Transcript Ch11

Networked
Applications
Chapter 11
Updated January 2009
Raymond Panko’s
Business Data Networks and Telecommunications, 7th edition
May only be used by adopters of the book
© 2009 Pearson Education, Inc. Publishing as Prentice Hall
Client/Server Computing
• The client does at least some of the work
Server Program
Client Program
Server
Client PC
© 2009 Pearson Education, Inc. Publishing as Prentice Hall
11-2
11-2: Client/Server Computing
3
Client/Server Processing with Request-Response Cycle
Request Message
Client Program
Response Message
Does Light I/O and
Post-Download
Processing
Client PC
Server Program
Does Heavy
Database
and Other Heavy
Processing
File Server
Use larger server as number of clients increases
© 2009 Pearson Education, Inc. Publishing as Prentice Hall
11-3
11-3: Web-Enabled Application
HTTP Request Message
Client is Browser
Client PC
HTTP Response Message
Server Program
Web-enabled applications:
Form of client server processing
that uses browsers as clients.
Almost all client PCs
now have browsers.
No need to install new software.
E-Mail Server
© 2009 Pearson Education, Inc. Publishing as Prentice Hall
11-4
E-Mail
© 2009 Pearson Education, Inc. Publishing as Prentice Hall
The E-Mail Delivery Process
Sender’s Mail
Server
Receiver’s Mail
Server
Each e-mail user has a mail server.
Sending
E-Mail
Client
The sender transmits a message to its mail server. Receiving
The sender’s mail server delivers the message
E-Mail
to the receiver’s mail server.
Client
The receiver’s mail server delivers the message
to the receiver.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall
11-6
11-5: E-Mail Standards: Sending
2.
SMTP
To Send
1.
SMTP
To Send
Sender’s Mail
Server
Sending
E-Mail Client
(Outlook, etc.)
Receiver’s Mail
Server
Simple Mail Transfer Protocol
(SMTP) is used to transmit mail
in real time to a user’s mail
server or between mail servers
Receiving
E-Mail Client
(Outlook, etc.)
Sender-initiated
Note that SMTP provides immediate delivery—usually in a few seconds.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall
11-7
11-5: E-Mail Standards: Receiving
3.
POP or
IMAP
to Receive
Sender’s Mail
Server
Sending
E-Mail Client
(Outlook, etc.)
Receiver’s Mail
Server
POP or IMAP to download mail to
receiver when the receiver next
downloads mail
Receiving
E-Mail Client
(Outlook, etc.)
Receiver-initiated
© 2009 Pearson Education, Inc. Publishing as Prentice Hall
11-8
11-5: E-Mail Standards: Web-Based E-Mail
SMTP
HTTP
SMTP
POP or
IMAP
Traditional
E-Mail Client
(Outlook, etc.)
On the left, we have just seen that
traditional e-mail clients send with
SMTP and receive with POP or IMAP.
On the right, Web-based e-mail clients
only need a browser and use HTTP
both to send and to receive.
Web-Based
E-Mail
Client
Browser
Server-server communication always
uses SMTP.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall
11-9
HTML and HTTP
© 2009 Pearson Education, Inc. Publishing as Prentice Hall
11-7: HTML and HTTP
The Hypertext Transfer Protocol (HTTP)
is the standard for transferring messages between
the client (browser) and the server (webserver).
The Hypertext Markup Language (HTML)
is a standard for text documents that have tags to indicate
formatting and other files to be downloaded
© 2009 Pearson Education, Inc. Publishing as Prentice Hall
11-11
Peer-to-Peer
Computing
© 2009 Pearson Education, Inc. Publishing as Prentice Hall
11-15: Traditional Client/Server Application
Client PC
Client PC
Advantage:
Central Control
Client PC
Client PC
Client PC
Disadvantages:
Network Overload at Server
Underused Client Power
Central Control
Server Does Heavy Processing Work
© 2009 Pearson Education, Inc. Publishing as Prentice Hall
11-13
P2P Applications
• Direct service, although most P2P systems use
facilitating servers for some of the work
Peer
Peer
Peer
Peer
Peer
Peer
© 2009 Pearson Education, Inc. Publishing as Prentice Hall
11-14
Figure 11-16: Simple Peer-to-Peer (P2P)
Application
Request
Client PC
Response
Benefits:
End User Freedom
No Network Bottleneck at Server
Uses Client Capacity Better
Client PC
Problems:
Transient Presence of Clients
Transient Client IP Addresses
Security (No Central Control)
© 2009 Pearson Education, Inc. Publishing as Prentice Hall
11-15