0% found this document useful (0 votes)
15 views

Module 2 Ecm

E-commerce Study material

Uploaded by

neenasukesh01
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Module 2 Ecm

E-commerce Study material

Uploaded by

neenasukesh01
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Module 2

Internet Architecture

Internet is called the network of networks. It is a global communication system that links
together thousands of individual networks. In other words, internet is a collection of
interlinked computer networks, connected by copper wires, fiber-optic cables, wireless
connections, etc. As a result, a computer can virtually connect to other computers in any
network. These connections allow users to interchange messages, to communicate in real
time (getting instant messages and responses), to share data and programs and to access
limitless information

Basics of Internet Architecture

Internet architecture is a meta-network, which refers to a congregation of thousands of


distinct networks interacting with a common protocol. In simple terms, it is referred as an
internetwork that is connected using protocols. Protocol used is TCP/IP. This protocol
connects any two networks that differ in hardware, software and design.

Process

TCP/IP provides end to end transmission, i.e., each and every node on one network has the
ability to communicate with any other node on the network.

Layers of Internet Architecture

Internet architecture consists of three layers −


IP

In order to communicate, we need our data to be encapsulated as Internet Protocol (IP)


packets. These IP packets travel across number of hosts in a network through routing to reach
the destination. However IP does not support error detection and error recovery, and is
incapable of detecting loss of packets.

TCP

TCP stands for "Transmission Control Protocol". It provides end to end transmission of data,
i.e., from source to destination. It is a very complex protocol as it supports recovery of lost
packets.

Application Protocol

Third layer in internet architecture is the application layer which has different protocols on
which the internet services are built. Some of the examples of internet services include email
(SMTP facilitates email feature), file transfer (FTP facilitates file transfer feature), etc.

Server and Types of Server

 A Server is a program or a device that provides functionality for called clients which
are other programs or devices. This architecture is called the client-server model.
 A single overall computation is distributed across multiple processes or devices.
Servers can provide various functionalities called services. These services include
sharing data or resources among multiple clients or performing computations for a
client. Multiple clients can be served by a single server, and a single client can use
multiple servers.

Uses of Servers

A client process may run on the same device. It can also connect over a network to a server to
run on a different device. Examples of servers may include database servers, mail servers,
print servers, file servers, web servers, application servers, and game servers. Most frequently
client-server systems are implemented by the request-response communication., i.e., a client
sends a request to the server. In this model, the server performs some action and sends a
response back to the client, typically with a result or acknowledgement.

Server Component
 Server components are intended to offer clients functionality, resources, and/or
services. Specific components will differ based on the form factor and function of a
given server, but common components are covered here.
 Hardware: The dedicated server’s central processing unit (CPU), memory, storage
device, network interfaces, and the server chassis are all included in this.
 Server OS: This operating system (OS) was created with a particular kind of
client/server environment in mind.
 Network Connectivity: Over a local area network (LAN), wide area network (WAN),
or the internet, server programs connect to the network architecture and communicate
with client devices. To offer redundancy and accommodate various network setups,
certain server form factors contain several network interfaces.
 Management and Monitoring Tools: Instruments for remote management and
performance monitoring are frequently included with servers.
 Server Software: This server software supports a particular use case. Software for
email servers, web servers, and database servers are a few examples.
 High-Availability Features: High-availability (HA) capabilities are included on some
servers to reduce downtime and guarantee continuous operation. This involves having
access to numerous storage systems, backup power supply and network interfaces,
and configuration management tools that enable automatic failover and load
balancing.

Types of Servers and Their Applications

 Application Server
These servers host web apps (computer programs that run inside a web browser)
allowing users in the network to run and use them preventing the installation of a
copy on their own computers. These servers need not be part of the World Wide Web.
Their clients are computers with a web browser.
 Catalog Server
These servers maintain an index or table of contents of information that can be found
across a large distributed network. Distributed networks may include computers,
users, files shared on file servers, and web apps. Examples of catalog servers are
directory servers and name servers. Their clients are any computer program that needs
to find something on the network. An example can be a domain member attempting to
log in, an email client looking for an email address, or a user looking for a file
 Communication Server
These servers maintain an environment needed for one communication endpoint to
find other endpoints and then communicate with them. These servers may or may not
include a directory of communication endpoints and a presence detection service,
depending on the openness and security parameters of the network. Their clients are
communication endpoints.
 Computing Server
These servers share vast amounts of computing resources which include CPU and
random-access memory over a network. Any computer program that needs more CPU
power and RAM than a personal computer can probably afford can use these types of
servers. The client must be a networked computer to implement the client–server
model which is a necessity.
 Database Server
These servers maintain and share any form of database over a network. A database is
an organized collection of data with predefined properties that may be displayed in a
table. Clients of these servers are spreadsheets, accounting software, asset
management software, or virtually any computer program that consumes well-
organized data, especially in large volumes.
 Fax Server
These servers share one or more fax machines over a network which eliminates the
hassle of physical access. Any fax sender or recipient is the client of these servers.
 File Server
Shares files and folders, storage space to hold files and folders, or both, over a
network. Networked computers are the intended clients, even though local programs
can be clients.
 Game Server
These servers enable several computers or gaming devices to play multiplayer games.
Personal computers or gaming consoles are their clients.
 Mail Server
These servers make email communication possible in the same way as a post office
makes snail mail communication possible. Clients of these servers are senders and
recipients of email.
 Print Server
These servers share one or more printers over a network which eliminates the hassle
of physical access. Their clients are computers in need of printing something.
 Proxy Server
This server acts as an intermediary between a client and a server accepting incoming
traffic from the client and sending it to the server. Reasons to use a proxy server
include content control and filtering, improving traffic performance, preventing
unauthorized network access, simply routing the traffic over a large and complex
network. Their clients are any networked computer.
 Web Server
These servers host web pages. A web server is responsible for making the World Wide
Web possible. Each website has one or more web servers. Their clients are computers
with a web browser.

You might also like