尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
Microsoft .NET
Muhammad Ghalib Mirza
.NET Application
Development
N-tier data applications are applications that access data and are separated
into multiple logical layers, or tiers. Separating application components into
discrete tiers increases the maintainability and scalability of the application. It
does this by enabling easier adoption of new technologies that can be
applied to a single tier without requiring you to redesign the whole solution.
N-tier architecture includes a presentation tier, a middle-tier, and a data tier.
The middle tier typically includes a data access layer, a business logic layer,
and shared components such as authentication and validation. The data tier
includes a relational database. N-tier applications usually store sensitive
information in the data access layer of the middle-tier to maintain isolation
from end users who access the presentation tier.
A typical n-tier application includes a presentation tier, a middle tier, and a data
tier. The easiest way to separate the various tiers in an n-tier application is to
create discrete projects for each tier that you want to include in your
application. For example, the presentation tier might be a Windows Forms
application, whereas the data access logic might be a class library located in
the middle tier.
Here I consider a 3 Layered application Design. These 3-Layes are:
 Presentation Layer.
 Middle Layer.
 Business Rules.
 Data Validations.
 Authorization/Authentications.
 Data Access Layer.
This is the top most layer of application where user performs their activity.
Let’s take example of any application where user needs to fill up one form.
This form is nothing nut presentation layer. In windows application windows
form is presentation layer and in web application web form belongs to
presentation layer. Basically user’s input validation and rule processing
performs in this layer.
This is on top of presentation layer. As the name suggest, most of the
business operation performs here. For example, after collecting form data
we want to validate them with our custom business rule. Basically we define
classes and business entities in this layer.
It is on top of Business Logic Layer Data Access Layer presents. It
contains methods that helps business layer to connect with database
and perform CRUD operation. In data access layer generally all
database related code and stuff belongs to. Sometimes people use
platform independent data access layer to fetch data from different
database vendor.
The three tier design is the one of the most common best practice design
and this is so common that most of the software developers are familiar
with the acronym DAL and BAL used to refer to the data access layer and
business access layer respectively.
Now look how the application evolves into these tiers.
Case # 1
Case #2
The main benefits of the N-tier/3-tier architectural style are:
• Maintainability. Because each tier is independent of the other
tiers, updates or changes can be carried out without affecting
the application as a whole.
• Scalability. Because tiers are based on the deployment of
layers, scaling out an application is reasonably straightforward.
• Flexibility. Because each tier can be managed or scaled
independently, flexibility is increased.
• Availability. Applications can exploit the modular architecture
of enabling systems using easily scalable components, which
increases availability.
• The performance of the whole application may be slow if the
hardware and network bandwidth aren’t good enough because
more networks, computers and processes are involved.
• More cost for hardware, network, maintenance and deployment
because more hardware and better network bandwidth are
needed.
An N-Tier design can refer to logical and physical separation of
responsibilities within an application. The terms tiers and layers
may be used interchangeably though each has specific meaning
as well. Logical separation in two layers can improve the code
maintainability while physical separation into tiers can provide
scalability, security and fault tolerance among other benefits.
Applications can evolve over the time as their needs require the
complexity of an N-Tier design.
N-tier Application Developement

More Related Content

What's hot

Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...
Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...
Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...
Edureka!
 
Software Requirement Specification
Software Requirement SpecificationSoftware Requirement Specification
Software Requirement Specification
Dr Sukhpal Singh Gill
 
Full practice exam
Full practice examFull practice exam
Full practice exam
JOSE GARCIA ANTICONA
 
3 Tier Architecture
3 Tier Architecture3 Tier Architecture
3 Tier Architecture
guestd0cc01
 
file management
 file management file management
file management
Sweta Kumari Barnwal
 
Software architectural patterns - A Quick Understanding Guide
Software architectural patterns - A Quick Understanding GuideSoftware architectural patterns - A Quick Understanding Guide
Software architectural patterns - A Quick Understanding Guide
Mohammed Fazuluddin
 
IT Enterprise architecture ppt
IT Enterprise architecture pptIT Enterprise architecture ppt
IT Enterprise architecture ppt
Monsif sakienah
 
Application Framework
Application FrameworkApplication Framework
Application Framework
Ayub Qureshi
 
3 tier architecture
3 tier architecture3 tier architecture
3 tier architecture
tahir khan
 
Service Integration and Management (SIAM)
Service Integration and Management (SIAM)Service Integration and Management (SIAM)
Service Integration and Management (SIAM)
NUS-ISS
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
Alokeparna Choudhury
 
Historical development of cloud computing
Historical development of cloud computingHistorical development of cloud computing
Historical development of cloud computing
gaurav jain
 
CS8791 Unit 2 Cloud Enabling Technologies
CS8791 Unit 2 Cloud Enabling TechnologiesCS8791 Unit 2 Cloud Enabling Technologies
CS8791 Unit 2 Cloud Enabling Technologies
karthikajegadeesan
 
Confirm Client Requirements
Confirm Client RequirementsConfirm Client Requirements
Confirm Client Requirements
Steven Cahill
 
Getting started with Enterprise Application Integration (EAI) using Enterpris...
Getting started with Enterprise Application Integration (EAI) using Enterpris...Getting started with Enterprise Application Integration (EAI) using Enterpris...
Getting started with Enterprise Application Integration (EAI) using Enterpris...
Tamim Khan
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
Dr. Ramkumar Lakshminarayanan
 
Catálogo de serviços ITIL template
Catálogo de serviços ITIL templateCatálogo de serviços ITIL template
Catálogo de serviços ITIL template
Fernando Palma
 
Cloud Computing vs. Traditional Computing
Cloud Computing vs. Traditional ComputingCloud Computing vs. Traditional Computing
Cloud Computing vs. Traditional Computing
Ravi Kumar
 
Cloud security
Cloud securityCloud security
Cloud security
Niharika Varshney
 
Data center virtualization
Data center virtualizationData center virtualization
Data center virtualization
mazin Salih
 

What's hot (20)

Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...
Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...
Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...
 
Software Requirement Specification
Software Requirement SpecificationSoftware Requirement Specification
Software Requirement Specification
 
Full practice exam
Full practice examFull practice exam
Full practice exam
 
3 Tier Architecture
3 Tier Architecture3 Tier Architecture
3 Tier Architecture
 
file management
 file management file management
file management
 
Software architectural patterns - A Quick Understanding Guide
Software architectural patterns - A Quick Understanding GuideSoftware architectural patterns - A Quick Understanding Guide
Software architectural patterns - A Quick Understanding Guide
 
IT Enterprise architecture ppt
IT Enterprise architecture pptIT Enterprise architecture ppt
IT Enterprise architecture ppt
 
Application Framework
Application FrameworkApplication Framework
Application Framework
 
3 tier architecture
3 tier architecture3 tier architecture
3 tier architecture
 
Service Integration and Management (SIAM)
Service Integration and Management (SIAM)Service Integration and Management (SIAM)
Service Integration and Management (SIAM)
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 
Historical development of cloud computing
Historical development of cloud computingHistorical development of cloud computing
Historical development of cloud computing
 
CS8791 Unit 2 Cloud Enabling Technologies
CS8791 Unit 2 Cloud Enabling TechnologiesCS8791 Unit 2 Cloud Enabling Technologies
CS8791 Unit 2 Cloud Enabling Technologies
 
Confirm Client Requirements
Confirm Client RequirementsConfirm Client Requirements
Confirm Client Requirements
 
Getting started with Enterprise Application Integration (EAI) using Enterpris...
Getting started with Enterprise Application Integration (EAI) using Enterpris...Getting started with Enterprise Application Integration (EAI) using Enterpris...
Getting started with Enterprise Application Integration (EAI) using Enterpris...
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
 
Catálogo de serviços ITIL template
Catálogo de serviços ITIL templateCatálogo de serviços ITIL template
Catálogo de serviços ITIL template
 
Cloud Computing vs. Traditional Computing
Cloud Computing vs. Traditional ComputingCloud Computing vs. Traditional Computing
Cloud Computing vs. Traditional Computing
 
Cloud security
Cloud securityCloud security
Cloud security
 
Data center virtualization
Data center virtualizationData center virtualization
Data center virtualization
 

Viewers also liked

Differences Between Architectures
Differences Between ArchitecturesDifferences Between Architectures
Differences Between Architectures
prasadsmn
 
N-Tier, Layered Design, SOA
N-Tier, Layered Design, SOAN-Tier, Layered Design, SOA
N-Tier, Layered Design, SOA
Sperasoft
 
Building N Tier Applications With Entity Framework Services 2010
Building N Tier Applications With Entity Framework Services 2010Building N Tier Applications With Entity Framework Services 2010
Building N Tier Applications With Entity Framework Services 2010
David McCarter
 
