Beruflich Dokumente
Kultur Dokumente
TIER ARCHITECTURE
VISHAL JAMDAR
TELECOM TEAM
PUNE PREPARED BY
VISHAL JAMDAR
DATE
DEC 2017
0|Page
TIER ARCHITECTURE
TABLE OF CONTENTS
Chapter No. Name Page
No.
1 Introduction
1.1 What is tier architecture 1
1.2 Need of tier architecture 2
1.3 Evolution to the N-tier architecture
2 Tier architecture
2.1 Single tier architecture 4
2.2 Two tier architecture 5
2.3 Three tier architecture 7
3 Difference between Two tier and three tier 11
architecture
4 Future Scope
4.1 Introduction 13
4.2 Four tier architecture 13
5 Application of Tier architecture
5.1 Tier architecture for data Centre design 16
5.1.1 Tier 1 16
5.1.2 Tier 2 16
5.1.3 Tier 3 17
5.1.4 Leaf-Spine architecture 18
5.1.5 Lenovo Spine switches 20
5.1.5.1 Lenovo Think System NE10032 Rack Switch Spine
Switch
5.1.5.2 Lenovo Rack Switch G8332 Spine Switch
5.1.6 Lenovo Leaf Switches 21
5.1.6.1 Lenovo Think System NE2572 Rack Switch Leaf
Switch
5.1.6.2 Lenovo Rack Switch G8272 Leaf Switch
5.1.6.3 Lenovo Rack Switch G8296 Leaf Switch
5.2 Tier architecture in network design
5.2.1 Three tier network design model 18
5.2.2 Two tier network design model 20
1|Page
TIER ARCHITECTURE
LIST OF FIGURES
2|Page
TIER ARCHITECTURE
1. Introduction
3|Page
TIER ARCHITECTURE
database server was in the center of the application network, so everyone possessed a
synchronization view of data. But over time, with growing complexity of desktop application
it becomes more and more difficult to manage installation and updating of different component
on every PC in the enterprise. Everything had to be in sync. Over a multitude of configuration
and that was not an easy task for the administrator.
1.3 Evolution to the n-tier architecture
The fig. 1 shows the evolution to the n-tier architecture in which we can see that the
upgradation of the tier architecture from single tier to n-tier architecture. Out of which here our
focus is on the single tier, two tier and three tier architecture. In single tier architecture, there is a
central processing system was present which nothing is but one mainframe computer which
provide all processing functions. This system is also referred as traditional host system. While in
case of two tier architecture distribution system is used in which both data and transactions are
divided between one or more computers or data servers which are interconnected to each other via
computer networks. The last and most widespread multi-tier architecture which is nothing but three
tier architecture. The three tier architecture is a client-server architecture in which the functional
4|Page
TIER ARCHITECTURE
process logic, data access, computer data storage and user interface are developed and maintained
as independent modules on separate platforms.
This report covers the detailed information about single tier, two tier and three tier
architecture with their advantages and disadvantages is covered in section 2. The difference
between these three architecture is represented in tabular form which is covered in section 3. In
future scope the introduction of four tier architecture is covered in section 4 and finally conclusion
is made.
5|Page
TIER ARCHITECTURE
2. Tier architecture
2.1 Single tier architecture
As mentioned earlier, the single tier architecture which is nothing but a traditional host
system having a central processing system which is referred as mainframe computer which
provides all the processing functions. This mainframe computer served the whole business
community and was accessed via dumb terminals. Dumb terminals is nothing but an output
device which accepts data from CPU. They have no intelligence (data processing) and depends
entirely on the computer to which they are connected. All processing took place on a single
computer and therefore in one place. All resources associated with the computer (tape and disk
drives, printers etc.) were attached to this same computer.
6|Page
TIER ARCHITECTURE
7|Page
TIER ARCHITECTURE
V. The Database driver is installed in each computer that runs the client application. If the
database changes, we need to reinstall Database driver in all the computer. This increases
Deployment cost.
VI. If you change the type of database used by your organization, you need to redeploy and
reconfigure each client application.
VII. Each client establishes a separate database connection. Database connections are limited
in number and are expensive to establish. Database Connection is retained even when the
client is not accessing the database. This makes the database connection unavailable to
other users. Therefore only a limited number of clients can access the database at a time.
