Monday, January 27, 2020
Client Server Network Architecture Essay
Client Server Network Architecture Essay Abstract This report is about the client server network architecture in which each computer or process on the network is either a client which is low end computer which request services and or a server which is high end powerful computer which is highly capable of providing services to many different clients at the same time. The task which servers performs are like managing disk drives which are called file servers, managing printers which are called print servers or managing network data traffic known as network server. Clients are PCs which require or use these facilities from servers which include sharing files, printers, storage and sometimes processing. All the clients and servers in a network communicate by using different protocols which are set of rules or standards which govern the communication between any computers or devices connected in a network. This client server architecture is also known as two-tier architecture.(1) Introduction The advent of personal computers gave birth to the idea of client/server architecture. Before personal computers, programs were written for mainframes. Software written for mainframes was often coded in a monolithic format that is the user interface, business logic and data access functionality are all contained in a single application. Because the entire application ran within the mainframe this was not a problem.(2) Client/server model, needed to share many kind of services. As time passed the need of these services increased so servers also evolved. Many clients started sharing services of common server. Example can be of our web browser which is a client and requests services from web server like web pages or files. This is sometime also knows as Hyper Text Transfer Protocol server (HTTP) also for computer to make requests like a client Transfer Control Protocol/Internet Protocol (TCP/IP) and for transfer of files over internet File Transfer Protocol (FTP).Protocols are set of rules or standard that which governs the communication of two or more nodes in a network.(3) The relationship between two computer programs in which one program makes a request and other which provide the required service is called a client/server relationship. It is a backbone of interconnection of two or more programs or computers anywhere across the network. Example could be an ATM machine in which we send request for balance check or money withdrawal and through this machine which is like a client and bank has supercomputers which acts as servers and the transaction are handled by them and result is sent back to the client to display in front of user.(4) Client Server Architecture has two common architectural models. The two tier and the three tier architecture. In two tier architecture the application will be on the server instead of client because server has more disk space and power as compare to PC also the data will also be in server along with the application. In three-tier architecture the load is divided between two different servers instead of putting load on one and jamming other clients. These servers are database server and application server. The data and application are divided between these servers. Client would only request and display data. In this tier more manageable and less contention system for resources will be available because each server will be used either to process data or application requests.(6) Literature Review In modern world because of rapid changes in user requirements and increasing amount on daily basis of users sharing data among them the needs of faster and better network system growing tremendously companies are bound to upgrade their system every six months. Now Hures is also facing same problems. This is very common problem in any company because of the rapid development of business systems so to cater these problems any company should keep this in mind while developing new system is that they may need to upgrade very soon. Hures analyst did not plan the future scenarios properly and because that even internal and external environment is affecting the company. The business is affected by many changes like political, social and technological. Client/Server technology is often introduced for flexibility of coping with these changes. However it comes with its own challenges which we will discuss here. Client/Server is built on three basic building block they are client which is a small or less capable hardware or software then middleware which is a software which lies in between and server more powerful then client. The first block client runs different applications on its operating system which provides graphic user interface. Clients could have web browser for example as an application requesting services now operating system transfers these request to the middleware. Client also runs a DSM (Distributed System Management) it could be simple element to the entire front-end managing application. Middleware is application which has three categories: transport stack, network operating system (NOS) and server-specific middleware. It runs on both the client and the server. It also have DSM like clients and is the backbone of client/server architecture. Server is typically intelligent software or hardware it runs some application to make an interface with middleware. Server consists of five main components SQL database, TP Monitors, groupware , object and the web. Server also has DSM in it which can be a simple agent or entire back-end of the system. The Distributed System Management application runs on every node in the Client/Server network. The additional server like email could be used depending on size and usage of the network. Hures could also use similar OS in all workstations it also plays very important part in Client/Server. Same OS on all sides in network can reduce a lot of problems and it will increase server efficiency and will cause less strain on servers. The Alternative architecture which could overcome Hures problem can be client queue client or another one called peer to peer architecture. Client queue client Architecture is also called passive queue Architecture. In Client queue client all points including servers are simple clients. It was developed to continue on traditional Client Server Architecture. In this they were trying to make one client as a server for different clients to multiply the usage for clients. Hures could benefit from this track and order number of clients for better efficiency also there will be better resources distribution and sharing. Example is search engine which uses spidering for faster and better results. Peer-to-Peer Architecture rather than focusing on power of server it distinguishes itself by distributing power and function. It depends totally on bandwidth and power of different nodes in the network. This architecture goes against previous client server architecture where there is one central server it replaces it with nodes which function as clients and servers simultaneously. Hures could use this architecture because due to its encapsulation it makes it easier to repair or upgrade without clients being affected and its more secure and easy to maintain. Intranet is one of the oldest and safest way for any company to have communication among themselves. It works just like website on internet. It gives you options to log ons to access only authorize data at your level in company. Most of the corporations use intranet for sharing important data among the employees. Intranet is a kind of network which is built by using same tools and protocols used by internet or World Wide Web (WWW) but is only restricted to the network of this company only. It uses same HTML, Java and CSS and also provide same database to store data within network server. Security features are fully customizable so its your preference whether you want to change password every 30 day or to set different accessibility for employee depending their post and work in the company. Any outside person trying to access company files will be blocked by firewalls. The Advantages of this internal network is that inside employees can do very important information interchange very quick and secure. It makes the data sharing more effective, easier and effective manner. It can also be used for internal applications such as newsletters, policy manuals, and price list etc. It can also gather information related to expense and programs that can help to transact application. As it is a private place on internet its safer and secured because only authority can access the website. The Disadvantages of this intranet to be considered would be like firstly it is very expensive to setup and maintain because a special team of people need to be hired and trained for handling the process of managing resources of this particular company and organizing them in the website. This process will also be very time consuming to develop and also the number of individual users would have to be considered in the overall budget for planning, designing, implementing. Also to maintain the quality, testing and maintenance needs to be done at all time. Obviously once whole site is developed now each user in company needs to be trained also how to use and set up your passwords which will also affect overall budget. It is very true that the popularity of intranet software and the internet pose threats towards traditional client/server system because intranet software have more advantages as compared to peer to peer or client/server architectures. It takes the most advantage of networking technology in the business world and because it enables us to take full use of wireless and internet technology at the same time it is the most flexible most secure and gives more privacy as compared to offered by traditional client/server system. As a result it is the most popular choice among many companies. However it is also very important to keep in consideration that even though intranet is the most popular and successfully used and accepted worldwide, there are still parts in the system or particular company which needs to use traditional client server system. As far as security is considered there are always threats to any open network system. To reduce the risk of infiltration from outside sources prope r monitoring of network on continues level is severely needed. The most important aspect of any company/corporation should be the network security. Cctv could be installed in various places to remotely monitor all the activities of users within the office and no one should be allowed to use their plug n play devices to any individual workstation. Maintaining the network integrity should be of the highest priority and could reduce the unplanned damages to revenue but again the cost of doing all these procedures will be substantial.
Sunday, January 19, 2020
The Effects of Addicting to Cyber Social Networks
