Application Architecture
Tasks
Application Architecture of Alternatives
The online stocks exchange software should incorporate adaptability, multi operation ability, and real time issues, which are crucial for the overall purpose of the software system in design. The architectures of the software should be aware of the firm’s expectation pertaining software architecture. Consideration during design must focus on the product and the development process. The suitability of the software should ensure adequate functionality for the tasks it is to perform in the architecture. The architecture specification integrates the functionality of the software into associate components, which meet the requirement of the system (Mather, Kumaraswamy, & Latif 2009 p. 65).
Architecture of this software should ensure it provides the ability to interact with the system. Software must have the ability to block any unauthorized access to private data or material. It must integrate functionality into component to protect a client’s stocks data in his computer (Mather, Kumaraswamy, & Latif 2009 p.65).
Architecture of the computer software must possess the component of the user to easily understand the application, learn it, and use the software. This means that the clients should understand if the software is reliable for his stocks online trading needs, learn the software applications, and the user being able to control the application software. Balancing of quality requirement of the software during the design process is crucial whenever the component needs usage (Kazman 2000 p. 34).
A web-based software application has three primary components. These components include a web browser or the client, web application server, and a database server. All web-based application depends on a database server. There are various types of servers, which a web-based application can rely. Examples include single tier server, two tiers tier servers, or even multi tier servers. A single tier server locates all its services of the web-based application in a single machine. Architecture of this machine is common with a firm comprising around 500 users or less. The server is not geographic, and service control is by administrators.
According to the architecture of the single tier server, the end user or client programs include messenger express, and Outlook. The single tier architecture enables clients to communicate to the stores directly, rather than through other agents or proxies. This server logical architecture requires a sufficient CPU, memory, and adequate storage. By configuring logical names into the service, enables the mapping of DNS to direct the client to the machine. This makes possible effecting future changes accommodate growth. Clients do not require reconfiguring their user application.
A single tier distributed logical architecture is suitable for a firm with departments, which are small, or with a geographical distribution. Every department has its own services such as instant messaging, including a local directory instance (client). These directories are in synchrony with the central master repository.
Alternatives for Application Architecture
- Two-tier Architecture
This architecture consists of a database component and a user (client) component. The user or client’s application is on the desktop of the computer. The server’s primary function is to access the database. Companies prefer using Two Tier when they develop noncritical client application, which has less transaction load. Such application includes departmental application or decision-support systems. One demerit of the two-tier application is the limit in application scalability. Few two-tier applications are able to support users who are more than 100 at the same time.
According to Zeidner (2000), the Two Tier is easy in developing and integration. The two-tier architecture enables the networking of several desktop computers with a server. Management system of a two-tier database runs on a high or medium power server and provides collective access to data. This processing of the data occurs on the user desktop interface side.
- Three-tiers
A three-tier server, business processing and the client are separate. Business processing is in a different application server. The three-tier places the user interface, business processing, and database management in a separate process partitions. An individual tier can have its own software architecture and hardware and performs a specific individual application role.
Like the two-tier, running of the user interface is on low-end, single-user desktop. Mainframes or medium to high power server can host the three-tier servers. Business processing servers due to their fragility environment, and subject to whims of the user, reside in a data center that has control environs.
Selecting service infrastructure such as operating systems, databases, communication system, to enhance sharing of information through many application is a concern to users. However, failure of this system even for a short period has enormous impacts to a firm in unsatisfied clients (Kazman 2000 p. 34).
- Multi-tier Architecture
This system supports the concurrent users as they perform tasks simultaneously. Some of the application under the multi- tier architecture is ATM, which connect to a central server, websites with many users connecting to web servers that connect to a central logic and data server, or insurance firms where its sales staff possesses terminals, which connect to a server (Williams and Lane 2004).
Comparing and contrasting the three alternatives and recommending the best alternative
In two-tier architecture, the application user communicates through the server by using SQL or through a call interface like Microsoft’s Open Database Connectivity (ODBC). Even though a two-tier is less formal, additional tools remotely monitor and manage application and database. An example of such a tool is Lotus (Kazman 2000 p. 34). A three-tier system allows the sharing of resources among the users such as business processing, and database across departments. It also distinguishes business processing and client as two separate entities. A firm has to establish an enterprise with considerable standard for this development system. High application development speeds characterizes a two-tier. The architecture would only work well with a homogenous environment (Kazman 2000 p. 34). The medium and high-power server can comfortably host the three-tier servers. Although both of them (two-tier and three-tier system) have components of presentation, processing, and data, each tier would separate the three components differently. The two-tier architecture further divides the three components into two software entities namely data base server and client application code. The client mainly deals with the aspect of presentation while. Both the server and client handle processing. The server would also conduct crucial task of data storage and uncomplicated access.
A multi-tier architecture would support concurrent users who perform work simultaneously. Applications such as ATMs connect to the central server, websites that connect to the central logic and data server. Such application has the ability to multi-task without breaking down. Three-tier architecture is highly recommendable because it overcomes all boundaries placed by a two-tier. Processing, presentation, and data are separate entities, and belong to different tiers. The three-tier also utilizes remote procedure call (RPC). The tool also provides greater flexibility than the SQL calls (Kazman 2000 p. 34).
A database server provides stocks logic after storing the process. The storing of procedures will offer relevant, competitive advantage to clients as they trade in stocks. Information system components comprise WebSphere, CICS records, IMS, and MQ messages.
Livshin (2003) supports that, in a web software application, the client will have the liberty of handling the stocks exchange logic. This characteristic of the software architecture will control the way users or clients interact with the application software (Kazman 2000 p. 34).
While wireless networking brings benefits around convenience and mobility, it can also introduce risks. Identify and explain any two security concerns associated with introducing wireless networking that Fred should raise with the Information Systems department.
Wireless networking comes without cable but does not evade the essence of risks. Wireless networking is associated with numerous risks that need to be raised to the Information System department in the process of its implementation and adoption. Fred should consider highlighting the following risk elements that might be associated with wireless networking. The first risk is Bandwidth Stealing. This risk is associated with evasion of the wireless networking by outsiders in relation to access or connection point. Outsiders or intruders might connect to wireless access point by hacking into the system hence increase the essence of overloading the network. These intruders have the opportunity to download software, music, games, and other documents thus reducing accessibility of the owner of the wireless network. Fred should raise this risk to the information system department, in order to adopt accurate preventive measures towards limiting the accessibility of the network by the intruders (Kumar 2007, p. 624).
The other risk factor that is associated with wireless networking is the essence of criminal activity (Maple & Yong, 2007, p. 201). Outside intruders might decide to hack into the system to execute malicious purposes. These malicious events and purposes including hacking into other systems and launching of the denial of service attack. These malicious activities might put the owner of the wireless network in problems with relevant authorities. This risk calls for extensive protection of the wireless network from outside intruders in relation to the access point of the networking system.
Identify and explain any two features or standards that wireless networking equipment purchased should support to ensure the best security possible. Explain how these features or standards would help reduce the security concerns you have identified.
Wired Equivalent Privacy (WEP)
This represents a security protocol available for wireless networks within the 802.11b standard. WEP feature is designed in a matter that is essential towards offering sufficient protection/security to the wireless networking. The feature displays similar functional characteristics such as wired network with reference to the need for security and protection to the wireless system. It is necessary for the wireless network to possess this feature to limit the essence of invasion by outside intruders. Studies show that the feature does not offer sufficient security services while in isolate operation. This calls for inclusion of other data encryption mechanisms with the aim of reducing invasion by outsiders. This feature would enhance the level of protection to the wireless networking system if adopted by Fred. All wireless networking systems must possess this feature to reduce the occurrence of criminal activities such as malicious hacking (Maple & Yong 2007, p. 201).
Wi-Fi Protected Access (WPA)
Wi-Fi Protected Access (WPA) is a feature that is designed with the aim of enhancing security functions of the WEP. This feature of the wireless network introduces the application of data encryption by temporal key integrity protocol (TKIP). It also adopts the use of authentication of the user by extensible authentication protocol (EAP). This feature is vital for limitation of the level of access that is available for the outsiders. The elements of criminal activities are also on the decrease since outsiders find it difficult to access the wireless network from the access point. All wireless networking must adopt this feature to enhance the level of protection/security with reference to the access point (Maple & Yong 2007, p. 201).
Explain the importance of network standards to Fred. Suggest one possible standard at each network layer of the Internet model that may be relevant to Fred’s needs. Explain each one briefly.
Every networking must always have its standards to ensure that it can interact with the other networks. Many of the existing technologies have quite a number of standards associated to them (Kozierok, 2005, p.3) Fred should consider creating standards for his newly created a network because it helps in the making the network compatible with the network devices from other users. The standards ensure the compatibility of the networks through making it easy for even the lowest level of communication on the media is possible (Kozierok, 2005, p.3). Consequently, this will make the nodes and the networking devices to interpret easily each other. Through the standards, the users can purchase networking equipments from any vendor thereby removing the restriction of sticking to a particular vendor. The users can receive the repair of their network from any vendor. Absence of the standards always makes the vendors act as sole equipment provider thereby reducing the freedom of the network users (Kozierok, 2005, p.3). The user community has now ventured into the networking field subsequently imposing the need for interoperability. This brought the need for network standards that acted as the option for making the network work along with other networks. Consequently, Fred would enjoy the freedom of repairing his network from any vendor while also interacting with other networks with no problems. Further, he would be able to interchange information reliably within the networking field.
Fred will also need the proposition of the appropriate network standard that he can use at the different network layers. There are only two types of network standards, that is, de facto standards and the De Jure standards. De facto refers to those standards in which the developers did not follow the formal planning. The standards came to the existence as the result of the preceding historical developments. An example of these standards is the SNA. There is a preference for these standards because they are affordable and easy to use. However, De jure standards come into the market after a thorough research in order to satisfy the needs by data communication. They act as the recommended standards since there is a guarantee for their high quality. For the following division of Local Area Networks, I would recommend the following standards.
Layer 1 link:
This represents the hardware of the computer including all the device drivers and user interface. I suppose that Fred should use Token Ring that usually acts as a LAN standard hence suitable for the hardware operations (Kozierok, 2005, p.3).
Layer 2: The network layer
This layer controls the movement of packets inside and out of the network. I would recommend Ethernet because it deals with the networking operation (movement of packets.)
Layer 3: The transport layer
This is the technique applied for two computers that users may need to interchange data with the help of software. I would recommend the use of compression and encryption because these standards deal with software hence making easy the interchange of data.
The application layer
It refers to the various networking protocols that are helpful in supporting such services like FTP, Telnet, BOOT (Kozierok, 2005, p.3). The layer normally deals with the protocols useful in the operation of the internet. I would recommend the use of Ethernet because it is more compatible to FTP and Telnet.
References
Kazman R., Klein M., Clements P.: ATAM: Method for Architecture Evaluation. CMU/SEI-
2000-TR-004, ESC-TR-2000-004, 2000.
Livshin, I. (2003). WebSphere studio application developer 5.0: Practial J2EE devvelopment. Berkeley, Apress.
Mather, T., Kumaraswamy, S., & Latif, S. (2009). Cloud Security and Privacy an Enterprise Perspective on Risks and Compliance. Sebastopol, O’Reilly Media, Inc.
Williams, H. E., & Lane, D. (2004). Web database applications with PHP and MySQL. Sebastopol, O’Reilly.
Zeidner, J. (2000). Specifications for an operational two-tiered classification system for the Army. Alexandria, Va, U.S. Army Research Institute for the Behavioral and Social Sciences.
Kumar, A, & Manjunath, D 2007, ‘A tutorial survey of topics in wireless networking: Part I’, Sadhana, 32, 6, pp. 619-643
Maple, C, Williams, G, & Yong, Y 2007, ‘Reliability, Availability and Security of Wireless Networks in the Community’, Informatica (03505596), 31, 2, p. 201
KOZIEROK, C. M. (2005). The TCP/IP guide: a comprehensive, illustrated Internet protocols reference. San Francisco, No Starch Press.