pg 70: 1, 2, 7, 10, 11, 12, 13, 16, 19, 20, 26
are the different types of application architectures?
There are three different fundamental application architectures. In host
based networks, the server performs virtually all of the work. In client
networks, the client computer does most of the work; the server is used only for
data storage. In clien
server networks, the work is shared between the servers
and clients. The client performs all presentation logic, the server handles all data
storage and data access logic, and one performs the application logic. Client
server networks can be cheaper to i
nstall and often better balance the network
loads but are far more complex and costly to develop manage.
the four basic functi
ons of an application software
Basic functions of an application Layer
Storing of data generated by programs (e.g., files, records)
Data access logic
stored data (e.g., SQL)
Business login such as word processors, spreadsheets
of info to user and acceptance of user commands
7. Compare and contrast two
tier, and n
architectures. What are the technical differences, and what advantages and
disadvantages does each offer?
tier client server architecture uses only two sets of computers,
one set of clients and one set of servers. Three
tier architecture uses three sets of
computers. In this case, the software on the client computer is responsi
, an application server is responsible for the application logic,
and a separate database server is responsible for the data access logic and data
storage. Coming to n
tier architecture uses more than three sets of computers. In
this case the client is res
ponsible for presentation logic, a database server is
responsible for the data access logic and data storage, and the application logic is
spread across two or more different set of servers.
The primary advantages of an n
with a two
tier and three
tier is that it separates out the processing that occurs to
better balance the load on the different servers; it is more scalable. We have
three separate servers, which provides more powerful server, or even
put in two
The primary disadvantages to an n
compared with two
tier and three
tier architecture, it puts greater load on the network. It generates
more difficult to program and test software in n
architectures than in two
architectures because more devices have to communicate to complete a user’s
10. What do the following tools enable you to do: the web, e
mail, FTP, telnet?
One of the fastest growing Internet applications is the web. It
two innovative ideas:
A document containing links to other documents
Uniform Resource Locators (URLs)
A formal way of ident
to other documents.
Electronic mail was one of the earliest applications on the Internet and is still
among the most heavily used today. With e
mail, users create and send
message to one user, several users, or all users on a distribution list.
Transfer Protocol (FTP)
FTP enables you to send and receive files over the Internet. FTP works in a
similar manner as HTTP. FTP requires an application layer program on the
client computer and a FTP server application program on a server.
ables users to log in to servers (or other clients). Telnet requires an
application layer program on the client computer and an application layer
program on the server or host computer
11. For what is HTTP used? What are its major parts?
The standard protocol for communication between a web browser
and a web server is Hypertext Transfer Protocol (HTTP). It has three parts. The
first two parts are required; the last is optional. The parts are:
The request line, which starts with a comman
d (e.g., get)
, provides the web
page and ends with the HTTP version number that the browser understands;
the version number ensures that the web server does not attempt to use a
more advanced or newer version of the HTTP standard that the browser does
The request header, which contains a variety of optional information such as
the web browser being used (e.g., internet explorer) and the date.
The request body, which contains information sent to the server, such as
information that the use
r has typed into a form.
12. For what HTML used?
HTML is known as Hypertext Markup Language.
It is the predominant
markup language for web pages. It provides a means to describe the structure
based information in a document by denot
ing certain text as links,
headings, paragraphs, lists, and so on. HTML can also describe, to some
degree, the appearance and semantics of a document, and can include
embedded scripting language code which can affect the behavior of web
browsers and other
13. Describe how a web browser and web server work together to send a web
page to a user.
The web is the most common way for business to establish a
presence on the Internet. The web has two application software packages
web browser on the client and a web server on the server. Web browser and
servers communicate with one another using a standard called HTTP.
16. What roles do SMTP, POP, and
IMAP play in sending and receiving e
on the Internet?
mail, users create and send messages using an application
layer software package on client computers called user agents. The user agent
sends the mail to a server running an application
layer software package called
a mail transfer agent, which then
forwards the message through a series of
mail transfer agents to the mail transfer agent on receiver’s server. Several
standards have been developed to ensure compatibility between different
user agents and mail transfer agents. SMTP, POP, and IMAP are use
d on the
19. What is FTP, and why is it useful?
File Transfer Protocol (FTP) enables you to send and receive files over
the Internet. FTP works in a similar
manner as HTTP.
It requires an application
program on the client computer and
a FTP server program on a server. It is
commonly used today for uploading web pages.
20. What is Telnet, and why is it useful?
Telnet enables users to log in to servers (or other clients). Telnet requires
an application layer program on the clien
t computer and an application layer
program on the server or host computer. It is useful because it enables you to
access your server or host computer without sitting as its keyboard. It also
a great security threat.
26. It says that Internet explore
r cannot be displayed.