N tier web applications
N tier web applicationsN tier web applications
N tier web applications
Mike Feltman
 
E business n_tier_arch
E business n_tier_archE business n_tier_arch
E business n_tier_arch
Radiant Minds
 
N-tier and oop - moving across technologies
N-tier and oop - moving across technologiesN-tier and oop - moving across technologies
N-tier and oop - moving across technologies
Jacinto Limjap
 
Layered Architecture 03 Format
Layered Architecture 03 FormatLayered Architecture 03 Format
Layered Architecture 03 Format
anishgoel
 
Tier 1, 2 and 3 Capital based on the Basel II accord
Tier 1, 2 and 3 Capital based on the Basel II accordTier 1, 2 and 3 Capital based on the Basel II accord
Tier 1, 2 and 3 Capital based on the Basel II accord
Nahid Anjum
 
N tier
N tierN tier
N tier
eleksdev
 
J2EE and layered architecture
J2EE and layered architectureJ2EE and layered architecture
J2EE and layered architecture
Suman Behara
 
Comparison between ipv4 and ipv6
Comparison between ipv4 and ipv6Comparison between ipv4 and ipv6
Comparison between ipv4 and ipv6
Dharmesh Patel
 
2 tier and 3 tier architecture
2 tier and 3 tier architecture2 tier and 3 tier architecture
2 tier and 3 tier architecture
baabtra.com - No. 1 supplier of quality freshers
 
Information on protocols-email protocols
Information on protocols-email protocolsInformation on protocols-email protocols
Information on protocols-email protocols
Priyanka Shinde
 
Smtp, pop3, imapv 4
Smtp, pop3, imapv 4Smtp, pop3, imapv 4
Smtp, pop3, imapv 4
Shwetanshu Gupta
 
What is Cloud Computing with Amazon Web Services?
What is Cloud Computing with Amazon Web Services?What is Cloud Computing with Amazon Web Services?
What is Cloud Computing with Amazon Web Services?
Amazon Web Services
 
What is ERP
What is ERPWhat is ERP
What is ERP
Mahmoud Elmasry
 
Erp Enterprise Resource Planning
Erp   Enterprise Resource PlanningErp   Enterprise Resource Planning
Erp Enterprise Resource Planning
VIshal Gujarathi
 
Ipv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparisonIpv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparison
Shailesh Pachori
 
Introduction to Amazon Web Services
Introduction to Amazon Web ServicesIntroduction to Amazon Web Services
Introduction to Amazon Web Services
Amazon Web Services
 
IPv4 and IPv6
IPv4 and IPv6IPv4 and IPv6
IPv4 and IPv6
RIPE NCC
 

Viewers also liked (20)

Differences Between Architectures
Differences Between ArchitecturesDifferences Between Architectures
Differences Between Architectures
 
N-Tier, Layered Design, SOA
N-Tier, Layered Design, SOAN-Tier, Layered Design, SOA
N-Tier, Layered Design, SOA
 
Building N Tier Applications With Entity Framework Services 2010
Building N Tier Applications With Entity Framework Services 2010Building N Tier Applications With Entity Framework Services 2010
Building N Tier Applications With Entity Framework Services 2010
 
N tier web applications
N tier web applicationsN tier web applications
N tier web applications
 
E business n_tier_arch
E business n_tier_archE business n_tier_arch
E business n_tier_arch
 
N-tier and oop - moving across technologies
N-tier and oop - moving across technologiesN-tier and oop - moving across technologies
N-tier and oop - moving across technologies
 
Layered Architecture 03 Format
Layered Architecture 03 FormatLayered Architecture 03 Format
Layered Architecture 03 Format
 
Tier 1, 2 and 3 Capital based on the Basel II accord
Tier 1, 2 and 3 Capital based on the Basel II accordTier 1, 2 and 3 Capital based on the Basel II accord
Tier 1, 2 and 3 Capital based on the Basel II accord
 
N tier
N tierN tier
N tier
 
J2EE and layered architecture
J2EE and layered architectureJ2EE and layered architecture
J2EE and layered architecture
 
Comparison between ipv4 and ipv6
Comparison between ipv4 and ipv6Comparison between ipv4 and ipv6
Comparison between ipv4 and ipv6
 
2 tier and 3 tier architecture
2 tier and 3 tier architecture2 tier and 3 tier architecture
2 tier and 3 tier architecture
 
Information on protocols-email protocols
Information on protocols-email protocolsInformation on protocols-email protocols
Information on protocols-email protocols
 
Smtp, pop3, imapv 4
Smtp, pop3, imapv 4Smtp, pop3, imapv 4
Smtp, pop3, imapv 4
 
What is Cloud Computing with Amazon Web Services?
What is Cloud Computing with Amazon Web Services?What is Cloud Computing with Amazon Web Services?
What is Cloud Computing with Amazon Web Services?
 
