This paper was presented at the 1996 CAUSE annual conference. It is part of the proceedings of that conference, "Broadening Our Horizons:
|
|
- Brenda Long
- 7 years ago
- Views:
Transcription
1 This paper was presented at the 1996 CAUSE annual conference. It is part of the proceedings of that conference, "Broadening Our Horizons: Information, Services, Technology -- Proceedings of the 1996 CAUSE Annual Conference," page Permission to copy or disseminate all or part of this material is granted provided that the copies are not made or distributed for commercial advantage. To copy or disseminate otherwise, or to republish in any form, requires written permission from the author and CAUSE. For further information, contact CAUSE, 4840 Pearl East Circle, Suite 302E, Boulder, CO 80301; ;
2 AN INTEGRATED INFORMATION ENVIRONMENT A TECHNOLOGY ARCHITECTURE FOR THE NEXT CENTURY Prepared by: The University of Arizona John Detloff (detloff@arizona.edu) Dick Ecelbarger (ecelbarger@arizona.edu) Keith Wilburn (kwilburn@arizona.edu) ABSTRACT The University of Arizona is reengineering its major administrative systems. We envision a new environment where data is collected at the source and people have access to information when and where they need it. Our vision requires integrating data from many different sources, expanding its accessibility, and building a secure technical foundation that is usable, reliable, extensible, portable, adaptable, and manageable. We selected an architecture that allows us to capitalize on our legacy systems and expertise in the transition to an integrated information systems environment based on world wide web technologies. This paper describes our architectural selection process and presents issues requiring additional thought and resolution. CAUSE 1996 Thursday, 12/5/96, 2:00pm - - 2
3 INTRODUCTION Information Technology at the University of Arizona, Strategic Directions for the Year 2000 (1994), describes a 21st century electronic environment reaching everyone, any place and any time. It identifies information technology as an indispensable and strategic part of the University's Year 2000 directions. A key component of this vision is establishing a University Networked Information Technology Environment (UNITE). UNITE includes recommendations, guidelines and standards for the technology environment needed by the institution to implement recommendations outlined in the Information Technology report. This paper describes the technical design of an information and analysis systems that supports planning and decision making. The result is a distributed client/server architecture consistent with UNITE standards and the University vision. DISTRIBUTED COMPUTING Despite our historical reliance on large computers, the majority of the University's investment in technology is now in widely distributed desktop systems. This evolution toward a distributed computing paradigm allows individual units to improve their operation without delays that may occur when using external expertise. However, when technology is implemented in a piecemeal fashion, units can find themselves unable to accomplish work that crosses organizational boundaries. A distributed computing environment is an integrated collection of computing systems frequently referred to as servers. As such, our administrative computing environment will have presentation servers (to display and accept data), application servers (to store program logic and business rules), data servers (which store and retrieve data), print servers (that produce output), etc. Some servers lend themselves to being implemented and supported centrally. For example, one centrally maintained security server can authenticate user access to any of the component servers in the enterprise. It is not necessary to have multiple security checks with multiple procedures and passwords for each server. Departmental implementation and support are more appropriate for other servers, such as a database used only by a single department. The departmental database, however, may need to obtain some of its data from a central database, so the ability to interact with other servers must be maintained. 1
4 Definition THE CLIENT/SERVER MODEL There is much confusion about the definition of client/server computing. John Gallaugher and Suresh Ramanathan (1996) from Syracuse University offer an excellent definition of client/server. Client and server are software and not hardware entities. In its most fundamental form, client/server involves a software entity (client) making a specific request that is fulfilled by another software entity (server). Figure 1 illustrates the client/server exchange. The client process sends a request to the server. The server interprets the message and then attempts to fulfill the request. In order to fulfill the request, the server may have to refer to a knowledge source (database), process data (perform calculations), control a peripheral, or make an additional request of another server. In many architectures, a client can make requests of multiple servers and a server can service multiple clients. Figure 1 - Client Server Transactions It is important to understand that the relationship between client and server is a command/control relationship. In any given exchange, the client initiates the request and the server responds accordingly. A server cannot initiate dialog with clients. Since the client and server are software entities they can be located on any appropriate hardware. A client process, for instance, could be resident on a network server hardware, and request data from a server process running on another server hardware or even on a PC. In another scenario, the client and server processes can be located on the same physical hardware box. The fundamental aim of client/server processing from the user perspective is to provide a single image of the total information systems enterprise. From the technical perspective, however, there are tremendous challenges created by the interaction of multiple clients, multiple servers, security concerns, file integrity considerations, backup and recovery, network protocol complications, and combinations of heterogeneous hardware and software components. Architectural Components 2
5 In Client/Server architectures most end-user applications consist of three holistically related components: Presentation, Logic, and Data. Presentation components control display, keyboard/device handling and data validation. Logic components implement application specific business logic, policies and procedures. Data access components retrieve and update stored information. Client-server architectures are classified by how systems are partitioned into logical components, and how the components are distributed among network computers. A system generally has one presentation component, but possibly several modular application components (programs), and several data components (e.g., files, databases). Client-server architecture presents several alternatives in distributing these components to computers best suited to each task. A framework, or consistent approach for the distribution of the components, constitutes a client-server architecture. The architecture determines the amount of flexibility and control we have with the implementation of our applications, as well as how they are built and used. Although a virtually infinite number of possibilities exist for distributing and linking architectural components, most contemporary architectures are defined in terms of a limited subset of alternatives. The subset that seems to have gained most acceptance in implementing distributed transaction-orientated database systems are described in terms of architectural Tiers. Two Tier Architecture In Two Tier architecture, the Presentation, Logic, and Data are divided into two distinct units - the Client which executes on a users workstation, and a Database Server which executes on another node in the network. Two tier architecture works best in a homogeneous environment where all the database servers and the interactions with these servers are of the same type. In two tier implementations the presentation is handled exclusively by the client and data is stored on and accessed on the server. But the application or business Logic can reside on the client (fat client) or on the database server (thin client) in the form of stored procedures. In either case, two-tier architectures are not appropriate for our central administrative applications. In order to effectively transition our legacy applications from an IBM mainframe environment to the new architecture, access to legacy information must be available for the new client/server applications. In a network environment, this access must include transactional integrity to preclude the possibility of data synchronization problems. As such a two tier architecture is problematic. We estimate that in our environment, two-tier solutions will not scale well beyond approximately 100 clients. Since the campus could conceivably have 10,000 employee clients and 35,000 student clients, a two-tier architecture would not scale to meet our needs. We do recognize however, that some of our ancillary departmental processes are candidates for the simplicity of two-tier architecture. As such, we evaluate the pros and cons of fat clients and thin clients as enterprise candidates. Two Tier - Fat Clients In the fat client architecture, the presentation and logic component (application code) executes on each client platform. Data is retrieved and updated over the network to connected database servers. The primary benefit of placing the application on the client is ease of development. A large 3
6 selection of easy-to-use tools that take advantage of standard APIs (ODBC and SQL) and protocols are available. In addition, most development tools support a wide selection of client platforms (Macintosh and Windows) with common source code. Application development is swift and easy. As a unifying client-server architecture, the fat client is limited in both run-time execution and systems administration. Processing individual SQL statements overloads the network because messages and large amounts of data must be transmitted over the network. The network rapidly becomes a bottleneck as the number of clients increases. Administratively, the fat client becomes a management nightmare. Application logic is replicated on each client, application changes need to be distributed to each client, and tools supporting an automated update capability have not been identified. 4
7 Two Tier - Thin Clients In the thin client architecture, the client process is involved with presentation. The database server manages the database, and the application component is defined, managed, and executed in the form of database stored procedures. Languages to develop stored procedures are immature and currently proprietary to the databases that implement them. Because stored procedures are not standardized across different database vendor implementations, using this model can lock you into a single database vendor. Efficient resource utilization is another key issue. In transaction processing applications, database throughput becomes a performance bottleneck. When the number of clients increases, database resources are drained as the database allocates memory for each client process. With stored procedures, the database assumes additional application processing tasks that erodes its primary function of fast and efficient data access. Three Tier Architecture Three Tier architecture places the presentation, logic, and data components on their own (logical) servers and under the control of tools optimized for each distinct function. The application servers provide program calls to other application components in the same or other servers. These application components, in turn, provide access to non-proprietary database services. The placement of business logic on the application server provides scalability and isolation of the business logic in order to handle any rapidly changing business needs. Another advantage of this approach is the ability it provides to off-load processor intensive tasks from the client workstation, thus allowing us to utilize thin clients (with lesser amounts of memory and processor power). This advantage in scalability must be weighed against the greater cost and complexity of creating a three tier solution. One of our critical requirements was to accommodate applications that use data stored in heterogeneous databases. The integration of application and database server integrity is facilitated by an application management environment, know as a Transaction Processing (TP) Monitor. After researching the pros and cons of two and three tier issues, a three-tier client/server architecture was chosen to best suit the needs of our mission-critical applications. As stated above, however, this architecture doesn t preclude the concurrent use of the two-tier model. 5
