Sie sind auf Seite 1von 4

CLIENT/SERVER COMPUTING Client/server computing is an alternative technology to mainframe and/or hierarchical networks.

Client/server computing is often used within distributed computing that allows two independent processes to exchange information, through a dedicated connection, following an established protocol for computerized systems. This model is based on the distribution of functions between two types of independent and autonomous processors: servers and clients. A client is any process that requests specific services from server processes. A server is a process that provides requested services for clients. Client and server processes can reside in the same computer or in different computers connected by a network. The database and related software are stored on networked file servers. Although mainframe systems normally centralize everything (including the control of a system), client/server applications distribute data and software among the server and client computers of the system. As a result, client/ server computing is a way to achieve the overall objective of an enterprise network.

Components of Client/Server Systems

Presentation component
client

File Server

Mainframe computer or large server

Data management component

Application component
Local server Centralized system

The presentation component of a client/server system is the users view of the system that what the users see onscreen. This view may resemble the familiar screens of the users

home computer or may differ considerably for them. Simple client server systems that focus on this presentation task are called distributed presentation systems. Most internet applications illustrate this category. The application-logic component of a client /server system refers to the processing logic of a specific application for example, the logic involved in preparing payroll checks. The client/server computing differs from simple host/terminal computing in the users new ability to : (1)Query or manipulate the warehoused data on the server; (2)Ask what-if questions of the servers data; (3) Process a transaction that may affect data stored on both client and server computers ,or (4)After data stored elsewhere on the network. It is because in a host/terminal computing, the processing work is occurring on the Host and the video display is managed by the Terminal. The terminal device doesnt do any application processing; it simply displays the screen from the Host and accepts keystrokes from the user to be sent to the application that is running on the host machine unlike in a client/server computing wherein there is a real processing work. The processing tasks involved in each application are typically shared unequally between the client computer and the server, with the division of labor depending on the particular application. The data-management component of a client server system refers to its databases and data storage systems. Some applications rely on a centralized mainframe for this task. These systems are also the most complex and therefore pose the greatest challenges to accountants for control and audit tasks.

Advantages of Client/Server Computing The advantages of client/ server computing include: 1. Flexibility of distributing hardware, software, data and processing capabilities it is throughout a computer network; it enables the roles and responsibilities of a computing system to be distributed among several independent computers. 2. Reduced telecommunications work- communications can just be performed throughout the computer network 3. Install thin-client systems- this thin-client systems use inexpensive and diskless microcomputers unlike the other expensive models, thus we can save money for other purposes such as for system acquisition and maintenance costs

Disadvantages of Client/Server Computing

The disadvantages of client/server computing include: 1. It must maintain multiple copies of the same databases, which it then stores on its various regional servers this makes backup and recovery procedures more difficult because multiple copies of the same file or several parts of a single file now exist on several different computers. 2. Changing of an application program from one version to another is also more difficult it is because the system usually requires consistency in these programs across all servers 3. User access and security are also more difficult it is because access privileges may vary widely among employees or applications 4. Need for user training is often greater it is because employees must not only know how to use the data and application program required by their jobs but must also understand the system software that enables them to access these databases and programs from local work stations Wireless Data Communications The term wireless data communications, also called Wi-Fi (for wireless fidelity), means transmitting voice-grade signals or digital data over wireless communication channels. It creates wireless ethernet network using access hubs and receiver cards in PCs, cellphones, and PDAs, thereby turning cellphones and similar wireless devices into cordless, multifunction Web Appliances. It can help us accountants for business purposes such as doing financial func tions. The two key dimensions are connectivity and mobility. The connectivity advantage means the ability to connect to the internet, LAN, or WAN without physical wires or cables. To accomplish this, Wi-Fi devices use wireless application protocol (WAP), a set of communication standards and wireless mark-up language (a subset of XML optimized for the small display screens typical of wireless, Internet-enables appliances). Two important types of wireless communications are RFID applications and NFC communications. Radio Frequency Identification It enables the businesses to identify pallets and even individual items without unpacking them form shipping crates. Passive RFID tags have no power source (and therefore cannot wear out) but can nonetheless answer inquiries from energized sources. Active RFID tags are actually chips with antennas, have their own power source, enjoy ranges of more than 100 meters, and are generally more reliable than passive tags. Most noticeable use of RFID tags is as user identifiers in transportation systems. Near Field Communication

It enables mobile devices such as cell phones, PDAs, and laptop computers to communicate with similar devices containing the NFC chips. For example is with NFC devices, you can make travel reservations on your PC, download airline tickets to your mobile phone all with no paper or printing. In effect, it represents RFID communications for the masses. But the operating range of NFC devices is limited to 20 centimetres or about 8 inches- a limitation that helps avoid unintentional uses. NFC technology is a joint product development of Sony, Philips, and Nokia. Three possible communication modes are (1) active (biodirectional), (2) passive (one way), and (3) transponder (batteryless and therefore powered only by an external communication source).

CLOUD COMPUTING The term cloud computing refers to a range of computing services on the internet- for example access to computer software programs, backup and recovery file services, and even Web development and hosting. The term gets its name from the common use of a cloud symbol to represent the internet itself. Many cloud service vendors have familiar names, including Amazon, Google, Yahoo, IBM, Intel, Sun Microsystems, and Microsoft. The first cloud computing conference took place in May 2008 and attracted over 1000 attendees. Further discussion about cloud computing will be on chapter 14 of our AIS Book.

Das könnte Ihnen auch gefallen