Documente Academic
Documente Profesional
Documente Cultură
• Clients and servers are separate logical entities that work together over a
network to accomplish a task.
• Clients send requests to the server. The server in turn sends response to the
client.
1
Horizontal scaling means adding or removing client workstations with only a
slight performance impact.
Vertical scaling means migrating to a larger and faster server machine or
multiservers.
6. What are the uses of file servers?
The client (typically a PC) passes requests for file records over a network to the
file server. File servers are useful for sharing files across a network. They are
indispensable for creating repositories of documents, images, engineering drawings, and
other data objects.
7. What are the functions of database server?
The client passes SQL requests as messages to the database server. The results of
each SQL command are returned over the network. The code that processes the SQL
request and the data reside on the same machine. The server uses its own processing
power to find the requested data instead of passing all records back to a client and then
letting it find its own data.
In an object server, client objects communicate with server objects using an ORB
(Object Request Broker).The ORB locates an instance of that object server class, invokes
the requested method, and returns the result to the client object. Server object must
provide support for concurrency and sharing. The ORB brings it all together.
15. This model of client/server consists of thin, portable,”universal” clients that talk
to super fat servers. A web server returns documents when clients ask them by name.
Here the clients and servers communicate using an RPC-like protocol called HTTP.
16. Define middleware.
Middleware is a vague term that covers all distributed software needed to support
interactions between clients and servers. It is software that’s in the middle of the
client/server system.
17. What are the types of middleware?
Types of middleware are:
1. General Middleware
2. Service-specific Middleware
3
General Middleware:
General Middleware is the substrate for client/server interactions. It
includes communication stacks, distributed directories, authentication services, network
time, remote procedure calls and queuing services.
Example: DCE, ONC+, Netware
Service –specific middleware:
Service-specific middleware is needed to accomplish a particular client/server type of
service.
Example: Database specific middleware such as ODBC, DRDA, EDA/SQL.
5
The server building block runs the server side of the application.The server
application typically runs on top of some shrink-wrapped server software package. The
server side depends on the operating system to interface with middleware building block
that brings in the requests for the service.
11
1. Windows NT workstation is a robust 32-bit client OS. It supports preemptive
multitasking, multithreading, memory protection and a transactional file system.
2. Network ready supports TCP/IP, NetBEUI, IPX/SPX, PPP and AppleTalk.
3. Provides C-2 level securities.
70. What are the cons of Windows NT?
1. NT workstation is a resource hog. It requires minimum of 16Mbytes RAM and
512 Mbytes (disk).
2. Support for laptop is poor.
3. Limited PCMCIA support and power management.
4. Does not support virtual device drivers.
5. Does not support plug and play.
6. Expensive client platform.
7. Does not get the same level of ISV support as the rest of the windows platform.
71. What are the cons of NT server?
1. NT server does not scale well.
2. Addition of processor makes it slow
3. Does not provide an enterprise directory server; does not even integrate with
other back office applications.
4. Back up facilities are not good.
5. Have security holes.
72. What are the features of OS/2 warp server?
1. OS/2 is an excellent application server.
32-bit Operating system incubates leading edge server software including
2. LotusNotes and CORBA services.
3. Auto detects hardware, easier to find and configure network adapters.
4. Provides disk mirroring, remote administration, remote software distribution, a
back server, software metering.
73. What are the cons of OS/2 warp server?
1. OS/2 is an Intel-only server platform.
2. OS/2 does not incur the extra burden of a portability layer.
74. Define transparency.
12
Transparency means fooling everyone into thinking the client/server system is
totally seamless. It really means hiding the network and its servers from the users and
even application programmers. It is referred as “network disappearing act”.
75. What are the types of transparency?
• Location transparency
• Namespace transparency
• Logon transparency
• Replication transparency
• Local/remote transparency
• Distributed transparency
• Failure transparency
• Administration transparency
76. What are the types of synchronization schemes used to refresh replicas in global
directory?
The two types of synchronization schemes used to refresh replicas include:
• Immediate replication
• Skulking
Immediate replication:
This causes any update to the master to be immediately shadowed on all
replicas.
Skulking:
This causes a periodic propagation (for example, once a day) to all the
replicas of all changes made on the master.
13
Encryption allows two principals to hold a secure communication. Each principal
must obtain a copy of a session key from a trusted third party. This session key can be
used for encoding and decoding messages. Another approach is to use a public, private
key encryption technique.
