Software Engineering (10th Edition)
10th Edition
ISBN: 9780133943030
Author: Ian Sommerville
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 17, Problem 17.5E
Program Plan Intro
Fat client:
It is also called as thick client. It is nothing but a software that implements its own characteristics. It connects to servers but it functions greatly even when disconnected.
Example: Games
Thin client:
It is not like fat client because, here, only the UI is presented on the client system and all other functions are carried out on the server.
Example: Web browser
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Question 4
Suppose that you are to design a g mail like mail system. The incoming mails are scanned for different security checks at different level one after other. Each level has its own functionality and depends on input from previous levels.For designing such system, what is the best possible architecture that can be used for this situation. and why?
Full explain this question text typing work only thanks
You have been asked to design a secure system that requires strong authentication and authorization. The system must be designed so that communications between parts of the system cannot be intercepted and read by an attacker. Suggest the most appropriate clientserver architecture for this system and, giving the reasons for your answer, propose how functionality should be distributed between the client and the server systems.
In a client-server architecture with two tiers, I can't see how a malfunction of catastrophic proportions might occur. How can we solve this problem using a client-server architecture that has several layers?
Chapter 17 Solutions
Software Engineering (10th Edition)
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- A Banking System provides users with several services: (i) to check their accounts to see recent transactions and balances; (ii) to pay bills online; (iii) to buy and sell investments. All of these services require a secure log-in. If the system crashes or the network connection fails during a transaction, it is essential that all the financial data is left in a consistent state. b. Show the architecture of the product that you intend to build. Justify your choice of architecture.arrow_forwardAssume that an organization's authentication system is based on the Kerberos protocol. What is the ramifications of the failure of either the AS (authentication server) or the TGS (ticket granting server) in terms of security and service availability?arrow_forwardWhat is the connection between dependability and availability in a computer network? Due to the aforementioned factors, it is now out of date. Is a thorough consideration required?arrow_forward
- Client/Server software architectural pattern is a widely used pattern. You are required to discuss the applicability of this pattern in the following situations: 3) when security is important.arrow_forwardI don't see how a catastrophic fault might exist in a two-tier client-server design. In a client-server design with several layers, how can we fix this?arrow_forwardDescribe the client-server model in the context of networked systems. How does it facilitate communication between clients and servers, and what are the potential bottlenecks?arrow_forward
- A fatal defect exists in a two-tiered client-server design. Multiple-tiered client-server architecture: the answer to this dilemma?arrow_forwardPropose a network topology for various servers and the assumed location for trusted domains such as the location of your firewalls and Intrusion Detection System (IDS). 2) List down all Security related assumptions about approaches to the design and the trust. 3) Discuss the proposed authentication and authorisation mechanisms to be used. You need to justify your design choices. 4) Propose a mechanism to exchange secure email between users. This needs to consider the key management issue as well.arrow_forwardClient/Server software architectural pattern is a widely used pattern. You are required to discuss the applicability of this pattern in the following situations: 1) when the environment is Continuously changing. 2) when High performance of the application is not important. 3) when security is important. 4) when availability is important.arrow_forward
- A virtual private network (VPN) appliance is used instead of an operating system. How do the similarities and differences stack up when compared and contrasted?arrow_forwardKerberos is an authentication service developed for project Athena.(b) The core of Kerberos is the authentication and ticket granting servers. These are trusted by all users and servers and must be securely administered. Draw and label the overview of Kerberos 4.arrow_forwardTo ensure the security of the system architecture while using active hardware metering in the manner of EPIC, three main strategies are integrated. Generalized speaking, what exactly are these three strategies, and how do they contribute to the overall security of a network?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Systems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage LearningPrinciples of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning