Copyright 2010 John Wiley & Sons, Inc2 - 1 Business Data Communications and Networking 10th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons,

Slides:



Advertisements
Similar presentations
Dwayne Whitten, D.B.A Mays Business School Texas A&M University
Advertisements

Data Communications and Networking
© Copyright 2011 John Wiley & Sons, Inc.
Internet…issues Managing the Internet
1 Chapter 2. Application Layers Networking in the Internet Age by Alan Dennis, 1 st Edition Copyright © 2002 John Wiley & Sons, Inc.
Business Data Communications & Networking
Lesson 1: Configuring Network Load Balancing
5th Edition, Irv Englander
CHAPTER 2: Introduction to Systems Concepts and Systems Architecture
1 Chapter 2. Application Layer Business Data Communications and Networking Fitzgerald and Dennis, 7th Edition Copyright © 2002 John Wiley & Sons, Inc.
Copyright 2005 John Wiley & Sons, Inc2 - 1 Business Data Communications and Networking 8th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons,
Copyright 2011 John Wiley & Sons, Inc2 - 1 Business Data Communications and Networking 11th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons,
PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design Copyright 2000 © John Wiley & Sons, Inc. All rights reserved. Slide 1 Systems.
System Architecture & Hardware Configurations Dr. D. Bilal IS 592 Spring 2005.
Business Computing 550 Lesson 4. Fundamentals of Information Systems, Fifth Edition Chapter 4 Telecommunications, the Internet, Intranets, and Extranets.
1 Accessing the Global Database The World Wide Web.
PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design, 2 nd Edition Copyright 2003 © John Wiley & Sons, Inc. All rights reserved.
Fall 2005 By: H. Veisi Computer networks course Olum-fonoon Babol Chapter 7 The Application Layer.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Computer Networks26-1 Chapter 26. Remote Logging, Electronic Mail and File Transfer.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
1 Chapter 2. Network Applications Business Data Communications and Networking Fitzgerald and Dennis, 7th Edition Copyright © 2002 John Wiley & Sons, Inc.
Copyright 2007 John Wiley & Sons, Inc2 - 1 Business Data Communications and Networking 9th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons,
Some Data Comm. Standards
Introduction to Information Technology, 2 nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 7-1 Introduction to Information Technology.
Application Layer CHAPTER 2. Announcements and Outline  Administrative Items  Questions? Recap 1.Introduction to Networks 1.Network Type 2.N etwork.
Chapter 8 The Internet: A Resource for All of Us.
© Dr. Oualid (Walid) Ben Ali Lecture 2 Application Layer.
Introduction to Computers Section 8A. home How the Internet Works Anyone with access to the Internet can exchange text, data files, and programs with.
Slide 1 Systems Analysis and Design With UML 2.0 An Object-Oriented Approach, Second Edition Chapter 13: Physical Architecture Layer Design Alan Dennis,
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
Internet, intranet, and multimedia database processing l Database processing across local and wide area networks l Alternative architectures for distributing.
IT in Business Essentials of the Internet and World Wide Web.
Electronic Mail. Client Software and Mail Hosts –Client PC has client software that communicates with user’s mail host –Mail hosts deliver.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 2 Application Layer.
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
An Overview of the Internet: The Internet: Then and Now How the Internet Works Major Features of the Internet.
UNESCO ICTLIP Module 1. Lesson 61 Introduction to Information and Communication Technologies Lesson 6. What is the Internet?
Slide 3-1 Chapter 3 Terms Electronic Commerce and Internet Technologies Introduction to Information Systems Judith C. Simon.
Slide 3-1 Chapter 3 Electronic Commerce and Internet Technologies Introduction to Information Systems Judith C. Simon.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
INTERNET. Objectives Explain the origin of the Internet and describe how the Internet works. Explain the difference between the World Wide Web and the.
Application Layer Honolulu Community College Cisco Academy Training Center Semester 1 Version
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Kuliah Pengantar Teknologi Informasi Coky Fauzi Alfi cokyfauzialfi.wordpress.com Internet (2)
ISOM 617 Distributed Information Systems. A Brief History of Information Systems 1950s: batch processing mainframes 1960s: data communications over phone.
Newsgroup World Wide Web (WWW) Conservation Over the Internet e.g.ICQ File Transfer Protocol (FTP) Includes 6 main services: Electronic Mail Remote.
Module: Software Engineering of Web Applications Chapter 2: Technologies 1.
27.1 Chapter 27 WWW and HTTP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Internet Applications (Cont’d) Basic Internet Applications – World Wide Web (WWW) Browser Architecture Static Documents Dynamic Documents Active Documents.
CS 6401 The World Wide Web Outline Background Structure Protocols.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 Internet II A consortium of more than 180 universities, government agencies, and private businesses.
Slide 6-1 Chapter 6 System Software Considerations Introduction to Information Systems Judith C. Simon.
27.1 Chapter 27 WWW and HTTP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
PowerPoint Presentation for Dennis, Wixom, & Roth Systems Analysis and Design, 3rd Edition Copyright 2006 © John Wiley & Sons, Inc. All rights reserved.
E-commerce Architecture Ayşe Başar Bener. Client Server Architecture E-commerce is based on client/ server architecture –Client processes requesting service.
5th Edition, Irv Englander
Remote Logging, Electronic Mail, and File Transfer
Instructor Materials Chapter 5 Providing Network Services
Systems Analysis and Design
Systems Analysis and Design
CHAPTER 2 Application Layer.
Systems Analysis and Design With UML 2
Systems Analysis and Design 5th Edition Chapter 8. Architecture Design
Unit# 5: Internet and Worldwide Web
Chapter 7 Network Applications
The Internet and Electronic mail
Presentation transcript:

Copyright 2010 John Wiley & Sons, Inc2 - 1 Business Data Communications and Networking 10th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons, Inc Dwayne Whitten, D.B.A Mays Business School Texas A&M University

Copyright 2010 John Wiley & Sons, Inc2 - 2 Chapter 2 Application Layer

Copyright 2010 John Wiley & Sons, Inc2 - 3 Chapter 2 Outline Application Architectures –Host-Based, Client-Based, and Client-Server Architectures –Choosing Architectures World Wide Web –How the Web Works –Inside an HTTP Request & HTTP Response Electronic Mail –How Works, Inside an SMTP Packet –Listserv, Attachments in MIME Other Applications –FTP, Telnet, Instant Messaging, Videoconferencing

Copyright 2010 John Wiley & Sons, Inc2 - 4 Application Layer - Introduction Application Layer Network Layer Transport Layer Applications (e.g., , web, word processing) Application architecture The way in which the functions of the application layer software are spread among the clients and servers on the network Functions of Application Layer – Data storage - Storing of data generated by programs (e.g., files, records) – Data access logic - Processing required to access stored data (e.g., SQL) – Application logic - Business logic such as word processors, spreadsheets – Presentation logic - Presentation of info to user & acceptance of user commands

Clients and Servers Clients - Microcomputer - Terminal - Network computer - Transaction terminal - Handheld Copyright 2010 John Wiley & Sons, Inc2 - 5 Servers - Mainframe - Microcomputer - Cluster - Virtual server

Copyright 2010 John Wiley & Sons, Inc2 - 6 Application Architectures Determined by how functions of application programs are spread among clients and servers – Host-based Architectures Server performs almost all functions – Client-based architectures Client performs most functions – Client-server architectures Functions shared between client and server

Copyright 2010 John Wiley & Sons, Inc2 - 7 Host-Based Architectures –Client captures key strokes then sends them to the mainframe –Client displays information according to the server’s instructions or a PC running a terminal emulation program

