![Pearson eText for Software Engineering -- Instant Access (Pearson+)](https://www.bartleby.com/isbn_cover_images/9780137503148/9780137503148_largeCoverImage.gif)
Pearson eText for Software Engineering -- Instant Access (Pearson+)
10th Edition
ISBN: 9780137503148
Author: Ian Sommerville
Publisher: PEARSON+
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 17, Problem 17.5E
Program Plan Intro
Fat client:
It is also called as thick client. It is nothing but a software that implements its own characteristics. It connects to servers but it functions greatly even when disconnected.
Example: Games
Thin client:
It is not like fat client because, here, only the UI is presented on the client system and all other functions are carried out on the server.
Example: Web browser
Expert Solution & Answer
![Check Mark](/static/check-mark.png)
Want to see the full answer?
Check out a sample textbook solution![Blurred answer](/static/blurred-answer.jpg)
Students have asked these similar questions
A Banking System provides users with several services:
(i) to check their accounts to see recent transactions and balances;
(ii) to pay bills online;
(iii) to buy and sell investments.
All of these services require a secure log-in. If the system crashes or the network connection fails during a transaction, it is essential that all the financial data is left in a consistent state.
b. Show the architecture of the product that you intend to build. Justify your choice of architecture.
You have been asked to design a secure system that requires strong authentication and authorization. The system must be designed so that communications between parts of the system cannot be intercepted and read by an attacker. Suggest the most appropriate clientserver architecture for this system and, giving the reasons for your answer, propose how functionality should be distributed between the client and the server systems.
In a client-server architecture with two tiers, I can't see how a malfunction of catastrophic proportions might occur. How can we solve this problem using a client-server architecture that has several layers?
Chapter 17 Solutions
Pearson eText for Software Engineering -- Instant Access (Pearson+)
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Question 4 Suppose that you are to design a g mail like mail system. The incoming mails are scanned for different security checks at different level one after other. Each level has its own functionality and depends on input from previous levels.For designing such system, what is the best possible architecture that can be used for this situation. and why? Full explain this question text typing work only thanksarrow_forwardAssume that an organization's authentication system is based on the Kerberos protocol. What is the ramifications of the failure of either the AS (authentication server) or the TGS (ticket granting server) in terms of security and service availability?arrow_forwardWhat is the connection between dependability and availability in a computer network? Due to the aforementioned factors, it is now out of date. Is a thorough consideration required?arrow_forward
- Client/Server software architectural pattern is a widely used pattern. You are required to discuss the applicability of this pattern in the following situations: 3) when security is important.arrow_forwardA fatal defect exists in a two-tiered client-server design. Multiple-tiered client-server architecture: the answer to this dilemma?arrow_forwardI don't see how a catastrophic fault might exist in a two-tier client-server design. In a client-server design with several layers, how can we fix this?arrow_forward
- Propose a network topology for various servers and the assumed location for trusted domains such as the location of your firewalls and Intrusion Detection System (IDS). 2) List down all Security related assumptions about approaches to the design and the trust. 3) Discuss the proposed authentication and authorisation mechanisms to be used. You need to justify your design choices. 4) Propose a mechanism to exchange secure email between users. This needs to consider the key management issue as well.arrow_forwardDescribe the client-server model in the context of networked systems. How does it facilitate communication between clients and servers, and what are the potential bottlenecks?arrow_forwardClient/Server software architectural pattern is a widely used pattern. You are required to discuss the applicability of this pattern in the following situations: 1) when the environment is Continuously changing. 2) when High performance of the application is not important. 3) when security is important. 4) when availability is important.arrow_forward
- A virtual private network (VPN) appliance is used instead of an operating system. How do the similarities and differences stack up when compared and contrasted?arrow_forwardKerberos is an authentication service developed for project Athena.(b) The core of Kerberos is the authentication and ticket granting servers. These are trusted by all users and servers and must be securely administered. Draw and label the overview of Kerberos 4.arrow_forwardTo ensure the security of the system architecture while using active hardware metering in the manner of EPIC, three main strategies are integrated. Generalized speaking, what exactly are these three strategies, and how do they contribute to the overall security of a network?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Systems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage LearningPrinciples of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9781305080195/9781305080195_smallCoverImage.gif)
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337102063/9781337102063_smallCoverImage.gif)
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning