You are on page 1of 13

UNIT-I

1. What is Client/Server?

Client : The client hardware is the desktop machine that runs client software. It could be a micro or a
workstation. The client software formulates data request and passes the request to the network software. This
software sends the request to the server, accepts the result from the server and passes the request back to the
client software.

Server: A server is the machine that runs data management software that has been designed for server
functionality. A server has operating system software, data management software and a portion of the network
software

2. Define File server.


File Server : File servers manage a work group’s applications and data files, so that they may be shared by the
group. File servers are very I/O oriented. They pull large amounts of data off their storage subsystems and pass
the data over the network. When the data from the file is requested, a file server transmit all records from the
file.

3. Define the services provided by Web server.


Web server : A web server is a computer system that delivers web pages. Every web server has an IP address
and possibly a domain name. for example an URL:
http://www.niceindia.com/index.html in our browser. This sends a request to the server
whose domain name is niceindia.com. the server fetches the page named index.html and
sends back to our browsers.

4. Define TCP/IP and IPx/SPx.


TCP/IP : Transfer control Protocol and Internet Protocol.

5. What is Remote Procedure Call?


Remote Procedure Call (RPC): One of the earliest facilities that was created to help programmers write
client/server software is known generically as a Remote Procedure Call mechanism. When implementing a
program, the programmer uses procedures to keep the code manageable. Instead of defining a single, large
procedure that performs many tasks, the programmer divides the tasks into sets and uses shorter procedure to
handle each set. A client procedure process calls a function on a remote server and suspends itself until it gets
back the result. This process that issues the calls and waits until it gets the result is called remote procedure call.

6. What are the different categories of client/Server applications?


Classes of client/server applications: Client/Server applications can be categorized by class, based on where
most of the processing is done. Each class requires different hardware and software capabilities on the client, the
server and the network.
1. Host-Based Processing
2. Client-Based Processing
3. Cooperative Processing

7. What is meant by Client, Server & Network?


Client : The client hardware is the desktop machine that runs client software. It could be a micro or a
workstation. The client software formulates data request and passes the request to the network software. This
software sends the request to the server, accepts the result from the server and passes the request back to the
client software.
Server : A server is the machine that runs data management software that has been designed for server
functionality. A server has operating system software, data management software and a portion of the network
software.
Network : The network hardware is the cabling, the communication cards and the devices that link the servers
and the clients.

8. Define Application server.

CSA 2 MARKS MVIT


Application Server : Application server, which provides specific application services to an application.
Application servers are the type of middleware, which occupy a large chunk of computing territory between
database servers and end users.

9. What is meant by HTTP and ODBC?


1. ODBC : Open database connectivity is a windows technology that lets a database client application connect to
a external database. To use ODBC, the database vendor must provide an ODBC driver for data access.
2. HTTP : Hyper Text Transfer Protocol is the underlying protocol used by the world wide web. HTTP defines
how messages are formatted and transmitted and what action web servers and browsers should take in response
to various commands. HTTP only supports transmission of text.

10. Define Group Server.


Groupware Server : A Groupware server is a software designed to enable users to collaborate, regardless of
location through the internet or a corporate intranet and to work
together in a virtual atmosphere.

11. What is Peer-to-Peer communication?


Peer-to-Peer : Most early client/server applications were implemented using low level conversational peer-to-
peer products. The term peer-to-peer indicates that the two sides of a communication link use the same protocol
interface to conduct a networked conversation. Any computer can initiate a conversation with any other
computer. A peer-to-peer network relationship defines one in which computer on the network communicate with
each other as equals. Each computer is responsible for making its own resources available.

12. What are the different categories of client/Server applications?


a) Host-Based Processing
b) Client-Based Processing
c) Coopeartive Processing

13. What is Server & Network?


Server : A server is the machine that runs data management software that has been designed for server
functionality. A server has operating system software, data management software and a portion of the network
software.
Network : The network hardware is the cabling, the communication cards and the devices that link the servers
and the clients
14. What is Database servers ?
Database servers, which provide database storage and data sharing with other computers in the network.
Database servers more and store data records or databases over corporate networks and across the internet.