8 INFRASTRUCTURE COMPONENTS DCE Server(s) Client(s) Directory Services LDAP Security Services DCE TCP/IP Time Services PROTOTYPE INTEGRATED INFORMATION ENVIRONMENT Web Browsers HTML Java JavaScript HTTP/SSL Database Driver(s) TCP/IP Application ODBC DCE CAMPUS NETWORK TCP/IP CUSSP LU6.2 LU6.2 TCP/IP HTTP/SSL HTTP/SSL TCP/IP SIS (CICS/VSAM) FRS (IDMS) CUSSP ESQL DCE Perl Java JavaScript TP Monitor Application Business Functions Perl Java JavaScript DCE DATABASE Database Driver(s) MVS Application Server(s) Database Server(s) Figure 2 - Schematic View of the Infrastructure World Wide Web Technologies Web-based technologies offer some tangible solutions both short-term and long-term. Industry standard web browsers utilizing Java and JavaScript can support robust application development to include methods for incorporating multi-media capabilities such as sound, pictures, or movies into applications. Another area that can benefit from web-based technologies is data reporting. Report distribution via web-based technologies will decrease costs associated with paper or fiche archiving. In addition, warehouse data can be made available for direct download into client spreadsheet applications without the need for client knowledge of complex SQL syntax. It is possible to deliver decision support data to large numbers of clients without a substantial increase in training on data extraction methods. The biggest advantage the web technologies offer is lower support costs. Since the application presentation logic is downloaded on request to the browser, the resources and infrastructure 6
9 needed to support software version control, software distribution, and software configuration are greatly reduced. Institutions can begin to offer web-based applications with current technology and evolve them to take advantage of newer browser and web server technologies as they become available without substantial changes to the client environment. Use of the SSL security standard for web browsers, makes end-to-end encryption of sensitive data such as credit card transactions achievable. SSL also help organizations achieve the goal of a single identification for user authentication when used in combination with gateway servers. ODBC - Open DataBase Connectivity Two emerging standards for client access to a database are the Web and Microsoft's ODBC (Open DataBase Connectivity). In the ODBC model, a middleware layer from Open Horizon was chosen which allows ODBC to be tunneled over DCE. This approach enables a network, single-login to DCE and encrypts sensitive data as it is transmitted over the network. This middleware, Connection/Client, also enables the utilization of a single ODBC interface to access both the business logic on the application server(s) (three-tier), and the data on the database server(s) (twotier). DCE - Distributed Computing Environment Open Software Foundation's Distributed Computing Environment was chosen for the distributed computing infrastructure. One of the overriding reasons DCE was chosen is to provide users a single user account. We have some employees today with eight user IDs and passwords. With DCE, we will give them a network ID and a network password. DCE provides, like the web SSL standard, the ability to encrypt data transmitted across the network and to make resource locations transparent. DCE is composed of the following major components: Remote Procedure Call, Directory Service, Time Service, Security Service, and Threads Service. Transaction Processing Transaction Processing (TP) monitors are software systems that provide a family of products for building, operating, and maintaining online transaction processing (OLTP) applications. In distributed environments, client-server TP monitors evolved to manage systems performance and data integrity in on-line applications. TP monitors, for example, support network-scalability and dynamic load balancing of requests. It is possible to integrate heterogeneous application server platforms and to balance fluctuating loads across these servers. A critical issue is the need for an integrated way to retrieve our data and to maintain its integrity. TP monitors provide us the guarantee that all databases get updated or that they all get rolled back in the case of failures. This includes network transactional integrity between legacy applications on our mainframe and distributed, relational database systems as long as the database vendor supports the X/Open XA interface standard for resource managers. TP monitors also provide a distributed transaction system layered on the services of DCE. Failed servers are automatically detected and rerouting requests to other available servers occur while recovering and restarting the failed services. The application logic can be coded in either COBOL, C, or C++. By utilizing COBOL, our existing COBOL application programmer experience can be utilized without an initial training investment in C. SUMMARY 7
10 The architectural components we ve chosen are described as being both three-tier and two-tier client/server capable. In reality, this architecture supports the notion of a n-tier model. In the n-tier model, a departmental client could initiate some departmental business logic on the departmental application server(s) which, as part of a network transaction, could update the departmental database(s) and then initiate institutional business logic on the institutional application server(s). These institutional application server(s) could then update the institutional database(s). All of this takes place under the umbrella of a network transaction. Any one of the chain of application server(s) could initiate a rollback which would cascade to all of the application server(s) involved. This capability allows a delegated approach to how business rules are implemented. As the business processes are identified and appropriate business logic is implemented on the application server(s), these services could then be institutionally advertised. This allows end-users to develop their own presentation interfaces to the business logic, but force them to abide by the business logic residing on the application server(s). 8
