0% found this document useful (0 votes)
17 views13 pages

Assignment Series 107

The document discusses client-server architecture, detailing its components, types, and the roles of clients and servers in data processing. It also covers virtualization in cloud computing, emphasizing its significance, characteristics, and various types, such as desktop and server virtualization. The conclusion highlights the importance of virtualization in optimizing IT resource utilization within cloud computing.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views13 pages

Assignment Series 107

The document discusses client-server architecture, detailing its components, types, and the roles of clients and servers in data processing. It also covers virtualization in cloud computing, emphasizing its significance, characteristics, and various types, such as desktop and server virtualization. The conclusion highlights the importance of virtualization in optimizing IT resource utilization within cloud computing.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

[ASSIGNMENT SERIES-107] [2024EV0016]

CLIENT-SERVER ARCHITECTURE
2024EV0016
DEPARTMENT OF ARTIFICIAL INTELLIGENCE AND MACHINE
LEARNING
SARANYA T (7376222AL195)

1.INTRODUCTION:
In the client/server distributed computing paradigm, client apps ask server processes for
services.In other words, a computing model is what happens when a client or server requests the
implication of services. These operate different computer networking processes that are related.
It indicates that when messages are sent over networking, a client application is a system.These
message requests fulfill a special purpose since they keep track of which parts of files can be
returned on computer hardware.

Fig:1. Client-server Architecture

Client-server computing refers to the kind of system where a single, powerful


workstation fulfills the requests of other computers. An interconnected group of computers that
share resources is called a computer network.Client-server computing refers to the kind of
system where a single, powerful workstation fulfills the requests of other computers. An
interconnected group of computers that share resources is called a computer network.

1
[ASSIGNMENT SERIES-107] [2024EV0016]

2.CLIENT-SERVER ARCHITECTURE:
There are different sections to the data processing. Either the requester (client) or the
provider (server) makes up a part. During the data processing process, the client sends one or
more requests to the servers asking them to carry out particular actions. The client services are
provided by the server component. The description of a client-server system uses the client
device's location to determine which server will host a virtual computer. It indicates that the
client device's location is displayed virtually as a computer that a client-server system has
chosen.

Fig:2. Basic Structure of client-server architecture

2.1.CLIENT:
A client is a single station that provides improved computer facilities and presentation
services for various commercial and trade uses, as well as connection establishment and database
provision. Some clients utilize the latest GUI images that are readily available to them, can be
employed for a variety of tasks, and are retained for work. The ideal example of a desktop
metaphor is one that allows files to be stored and printed without any issues. Many other clients
can readily use the facilities that the client supplies.

2.2.SERVER:
A server is a multi-dimensional memory sharing device for linked computers that
offers services to the relevant industry. Usually, these servers wait for requests from clients
before covering hypothetical organizations that can be altered by a server's action. The services
are stored and shielded from clients in a hidden system via the file sharing system. Message
formats on PCs are preserved in their original format. It is important to remember, though, that
these servers are also utilized by other services.

2
[ASSIGNMENT SERIES-107] [2024EV0016]

3.TYPES OF CLIENT-SERVER ARCHITECTURE:


The client server architectures are of three types:
➢ File Server Architecture
➢ Database Server Architecture
➢ Three-tier Architecture

Fig:3. Types of client-server architecture

3.1.FILE SERVER ARCHITECTURE:


The file server architecture is the first client-server architecture currently under
development. All processing will take place at the PC that received the request for data; this PC
manages most of the processing, presentation, and storage logic. This indicates that more than
80% of the work will be completed on the client's end, out of the 100% of the work that has to be
completed for all application logics that we have seen, such as display logic, processing logic,
and storage logic.

3.2.DATABASE SERVER ARCHITECTURE:


It is comparable to the data warehouse where websites keep or store their information and
data. A LAN computer devoted to database storage and retrieval is called a database server.
Databases and the Database Management System (DBMS) are stored on the database server. It
retrieves specific records from the database and sends them back across the network in response
to requests from the client computers. A server that is devoted to provide database services is
known as a database server. The database software is operated by such a server. In a client-server

3
[ASSIGNMENT SERIES-107] [2024EV0016]

setting, a database server is commonly observed furnishing the requested information to the
client systems.

