CUSTOMER_CODE SMUDE DIVISION_CODE SMUDE EVENT_CODE JAN2016 ASSESSMENT_CODE MCA5041_JAN2016 QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 37908 QUESTION_TEXT Explain Three-Tier Client/Server Architecture with its characteristics, advantages and disadvantages. SCHEME OF EVALUATION Three-Tier architecture is introduced to overcome the limitations of the two-tier architecture. Middleware is placed between the client environment and the database server. Following are the 3 layers of Three-Tier architecture The user interface tier The business logic tier The database access tier 2 marks Characteristics of Three-Tier architecture 3 marks ● There are 3 layers. The first layer communicates with the intermediate layer as there is no direct relation of the first layer with the third layer ● The business logic may be implemented as a separate layer ● In case of any change in any component, you do not have to reinstall the applications on all the computers over the network ● A user can make the request to the business layer only through the interface of an application ● Database tier is a server that accepts request from the business layer only ● Business logic tier is a very crucial layer as it interacts with both client and server. It passes the request to the server and delivers the results to the client Advantages of Three-Tier architecture 2 marks Flexibility Maintainability Reusability Scalability Reliability Disadvantages of Three-Tier architecture 3 marks Specialized skills : to create and maintain Three-Tier architecture, you need more specialized resources. Increased Processing : As there are different interrelated layers; to maintain this interrelation, more processing is required by the server Increased cost Increased Implementation and Maintenance Efforts QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 37911 QUESTION_TEXT Write a brief note on the Roles Of EJB SCHEME OF EVALUATION Following is a list of roles of EJB i. Enterprise Bean Provider : It is also referred as the bean developer that might be third –party vendor or a programmer that implements the business logic by writing the EJBs. The role of the bean provider is to write and package the EJBs and generate the ejb-jar file containing enterprise bean 3 marks ii. Deployer : the role of the deployer starts as soon as the ejb-jar file is received. The deployer installs or deploys the ejb-jar file in an EJB container 1 marks iii. Application Assembler : The role of the application assembler is to assemble the classes of EJB and build an application using those classes 2 marks iv. EJB Server Provider : the role of the EJB server provider is to provide a server that can host the EJB container. 1 marks v. EJB container Provider : the role of the EJB container provider is to provide an EJB container for the enterprise bean 1 marks vi. System Administrator : The role of the system administrator is to administer the performance of the EJB application. The system administrator also maintains the application if there is any interruption. Moreover, the system administrator is also responsible to provide security to EJB applications 2 marks QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 37912 QUESTION_TEXT Explain Discovering Web services using UDDI SCHEME OF EVALUATION UDDI refers to a registry base on XML through which businesses are enlisted over the Internet. UDDI can also be defined as a technique of searching and registering Web service applications. UDDI includes a data model and an API Service discovery is the procedure of locating Web service providers, and recovering Web services descriptions that have been published earlier. Querying the service registry for Web services is similar to the requirements of a service requester. A Web service is a procedure which is also dependent on the architecture of the service registry After the procedure is complete, the service provider or client application should know the location of a Web service, its content, and how to interface with it. - 3 marks Characteristics of UDDI ● Provides a procedure to classify businesses and services using taxonomies ● Provides business registration, which is an XML document ● It is not bound to a particular technology -1 marks BUSINESS REGISTARTION A UDDI business registration typically includes the following three components White Pages : this provides basic information about an organization and its business. It also contains the name of the trade and an explanation of the trade in several languages. The information may contain the type of business the organization does in some detail, along with the address and phone number of the organization. In addition UDDI can have the identifiers related to the company tax ID. All this information helps others to identify your Web service - 2 marks Yellow Pages : describes a business service using different categorizations or taxonomies. Others can use these categorizations to find business services according to their requirements. The yellow pages consists of several standards, such as the Standard Industrial Classification (SIC), UNSPSC, NAICS, and geographic taxonomies. -2 marks Green Pages: these are used to define how to access a Web service, and provide information about service bindings. These pages give information about a Web service, such as its address and references to explain interfaces. Information not directly related to the Web service is e-mail, FTP, CORBA, and telephone details for the service. - 2 marks QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 73657 QUESTION_TEXT Write a short notes on File Server, Database Server, Object server and Web server SCHEME OF EVALUATION File server It is a computer providing shared disk access to its clients. This shared disk serves as a storage medium for documents, sound files, images, and databases, which can be accessed by the client attached to the server through the network. The main objective of file server is to create shared warehouses of documents etc., File servers are used to store files. Clients can easily access the data stored in these files. You can easily share these files with all the clients through the network. - 3 marks Database Server It is a server used to perform various tasks, such as analyzing, storing, manipulating and archiving data. This server also handles the requests of clients and returns the responses after processing these requests. The clients send requests in the form of messages that contain SQL commands Database server uses the SQL database to store data. The request is executed on the database server, which then processes the client’s request and sends the desired result to the client. - 2 marks Object server Also called an object application server, stores distributed objects that can communicate with each other. This server allows you to access those objects from selected client objects. In an object server, distributed objects stored on the server can communicate with each other. The protocols used in the object server are of the object request broker (ORB) type. ORB is an instance of the object server class, which calls the requested method and sends the result to the client. Every object server holds one or more remote methods. Some examples of object servers are CORBA, DCOM, MTS - 2 marks Web Server The client/server model was first used in WWW. This model consist of thin and portable clients that talk to superfast servers. In its simplest manifestation, a Web server returns documents when clients ask for them by name. clients and servers communicate with each other by using an RPC like protocol called HTTP. This protocol defines a simple set of commands. Parameters are passed as strings, with no provision for typed data. A Web server is responsible for storing and retrieving data from the Internet for an enterprise. It also provides the facility for accessing documents and other data. Some examples are IIS, Oracle Application Server - 3 marks QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 73661 QUESTION_TEXT Explain any FIVE types of Middleware. SCHEME OF EVALUATION (Any FIVE point with detailed explanation-2M) * Data Centric middleware-Focuses on what we are obtaining not on how. * Database middleware- This allows users to access data from databases. * Transaction middleware-It includes various applications that work on transaction processing systems. * Object oriented middleware-It controls communication between objects. * Message oriented middleware- Transactions are delivered between different systems through messages. * Intelligent middleware- Embedded middleware- Refers to middleware that provides real-time intelligence through intelligent agents. * Content centric middleware- Refers to the middleware through which applications can request for differently-identified content without knowing the background details. QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 73662 QUESTION_TEXT Explain the key features on RFID architecture. SCHEME OF EVALUATION The key features are: RFID middleware encapsulates or merges the communication details, large scale network management, intelligent data processing and routing, hardware as well as software interoperability and system integration. 1M * It deals with large amount of data.1M * It provides interoperability 1M * Provides network management1 1M * It leads to increase in quality of data to be transmitted etc. 1m * IT does not require physical contact or multiple tags. 1M * It provides a way to bring passive objects online and integrate physical assets into the complete IT infrastructure. 2M * It allows the RFID reader to read data from RFID tags through radio signals from a particular distance. 2M