15. What is FTP Servers ?

FTP servers one of the Oldest Internet services. It makes it possible to move one or more files securely between
computers while providing file security and organization as well as transfer
control.

16. What is Mail Server?


Mail Servers move and store mail over corporate networks( Via LAN’s and WAN’s) and
across the Internet.

17. What is News Servers?


News Servers act as a distribution and delivery source for the thousands of public news groups currently
accessible over the USENET news network.

18. What is ODBC?


Open Database Connectivity is a windows technology that lets a database client application connect to a
external database. To use ODBC, the Database vendor must provide an ODBC driver for data access.

19. What is HTTP?

CSA 2 MARKS MVIT


Hyper Text Transfer Protocol is the underlying protocol used by the world wide web. HTTP defines how
messages are formatted and transmitted and what action web servers and browsers should take in response to
various commands.
20. What is MOM?
Message Oriented Middleware allows general-purpose message to be exchanged in a client/server systems using
message queues. MOM messaging and queuing allow clients and servers to communicate across a network
without being linked by a private, dedicated, logical connection.

21. What is File server ?


File server manage a work groups applications and data files, so that they may be shared by the group. File
servers are very I/O oriented, they pull large amount of data off their storage subsystems and pass the data over
the network. When data from the file is requested, a file server transmit all records of a file and the entire index
to the client.

22. What is Groupware server?

Groupware addresses the management of semi-structured information such as text, image, mail, bulletin boards
and the flow of work. These Client/Server systems have people in direct contact with other people.

23.What is an Object server?

With an object server, the Client/Server application is written as a set of communicating objects. Client object
communicate with server objects using an Object Request Broker (ORB). The client invokes a method on a
remote object. The ORB locates an instance of that object server class, invokes the requested method and returns
the results to the client object. Server objects must provide support for concurrency and sharing. The ORB
brings it all together.

24. What is a Transaction server?

With a transaction server, the client invokes remote procedures that reside on the server with an SQL database
engine. These remote procedures on the server execute a group of SQL statements. The network exchange
consists of a single request/reply message. The SQL statements either all succeed or fail as a unit.

25. What is a Database Server?

With a database server, the client passes SQL requests as messages to the database server. The results of each
SQL command are returned over the network. The server uses its own processing power to find the request data
instead of passing all the records back to the client and then getting it find its own data. The result is a much
more efficient use of distributed processing power. It is also known as SQL engine.

26,What is centralized computing?

All computing is controlled through a central terminal server(s), which centrally provides the processing,
programs and storage. The workstations (ThinClients, PCs, appliances) are just used for input and display
purposes. They connect to the server(s) where all tasks are performed. All server resources are purchased once
and shared by all users. Security issues are far easier to coordinate and centrally nail down.

Traditionally, this type of computing was only found in Enterprise Level Businesses. In more recent time,
reduced server and network costs have seen this type of computing deployed in many smaller and medium sized
businesses.

Centralized Computing takes some of the control and all of the parts easily susceptible to failure away from
the desktop appliance. All computing power, processing, program installations, back-ups and file structures are
done on the Terminal or Application Server.

27.What is distributed computing?

CSA 2 MARKS MVIT


Distributed Computing is a type of computing in which a computational task is divided into subtasks that
execute on a collection of networked computers. The networks are general-purpose networks (LANs, WANs, or
the Internet) as opposed to dedicated cluster interconnects.

Distributed Computing is a method of computer processing in which different parts of a program are run
simultaneously on two or more computers that are communicating with each other over a network. ...

A computer program that runs in a distributed system is called a distributed program, and distributed
programming is the process of writing such programs.

Distributed computing also refers to the use of distributed systems to solve computational problems. A
distributed system consists of multiple autonomous computers that communicate through a computer network.
The computers interact with each other in order to achieve a common goal. In distributed computing, a problem
is divided into many tasks, each of which is solved by one compute

28.What is cooperative processing?