The Effects of Addicting to Cyber Social Networks Social network is an addictive thing nowadays. I believe that everyone, start from teenagers up to old people addict to cyber social networks. Almost every single breathe, they update their twit, their statues, etc. If we cannot control ourselves to use this social network in the good way, it will not take a long time for us to get the bad impacts. There are so many bad impacts of addicting social networks.First of all, we will next to our far away people we usually connected to, but we will be far with the people around us. How come? Many people always keep contact to their friends in cyber world by social networking, so they often donââ¬â¢t care with the people around them. That condition absolutely makes others feel uncomfort to talk with that person. So, donââ¬â¢t be surprised if those real friends will stay away from that person. Actually itââ¬â¢s good to keep contact with people who far away with us. However, real frien ds are more important than cyber friends.Why? Because if we have a problem, real friends will help us directly than cyber friends. So the main point here, we have to priority our real friends first, then our cyber friends. The second is our main activity will be annoyed because of addicting to social networks. I am sure that we often meet someone who cannot live faraway from their gadget just to update his social networks. Donââ¬â¢t you ever think that this habit actually is annoyed his main activity? For example, there is a student in a class.All of us know that his main activity should be related with studying. However, if he is too busy with his social networks, how about his study? I believe that he will not be able to focus on his study because every single breathe he updates his social networks as I said before. That habit will also influence his score, how come? Because if we cannot focus on what we do, of course we will not be able to do it well. We will not be able to gi ve our best on it. The last but not least, addicting to social networks will give bad impact for our body.As we know that if we addict to something, in this case social networks, we will not be able to be separated with our gadgets. Whenever and wherever we go, those gadgets will stick with our hand, and absolutely itââ¬â¢s dangerous for us. Medical research has found that two mobile phones which are calling to each other for some hours can make an egg cooked. From that news, I think we should know how dangerous the radiation of this gadget is. Besides the radiation, too much doing this activity will make us feel lazy to move, we will sit all day long.Sitting for a long time is also not good for our body, we have to do exercise at least 15 minutes per day regularly. As you know, it is really dangerous for us if we cannot use cyber social networks in a good way. Being far away with people around us, annoying our main activity and also causing harm for our health is just some examp les of this bad habit. In my opinion, technology is good for us, but we have to use it in a good way too, so we can get the advantages. Sonia Dwi Cahyanti 110221414604/AA
Saturday, January 11, 2020
Marie Curie â⬠Change Agent Essay
Marie Curie has been chosen as a change agent due to the fact that she was the first woman to win a Nobel prize. She studied radioactivity, ââ¬Å"a term which she invented,â⬠(1) and invented portable x-ray machines which were carried by vans to the wounded in the field during World War I. (2) Element 96 was named curium (Cm) in the honor of Pierre and Marie Curie. (3) She made important advancements in the area of science, as remembered by the Curie institute, which for a time she was director of. The institute was named for her because of all the advancements she had made during her studies, and the work she did at the institute itself. The change that she made was for education for women to be accepted, and for women working in science to be more acceptable in her time. Works Cited (1) http://www.lucidcafe.com/library/95nov/curie.html (2) http://www.diplomatie.gov.fr/label_france/ENGLISH/SCIENCES/CURIE/marie.htm (3) http://www.student-consolidation.net/nobel-prize-winners/curie-sklodowska/curie-sklodowska.htm
Thursday, January 2, 2020
Motivation Letter And Research Objectives Essay - 1506 Words
Motivation Letter and Research Objectives Perseverance is the key to success; no hurdles can stop a determined person to succeed. While Afghanistan was suffering from civil war we immigrated to Pakistan. I started school; the most prosperous period of my learning period abroad from my country, in a different culture, having access to a lot of facilities like electricity, and electronic devices which after returning to my homeland and getting used of them I realized how precious these facilities were. After collapse of the Taliban regime in 2002 when we returned to Afghanistan, I was ready to walk a distance of six miles under the burning sun in the far village of Wardak Province of Afghanistan to go back and forth to school. While realizing how much our nationââ¬â¢s struggles are, I learned that most of our communityââ¬â¢s sufferings were due to the lack of electricity , paved roads, distance from the hospital, limited transportation to schools in the area, crops dying because of floods in the spring and water scarcit y in later times of the year. I thought about how I can help and it was then that I decided to become an engineer. Apart from getting first position in class and my social engagement, I also had to prepare myself for the greater challenge of getting admission in to an Engineering College. This could only happen through passing the University entrance exam (Kankor). In the exam I was declared amongst the 50 top scorers out of almost 250,000 participants that wereShow MoreRelatedProfessional Communication1467 Words à |à 6 PagesCommunication 1 * Objectives and purposes of Communications 1 * Scope of Communication in any functional Organization 2 * Different mediums of Communication 2 * Modes of Communication 2 * Barriers to Communication 3 * Principles of Effective Communication 3 * Business Correspondence Letters 3 * Enquiries, Quotations, Complaints and Redressal 3 * Sales Promotion Letters 3 * Report Writing and Research Reports 4 * ConclusionRead MoreOrganisational Culture and Motivation1496 Words à |à 6 PagesCONTENTS Introduction and Rationale Problem Statement Objectives Introductory Literature Review Proposed Methodology Project Plan Sources of Reading INTRODUCTION AND RATIONALE As Desson and Clouthier (2010) state, culture is an important factor in both attracting and retaining desirable employees. The extent to which an employeeââ¬â¢s needs and expectations are fulfilled will determine the motivation, job satisfaction and performance levels (Mullins, 2005, p. 499) which would be influenced byRead MoreInvestigating Gender Differences in Helping Essay1485 Words à |à 6 Pages primary motivation for altruistic behaviour is seen as a desire to improve the welfare of another person rather than the anticipation of some reward or for any other reason that might indicate self-interest. One of the major problems for psychologists has been determining what is truly altruistic and what might be better explained in terms of egoism. Batson et al.ââ¬â¢s (1997) empathy-altruism hypothesis proposes that empathic concern evokes an altruistic motivation. Studies Read MoreEmployee Motivation For An Organization1646 Words à |à 7 Pagespathway to motivate its employees. Some scholars state that employee motivation can be encouraged by offering appropriate rewards and establish systematic reward systems (Amstrong, 2012; Pratheepkanth, 2011 and Manzoor, 2011). In contemporary business environments, whether multi-national corporations (MNC), large organisation or small-medium enterprises (SME) want to gain employeeââ¬â¢s motivation and thus achieve company objectives, it usually relates to financial or productivity. Compared to largeRead MoreMother As Motivator Of Motivator Essay920 Words à |à 4 PagesMother as Motivator of B.Ed. Trainees for Education Patel Dharmi Baldevbhai Assistant Professor Shri Mahavir Vidhyamandir Trust B.Ed. College Pandesara, Surat. Abstracts: Motivation is the desire or drive within a person to achieve some goal. Motherââ¬â¢s role as a motivator is challenging for her childââ¬â¢s educational development. Objectives of the study are to know the qualities and to know the thoughts of mother as motivator for B.Ed. trainees. 147 trainees of 10 B.Ed. colleges affiliated with VNSGU, SuratRead MoreBusiness1209 Words à |à 5 PagesJude Kisang Asongwe 49 Valley Road New Park Village Wolverhampton West Midlands WV10 0NY United Kingdom Em: ASONJUDE@YAHOO.CO.UK Tel: +447585090663 Dear Sir/Madame, Motivation Letter The objective of this letter is to explain my motivation to study the Masters in Sustainable Development in Agriculture offered by Agris Mundus. I completed from Larenstein University of Professional Education in The Netherlands with a Bachelor Honours Degree in Agribusiness and Management. Since 2004 after I completedRead MoreResearch On Bullying And Bullying793 Words à |à 4 Pagestaunts, threats, or slanderous statements on the Internet or by directly sending them to their victims through digital communication like email, text messaging, and instant messaging (Young, Young, Fullwood, 2007). According to Purdy, E.R. (2014) research on bullying suggest that bullying, which may involve either physical or emotional abuse, or both, is most likely to begin in late elementary school and continue throughout the middle-school years (Kueny Zirkel, 2012). Around these ages group, studentsRead MoreThe Effects Of Using Student Self Assessment And Progress Monitoring Strategies On Student Achievement Essay1714 Words à |à 7 Pagesstudents reflect on and evaluate the quality of their work and their learning, make judgments on whether they met the stated goals or learning criteria, identify strengths and weaknesses in their work, and revise accordingly (Spiller, 2012). Specific research questions that will be answered after this study concludes are as follows: 1. What is the effect of self-assessment/progress monitoring strategies on student achievement based upon end-of unit assessments? 2. In the studentsââ¬â¢ opinions, do self-assessmentRead MoreBackground Of Id Medical Group1389 Words à |à 6 Pagesbrand, motivation and engagement. The wellbeing is bound up flexibility, work-life balance, motivation, job-satisfaction and human research management. For this reason, the rank of giving something back and wellbeing is very high in 100 companies (high level means not good at about a topic). The two category have included a joint topic which is motivation. The company is not good at about motivation. Therefore, the company is not good financially. 3.0 Motivation and Theories 3.1 Motivation For motivationRead MoreNursing Personal Statement Examples954 Words à |à 4 Pagesour contractors. The first major step was to inform the contractors of the new changes in a timely manner. I immediately began to research the new code and I was able to draft a clear and concise program letter that explained the changes and its ramifications. Time was a major obstacle, but I was able to draft, edit, receive approval, and send the program letter out in less than a weekââ¬â¢s time. In the end, my quick response to this issue resulted in the retention of 96% of our contractors. For
Subscribe to:
Comments (Atom)