Network architecture deals with designing of a network i.e desiging network topology effectively.Where as application architecture deals with the designing of the software used in the network communication,softwares that provides connection of one end user to other.Application desiging are done by the application developers who deals with hiw application are developed.Example of application architecture point to point,client server.Example of network architecture
Layered architecture.
Yes completely agreed.In peer to peer file sharing application there is no centralised server rather all the nodes or computer jn the toplogy share files equally with each other.There is no master computer that has the centralised control over the nodes in the topology.peer to peer networks are inexpensive than client server.In client server there us a central repository known as the server which provides services requested by a client whereas in peer to peer communication there is no such case,here all the computers are treated equally.
The tranport protocol provides the following services-
Process to process delivery-Tcp is used in connection oriented network to establish a socket.UDP is used in connectionless network.
End to end connection-both TCP and UDP are used.
Congestion Control-TCP is used
Flow control-TCP/IP is used for data transmission in the adjacent layers if the protocol suit.
Handshaking is the process where one device send a message to another device for establishing a connection protocol.eg establishing a socket is a 3 way handshaking protocol.
Cookies are short text stored in the user device by the server to keep track of the users activity.
There are two types of cookies
1.session cookies-here the information or rhe cookies are lost when a browser is closed.
2. persistent cookies-here the informations are retained for a specific time .The informations are not lost even if the browser is closed.
Ecommerce uses both session and persistent cookies.the cookies duty is to keep the user logged in as they navigates from one page to another.Ecommerce site uses the combination of both tyoes of cookies to provide us a shoppingcart like experience.
When a user add something to a cart,the session cookies will keep track of those items in the cart.If we return something from the cart then persistent cookie will note it down and the information will be used in future .The next time user vist the page the persistent cookies will retrieve the selections he or she has abondoned from the cart so that he ir she can purchase it.These cookies provide a user or customer a personal retargeting campaign to encourages her to visif ger cart again.These increases sales and the purchase record are stored.
What is the difference between network architecture and application architecture? For a P2P file- sharing application,...
Question 34 A TCP socket contain …………………… that uniquely identifies it on a network TCP ID Port number UDP HTTP ( ) a ( ) b ( ) c ( ) d 2 points Question 35 Mail server port number is usually 8080 80 2525 25 ( ) a ( ) b ( ) c ( ) d 2 points Question 36 TCP Head length indicates ( ) The size of the segment ( ) The capacity of data that...
1. Which of the following protocols is used by a client to send an email message? a. HTTP SMTP b. FTP d. RDP 2. What is the most common network topology today? a/Star c. Hub Ring d. Mesh 3. A client/server network is the simplest network model. a/ True O False 4. Which client server application allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server? A Telnet C. Remote...
In this assignment, you design a simple chat room in the form of a network application which uses the services of a TCP/IP computer network. Your design should have a clientserver architecture in which the server is multi-threaded. Then, you need to implement the server-side of the chat-room application in Java (implementing the client-side is optional). The server maintains a list (an ArrayList will work well) of all the active connections. It will listen on a port for a new...
Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable detail how a company leverages an ERP system and how its operations are improved after installing an ERP system like SAP. Explain how a supply chain management system helps an organization make its operations more efficient What is Upstream and Downstream management of the supply chain? Explain the concept of “Supply Network”, its benefits, and how technology made this concept available Explain the difference...
Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...