What is ERP
What is ERPWhat is ERP
What is ERP
 
Erp Enterprise Resource Planning
Erp   Enterprise Resource PlanningErp   Enterprise Resource Planning
Erp Enterprise Resource Planning
 
Ipv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparisonIpv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparison
 
Introduction to Amazon Web Services
Introduction to Amazon Web ServicesIntroduction to Amazon Web Services
Introduction to Amazon Web Services
 
IPv4 and IPv6
IPv4 and IPv6IPv4 and IPv6
IPv4 and IPv6
 

Similar to N-tier Application Developement

N tier architecture
N tier architectureN tier architecture
N tier architecture
Nidhi Saurav
 
N tier architecture
N tier architectureN tier architecture
N tier architecture
Nidhi Saurav
 
N tier architecture
N tier architectureN tier architecture
N tier architecture
Nidhi Saurav
 
N tier architecture
N tier architectureN tier architecture
N tier architecture
Nidhi Saurav
 
N tier architecture
N tier architectureN tier architecture
N tier architecture
Nidhi Saurav
 
N tier architecture
N tier architectureN tier architecture
N tier architecture
Nidhi Saurav
 
N tier architecture
N tier architectureN tier architecture
N tier architecture
Nidhi Saurav
 
N tier architecture
N tier architectureN tier architecture
N tier architecture
Nidhi Saurav
 
N tier architecture
N tier architectureN tier architecture
N tier architecture
Nidhi Saurav
 
Client server architecture in .net by varun tiwari
Client server architecture in .net by varun tiwariClient server architecture in .net by varun tiwari
TermPaper
TermPaperTermPaper
TermPaper
Viral Savani
 
Distributed information sys
Distributed information sysDistributed information sys
Distributed information sys
Meena Chauhan
 
Web application for tracking tool for workshops
Web application for tracking tool for workshopsWeb application for tracking tool for workshops
Web application for tracking tool for workshops
Mike Taylor
 
Mobile Responsive Social Corporate Intranet Portal Application
Mobile Responsive Social Corporate Intranet Portal ApplicationMobile Responsive Social Corporate Intranet Portal Application
Mobile Responsive Social Corporate Intranet Portal Application
Mike Taylor
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile Computing
JAINIK PATEL
 
Dbms architecture
Dbms architectureDbms architecture
Dbms architecture
raima sen
 
Appathika.ppt
Appathika.pptAppathika.ppt
Appathika.ppt
PMPAspirantsIMT
 
Topic1 Understanding Distributed Information Systems
Topic1 Understanding Distributed Information SystemsTopic1 Understanding Distributed Information Systems
Topic1 Understanding Distributed Information Systems
sanjoysanyal
 
MS Cloud Design Patterns Infographic 2015
MS Cloud Design Patterns Infographic 2015MS Cloud Design Patterns Infographic 2015
MS Cloud Design Patterns Infographic 2015
James Tramel
 
Ms cloud design patterns infographic 2015
Ms cloud design patterns infographic 2015Ms cloud design patterns infographic 2015
Ms cloud design patterns infographic 2015
Kesavan Munuswamy
 

Similar to N-tier Application Developement (20)

N tier architecture
N tier architectureN tier architecture
N tier architecture
 
N tier architecture
N tier architectureN tier architecture
N tier architecture
 
N tier architecture
N tier architectureN tier architecture
N tier architecture
 
N tier architecture
N tier architectureN tier architecture
N tier architecture
 
N tier architecture
N tier architectureN tier architecture
N tier architecture
 
N tier architecture
N tier architectureN tier architecture
N tier architecture
 
N tier architecture
N tier architectureN tier architecture
N tier architecture
 
N tier architecture
N tier architectureN tier architecture
N tier architecture
 
N tier architecture
N tier architectureN tier architecture
N tier architecture
 
Client server architecture in .net by varun tiwari
Client server architecture in .net by varun tiwariClient server architecture in .net by varun tiwari
Client server architecture in .net by varun tiwari
 
TermPaper
TermPaperTermPaper
TermPaper
 
Distributed information sys
Distributed information sysDistributed information sys
Distributed information sys
 
Web application for tracking tool for workshops
Web application for tracking tool for workshopsWeb application for tracking tool for workshops
Web application for tracking tool for workshops
 
Mobile Responsive Social Corporate Intranet Portal Application
Mobile Responsive Social Corporate Intranet Portal ApplicationMobile Responsive Social Corporate Intranet Portal Application
Mobile Responsive Social Corporate Intranet Portal Application
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile Computing
 
Dbms architecture
Dbms architectureDbms architecture
Dbms architecture
 
Appathika.ppt
Appathika.pptAppathika.ppt
Appathika.ppt
 
Topic1 Understanding Distributed Information Systems
Topic1 Understanding Distributed Information SystemsTopic1 Understanding Distributed Information Systems
Topic1 Understanding Distributed Information Systems
 
MS Cloud Design Patterns Infographic 2015
MS Cloud Design Patterns Infographic 2015MS Cloud Design Patterns Infographic 2015
MS Cloud Design Patterns Infographic 2015
 
Ms cloud design patterns infographic 2015
Ms cloud design patterns infographic 2015Ms cloud design patterns infographic 2015
Ms cloud design patterns infographic 2015
 

Recently uploaded

NLJUG speaker academy 2024 - session 1, June 2024
NLJUG speaker academy 2024 - session 1, June 2024NLJUG speaker academy 2024 - session 1, June 2024
NLJUG speaker academy 2024 - session 1, June 2024
Bert Jan Schrijver
 
Hot Call Girls In Ahmedabad ✔ 7737669865 ✔ Hi I Am Divya Vip Call Girl Servic...
Hot Call Girls In Ahmedabad ✔ 7737669865 ✔ Hi I Am Divya Vip Call Girl Servic...Hot Call Girls In Ahmedabad ✔ 7737669865 ✔ Hi I Am Divya Vip Call Girl Servic...
Hot Call Girls In Ahmedabad ✔ 7737669865 ✔ Hi I Am Divya Vip Call Girl Servic...
ns9201415
 
What’s New in VictoriaLogs - Q2 2024 Update
What’s New in VictoriaLogs - Q2 2024 UpdateWhat’s New in VictoriaLogs - Q2 2024 Update
What’s New in VictoriaLogs - Q2 2024 Update
VictoriaMetrics
 
What’s new in VictoriaMetrics - Q2 2024 Update
What’s new in VictoriaMetrics - Q2 2024 UpdateWhat’s new in VictoriaMetrics - Q2 2024 Update
What’s new in VictoriaMetrics - Q2 2024 Update
VictoriaMetrics
 
Female Bangalore Call Girls 👉 7023059433 👈 Vip Escorts Service Available
Female Bangalore Call Girls 👉 7023059433 👈 Vip Escorts Service AvailableFemale Bangalore Call Girls 👉 7023059433 👈 Vip Escorts Service Available
Female Bangalore Call Girls 👉 7023059433 👈 Vip Escorts Service Available
isha sharman06
 
Call Girls Goa 💯Call Us 🔝 7426014248 🔝 Independent Goa Escorts Service Available
Call Girls Goa 💯Call Us 🔝 7426014248 🔝 Independent Goa Escorts Service AvailableCall Girls Goa 💯Call Us 🔝 7426014248 🔝 Independent Goa Escorts Service Available
Call Girls Goa 💯Call Us 🔝 7426014248 🔝 Independent Goa Escorts Service Available
sapnaanpad7
 
Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7
Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7
Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7
manji sharman06
 
OpenChain Webinar - Open Source Due Diligence for M&A - 2024-06-17
OpenChain Webinar - Open Source Due Diligence for M&A - 2024-06-17OpenChain Webinar - Open Source Due Diligence for M&A - 2024-06-17
OpenChain Webinar - Open Source Due Diligence for M&A - 2024-06-17
Shane Coughlan
 
Streamlining End-to-End Testing Automation
Streamlining End-to-End Testing AutomationStreamlining End-to-End Testing Automation
Streamlining End-to-End Testing Automation
Anand Bagmar
 