Cooperative processing is computing which requires two or more distinct processors to complete a single
transaction.”

Cooperative processing is related to both distributed and client/server processing. It is a form of distributed
computing where two or more distinct processes are required to complete a single business transaction.

Usually, these programs interact and execute concurrently on different processors. Cooperative processing can also
be considered to be a style of client/server processing if communication between processors is performed through a
message passing architecture.

29. what is distributed processing?

“Distributed processing is the distribution of applications and business logic across multiple processing
platforms.”

Distributed processing implies that processing will occur on more than one processor in order for a transaction to be
completed.

In other words, processing is distributed across two or more machines and the processes are most likely not running
at the same time, i.e. each process performs part of an application in a sequence. Often the data used in a distributed
processing environment is also distributed across platforms.

30.what is heterogeneous computing environment?

Networks are becoming more diverse in the variety of equipment from which the network is
implemented. This equipment includes not only the communication equipment but also the systems which make
up the nodes of the network.

The communication equipment includes local area networks of different transmission media (e.g.,
CSMA/CD and token ring) interconnected by means of bridges, routers, and gateways to form wide area
networks. The nodes may be, for example, mainframes, minicomputers, workstations, and/or personal
computers. Components of the communication equipment and the nodes of the network can be provided by
many different producers(vendors). Such a communication network is referred to as a heterogeneous computing
environment. Nodes connected to such a network become part of this heterogeneous computing environment.

A heterogeneous computing environment as a collection of systems and components from different producers

UNIT-II

1. What are the most typical functional units of the Client/Server applications?

CSA 2 MARKS MVIT


 User interface

 Business Logic and

 Shared data.
2.What are all the Extended services provided by the OS?
 Ubiquitous communications

 Network OS extension

 Binary large objects (BLOBs)

 Global directories and Network yellow pages

 Authentication and Authorization services

 System management

 Network time

 Database and transaction services

 Internet service

 Object- oriented services


3. What are Triggers and Rules?
Triggers are special user defined actions usually in the form of stored procedures, that are automatically invoked
by the server based on data related events. It can perform complex actions and can use the full power of
procedural languages. A rule is a special type of trigger that is used to perform simple checks on data.
4. What is meant by Transparency?
Transparency really means hiding the network and its servers from the users and even the application
programmers.
5. What are TP-Lite and TP-Heavy Monitors?
TP-Lite is simply the integration of TP Monitor functions in the database engines.
TP-Heavy are TP Monitors which supports the Client/Server architecture and allow PC to initiate some very
complex multiserver transaction from the desktop
6.What are the two types of OLTP?
TP lite, based on stored procedures. TP heavy, based on the TP monitors.

7. What is a Web server?

This new model of Client/Server consists of thin, portable, "universal" clients that talk to super fat servers. In
the simplest form, a web server returns documents when clients ask for them by name. The clients and server
communicate using an RPC-like protocol called HTTP.

8. What are Super servers?

These are fully-loaded machines which includes multiprocessors, high-speed disk arrays for intervive I/O and
fault tolerant features.

9. What is a TP Monitor?

CSA 2 MARKS MVIT


There is no commonly accepted definition for a TP monitor. According to Jeri Edwards' a TP Monitor is "an OS
for transaction processing".

10. TP Monitor does mainly two things extremely well. They are Process management and Transaction
management.?

They were originally introduced to run classes of applications that could service hundreds and sometimes
thousands of clients. TP Monitors provide an OS – on top of existing OS – that connects in real time these
thousands of humans with a pool of shared server processes.

1. What is meant by Asymmetrical protocols?

There is a many-to-one relationship between clients and server. Clients always initiate the dialog by requesting a
service. Servers are passively awaiting for requests from clients.

12. What are the types of Transparencies?

The types of transparencies the NOS middleware is expected to provide are:-


Location transparency
Namespace transparency
Logon transparency
Replication transparency
Local/Remote access transparency
Distributed time transparency
Failure transparency and
Administration transparency.

