This document provides information about a client-server architecture and applications course, including questions about:
1. The emergence of client-server computing from monolithic systems and stored procedures, and how middleware acts as a broker in inter-tier communication.
2. How server naming in COM and DCOM helps identify COM/DCOM servers and clients in a distributed environment.
3. Comparing COM and DCOM in terms of horizontal and vertical partitioning strategies in distributed environments.
4. The advantages of client-side wrapping in client-side remoting requirements and how views and targets facilitate COM/DCOM interworking specifications.
5. Assessment criteria that can be used as objective standards for determining when
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0%(1)0% found this document useful (1 vote)
37 views2 pages
Client Server Architecture and Applications
This document provides information about a client-server architecture and applications course, including questions about:
1. The emergence of client-server computing from monolithic systems and stored procedures, and how middleware acts as a broker in inter-tier communication.
2. How server naming in COM and DCOM helps identify COM/DCOM servers and clients in a distributed environment.
3. Comparing COM and DCOM in terms of horizontal and vertical partitioning strategies in distributed environments.
4. The advantages of client-side wrapping in client-side remoting requirements and how views and targets facilitate COM/DCOM interworking specifications.
5. Assessment criteria that can be used as objective standards for determining when
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2
POKHARA UNI VERSI TY
Level: Bachelor Semester Fall Year : 2006
Programme: BE Full Marks: 100 Course: Cliet Server !rchitecture a" !##licatios $ime : %hrs& Candidates are required to give their answers in their own words as far as practicable. The figures in the margin indicate full marks. Attempt all the questions. 1& a' (iscuss the emergece o) cliet*server com#utig statig the "isa"vatages o) moolithic s+stems a" store" #roce"ures& ,' -Mi""le.are techolog+ acts as a ,roker i iter*tier commuicatio/& 0usti)+ this statemet& 1 2 2. a' E3#lai ho. server ame i C4M a" 546 i C46B! hel# i"eti)+ C4M7C46B! servers a" cliets i a "istri,ute" eviromet& ,' (iscuss ho. securit+ is stregthee" i SSL*ea,le" C46B! cliets a" servers& Su##ort +our as.er .ith illustratios& 1 2 3. a' Com#are C4M a" C46B! i light o) hori8otal a" vertical #artitioig strateg+ i a+ "istri,ute" eviromet& ,' -$ra"itioal s+stem ,ecomes o,solete .ith the a"vet o) techolog+/& 0usti)+ this statemet su##ortig the ee" o) legac+ s+stem su##ort i cliet*server com#utig& 1 2 4. a' 9hat are the a"vatages o))ere" ,+ cliet*si"e .ra##er i cliet*si"e remotig re:uiremet; E3#lai& ,' (iscuss i "etail ho. the coce#t o) vie. a" target )acilitates C4M7C46B! iter.orkig s#eci)icatio& 1 2 5. a' (iscuss the assessmet criteria that ca ,e use" as o,<ective sta"ar"s o) <u"gmet )or "etermiig .he to use C4M or C46B!& ,' 9hat "o +ou mea ,+ 5ter)ace; State the ,asic "i))ereces ,et.ee Custom= !utomatio a" (ual 5ter)aces& 2 1 6. a' Mo"el a cliet*server s+stem= .here the commuicatio lik is the 5teret= a" trasactio coor"iatio is "oe usig C46B!& Su##ort the "iscussio o) the s+stem .ith illustratios& ,' Metio ,rie)l+ the )actors i)luecig server*si"e #artitioig i a+ cliet*server s+stem& 10 > 7. 9rite short otes o ?Any Two': a' 9e, Server as Eter#rise !##licatio Server ,' Sa",o3 Securit+ Mo"el c' 5ter)ace (e)iitio Laguage 2@>