In the mid-1990s, as applications became more complex and potentially could be deployed to hundreds or thousands of end-users, the client side of this architecture gave rise to two problems:
•A ‘fat’ client, requiring considerable resources on the client’s computer to run effectively (resources include disk space, RAM, and CPU power).
•A significant client side administration overhead.
By 1995, a new variation of the traditional two-tier client-server model appeared to solve these problems called the three-tier client-server architecture. This new architecture proposed three layers, each potentially running on a different platform:
(1)The user interface layer, which runs on the end-user’s computer (the client).
(2)The business logic and data processing layer. This middle tier runs on a server and is often called the application server. One application server is designed to serve multiple clients.
(3)A DBMS, which stores the data required by the middle tier. This tier may run on a separate server called the database server.
The three-tier design has many advantages over the traditional two-tier design, such as:
•A ‘thin’ client, which requires less expensive hardware.
•Simplified application maintenance, as a result of centralizing the business logic for many end-users into a single application server. This eliminates the concerns of software distribution that are problematic in the traditional two-tier client-server architecture.
•Added modularity, which makes it easier to modify or replace one tier without affecting the other tiers.
•Easier load balancing, again as a result of separating the core business logic from the database functions. For example, a Transaction Processing Monitor (TPM) can be used to reduce the number of connections to the database server. (A TPM is a program that controls data transfer between clients and servers in order to provide a consistent environment for Online Transaction Processing (OLTP).)
kevowmuchiri answered the question on July 4, 2018 at 15:28
- Describe the five components of the DBMS environment and discuss how they relate to each other(Solved)
Describe the five components of the DBMS environment and discuss how they relate to each other
Date posted: July 4, 2018. Answers (1)
- Describe the main characteristics of the database approach.(Solved)
Describe the main characteristics of the database approach.
Date posted: July 4, 2018. Answers (1)
- Discuss the meaning of each of the following terms:
(a) Data
(b) database
(c) database management system
(d) application program
(e) data independence
(Solved)
Discuss the meaning of each of the following terms:
(a) Data
(b) database
(c) database management system
(d) application program
(e) data independence
Date posted: July 4, 2018. Answers (1)
- Outline four types of memory as used in data structures(Solved)
Outline four types of memory as used in data structures.
Date posted: July 3, 2018. Answers (1)
- Define Data structures(Solved)
Define Data structures.
Date posted: July 3, 2018. Answers (1)
- Explain the difference between nominal and real gross domestic product (GDP). (Solved)
Explain the difference between nominal and real gross domestic product (GDP).
Date posted: July 3, 2018. Answers (1)
- Explain how an interactive DVD can be used to train users of an information system(Solved)
Explain how an interactive DVD can be used to train users of an information system
Date posted: July 3, 2018. Answers (1)
- An interactive DVD can be used to provide training. Describe how data is written onto a DVD.(Solved)
An interactive DVD can be used to provide training. Describe how data is written onto a DVD.
Date posted: July 3, 2018. Answers (1)
- Explain how auditing software is used on a computer network(Solved)
Explain how auditing software is used on a computer network
Date posted: July 3, 2018. Answers (1)
- Communication standards are required when data is transmitted over a network.
Explain the need for communication standards(Solved)
Communication standards are required when data is transmitted over a network.
Explain the need for communication standards
Date posted: July 3, 2018. Answers (1)
- Most organisations have replaced standalone computers with a network. Identify three advantages of a network over standalone computers.
(Solved)
Most organisations have replaced standalone computers with a network. Identify three advantages of a network over standalone computers.
Date posted: July 3, 2018. Answers (1)
- Describe the role of the programmer during software development.(Solved)
Describe the role of the programmer during software development.
Date posted: July 3, 2018. Answers (1)
- Explain the main difference between evolutionary prototyping and throw-away prototyping.(Solved)
Explain the main difference between evolutionary prototyping and throw-away prototyping.
Date posted: July 3, 2018. Answers (1)
- An organisation requires a new information system. A feasibility study is carried out. Explain what is meant by
Legal feasibility
Social feasibility(Solved)
An organisation requires a new information system. A feasibility study is carried out. Explain what is meant by
Legal feasibility
Social feasibility
Date posted: July 3, 2018. Answers (1)
- Describe how real-time processing could be used to process orders on the website.(Solved)
Describe how real-time processing could be used to process orders on the website.
Date posted: July 3, 2018. Answers (1)
- A company sells health products at a number of shops throughout the country.
An ICT consultant recommends that the company should develop a website.
Describe...(Solved)
A company sells health products at a number of shops throughout the country.
An ICT consultant recommends that the company should develop a website.
Describe two benefits to the company of using the website to sell its products.
Date posted: July 3, 2018. Answers (1)
- Describe the purpose of each of the following CPU components.
The arithmetic and logic unit
The control unit(Solved)
Describe the purpose of each of the following CPU components.
The arithmetic and logic unit
The control unit
Date posted: July 3, 2018. Answers (1)
- Guests attending an ICT convention are asked to fill in claims forms for
expenses.
Details from these forms are keyed into a database.
The database is then used...(Solved)
Guests attending an ICT convention are asked to fill in claims forms for
expenses.
Details from these forms are keyed into a database.
The database is then used to produce an invitation list for the next year’s convention. Describe three reasons why the information in the invitation list might not be correct.
Date posted: July 3, 2018. Answers (1)
- Robots are to be used extensively on a new car assembly line.
Write a report evaluating the impact on quality, and the financial implications of this...(Solved)
Robots are to be used extensively on a new car assembly line.
Write a report evaluating the impact on quality, and the financial implications of this use of ICT.
Date posted: July 3, 2018. Answers (1)
- Describe one benefit and one drawback of a peer-to-peer network.
(Solved)
Describe one benefit and one drawback of a peer-to-peer network.
Date posted: July 3, 2018. Answers (1)