StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Client-Server Model, Risks to Data Integrity of Distributed Databases - Assignment Example

Cite this document
Summary
From the paper "Client-Server Model, Risks to Data Integrity of Distributed Databases" it is clear that groupware means using shared resources to complete business tasks. Some of the main groupware technologies being used widely include email systems, electronic whiteboards…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.8% of users find it useful
Client-Server Model, Risks to Data Integrity of Distributed Databases
Read Text Preview

Extract of sample "Client-Server Model, Risks to Data Integrity of Distributed Databases"

? ENTERPRISE SYSTEM goes here] [Your goes here] [Due the paper] Answer No a) Client-Server Model The word client-server refers to an accepted model for networking of computer systems that makes use of server and client devices which are designed for their respective purposes. The client-server model is used both in local area networks and on the internet. Some of the main examples of the client-server model include FTP servers and clients, Web servers and Web browsers, and the DNS (Mitchell n.d.). Modern companies make use of LANS, as well as internet for carrying out their business processes. Therefore, client-server systems can definitely help them in making effective use of client-server technology. However, increased dependence on the centralized server is a disadvantage of such models because if the server goes down, the entire network of computers becomes unable to work. b) Thin-Client Model The thin client technology also provides server-based computing facility to companies (Kumar 2007). There is a browser terminal or a central server from which all other computers can access required information, as well as can do required work through sharing. Companies can use either standalone or wireless thin clients to run their business processes. The purpose of the technology is to facilitate businesses through reducing the total cost of ownership and providing easy and efficient usage. The main advantages of using think clients are security, efficient use of resources, and low cost (Kumar 2007). The main disadvantage of this technology is that not is not designed for heavy tasks. Answer No. 2 a) Risks to Data Integrity of Distributed Databases “A distributed database is a database that is split over multiple hardware devices but managed by a central database controller” (Holmes n.d.). A distributed database means division of a database into different physical units separated by business or geographical regions. Some of the main advantages of using distributed databases in business include better control of resources and improved business performances. However, the risks associated with data integrity of distributed databases include accuracy of stored data and the risk of unauthorized access to spoil or alter the stored data. b) Strategies to Overcome Risks The first strategy that can be used to overcome such risks include double checking the database for database integrity, domain integrity, and referential integrity before and after making changes to the data. The second strategy is using authentication of the people trying to log on to the network. Using this feature, only officials are provided with passwords and biometrics that they can use to prove their identity, as well as to make secure use of the distributed network. Authentication is done to make the network safe by stopping and preventing unauthorized attempts to the network. Answer No. 3 Groupware is a term that refers to specialized software applications that help members of a group in sharing and synchronizing business information, as well as in communicating with each other in an effective manner. “Groupware can allow both geographically dispersed team members and a company's on-site workers to collaborate with each other through the use of computer networking technologies” (Pinola, n.d.). Some of the main groupware technologies that are widely used in companies include shared Microsoft Office applications, email systems, video conferencing, electronic whiteboard, and instant messaging through messengers. All of these techniologies help employees in communicating with eah other regardig every business matter. These technologies also increase business efficency, as well as employee productivity. Therefore, the statement that helps in icnreasing on-going coordination between people is true. Answer No. 4 ICT, Information and Communication Technology, refers to every such technology that deals with electronic transfer of information from one point to another (Singleton 2010). The information exchange can take place using any communication medium, such as, emails and personal computers. Both of these technologies fall under the same category because both of these deal with electronic exchange of information but in different ways. “ICT incorporates products that store, receive, manipulate, transmit or retrieve digital information under a single umbrella” (Singleton 2010, p. 1). Five main information and computer technologies include internet, mobile phone, email, television, and skype. All of these technologies help in electronic exchange of information. Internet helps in connecting to each other through networks. Mobile phones help in transferring information to the other person regardless of the difference between places. Moreover, both persons can talk, as well as send messages to each other using cell phones. Email is another ICT technology which helps users in sending business, personal, and professional information to each other regardless of their locations. However, email is less efficient mode of communication as compared to cell phones. Television is another ICT technology which helps in sending one-way information to the audience. Fifth ICT technology is skype chat which helps users communicate and see each other at the same time. Answer No. 5 A distributed computing system is a system in which different software applications are installed in different computer systems or in a central computer system and all computers can access those software applications. A number of security threats usually surround disributed computing networks which need to be dealt effectively in order to make the system safe and secure for its users. Some of the main security threats include denial of service, accidental access, passive tap, active tap, and faking (Wilbur 2000). The security measures that can be taken to overcome these risks or security issues include authentication, WIFI protected access, authorization, and encryption. Authentication, as described earlier, is a way to provide access to networks only to authorized users. WIFI-Protected access is considered one of the most protected ways to access network because of the level of safety that it provides to the users. Authorization basically refers to the idea of access control. It works in the same way as authentication as it confirms the identity of people who try to access the network. It uses file permission technique to allow or prevent access to the network. Encryption is also a good technique which converts the data being sent to the network in an unreadable form. Encryption allows only authorized users to decrypt the data. To manage a distributed computing system, there needs to be a network administrator who should look after all security threats and related measures. Answer No. 6 Web-based or cloud computing is a common term that is used to portray the delivery of hosted service using web service. “It is a technology that uses the internet and central remote servers in order to keep up facts and figures, and applications” (Ghosh 2012, p. 1). It helps industries in reducing the workload and improving efficiency. Unlike traditional business applications, web-based computing washes out the issues of software and hardware failures. In traditional settings, firms usually need to install, customize, and run software applications, whereas with web-based computing, companies get their work done through software applications present on the web. Moreover, they do not need to worry about any technical failure or information misuse. Using web-based computing system, companies experience a substantial amount of workload shift because many of the tasks are performed on web. If we talk about the drawbacks of web-based computing, we can say that loss of control due to increased dependency on web and privacy concerns are the biggest concerns. Answer No. 7 Groupware means using shared reasources to complete business taskss. Some of the main groupware technologies being used widely include email systems, electronic whiteboard, shared Microsoft Office services, video conferencing, and instant messaging through messenger services. All of these services and products help employees complete their work in a collablorative manner. The system administrator provides the information to each employees simultaneously which increases their effecincy level. File sharing is a key feature of groupware which helps exmployees upload files for each other. Yahoo groups is also a key groupware feature which helps users ineract with each other easily using a shared platform. Video conferencing is a technology which helps employees discuss group tasks with each other while viewing each other. Answer No. 8 Denial of service attacks are considered the most destructive attacks on computer networks. To minimize the chance of future accidental or malicious loss-of-service, I would use to stop denial of service attacks include using packet filtering on routers, using SYN cookies, configuring windows firewall, and configuring the web server. Being the Chief Information Officer, I will do packet filtering as the first step because it ensures removal of malicious content from the packets being delivered to the computer systems through networks. Moreover, I will use firewall to protect the computer systems from unauthorized accesses. As Ryan (2011) states, “firewall will prevent unauthorized access to your computer from any external source, and the settings can be varied from low security to high” (p. 1). Firewalls turn off the access requests of unauthorized elements using the log file that consists of all details related to the connections that may or may not be trying to intrude into the computer systems. Apart from ensuring network safety from DoS attacks, I will also take steps to ensure continuity of business functioning. For this, I will create a backup of everything related to storage of data and information in the computer systems. The backup will help me retrieve the information that would have been lost due to IT failure. References Ghosh, M 2012, ‘Cloud Computing Technology’, viewed 16 December 2012, http://ezinearticles.com/?Cloud-Computing-Technology&id=7246958 Holmes, T n.d., ‘What Is a Distributed Database?’, viewed 16 December 2012, http://www.wisegeek.com/what-is-a-distributed-database.htm Kumar, P 2007, ‘Thin Clients’, viewed 16 December 2012, http://ezinearticles.com/?Thin-Clients&id=762583 Mitchell, B n.d., ‘Introduction to Client Server Networks’, viewed 16 December 2012, http://compnetworking.about.com/od/basicnetworkingfaqs/a/client-server.htm Pinola, M n.d., ‘What Is Groupware?’, viewed 16 December 2012, http://mobileoffice.about.com/od/glossary/g/what-is-groupware.htm Ryan, J 2011, ‘Best Internet Security’, viewed 16 December 2012, http://ezinearticles.com/?Best-Internet-Security&id=5899605 Singleton, A 2010, ‘So, What is ICT?’, viewed 16 December 2012, http://ezinearticles.com/?So,-What-is-ICT?&id=4463170 Wilbur, S 2000, ‘Distributed Systems Security’, viewed 16 December 2012, http://www0.cs.ucl.ac.uk/staff/s.wilbur/3c31/z08notes.pdf Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Enterprice system Essay Example | Topics and Well Written Essays - 1500 words”, n.d.)
Enterprice system Essay Example | Topics and Well Written Essays - 1500 words. Retrieved from https://studentshare.org/information-technology/1465375-enterprice-system
(Enterprice System Essay Example | Topics and Well Written Essays - 1500 Words)
Enterprice System Essay Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/1465375-enterprice-system.
“Enterprice System Essay Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/information-technology/1465375-enterprice-system.
  • Cited: 0 times