Copyright 2010 John Wiley & Sons, Inc2 - 8 Host-based Architecture Problems Host becoming a bottleneck –All processing done by the host, which can severely limit network performance Host upgrades typically expensive and “lumpy” –Available upgrades require large scale and often costly jumps in processing and memory –Network demand grows more incrementally than does the host capacity –May see poor fit (too much or too little) between host performance and network demand

Copyright 2010 John Wiley & Sons, Inc2 - 9 Client-Based Architectures Example: Using a word processing package on a PC and storing data files on a server

Copyright 2010 John Wiley & Sons, Inc Client-Based Architecture Problems Data traffic must travel back and forth between server and client –Example: when the client program is making a database query, the ENTIRE database must travel to the client before the query can be processed –Often the large file sizes moving across the LAN can yield a poor result in network performance

Copyright 2010 John Wiley & Sons, Inc Client-Server Architectures Client (PC) Server (PC, mini, mainframe) Example: Using a Web browser to obtain web pages uses logic balanced between the client and server

Copyright 2010 John Wiley & Sons, Inc Client-Server Architectures Advantages –More efficient because of distributed processing –Allow hardware and software from different vendors to be used together Disadvantages –Difficulty in getting software from different vendors to work together smoothly –May require Middleware, a third category of software

Copyright 2010 John Wiley & Sons, Inc Middleware Examples of standards for Middleware: –Distributed Computing Environment (DCE) –Common Object Request Broker Architecture (CORBA) –Open Database Connectivity (ODBC) Middleware client application programs server application programs a standard way of translating between software from different vendors –Manages message transfers –Insulates network changes from the clients (e.g., adding a new server)

Copyright 2010 John Wiley & Sons, Inc Multi-tier Architectures Involve more than two computers in distributing application program logic –2-tier architecture Uses clients and servers in a balance, very popular approach in simple LANs –3-tier architecture 3 sets of computers involved –N-tier architecture More than three sets of computers used, more typical across complex organizations Allows load balancing across servers

Copyright 2010 John Wiley & Sons, Inc tier Architecture

Copyright 2010 John Wiley & Sons, Inc N-tier Architecture

Copyright 2010 John Wiley & Sons, Inc Multi-tier Architectures Advantages –Better load balancing: More evenly distributed processing. (e.g., application logic distributed between several servers.) –More scalable: Only servers experiencing high demand need be upgraded Disadvantages –Heavily loaded network: More distributed processing necessitates more data exchanges –Difficult to program and test due to increased complexity

Copyright 2010 John Wiley & Sons, Inc Thin and Thick Clients Classification depends on how much of the application logic resides on the client or server Thin client: Little or no application logic on client Becoming popular because easier to manage, (only the server application logic generally needs to be updated) The best example: World Wide Web architecture (uses a two-tier, thin client architecture) Thick client: All or most of the application logic resides on the client

Copyright 2010 John Wiley & Sons, Inc Thin-Client Example: Web Architecture Client (PC) Web Server (PC, mini, mainframe) Presentation logic Application Logic Data Access logic Data Storage

Peer to Peer Architecture Copyright 2010 John Wiley & Sons, Inc All computers can serve as a client and a server Increased popularity in the last decade due to the rise of P2P services such as Napster Advantages: Data can be stored anywhere on the network Very resilient to failure Disadvantages: Finding data Security

Copyright 2010 John Wiley & Sons, Inc Criteria for Choosing Architecture Infrastructure Cost –Cost of servers, clients, and circuits –Mainframes: very expensive; terminals, PCs: inexpensive Development Cost –Mainly cost of software development –Software: expensive to develop; off-the-shelf software: inexpensive Scalability –Ability to increase (or decrease) in computing capacity as network demand changes –Mainframes: not scalable; PCs: highly scalable

Copyright 2010 John Wiley & Sons, Inc Host-BasedClient-BasedClient-Server Cost of InfrastructureHighMediumLow Cost of DevelopmentLowMedium ScalabilityLowMediumHigh Choosing an Architecture