13. What is the difference between trigger and rule?

The triggers are called implicitly by database generated events, while stored procedures are called explicitly by
client applications.

14. What are called Transactions?

The grouped SQL statements are called Transactions (or) A transaction is a collection of actions embused with
ACID properties

15. What are the building blocks of Client/Server?

The client
The server and
Middleware.

16.Explain the building blocks of Client/Server?

The client side building block runs the client side of the application.
The server side building block runs the server side of the application.

17 .The middleware building block runs on both the client and server sides of an application. It is broken
into three categories:-

Transport stack
Network OS
Service-specific middleware.

18. What are all the Base services provided by the OS?

CSA 2 MARKS MVIT


Task preemption
Task priority
Semaphores
Interprocess communications (IPC)
Local/Remote Interprocess communication
Threads
Intertask protection
Multiuser
High performance file system
Efficient memory management and
Dynamically linked Run-time extensions.

19. What are the roles of SQL?

SQL is an interactive query language for ad hoc database queries.


SQL is a database programming language.
SQL is a data definition and data administration language.
SQL is the language of networked database servers
SQL helps protect the data in a multi-user networked environment.
Because of these multifaceted roles it plays, physicists might call SQL as "The grand unified theory of
database".

20. What is Structured Query Langauge (SQL)?

SQL is a powerful set-oriented language which was developed by IBM research for the databases that adhere to
the relational model. It consists of a short list of powerful, yet highly flexible, commands that can be used to
manipulate information collected in tables. Through SQL, we can manipulate and control sets of records at a
time.

21. What are the characteristics of Client/Server?

Service
Shared resources
Asymmetrical protocols
Transparency of location
Mix-and-match
Message based exchanges
Encapsulation of services
Scalability
Integrity
Client/Server computing is the ultimate "Open platform". It gives the freedom to mix-and-match components of
almost any level. Clients and servers are loosely coupled

UNIT-III

1.What is Remote Procedure Call (RPC)?

RPC hides the intricacies of the network by using the ordinary procedure call mechanism familiar to every
programmer. A client process calls a function on a remote server and suspends itself until it gets back the
results. Parameters are passed like in any ordinary procedure. The RPC, like an ordinary procedure, is
synchronous.

The process that issues the call waits until it gets the results.
Under the covers, the RPC run-time software collects values for the parameters, forms a message, and sends it
to the remote server. The server receives the request, unpack the parameters, calls the procedures, and sends the
reply back to the client. It is a telephone-like metaphor.

CSA 2 MARKS MVIT


2. What are the main components of Transaction-based Systems? Resource Manager
Transaction Manager and
Application Program.

3. What are the three types of SQL database server architecture?

Process-per-client Architecture. (Example: Oracle 6, Informix )


Multithreaded Architecture. (Example: Sybase, SQL server)
Hybrid Architecture (Example: Oracle 7)

4. What are the Classification of clients?

Non-GUI clients - Two types are:-


Non-GUI clients that do not need multi-tasking
(Example: Automatic Teller Machines (ATM), Cell phone)
Non-GUI clients that need multi-tasking
(Example: ROBOTs)

5. What are called Non-GUI clients, GUI Clients and OOUI Clients?

Non-GUI Client: These are applications, generate server requests with a minimal amount of human interaction.
GUI Clients: These are applications, where occasional requests to the server result from a human interacting
with a GUI
(Example: Windows 3.x, NT 3.5)
OOUI clients : These are applications, which are highly-iconic, object-oriented user interface that provides
seamless access to information in very visual formats.
(Example: MAC OS, Windows 95, NT 4.0)

6. What is Message Oriented Middleware (MOM)?

MOM allows general purpose messages to be exchanged in a Client/Server system using message queues.
Applications communicate over networks by simply putting messages in the queues and getting messages from
queues. It typically provides a very simple high level APIs to its services. MOM's messaging and queuing allow
clients and servers to communicate across a network without being linked by a private, dedicated, logical
connection. The clients and server can run at different times. It is a post-office like metaphor.

