SlideShare a Scribd company logo
1 of 2
Download to read offline
The application architeture is design by the application developer and dictates hoow the
application is structured over the various end systems. List four predominant architectural
paradigms used in modern network applications?
Solution
a)
The predominant architectural paradigms are:
1)Client-Server architecture
2)P2P architecture
3)Hybrid arcitecture.
Characteristics:
Client-Server architecture:
1)There is an always-on host, called the "server", whichservices requests from many other
hosts, called "clients".
2)The client-server architecture, clients do not directlycommunicate with each other.
3)Another characteristic of the client-server architecture isthat the server has a fixed, well known
address, called an IPaddress, because the server has a fixed, well-known addressand the server is
always on, then a client canalways contact the server by sending a packet to the server'saddress
4)Application services that are based on the client-serverarchitecture are oftern infrastructure
intensive, since theyrequire the service providers to purchase, install, and maintainserver farms.
5)The popular services in client-server architectures such assearch engines(e.g.,Google), Internet
commerce (e.g.,Amazon ande-bay) and web based e-mail( e.g, Yahoo mail) etc.
P2P architecture:
1)There is minimal(or no) reliance on always-on infrastructureservers. Instead the application
exploits direct communicationbetween pairs of intermittently connected hoasts, calledpeers.
2)The most compelling features of P2P architectures is theirself-scalability.
3)P2P architectures are also cost effective, since theynormally don't require significant server
infrastructure and serverbandwidth.
4)The features of P2P applications are ISP friendly,securityand incentives.
5)Most popular and traffic-intensive applications are based onP2P architectures. It's include file
distribution (e.g.BitTorrent), file sharing(e.g. eMule and Lime Wire) and Internettelephony
(e.g.,Skype).etc.
Hybrid architecture:
The combining both client-server and P2P elements. Forexample, for many instant messaging
applications, servers are usedto track the IP addresses of users, but user-to-user messages aresent
directly between user hosts (without passing throughintermediate servers).

More Related Content

Similar to The application architeture is design by the application developer a.pdf

Cloud computing introduction
Cloud computing introductionCloud computing introduction
Cloud computing introductionLap Doan
 
Part 1 network computing
Part 1 network computingPart 1 network computing
Part 1 network computingLinh Nguyen
 
Code-Camp-Rest-Principles
Code-Camp-Rest-PrinciplesCode-Camp-Rest-Principles
Code-Camp-Rest-PrinciplesKnoldus Inc.
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architectureAdeel Javaid
 
MNAssociationEnterpriseArchitectsCloudFoundryJuly2017
MNAssociationEnterpriseArchitectsCloudFoundryJuly2017MNAssociationEnterpriseArchitectsCloudFoundryJuly2017
MNAssociationEnterpriseArchitectsCloudFoundryJuly2017Andrew Ripka
 
QSS at Cisco Live 2016 Berlin
QSS at Cisco Live 2016 BerlinQSS at Cisco Live 2016 Berlin
QSS at Cisco Live 2016 BerlinQSS
 
Lecture 11 client_server_interaction
Lecture 11 client_server_interactionLecture 11 client_server_interaction
Lecture 11 client_server_interactionSerious_SamSoul
 
Distributed Services Scheduling and Cloud Provisioning
Distributed Services Scheduling and Cloud ProvisioningDistributed Services Scheduling and Cloud Provisioning
Distributed Services Scheduling and Cloud ProvisioningAr Agarwal
 
Chapter 1 & 2 - Introduction-to-Cloud-Computing.pptx
Chapter 1 & 2 - Introduction-to-Cloud-Computing.pptxChapter 1 & 2 - Introduction-to-Cloud-Computing.pptx
Chapter 1 & 2 - Introduction-to-Cloud-Computing.pptxhaileysuszelalem
 
Cloud computing charecteristics and types altanai bisht , 2nd year, part iii
Cloud computing charecteristics and types   altanai bisht , 2nd year,  part iiiCloud computing charecteristics and types   altanai bisht , 2nd year,  part iii
Cloud computing charecteristics and types altanai bisht , 2nd year, part iiiALTANAI BISHT
 