11 ISSUES TO BE RESOLVED Network management - The ability to plan for the growth and troubleshoot network problems is an important part of any network application if the organization desires to be proactive rather than reactive. Web server scalability - The Common Gateway Interface (CGI) is the most common method of providing dynamic document content in the web today. This method does not scale adequately when trying to deal with thousands of requests. Alternative methods are emerging that need to be researched for addressing this problem. Web server integration with Transaction Monitors - All of the web servers available today do not provide an interface to our chosen transaction monitor. An interface will have to be developed that is scaleable and robust. Web development environments - A number of tools are beginning to appear to make the development of web-based applications much easier. Research continues to determine which product(s) best fulfills our requirements. Java stability and security - Java user interfaces to web browsers do not yet support robust application development environments. In addition, the downloading of malicious Java applets is still an issue that will hopefully be addressed as standards are developed that support digitallysigned applets. REFERENCES Gallaugher, John and Ramanathan, Suresh, The Critical Choice of Client Server Architecture: A comparison of Two and Three Tier Systems, Syracuse University, Gallaugher, John and Ramanathan, Suresh, Comparing Coding, Testing, and Migration Costs for Two and Three Tier Client/Server Architectures, Syracuse University, SIS2000 Project Team, Student Information Systems 2000 Homepage, The University of Arizona, UA Information Planning Team, Information Technology At The University of Arizona, Strategic Directions For The Year 2000, UNITE Project Team, U.N.I.T.E. - University Networked Information Technology Environment, The University of Arizona,
Client/server is a network architecture that divides functions into client and server
Page 1 A. Title Client/Server Technology B. Introduction Client/server is a network architecture that divides functions into client and server subsystems, with standard communication methods to facilitate
More informationInternet Engineering: Web Application Architecture. Ali Kamandi Sharif University of Technology kamandi@ce.sharif.edu Fall 2007
Internet Engineering: Web Application Architecture Ali Kamandi Sharif University of Technology kamandi@ce.sharif.edu Fall 2007 Centralized Architecture mainframe terminals terminals 2 Two Tier Application
More information4-04-50 The Critical Choice of a Client/Server Architecture John M. Gallaugher Suresh C. Ramanathan
4-04-50 The Critical Choice of a Client/Server Architecture John M. Gallaugher Suresh C. Ramanathan Payoff The architectural design of a client/server system affects the initial development cost, dayto-day
More informationPASS4TEST 専 門 IT 認 証 試 験 問 題 集 提 供 者
PASS4TEST 専 門 IT 認 証 試 験 問 題 集 提 供 者 http://www.pass4test.jp 1 年 で 無 料 進 級 することに 提 供 する Exam : 000-003 Title : Fundamentals of Applying Tivoli Security and Compliance Management Solutions V2 Vendors :
More informationApplication Consolidation
Application Consolidation As enterprises look for ways to reduce costs and simplify IT management, they often consider various approaches to server consolidation. Among them, application consolidation
More informationGet Success in Passing Your Certification Exam at first attempt!
Get Success in Passing Your Certification Exam at first attempt! Exam : 000-003 Title : Fundamentals of Applying Tivoli Security and Compliance Management Solutions V2 Version : Demo 1.What is another
More informationCHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL
CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter
More informationSOFT 437. Software Performance Analysis. Ch 5:Web Applications and Other Distributed Systems
SOFT 437 Software Performance Analysis Ch 5:Web Applications and Other Distributed Systems Outline Overview of Web applications, distributed object technologies, and the important considerations for SPE
More informationFROM RELATIONAL TO OBJECT DATABASE MANAGEMENT SYSTEMS
FROM RELATIONAL TO OBJECT DATABASE MANAGEMENT SYSTEMS V. CHRISTOPHIDES Department of Computer Science & Engineering University of California, San Diego ICS - FORTH, Heraklion, Crete 1 I) INTRODUCTION 2
More informationWhat is Middleware? Software that functions as a conversion or translation layer. It is also a consolidator and integrator.
What is Middleware? Application Application Middleware Middleware Operating System Operating System Software that functions as a conversion or translation layer. It is also a consolidator and integrator.
More informationClient-Server Applications
Client-Server Applications Prof. Sanjeev Setia Distributed Software Systems CS 707 Distributed Software Systems 1 Client Server Systems Distributed Software Systems 2 1 Client/Server Application Distributed
More informationSystem types. Distributed systems
System types 1 Personal systems that are designed to run on a personal computer or workstation Distributed systems where the system software runs on a loosely integrated group of cooperating processors
More informationDB2 Connect for NT and the Microsoft Windows NT Load Balancing Service
DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service Achieving Scalability and High Availability Abstract DB2 Connect Enterprise Edition for Windows NT provides fast and robust connectivity
More informationDistributed Systems Lecture 1 1
Distributed Systems Lecture 1 1 Distributed Systems Lecturer: Therese Berg therese.berg@it.uu.se. Recommended text book: Distributed Systems Concepts and Design, Coulouris, Dollimore and Kindberg. Addison
More informationArchitecture Design For Web-based Application Systems. Instructor: Dr. Jerry Gao Class: CMPE296U
Architecture Design For Web-based Application Systems Instructor: Dr. Jerry Gao Class: CMPE296U Architecture Design For Web-Based Application Systems - (1994-1995) Hypertext Web Systems: Graphic Web Browsers
More informationComputer Information Systems (CIS)
Computer Information Systems (CIS) CIS 113 Spreadsheet Software Applications Prerequisite: CIS 146 or spreadsheet experience This course provides students with hands-on experience using spreadsheet software.
More information3-Tier Architecture. 3-Tier Architecture. Prepared By. Channu Kambalyal. Page 1 of 19
3-Tier Architecture Prepared By Channu Kambalyal Page 1 of 19 Table of Contents 1.0 Traditional Host Systems... 3 2.0 Distributed Systems... 4 3.0 Client/Server Model... 5 4.0 Distributed Client/Server
More informationChapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.