TheFutureIsDynamic-BoxLang-CFCamp2024.pdf
TheFutureIsDynamic-BoxLang-CFCamp2024.pdfTheFutureIsDynamic-BoxLang-CFCamp2024.pdf
TheFutureIsDynamic-BoxLang-CFCamp2024.pdf
Ortus Solutions, Corp
 
119321250-History-of-Computer-Programming.ppt
119321250-History-of-Computer-Programming.ppt119321250-History-of-Computer-Programming.ppt
119321250-History-of-Computer-Programming.ppt
lavesingh522
 
AllProjectsS24 of software engineering.pdf
AllProjectsS24 of software engineering.pdfAllProjectsS24 of software engineering.pdf
AllProjectsS24 of software engineering.pdf
Shahid464656
 
Independent Call Girls In Kolkata ✔ 7014168258 ✔ Hi I Am Divya Vip Call Girl ...
Independent Call Girls In Kolkata ✔ 7014168258 ✔ Hi I Am Divya Vip Call Girl ...Independent Call Girls In Kolkata ✔ 7014168258 ✔ Hi I Am Divya Vip Call Girl ...
Independent Call Girls In Kolkata ✔ 7014168258 ✔ Hi I Am Divya Vip Call Girl ...
simmi singh$A17
 
Independent Call Girls In Bangalore 💯Call Us 🔝 7426014248 🔝Independent Bangal...
Independent Call Girls In Bangalore 💯Call Us 🔝 7426014248 🔝Independent Bangal...Independent Call Girls In Bangalore 💯Call Us 🔝 7426014248 🔝Independent Bangal...
Independent Call Girls In Bangalore 💯Call Us 🔝 7426014248 🔝Independent Bangal...
sapnasaifi408
 
Strengthening Web Development with CommandBox 6: Seamless Transition and Scal...
Strengthening Web Development with CommandBox 6: Seamless Transition and Scal...Strengthening Web Development with CommandBox 6: Seamless Transition and Scal...
Strengthening Web Development with CommandBox 6: Seamless Transition and Scal...
Ortus Solutions, Corp
 
Folding Cheat Sheet #5 - fifth in a series
Folding Cheat Sheet #5 - fifth in a seriesFolding Cheat Sheet #5 - fifth in a series
Folding Cheat Sheet #5 - fifth in a series
Philip Schwarz
 
Erotic Call Girls Bangalore🫱9079923931🫲 High Quality Call Girl Service Right ...
Erotic Call Girls Bangalore🫱9079923931🫲 High Quality Call Girl Service Right ...Erotic Call Girls Bangalore🫱9079923931🫲 High Quality Call Girl Service Right ...
Erotic Call Girls Bangalore🫱9079923931🫲 High Quality Call Girl Service Right ...
meenusingh4354543
 
Happy Birthday Kubernetes, 10th Birthday edition of Kubernetes Birthday in Au...
Happy Birthday Kubernetes, 10th Birthday edition of Kubernetes Birthday in Au...Happy Birthday Kubernetes, 10th Birthday edition of Kubernetes Birthday in Au...
Happy Birthday Kubernetes, 10th Birthday edition of Kubernetes Birthday in Au...
Chad Crowell
 
European Standard S1000D, an Unnecessary Expense to OEM.pptx
European Standard S1000D, an Unnecessary Expense to OEM.pptxEuropean Standard S1000D, an Unnecessary Expense to OEM.pptx
European Standard S1000D, an Unnecessary Expense to OEM.pptx
Digital Teacher
 
Extreme DDD Modelling Patterns - 2024 Devoxx Poland
Extreme DDD Modelling Patterns - 2024 Devoxx PolandExtreme DDD Modelling Patterns - 2024 Devoxx Poland
Extreme DDD Modelling Patterns - 2024 Devoxx Poland
Alberto Brandolini
 

Recently uploaded (20)

NLJUG speaker academy 2024 - session 1, June 2024
NLJUG speaker academy 2024 - session 1, June 2024NLJUG speaker academy 2024 - session 1, June 2024
NLJUG speaker academy 2024 - session 1, June 2024
 
Hot Call Girls In Ahmedabad ✔ 7737669865 ✔ Hi I Am Divya Vip Call Girl Servic...
Hot Call Girls In Ahmedabad ✔ 7737669865 ✔ Hi I Am Divya Vip Call Girl Servic...Hot Call Girls In Ahmedabad ✔ 7737669865 ✔ Hi I Am Divya Vip Call Girl Servic...
Hot Call Girls In Ahmedabad ✔ 7737669865 ✔ Hi I Am Divya Vip Call Girl Servic...
 
What’s New in VictoriaLogs - Q2 2024 Update
What’s New in VictoriaLogs - Q2 2024 UpdateWhat’s New in VictoriaLogs - Q2 2024 Update
What’s New in VictoriaLogs - Q2 2024 Update
 
What’s new in VictoriaMetrics - Q2 2024 Update
What’s new in VictoriaMetrics - Q2 2024 UpdateWhat’s new in VictoriaMetrics - Q2 2024 Update
What’s new in VictoriaMetrics - Q2 2024 Update
 
Female Bangalore Call Girls 👉 7023059433 👈 Vip Escorts Service Available
Female Bangalore Call Girls 👉 7023059433 👈 Vip Escorts Service AvailableFemale Bangalore Call Girls 👉 7023059433 👈 Vip Escorts Service Available
Female Bangalore Call Girls 👉 7023059433 👈 Vip Escorts Service Available
 
Call Girls Goa 💯Call Us 🔝 7426014248 🔝 Independent Goa Escorts Service Available
Call Girls Goa 💯Call Us 🔝 7426014248 🔝 Independent Goa Escorts Service AvailableCall Girls Goa 💯Call Us 🔝 7426014248 🔝 Independent Goa Escorts Service Available
Call Girls Goa 💯Call Us 🔝 7426014248 🔝 Independent Goa Escorts Service Available
 
Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7
Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7
Call Girls Bangalore🔥7023059433🔥Best Profile Escorts in Bangalore Available 24/7
 
OpenChain Webinar - Open Source Due Diligence for M&A - 2024-06-17
OpenChain Webinar - Open Source Due Diligence for M&A - 2024-06-17OpenChain Webinar - Open Source Due Diligence for M&A - 2024-06-17
OpenChain Webinar - Open Source Due Diligence for M&A - 2024-06-17
 
Streamlining End-to-End Testing Automation
Streamlining End-to-End Testing AutomationStreamlining End-to-End Testing Automation
Streamlining End-to-End Testing Automation
 
TheFutureIsDynamic-BoxLang-CFCamp2024.pdf
TheFutureIsDynamic-BoxLang-CFCamp2024.pdfTheFutureIsDynamic-BoxLang-CFCamp2024.pdf
TheFutureIsDynamic-BoxLang-CFCamp2024.pdf
 
119321250-History-of-Computer-Programming.ppt
119321250-History-of-Computer-Programming.ppt119321250-History-of-Computer-Programming.ppt
119321250-History-of-Computer-Programming.ppt
 
AllProjectsS24 of software engineering.pdf
AllProjectsS24 of software engineering.pdfAllProjectsS24 of software engineering.pdf
AllProjectsS24 of software engineering.pdf
 
Independent Call Girls In Kolkata ✔ 7014168258 ✔ Hi I Am Divya Vip Call Girl ...
Independent Call Girls In Kolkata ✔ 7014168258 ✔ Hi I Am Divya Vip Call Girl ...Independent Call Girls In Kolkata ✔ 7014168258 ✔ Hi I Am Divya Vip Call Girl ...
Independent Call Girls In Kolkata ✔ 7014168258 ✔ Hi I Am Divya Vip Call Girl ...
 
Independent Call Girls In Bangalore 💯Call Us 🔝 7426014248 🔝Independent Bangal...
Independent Call Girls In Bangalore 💯Call Us 🔝 7426014248 🔝Independent Bangal...Independent Call Girls In Bangalore 💯Call Us 🔝 7426014248 🔝Independent Bangal...
Independent Call Girls In Bangalore 💯Call Us 🔝 7426014248 🔝Independent Bangal...
 
Strengthening Web Development with CommandBox 6: Seamless Transition and Scal...
Strengthening Web Development with CommandBox 6: Seamless Transition and Scal...Strengthening Web Development with CommandBox 6: Seamless Transition and Scal...
Strengthening Web Development with CommandBox 6: Seamless Transition and Scal...
 
Folding Cheat Sheet #5 - fifth in a series
Folding Cheat Sheet #5 - fifth in a seriesFolding Cheat Sheet #5 - fifth in a series
Folding Cheat Sheet #5 - fifth in a series
 
Erotic Call Girls Bangalore🫱9079923931🫲 High Quality Call Girl Service Right ...
Erotic Call Girls Bangalore🫱9079923931🫲 High Quality Call Girl Service Right ...Erotic Call Girls Bangalore🫱9079923931🫲 High Quality Call Girl Service Right ...
Erotic Call Girls Bangalore🫱9079923931🫲 High Quality Call Girl Service Right ...
 