Migrate existing web services and build native microservices in bluemix
Migrate existing web services and build native microservices in bluemixMigrate existing web services and build native microservices in bluemix
Migrate existing web services and build native microservices in bluemixJoel Thimsen
 
Chapter 1 Introduction to Cloud Computing
Chapter 1 Introduction to Cloud ComputingChapter 1 Introduction to Cloud Computing
Chapter 1 Introduction to Cloud Computingnewbie2019
 
ISTIO Deep Dive
ISTIO Deep DiveISTIO Deep Dive
ISTIO Deep DiveYong Feng
 

Similar to The application architeture is design by the application developer a.pdf (20)

Cloud computing introduction
Cloud computing introductionCloud computing introduction
Cloud computing introduction
 
Part 1 network computing
Part 1 network computingPart 1 network computing
Part 1 network computing
 
Code-Camp-Rest-Principles
Code-Camp-Rest-PrinciplesCode-Camp-Rest-Principles
Code-Camp-Rest-Principles
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architecture
 
04 Client Server Computing
04 Client Server Computing04 Client Server Computing
04 Client Server Computing
 
MNAssociationEnterpriseArchitectsCloudFoundryJuly2017
MNAssociationEnterpriseArchitectsCloudFoundryJuly2017MNAssociationEnterpriseArchitectsCloudFoundryJuly2017
MNAssociationEnterpriseArchitectsCloudFoundryJuly2017
 
Cloud computing stack
Cloud computing stackCloud computing stack
Cloud computing stack
 
QSS at Cisco Live 2016 Berlin
QSS at Cisco Live 2016 BerlinQSS at Cisco Live 2016 Berlin
QSS at Cisco Live 2016 Berlin
 
Lecture 11 client_server_interaction
Lecture 11 client_server_interactionLecture 11 client_server_interaction
Lecture 11 client_server_interaction
 
Distributed Services Scheduling and Cloud Provisioning
Distributed Services Scheduling and Cloud ProvisioningDistributed Services Scheduling and Cloud Provisioning
Distributed Services Scheduling and Cloud Provisioning
 
cloud computng
cloud computng cloud computng
cloud computng
 
Scall
ScallScall
Scall
 
Microservices
MicroservicesMicroservices
Microservices
 
Chapter 1 & 2 - Introduction-to-Cloud-Computing.pptx
Chapter 1 & 2 - Introduction-to-Cloud-Computing.pptxChapter 1 & 2 - Introduction-to-Cloud-Computing.pptx
Chapter 1 & 2 - Introduction-to-Cloud-Computing.pptx
 
Cloud computing charecteristics and types altanai bisht , 2nd year, part iii
Cloud computing charecteristics and types   altanai bisht , 2nd year,  part iiiCloud computing charecteristics and types   altanai bisht , 2nd year,  part iii
Cloud computing charecteristics and types altanai bisht , 2nd year, part iii
 
cloud computing
cloud computingcloud computing
cloud computing
 
Migrate existing web services and build native microservices in bluemix
Migrate existing web services and build native microservices in bluemixMigrate existing web services and build native microservices in bluemix
Migrate existing web services and build native microservices in bluemix
 
Chapter 1 Introduction to Cloud Computing
Chapter 1 Introduction to Cloud ComputingChapter 1 Introduction to Cloud Computing
Chapter 1 Introduction to Cloud Computing
 
ISTIO Deep Dive
ISTIO Deep DiveISTIO Deep Dive
ISTIO Deep Dive
 
Client server computing
Client server computingClient server computing
Client server computing
 

More from solimankellymattwe60

What are the products of the secondary metabolism in plants Terpeno.pdf
What are the products of the secondary metabolism in plants  Terpeno.pdfWhat are the products of the secondary metabolism in plants  Terpeno.pdf
What are the products of the secondary metabolism in plants Terpeno.pdfsolimankellymattwe60
 
Which of the following is incorrect about emergent propertiesA. T.pdf
Which of the following is incorrect about emergent propertiesA. T.pdfWhich of the following is incorrect about emergent propertiesA. T.pdf
Which of the following is incorrect about emergent propertiesA. T.pdfsolimankellymattwe60
 
Which sensor i can use it for my robot when i dont want it to fil.pdf
Which sensor i can use it for my robot when i dont want it to fil.pdfWhich sensor i can use it for my robot when i dont want it to fil.pdf
Which sensor i can use it for my robot when i dont want it to fil.pdfsolimankellymattwe60
 