CHECK THESE SAMPLES OF Client-Server Model, Risks to Data Integrity of Distributed Databases

History in Distributed Databases

The research intended to discuss the history of distributed databases.... nbsp; Basically, the history of distributed databases starts from the need for the management of data for large organizations that operate in different locations.... The paper "History in distributed databases" highlights that One of the most important advantages that organizations attain by implementing distributed databases is that it becomes easier for them to deal with increasing database sizes....
10 Pages (2500 words) Essay

The Infrastructure of Data Management and Data Mining Capabilities

The consultancy report was also designed to look at what current data management processes are in place and how to encourage a move to a more viable infrastructure.... nbsp;… Idyllically, this type of data model is further derived from the more conceptual data model as needs to account for constraints like processing capacity and usage patterns.... data analysis is a common term for data modeling and this activity is actually more in common with the ideas and methods found in synthesis than it does with analysis....
37 Pages (9250 words) Research Paper

Simulation of Server Virtualisation

In the paper “Simulation of Server Virtualisation” the author analyzes the method of splitting a server into different virtual servers.... Virtualization broadly refers to the abstraction of computer resources.... Each virtual server can run on its own as a different operating system....
58 Pages (14500 words) Essay

Web Based Delphi Information System

The property market is growing exponentially so that there are many processes and procedures that are involved in managing the property.... his paper will look at the aspect of the property there are many parameters that should be considered before one engages in online advertising.... hellip; The Internet is complex and also dynamic market platform that requires regular and daily training....
12 Pages (3000 words) Research Paper

Object Role Modeling (ORM)

nbsp; The primary function of information systems is to manage large quantities of structured and unstructured data and structured data that is used for data management system storage are normally identified as relational databases.... This paper will detail in full the topics that comprise the data management spectrum as well as training and end-user tools that are instrumental in ensuring that all employees within a company that is getting ready to implement data management disciplines....
40 Pages (10000 words) Term Paper

Studying at Masters Level and Research Methods

nbsp;… In the shared-nothing design, each node in the cluster holds one segment of the database, as well as to handle all the processing details in relation to data stored in the particular node.... n the shared-nothing design, each node in the cluster holds one segment of the database, as well as to handle all the processing details in relation to data stored in the particular node.... There are issues that databases should meet in order to ensure productivity in the use of a system....
15 Pages (3750 words) Assignment

What Is a Distributed Database

However, the risks associated with the data integrity of distributed databases include the accuracy of stored data and the risk of unauthorized access to spoil or alter the stored data.... Some of the main advantages of using distributed databases in business include better control of resources and improved business performances.... hellip; The client-server model is used both in local area networks and on the internet.... Some of the main examples of the client-server model include FTP servers and clients, Web servers and Web browsers, and the DNS (Mitchell n....
6 Pages (1500 words) Assignment

Distributed Software Control: A Distributed Computer System

This report "distributed Software Control: A distributed Computer System" presents cloud computing as a Remote Procedure Call by offering advantages relating to time and cost.... Remote Procedure Call as powerful distributed software control is client/server/client-based programs.... his paper will examine Remote Procedure Call distributed Computer System, its mechanism, and related systems.... It will provide a background on the distributed computer system and describe its features (characteristics, deployment models, and approaches to Remote Procedure Call)....
8 Pages (2000 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us