High Copyright 2011 John Wiley & Sons, Inc 2 - 22
  • 23. Applications Layer Examples • World Wide Web • E-mail • File Transfer • Videoconferencing • Instant Messaging Copyright 2011 John Wiley & Sons, Inc 2 - 23
  • 24. 2.3 World Wide Web • Web began with two innovative ideas: – Hypertext • A document containing links to other documents – Uniform Resource Locators (URLs) • A formal way of identifying links to other documents • Invention of WWW (1989) – By Tim Berners-Lee at CERN in Switzerland • First graphical browser, Mosaic, (1993) – By Marc Andressen at NCSA in USA; later founded Netscape CERN - Conseil EuropĂ©en pour la Rechèrche NuclĂ©aire (Berners-Lee, T. (2000) Weaving the Web. New York: HarperCollins. P. 4) NCSA - National Center for Supercomputing Applications Copyright 2011 John Wiley & Sons, Inc 2 - 24
  • 25. How the Web Works Copyright 2011 John Wiley & Sons, Inc 2 - 25
  • 26. HTTP Request Message Request line (command, URL, HTTP version number) required (If the user types in the Request header optional URL by (information on the browser, themselves, date, and the referring page ) then the referring page is blank.) Request body (information sent to the server, optional such as from a form) Copyright 2011 John Wiley & Sons, Inc 2 - 26
  • 27. Example of an HTTP Request Note that this HTTP Request message has no “Body” part. Copyright 2011 John Wiley & Sons, Inc 2 - 27
  • 28. HTTP Response Message Response status (http version number, status code, reason) optional Response header optional (information on the server, date, URL of the page retrieved, format used ) Response body required (requested web page) Copyright 2011 John Wiley & Sons, Inc 2 - 28
  • 29. Example of an HTTP Response Copyright 2011 John Wiley & Sons, Inc 2 - 29
  • 30. HTML - Hypertext Markup Language • A language used to create Web pages • Also developed at CERN (initially for text files) • Tags are embedded in HTML documents – include information on how to format the file • Extensions to HTML needed to format multimedia files • XML - Extensible Markup Language – A new markup language becoming popular Copyright 2011 John Wiley & Sons, Inc 2 - 30
  • 31. 2.4 Electronic Mail Copyright 2011 John Wiley & Sons, Inc 2 - 31
  • 32. E-mail Standards • SMTP - Simple Mail Transfer Protocol – Main e-mail standard for • Originating user agent and the mail transfer agent • Between mail transfer agents – Originally written to handle only text files – Usually used in two-tier client-server architectures • Post Office Protocol (POP) and Internet Mail Access Protocol (IMAP) – Main protocols used between the receiver user agent and mail transfer agent – Main difference: with IMAP, messages can be left at the server after downloading them to the client • Other competing standards – Common Messaging Calls (CMC), X.400 Copyright 2011 John Wiley & Sons, Inc 2 - 32
  • 33. Two-Tier E-mail Architecture • User agent is another word for an e-mail client application – Run on client computers – Send e-mail to e-mail servers – Download e-mail from mailboxes on those servers – Examples: Eudora, Outlook, Netscape Messenger • Mail transfer agent is another word for the mail server application – Used by e-mail servers – Send e-mail between e-mail servers – Maintain individual mailboxes. Copyright 2011 John Wiley & Sons, Inc 2 - 33
  • 34. Host Based e-mail Architectures • An old method used on UNIX based hosts • Similar to client-server architecture, except – Client PC replaced by a terminal (or terminal emulator) • Sends all keystrokes to the server • Display characters received from the server – All software resides on the server • Takes client keystrokes and understand user’s commands • Creates SMTP packets and sends them to next mail server • Useful when traveling in locations with poor internet facilities Copyright 2011 John Wiley & Sons, Inc 2 - 34
  • 35. Web-based e-mail Copyright 2011 John Wiley & Sons, Inc 2 - 35
  • 36. Sample SMTP Message Note that this SMTP message has no attachments. Copyright 2011 John Wiley & Sons, Inc 2 - 36
  • 37. MIME • Multipurpose Internet Mail Extension – A graphics capable mail transfer agent protocol (to send graphical information in addition to text) • SMTP was designed years ago for text transfer only – MIME software is included as part of an e-mail client – Translates graphical information into text allowing the graphic to be sent as part of an SMTP message (as a special attachment) – Receiver’s e-mail client then translates the MIME attachment from text back into graphical format – MIME example Copyright 2011 John Wiley & Sons, Inc 2 - 37
  • 38. 2.5 Other Applications Copyright 2011 John Wiley & Sons, Inc 2 - 38
  • 39. Telnet • Allows one computer to log into another computer – Remote login enabling full control of the host • Requires an application program on the client computer and a Telnet server program on the server – Client program emulates a “dumb” terminal off the server • Most popular Telnet software is PuTTY – Open source – Uses SSH encryption for security • Requires account name and password – Anonymous sites similar to FTP approach Copyright 2011 John Wiley & Sons, Inc 2 - 39
  • 40. Instant Messaging (IM) • A client-server program that allows real-time typed messages to be exchanged – Client needs an IM client software – Server needs an IM server package • Some types allow voice and video packets to be sent – Like a telephone • Examples include AOL and ICQ • Two step process: – Telling IM server that you are online – Chatting Copyright 2011 John Wiley & Sons, Inc 2 - 40
  • 41. How Instant Messaging Works Copyright 2011 John Wiley & Sons, Inc 2 - 41
  • 42. Videoconferencing • Provides real time transmission of video and audio signals between two or more locations – Allows people to meet at the same time in different locations – Saves money and time by not having to move people around – Typically involves matched special purpose rooms with cameras and displays • Desktop videoconferencing – Low cost application linking small video cameras and microphones together over the Internet – No need for special rooms – Example: Net Meeting software on clients communicating through a common videoconference server Copyright 2011 John Wiley & Sons, Inc 2 - 42
  • 43. Cisco Videoconferencing Copyright 2011 John Wiley & Sons, Inc 2 - 43
  • 44. Cisco Videoconferencing Copyright 2011 John Wiley & Sons, Inc 2 - 44
  • 45. Videoconferencing Standards • Proprietary early systems • Common standards in use today – H.320 • Designed for room-to-room videoconferencing over high-speed phone lines – H.323 • Family of standards designed for desktop videoconferencing and just simple audio conferencing over Internet – MPEG-2 • Designed for faster connections such as LAN or privately owned WANs Copyright 2011 John Wiley & Sons, Inc 2 - 45
  • 46. Webcasting • Special type of uni-directional videoconferencing – Content is sent from the server to users • Process – Content created by developer – Downloaded as needed by the user – Played by a plug-in to a Web browser • No standards for webcasting yet – Defacto standards: products by RealNetworks Copyright 2011 John Wiley & Sons, Inc 2 - 46
  • 47. 2.6 Implications for Management • Network may be used to provide a worry-free environment for applications – Network is the critical infrastructure over which the wide variety of strategic applications enable an organization to compete in its environment – The applications running on the network have the potential for changing the organization • Dramatic increase in number and type of applications – Rapid growth in amount and type of networking traffic over time • Different implication on network design and management • Increased operating cost for the network function Copyright 2011 John Wiley & Sons, Inc 2 - 47
  • 48. Copyright 2011 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in section 117 of the 1976 United States Copyright Act without express permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages caused by the use of these programs or from the use of the information herein. Copyright 2011 John Wiley & Sons, Inc 2 - 48