File sharing architecture, Basic Computer Science

File Sharing Architecture:  

The development of microprocessor, PC and LAN transformed dumb terminals into -smart? clients. This brought a complete change in the computing environment. The client workstations or desktops, with there enhanced capabilities were now responsible for the user interface and execution of the application logic.

The server provided access to computing resources like printers and large hard drives for storing the files. It downloaded the file from the shared location on the server to the client machine. The user application that worked on the data was run on the client and the file was written back to the server. The application had to be installed on each workstation that accessed the file.   In this architecture, resources could be added as and when necessary or desired. Thus, it provided a low cost entry point with flexible arrangement.

The drawback was that application logic was executed on the client and server typically provided files to store data.

It worked fine as long as the volume of data transfer was low and shared usage and content update was low. As the number of online users grew, the network traffic got congested and the file sharing got strained.

Taking into account the demerits of the file server architectures,  the client/ server architecture made its advent.   

82_file sharing system.png

Posted Date: 10/23/2012 5:19:56 AM | Location : United States







Related Discussions:- File sharing architecture, Assignment Help, Ask Question on File sharing architecture, Get Answer, Expert's Help, File sharing architecture Discussions

Write discussion on File sharing architecture
Your posts are moderated
Related Questions
QUESTION 1 Describe the binary search algorithm using an example of your own. QUESTION 2 (a) By showing all your workings, give a big-O estimate for f(x) = (x + 1)lo

each of the following functions has the form f(x ) = (ax+b) mod n. assume that each function has type N base n arrow N base n, so that we can think of f as a cipher for an alphabet

AsBased on Chapter Review Problems from the book. 1 #1. What is meant by data independence? Explain your answer. #2. Identify two benefits of separating application software fr

Satellite Transmission: Satellites use microwave frequencies and techniques. Satellites used for message transmission (as opposed to those, which travel around the earth on st

TELECOMMUNICATION PROTOCOLS: The two major components relating to a WAN are the Protocol and the Media. The media are the actual path ways that the protocol travels on. The ne


QUESTION (a) Being just employed as junior forensic examiner at SAI computer forensic Ltd, your supervisor told you, ‘hey Moona Tambi, we have received a hard disk for examinat

Artificial Intelligence Agents In the earlier teach, we discussed what we will be talking about in Artificial Intelligence and why those tasks are important. This lecture is all

Compact Diskette (CD) CD-ROM CD-ROM stands for Compact Disk-Read Only Memory. This disk comes with data already stored in it. It can store around 640 MB of