Using MIS (9th Edition)
Using MIS (9th Edition)
9th Edition
ISBN: 9780134106786
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter 6.7, Problem 6.5ARQ

Explanation of Solution

Three-tier architecture:

The three-tier architecture is a fundamental design of user computers and servers that contains three major components or tiers such as follows:

  • User tier
  • Server tier
  • Database tier

Role of each tier in above architecture:

User tier:

  • This tier contains computers and mobile devices which have web browsers that request the web page to process it.

Server tier:

  • It consists of computers that execute web servers and process the requesting application programs.

Database tier:

  • It also contains computers that execute DBMS, which process the user request to fetch and store data in the database.

Working methodology of three-tier architecture:

  • When user enter an e-commerce website to buy products online, example “www.zulily.com” in their browser, the browser send a request to a computer in the server tire. Server tier computers can execute applications like web server, a commerce server and so on.
  • The requested “www.zulily.com” page will be displayed on the user’s computer. If the user had clicked any product such as shoe, then the commerce server will send a request to the DBMS to retrieve shoe’s data from the database.
  • Finally the server formats the page with the data and sends that web page to the user’s computer.

SOA:

SOA stands for “Service-Oriented Architecture”. It is a philosophy that states, each interaction among computing devices are referred as services in a prescribed, standard way.

Reason for encapsulation:

According to SOA terms, the work of each department is encapsulated in the department.

  • By using SOA philosophies, each department will formally state the services it provides. Similarly each department will officially state the data it supposes to receive with the request and the data it potentials to return as user’s response.
  • Hence there is no personal contact between each department.

Advantages of SOA in three-tier architecture:

  • SOA services are stated between the web server and the DBMS server on application back end. Therefore, the DBMS server need not do anything while the number and location of the web server gets adjusted.
  • Similarly, the web server need not do anything while the number and location of the DBMS server gets adjusted.

Protocol:

A set of rules and structures for organizing communications is referred as protocol.

TCP/IP protocol architecture:

The TCP/IP protocol architecture contains five layers and one or more protocols which are defined in each layer.

  • Computer programs are written by data communication and software vendors, which can implement the rules for specific protocol.

Purpose of internet protocols:

HTTP:

HTTP stands for “Hypertext Transfer Protocol”...

Blurred answer
Students have asked these similar questions
D. S. Malik, Data Structures Using C++, 2nd Edition, 2010
Methods (Ch6) - Review 1. (The MyRoot method) Below is a manual implementation of the Math.sqrt() method in Java. There are two methods, method #1 which calculates the square root for positive integers, and method #2, which calculates the square root of positive doubles (also works for integers). public class SquareRoot { public static void main(String[] args) { } // implement a loop of your choice here // Method that calculates the square root of integer variables public static double myRoot(int number) { double root; root=number/2; double root old; do { root old root; root (root_old+number/root_old)/2; } while (Math.abs(root_old-root)>1.8E-6); return root; } // Method that calculates the square root of double variables public static double myRoot(double number) { double root; root number/2; double root_old; do { root old root; root (root_old+number/root_old)/2; while (Math.abs (root_old-root)>1.0E-6); return root; } } Program-it-Yourself: In the main method, create a program that…
I would like to know the main features about the following 3 key concepts:1. Backup Domain Controller (BDC)2. Access Control List (ACL)3. Dynamic Memory
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education