This document provides information about a client-server architecture and applications course, including questions about:
1. The emergence of client-server computing from monolithic systems and stored procedures, and how middleware acts as a broker in inter-tier communication.
2. How server naming in COM and DCOM helps identify COM/DCOM servers and clients in a distributed environment.
3. Comparing COM and DCOM in terms of horizontal and vertical partitioning strategies in distributed environments.
4. The advantages of client-side wrapping in client-side remoting requirements and how views and targets facilitate COM/DCOM interworking specifications.
5. Assessment criteria that can be used as objective standards for determining when
Download as DOC, PDF, TXT or read online on Scribd
0%(1)0% found this document useful (1 vote)
27 views
Client Server Architecture and Applications
This document provides information about a client-server architecture and applications course, including questions about:
1. The emergence of client-server computing from monolithic systems and stored procedures, and how middleware acts as a broker in inter-tier communication.
2. How server naming in COM and DCOM helps identify COM/DCOM servers and clients in a distributed environment.
3. Comparing COM and DCOM in terms of horizontal and vertical partitioning strategies in distributed environments.
4. The advantages of client-side wrapping in client-side remoting requirements and how views and targets facilitate COM/DCOM interworking specifications.
5. Assessment criteria that can be used as objective standards for determining when
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2
POKHARA UNI VERSI TY
Level: Bachelor Semester Fall Year : 2006
Programme: BE Full Marks: 100 Course: Cliet Server !rchitecture a" !##licatios $ime : %hrs& Candidates are required to give their answers in their own words as far as practicable. The figures in the margin indicate full marks. Attempt all the questions. 1& a' (iscuss the emergece o) cliet*server com#utig statig the "isa"vatages o) moolithic s+stems a" store" #roce"ures& ,' -Mi""le.are techolog+ acts as a ,roker i iter*tier commuicatio/& 0usti)+ this statemet& 1 2 2. a' E3#lai ho. server ame i C4M a" 546 i C46B! hel# i"eti)+ C4M7C46B! servers a" cliets i a "istri,ute" eviromet& ,' (iscuss ho. securit+ is stregthee" i SSL*ea,le" C46B! cliets a" servers& Su##ort +our as.er .ith illustratios& 1 2 3. a' Com#are C4M a" C46B! i light o) hori8otal a" vertical #artitioig strateg+ i a+ "istri,ute" eviromet& ,' -$ra"itioal s+stem ,ecomes o,solete .ith the a"vet o) techolog+/& 0usti)+ this statemet su##ortig the ee" o) legac+ s+stem su##ort i cliet*server com#utig& 1 2 4. a' 9hat are the a"vatages o))ere" ,+ cliet*si"e .ra##er i cliet*si"e remotig re:uiremet; E3#lai& ,' (iscuss i "etail ho. the coce#t o) vie. a" target )acilitates C4M7C46B! iter.orkig s#eci)icatio& 1 2 5. a' (iscuss the assessmet criteria that ca ,e use" as o,<ective sta"ar"s o) <u"gmet )or "etermiig .he to use C4M or C46B!& ,' 9hat "o +ou mea ,+ 5ter)ace; State the ,asic "i))ereces ,et.ee Custom= !utomatio a" (ual 5ter)aces& 2 1 6. a' Mo"el a cliet*server s+stem= .here the commuicatio lik is the 5teret= a" trasactio coor"iatio is "oe usig C46B!& Su##ort the "iscussio o) the s+stem .ith illustratios& ,' Metio ,rie)l+ the )actors i)luecig server*si"e #artitioig i a+ cliet*server s+stem& 10 > 7. 9rite short otes o ?Any Two': a' 9e, Server as Eter#rise !##licatio Server ,' Sa",o3 Securit+ Mo"el c' 5ter)ace (e)iitio Laguage 2@>