Lecture 2 - Application Layer
Lecture 2 - Application Layer
MIS 4363
1
Agenda
2.1 Hardware
2.2 Software Application Architectures
2.3 Web
2.4 Email
2.5 Implications for Cyber Security
2
2.1 Hardware
CLIENT - GETS THE STUFF SERVER – HAS THE STUFF
- PC - PC- Mainframe
- laptop - Clusters of RC’s
- terminal
- device
3
2.2 Software Application Architectures
2.2.1 Architecture Components
SAA = the way how I split the logic between the Client and the Server
4
2.2.2 Host-Based Architecture 1960s Mainframes Talent
Client Server - Host
No CPU:
“dumb”
Presentation
Application
Data Access
Data Storage Logic
2.2.3 Client-Based Architecture 1980s
Client Server
CPU
VB programming
5
2-tier
2.2.4 Client-Server 1990s – most popular today (ex. Web)
Client Server
Database server
SSMS
Thick Client
6
3-tier Client-Server Architecture
Client App Server Server
DB Server
DB Server
7
2.2.5 Cloud Computing Architecture
Client
Cloud
8
2.2.6 Pros & Cons
HOST-BASED CLIENT-BASED CLIENT-SERVER CLOUD COMP
9
2.3 Web 2-tier client server
architecture
Client Server
HTTP
Request
HTTP
Response
Thin client
Application
Presentation Data Access
Data Storage
10
App
Trans
Net
2.3.2 HTTP REQUEST 2.3.3 HTTP RESPONSE DL
Physical
11
SMTP – Simple Mail IMAP (POP) – Internet
Transport Protocol Map Application
2.4 Email Protocol
SMTP packet
MIME
12
3-tier architecture
Mail Server
Web Server
SMTP
HTTP
IMAP
Data Access
Presentation Application Data Storage
13
2.5 Implications for Cyber Security
Secure network is not enough
◦ We must secure all the applications too - - Tech Update!
SQL
SQL injection – Tech Update!
Email
Email spoofing & phishing - - Tech Update!
14
Wrap-up
2.1 Hardware
2.2 Software Application Architectures
2.3 Web
2.4 Email
2.5 Implications for Cyber Security
15