L7- Building Telecommunication System (Part 3) Flashcards
An important current development in organizational computing is ____________ - moving from platforms based on mainframes and minicomputers to a microcomputing environment. These architectures are
based on the client/server model.
downsizing
Most frequently used models of client/server computing are:
- Two-Tier Architecture
- Three-Tier Architecture
TRUE OR FALSE:
In client/server computing, individual applications are actually written to run on several computer platforms to take advantage of their capabilities.
True
TRUE OR FALSE:
2. Main objective of a client is to provide a graphical user interface to a user
3. Main objective of a server is to provide shared services to clients
True
Characteristics of Two-Tier Architecture:
- Client performs presentation services. It displays the GUI and runs the program that determines what happens when the user selects a menu option.
- Server manages the accesses to
the database - Clients send remote procedure calls to activate specific applications logic on a server.
Characteristics of Three-Tier Architecture:
An application server runs most of the application logic, with the user workstation responsible for the display at the front end and the database server providing database servers at the back end. Objective is to distribute application so as to reduce the overall hardware costs while minimizing the network traffic.
Issues of client/server computing:
- Is attractive in terms of their acquisition price as related to their performance
- Is moving computing control out of the data centers and into the end-user areas
- Software is complex, and is expensive to maintain
- Generate significant traffic on the firm’s backbone network that connects clients and servers
- Can be performed in LAN and WAN environments
_________________are the fundamental infrastructure of organizational computing. These long-distance telecommunications networks employ a variety of equipment so that the expensive links may be used effectively.
Wide Area Networks
A WAN has a powerful ______________. The host runs a system program, called a telecommunications monitor, which processes incoming messages, passing them to the appropriate application programs, and accepts outgoing messages from the applications in order to transmit them into the network.
Host Computer
Relieves the host computer of most of the
tasks involved in network control. Under
the control of its own software, the _____________ accepts messages coming from the network and routes outgoing messages to their destinations.
Front-end Processor
- It performs the necessary code conversions, encrypts and decrypts secure messages, and performs error checking so that the host deals with Aclean@ messages
Manages several terminals, connecting them to a single telecommunications link, and performs communication tasks for them, such as screen formatting, code conversion, and error checking.
Cluster Controller
-may also allow the terminals to share a high-speed printer and may handle electronic mail among
the cluster terminals.
Combines the data that terminals send to it over local low-speed links into a single stream. This stream is then transmitted over a high-speed telecommunications channel and is split by another on the opposite end of the channel
Multiplexor
Combines transmission from several slower terminals that operate in a burst mode into a single transmission stream that requires a link of lower speed than the sum of the speeds of all the terminals combined.
Concentrator
-stores messages from terminals and forwards them when warranted.
Establishes connections between nodes that need to communicate.
Switches
Include a variety of dumb terminals, with no processing capacity and intelligent terminals with processing capacity, such as personal computers.
Access Terminals
The essential providers of telecommunications
links and services are common carriers and the vendors of enhanced services on value-added networks. These include:
- Common carriers
- Providers of value-added networks
- Private lines and private networks
Are companies licensed by a country’s government to provide telecommunications services to the public. The vast majority provide telephone service. These carriers offer the use of a wide-area telecommunications infrastructure, that is, facilities for the transmission of voice and data messages.
Common Carriers
Common carriers offer a service called _______________ where a user firm can purchase guaranteed access to facilities with specified capabilities, such as transmission speed and access points.
virtual private network
Value-added vendors lease facilities from the common carriers and provide telecommunications services to their own customers. These vendors add value to the basic infrastructure furnished by the common carrier. The __________________ provided by the vendors furnish services over and above those provided by common carriers.
value-added networks (VAN)
Instead of using a service that has to be shared with others, a firm may lease its own private lines or entire networks from carriers. This can have economic advantages as compared with VAN use, as well as provide faster and more secure communications
Private Lines and Private Networks
A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
Internet
Characteristics of the Internet:
- It is run in a decentralized fashion by a number of voluntary organizations, the principal of which is the Internet Society.
- It is a medium of communication, a source of information, and a developing means of electronic commerce.
- A major obstacle to its development has become the limited capacity of the links interconnecting the networks.
The principal categories of Internet use include:
- Communication
- Information Access
- Electronic commerce
It is an information service available over the Internet, providing access to distributed electronic documents via hyper links.
The World Wide Web
TRUE OR FALSE:
The World Wide Web is a client/server system.
True
Access to the Web is through a client program, known as a __________. This sends out for the needed page into the Internet, interprets the formatting directions on the retrieved page, and displays the page
accordingly on the screen.
browser
To access a Web site, you provide the browser with the site’s identifier, known as a ____________
URL (Uniform Resource Locator)
A ____________ is a Web facility that maintains its own information about the documents available on the Web.
search engine
It is sharing business information, maintaining
business relationships, and conducting business transactions by means of telecommunications networks.
Electronic commerce
The framework of electronic commerce is summarized in three levels:
- Infrastructure
- the hardware, software, databases, and telecommunications that together deliver such functionality as the Web over the Internet, and support EDI and other forms of messaging over the Internet or over value-added networks. - Services
- messaging and a variety of services enabling the finding and delivery of information, as well as negotiation, transaction business, and settlement. - Products and structures
- direct provision of commercial services to consumers and business partners, intra-organizational information sharing and collaboration, and organization of electronic markets and supply chains.
Using the Internet, many firms have implemented internal networks of Web sites, known as __________, are set up on corporate LANs and WANs.
Intranets
An Intranet is separated from the public Internet by a facility called _____________. The said program runs on the server computer, preventing access to the Intranet from the public Internet, but allowing access to the
Internet. Intranet is, in effect, the owner company’s private Internet.
firewall
The high-level design of a blueprint for the organizational information system is known as the ____________________. This plan must support the present and future computing and communications needs of a business.
information system architecture
Fundamental components of an architectural plan must address the following concerns:
- How will the processing power be distributed
- Where will the databases be located
- Network interconnections
- Protocols
Using Telecommunications for Business Process Redesign and to Seek Competitive Advantage
Through telecommunications, this value may be:
- An increase in the efficiency of operations
- Improvements in the effectiveness of management
- Innovations in the marketplace
Telecommunications may provide these values through the following impacts:
- Time compression
- Telecommunications enable a firm to transmit raw data and information quickly and accurately between remote sites. - Overcoming geographical dispersion
- Telecommunications enable an organization with geographically remote sites to function, to a degree, as though these sites were a single unit. The firm can then reap benefits of scale and scope which would otherwise be unobtainable. - Restructuring business relationships
- Telecommunications make it possible to create systems which restructure the interactions of people
within a firm as well as a firm’s relationships with its customers. Operational efficiency may be raised by
eliminating intermediaries from various business processes.