Why might firms consider issuing stock in foreign countries Why mig.pdf
Why might firms consider issuing stock in foreign countries Why mig.pdfWhy might firms consider issuing stock in foreign countries Why mig.pdf
Why might firms consider issuing stock in foreign countries Why mig.pdfsolimankellymattwe60
 
What were the Spanish soldiers who fought in the conquests in the Ne.pdf
What were the Spanish soldiers who fought in the conquests in the Ne.pdfWhat were the Spanish soldiers who fought in the conquests in the Ne.pdf
What were the Spanish soldiers who fought in the conquests in the Ne.pdfsolimankellymattwe60
 
What is forecasting Explain the different techniques of forecasting.pdf
What is forecasting Explain the different techniques of forecasting.pdfWhat is forecasting Explain the different techniques of forecasting.pdf
What is forecasting Explain the different techniques of forecasting.pdfsolimankellymattwe60
 
Ventura Capital is a financier who specializes in capitalizing start.pdf
Ventura Capital is a financier who specializes in capitalizing start.pdfVentura Capital is a financier who specializes in capitalizing start.pdf
Ventura Capital is a financier who specializes in capitalizing start.pdfsolimankellymattwe60
 
True or False1. A basidium is a cell of the Basidiomycota in whic.pdf
True or False1. A basidium is a cell of the Basidiomycota in whic.pdfTrue or False1. A basidium is a cell of the Basidiomycota in whic.pdf
True or False1. A basidium is a cell of the Basidiomycota in whic.pdfsolimankellymattwe60
 
The mitochondrial electron transport system (METS) and the photos.pdf
The mitochondrial electron transport system (METS) and the photos.pdfThe mitochondrial electron transport system (METS) and the photos.pdf
The mitochondrial electron transport system (METS) and the photos.pdfsolimankellymattwe60
 
The disclosure of a contingent liability in the footnotes and on t.pdf
The disclosure of a contingent liability in the footnotes and on t.pdfThe disclosure of a contingent liability in the footnotes and on t.pdf
The disclosure of a contingent liability in the footnotes and on t.pdfsolimankellymattwe60
 
Suppose a company’s ROE is 16. This company’s payout ratio is 40. .pdf
Suppose a company’s ROE is 16. This company’s payout ratio is 40. .pdfSuppose a company’s ROE is 16. This company’s payout ratio is 40. .pdf
Suppose a company’s ROE is 16. This company’s payout ratio is 40. .pdfsolimankellymattwe60
 
Some historians have referred to many of the self-proclaimed “Darwin.pdf
Some historians have referred to many of the self-proclaimed “Darwin.pdfSome historians have referred to many of the self-proclaimed “Darwin.pdf
Some historians have referred to many of the self-proclaimed “Darwin.pdfsolimankellymattwe60
 
Please research Meaningful Use. Prepare a brief report on its origin.pdf
Please research Meaningful Use. Prepare a brief report on its origin.pdfPlease research Meaningful Use. Prepare a brief report on its origin.pdf
Please research Meaningful Use. Prepare a brief report on its origin.pdfsolimankellymattwe60
 
Mention the major difference in the physical phenomena occurring rel.pdf
Mention the major difference in the physical phenomena occurring rel.pdfMention the major difference in the physical phenomena occurring rel.pdf
Mention the major difference in the physical phenomena occurring rel.pdfsolimankellymattwe60
 
My code is not matching up with the results.The output for the cod.pdf
My code is not matching up with the results.The output for the cod.pdfMy code is not matching up with the results.The output for the cod.pdf
My code is not matching up with the results.The output for the cod.pdfsolimankellymattwe60
 
Logical FallociesP1 All college students have pet monkeys.P2 J.pdf
Logical FallociesP1 All college students have pet monkeys.P2 J.pdfLogical FallociesP1 All college students have pet monkeys.P2 J.pdf
Logical FallociesP1 All college students have pet monkeys.P2 J.pdfsolimankellymattwe60
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfsolimankellymattwe60
 