3.3.THREE TIER ARCHITECTURE:


➢ Presentation Layer
➢ Logic Tier
➢ Data Layer

3.3.1.Presentation Layer:
The previously described user interaction occurs in the presentation layer. When a user
inputs an address into a web browser, the host name is translated to an IP address and the URL is
decoded into protocol/host/file. Next, using the proper protocol, an issue request is submitted to
the remote server (typically HTTP). Additionally, an HTML response from the logic tier could
be approved. User input of a variety of form controls is accepted, and client side script
interaction (e.g., using DHTML) is supported in the presentation layer.

3.3.2.Logic Tier:
The functionality of the program is carried out in the logic layer by carefully processing
the data from the presentation layer. This can be supported by a server like Apache (or IIS) or a
server script like PHP. The relevant action to be taken, such as retrieving a file or sending a
request to an interpreter, is identified with Server (Apache or IIS). Additionally, it returns an
output in a MIME package to the caller. As a result, multithreading (allowing many processors
to execute concurrently) and caching (keeping results in a temporary storage to reduce
recalculation) are achieved, supporting thousands of concurrent users. Server scripts, such as
those written in PHP, are used to communicate with servers and perform tasks like reading and
creating input.

3.3.3.Data Layer:
Table servers make up this tier. Standard languages like SQL queries are used to
communicate with the database using TCP/IP and database-specific protocols. When new data is

4
[ASSIGNMENT SERIES-107] [2024EV0016]

added, updated, or deleted, for instance, the data structures (such tables) are defined and altered
by themself. Data should be recovered from and kept using backups. Optimizing access to query
compilation should involve indexing or replicating tables. Technology that makes use of this
would be the.NET framework, which comes with ADO.NET, which has a feature that allows it to
query databases for data and deliver it to callers either connected or detached.

Fig:4. Three-tier architecture

4.COMPONENTS OF CLIENT-SERVER NETWORK:


➢ Workstations or clients.
➢ Servers.
➢ Network Devices: They maintain correct, collision-free information routing while also
serving as a conduit between clients and servers.
➢ Additional parts, such as printers and scanners, may also be linked to the network
architecture.

5.CONCLUSION:
A client device can carry out the role of using a technology for the chosen server. A client
server technology can be assigned to servers that are connected in different locations. Each
technology is accountable for its use as a client device. Many new technologies are being
employed for client-server systems nowadays. This paper highlights two such technologies:
massively multiplayer online games (MMOGs) and point of sale (POS) systems, both of which

5
[ASSIGNMENT SERIES-107] [2024EV0016]

are important in human existence. Although they have many benefits, they also have drawbacks,
such as potential security threats and issues with appropriate operation.

BIBLIOGRAPHY:
1. [About client-server architecture], [CLIENT AND SERVER MODEL],
[https://www.javatpoint.com/computer-network-client-and-server-model]
2. D. Brown. (2007) Client/Server Systems Development. Government technology.2007

6
[ASSIGNMENT SERIES - 107] [2024EV0019]

EVOLUTION OF VIRTUALIZATION CLOUD COMPUTING


2024EV0019
DEPARTMENT OF ARTIFICIAL INTELLIGENCE AND MACHINE
LEARNING
SARANYA T (7376222AL195)

1.INTRODUCTION:
The primary reason for virtualization in cloud computing is the necessity to divide
resources in order to increase their efficiency and fortify computing power silos with additional
security measures. To distribute the server's capabilities among various environments and users,
for example, you can divide its capacity into smaller segments. In essence, it produces a virtual
resource that operates independently of actual hardware on an abstract layer.

Fig:1. Virtualization in cloud computing

Cloud computing is among the more popular applications. A computing environment can
operate multiple separate systems, often known as virtual machines, simultaneously thanks to
virtualization. These virtual machines (VMs) are controlled and supervised by a separate
software interface known as a hypervisor, and they share the same physical IT infrastructure.

