1.6 Past Questions Flashcards
List 5 tools for client-server development
- GUI Based Development
- GUI Builder
- Object-oriented development with a central repository for data and applications
- Support for multiple databases
- Support for Middleware protocols
What are the phases of client-server development?
- Information System Infrastructure Self-Study:
This is the initial phase where the state of available resources is determined to come out with:
* The available software and hardware resources
* The available human resources
* A list of critical applications
* A list of opportunities and problems - Client-Server Infrastructure Definition:
The results from the previous stage together with the objectives of the organization are used to come out of the blue of the client-server infrastructure that addresses the software and hardware issues of the client, server, and networking platform - Selecting a Window of Opportunity:
In this phase, the system to base the client-server pilot project is chosen and defined based on the problems, cost, and clearly defined realistic goals. The project is defined in terms of business, and there is an emphasis on cost and obtaining immediate results - Management commitment: The entire organization needs to be committed to the project, including the management team, this is to ensure the required resources for the project will be available
- Implementation:
This is where the project is implemented following certain principles:
- use open or standard tools
- Foster continues edition, software, hardware, and development tools
- Chose vendors and consultants that provide specific implementation of designs, hardware, and software training
- Review and Evaluation:
At this phase, the system is reviewed and its performance is measured as its load increases.
what are the principles behind client-server systems?
(i) Hardware independence.
(ii) Software independence.
(iii) Open access to services.
(iv) Process distribution.
(v) Standards.
What is downsizing?
Downsizing in a client-server context refers to moving from a larger, centralized computing environment (such as mainframes) to a smaller, distributed computing environment using client-server architecture.
What are the threats to a server?
2.5.2 Threats to Server
Threats to server may be of the following types:
(i) Eavesdropping is the activity of silently listening to the data sent over the network.
This often allows a hacker to make complete transcript of network activity and
thus obtain sensitive information, such as password, data, and procedures for
performing functions. Encryption can prevent eavesdroppers from obtaining data
traveling over unsecured networks.
(ii) Denial of service is a situation, where a user renders the system unusable for
legitimate users by hogging or damaging a resource so that it can be used. The
common forms of this, are:
* Service overloading: A server may be rendered useless by sending it a large
amount of illegitimate service requests so as to consume up its CPU cycle
resource. In such a situation, the server may deny the service request of
legitimate requests.
* Message flooding: It is a process of increasing the number of receiving processes
running over the disk of the server by sending large files repeatedly after short
intervals. This may cause disk crash.
* Packet replay refers to the recording and retransmission of message packets
in the network. Medium tapping can do this. A checker may gain access to
a secure system by recording and later replaying a legitimate authentication
sequence message. Packet reply can also be used to distort the original message.
Using a method like packet time stamping and sequence counting can prevent
this problem.