Genmo CorporationOn the night of February 27, 2012, certain recor.pdf
Genmo CorporationOn the night of February 27, 2012, certain recor.pdfGenmo CorporationOn the night of February 27, 2012, certain recor.pdf
Genmo CorporationOn the night of February 27, 2012, certain recor.pdfsolimankellymattwe60
 
In the formula for determining a populations genotype frequencies, .pdf
In the formula for determining a populations genotype frequencies, .pdfIn the formula for determining a populations genotype frequencies, .pdf
In the formula for determining a populations genotype frequencies, .pdfsolimankellymattwe60
 
How is a cell membrane selectively permeable - what permeates and.pdf
How is a cell membrane selectively permeable - what permeates and.pdfHow is a cell membrane selectively permeable - what permeates and.pdf
How is a cell membrane selectively permeable - what permeates and.pdfsolimankellymattwe60
 

More from solimankellymattwe60 (20)

What are the products of the secondary metabolism in plants Terpeno.pdf
What are the products of the secondary metabolism in plants  Terpeno.pdfWhat are the products of the secondary metabolism in plants  Terpeno.pdf
What are the products of the secondary metabolism in plants Terpeno.pdf
 
Which of the following is incorrect about emergent propertiesA. T.pdf
Which of the following is incorrect about emergent propertiesA. T.pdfWhich of the following is incorrect about emergent propertiesA. T.pdf
Which of the following is incorrect about emergent propertiesA. T.pdf
 
Which sensor i can use it for my robot when i dont want it to fil.pdf
Which sensor i can use it for my robot when i dont want it to fil.pdfWhich sensor i can use it for my robot when i dont want it to fil.pdf
Which sensor i can use it for my robot when i dont want it to fil.pdf
 
Why might firms consider issuing stock in foreign countries Why mig.pdf
Why might firms consider issuing stock in foreign countries Why mig.pdfWhy might firms consider issuing stock in foreign countries Why mig.pdf
Why might firms consider issuing stock in foreign countries Why mig.pdf
 
What were the Spanish soldiers who fought in the conquests in the Ne.pdf
What were the Spanish soldiers who fought in the conquests in the Ne.pdfWhat were the Spanish soldiers who fought in the conquests in the Ne.pdf
What were the Spanish soldiers who fought in the conquests in the Ne.pdf
 
What is forecasting Explain the different techniques of forecasting.pdf
What is forecasting Explain the different techniques of forecasting.pdfWhat is forecasting Explain the different techniques of forecasting.pdf
What is forecasting Explain the different techniques of forecasting.pdf
 
Ventura Capital is a financier who specializes in capitalizing start.pdf
Ventura Capital is a financier who specializes in capitalizing start.pdfVentura Capital is a financier who specializes in capitalizing start.pdf
Ventura Capital is a financier who specializes in capitalizing start.pdf
 
True or False1. A basidium is a cell of the Basidiomycota in whic.pdf
True or False1. A basidium is a cell of the Basidiomycota in whic.pdfTrue or False1. A basidium is a cell of the Basidiomycota in whic.pdf
True or False1. A basidium is a cell of the Basidiomycota in whic.pdf
 
The mitochondrial electron transport system (METS) and the photos.pdf
The mitochondrial electron transport system (METS) and the photos.pdfThe mitochondrial electron transport system (METS) and the photos.pdf
The mitochondrial electron transport system (METS) and the photos.pdf
 
The disclosure of a contingent liability in the footnotes and on t.pdf
The disclosure of a contingent liability in the footnotes and on t.pdfThe disclosure of a contingent liability in the footnotes and on t.pdf
The disclosure of a contingent liability in the footnotes and on t.pdf
 
Suppose a company’s ROE is 16. This company’s payout ratio is 40. .pdf
Suppose a company’s ROE is 16. This company’s payout ratio is 40. .pdfSuppose a company’s ROE is 16. This company’s payout ratio is 40. .pdf
Suppose a company’s ROE is 16. This company’s payout ratio is 40. .pdf
 
Some historians have referred to many of the self-proclaimed “Darwin.pdf
Some historians have referred to many of the self-proclaimed “Darwin.pdfSome historians have referred to many of the self-proclaimed “Darwin.pdf
Some historians have referred to many of the self-proclaimed “Darwin.pdf
 