7. What is meant by Middleware?

Middleware is a distributed software needed to support interaction between clients and servers. In short, it is the
software that is in the middle of the Client/Server systems and it acts as a bridge between the clients and servers.
It starts with the API set on the client side that is used to invoke a service and it covers the transmission of the
request over the network and the resulting response. It neither includes the software that provides the actual
service - that is in the servers domain nor the user interface or the application login - that's in clients domain.

8.What are the functions of the typical server program?

It waits for client-initiated requests. Executes many requests at the same time. Takes care of VIP clients first.
Initiates and runs background task activity. Keeps running. Grown bigger and faster.

9.What is meant by Symmetric Multiprocessing (SMP)?

It treats all processors as equal. Any processor can do the work of any other processor. Applications are divided
into threads that can run concurrently on any available processor. Any processor in the pool can run the OS
kernel and execute user-written threads.

10.What are Service-specific middleware?

CSA 2 MARKS MVIT


It is needed to accomplish a particular Client/Server type of services which includes:-
Database specific middleware

ODBC : Open database connectivity is a windows technology that lets a database


client application connect to a external database. To use ODBC, the database vendor must provide an
ODBC driver for data access.

OLTP specific middleware


Groupware specific middleware
Object specific middleware
Internet specific middleware

HTTP : Hyper Text Transfer Protocol is the underlying protocol used by the world wide web. HTTP
defines how messages are formatted and transmitted and what action web servers and browsers should
take in response to various commands. HTTP only supports transmission of text.
System management specific middleware

11.What are General Middleware?

It includes the communication stacks, distributed directories, authentication services, network time, RPC,
Queuing services along with the network OS extensions such as the distributed file and print services.

12. What is meant by Asymmetric Multiprocessing (AMP)?

It imposes hierarchy and a division of labour among processors. Only one designated processor, the master,
controls (in a tightly coupled arrangement) slave processors dedicated to specific functions.

13.What is OLTP?

In the transaction server, the client component usually includes GUI and the server components usually consists
of SQL transactions against a database. These applications are called OLTP (Online Transaction Processing)
OLTP Applications typically,
Receive a fixed set of inputs from remote clients. Perform multiple pre-compiled SQL comments against a local
database. Commit the work and Return a fixed set of results.

14. What is meant by 3-Tier architecture?

In 3-tier Client/Server systems, the application logic (or process) lives in the middle tier and it is separated from
the data and the user interface. In theory, the 3-tier Client/Server systems are more scalable, robust and flexible.
Example: TP monitor, Web.

15. What is meant by 2-Tier architecture?

In 2-tier Client/Server systems, the application logic is either burried inside the user interface on the client or
within the database on the server. Example: File servers and Database servers with stored procedures.

16. What is Load balancing?

If the number of incoming clients requests exceeds the number of processes in a server class, the TP Monitor
may dynamically start new ones and this is called Load balancing.

17. What are called Fat clients and Fat servers?

If the bulk of the application runs on the Client side, then it is Fat clients. It is used for decision support and
personal software. If the bulk of the application runs on the Server side, then it is Fat servers. It tries to
minimize network interchanges by creating more abstract levels of services.

CSA 2 MARKS MVIT


18.What is meant by Horizontal scaling and Vertical scaling?

Horizontal scaling means adding or removing client workstations with only a slight performance impact.
Vertical scaling means migrating to a larger and faster server machine or multiservers.

19. What are the two broad classes of middleware?

General middleware
Service-specific middleware.

20. What are the types of Servers?

File servers
Database servers Transaction servers Groupware servers Object servers Web servers.

21. What is a File server?

File servers are useful for sharing files across a network. With a file server, the client passes requests for file
records over nerwork to file server.

