Friday, February 21, 2020
Continuation of Design principles 3 Essay Example | Topics and Well Written Essays - 1750 words - 1
Continuation of Design principles 3 - Essay Example The detailed architectural model is used to achieve the level of security in the system, the performance of the system as well as the effectiveness and efficiency (Coulouris, Dooimore, and Kindberg, 2001). There are three (3) forms of the system architecture include: the client based, server based and the client-server architecture. As the proposed system for ââ¬ËElectronic Credit Checking and Mortgage Approvalââ¬â¢ is online, therefore, I have chosen the client server architecture. The client-server architecture for the proposed system that presents the client has to place a request to the web server by utilizing the web browser (Internet Explorer, Google Chrome, etc.). The web browser takes the Hypertext Transfer Protocol (HTTP) request, Files Transfer Protocol (FTP), data, etc. to the web server of the Mortgage Company; the web server would interact with the database server for the relevant information. The database server would send a SQL query to the database and the database returns the information against the query. The database server would reply to the web server with the information received from the database. The web server would display the information on the web browser of the client. The web application would be deployed on the web server or application server; the database server would contain the database as shown in the following diagram (Kambalyal, n.d). The system architecture that has been used for deploying the web application is 3-tier architecture that provides higher flexibility; high security can be implemented at each level of the service, and high performance due to sharing of tasks between servers, moreover, it can be extended (scalable) with the requirements of the Mortgage Company (Kioskea, 2012). The client has to use the web browser to access the web application over the internet, in order to provide security the clientââ¬â¢s request has to be passed through the firewall deployed
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.