ITEC 4020 - L1: Intro and Architectures

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/29

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

30 Terms

1
New cards
Client
Device or software that requests data or services from a server, such as web browsers, mobile apps, or email clients.
2
New cards
Server
Powerful system that responds to client requests, delivering data or performing tasks while handling many users simultaneously.
3
New cards
Network Communication
The medium (usually the Internet) that enables data exchange between clients and servers using request-response patterns.
4
New cards
Two-Tier Architecture
Client communicates directly with a server, commonly used in database systems for data access and manipulation.
5
New cards
Three-Tier Architecture
Client communicates with an application server (business logic) which connects to a database server, improving scalability and maintainability.
6
New cards
MVC (Model-View-Controller)
Architecture pattern that separates data management (Model), business logic (Controller), and user interface (View).
7
New cards
Distributed System
Collection of independent computers that appear as one system, collaborating to accomplish tasks such as web services, emails, or e-commerce.
8
New cards
Peer-to-Peer (P2P)
Architecture where each node acts as both client and server, sharing resources directly (examples: BitTorrent, Napster).
9
New cards
Proxy Server
Intermediary server that caches or load-balances requests to improve performance and reduce server load.
10
New cards
Service-Oriented Architecture (SOA)
Architecture where software is provided as services consumed via a service broker, increasing flexibility and modularity.
11
New cards
Cloud Computing
Delivery of applications and services over the internet, often accessed via thin clients with limited local resources.
12
New cards
Thin Client
Lightweight device with minimal local resources that relies on cloud servers for applications and processing.
13
New cards
Intranet
A private network with enforced security policies, typically protected by firewalls, used within organizations.
14
New cards
Internet
A vast global network of interconnected computers providing services such as WWW, email, file transfer, and multimedia.
15
New cards
IPv4
32-bit addressing scheme (xxx.xxx.xxx.xxx), limited number of unique addresses leading to exhaustion issues.
16
New cards
IPv6
128-bit addressing scheme (xxxx:xxxx:xxxx:xxxx...), providing a vast number of unique addresses for modern devices.
17
New cards
Middleware
Software that hides heterogeneity of underlying systems, enabling communication across different platforms (examples: CORBA, RMI, SOAP).
18
New cards
Distributed Multimedia Systems
Systems that deliver real-time or on-demand digital media streams (examples: Netflix, Zoom, YouTube Live).
19
New cards
Transactional Systems
Systems that handle financial or business transactions across distributed networks while ensuring ACID properties.
20
New cards
Web Services
Software applications that provide functionality over the internet via standardized protocols such as SOAP and XML.
21
New cards
World Wide Web (WWW)
Evolving system for publishing and accessing information over the internet, based on HTML, URLs, and HTTP.
22
New cards
Web Browser
Software application that renders and displays web content for users, such as Chrome, Firefox, or Safari.
23
New cards
Web Server
System that stores, processes, and delivers web pages to clients upon request.
24
New cards
HTML
HyperText Markup Language used to structure and present content on the web.
25
New cards
URL
Uniform Resource Locator used to identify and locate resources on the web, includes scheme, host, path, query, and fragment.
26
New cards
Scalability
The ability of a system to efficiently handle increasing users or resources while avoiding bottlenecks and resource exhaustion.
27
New cards
Failure Handling
Techniques such as redundancy, rollbacks, and retransmission used to ensure system functionality despite failures.
28
New cards
Transparency
System property that hides complexity from users; includes access, location, concurrency, replication, and scaling transparency.
29
New cards
Security
Protection against confidentiality breaches, integrity issues, and denial of service attacks.
30
New cards
ACID Properties
Atomicity, Consistency, Isolation, Durability – guarantees for transactional systems to ensure reliable operations.