1. What do you mean by Internet Protocol suite?
The Internet Protocol Suite is a term used to describe the set of communication protocols, developed individually by the IT community, for sending data over computer networks such as the Internet.
2. what do you mean by Router?
Tremendous benefits for implementing Client-Server Technology in Business.
(or)
What are the computing models in a client server architecture?
The Internet Protocol Suite is a term used to describe the set of communication protocols, developed individually by the IT community, for sending data over computer networks such as the Internet.
2. what do you mean by Router?
- A router is a device that forwards data packets along networks.
- A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network.
- Routers are located at gateways, the places where two or more networks connect.
- Usenet is a collection of user-submitted notes or messages on various subjects that are posted to servers on a worldwide network.
- Each subject collection of posted notes is known as a newsgroup.
- There are thousands of newsgroups and it is possible for you to form a new one.
- Most newsgroups are hosted on Internet-connected servers, but they can also be hosted from servers that are not part of the Internet.
- Usenet's original protocol was UNIX-to-UNIX Copy (UUCP), but today the Network News Transfer Protocol (NNTP) is used.
- Most browsers, such as those from Netscape and Microsoft, provide Usenet support and access to any newsgroups that you select.
- On the Web, Google and other sites provide a subject-oriented directory as well as a search approach to newsgroups and help you register to participate in them.
4.What do you mean by Internet?
- The Internet is a network that is available to anyone with an Internet-connected device.
- It is a massive collection of networks sharing information publicly in the form of interlinked Web pages.
- Internet Protocol defines a site's unique location which most users see as a domain name or URL.
- The network is literally world-wide and is often referred to as the world wide web.
5. What do you mean by Intranet?
- An intranet network is only available to a small group of people.
- Intranets are mainly used within businesses and organizations to provide access to files and applications among networked computers and servers.
- Intranets may or may not have access to the Internet.
- If an intranet does connect to the Internet, a firewall is used to prevent outside access to the intranet.
- The purpose is to allow people within the same company to share information over a local area network.
- It is sometimes referred to as a private Internet.
6. What do you mean by Extranet?
- An extranet is similar to an intranet, but is accessible via a Web portal.
- An extranet may be accessed from anywhere if the user has a valid user name and password.
- The purpose of this type of network is to allow collaboration and sharing of resources not only in-house but with a select group of outside users.
- For instance, businesses will use an extranet to allow customers to log in to provide input on projects.
- Another example is using a virtual private network to allow employees to log in to the network when they're are not in the office.
7. What is the difference between Internet, Intranet and Extranet?
• When it comes to size of the network, Internet is the largest and consists hundreds of thousands of network devices and interconnections. Intranet size may span from hundreds to several thousands of computers. Extranet comes as a part of Intranet, so it is the smallest.
• Internet is a public network. Intranet and Extranet are private networks.
• Users can access Internet anonymously. Users should have valid username/password to access Intranet and Extranet.
• Generally, Internet is unregulated and uncensored. But Intranet/Extranet is regulated by the organization policies.
• In the nature of users, Internet has unlimited number of anonymous users. Intranet keeps limited number of predefined users who are internal members of the organization. Extranet users are mostly non-organizational users.
8.What is an IP address?
- IP address is short for Internet Protocol (IP) address.
- An IP address is an identifier for a computer or device on a TCP/IP network.
- An IP address consists of unique string of numbers separated by full stops that identifies each computer using the Internet Protocol to communicate over a network.
- IP specifies the format of packets, also called datagrams, and the addressing scheme.
9. What is Email?
- Short for electronic mail
- email (or e-mail) is defined as the transmission of messages over communications networks.
- messages distributed by electronic means from one computer user to one or more recipients via a network.
- Typically the messages are notes entered from the keyboard or electronic files stored on disk.
- Most mainframes, minicomputers, and computer networks have an email system.
1. TCP/IP-TCP (Transmission Control Protocol) and IP .
This suite of protocols is what carries out the basic operations of the Web.
TCP/IP is also used on many local area networks.
Internet Protocol (IP) is the method used to route information to the proper address.
2.UDP and ICMP-
Another member of the TCP/IP suite is User Datagram Protocol (UDP).
This protocol is used together with IP when small amounts of information are involved.
A different type of protocol is Internet Control Message Protocol (ICMP) .
It defines a small number of messages used for diagnostic and management purposes.
3.Mail Protocols POP3 and SMTP-
The most common protocol for sending mail is Simple Mail Transfer Protocol (SMTP).
The most common protocol used by PCs for receiving mail is Post Office Protocol(POP).
A more powerful protocol for reading mail is Interactive Mail Access Protocol (IMAP).
4.Hypertext Transfer Protocol-
An HTML page is transmitted over the Web in a standard way and format known as Hypertext Transfer Protocol (HTTP).
5.File Transfer Protocol-
File Transfer Protocol (FTP) lives up to its name and provides a method for copying files over a network from one computer to another.
11.What is distributed computing?
A type of computing in which different components and objects comprising an application can be located on different computers connected to a network.
So, for example, a word processing application might consist of an editor component on one computer, a spell-checker object on a second computer, and a thesaurus on a third computer.
In some distributed computing systems, each of the three computers could even be running a different operating system.
12. What do you mean by client/server architecture?
Client-server architecture (client/server) is a network architecture in which each computer or process on the network is either a client or a server.
Servers are powerful computers or processes dedicated to managing disk drives (file servers), printers (print servers), or network traffic (network servers ).
Clients are PCs or workstations on which users run applications. Clients rely on servers for resources, such as files, devices, and even processing power.
Another type of network architecture is known as a peer-to-peer architecture because each node has equivalent responsibilities.
Both client/server and peer-to-peer architectures are widely used, and each has unique advantages and disadvantages.
Client-server architectures are sometimes called two-tier architectures.
13.What do you mean by DNS?
1.Short for Domain Name System (or Service or Server)
2. an Internet service that translates domain names into IP addresses.
3.Because domain names are alphabetic, they're easier to remember.
4.The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address.
5.For example, the domain name www.example.com might translate to 198.105.232.4.
14.What is client /server computing?
11.What is distributed computing?
A type of computing in which different components and objects comprising an application can be located on different computers connected to a network.
So, for example, a word processing application might consist of an editor component on one computer, a spell-checker object on a second computer, and a thesaurus on a third computer.
In some distributed computing systems, each of the three computers could even be running a different operating system.
12. What do you mean by client/server architecture?
Client-server architecture (client/server) is a network architecture in which each computer or process on the network is either a client or a server.
Servers are powerful computers or processes dedicated to managing disk drives (file servers), printers (print servers), or network traffic (network servers ).
Clients are PCs or workstations on which users run applications. Clients rely on servers for resources, such as files, devices, and even processing power.
Another type of network architecture is known as a peer-to-peer architecture because each node has equivalent responsibilities.
Both client/server and peer-to-peer architectures are widely used, and each has unique advantages and disadvantages.
Client-server architectures are sometimes called two-tier architectures.
1.Short for Domain Name System (or Service or Server)
2. an Internet service that translates domain names into IP addresses.
3.Because domain names are alphabetic, they're easier to remember.
4.The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address.
5.For example, the domain name www.example.com might translate to 198.105.232.4.
14.What is client /server computing?
- Client-Server computing is the logical extension of modular programming with fundamental assumption that separation of a huge program into its constituent parts ("modules") can create the possibility for further modification, easier development and better maintainability.
- In Client-Server Computing, all large modules need not all be excecuted within the same memory space.
- With this architecture, the calling module becomes the client( requesting service) and the called module becomes the server (providing service).
- Clients and Servers are running separately on appropriate hardware and software platforms for their functions.
- For example, database management system servers running on platforms specially designed and configured to perform queries, or file servers running on platforms with special elements for managing files.
- Refers to any device that relies on the host computer (that is, the computer the device is attached to) to handle some operations.
- Two common examples are host-based printers and host-based modems
- A printer that relies on the host computer's processor to generate printable pages.
- A modem that uses the computer's processor to handle some operations.
- Because host-based modems require less processing power of their own, they should be less expensive than conventional modems.
- A computer system that is accessed by a user working at a remote location.
- Typically, the term is used when there are two computer systems connected by modems and telephone lines.
Tremendous benefits for implementing Client-Server Technology in Business.
- Vendor independence as compared to the traditional mainframe computing. This includes application development methodologies, programming paradigms, products and architectures.
- Organization have changed from steep hierarchies to flattened hierarchies. Decisions making are carried out by many lower ranked managers across the organization rather than performed only by CEOs in the past.
- Network management is replacing vertical management
- Faster response and flexibility to changing environment of business world outside.
- The customer has a single point of contact for all business with the organization.
- The time required to complete the work will be minimized
- Better sharing of critical database resources and other application software's among clients through the network.
- Companies can cut costs on maintenance in employing Client- Server Computing since servers are usually cheaper than mainframe (1/10 of mainframe) and the performance of servers and mainframe are nearly identical.
- Networked webs of small, powerful machines. If one machine goes down, the organization can still function properly.
- Systems grow easily. It is easy to updated and modernize system, both hardware and software as the companies evolved and has new requirements.
- Individual client operating environments. You can mix and match computer platforms to suit the needs of individual departments and users.
(or)
What are the computing models in a client server architecture?
Disk and File Servers:
- The simplest form of servers are disk servers and file servers.
- With a file server, the client passes requests for files or file records over a network to the file server.
- This form of data service requires large bandwidth and can slow a network with many users.
The more advanced form of servers are Database servers, Transaction server and Application servers.
- In database servers, clients passes SQL (Structured Query Language) requests as messages to the server and the results of the query are returned over the network. The code that processes the SQL request and the data resides on the server allowing it to use its own processing power to find the requested data, rather than pass all the records back to a client and let it find its own data as was the case for the file server.
- In transaction servers, clients invoke remote procedures that reside on servers which also contains an SQL database engine. There are procedural statements on the server to execute a group of SQL statements (transactions) which either all succeed or fail as a unit.
- Application servers are not necessarily database centered but are used to server user needs, such as. download capabilities from Dow Jones or regulating a electronic mail process. Basing resources on a server allows users to share data, while security and management services, which are also based in the server, ensure data integrity and security.
No comments:
Post a Comment