
In the mid-1990s, as applications became more complex and potentially could be deployed to hundreds or thousands of end-users, the client side of this architecture gave rise to two problems:
•A ‘fat’ client, requiring considerable resources on the client’s computer to run effectively (resources include disk space, RAM, and CPU power).
•A significant client side administration overhead.
By 1995, a new variation of the traditional two-tier client-server model appeared to solve these problems called the three-tier client-server architecture. This new architecture proposed three layers, each potentially running on a different platform:
(1)The user interface layer, which runs on the end-user’s computer (the client).
(2)The business logic and data processing layer. This middle tier runs on a server and is often called the application server. One application server is designed to serve multiple clients.
(3)A DBMS, which stores the data required by the middle tier. This tier may run on a separate server called the database server.
The three-tier design has many advantages over the traditional two-tier design, such as:
•A ‘thin’ client, which requires less expensive hardware.
•Simplified application maintenance, as a result of centralizing the business logic for many end-users into a single application server. This eliminates the concerns of software distribution that are problematic in the traditional two-tier client-server architecture.
•Added modularity, which makes it easier to modify or replace one tier without affecting the other tiers.
•Easier load balancing, again as a result of separating the core business logic from the database functions. For example, a Transaction Processing Monitor (TPM) can be used to reduce the number of connections to the database server. (A TPM is a program that controls data transfer between clients and servers in order to provide a consistent environment for Online Transaction Processing (OLTP).)
kevowmuchiri answered the question on July 4, 2018 at 15:28
-
Describe the five components of the DBMS environment and discuss how they relate to each other
(Solved)
Describe the five components of the DBMS environment and discuss how they relate to each other
Date posted:
July 4, 2018
.
Answers (1)
-
Explain how an interactive DVD can be used to train users of an information system
(Solved)
Explain how an interactive DVD can be used to train users of an information system
Date posted:
July 3, 2018
.
Answers (1)
-
Create a function called reverse() that takes two parameters. The first parameter called str, is a pointer to a string that will be reversed upon...
(Solved)
Create a function called reverse() that takes two parameters. The first parameter called str, is a pointer to a string that will be reversed upon return from the function. The second parameter is called count, and it specifies how many characters of str to reverse(). Give count a default value that, when present, tells reverse() to reverse the entire string.(use C++ language)
Date posted:
June 8, 2018
.
Answers (1)
-
Explain the factors determining the methods of data processing
(Solved)
Explain the factors determining the methods of data processing
Date posted:
June 7, 2018
.
Answers (1)
-
What are the disadvantages of computers
(Solved)
What are the disadvantages of computers
Date posted:
June 7, 2018
.
Answers (1)
-
The two primary objectives of Operating System
(Solved)
The two primary objectives of Operating System use
Date posted:
June 6, 2018
.
Answers (1)
-
Explain two roles of a computer driver
(Solved)
Explain two roles of a computer driver.
Date posted:
June 4, 2018
.
Answers (1)
-
List three categories of operating systems
(Solved)
List three categories of operating systems.
Date posted:
May 26, 2018
.
Answers (1)
-
Define the following terms as used in computer programming: (a.) A compiler (b.) A debugger (c.) An algorithm
(Solved)
Define the following terms as used in computer programming: (a.) A compiler (b.) A debugger (c.) An algorithm
Date posted:
May 26, 2018
.
Answers (1)
-
Create a C++ class called stopwatch that emulates a stopwatch that keeps track of elapse time. Use a constructor to initially set the elapse time...
(Solved)
Create a C++ class called stopwatch that emulates a stopwatch that keeps track of elapse time. Use a constructor to initially set the elapse time to 0.Provide two member function called start() and stop() that turns on and off the timer, respectively. Include a member function called show() that displays the elapsed time.Also, have the destructor function automatically display elapsed when stopwatch object is destroyed.
Date posted:
May 5, 2018
.
Answers (1)
-
How does computer technology threaten the privacy of our data?
(Solved)
How does computer technology threaten the privacy of our data?
Date posted:
April 28, 2018
.
Answers (1)
-
1.(i) Define WIMP
(ii) Explain the elements of WIMP (windows, icons, menus, pointer)
(Solved)
1.(i) Define WIMP
(ii) Explain the elements of WIMP (windows, icons, menus, pointer)
Date posted:
April 24, 2018
.
Answers (1)
-
Explain the meaning of information and communication technology (ICT)
(Solved)
Explain the meaning of information and communication technology (ICT).
Date posted:
April 19, 2018
.
Answers (1)
-
Differentiate between a macro and a module as used in computer applications.
(Solved)
Differentiate between a macro and a module as used in computer applications.
Date posted:
April 3, 2018
.
Answers (1)
-
Explain the disadvantages of digitizers in transferring of spatial data to GIS.
(Solved)
Explain the disadvantages of digitizers in transferring of spatial data to GIS.
Date posted:
March 29, 2018
.
Answers (1)
-
(a) Explain the following categories of systems in connection with management decision making, clearly distinguishing between the categories: (i.) Transaction processing systems; ...
(Solved)
(a) Explain the following categories of systems in connection with management decision making, clearly distinguishing between the categories:
(i.) Transaction processing systems;
(ii.) Management Information Systems;
(iii.) Decision Support Systems;
(iv.) Executive Support Systems;
(b) Identify and briefly explain the three fundamental components of an expert system. Explain how an expert system may be used in a business application.
Date posted:
March 28, 2018
.
Answers (1)
-
In data communication, the communication channel is the route along which data is transmitted. The transmission of data can be described by the following four...
(Solved)
In data communication, the communication channel is the route along which data is transmitted. The transmission of data can be described by the following four characteristics:
A. Direction of flow of data.
B. Communication lines.
C. Speed of data transmission.
D. Mode of data transmission.
Required: For each of the following data communication concepts/devices, indicate under which ONE of the above listed characteristics A-D they would best fall: ii. Protocol; iii. Half duplex; iv. Fibre optics; v. Simplex; vi. Analog signal; vii. Micro wave; viii. Band width; ix. Start/stop bit; x. Voice bad.
Explain the term internetworking within the context of data communication. How does a call-back unit and data-encryption equipment enhance security in a computer network?
Date posted:
March 28, 2018
.
Answers (1)
-
Distinguish between adaptive and probabilistic systems
(Solved)
Distinguish between adaptive and probabilistic systems.
Date posted:
March 24, 2018
.
Answers (1)
-
Which is the first web browser invented in 1990?
(Solved)
Which is the first web browser invented in 1990?
Date posted:
February 26, 2018
.
Answers (1)
-
Write a C language program to create file “odd” to store all odd numbers between 1 and n.
(Solved)
Write a C language program to create file “odd” to store all odd numbers between 1 and n.
Date posted:
February 24, 2018
.
Answers (1)