Happy Birthday Kubernetes, 10th Birthday edition of Kubernetes Birthday in Au...
Happy Birthday Kubernetes, 10th Birthday edition of Kubernetes Birthday in Au...Happy Birthday Kubernetes, 10th Birthday edition of Kubernetes Birthday in Au...
Happy Birthday Kubernetes, 10th Birthday edition of Kubernetes Birthday in Au...
 
European Standard S1000D, an Unnecessary Expense to OEM.pptx
European Standard S1000D, an Unnecessary Expense to OEM.pptxEuropean Standard S1000D, an Unnecessary Expense to OEM.pptx
European Standard S1000D, an Unnecessary Expense to OEM.pptx
 
Extreme DDD Modelling Patterns - 2024 Devoxx Poland
Extreme DDD Modelling Patterns - 2024 Devoxx PolandExtreme DDD Modelling Patterns - 2024 Devoxx Poland
Extreme DDD Modelling Patterns - 2024 Devoxx Poland
 

N-tier Application Developement

  • 1. Microsoft .NET Muhammad Ghalib Mirza .NET Application Development
  • 2. N-tier data applications are applications that access data and are separated into multiple logical layers, or tiers. Separating application components into discrete tiers increases the maintainability and scalability of the application. It does this by enabling easier adoption of new technologies that can be applied to a single tier without requiring you to redesign the whole solution. N-tier architecture includes a presentation tier, a middle-tier, and a data tier. The middle tier typically includes a data access layer, a business logic layer, and shared components such as authentication and validation. The data tier includes a relational database. N-tier applications usually store sensitive information in the data access layer of the middle-tier to maintain isolation from end users who access the presentation tier.
  • 3. A typical n-tier application includes a presentation tier, a middle tier, and a data tier. The easiest way to separate the various tiers in an n-tier application is to create discrete projects for each tier that you want to include in your application. For example, the presentation tier might be a Windows Forms application, whereas the data access logic might be a class library located in the middle tier. Here I consider a 3 Layered application Design. These 3-Layes are:  Presentation Layer.  Middle Layer.  Business Rules.  Data Validations.  Authorization/Authentications.  Data Access Layer.
  • 4. This is the top most layer of application where user performs their activity. Let’s take example of any application where user needs to fill up one form. This form is nothing nut presentation layer. In windows application windows form is presentation layer and in web application web form belongs to presentation layer. Basically user’s input validation and rule processing performs in this layer. This is on top of presentation layer. As the name suggest, most of the business operation performs here. For example, after collecting form data we want to validate them with our custom business rule. Basically we define classes and business entities in this layer.
  • 5. It is on top of Business Logic Layer Data Access Layer presents. It contains methods that helps business layer to connect with database and perform CRUD operation. In data access layer generally all database related code and stuff belongs to. Sometimes people use platform independent data access layer to fetch data from different database vendor.
  • 6. The three tier design is the one of the most common best practice design and this is so common that most of the software developers are familiar with the acronym DAL and BAL used to refer to the data access layer and business access layer respectively. Now look how the application evolves into these tiers. Case # 1
  • 8.
  • 9.
  • 10. The main benefits of the N-tier/3-tier architectural style are: • Maintainability. Because each tier is independent of the other tiers, updates or changes can be carried out without affecting the application as a whole. • Scalability. Because tiers are based on the deployment of layers, scaling out an application is reasonably straightforward. • Flexibility. Because each tier can be managed or scaled independently, flexibility is increased. • Availability. Applications can exploit the modular architecture of enabling systems using easily scalable components, which increases availability.
  • 11. • The performance of the whole application may be slow if the hardware and network bandwidth aren’t good enough because more networks, computers and processes are involved. • More cost for hardware, network, maintenance and deployment because more hardware and better network bandwidth are needed.
  • 12. An N-Tier design can refer to logical and physical separation of responsibilities within an application. The terms tiers and layers may be used interchangeably though each has specific meaning as well. Logical separation in two layers can improve the code maintainability while physical separation into tiers can provide scalability, security and fault tolerance among other benefits. Applications can evolve over the time as their needs require the complexity of an N-Tier design.
  翻译: