Second Chapter Flashcards

(42 cards)

1
Q

Architecture of a System

A

Structure in terms of specified components aimed to be reliable, manageable, adaptable, and cost-effective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Middleware Layers

A

Includes Applications, OS, Middleware, Platform, and Hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Client-Server Model

A

Client requests services, server provides them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Two-Tier Architecture

A

UI and business logic on client, data layer on server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Three-Tier Architecture

A

Adds a middle server for translation, metering, or intelligent services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Null Client

A

Only captures input and forwards it to server, e.g., X-Terminal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Thin Client

A

UI separated from application logic, server handles most computation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Applet Client

A

Applets run on client, some business logic and data stored locally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fat Client

A

Most or all application logic on client, server used mainly for storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Mobile Code

A

Downloaded code executed locally, restricted in a sandbox.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Transaction Monitor

A

Monitors and limits the number of simultaneous client requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Proxy Server

A

Forwards client requests to the appropriate server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Broker

A

Returns address of a server offering a requested service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Trader

A

Selects server based on required service quality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Load Balancer

A

Distributes requests among multiple servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Agent

A

Combines services from different servers for a client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Vertical Distribution

A

Different layers (UI, logic, data) on separate physical machines.

18
Q

Horizontal Distribution

A

Multiple replicas of services for load distribution.

19
Q

Peer-to-Peer Architecture

A

Nodes act as equals, sharing resources directly.

20
Q

Mobile Agent

A

Executable code that moves between systems to perform tasks.

21
Q

Mobile Devices

A

Devices that move across networks, causing dynamic associations.

22
Q

Responsiveness

A

How fast a system responds to user input.

23
Q

Throughput

A

How much work is done in a given time.

24
Q

Load Balancing

A

Distributing computational tasks across multiple nodes.

25
Quality of Service (QoS)
Ensures timely and reliable service, e.g., for video streams.
26
Caching and Replication
Improve performance and availability of data.
27
Dependability
Includes correctness, fault tolerance, and security.
28
Interaction Model
Describes process behavior and message passing.
29
Latency
Time delay between message send and receive.
30
Bandwidth
Amount of data that can be transferred over a network.
31
Jitter
Variation in message delivery time.
32
Clock Drift
Difference in clock time among computers.
33
Synchronous System
Known bounds on processing and message delivery times.
34
Asynchronous System
No assumptions about time or message delivery.
35
Event Ordering
Tracking the order of events in distributed processes.
36
Omission Failure
Missing messages or process crashes.
37
Arbitrary Failure
Unexpected or incorrect behavior.
38
Timing Failure
Response outside expected time.
39
Masking Failure
Hiding or converting failures (e.g., with checksums).
40
Security: Object Protection
Server checks user identity and access rights.
41
Security Threats
Includes message spoofing, tampering, eavesdropping.
42
Cryptography
Uses keys for secure communication and authentication.