CUSTOMER_CODE SMUDE DIVISION_CODE SMUDE

advertisement
CUSTOMER_CODE
SMUDE
DIVISION_CODE
SMUDE
EVENT_CODE
JAN2016
ASSESSMENT_CODE MCA5041_JAN2016
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
37908
QUESTION_TEXT
Explain Three-Tier Client/Server Architecture with its characteristics,
advantages and disadvantages.
SCHEME OF
EVALUATION
Three-Tier architecture is introduced to overcome the limitations of the two-tier
architecture. Middleware is placed between the client environment and the
database server. Following are the 3 layers of Three-Tier architecture
The user interface tier
The business logic tier
The database access tier
2 marks
Characteristics of Three-Tier architecture
3 marks
● There are 3 layers. The first layer communicates with the
intermediate layer as there is no direct relation of the first layer with the
third layer
● The business logic may be implemented as a separate layer
● In case of any change in any component, you do not have to
reinstall the applications on all the computers over the network
● A user can make the request to the business layer only through the
interface of an application
● Database tier is a server that accepts request from the business
layer only
● Business logic tier is a very crucial layer as it interacts with both
client and server. It passes the request to the server and delivers the
results to the client
Advantages of Three-Tier architecture
2 marks
Flexibility
Maintainability
Reusability
Scalability
Reliability
Disadvantages of Three-Tier architecture
3 marks
Specialized skills : to create and maintain Three-Tier architecture, you
need more specialized resources.
Increased Processing : As there are different interrelated layers; to
maintain this interrelation, more processing is required by the server
Increased cost
Increased Implementation and Maintenance Efforts
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
37911
QUESTION_TEXT
Write a brief note on the Roles Of EJB
SCHEME OF
EVALUATION
Following is a list of roles of EJB
i. Enterprise Bean Provider : It is also referred as the bean developer that
might be third –party vendor or a programmer that implements the business
logic by writing the EJBs. The role of the bean provider is to write and package
the EJBs and generate the ejb-jar file containing enterprise
bean
3 marks
ii. Deployer : the role of the deployer starts as soon as the ejb-jar file is
received. The deployer installs or deploys the ejb-jar file in an EJB
container
1 marks
iii. Application Assembler : The role of the application assembler is to
assemble the classes of EJB and build an application using those
classes
2 marks
iv. EJB Server Provider : the role of the EJB server provider is to provide a
server that can host the EJB container.
1 marks
v. EJB container Provider : the role of the EJB container provider is to
provide an EJB container for the enterprise bean
1 marks
vi. System Administrator : The role of the system administrator is to
administer the performance of the EJB application. The system administrator
also maintains the application if there is any interruption. Moreover, the system
administrator is also responsible to provide security to EJB
applications
2 marks
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
37912
QUESTION_TEXT
Explain Discovering Web services using UDDI
SCHEME OF
EVALUATION
UDDI refers to a registry base on XML through which businesses are enlisted
over the Internet. UDDI can also be defined as a technique of searching and
registering Web service applications. UDDI includes a data model and an API
Service discovery is the procedure of locating Web service providers, and
recovering Web services descriptions that have been published earlier.
Querying the service registry for Web services is similar to the requirements of
a service requester. A Web service is a procedure which is also dependent on
the architecture of the service registry
After the procedure is complete, the service provider or client application should
know the location of a Web service, its content, and how to interface with
it.
- 3 marks
Characteristics of UDDI
● Provides a procedure to classify businesses and services using
taxonomies
● Provides business registration, which is an XML document
● It is not bound to a particular technology
-1 marks
BUSINESS REGISTARTION
A UDDI business registration typically includes the following three components
White Pages : this provides basic information about an organization and its
business. It also contains the name of the trade and an explanation of the trade
in several languages. The information may contain the type of business the
organization does in some detail, along with the address and phone number of
the organization. In addition UDDI can have the identifiers related to the
company tax ID. All this information helps others to identify your Web
service
- 2 marks
Yellow Pages : describes a business service using different categorizations or
taxonomies. Others can use these categorizations to find business services
according to their requirements. The yellow pages consists of several
standards, such as the Standard Industrial Classification (SIC), UNSPSC,
NAICS, and geographic taxonomies.
-2 marks
Green Pages: these are used to define how to access a Web service, and
provide information about service bindings. These pages give information about
a Web service, such as its address and references to explain interfaces.
Information not directly related to the Web service is e-mail, FTP, CORBA, and
telephone details for the service.
- 2 marks
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
73657
QUESTION_TEXT
Write a short notes on File Server, Database Server, Object server and Web
server
SCHEME OF
EVALUATION
File server
It is a computer providing shared disk access to its clients. This shared
disk serves as a storage medium for documents, sound files, images,
and databases, which can be accessed by the client attached to the
server through the network. The main objective of file server is to
create shared warehouses of documents etc.,
File servers are used to store files. Clients can easily access the data
stored in these files. You can easily share these files with all the clients
through the network.
- 3 marks
Database Server
It is a server used to perform various tasks, such as analyzing, storing,
manipulating and archiving data. This server also handles the requests
of clients and returns the responses after processing these requests.
The clients send requests in the form of messages that contain SQL
commands
Database server uses the SQL database to store data. The request is
executed on the database server, which then processes the client’s
request and sends the desired result to the client. - 2 marks
Object server
Also called an object application server, stores distributed objects that
can communicate with each other. This server allows you to access
those objects from selected client objects. In an object server,
distributed objects stored on the server can communicate with each
other.
The protocols used in the object server are of the object request broker
(ORB) type. ORB is an instance of the object server class, which calls the
requested method and sends the result to the client. Every object
server holds one or more remote methods. Some examples of object
servers are CORBA, DCOM, MTS
- 2 marks
Web Server
The client/server model was first used in WWW. This model consist of
thin and portable clients that talk to superfast servers. In its simplest
manifestation, a Web server returns documents when clients ask for
them by name. clients and servers communicate with each other by
using an RPC like protocol called HTTP. This protocol defines a simple
set of commands. Parameters are passed as strings, with no provision
for typed data.
A Web server is responsible for storing and retrieving data from the Internet
for an enterprise. It also provides the facility for accessing documents and
other data. Some examples are IIS, Oracle Application
Server
- 3 marks
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
73661
QUESTION_TEXT
Explain any FIVE types of Middleware.
SCHEME OF
EVALUATION
(Any FIVE point with detailed explanation-2M)
* Data Centric middleware-Focuses on what we are obtaining not on
how.
* Database middleware- This allows users to access data from
databases.
* Transaction middleware-It includes various applications that work
on transaction processing systems.
* Object oriented middleware-It controls communication between
objects.
* Message oriented middleware- Transactions are delivered
between different systems through messages.
* Intelligent middleware- Embedded middleware- Refers to
middleware that provides real-time intelligence through intelligent
agents.
* Content centric middleware- Refers to the middleware through
which applications can request for differently-identified content
without knowing the background details.
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
73662
QUESTION_TEXT
Explain the key features on RFID architecture.
SCHEME OF
EVALUATION
The key features are:
RFID middleware encapsulates or merges the communication details,
large scale network management, intelligent data processing and
routing, hardware as well as software interoperability and system
integration. 1M
* It deals with large amount of data.1M
* It provides interoperability 1M
* Provides network management1 1M
* It leads to increase in quality of data to be transmitted etc. 1m
* IT does not require physical contact or multiple tags. 1M
* It provides a way to bring passive objects online and integrate
physical assets into the complete IT infrastructure. 2M
* It allows the RFID reader to read data from RFID tags through radio
signals from a particular distance. 2M
Download