VIII. Usage: Suitable for environments where business rules do not change frequently and the
number of users are limited.
8|Page
TIER ARCHITECTURE
iii. Because the bulk of the application logic is on the client, there is the problem of client
software version control and new version redistribution.
9|Page
TIER ARCHITECTURE
10 | P a g e
TIER ARCHITECTURE
Each layer should be totally unaware of the inner workings of the other layers. The Business
layer, for example, must be database-agnostic and not know or care about the inner workings
of the Data Access object. It must also be presentation-agnostic and not know or care how its
data will be handled. It should not process its data differently based on what the receiving
component will do with that data. The presentation layer may take the data and construct an
HTML document, a PDF document, a CSV file, or process it in some other way, but that should
be totally irrelevant to the Business layer.
Advantages of Three tier architecture
i. Improved Scalability: Due to the distributed deployment of application servers,
scalability of the system is enhanced since a separate connection from each client is not
required whereas connections from few application servers are sufficient.
ii. Improved Data Integrity: Data corruption through client applications can be
eliminated as the data passed in the middle tier for database updating ensures its
validity.
iii. Enhanced Security: Through the implementation of several layers, enhances the data
security on a service-by-service basis. As clients do not interact with the database
directly, it provides less risk and confliction with unauthorized data. The placement of
the business logic on a centralized server makes the data more secure.
iv. Reduced Distribution: The layered architecture enables to update only the application
servers, not all distributed clients in case of a modification in the business logic.
v. Hidden Database Structure: The actual structure of the database often remains hidden
from requesters enabling any change of the database to be transparent. Thus a process
in the middle tier which exchanges data with other applications can sustain its current
interface while a modification of the underlying database structure.
vi. Redundant Sever Availability: mission-critical applications seek the use of
superfluous application servers and database servers as it’s possible to create an
application which will recover the system from network or server failures, with
redundant servers.
11 | P a g e
TIER ARCHITECTURE
12 | P a g e
TIER ARCHITECTURE
13 | P a g e
TIER ARCHITECTURE
14 | P a g e
TIER ARCHITECTURE
4. Future Scope
4.1 Introduction
With the development of the mobile internet and computer software, the requirements for
portability, encapsulation and expansibility of computer software system are increasingly high.
The traditional three-tier architecture is no longer applicable because of its limitations in the
current application environment. Consider the problem of platform migration, changes in the
demand and improving the efficiency and effectiveness of maintenance. In recent years,
exploration direction in software system development is increasingly turned to the procedural
framework and design patterns. So we preferred more than 3 tier architecture i.e. N- tier
architecture. The following is the consideration made to use N-tier architecture in our application.
As we are going to work with several tiers, we need to make sure that network bandwidth
and hardware are fast. If not, the application’s performance might be slow. Also, this would
mean that you would have to pay more for the network, the hardware, and the maintenance
needed to ensure that you have better network bandwidth.
While designing N-tier architecture take a precaution that use as fewer tiers as possible.
Remember that each tier will add, the software or project means an added layer of complexity,
more hardware to purchase, as well as higher maintenance and deployment costs. So to make n-
tier applications make simple and less complex, it should have the minimum number of tiers
needed to still enjoy the scalability, security and other benefits brought about by using this
architecture.
4.2 Four tier architecture
Four- tier architecture, which is introduced a new layer - a data service layer into traditional
three-tier architecture. The goal for building out a 4-tier architecture is, essentially, the same as the
3-tier architecture: keep the construction of business solutions simple, scalable and maintainable.
The four layers of four-tier architecture are presentation layer (PL), data service layer (DSL),
business logic layer (BLL), and data access layer (DAL). Four-tier architecture is as shown in
Figure 5. As can be seen from the diagram, according to the geographical location the layers can
be divided into two types. One is data access layer, business logic layer, and the data services layer
which is located in server-side, as well as the business entity model and the generic class library.
The other one is the presentation layer located in client.
15 | P a g e
TIER ARCHITECTURE
1) Presentation Layer (PL): It is located in the outermost layer; popular talk is the interface
showed to users, users’ WYSIWYG when using a system. Its functions contain receiving data
inputted, interpreting users' instructions, and sending requests to the data services layer and
displaying the data obtained from the data services layer to users by the way they can understand.