Chapter 2 TOPOLOGY SELECTION SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Topology selection criteria. Perform a comparison of topology selection criteria. WebSphere component
More informationInstallation and Configuration in Microsoft Dynamics NAV 5.0
Installation and Configuration in Microsoft Dynamics NAV 5.0 8870: Installation and Configuration in Microsoft Dynamics NAV 5.0 (2 Days) About this Course Elements of this syllabus are subject to change.this
More informationFax Server Cluster Configuration
Fax Server Cluster Configuration Low Complexity, Out of the Box Server Clustering for Reliable and Scalable Enterprise Fax Deployment www.softlinx.com Table of Contents INTRODUCTION... 3 REPLIXFAX SYSTEM
More informationDistributed Systems Architectures
Software Engineering Distributed Systems Architectures Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To explain the advantages and disadvantages of different distributed systems
More informationSCHOOL DISTRICT OF ESCAMBIA COUNTY
SCHOOL DISTRICT OF ESCAMBIA COUNTY JOB DESCRIPTION Programmer Analyst I Web Technologies PROGRAMMER ANALYST I WEB TECHNOLOGIES QUALIFICATIONS: (1) Bachelor s Degree from an accredited educational institution
More informationEnterprise Application Integration
Enterprise Integration By William Tse MSc Computer Science Enterprise Integration By the end of this lecturer you will learn What is Enterprise Integration (EAI)? Benefits of Enterprise Integration Barrier
More informationTier Architectures. Kathleen Durant CS 3200
Tier Architectures Kathleen Durant CS 3200 1 Supporting Architectures for DBMS Over the years there have been many different hardware configurations to support database systems Some are outdated others
More information2. Accessing Databases via the Web
Supporting Web-Based Database Application Development Quan Xia 1 Ling Feng 2 Hongjun Lu 3 1 National University of Singapore, Singapore, xiaquan@comp.nus.edu.sg 2 Hong Kong Polytechnic University, China,
More informationICS 434 Advanced Database Systems
ICS 434 Advanced Database Systems Dr. Abdallah Al-Sukairi sukairi@kfupm.edu.sa Second Semester 2003-2004 (032) King Fahd University of Petroleum & Minerals Information & Computer Science Department Outline
More informationVirtualization s Evolution
Virtualization s Evolution Expect more from your IT solutions. Virtualization s Evolution In 2009, most Quebec businesses no longer question the relevancy of virtualizing their infrastructure. Rather,
More informationChapter Outline. Chapter 2 Distributed Information Systems Architecture. Middleware for Heterogeneous and Distributed Information Systems
Prof. Dr.-Ing. Stefan Deßloch AG Heterogene Informationssysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@informatik.uni-kl.de Chapter 2 Architecture Chapter Outline Distributed transactions (quick
More informationDBMS Infrastructures and IT Career Recommendations. Jeff Fineberg November 21, 2011
DBMS Infrastructures and IT Career Recommendations Jeff Fineberg November 21, 2011 Topics Importance of Databases Security Computing Environments / Infrastructures Methodologies for Data access Database
More informationMichigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police
Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2006 Recognition Awards Enterprise Architecture Category Executive
More informationMichigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police
Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2005 Recognition Awards Enterprise Architecture Category Executive
More informationDistributed Systems. Outline. What is a Distributed System?
Distributed Systems 1-1 Outline What is a Distributed System? Examples of Distributed Systems Distributed System Requirements in Distributed System 1-2 What is a Distributed System? 1-3 1 What is a Distributed
More informationS y s t e m A r c h i t e c t u r e
S y s t e m A r c h i t e c t u r e V e r s i o n 5. 0 Page 1 Enterprise etime automates and streamlines the management, collection, and distribution of employee hours, and eliminates the use of manual
More informationChapter 3. Database Environment - Objectives. Multi-user DBMS Architectures. Teleprocessing. File-Server
Chapter 3 Database Architectures and the Web Transparencies Database Environment - Objectives The meaning of the client server architecture and the advantages of this type of architecture for a DBMS. The
More informationE-Commerce Supply Chain Management Domain Research and Standard Architectures Kunal Chopra, Jeff Elrod, Bill Glenn, Barry Jones.
E-Commerce Supply Chain Management Domain Research and Standard Architectures Kunal Chopra, Jeff Elrod, Bill Glenn, Barry Jones Introduction E-Commerce Supply Chain Management involves the co-ordination
More informationClient Server Architecture
Client Server Architecture Key concepts: - client server architecture - Functional requirements in the 2-tier structures - Functional distribution in the 2-tier structures - Implementation of Business
More informationCisco Application Networking for IBM WebSphere
Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
More informationC/S Basic Concepts. The Gartner Model. Gartner Group Model. GM: distributed presentation. GM: distributed logic. GM: remote presentation
C/S Basic Concepts The Gartner Model Contents: 2-tier Gartner Model Winsberg s Model / Balance Example 3-tier n-tier Became de facto reference model Recognizes 5 possible modes of distribution: distributed
More informationOracle Net Services for Oracle10g. An Oracle White Paper May 2005
Oracle Net Services for Oracle10g An Oracle White Paper May 2005 Oracle Net Services INTRODUCTION Oracle Database 10g is the first database designed for enterprise grid computing, the most flexible and
More informationB.Com(Computers) II Year DATABASE MANAGEMENT SYSTEM UNIT- V
B.Com(Computers) II Year DATABASE MANAGEMENT SYSTEM UNIT- V 1 1) What is Distributed Database? A) A database that is distributed among a network of geographically separated locations. A distributed database
More informationEnterprise Historian Information Security and Accessibility
Control Engineering 1999 Editors Choice Award Enterprise Historian Information Security and Accessibility ABB Automation Increase Productivity Decision Support With Enterprise Historian, you can increase
More informationWhat Is the Java TM 2 Platform, Enterprise Edition?
