AQSA TARIQ (Group Assignment 1)

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

01

AMMAR YASIR

02- 05- 2020

20

AQSA TARIQ F2018365037

Sr # Group Member Student ID


1 AQSA TARIQ F2018365037
2 SAMIA TAHIR F2018365019
3 SAMAN IRSHAD F2018365003

---(Question No.1)---
Explain Client – Server model. What are the role of client and server?
01

AMMAR YASIR

02- 05- 2020

20

AQSA TARIQ F2018365037

---(Answer)---
Client-server model is a distributed communication framework of network processes among
service requestors, client and service providers. The client-server connection is established
through a network or internet. The client-server model is purely network computing concept also
building functionality for email exchange and web/database access.
A client-server network is designed for end-users, called clients, to get resources such as files,
songs, video collections, or some other data or service from a central computer called a server. 

Role of Client and Server


01

AMMAR YASIR

02- 05- 2020

20

AQSA TARIQ F2018365037

Envision a client sitting at a café. He is trusting that the server will stop by and take his request.
Similar guidelines apply in a client-server arrange; the client, which can be a PC, work area, a
cell phone, or essentially any mechanized gadget, can make a solicitation from the server.
The client utilizes the system as an approach to associate with and address the server. Similarly
as the client addresses his server, the client utilizes the system to send and get interchanges about
its request, or solicitation. The server will take the solicitation and ensure that the solicitation is
substantial. In the event that everything looks at alright, at that point the server will bring the
solicitation and serve the client.
The server can make a solicitation from the client also. It might need to determine the status of
the status of the client, or inquire as to whether it has gotten any security patches, or in the event
that it despite everything needs assets from the server. If not, the server will close the association
so as to let loose system traffic.
Would you be able to envision a server remaining close to a client who just gazes at the menu
without requesting anything? Following 15 minutes, it would be a smart thought for the server to
leave and keep an eye on different clients. In the two cases, the server proceeds onward to
different clients varying.

---(Answer No.2)---
01

AMMAR YASIR

02- 05- 2020

20

AQSA TARIQ F2018365037


01

AMMAR YASIR

02- 05- 2020

20

AQSA TARIQ F2018365037

[ CITATION Uni \l 1033 ]

----(Question No.3)----
Applications other than umt example?
----(Answer)----
01

AMMAR YASIR

02- 05- 2020

20

AQSA TARIQ F2018365037

SunRay: The smart display design has three layers: equipment including organizing apparatus,
programming, and the executives. Therefore meager clients are about modest and dependable
help conveyance; however once you have that set up, going the subsequent stage is tied in with
decentralizing IT dynamic and engaging your sysadmins to act legitimately on client necessities.
From a product point of view you need to have the option to keep up for all intents and purposes
immaculate dependability, basically take out obstructions to client experimentation with existing
or new programming and kill spam, infections, phishing, and related security issues as client
concerns. That implies Unix SMP, it implies moving application support into the client network,
and it implies permitting open source code into creation situations.
Notice that the nonattendance of both the work area PC and the systems administration
complexities that go with it make it conceivable to totally wipe out assistance work area works
by moving first level applications support into the client network. Your sysadmins will get, and
field, home client and related inquiries however you ought to for the most part consider those as
a major aspect of the client relationship, not as an IT hierarchical capacity.
A Domain Controller is a server that reacts to confirmation demands and checks clients on PC
systems. Domains are a various leveled method for sorting out clients and PCs that cooperate on
a similar system. The domain controller keeps the entirety of that information composed and
made sure about.
The domain controller (DC) is the crate that holds the keys to the realm Active Directory (AD).
While assailants have a wide range of stunts to increase raised access on systems, including
assaulting the DC itself, you can shield your DCs from aggressors as well as really use DCs to
distinguish cyberattacks in progress.
Softserver : Gradual reinforcements are performed at the square level, shortening reinforcement
windows and decreasing circle space and system I/O.
Manage thousands of servers with a single, web-based console that allows users to select
individual files, directories, or entire file systems to be restored within minutes. 
01

AMMAR YASIR

02- 05- 2020

20

AQSA TARIQ F2018365037

Provide backup facility with high security that gives safety to the data on server.[ CITATION r1S \l
1033 ]

----(Question No.4)----
Applications other than umt example?
----(Answer)----

SCO
AIX
HP/UX
Network Protocols
TCP/IP
Microsoft Network
IPX(Novell network)
NetBEUI
Comparison

Other Applications UMT Applications


The SCO Group has been criticized heavily by the Solaris Operating System itself is still
Linux community for their apparently baseless and proprietary software, meaning that it’s
desperate legal actions. The SCO Group is viewed impossible to access freely to its source code,
as a pariah. The SCO Group has since gone so there’s no way for third parties to modify its
bankrupt. code. 
 Proefficient architecture for symmetric
multiprocessing
 Scalability, Interoperability and
01

AMMAR YASIR

02- 05- 2020

20

AQSA TARIQ F2018365037

portability is one of its greatest


advantages which Solaris Operating
Environment has.
 One of the strengths of Solaris is its
scalability. It’s capable of running on
different devices, independently of its
pertinence to a big environment. 
 Improves Productivity
 Customization ease

Bibliography
SOFT, r. (n.d.). backup service manager. Retrieved from R1Soft: https://www.r1soft.com/

Technology, U. o., & Technology, U. o. (n.d.). IPC Resources. Retrieved from www.umt.edu.pk:
https://www.umt.edu.pk/ipc/IPC-Resources/IPC-Data-Center.aspx

You might also like