L2 The Application Layer Flashcards

0
Q

What are the functions of the application layer?

A
  1. Data storage (data encoding, compression)
  2. Data access logic (data retrieval decisions)
  3. Application/business logic (core processing logic of the application)
  4. Presentation logic (information presentation and UI interaction)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What is the difference between architecture and function in the application layer?

A

Architecture: the way in which the functions of the application layer are spread among the clients and servers in the network.

Functions: the tasks performed by the application in providing services to the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the types of application architecture?

A
  • host based (server based): the server does most of the work
  • client based: the client does most of the work
  • client-server: the work is shared between client and sever
  • peer-to-peer: the work is shared between all communicating computers where they assume both roles of client and server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List four different types of servers

A

Mainframe
Personal computer
Cluster (physically separate but linked. Cluster of PC’s)
Virtual servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List four examples of clients

A

Personal computers
Terminal (everything sent to server to be processed)
Transaction terminal (ATM)
Handheld

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the types of clients

A

Fat client: powerful processing (presentation, application and data access logic)
Thin client: low processing power (only runs presentation logic and little application logic)
Ultra-thin client: very low processing power (used where theft might be a problem)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe host (or server) based architecture

A

The server does practically all the work.

User input is sent to server and display information is generated by server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the advantages and disadvantages of host (server) based architectures?

A

Advantages:
Central processing: application software easy to manage
Central data storage: secure
Expensive parts of the system are protected
Disadvantages:
Central processing: single point of failure
Highly critical resource: redundancy, backup, and protection are important.
Incredibly expensive to maintain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe client-based architecture

A

Client responsible for presentation, application, and do that access logic. The server is only used to store data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the advantages and disadvantages of a client-based architecture?

A

Advantages:
Cost distribution
Cost reduction: powerful clients are relatively inexpensive
Disadvantages:
Server takes no part data access: file locking can be problematic
Highly critical resource: redundancy, backup, and protection become important
Inefficient network utilization: Entire file must be retrieved over the network, edited, then sent back over the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe the client/server architecture

A

The client is responsible for presentation and application logic. Server is used to store data and provide data access logic (and sometimes application logic).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the advantages and disadvantages of client/server architecture?

A

Advantages:
Cost distribution
Cost-reduction: powerful clients are really expensive
Increased efficiency: processing distribution means that you can do more with less powerful processors.
Enables multivendor interoperation: allows the vendor’s client to send and retrieve data to/from any other vendor’s server.
Disadvantages:
Multivendor interworking: all vendors must follow the exact same data interchange specification.
Middleware: middleware is used when there is no direct data interchange standard between certain type of client and server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe middleware

A

Translates between the client application and the server application. Used to manage message transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In what layer is middleware implemented?

A

Mostly the application layer, but some parts of the presentation layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe two-tier client-server architecture and state what the client does as well as what the server does.

A

It has two hosts involved in end to end transactions. Client: Handles presentation and application logic
Server: Stores data and provides data access logic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe the three parts of three-tier client-server architecture and what they do.

A

It has three hosts involved in end to end transactions.
Client: Handles presentation logic
Application Server: Handles application logic
Server: stores data and provides data access logic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe the parts of N-Tier client-server architecture and what they do.

A

It has four or more hosts involved in end to end transactions.
Client: Handles presentation logic
Application Server: Handles application logic
Server: stores data and provides data access logic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Explain the advantages and disadvantages of Multi-Tier architecture.

A

Advantages
- application logic is distributed producing better load balancing
- scales easily because smaller single nodes are easy to upgrade
Disadvantages
- distributed communicating nodes put more load on the network infrastructure
- more complex & more difficult to develop and test

18
Q

What is peer-to-peer architecture?

A

Each host in the set acts as both client and server to any and all other hosts in the set. ex. Limewire and BitTorrent

19
Q

Explain the advantages and disadvantages of peer-to-peer architecture.

A

Advantages:
- Capacity of system grows as number of participating nodes increases
- Network is very resilient to failure
- Data can be stored at multiple points in the network – the same data can be access simultaneously from different nodes
Disadvantages
- Lack of centralized management means that it is harder to control the availability of data
- Malicious software can more easily infiltrate the stored data = big security risk

20
Q

What is Cloud Computing?

A

Model for enabling ubiquitous, on-demand access to shared pool of computing resources.
Cloud infrastructure is a collection of hardware and software that enables cloud computing.

21
Q

What are the essential characteristics of cloud computing?

A
  • On-demand self-service
  • Broad network access
  • Resource pooling
  • Rapid elasticity (capabilities can grow or shrink according to demand)
  • Measured service (resource usage is monitored, controlled, reported and charged to)
22
Q

Name and explain three cloud service models.

A

SaaS

  • Service provider provides access and use of applications
  • Applications accessed through client software (e.g. Web browser)
  • User does not manage any part of infrastructure or applications

PaaS

  • Consumer creates or acquires their own software which they deploy on the provider’s cloud infrastructure
  • User does not manage any part of infrastructure but manages the software and its deployment

IaaS

  • Consumer is able to provision processing, storage, and network computing resources, and deploy arbitrary software including operating system and applications
  • User does not manage underlying (physical) cloud infrastructure
23
Q

Name and explain four cloud deployment models.

A
  1. Private cloud - exclusive use
  2. Community cloud - for exclusive use of a closed community of users that have shared requirements and concerns
  3. Public cloud - use by the general public
  4. Hybrid cloud - composed of two or more distinct cloud infrastructure types
24
Q

What is virtualization?

A

A method of decoupling an infrastructure service (e.g. application and resources required to run it) from the physical hardware on which it runs.
can be applied to Servers, Storage, Desktops, Applications, Networks

25
Q

Name four criteria that need to be considered before choosing an architecture.

A
  1. Scalability
  2. Acquisition Cost
  3. Development & Maintenance Cost
  4. Security
26
Q

Look at slide 37 for architecture comparing chart (not sure how to make a question for this but seems important)

A

slide 37

27
Q

Name some examples of things that use the application layer.

A
  • The World-Wide Web
  • Email
  • File Transfer
  • Videoconferencing
  • Internet Telephony
  • Instant Messaging
28
Q

What is the world wide web? note: the internet and the web are not the same!

A

It is a collection of hyperlinked documents accessible via the Internet.
It is comprised of Hypertext – A text document which contains links to other documents
URL - Uniform Resource Locator - A string indicating where and how to access the linked document

29
Q

Explain the difference between the world wide web and the internet.

A

The Internet is the interconnection of every networked device on the planet that has a route into the global backbone network and is reachable from any authorized device, making the Web possible

The Web is the set of hyperlinked documents and Application Layer processes that use the Internet for interconnectivity and communication among the processes - it runs over the internet.

30
Q

What type of architecture is the web built on?

A

two-tier client-server architecture. It is comprised on HTTP requests and HTTP responses.

31
Q

What is File Transfer Protocol?

A

It is used to transfer files between hosts. It requires a reliable transport mechanism and uses TCP (Transmission Control Protocol) in order to ensure error free, in-order delivery delivery of data to the application layer process.

FTP uses 2 peer connections to transfer data. Each connection has a TCP port number.

32
Q

What file transfer modes exist for FTP (File Transfer Protocol)?

A
  1. ASCII (TYPE A) - used if the file consists of text characters that can be represented by the ASCII character set
  2. Binary (TYPE I) - used if the file consists of non-text data (e.g. graphics).
33
Q

What user connection modes exist for FTP (File Transfer Protocol)?

A
  1. Closed site - user logs in with a username and password and can upload files, create directories and delete files.
  2. Open site - the user logs in with a username “anonymous” and uses their email as the password. The user usually only has read-only access (download) privileges.
34
Q

Explain what Email is and who the main actors are?

A

Email is essentially a client-server application.

The User Agent - is the email client application ex. outlook

The Mail Transfer Agent - is the email server application. It maintains and manages individual mailboxes, sends email to clients and transfers emails between servers

35
Q

What standards exist for Email?

A
  1. SMTP (Simple mail transfer protocol) - Used when sending mail from client to server or from server to server
  2. Post Office Protocol – POP - Used when retrieving mail from server to client, Downloads mail from server to local drive before reading
  3. Internet Message Access Protocol – IMAP - Used when retrieving mail from server to client
36
Q

Explain how email works in a two-tier architecture exchange.

A

The email gets sent from Alice’s computer to the email server. That email then gets sent to the second email server. Bob can then use IMAP/POP to retrieve the email from the second server.

37
Q

What packet elements exist in an SMTP transmission?

A

Header Element Fields:
- FROM, TO, DATE, SUBJECT, Message-ID, etc.
Body Element:
- DATA field

38
Q

Explain how email works in a three-tier architecture exchange.

A

Used between thin client and a server.
An HTTP request gets sent from Alices web client to the webserver + email client and an HTTP response gets sent back to Alices Web Client. The email then gets sent to the first email server and then gets sent to the second email server. Bob then sends an HTTP request from his web client to the other webserver + email client. The webserver + email client uses IMAP to retrieve the email from the email server. An HTTP response then gets sent to Bob’s web client.

39
Q

What is a MIME?

A

SMTP was designed to transfer text data only (7-bit ASCII) and the solution was to use Multipurpose Internet Mail Extension (MIME) to specifies the content type and a set of transfer encodings to send images

40
Q

How does MIME work?

A

Non-text (e.g. graphics, audio, etc.) data is transformed by the encoding scheme into text characters. The encoded data is attached to the email, along with header information stating its Content-Type and Content-Encoding
Transferring Encoded Data
- Email client contains software that encodes data before sending and decodes data on receipt
- Encoded data may be added to email message as an attachment
- Encoded data may be inline (e.g. to handle characters in language other than English)

41
Q

What is Video Conferencing?

A
  • Allows geographically dispersed remote meetings
  • Cheaper than moving people to same location
  • Client app combines audio and video in single data stream
  • Desktop videoconferencing uses PC hardware and software to communicate with server
42
Q

What is Instant messaging (IM)?

A
  • IM client contacts IM server whenever user is connected to Internet
  • When friend connects to Internet, server notifies both
  • Message from client is sent to server, then to friend
43
Q

With regards to networks, what are the implications for management?

A

The network is an enabler
- Sharing data increases value and knowledge, which allows better business decisions to be made
- Applications running on the network is the means by which data is shared
- The network becomes critical to the organization
Dramatic increase in network applications
- More applications running on the network implies more traffic on the network
- Increased traffic means that congestion may become a problem, requiring network redesign and prioritization
- Increased operating cost