Page 1 de 9 What Is the Java TM 2 Platform, Enterprise Edition? This document provides an introduction to the features and benefits of the Java 2 platform, Enterprise Edition. Overview Enterprises today
More information2012 LABVANTAGE Solutions, Inc. All Rights Reserved.
LABVANTAGE Architecture 2012 LABVANTAGE Solutions, Inc. All Rights Reserved. DOCUMENT PURPOSE AND SCOPE This document provides an overview of the LABVANTAGE hardware and software architecture. It is written
More informationIT Architecture Review. ISACA Conference Fall 2003
IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture
More informationLatte Rapid Application Development. William Dunlap Product Manager Borland International wdunlap@wpo.borland.com
Latte Rapid Application Development William Dunlap Product Manager Borland International wdunlap@wpo.borland.com Business Computing Evolution C/S Application Development Collaborative App Development Web
More informationJDBC Drivers, Bridges and SequeLink. Edward M. Peters Vice President & General Manager DataDirect
JDBC Drivers, Bridges and SequeLink Edward M. Peters Vice President & General Manager DataDirect DataDirect s Business Provide world class data connectivity from any application, to any data source, from
More informationContents. Chapter 1. Introduction
Contents 1. Introduction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threads 6. CPU Scheduling 7. Process Synchronization 8. Deadlocks 9. Memory Management 10. Virtual
More informationArchitecture of Transaction Processing Systems
Architecture of Transaction Processing Systems Transaction processing systems are among the largest software systems in existence. They must be built to respond to a wide spectrum of applications, so the
More informationDistributed Database Design
Distributed Databases Distributed Database Design Distributed Database System MS MS Web Web data mm xml mm dvanced Database Systems, mod1-1, 2004 1 Advanced Database Systems, mod1-1, 2004 2 Advantages
More informationUnderstanding Client/Server Computing
Understanding Client/Server Computing By Will Fastie PC Magazine; "Enterprize Computing;" Back in the eighties when network equipment vendors first started to hawk their wares, the term client/server was
More informationService Oriented Architectures
8 Service Oriented Architectures Gustavo Alonso Computer Science Department Swiss Federal Institute of Technology (ETHZ) alonso@inf.ethz.ch http://www.iks.inf.ethz.ch/ The context for SOA A bit of history
More informationEVALUATION OF SERVER-SIDE TECHNOLOGY FOR WEB DEPLOYMENT
EVALUATION OF SERVER-SIDE TECHNOLOGY FOR WEB DEPLOYMENT Dr. Alexander Pons, University of Miami, apons@miami.edu ABSTRACT The deployment of Web applications consisting of dynamic content requires the selection
More informationEnterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...
CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...
More informationProduct Brief. DC-Protect. Content based backup and recovery solution. By DATACENTERTECHNOLOGIES
Product Brief DC-Protect Content based backup and recovery solution By DATACENTERTECHNOLOGIES 2002 DATACENTERTECHNOLOGIES N.V. All rights reserved. This document contains information proprietary and confidential
More informationContents. Client-server and multi-tier architectures. The Java 2 Enterprise Edition (J2EE) platform
Part III: Component Architectures Natividad Martínez Madrid y Simon Pickin Departamento de Ingeniería Telemática Universidad Carlos III de Madrid {nati, spickin}@it.uc3m.es Introduction Contents Client-server
More informationCitrix MetaFrame Presentation Server 3.0 and Microsoft Windows Server 2003 Value Add Feature Guide
Citrix MetaFrame Presentation Server 3.0 and Microsoft Windows Server 2003 Value Add Feature Guide Advanced Functionality Basic Functionality Feature MANAGEMENT Microsoft Management Console Enhanced Connection
More informationVIRGINIA DEPARTMENT OF MOTOR VEHICLES SECURITY ARCHITECTURE POLICY. 03/27/09 Version
VIRGINIA DEPARTMENT OF MOTOR VEHICLES SECURITY ARCHITECTURE POLICY 03/27/09 Version Approved April 30, 2009 Approval of Enterprise Security Architecture Policy (03/27/2009 Version) Douglas G. Mack IT Security
More informationTutorial on Client-Server Architecture
Tutorial on Client-Server Architecture SEEM3430 Information Systems Analysis and Design Pengfei Liu Department of Systems Engineering and Engineering Management The Chinese University of Hong Kong March
More informationThe EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper.