It closest to users and provide an interactive operation interface.
2) Data service layer (DSL): It is located between the presentation layer and business logic layer
(BLL). As the isolation layer, it will separate the business logic from the client, so as to guarantee
the security of information. According to the needs of each module, data services layer
encapsulates the business logic on high level. Operational activities played a role of confidentiality.
16 | P a g e
TIER ARCHITECTURE
For large software systems, cross-platform distributed computing and server farms between
communications are essential, which is the function of the service layer’s establishment. The main
function of DSL is referring data processed by BLL to its immediate upper layer (presentation
layer) or transferring data submitted by PL to its directly below that is BLL according to the
specified model definitions.
3) Business logic layer (BLL): It is located between the PL and data access layer (BLL), playing
a connecting role in the data exchange. Business logic layer is responsible for the various types of
business operations of system, the completion of the corresponding functions, which are issue-
specific operations, the data business logic processing. The layer’s concerns are focused primarily
on the development of business rules, business processes and business needs related system,
meaning that it is related to area of systems addressed by the logic. Very often, it’s also known as
the domain layer.
4) Data access layer (DAL): It is located in the innermost layer that implements persistence logic.
The function of this layer is responsible for access to the database; you can access the database
system, binary files, text documents or XML document. Operations on the data contain finding,
adding, deleting, modifying, etc. This level work independently, without relying on other layers.
In accordance with upper layer’s requests, DAL extracts the appropriate data from the database
and passes the data to the upper.
The four-tier architecture also had the advantages of high reuse, strong scalability, low
coupling and high efficiency. In the future, development with the four-tier architecture will become
more and more popular because of its advantages.
17 | P a g e
TIER ARCHITECTURE
Tier 2 data Centre are considerably more reliable than tier 1 data Centre although they can be
subject to problems with uptime. To achieve tier 2, the facility has to meet the criteria achieved
with a tier 1 data Centre, as well as ensuring that all capacity components are fully redundant.
18 | P a g e
TIER ARCHITECTURE
Pros
Planned service outages can be performed in a way that does not affect equipment uptime.
Normally cheaper than tier 3 or 4 facilities.
Cons
Tier 3 data Centre are commonly seen as the most cost effective solutions for the vast majority
of medium to large networks. Tier 3 data Centre have to meet all of the requirements of tiers 1 &
2 as well as ensuring all equipment is dual-powered and has multiple uplinks. Some facilities also
offer some fully fault-resistant equipment, although to achieve tier 4, all equipment including
HVAC, servers, storage, chillers and uplinks must be fully fault-resistant. This tier is generally
considered as tier 3+ in the marketplace.
Pros
19 | P a g e
TIER ARCHITECTURE
Cons
Appropriate for:
20 | P a g e
TIER ARCHITECTURE
Interconnection of Lots of Links (TRILL) or Shortest Path Bridging (SPB). The core network is
also connected to the spine with Layer 3 using a dynamic routing protocol with ECMP. Redundant
connections to each spine switch are not required but highly recommended, as show in figure. This
minimizes the risk of overloading the links on the spine-leaf fabric. This architecture provides a
connection thru the spine with a single hop between leafs minimizing any latency and bottle necks.
The spine can be expanded or decreased depending on the data thru-put required.
21 | P a g e
TIER ARCHITECTURE
The leading concern is the amount of cables and network equipment required to scale the
bandwidth since each leaf must be connected to every spine device. This can lead to more
expensive spine switches with high port counts.
The number of hosts that can be supported can be limited due to spine port counts
restricting the number of leaf switch connections.
Oversubscription of the spine-leaf connections can occur due to a limited number of
spine connections available on the leaf switches (typically 4 to 6). Generally, no more
than a 5:1 oversubscription ratio between the leaf and spine is considered acceptable but
this is highly dependent upon the amount of traffic in your particular environment.
Oversubscription of the links out of the spine-leaf domain to the core should also be
considered. Since this architecture is optimized for east-west traffic as opposed to north-
south, oversubscriptions of 100:1 may be considered acceptable.
