Visit SCR's data library to review SCR's network configuration and then send Jesse a recommendation for the TIMS system architecture. She wants me to suggest an overall client/server design, number of tiers, and network topology. She also asked me to comment on these issues: legacy data, Web-centricity, scalability, security, and batch processing that might be needed. Jesse said it was OK to make reasonable assumptions in my proposal to her.
What will be an ideal response?
Students should start by viewing the SCR network shown in the Data Library. Based on information in this chapter and previous SCR assignments, students should be able to form an opinion regarding SCR’s TIMS system. Most students will conclude that a client/server architecture should be used, and that a two-tier design probably would support SCR’s needs. With regard to network topology, not enough information is provided to form a definite conclusion. The main objective is to have students understand topology characteristics generally and accurately describe whatever design they propose.
You might also like to view...
Devise a protocol for basic multicast over IP multicast.
What will be an ideal response?
Compared to Excel spreadsheets, Access tables have ________ capacity
Fill in the blank(s) with correct word
When you need a query to return entries based on any of a set of criteria, then you would use the ________ condition.
Fill in the blank(s) with the appropriate word(s).
Match each item with a statement below:
A. a specification for exchanging information between a Web server and an application program B. a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script C. mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks D. environment variable that can be used by a Perl program E. a central Web repository for Perl modules and extensions F. considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API G. a stream cipher designed by Ron Rivest for RSA Data Security H. provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL I. also referred to as the "libwww-perl" collection