Copyright 2010 John Wiley & Sons, Inc Applications Layer Examples World Wide Web File Transfer Videoconferencing Instant Messaging

Copyright 2010 John Wiley & Sons, Inc World Wide Web Web began with two innovative ideas: –Hypertext A document containing links to other documents –Uniform Resource Locators (URLs) A formal way of identifying links to other documents Invention of WWW (1989) –By Tim Berners-Lee at CERN in Switzerland First graphical browser, Mosaic, (1993) –By Marc Andressen at NCSA in USA; later founded Netscape CERN - Conseil Européen pour la Rechèrche Nucléaire (Berners-Lee, T. (2000) Weaving the Web. New York: HarperCollins. P. 4) NCSA - National Center for Supercomputing Applications

Copyright 2010 John Wiley & Sons, Inc How the Web Works HTTP Response HTTP Request Client Computer Server Computer Main Web communications protocol: HTTP: Hypertext Transfer Protocol Clicking on a hyperlink or typing a URL into a browser starts a request-response cycle A request-response cycle: includes multiple steps since web pages often contain embedded files, such as graphics, each requiring a separate response.

Copyright 2010 John Wiley & Sons, Inc HTTP Request Message Request line ( command, URL, HTTP version number) Request header ( information on the browser, date, and the referring page ) Request body (information sent to the server, such as from a form) required optional (If the user types in the URL by themselves, then the referring page is blank.)

Copyright 2010 John Wiley & Sons, Inc Example of an HTTP Request Note that this HTTP Request message has no “Body” part.

Copyright 2010 John Wiley & Sons, Inc HTTP Response Message Response status ( http version number, status code, reason) Response header ( information on the server, date, URL of the page retrieved, format used ) Response body (requested web page) optional required

Copyright 2010 John Wiley & Sons, Inc Example of an HTTP Response

Copyright 2010 John Wiley & Sons, Inc HTML - Hypertext Markup Language A language used to create Web pages Also developed at CERN (initially for text files) Tags are embedded in HTML documents – include information on how to format the file Extensions to HTML needed to format multimedia files XML - Extensible Markup Language –A new markup language becoming popular

Copyright 2010 John Wiley & Sons, Inc Standards SMTP - Simple Mail Transfer Protocol –Main standard for Originating user agent and the mail transfer agent Between mail transfer agents –Originally written to handle only text files –Usually used in two-tier client-server architectures Post Office Protocol (POP) and Internet Mail Access Protocol (IMAP) –Main protocols used between the receiver user agent and mail transfer agent –Main difference: with IMAP, messages can be left at the server after downloading them to the client Other competing standards –Common Messaging Calls (CMC), X.400

Copyright 2010 John Wiley & Sons, Inc Two-Tier Architecture User agent is another word for an client application –Run on client computers –Send to servers –Download from mailboxes on those servers –Examples: Eudora, Outlook, Netscape Messenger Mail transfer agent is another word for the mail server application –Used by servers –Send between servers –Maintain individual mailboxes.

Copyright 2010 John Wiley & Sons, Inc Host Based Architectures An old method used on UNIX based hosts Similar to client-server architecture, except –Client PC replaced by a terminal (or terminal emulator) Sends all keystrokes to the server Display characters received from the server –All software resides on the server Takes client keystrokes and understand user’s commands Creates SMTP packets and sends them to next mail server Useful when traveling in locations with poor internet facilities

Copyright 2010 John Wiley & Sons, Inc Web-based LAN SMTP packet Internet Client computer with Server computer with Web server software server software server software IMAP or POP packet IMAP packet HTTP request HTTP response Web browser

Copyright 2010 John Wiley & Sons, Inc Sample SMTP Message Note that this SMTP message has no attachments.

Copyright 2010 John Wiley & Sons, Inc MIME Multipurpose Internet Mail Extension –A graphics capable mail transfer agent protocol (to send graphical information in addition to text) SMTP was designed years ago for text transfer only –MIME software is included as part of an client –Translates graphical information into text allowing the graphic to be sent as part of an SMTP message (as a special attachment) –Receiver’s client then translates the MIME attachment from text back into graphical format –MIME exampleMIME example

Copyright 2010 John Wiley & Sons, Inc Listserv Discussion Groups Mailing lists of users who join to discuss some special topic (e.g., cooking, typing, networking) Some permit any member to post messages, some are more restricted Parts of listserv –Listserv Processor - Processes commands –Listserv Mailer – Receives and distributes messages Example : –Learning Technology Newsletter To subscribe, send the message: subscribe LEARNING-TECHNOLOGY to –To send

Copyright 2010 John Wiley & Sons, Inc File Transfer Protocol (FTP) Enables sending and receiving files over the Internet Requires an application program on the client computer and a FTP server program on a server Commonly used today for uploading web pages Many packages available using FTP –WS-FTP (a graphical FTP software) FTP sites –Closed sites Requires account name and password –Anonymous sites Account name: anonymous; password: address

Copyright 2010 John Wiley & Sons, Inc Telnet Allows one computer to log into another computer –Remote login enabling full control of the host Requires an application program on the client computer and a Telnet server program on the server –Client program emulates a “dumb” terminal off the server Many packages available conforming Telnet –EWAN Requires account name and password –Anonymous sites similar to FTP approach Account name: anonymous; password: address

Copyright 2010 John Wiley & Sons, Inc Instant Messaging (IM) A client-server program that allows real-time typed messages to be exchanged –Client needs an IM client software –Server needs an IM server package Some types allow voice and video packets to be sent –Like a telephone Examples include AOL and ICQ Two step process: –Telling IM server that you are online –Chatting

Copyright 2010 John Wiley & Sons, Inc How Instant Messaging Works LAN IM packet Internet Server computer with IM client software client software Client computer with with IM server software Sender sends a request to the IM server telling it that sender is online. If a friend connects, the IM server sends a packet to sender’s IM client and vice versa. If a chat session has more than two clients, multiple packets are sent by the IM server. IM servers can also relay information to other IM servers. When the sender types in text, the IM client sends the text in a packet to the IM server which relays it to the receiver.

Copyright 2010 John Wiley & Sons, Inc Videoconferencing Provides real time transmission of video and audio signals between two or more locations –Allows people to meet at the same time in different locations –Saves money and time by not having to move people around –Typically involves matched special purpose rooms with cameras and displays Desktop videoconferencing –Low cost application linking small video cameras and microphones together over the Internet –No need for special rooms –Example: Net Meeting software on clients communicating through a common videoconference server

Cisco Videoconferencing Copyright 2010 John Wiley & Sons, Inc2 - 43

Copyright 2010 John Wiley & Sons, Inc Videoconferencing Standards Proprietary early systems Common standards in use today –H.320 Designed for room-to-room videoconferencing over high-speed phone lines –H.323 Family of standards designed for desktop videoconferencing and just simple audio conferencing over Internet –MPEG-2 Designed for faster connections such as LAN or privately owned WANs

Copyright 2010 John Wiley & Sons, Inc Webcasting Special type of uni-directional videoconferencing –Content is sent from the server to users Process –Content created by developer –Downloaded as needed by the user –Played by a plug-in to a Web browser No standards for webcasting yet –Defacto standards: products by RealNetworks

Copyright 2010 John Wiley & Sons, Inc Implications for Management Network may be used to provide a worry-free environment for applications –Network is the critical infrastructure over which the wide variety of strategic applications enable an organization to compete in its environment –The applications running on the network have the potential for changing the organization Dramatic increase in number and type of applications –Rapid growth in amount and type of networking traffic over time Different implication on network design and management Increased operating cost for the network function

Copyright 2010 John Wiley & Sons, Inc Copyright 2010 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in section 117 of the 1976 United States Copyright Act without express permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages caused by the use of these programs or from the use of the information herein.