The EMSX Platform A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks A White Paper November 2002 Abstract: The EMSX Platform is a set of components that together provide
More informationLesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4
More informationDesktop Virtualization and Storage Infrastructure Optimization
Desktop Virtualization and Storage Infrastructure Optimization Realizing the Most Value from Virtualization Investment Contents Executive Summary......................................... 1 Introduction.............................................
More informationExhibit B5b South Dakota. Vendor Questions COTS Software Set
Appendix C Vendor Questions Anything t Applicable should be marked NA. Vendor Questions COTS Software Set Infrastructure 1. Typically the State of South Dakota prefers to host all systems. In the event
More informationMiddleware- Driven Mobile Applications
Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary
More informationJitterbit Technical Overview : Microsoft Dynamics CRM
Jitterbit allows you to easily integrate Microsoft Dynamics CRM with any cloud, mobile or on premise application. Jitterbit s intuitive Studio delivers the easiest way of designing and running modern integrations
More informationDistributed Database Management Systems for Information Management and Access
464 Distributed Database Management Systems for Information Management and Access N Geetha Abstract Libraries play an important role in the academic world by providing access to world-class information
More informationManaging and Maintaining a Windows Server 2003 Network Environment
Managing and maintaining a Windows Server 2003 Network Environment. AIM This course provides students with knowledge and skills needed to Manage and Maintain a Windows Server 2003 Network Environment.
More informationAbout this Course This 5 day ILT course teaches IT Professionals to design and deploy Microsoft SharePoint 2010.
Course 10231B: Designing a Microsoft SharePoint 2010 Infrastructure OVERVIEW About this Course This 5 day ILT course teaches IT Professionals to design and deploy Microsoft SharePoint 2010. Audience Profile
More informationKM road map. Technology Components of KM. Chapter 5- The Technology Infrastructure. Knowledge Management Systems
Knowledge Management Systems Chapter 5- The Technology Infrastructure Dr. Mohammad S. Owlia Associate Professor, Industrial Engineering Department, Yazd University E-mail :owliams@gmail.com, Website :
More informationConcepts of Database Management Seventh Edition. Chapter 9 Database Management Approaches
Concepts of Database Management Seventh Edition Chapter 9 Database Management Approaches Objectives Describe distributed database management systems (DDBMSs) Discuss client/server systems Examine the ways
More informationOutline. TIM 50 - Business Information Systems. Lecture 10. Instructor: Terry Allen UC Santa Cruz 10/28/2011
TIM 50 - Business Information Systems Lecture 10 Instructor: Terry Allen UC Santa Cruz 10/28/2011 Outline Announcements Review Alibris Case Study Information Technology Student Presentations Client-Server
More informationTIM 50 - Business Information Systems
TIM 50 - Business Information Systems Lecture 10 Instructor: Terry Allen UC Santa Cruz 10/28/2011 Outline Announcements Review Alibris Case Study Information Technology Student Presentations Client-Server
More informationTSplus White Paper 1
TSplus White Paper 1 Contents What is it?... 4 Business Challenges... 6 Evaluating the alternatives... 10 Alternatives solutions for web-enabled deployments... 13 The Benefits of Server-Based Application
More informationOracleAS Identity Management Solving Real World Problems
OracleAS Identity Management Solving Real World Problems Web applications are great... Inexpensive development Rapid deployment Access from anywhere BUT. but they can be an administrative and usability
More informationIT Sample Duties and Responsibilities Statements BAND B POSITION CONCEPT: JOURNEYWORKER / WORKING SUPERVISOR / LEAD WORKER
BAND B POSITION CONCEPT: JOURNEY / WORKING SUPERVISOR / LEAD Multi-user System Administration Systems & Services Administration Installs, configures, and optimizes operating systems. Installs, tests, and
More informationChapter 6 Essentials of Design and the Design Activities
Systems Analysis and Design in a Changing World, sixth edition 6-1 Chapter 6 Essentials of Design and the Design Activities Chapter Overview There are two major themes in this chapter. The first major
More informationCOMP5426 Parallel and Distributed Computing. Distributed Systems: Client/Server and Clusters
COMP5426 Parallel and Distributed Computing Distributed Systems: Client/Server and Clusters Client/Server Computing Client Client machines are generally single-user workstations providing a user-friendly
More informationOracle Identity Analytics Architecture. An Oracle White Paper July 2010
Oracle Identity Analytics Architecture An Oracle White Paper July 2010 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may
More informationOpen Directory. Apple s standards-based directory and network authentication services architecture. Features
Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data
More informationSage Intergy 6.10 Architecture Guide
Reference Confidential This document and the information it contains are the confidential information of Sage. Neither this document nor the information it contains may be disclosed to any third party
More informationPROPALMS TSE 6.0 March 2008
PROPALMS March 2008 An Analysis of and Terminal Services: Contents System Administration... 2 Server Management... 3 Application Management... 5 Security... 7 End User Experience... 8 Monitoring and Reporting...