Please research Meaningful Use. Prepare a brief report on its origin.pdf
Please research Meaningful Use. Prepare a brief report on its origin.pdfPlease research Meaningful Use. Prepare a brief report on its origin.pdf
Please research Meaningful Use. Prepare a brief report on its origin.pdf
 
Mention the major difference in the physical phenomena occurring rel.pdf
Mention the major difference in the physical phenomena occurring rel.pdfMention the major difference in the physical phenomena occurring rel.pdf
Mention the major difference in the physical phenomena occurring rel.pdf
 
My code is not matching up with the results.The output for the cod.pdf
My code is not matching up with the results.The output for the cod.pdfMy code is not matching up with the results.The output for the cod.pdf
My code is not matching up with the results.The output for the cod.pdf
 
Logical FallociesP1 All college students have pet monkeys.P2 J.pdf
Logical FallociesP1 All college students have pet monkeys.P2 J.pdfLogical FallociesP1 All college students have pet monkeys.P2 J.pdf
Logical FallociesP1 All college students have pet monkeys.P2 J.pdf
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdf
 
Genmo CorporationOn the night of February 27, 2012, certain recor.pdf
Genmo CorporationOn the night of February 27, 2012, certain recor.pdfGenmo CorporationOn the night of February 27, 2012, certain recor.pdf
Genmo CorporationOn the night of February 27, 2012, certain recor.pdf
 
In the formula for determining a populations genotype frequencies, .pdf
In the formula for determining a populations genotype frequencies, .pdfIn the formula for determining a populations genotype frequencies, .pdf
In the formula for determining a populations genotype frequencies, .pdf
 
How is a cell membrane selectively permeable - what permeates and.pdf
How is a cell membrane selectively permeable - what permeates and.pdfHow is a cell membrane selectively permeable - what permeates and.pdf
How is a cell membrane selectively permeable - what permeates and.pdf
 

Recently uploaded

會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文中 央社
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code ExamplesPeter Brusilovsky
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFVivekanand Anglo Vedic Academy
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint23600690
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project researchCaitlinCummins3
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxCeline George
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhleson0603
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMELOISARIVERA8
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxLimon Prince
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppCeline George
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...Nguyen Thanh Tu Collection
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024Borja Sotomayor
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesPooky Knightsmith
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptxPoojaSen20
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxneillewis46
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 

Recently uploaded (20)

會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 

The application architeture is design by the application developer a.pdf

  • 1. The application architeture is design by the application developer and dictates hoow the application is structured over the various end systems. List four predominant architectural paradigms used in modern network applications? Solution a) The predominant architectural paradigms are: 1)Client-Server architecture 2)P2P architecture 3)Hybrid arcitecture. Characteristics: Client-Server architecture: 1)There is an always-on host, called the "server", whichservices requests from many other hosts, called "clients". 2)The client-server architecture, clients do not directlycommunicate with each other. 3)Another characteristic of the client-server architecture isthat the server has a fixed, well known address, called an IPaddress, because the server has a fixed, well-known addressand the server is always on, then a client canalways contact the server by sending a packet to the server'saddress 4)Application services that are based on the client-serverarchitecture are oftern infrastructure intensive, since theyrequire the service providers to purchase, install, and maintainserver farms. 5)The popular services in client-server architectures such assearch engines(e.g.,Google), Internet commerce (e.g.,Amazon ande-bay) and web based e-mail( e.g, Yahoo mail) etc. P2P architecture: 1)There is minimal(or no) reliance on always-on infrastructureservers. Instead the application exploits direct communicationbetween pairs of intermittently connected hoasts, calledpeers. 2)The most compelling features of P2P architectures is theirself-scalability. 3)P2P architectures are also cost effective, since theynormally don't require significant server infrastructure and serverbandwidth. 4)The features of P2P applications are ISP friendly,securityand incentives. 5)Most popular and traffic-intensive applications are based onP2P architectures. It's include file distribution (e.g.BitTorrent), file sharing(e.g. eMule and Lime Wire) and Internettelephony (e.g.,Skype).etc. Hybrid architecture: The combining both client-server and P2P elements. Forexample, for many instant messaging
  • 2. applications, servers are usedto track the IP addresses of users, but user-to-user messages aresent directly between user hosts (without passing throughintermediate servers).