SlideShare a Scribd company logo
1 of 2
Download to read offline
Client/Server Model
Applications may vary from single-tier desktop applications          (applications that follow the single-tier
architecture) to multi-tier applications (applications that follow the two-, three-,         or         n-tier
architecture).Based on the processing scenario, a business application can have the following elements:
     The User Interface or the presentation elements through which data is entered.
     The application logic or the business rule element, which helps in validating the entered data.
     The data storage or the data management element, which manages the storage and retrieval of data.

These elements form the base of the models or architectures used in application development. All these
elements can exist on the same computer as a single process or on different computers as different
processes. Depending on the placement of these elements the application architecture can be categorized
as:

    1.   Single-tier architecture
    2.   Two-tier architecture
    3.   Three-tier architecture
    4.   N-tier architecture

    1. Single-tier architecture
A single executable file handles all functions relating to the user, business, and data service layers. All
elements of a business application are combined as a single process. If multiple users need to work on this
application then it needs to be installed on the computer of every user. This type of architecture has one
disadvantage. In case some errors are identified in the application then after rectifying the same, the
application has to be installed again on the system of every user. This is time-consuming process.




                                    Figure 1.0 Single-tier architecture

    2. Two-tier architecture
In two tier architecture, the application is divided in to two parts. One part handles data, while the other
provides the user interface. Therefore, this architecture is called two-tier architecture. The part that handles
the UI is called the client tier. The part that implements the application logic and validates the input data
based on the business rules is called the Server tier, as shown in the following figure.




                                    Figure 1.1 Two-tier architecture
In this architecture, the mainteanance, upgrade and general administration of data is easier, as it exists only
on the server and not on all the clients.Two tier architecture is called the client server architecture. A client
sends the request for services and a server provides the service. Most RDBMS, such as Microsoft Access,
SQL Server, and Oracle, support client-server architecture. RDBMS provides centralized functionality
while supporting many users.
3. Three-tier architecture
When implementing complex business solutions in two-tier architecture, the tier on which the business
logic is implemented becomes over loaded. As a result, it takes more time to execute. Therefore, to provide
further flexibility, the two-tier architecture can be split into three tiers. In three tier architecture, the first
tier is the client tier. The second or the middle tier is called the business tier. The third tier is called the
Server tier. The server tier contains a database server that manages the data. All the three service layers
reside separately, either on the same machine or on different machines. In this architecture, an additional
tier called a business tier has been added between the client tier and the server tier, as shown in the
following figure.




                                   Figure 1.2 Three-tier architecture

The business tier consists of all the business rules. It consists of the application logic that implements
business rules and validates the data. The advantage of a three tier application is that it allows you to change
the business rules without affecting the other two tiers.

    4. N-tier architecture
As the business complexities increased, the business tier became larger and unmanageable. This led to the
evolution of n-tier architecture, where the business services model was divided into smaller manageable
units. N-tier is also called multi tier architecture. In this architecture, one components near the client tier is
responsible to do the client side validation and send the data to the presentation tier. Therefore, it is possible
to keep the UI-centric processing component on a computer near the client. The UI-centric processing
component is responsible for processing the data received from and sent to the presentation tier. Data-
centric processing components are responsible for accessing the data tier to retrieve, modify, and delete
data to and from the database server.The N-tier architecture consists of the following layers:

       Client tier
       UI-Centric processing components
       Data-Centric processing object
       Database Server

Applications that follow multi tier can be used across various locations. For example, in Web application,
an application is stored on the Web server. The clients access the applications from any location through
a browser. The clients make requests to the web server and receive responses.

More Related Content

What's hot

SRS for Hospital Management System
SRS for Hospital Management SystemSRS for Hospital Management System
SRS for Hospital Management Systemkataria Arvind
 
Software Engineering Methodologies
Software Engineering MethodologiesSoftware Engineering Methodologies
Software Engineering MethodologiesDamian T. Gordon
 
Student result mamagement
Student result mamagementStudent result mamagement
Student result mamagementMickey
 
Synopsis on Online examination system using php
Synopsis on Online examination system using phpSynopsis on Online examination system using php
Synopsis on Online examination system using phpArchana Jha
 
Full report on blood bank management system
Full report on  blood bank management systemFull report on  blood bank management system
Full report on blood bank management systemJawhar Ali
 
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali JafriFinal Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali JafriSyed Ubaid Ali Jafri
 
Ch 12 Attacking Users - XSS
Ch 12 Attacking Users - XSSCh 12 Attacking Users - XSS
Ch 12 Attacking Users - XSSSam Bowne
 
Library management system
Library management systemLibrary management system
Library management systemImdad Ul Haq
 
School fee-management-system
School fee-management-systemSchool fee-management-system
School fee-management-systemJitendra Shrestha
 
Project report college information management system on Advanced Java
Project report college information management system on Advanced JavaProject report college information management system on Advanced Java
Project report college information management system on Advanced JavaRishabh Kumar ☁️
 
Analysis modeling & scenario based modeling
Analysis modeling &  scenario based modeling Analysis modeling &  scenario based modeling
Analysis modeling & scenario based modeling Benazir Fathima
 
College Stationery Management System
College Stationery Management SystemCollege Stationery Management System
College Stationery Management SystemTushar Soni
 
Class Diagram Templates by Creately
Class Diagram Templates by CreatelyClass Diagram Templates by Creately
Class Diagram Templates by CreatelyCreately
 
two tier and three tier
two tier and three tiertwo tier and three tier
two tier and three tierKashafnaz2
 
Client Server Architecture in Software engineering
Client Server Architecture in Software engineeringClient Server Architecture in Software engineering
Client Server Architecture in Software engineeringpruthvi2898
 
Android based crime manage system proposal
Android based crime manage system proposalAndroid based crime manage system proposal
Android based crime manage system proposalBeresa Abebe
 
Communication primitives
Communication primitivesCommunication primitives
Communication primitivesStudent
 

What's hot (20)

SRS for Hospital Management System
SRS for Hospital Management SystemSRS for Hospital Management System
SRS for Hospital Management System
 
Software Engineering Methodologies
Software Engineering MethodologiesSoftware Engineering Methodologies
Software Engineering Methodologies
 
Student result mamagement
Student result mamagementStudent result mamagement
Student result mamagement
 
Synopsis on Online examination system using php
Synopsis on Online examination system using phpSynopsis on Online examination system using php
Synopsis on Online examination system using php
 
HOSPITAL MANAGEMENT SYSTEM PROJECT
HOSPITAL MANAGEMENT SYSTEM PROJECTHOSPITAL MANAGEMENT SYSTEM PROJECT
HOSPITAL MANAGEMENT SYSTEM PROJECT
 
Full report on blood bank management system
Full report on  blood bank management systemFull report on  blood bank management system
Full report on blood bank management system
 
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali JafriFinal Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
 
Ch 12 Attacking Users - XSS
Ch 12 Attacking Users - XSSCh 12 Attacking Users - XSS
Ch 12 Attacking Users - XSS
 
Library management system
Library management systemLibrary management system
Library management system
 
School fee-management-system
School fee-management-systemSchool fee-management-system
School fee-management-system
 
Project report college information management system on Advanced Java
Project report college information management system on Advanced JavaProject report college information management system on Advanced Java
Project report college information management system on Advanced Java
 
Analysis modeling & scenario based modeling
Analysis modeling &  scenario based modeling Analysis modeling &  scenario based modeling
Analysis modeling & scenario based modeling
 
College Stationery Management System
College Stationery Management SystemCollege Stationery Management System
College Stationery Management System
 
Class Diagram Templates by Creately
Class Diagram Templates by CreatelyClass Diagram Templates by Creately
Class Diagram Templates by Creately
 
SRS Slide
SRS SlideSRS Slide
SRS Slide
 
two tier and three tier
two tier and three tiertwo tier and three tier
two tier and three tier
 
Hospital management system
Hospital management systemHospital management system
Hospital management system
 
Client Server Architecture in Software engineering
Client Server Architecture in Software engineeringClient Server Architecture in Software engineering
Client Server Architecture in Software engineering
 
Android based crime manage system proposal
Android based crime manage system proposalAndroid based crime manage system proposal
Android based crime manage system proposal
 
Communication primitives
Communication primitivesCommunication primitives
Communication primitives
 

Viewers also liked

8 Characteristics of good user requirements
8 Characteristics of good user requirements8 Characteristics of good user requirements
8 Characteristics of good user requirementsguest24d72f
 
.NET Framework Overview
.NET Framework Overview.NET Framework Overview
.NET Framework OverviewDoncho Minkov
 
Introduction to .net framework
Introduction to .net frameworkIntroduction to .net framework
Introduction to .net frameworkArun Prasad
 
Introduction to Web Architecture
Introduction to Web ArchitectureIntroduction to Web Architecture
Introduction to Web ArchitectureChamnap Chhorn
 
Architecture of a Modern Web App
Architecture of a Modern Web AppArchitecture of a Modern Web App
Architecture of a Modern Web Appscothis
 
Pengembangan sbi
Pengembangan sbiPengembangan sbi
Pengembangan sbismkfarmasi
 
15 web tools for administrators
15 web tools for administrators15 web tools for administrators
15 web tools for administratorsBrandon Raymo
 
Presentación2
Presentación2Presentación2
Presentación2mile
 
Una Igualdad Merecida; Jacinta Martínez Sánchez 4ºB
Una Igualdad Merecida; Jacinta Martínez Sánchez 4ºB Una Igualdad Merecida; Jacinta Martínez Sánchez 4ºB
Una Igualdad Merecida; Jacinta Martínez Sánchez 4ºB sabinamora
 
Why Form a Health Professions Training Program at Your Federally Qualified H...
Why Form a Health Professions Training Program at Your  Federally Qualified H...Why Form a Health Professions Training Program at Your  Federally Qualified H...
Why Form a Health Professions Training Program at Your Federally Qualified H...CHC Connecticut
 
50 sites 21st century skills
50 sites 21st century skills50 sites 21st century skills
50 sites 21st century skillsBrandon Raymo
 
Introducing PhoneGap to SproutCore 2
Introducing PhoneGap to SproutCore 2Introducing PhoneGap to SproutCore 2
Introducing PhoneGap to SproutCore 2mwbrooks
 

Viewers also liked (20)

4 sdlc and stlc
4 sdlc and stlc4 sdlc and stlc
4 sdlc and stlc
 
8 Characteristics of good user requirements
8 Characteristics of good user requirements8 Characteristics of good user requirements
8 Characteristics of good user requirements
 
.NET Framework Overview
.NET Framework Overview.NET Framework Overview
.NET Framework Overview
 
Introduction to .net framework
Introduction to .net frameworkIntroduction to .net framework
Introduction to .net framework
 
Introduction to Web Architecture
Introduction to Web ArchitectureIntroduction to Web Architecture
Introduction to Web Architecture
 
Architecture of a Modern Web App
Architecture of a Modern Web AppArchitecture of a Modern Web App
Architecture of a Modern Web App
 
Pengembangan sbi
Pengembangan sbiPengembangan sbi
Pengembangan sbi
 
15 web tools for administrators
15 web tools for administrators15 web tools for administrators
15 web tools for administrators
 
Beni culturali - Daniela Fiore
Beni culturali  - Daniela FioreBeni culturali  - Daniela Fiore
Beni culturali - Daniela Fiore
 
Daur baur Digital activation
Daur baur Digital activationDaur baur Digital activation
Daur baur Digital activation
 
Presentación2
Presentación2Presentación2
Presentación2
 
Thesis
ThesisThesis
Thesis
 
Una Igualdad Merecida; Jacinta Martínez Sánchez 4ºB
Una Igualdad Merecida; Jacinta Martínez Sánchez 4ºB Una Igualdad Merecida; Jacinta Martínez Sánchez 4ºB
Una Igualdad Merecida; Jacinta Martínez Sánchez 4ºB
 
J query 17-visual-cheat-sheet
J query 17-visual-cheat-sheetJ query 17-visual-cheat-sheet
J query 17-visual-cheat-sheet
 
Resume1
Resume1Resume1
Resume1
 
ValeryBassenkoResume
ValeryBassenkoResumeValeryBassenkoResume
ValeryBassenkoResume
 
Why Form a Health Professions Training Program at Your Federally Qualified H...
Why Form a Health Professions Training Program at Your  Federally Qualified H...Why Form a Health Professions Training Program at Your  Federally Qualified H...
Why Form a Health Professions Training Program at Your Federally Qualified H...
 
50 sites 21st century skills
50 sites 21st century skills50 sites 21st century skills
50 sites 21st century skills
 
Bid’ah, apakah itu
Bid’ah, apakah ituBid’ah, apakah itu
Bid’ah, apakah itu
 
Introducing PhoneGap to SproutCore 2
Introducing PhoneGap to SproutCore 2Introducing PhoneGap to SproutCore 2
Introducing PhoneGap to SproutCore 2
 

Similar to Client/Server Model Explained: Single, Two, Three & N-Tier Architectures

2-Tier and 3-Tier Architecture of Enterprise Resource Planning
2-Tier and 3-Tier Architecture of Enterprise Resource Planning2-Tier and 3-Tier Architecture of Enterprise Resource Planning
2-Tier and 3-Tier Architecture of Enterprise Resource PlanningS M Qamar Abbas
 
Introductuction of sql server gain america
Introductuction of sql server  gain americaIntroductuction of sql server  gain america
Introductuction of sql server gain americaGainAmerica
 
Chapter2
Chapter2Chapter2
Chapter2suks_87
 
Client computing evolution ppt11
Client computing evolution ppt11Client computing evolution ppt11
Client computing evolution ppt11Tech_MX
 
Client/Server Architecture By Faisal Shahzad
Client/Server Architecture By Faisal Shahzad Client/Server Architecture By Faisal Shahzad
Client/Server Architecture By Faisal Shahzad Faisal Shehzad
 
Web Based Application for Rent or Sale
Web Based Application for Rent or SaleWeb Based Application for Rent or Sale
Web Based Application for Rent or SaleMike Taylor
 
Client server architecture
Client server architectureClient server architecture
Client server architectureBhargav Amin
 
Dispute Resolution Web Application
Dispute Resolution Web ApplicationDispute Resolution Web Application
Dispute Resolution Web ApplicationMike Taylor
 
Differences Between Architectures
Differences Between ArchitecturesDifferences Between Architectures
Differences Between Architecturesprasadsmn
 
Mobile Responsive Social Corporate Intranet Portal Application
Mobile Responsive Social Corporate Intranet Portal ApplicationMobile Responsive Social Corporate Intranet Portal Application
Mobile Responsive Social Corporate Intranet Portal ApplicationMike Taylor
 
Odbc and data access objects
Odbc and data access objectsOdbc and data access objects
Odbc and data access objectsSangeetha Sg
 
N tier architecture
N tier architectureN tier architecture
N tier architectureNidhi Saurav
 
N tier architecture
N tier architectureN tier architecture
N tier architectureNidhi Saurav
 
N tier architecture
N tier architectureN tier architecture
N tier architectureNidhi Saurav
 
N tier architecture
N tier architectureN tier architecture
N tier architectureNidhi Saurav
 
N tier architecture
N tier architectureN tier architecture
N tier architectureNidhi Saurav
 

Similar to Client/Server Model Explained: Single, Two, Three & N-Tier Architectures (20)

2-Tier and 3-Tier Architecture of Enterprise Resource Planning
2-Tier and 3-Tier Architecture of Enterprise Resource Planning2-Tier and 3-Tier Architecture of Enterprise Resource Planning
2-Tier and 3-Tier Architecture of Enterprise Resource Planning
 
Introductuction of sql server gain america
Introductuction of sql server  gain americaIntroductuction of sql server  gain america
Introductuction of sql server gain america
 
Chapter2
Chapter2Chapter2
Chapter2
 
Client computing evolution ppt11
Client computing evolution ppt11Client computing evolution ppt11
Client computing evolution ppt11
 
Client/Server Architecture By Faisal Shahzad
Client/Server Architecture By Faisal Shahzad Client/Server Architecture By Faisal Shahzad
Client/Server Architecture By Faisal Shahzad
 
Web Based Application for Rent or Sale
Web Based Application for Rent or SaleWeb Based Application for Rent or Sale
Web Based Application for Rent or Sale
 
Appathika.ppt
Appathika.pptAppathika.ppt
Appathika.ppt
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
 
Dispute Resolution Web Application
Dispute Resolution Web ApplicationDispute Resolution Web Application
Dispute Resolution Web Application
 
Differences Between Architectures
Differences Between ArchitecturesDifferences Between Architectures
Differences Between Architectures
 
A
AA
A
 
Mobile Responsive Social Corporate Intranet Portal Application
Mobile Responsive Social Corporate Intranet Portal ApplicationMobile Responsive Social Corporate Intranet Portal Application
Mobile Responsive Social Corporate Intranet Portal Application
 
Odbc and data access objects
Odbc and data access objectsOdbc and data access objects
Odbc and data access objects
 
J2 ee archi
J2 ee archiJ2 ee archi
J2 ee archi
 
3 tier architecture
3 tier architecture3 tier architecture
3 tier architecture
 
N tier architecture
N tier architectureN tier architecture
N tier architecture
 
N tier architecture
N tier architectureN tier architecture
N tier architecture
 
N tier architecture
N tier architectureN tier architecture
N tier architecture
 
N tier architecture
N tier architectureN tier architecture
N tier architecture
 
N tier architecture
N tier architectureN tier architecture
N tier architecture
 

More from Bosco Technical Training Society, Don Bosco Technical School (Aff. GGSIP University, New Delhi)

More from Bosco Technical Training Society, Don Bosco Technical School (Aff. GGSIP University, New Delhi) (20)

String Manipulation Function and Header File Functions
String Manipulation Function and Header File FunctionsString Manipulation Function and Header File Functions
String Manipulation Function and Header File Functions
 
C Structure and Union in C
C Structure and Union in CC Structure and Union in C
C Structure and Union in C
 
Preprocessor Directive in C
Preprocessor Directive in CPreprocessor Directive in C
Preprocessor Directive in C
 
File Handling in C Programming
File Handling in C ProgrammingFile Handling in C Programming
File Handling in C Programming
 
Bit field enum and command line arguments
Bit field enum and command line argumentsBit field enum and command line arguments
Bit field enum and command line arguments
 
Pointers in C and Dynamic Memory Allocation
Pointers in C and Dynamic Memory AllocationPointers in C and Dynamic Memory Allocation
Pointers in C and Dynamic Memory Allocation
 
Array in C
Array in CArray in C
Array in C
 
C storage class
C storage classC storage class
C storage class
 
Function in C Programming
Function in C ProgrammingFunction in C Programming
Function in C Programming
 
C Constructs (C Statements & Loop)
C Constructs (C Statements & Loop)C Constructs (C Statements & Loop)
C Constructs (C Statements & Loop)
 
C Operators
C OperatorsC Operators
C Operators
 
C programming Basics
C programming BasicsC programming Basics
C programming Basics
 
Software Development Skills and SDLC
Software Development Skills and SDLCSoftware Development Skills and SDLC
Software Development Skills and SDLC
 
Mobile commerce
Mobile commerceMobile commerce
Mobile commerce
 
E commerce application
E commerce applicationE commerce application
E commerce application
 
Data normalization
Data normalizationData normalization
Data normalization
 
Html Form Controls
Html Form ControlsHtml Form Controls
Html Form Controls
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
ER to Relational Mapping
ER to Relational MappingER to Relational Mapping
ER to Relational Mapping
 
Entity Relationship Model
Entity Relationship ModelEntity Relationship Model
Entity Relationship Model
 

Recently uploaded

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Client/Server Model Explained: Single, Two, Three & N-Tier Architectures

  • 1. Client/Server Model Applications may vary from single-tier desktop applications (applications that follow the single-tier architecture) to multi-tier applications (applications that follow the two-, three-, or n-tier architecture).Based on the processing scenario, a business application can have the following elements:  The User Interface or the presentation elements through which data is entered.  The application logic or the business rule element, which helps in validating the entered data.  The data storage or the data management element, which manages the storage and retrieval of data. These elements form the base of the models or architectures used in application development. All these elements can exist on the same computer as a single process or on different computers as different processes. Depending on the placement of these elements the application architecture can be categorized as: 1. Single-tier architecture 2. Two-tier architecture 3. Three-tier architecture 4. N-tier architecture 1. Single-tier architecture A single executable file handles all functions relating to the user, business, and data service layers. All elements of a business application are combined as a single process. If multiple users need to work on this application then it needs to be installed on the computer of every user. This type of architecture has one disadvantage. In case some errors are identified in the application then after rectifying the same, the application has to be installed again on the system of every user. This is time-consuming process. Figure 1.0 Single-tier architecture 2. Two-tier architecture In two tier architecture, the application is divided in to two parts. One part handles data, while the other provides the user interface. Therefore, this architecture is called two-tier architecture. The part that handles the UI is called the client tier. The part that implements the application logic and validates the input data based on the business rules is called the Server tier, as shown in the following figure. Figure 1.1 Two-tier architecture In this architecture, the mainteanance, upgrade and general administration of data is easier, as it exists only on the server and not on all the clients.Two tier architecture is called the client server architecture. A client sends the request for services and a server provides the service. Most RDBMS, such as Microsoft Access, SQL Server, and Oracle, support client-server architecture. RDBMS provides centralized functionality while supporting many users.
  • 2. 3. Three-tier architecture When implementing complex business solutions in two-tier architecture, the tier on which the business logic is implemented becomes over loaded. As a result, it takes more time to execute. Therefore, to provide further flexibility, the two-tier architecture can be split into three tiers. In three tier architecture, the first tier is the client tier. The second or the middle tier is called the business tier. The third tier is called the Server tier. The server tier contains a database server that manages the data. All the three service layers reside separately, either on the same machine or on different machines. In this architecture, an additional tier called a business tier has been added between the client tier and the server tier, as shown in the following figure. Figure 1.2 Three-tier architecture The business tier consists of all the business rules. It consists of the application logic that implements business rules and validates the data. The advantage of a three tier application is that it allows you to change the business rules without affecting the other two tiers. 4. N-tier architecture As the business complexities increased, the business tier became larger and unmanageable. This led to the evolution of n-tier architecture, where the business services model was divided into smaller manageable units. N-tier is also called multi tier architecture. In this architecture, one components near the client tier is responsible to do the client side validation and send the data to the presentation tier. Therefore, it is possible to keep the UI-centric processing component on a computer near the client. The UI-centric processing component is responsible for processing the data received from and sent to the presentation tier. Data- centric processing components are responsible for accessing the data tier to retrieve, modify, and delete data to and from the database server.The N-tier architecture consists of the following layers:  Client tier  UI-Centric processing components  Data-Centric processing object  Database Server Applications that follow multi tier can be used across various locations. For example, in Web application, an application is stored on the Web server. The clients access the applications from any location through a browser. The clients make requests to the web server and receive responses.