79. Define cryptographic checksums.
Cryptographic checksum is a less extreme solution that ensures data is not
modified as it passes through the network. The sender calculates a checksum on the data,
using a session key to encrypt it, and appends the result to the message. The receiver
recalculates the checksum, decrypts the one received in the message using the session
key, and then compares the two.
80. Define socket.
A socket is one end of a two-way communications link between two programs
running on the network. Sockets are supported on virtually every operating system.
14
The three most popular socket types are:
• Stream
• Datagram
• Raw
Stream and datagram sockets interface to the TCP and UDP protocols
Raw sockets interface to the IP protocol.
15
Connect, and OS/2 Warp Server. It came to life as the original transport for NetBIOS
commands.
89. Define RPC.
RPC-Remote Procedure Call
RPC like an ordinary procedure call is synchronous. A client process calls a
function on a remote server and suspends itself until it gets back the results. Parameters
are passed like in any ordinary procedure.
90. What are the issues faced in RPC?
The issues in RPC are:
• How are the servers functions located and started?
• How are parameters defined and passed between the client and the server?
• How are failures handled?
• How is security handled by RPC?
• How does the client find its server?
• How is data representation across systems handled?
IDL (Interface Definition Language) describes the functions and parameters that a
server exports to its clients. An IDL complier takes these descriptions and produces
source code stubs (and header files) for both client and server.
92. Define binding.
The association of a client with a server is called binding. The binding
information can be hard coded in the client or a client can find its server by consulting a
configuration file or an environment parameter.
93. Define automatic binding and dynamic binding.
• The process of using a directory to find a server at runtime is called dynamic
binding.
16
• The easiest way of finding a server with the help of RPC is called automatic
binding, where the RPC client stub will locate a server from a list of servers that
supports the interface.
94. Define MOM.
MOM-Message Oriented Middleware
Client/server relationship
Asynchronous. Clients and Synchronous. Client and
servers operate at different server must run concurrently.
times and speed.
18
Authorization comes after authentication; it determines whether the authenticated
client has permission to access a resource. DCE supports authorization through Access
Control List (ACLs).
103. Define DCE threads package.
The DCE thread package provides granular levels of multitasking on operating
systems that do not provide multitasking threads.DCE thread packages support
multitasking environments using shared memory.DCE provides a semaphore service that
helps threads synchronize their access to shared memory.
19
URL protocol provides a consistent intergalactic naming scheme to identify all
web resources-including documents, images, sound clips and programs.
4) The path to a target resource-It starts with the slash after the host and
the port number.
20
Ex: http://www.address.com:7800:/path/subdir/file.ext
<HTML>
<HEAD>
<TITLE> My DOCUMENT</TITLE>
</HEAD
<BODY>
<H1>THIS IS AN H1 HEADING</H1>
<H2> THIS IS AN H1 HEADING</H2>
<H3> THIS IS AN H1 HEADING</H3>
<H4> THIS IS AN H1 HEADING</H4>
<H5> THIS IS AN H1 HEADING</H5>
<H6> THIS IS AN H1 HEADING</H6>
</BODY>
</HTML>
116. Write few HTML tags for creating list.
HTML tags for creating unordered list:
<UL>
</UL>
21
HTML tags for creating ordered list:
<OL>
</OL>
117. Write HTML tag to include images in the document.
HTML tag for including image in a document is given by,
This tag includes an attribute called SRC that contain the URL of the external
picture file or the name of a local file.
118. Define Hyperlinks.
Hyperlinks are used to link our document to other documents or to other locations
in the same document using a pair of anchor tags that look like this:
The Environment Variables are set when the server executes a CGI Script.
Environment Variables allow the CGI Script to reference variables that might be
wanted for the Script output.
SERVER_NAME
– The server's Host name or IP address
23
SERVER_SOFTWARE
– The name and version of the server-software that is
answering the client requests
SERVER_PROTOCOL
– The name and revision of the information protocol the
request came in with.
REQUEST_METHOD
– The method with which the information request was issued.
25
exactly the information they need. A successful decision-support system must provide
user with flexible access to data and the tools to manipulate and present that data in all
kinds of report formats.
136. Define EIS.
Executive Information Systems (EIS) are powerful, easy-to-use, and business
specific than DSS tools. They are certainly more expensive, which may explain why the
“executive” attribute is in the name.
137. Define data warehouse.
Data warehouse is a central repository for all or significant parts of the data that
an enterprise's various business systems collect. The term was coined by W. H. Inmon.
IBM sometimes uses the term "information warehouse."Richard Hack thorn defines
warehouse as “a collection of data objects that have been inventoried for distribution
to a business community”.
27