5.1.5 Lenovo spine switches
The spine switch is used to connect the leaf switches. Lenovo has two recommended leaf
switches each with the same number of ports but with different uplink speeds.
When considering the spine switch consider the following aspects:
Number of leaf switches to be connected
Types uplink connections (100/40 Gbps QSFP28 vs 40 Gbps QSFP+)
The switch with the least number of 100 or 40 Gigabit ports will limit the cumulative
spine speed.
The Lenovo Think System NE10032 Rack Switch™ (Figure 6) is Lenovo’s preferred spine
switch which offers 100 Gbps or 40 Gbps Ethernet spine connections. The NE10032 has the
following features that are important for this spine switch:
22 | P a g e
TIER ARCHITECTURE
The Lenovo Rack Switch G8332 (Figure 8) is a 40 Gbps Ethernet spine switch. The G8332 has
the following features that are important for this spine switch:
The leaf switch is used to connect server nodes. Lenovo has three recommended leaf
switches each with varying number of ports and types of connections:
When considering mixed types of leaf switches, the switch with the least number of 100
or 40 Gigabit ports will limit the cumulative spine speed.
23 | P a g e
TIER ARCHITECTURE
The Lenovo Think System NE2572 Rack Switch (Figure 9) is Lenovo’s preferred leaf
switch which offers 100 Gbps or 40 Gbps Ethernet spine connections and 25 or 10 Gbps server
connections.
The NE2572 has the following features that are important for this leaf switch:
The Lenovo Rack Switch G8272 is Lenovo’s 1U 10 Gbps Ethernet solution for the leaf
switch. The G8272 has the following features that are important for this leaf switch:
24 | P a g e
TIER ARCHITECTURE
The Lenovo Rack Switch G8296 is Lenovo’s 2U solution for the leaf switch. The G8296
has the following features that are important for this leaf switch:
25 | P a g e
TIER ARCHITECTURE
A campus network is generally the portion of the enterprise network infrastructure that provides
access to network communication services and resources to end users and devices that are spread
over a single geographic location. It may be a single building or a group of buildings spread over
an extended geographic area. Normally, the enterprise that owns the campus network usually owns
the physical wires deployed in the campus. Therefore, network designers typically tend to design
the campus portion of the enterprise network to be optimized for the fastest functional architecture
that runs on high speed physical infrastructure (1/10/40/100 Gbps).
This design model, illustrated in Figure 12, is typically used in large enterprise campus
networks, which are constructed of multiple functional distribution layer blocks.
Core layer: Provides optimal transport between sites and high-performance routing. Due
the criticality of the core layer, the design principles of the core should provide an
appropriate level of resilience that offers the ability to recover quickly and smoothly after
any network failure event with the core block.
Distribution layer: Provides policy-based connectivity and boundary control between the
access and core layers.
Access layer: Provides workgroup/user access to the network. The two primary and
common hierarchical design architectures of enterprise campus networks are the three-tier
and two-tier layers models.
26 | P a g e
TIER ARCHITECTURE
Copper cabling is the main cabling option for this architecture. The copper use proportion is
about 80%, while fiber is just 20%. Multimode fibers are identified by the OM (“optical mode”)
designation as outlined in the ISO/IEC 11801 standard. Fiber cabling of three-tier architecture
includes the use of OM1, OM2, OM3 and SMF.
OM1, for fiber with 200/500 MHz*km overfilled launch (OFL) bandwidth at 850/1300nm
(typically 62.5/125um fiber).
OM2, for fiber with 500/500 MHz*km OFL bandwidth at 850/1300nm (typically
50/125um fiber).
OM3, for laser-optimized 50um fiber having 2000 MHz*km effective modal bandwidth
(EMB, also known as laser bandwidth), designed for 10 GB/s transmission.
OM4, for laser-optimized 50um fiber having 4700 MHz*km EMB bandwidth designed for
10 Gb/s, 40 Gb/s, and 100 Gb/s transmission.
27 | P a g e
TIER ARCHITECTURE
Fiber is almost the main media in this network design model (about 80%). Copper is only used
in the access layer. OM1 and OM2 are completely replaced by OM3 and OM4 since the switch
speed has been 10 Gbps to 40 Gbps and SAN (Storage area network) speed has been up to 32
Gbps.
28 | P a g e