More informationAgility has become a key initiative for business leaders. Companies need the capability
A ZK Research White Paper Influence and insight through social media Prepared by Zeus Kerravala March 2014 A Guide To Network Virtualization ZK Research Zeus Kerravala A Guide to BYOD Network And Virtualization
More informationNetwork Station - Thin Client Computing - Overview
Network Station - Thin Client Computing - Overview Overview The objective of this document is to help develop an understanding of a Server Based Computing/Thin-Client environment using MS Windows NT 4.0,
More informationManaging the Unmanageable: A Better Way to Manage Storage
Managing the Unmanageable: A Better Way to Manage Storage Storage growth is unending, but there is a way to meet the challenge, without worries about scalability or availability. October 2010 ISILON SYSTEMS
More informationUnderstand the strategic arrangement of IS/IT in modern organisations. Week 3 IT Architecture and Infrastructure. Lecture objectives
IMS9043 IT in Organisations Lecture objectives Week 3 IT Architecture and Infrastructure Understand the strategic arrangement of IS/IT in modern organisations 1 2 Information Systems & People Information
More informationDatabases Lesson 04 Client Server Computing and Adaptation
Databases Lesson 04 Client Server Computing and Adaptation Oxford University Press 2007. All rights reserved. 1 Two Network Based Computing Architectures Distributed Peer-to-Peer designed each node distributed
More informationGEOG 482/582 : GIS Data Management. Lesson 10: Enterprise GIS Data Management Strategies GEOG 482/582 / My Course / University of Washington
GEOG 482/582 : GIS Data Management Lesson 10: Enterprise GIS Data Management Strategies Overview Learning Objective Questions: 1. What are challenges for multi-user database environments? 2. What is Enterprise
More informationNettech White Paper: Mobile Middleware: The Next Frontier in Enterprise Application Integration
Nettech White Paper: Mobile Middleware: The Next Frontier in Enterprise Application Integration By, Tamara Kanoc, Director of Marketing, Nettech Systems, Inc. Nettech Systems, Inc. 600 Alexander Road Princeton,
More informationChapter 6. 1. A computer is a collection of computers that communicate with one another over transmission lines.
Chapter 6 1. A computer is a collection of computers that communicate with one another over transmission lines. a. database b. application c. system d. network e. server Answer: d Difficulty: Easy Page
More informationCA IDMS Server r17. Product Overview. Business Value. Delivery Approach
PRODUCT sheet: CA IDMS SERVER r17 CA IDMS Server r17 CA IDMS Server helps enable secure, open access to CA IDMS mainframe data and applications from the Web, Web services, PCs and other distributed platforms.
More informationA Grid Architecture for Manufacturing Database System
Database Systems Journal vol. II, no. 2/2011 23 A Grid Architecture for Manufacturing Database System Laurentiu CIOVICĂ, Constantin Daniel AVRAM Economic Informatics Department, Academy of Economic Studies
More informationDevelopment of a Learning Content Management Systems
Development of a Learning Content Management Systems Lejla Abazi-Bexheti Abstract Change appears to be the only constant in the field of ICT and what was treated as advanced feature few years ago is today
More informationTable Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10
Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS
More informationInformix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11
Informix Dynamic Server May 2007 Availability Solutions with Informix Dynamic Server 11 1 Availability Solutions with IBM Informix Dynamic Server 11.10 Madison Pruet Ajay Gupta The addition of Multi-node
More informationTroubleshooting and Supporting Windows 7 in the Enterprise
Course 6292A: Troubleshooting and Supporting Windows 7 in the Enterprise Length: 3 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology: Windows 7 Type: Course Delivery Method:
More informationHow To Test A Web Based System
Testing Web-Based Systems-Checklists Testing Web-Based Systems -Checklist Overview-: Web-based testing should be RISK ORIENTED. This article describes the risks, presents the types of testing that can
More informationObjectives. Distributed Databases and Client/Server Architecture. Distributed Database. Data Fragmentation
Objectives Distributed Databases and Client/Server Architecture IT354 @ Peter Lo 2005 1 Understand the advantages and disadvantages of distributed databases Know the design issues involved in distributed
More informationBuilding Reliable, Scalable AR System Solutions. High-Availability. White Paper
Building Reliable, Scalable Solutions High-Availability White Paper Introduction This paper will discuss the products, tools and strategies available for building reliable and scalable Action Request System
More informationTerminal Services for InTouch 7.1/7.11. Terminal Services for InTouch 7.1/7.11 PRODUCT POSITION PRODUCT DATASHEET
Terminal Services for InTouch 7.1/7.11 PRODUCT POSITION Terminal Services for InTouch 7.1/7.11 PRODUCT DATASHEET Terminal Services for InTouch 7.1/7.11 provides manufacturing users with all the benefits
More informationStar System. 2004 Deitel & Associates, Inc. All rights reserved.
Star System Apple Macintosh 1984 First commercial OS GUI Chapter 1 Introduction to Operating Systems Outline 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 1.10 1.11 1.12 Introduction What Is an Operating System?
More informationAPPLICATION ARCHITECTURE AND MODELING
C H A P T E R 11 APPLICATION ARCHITECTURE AND MODELING Chapter Map Application Architecture An application architecture specifies the technologies to be used to implement one or more (and possibly all)
More information