Upload
al-firdauz
View
213
Download
0
Embed Size (px)
Citation preview
7/31/2019 Advance Netcentric Ex1
1/6
Question 1.
Define what is thin, fat/thick client.
Thin-client is a technology whereby it refers to a computer that has multi-tier client server
architecture which the end user (client) do not use any hard disk and the programs run and displayvia browser. The program is actual execute from main server and not from desktop pc. The client
which operates as terminal needs to continuously communicate with the server.
Thick or Fat client is a technology whereby it also refers to a computer with multi-tier client server
architecture which the end user (client) using its own resources and run program from desktop PC in
the same time connected to the server to drive the database occasionally.
Question 2
Differentiate both client in term of it architecture, speed, reliability and etc.
Thin versus Thick/Fat in term of architecture.
Thin Client.
Thick/Fat Client.
Client
Powerful
ServerClient
Client
Display
(Able to support data
management and
application processing)
Client (Desktop PC)
Server
Display and run application
processing
(Able to manage data)
Client (Desktop PC)
Client (Desktop PC)
(No hard disk required)
(With hard disk)
7/31/2019 Advance Netcentric Ex1
2/6
Other Differences between Thin and Thick/Fat client.
Thin client. Thick/Fat client.
Service performance will reduce (speed slow) if
more clients are added to the server. (since
everything is operate by server)
Most process occur in client site, so theperformance wont reduce.
There will be system halted if the server down
as the client required a constant correspond
with the server.
There is no problem with the client part as the
client just need to validate the data itself, not the
server.
Nevertheless, this kind of client is easy to setup
because it does not need any specialized
software installation.
The fat client needs more desktop pc and IT work
in connecting the client to the server.
Cheaper cost needed. Need to buy displaydevice and the client device (for client) then
connect it to the powerful processing server.
Higher cost needed than the Thin client as itneeds to buy desktop PC and the maintenance of
the desktop PC. Also need a processing server.
Reduce security risk.Security risk is high as the data cannot be secured
in client part.
Question 3
Draw a C-5 architecture ( 2 tier and 3 tier). Tell the step/procedure involve and before you draw it
briefly explain.
The two-tier architecture is like client server application. The direct communication takes place
between client and server. There is no intermediate between client and server.
The 2-Tier Structure
The above figure shows the architecture of two-tier. Here the communication is one to one. Let us
see the concept of two tier with real time application. For example now we have a need to save the
employee details in database. The two tiers of two-tier architecture is
1. Database (Data tier)2. Client Application (Client tier)
7/31/2019 Advance Netcentric Ex1
3/6
So, in client application the client writes the program for saving the record in SQL Server and thereby
saving the data in the database.
Advantages:
1. Understanding and maintenances is easier.Disadvantages:
1. Performance will be reduced when there are more users.
Three-Tier Architecture:
Three-Tier is the simplest case of N-Tier architecture where three tier architecture having three
layers. They are
1. Client layer2. Business layer3. Data layer
Business layer: It is the intermediate layer which has the functions for client layer and it is used to
make communication faster between client and data layer. It provides the business processes logic
and the data access.
Data layer: it has the database.
Advantages
1. Easy to modify without affecting other modules2. Fast communication3. Performance will be good in three tier architecture.
Server
Application Processing
Server
Data Management
Presentation
7/31/2019 Advance Netcentric Ex1
4/6
Question 4
Explain the process involve in sharing file.
The term file sharing refers to the sharing of computer data or space on a network. File sharing
allows multiple users to use the same file by being able to read, modify, copy and/or print it. Filesharing users may have the same or different levels of access privilege.
Windows 7 File Sharing
1. Click Start Button, right click on Computer and select Properties.
2. Click Advanced System Settings in left panel.
3. Click Computer Name tab.
4. If the Workgroup line does not read WORKGROUP, click the change button.
5. At the bottom of the window, click the Workgroup button and enter WORKGROUP.
6. Click OK and then OK again.
7. Click on Start Button, then Control Panel and select Network and Sharing. Click on Home network
under view your active networks. Select Work network.
8. Exit all open windows.
Logging On To Access Shared Folders
1. Make sure 2 Windows machine are turned on and logged into user accounts on each system.
2. Open Explorer.
3. Double click on Network in the left panel. Look at WORKGROUP listed. Single click on
WORKGROUP. (example : alfons_PC)
4. Enter Windows Administrator account name and Windows Administrator account password.
5. Click OK.
7/31/2019 Advance Netcentric Ex1
5/6
Question 5
Function type of server.
Audio/Video Server:
It provides multimedia capabilities to websites by helping the user to broadcast streaming
multimedia content.
Chat Server:
It serves the users to exchange data in an environment similar to Internet newsgroup which provides
real-time discussion capabilities.
Fax Server:
It is one of the best options for organizations that seek minimum incoming and outgoing telephone
resources, but require to fax actual documents.
FTP Server:
It works on one of the oldest of the Internet services, the file transfer protocol. It provides a secure
file transfer between computers while ensuring file security and transfer control.
Groupware Server:
It is a software designed that enables the users to work together, irrespective of the location,
through the Internet or a corporate intranet and to function together in a virtual atmosphere.
IRC Server:
It is an ideal option for those looking for real-time discussion capabilities. Internet Relay Chat
comprises different network servers that enable the users to connect to each other through an IRC
network.
List Server:
It provides a better way of managing mailing lists. The server can be either open interactive
discussion for the people or a one-way list that provides announcements, newsletters or advertising.
Mail Server:
It transfers and stores mails over corporate networks through LANs, WANs and across the Internet.
7/31/2019 Advance Netcentric Ex1
6/6
News Server:
It serves as a distribution and delivery source for many public news groups, approachable over the
USENET news network.
Proxy Server:
It acts as a mediator between a client program and an external server to filter requests, improve
performance and share connections.
Telnet Server:
It enables the users to log on to a host computer and execute tasks as if they are working on a
remote computer.
Virtual Servers:
A virtual server is just like a physical computer because it is committed to an individual customer's
demands, can be individually booted and maintains privacy of a separate computer. Basically, the
distance among shared and dedicated (hosting) servers is reduced providing freedom to other
customers, at a less cost. Now, it has become omnipresent in the data center.
Web Server:
It provides static content to a web browser by loading a file from a disk and transferring it across the
network to the user's web browser. This exchange is intermediated by the browser and the server,
communicating using HTTP.
Question 6
Legacy System?
Legacy system refers to any older computer technology that remains in use even though there arenewer and more streamlined systems and applications available. Older technology can include a
single computer, a network of computers, programming code, software applications, cabling or any
combination of these that create a computing system. Legacy systems often remain in place because
they still accomplish the job they were designed to do, respond adequately to user requests, or
because the expense of replacing them is costly. These older systems are found in every industry or
business using computer technology like banking, transportation, utilities, government, retail, and
manufacturing.