SlideShare a Scribd company logo
EVOLUTION OF COMPUTING ARCHITECTURES 
Aim: To discuss the evolution of client server 
architecture for various computing models. 
There are three system architectures, 
1. Centralized system 
2. File Server Architecture 
3. Client server system
CENTRALIZED SYSTEM ARCHITECTURE 
Companies that needed real computing 
power turned to the mainframe computer, 
which is a centralized system architecture. 
Salient feature: Only movement of 
marshalling are the keystrokes between the 
client and the host machine. 
Marshalling is the process of packaging 
interface elements and sending them across process 
boundaries.
In Centralized System, keystrokes are marshalled 
from the terminal to the host. 
Network Server 
DATA 
Terminal 1 Terminal 2 Terminal 3 Terminal 4
Merits 
 Excellent security 
 Centralized administration as both application 
logic and data reside on the same machine 
Demerits 
 Expensive to buy, lease, maintain and use. 
 Both the application and the database are housed 
within the same machine process thereby offering no 
way to truly partition the application logic beyond the 
physical of the mainframe.
FILE SERVER ARCHITECTURE 
• This brought a complete change in the 
implementation of the computer architecture 
• In this system, the application logic was 
executed on the client workstation instead of 
the server. 
• These servers provide access to computing 
resources like printers and large hard drives
File server architecture 
Disk I/O Requests 
Disk Blocks 
DATA 
Network Server 
Workstation 1 Workstation 2 Workstation 3 Workstation 4 
Application 
Logic 1 
Application 
Logic 4 
Application 
Logic 3 
Application 
Logic 2
MERITS: 
It has the low cost entry point with flexible 
arrangement 
Computer resources can be added or 
reduced as and when necessary using this 
system. 
DEMERITS: 
All application logic is executed on the 
client machine. This results in the client 
machine’s need for a large amount of power 
to run the application.
CLIENT SERVER MODEL 
This is a process involving a minimum of 
two independent entities, one is the client and 
the other is the server. 
The client makes a request to the server 
and the server services the requests and the 
resulting data is sent to the client. 
In this application, two separate applications 
operating independently could work together 
to complete a task.
SQL (Structured Query Language based Database 
Management System)is the implementation of this 
concept. 
Disk I/O 
Requests 
Disk 
DATA 
Network Server 
Workstation 1 Workstation 2 Workstation 3 Workstation 4 
Application 
Logic 
Application 
Logic 
Application 
Logic 
Application 
Logic 
Application 
logic
The most popular client server applications 
revolve round the use of DBMS such as Oracle 
and Microsoft SQL server. These applications 
are referred to as back-ends and offer support 
for storage, manipulation and retrieval of 
business persistent data. They use SQL as a 
standard method for submitting client 
requests. 
The significance of distributing the 
application logic between the client and 
server offers a faster and more cost-effective 
performance.
File Server v/s Client Server Database 
Deployment 
With the advent and popularity of 
Microsoft Access using the Microsoft 
Database file(MDB) to store data, this is not 
a client server implementation but a file 
server implementation.
CASE STUDY 
Assume that we have a set of data stored 
in an MDB file namely Student_Info.mdb. This 
file holds the details of the marks scored in 
different subjects by students. A client want to 
know as how many students scored 100% in 
more than two subjects. 
A query is sent to obtain the results.
Query Sent to a File Server System 
• In this case, the query is not sent to the server. 
• The logic of the query is processed and 
evaluated at the client end itself. 
• The query logic realizes that it needs to access a 
table namely Student_Info in the MDB in order 
to process the request. 
• No logic is executed at the server end except the 
transferring of file disk blocks.
Query Sent to a Client Server System 
• Here the actual SQL statement is sent across the 
network and processed by an application running 
locally on the server machine 
• As the SQL statements is processed on the server, 
only the results need to be sent back to the client. 
• Advantage: Reduced network traffic and an 
incredibly quick execution time. 
To meet the challenges presented by a 
business environment, a new three-tier or n-tier 
client server approach has been introduced
Two-Tier Client Server Model 
• In this mode, a desktop machine operates as a 
client and a network server functions as a back-end 
database engine. 
• The logic in a two-tier model is split between the 
two physical locations namely the server and the 
client. 
• In Visual Basic, using any of the data controls 
that provide a graphical link to the back-end 
data source creates a two-tier client server 
relationship.
Limitations of Two-Tier Client Server 
Model 
• Not Scalable Inability of a two-tier approach to 
grow beyond the physical boundaries of a client 
and server machine 
• Unmanageable Business rules cannot be 
encapsulated and deployed centrally because of 
which sharing common processes and re-using 
work becomes difficult 
• Poor Performance The graphical interface 
binding to the data consumes major resources 
on the client machine which results in poor 
performance and dissatisfied clients.
Three-Tier Client Server Model 
• This model is based on the ability to build 
partitioned applications. 
• Partitioning an application breaks the code 
into logical components. 
• Each tier is called a service. These services are 
shared between that client and the servers. 
• The components can be logically grouped into 
three tiers: user services, business services and 
data services.
Service Location 
User Services Client 
Business logic Server 
Data Services Server 
The three-tier logic can be extended to 
any number of tiers/services known as Multi- 
Tier or n-tier architecture.
Values of the Three-Tier Client Server 
Development 
• Reuse The time invested in designing and 
implementing components is not wasted as they 
can be shared among applications. 
• Performance As components can be placed on 
machines other than the client workstation, load 
processing can be shifted from a client machine 
that may be underpowered to a server with extra 
horsepower. This offers the user best possible 
methods for each aspect of an application’s 
execution, resulting in better performance.
• Manageability Encapsulation of application’s 
services into components allows the user to 
break down large, complex application’s into 
more manageable parts. 
• Maintenance Centralizing components for 
reuse has an added benefit. They become 
easier to redeploy after any amendments are 
made in the order to keep pace with business 
needs.

More Related Content

What's hot

SQL, Embedded SQL, Dynamic SQL and SQLJ
SQL, Embedded SQL, Dynamic SQL and SQLJSQL, Embedded SQL, Dynamic SQL and SQLJ
SQL, Embedded SQL, Dynamic SQL and SQLJ
Dharita Chokshi
 
Components of .NET Framework
Components of .NET FrameworkComponents of .NET Framework
Components of .NET Framework
Roshith S Pai
 
Windowforms controls c#
Windowforms controls c#Windowforms controls c#
Windowforms controls c#
prabhu rajendran
 
PL/SQL Introduction and Concepts
PL/SQL Introduction and Concepts PL/SQL Introduction and Concepts
PL/SQL Introduction and Concepts
Bharat Kalia
 
Integrity constraints in dbms
Integrity constraints in dbmsIntegrity constraints in dbms
Integrity constraints in dbms
Vignesh Saravanan
 
Triggers and active database
Triggers and active databaseTriggers and active database
Triggers and active database
BalaMuruganSamuthira
 
2 tier and 3 tier architecture
2 tier and 3 tier architecture2 tier and 3 tier architecture
2 tier and 3 tier architecture
baabtra.com - No. 1 supplier of quality freshers
 
Asp net
Asp netAsp net
Constraints In Sql
Constraints In SqlConstraints In Sql
Constraints In SqlAnurag
 
Object Oriented Concepts and Principles
Object Oriented Concepts and PrinciplesObject Oriented Concepts and Principles
Object Oriented Concepts and Principles
deonpmeyer
 
Chapter 1 Fundamentals of Database Management System
Chapter 1 Fundamentals of Database Management SystemChapter 1 Fundamentals of Database Management System
Chapter 1 Fundamentals of Database Management System
Eddyzulham Mahluzydde
 
Visual basic databases
Visual basic databasesVisual basic databases
Visual basic databases
Speed Cyber Cafe
 
Normalization
NormalizationNormalization
Normalization
Salman Memon
 

What's hot (20)

Sdi & mdi
Sdi & mdiSdi & mdi
Sdi & mdi
 
SQL, Embedded SQL, Dynamic SQL and SQLJ
SQL, Embedded SQL, Dynamic SQL and SQLJSQL, Embedded SQL, Dynamic SQL and SQLJ
SQL, Embedded SQL, Dynamic SQL and SQLJ
 
Components of .NET Framework
Components of .NET FrameworkComponents of .NET Framework
Components of .NET Framework
 
Windowforms controls c#
Windowforms controls c#Windowforms controls c#
Windowforms controls c#
 
PL/SQL Introduction and Concepts
PL/SQL Introduction and Concepts PL/SQL Introduction and Concepts
PL/SQL Introduction and Concepts
 
Web forms in ASP.net
Web forms in ASP.netWeb forms in ASP.net
Web forms in ASP.net
 
Integrity constraints in dbms
Integrity constraints in dbmsIntegrity constraints in dbms
Integrity constraints in dbms
 
Mysql ppt
Mysql pptMysql ppt
Mysql ppt
 
Sql ppt
Sql pptSql ppt
Sql ppt
 
Oops concept on c#
Oops concept on c#Oops concept on c#
Oops concept on c#
 
Triggers and active database
Triggers and active databaseTriggers and active database
Triggers and active database
 
2 tier and 3 tier architecture
2 tier and 3 tier architecture2 tier and 3 tier architecture
2 tier and 3 tier architecture
 
Asp net
Asp netAsp net
Asp net
 
Constraints In Sql
Constraints In SqlConstraints In Sql
Constraints In Sql
 
Object Oriented Concepts and Principles
Object Oriented Concepts and PrinciplesObject Oriented Concepts and Principles
Object Oriented Concepts and Principles
 
Chapter 1 Fundamentals of Database Management System
Chapter 1 Fundamentals of Database Management SystemChapter 1 Fundamentals of Database Management System
Chapter 1 Fundamentals of Database Management System
 
Concurrency
ConcurrencyConcurrency
Concurrency
 
Visual basic databases
Visual basic databasesVisual basic databases
Visual basic databases
 
Normalization
NormalizationNormalization
Normalization
 
Normalization in databases
Normalization in databasesNormalization in databases
Normalization in databases
 

Similar to Odbc and data access objects

Client computing evolution ppt11
Client computing evolution ppt11Client computing evolution ppt11
Client computing evolution ppt11Tech_MX
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
RituBhargava7
 
Introduction and Basics to web technology .pptx
Introduction and Basics to web technology .pptxIntroduction and Basics to web technology .pptx
Introduction and Basics to web technology .pptx
LEENASAHU42
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
Bhargav Amin
 
Ch2_Ed7_Network_Applications.ppt
Ch2_Ed7_Network_Applications.pptCh2_Ed7_Network_Applications.ppt
Ch2_Ed7_Network_Applications.ppt
FernandoLipardoJr
 
Client server computing
Client server computingClient server computing
Client server computingjorge cabiao
 
Client Server Architecture
Client Server ArchitectureClient Server Architecture
Client Server Architecturesuks_87
 
UNIT3 DBMS.pptx operation nd management of data base
UNIT3 DBMS.pptx operation nd management of data baseUNIT3 DBMS.pptx operation nd management of data base
UNIT3 DBMS.pptx operation nd management of data base
shindhe1098cv
 
Advanced database protocols
Advanced database protocolsAdvanced database protocols
Advanced database protocols
Hitesh Mohapatra
 
Slides ch-5-the definitive guide to cloud computing -by- dan sullivan
Slides  ch-5-the definitive guide to cloud computing -by- dan sullivanSlides  ch-5-the definitive guide to cloud computing -by- dan sullivan
Slides ch-5-the definitive guide to cloud computing -by- dan sullivan
MeherFatima8
 
SOFTWARE COMPUTING
SOFTWARE COMPUTINGSOFTWARE COMPUTING
SOFTWARE COMPUTING
DrThenmozhiKarunanit
 
Case Study For Replication For PCMS
Case Study For Replication For PCMSCase Study For Replication For PCMS
Case Study For Replication For PCMS
Shahzad
 
Client Server Architecture...pptx
Client Server Architecture...pptxClient Server Architecture...pptx
Client Server Architecture...pptx
praladbaral
 
Enterprise java unit-1_chapter-2
Enterprise java unit-1_chapter-2Enterprise java unit-1_chapter-2
Enterprise java unit-1_chapter-2
sandeep54552
 
enterprisejavaunit-1chapter-2-210914075956.pdf
enterprisejavaunit-1chapter-2-210914075956.pdfenterprisejavaunit-1chapter-2-210914075956.pdf
enterprisejavaunit-1chapter-2-210914075956.pdf
EidTahir
 
client-server-architecture.ppt
client-server-architecture.pptclient-server-architecture.ppt
client-server-architecture.ppt
gowriganesh
 
client-server-architecture ss.ppt
client-server-architecture ss.pptclient-server-architecture ss.ppt
client-server-architecture ss.ppt
OsmanGani61
 

Similar to Odbc and data access objects (20)

Client computing evolution ppt11
Client computing evolution ppt11Client computing evolution ppt11
Client computing evolution ppt11
 
Technical Architectures
Technical ArchitecturesTechnical Architectures
Technical Architectures
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
 
Client server computing
Client server computingClient server computing
Client server computing
 
Introduction and Basics to web technology .pptx
Introduction and Basics to web technology .pptxIntroduction and Basics to web technology .pptx
Introduction and Basics to web technology .pptx
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
 
Ch2_Ed7_Network_Applications.ppt
Ch2_Ed7_Network_Applications.pptCh2_Ed7_Network_Applications.ppt
Ch2_Ed7_Network_Applications.ppt
 
Client server computing
Client server computingClient server computing
Client server computing
 
Clientserver
ClientserverClientserver
Clientserver
 
Client Server Architecture
Client Server ArchitectureClient Server Architecture
Client Server Architecture
 
UNIT3 DBMS.pptx operation nd management of data base
UNIT3 DBMS.pptx operation nd management of data baseUNIT3 DBMS.pptx operation nd management of data base
UNIT3 DBMS.pptx operation nd management of data base
 
Advanced database protocols
Advanced database protocolsAdvanced database protocols
Advanced database protocols
 
Slides ch-5-the definitive guide to cloud computing -by- dan sullivan
Slides  ch-5-the definitive guide to cloud computing -by- dan sullivanSlides  ch-5-the definitive guide to cloud computing -by- dan sullivan
Slides ch-5-the definitive guide to cloud computing -by- dan sullivan
 
SOFTWARE COMPUTING
SOFTWARE COMPUTINGSOFTWARE COMPUTING
SOFTWARE COMPUTING
 
Case Study For Replication For PCMS
Case Study For Replication For PCMSCase Study For Replication For PCMS
Case Study For Replication For PCMS
 
Client Server Architecture...pptx
Client Server Architecture...pptxClient Server Architecture...pptx
Client Server Architecture...pptx
 
Enterprise java unit-1_chapter-2
Enterprise java unit-1_chapter-2Enterprise java unit-1_chapter-2
Enterprise java unit-1_chapter-2
 
enterprisejavaunit-1chapter-2-210914075956.pdf
enterprisejavaunit-1chapter-2-210914075956.pdfenterprisejavaunit-1chapter-2-210914075956.pdf
enterprisejavaunit-1chapter-2-210914075956.pdf
 
client-server-architecture.ppt
client-server-architecture.pptclient-server-architecture.ppt
client-server-architecture.ppt
 
client-server-architecture ss.ppt
client-server-architecture ss.pptclient-server-architecture ss.ppt
client-server-architecture ss.ppt
 

Recently uploaded

Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
KrzysztofKkol1
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024
Sharepoint Designs
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
varshanayak241
 
Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
ayushiqss
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
NaapbooksPrivateLimi
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
XfilesPro
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 

Recently uploaded (20)

Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
 
Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 

Odbc and data access objects

  • 1.
  • 2. EVOLUTION OF COMPUTING ARCHITECTURES Aim: To discuss the evolution of client server architecture for various computing models. There are three system architectures, 1. Centralized system 2. File Server Architecture 3. Client server system
  • 3. CENTRALIZED SYSTEM ARCHITECTURE Companies that needed real computing power turned to the mainframe computer, which is a centralized system architecture. Salient feature: Only movement of marshalling are the keystrokes between the client and the host machine. Marshalling is the process of packaging interface elements and sending them across process boundaries.
  • 4. In Centralized System, keystrokes are marshalled from the terminal to the host. Network Server DATA Terminal 1 Terminal 2 Terminal 3 Terminal 4
  • 5. Merits  Excellent security  Centralized administration as both application logic and data reside on the same machine Demerits  Expensive to buy, lease, maintain and use.  Both the application and the database are housed within the same machine process thereby offering no way to truly partition the application logic beyond the physical of the mainframe.
  • 6. FILE SERVER ARCHITECTURE • This brought a complete change in the implementation of the computer architecture • In this system, the application logic was executed on the client workstation instead of the server. • These servers provide access to computing resources like printers and large hard drives
  • 7. File server architecture Disk I/O Requests Disk Blocks DATA Network Server Workstation 1 Workstation 2 Workstation 3 Workstation 4 Application Logic 1 Application Logic 4 Application Logic 3 Application Logic 2
  • 8. MERITS: It has the low cost entry point with flexible arrangement Computer resources can be added or reduced as and when necessary using this system. DEMERITS: All application logic is executed on the client machine. This results in the client machine’s need for a large amount of power to run the application.
  • 9. CLIENT SERVER MODEL This is a process involving a minimum of two independent entities, one is the client and the other is the server. The client makes a request to the server and the server services the requests and the resulting data is sent to the client. In this application, two separate applications operating independently could work together to complete a task.
  • 10. SQL (Structured Query Language based Database Management System)is the implementation of this concept. Disk I/O Requests Disk DATA Network Server Workstation 1 Workstation 2 Workstation 3 Workstation 4 Application Logic Application Logic Application Logic Application Logic Application logic
  • 11. The most popular client server applications revolve round the use of DBMS such as Oracle and Microsoft SQL server. These applications are referred to as back-ends and offer support for storage, manipulation and retrieval of business persistent data. They use SQL as a standard method for submitting client requests. The significance of distributing the application logic between the client and server offers a faster and more cost-effective performance.
  • 12. File Server v/s Client Server Database Deployment With the advent and popularity of Microsoft Access using the Microsoft Database file(MDB) to store data, this is not a client server implementation but a file server implementation.
  • 13. CASE STUDY Assume that we have a set of data stored in an MDB file namely Student_Info.mdb. This file holds the details of the marks scored in different subjects by students. A client want to know as how many students scored 100% in more than two subjects. A query is sent to obtain the results.
  • 14. Query Sent to a File Server System • In this case, the query is not sent to the server. • The logic of the query is processed and evaluated at the client end itself. • The query logic realizes that it needs to access a table namely Student_Info in the MDB in order to process the request. • No logic is executed at the server end except the transferring of file disk blocks.
  • 15. Query Sent to a Client Server System • Here the actual SQL statement is sent across the network and processed by an application running locally on the server machine • As the SQL statements is processed on the server, only the results need to be sent back to the client. • Advantage: Reduced network traffic and an incredibly quick execution time. To meet the challenges presented by a business environment, a new three-tier or n-tier client server approach has been introduced
  • 16. Two-Tier Client Server Model • In this mode, a desktop machine operates as a client and a network server functions as a back-end database engine. • The logic in a two-tier model is split between the two physical locations namely the server and the client. • In Visual Basic, using any of the data controls that provide a graphical link to the back-end data source creates a two-tier client server relationship.
  • 17. Limitations of Two-Tier Client Server Model • Not Scalable Inability of a two-tier approach to grow beyond the physical boundaries of a client and server machine • Unmanageable Business rules cannot be encapsulated and deployed centrally because of which sharing common processes and re-using work becomes difficult • Poor Performance The graphical interface binding to the data consumes major resources on the client machine which results in poor performance and dissatisfied clients.
  • 18. Three-Tier Client Server Model • This model is based on the ability to build partitioned applications. • Partitioning an application breaks the code into logical components. • Each tier is called a service. These services are shared between that client and the servers. • The components can be logically grouped into three tiers: user services, business services and data services.
  • 19. Service Location User Services Client Business logic Server Data Services Server The three-tier logic can be extended to any number of tiers/services known as Multi- Tier or n-tier architecture.
  • 20. Values of the Three-Tier Client Server Development • Reuse The time invested in designing and implementing components is not wasted as they can be shared among applications. • Performance As components can be placed on machines other than the client workstation, load processing can be shifted from a client machine that may be underpowered to a server with extra horsepower. This offers the user best possible methods for each aspect of an application’s execution, resulting in better performance.
  • 21. • Manageability Encapsulation of application’s services into components allows the user to break down large, complex application’s into more manageable parts. • Maintenance Centralizing components for reuse has an added benefit. They become easier to redeploy after any amendments are made in the order to keep pace with business needs.