2.VIRTUALIZATION IN CLOUD COMPUTING:


Being the foundation of cloud computing, virtualization is among the most economical,
energy-efficient, and hardware-saving methods. The technique of giving physical storage in

7
[ASSIGNMENT SERIES - 107] [2024EV0019]

cloud computing a name and making it available on demand is known as virtualization.


Additionally, it offers a virtual environment for networking, storage, and memory. A host
computer and a guest machine are present. Because virtualization is a key component in
providing Infrastructure as a Service for cloud computing, it might be regarded as synonymous
with hardware virtualization.

3.CLOUD COMPUTING:
A system known as "cloud computing" uses off-site data centers with internet
connectivity to offer on-demand services. It is a well-known technique that is employed
extensively worldwide.Because workers can use distant applications that are available outside of
their worksite via internet-connected devices, cloud computing got its moniker. Cloud computing
has many benefits, including faster maintenance, lower IT expenses, democratized access,
versatility, security, and scalability.

3.1.THREE-TIER OF CLOUD COMPUTING:


Cloud computing has three-tier services, such as Software as a Services (SaaS), Platform
as a Service (PaaS) and Infrastructure as a Service (IaaS).

Fig:2. Three-tier of cloud computing

3.1.1.SOFTWARE AS A SERVICES:
➢ In SaaS, users can access applications on-demand or through a pay-as-you-go approach
provided by the cloud provider. The user does not need to install the program or purchase
a license in order to enjoy the services.

8
[ASSIGNMENT SERIES - 107] [2024EV0019]

➢ Platforms like Dropbox, Google Docs, and Microsoft Office 365 are included in this
approach.

3.1.2.PLATFORM AS A SERVICE:
➢ In PaaS, The third-party provider provides both the software application platforms and
the hardware. Development tools, middleware, operating systems, database management
systems, and infrastructure are all provided by PaaS providers.
➢ Platforms like Heroku, SAP Cloud, and Aneka are included in this paradigm.

3.1.3.INFRASTRUCTURE AS A SERVICE:
➢ In Infrastructure as a Service (IaaS), public cloud providers charge per use for everything
from servers to operating systems.
➢ Platforms such as Microsoft Azure and Amazon Web Services (AWS) are part of this
strategy.

4.CHARACTERISTICS OF VIRTUALIZATION:
There are several characteristics of virtualization, such as sharing, emulation, isolation,
and increased security.

Fig:3. Characteristics of virtualization

9
[ASSIGNMENT SERIES - 107] [2024EV0019]

4.1.SHARING:
Within the same host, businesses are able to establish distinct computer environments.
Both the quantity of running servers and power use are decreased. Virtualization permits
aggregation in addition to sharing of physically available resources. A single virtual host can be
used to represent groups of several hosts. Utilizing the physical resources of a homogeneous
group of devices to be perceived as a single source is its goal.

4.2.EMULATION:
Emulation is the process of running several guest programs in a virtualization
layer-controlled environment. An entirely new setting can be mimicked to enable guest programs
to run even when they are not physically present in the host.

4.3.ISOLATION:
It is possible to run guest programs in the operating system, an application, etc. with their
own separated contexts. In order to access the underlying resources, these guest programs
interact with the abstraction layer. The virtual machine (VM) monitors visitor behavior and
stops actions that can endanger the host.

4.4.INCREASED SECURITY:
The host has more transparent control over how each and every guest program is
executed thanks to virtualization. Virtual manager computers safeguard the execution
environment by filtering, regulating, and controlling the actions of guest programs. Along with
the aforementioned traits, cloud computing virtualization also comes in several forms. Here is a
list of them, each of which helps businesses in a different way.

5.TYPES OF VIRTUALIZATIONS IN CLOUD COMPUTING:


★ Desktop virtualization
★ Server Virtualization
★ Storage Virtualization
★ Application virtualization

10
[ASSIGNMENT SERIES - 107] [2024EV0019]

★ Network Virtualization
★ Data Virtualization

Fig:4. Types of virtualization

5.1.DESKTOP VIRTUALIZATION:
This kind of virtualization is also known as the client-server computer model. The ability
to store an operating system on a server in a data center is provided by desktop virtualization.
This kind of virtualization enables workers to simply operate from home. There is little chance of
data theft because the data transport is safe. VMware ThinApps, Citrix XenApps, VMware View,
and Microsoft Remote Desktop Services are a few instances of desktop virtualization.

5.2.SERVER VIRTUALIZATION:
Processing capacity and server power are connected to server virtualization. It is possible
for each virtual server to function independently of the others, and any server may provide
resources to the apps. By altering the ID number, the real server can be separated into several
virtual servers.

5.3.STORAGE VIRTUALIZATION:
One of the most popular uses in cloud computing is virtual storage. It facilitates the
separation of storage infrastructure from the physical resources. As an example, the virtual
resource is created by pooling the physical storage, and then the virtual storage is allotted and
utilized. It enables more effective storage, centralized administration, and a less complicated
transfer procedure.

11
[ASSIGNMENT SERIES - 107] [2024EV0019]

5.4.APPLICATION VIRTUALIZATION:
With the use of application virtualization, a user can operate a computer program
independently of the hardware or software. Using application virtualization will make it easier
for an organization to update, maintain, and fix the apps. Administrators can change and manage
the application's access rights without having to log into the user's desktop. Portability is an
additional advantage of this kind of virtualization. A few applications that use virtualization are
Microsoft App-V, XenApp, VM Thinapp, and Zenworks.

5.5.NETWORK VIRTUALIZATION:
Through network virtualization, you can operate several virtual networks, each with its
own data plan and management system. They are both managed by distinct parties and coexist on
top of the same physical network. It provides a method for configuring virtual networks, such as
VPNs, switches, routers, and firewalls.

5.6.DATA VIRTUALIZATION:
Without any data specifications, data is gathered from multiple sources and then
manipulated, separated, sent, and retrieved via data virtualization. Data virtualization is used to
give on-demand integration to the users, hence eliminating delay. The technical elements of the
data are logically organized so that interested parties and users can access its virtual view
remotely using a variety of cloud services. JBoss, TIBCO Data Virtualization, and Denodo are a
few instances of data virtualization.

6.BENEFITS OF VIRTUALIZATION:
➢ Workload is reduced with virtualization.
➢ Virtualization is less expensive and has predictable costs.
➢ Scalability is the ability to get additional resources from the pool of resources that
is available whenever needed.
➢ It provides a higher uptime and encourages digital business.
➢ Virtualization makes resource management considerably simpler.

12
[ASSIGNMENT SERIES - 107] [2024EV0019]

7.DRAWBACKS OF VIRTUALIZATION:
➢ Implementation can be quite expensive and necessitate the use of a powerful machine.
➢ The problem of scalability arises.
➢ It takes a number of chain links that must cooperate well with one another.
➢ Data security in virtualized environments is sometimes questioned since third-party
companies administer the servers.
➢ In the long term, virtualization is more expensive and time-consuming than native
systems.

8.CONCLUSION:
The key component of cloud computing is virtualization; as the core of cloud computing,
virtualization cannot exist without cloud computing. Through virtualization, a company may
efficiently utilize its IT resources. By making effective use of the physical infrastructure,
cloud-based virtualization solutions that encompass hybrid and public/private cloud services
further increase the return on investment for businesses. To put it briefly, virtualization is
cost-effective and helps achieve improved capacity utilization, thus it is worth the investment.

BIBLIOGRAPHY:
1.Michael Kretzschmar and S Hanigk, “Securitymanagement interoperability challenges
for collaborative clouds”, 2010.
2.[Virtualization in cloud computing], [VIRTUALIZATION IN CLOUD
COMPUTING-NEEDS, TYPES AND IMPORTANCE] -
[https://www.konverge.co.in/virtualization-in-cloud-computing-need-types-and-importance/]

13

You might also like