22. What are the five major technologies that can be used to create Client/Server applications?

Database Servers
TP Monitors
Groupware
Distributed Objects
Intranets.

23. List out the benefits obtained by using the Client/Server oriented TP Monitors?

Client/Server applications development framework.


Firewalls of protection.
High availability.
Load balancing.
MOM integration.
Scalability of functions.
Reduced system cost.

24. What are the services provided by the Operating System?

Extended services - These are add-on modular software components that are layered on top of base service.

25. What is ACID property?

ACID is a term coined by Andrew Reuter in 1983, which stands for Atomicity, Consistence, Isolation and
Durability.

26. What are Stored procedures?

A stored procedure ia s named collection of SQL statements and procedural logic that is compiled, verified and
stored in a server database. It is typically treated like any other database object. Stored procedures accept input
parameters so that a single procedure can be used over the network by multiple clients using different input data.
A single remote message triggers the execution of a collection of stored SQL statements. The results is a
reduction of network traffic and better performance.

UNIT-IV

CSA 2 MARKS MVIT


1. What is meant by ORB?

A fundamental part of the Common Object Request Broker architecture is the Object Request Broker (ORB).
The concept of an ORB is this: When an application component wants to use a service provided by another
component, it first must obtain an object reference for the object providing that service. After an object
reference is obtained, the component can call methods on that object, thus accessing the desired services
provided by that object. The primary responsibility of the ORB is to resolve requests for object references,
enabling application components to establish connectivity with each other.

2. What does IIOP stand for and what is its significance?


The Internet Inter-ORB Protocol (IIOP) is a specialization of the GIOP. IIOP is the standard protocol for
communication between ORBs on TCP/IP based networks. An ORB must support IOP (but can support other
additional protocols) in order to be considered CORBA 2.0-compliant.

3.. What is an Object reference?


When an object is passed by reference, the object itself remains "in place" while an object reference for that
object is passed. Operations on the object through the object reference are actually processed by the object itself.

4. What is IDL and why is it useful?


The Interface Definition Language (IDL) is a standard language used to define the interfaces used by CORBA
objects. The IDL specification is responsible for ensuring that data is properly exchanged between dissimilar
languages. For example, the IDL long type s a 32-bit signed integer quantity, which can map to a C++ long
(depending on the platform) or to a Java int. It is the responsibility of the IDL specification--and the IDL
compilers that implement it--to define such data types in a language-independent way.

5. Write short notes on Deployment Descriptor?


Deployment is the process of specifying middleware requirements to the container. The
deployment descriptor class is the base class used both Session Descriptor and Entity Descriptor.

6. Define Language Mapping.


A language mapping is a specification that maps IDL language constructs to the constructs of a particular
programming language. For example, in the C++ language mapping, the IDL interface maps to a C++ class.

7. Define IDL Comments ?


Comments in IDL follow the same conventions as Java and C++. Both C-style and C++- style comments are
allowed, as illustrated in Listing 3.1. (Note that the second comment in the listing contains embedded comment
characters; these are for description purposes only and are not actually allowed by IDL.)
// This is a C++-style comment. Anything following the "//"
// characters, to the end of the line, is treated as part of the
// comment.
/* This is a C-style comment. Anything between the beginning
"/*" characters and the trailing "*/" characters is treated
as part of the comment. */

8. What is Partitioning ?

The grouping together of similar interfaces, constant values, and the like is commonly referred to as
partitioning and is a typical step in the system design process (particularly in more complex systems).
Partitions are also often referred to as modules (which should be no surprise) or as packages (in fact, the IDL
module concept closely resembles the Java package concept—or the other way around, because IDL came first).

9. Define GIOP.
The General Inter-ORB Protocol (GIOP) is a high-level standard protocol for communication between ORBs.
Because GIOP is a generalized protocol, it is not used directly; instead, it is specialized by a particular protocol
that would then be used directly.

10. What is Distributed Computing Environment ?

CSA 2 MARKS MVIT


The Distributed Computing Environment is a set of standard pioneered by the open software foundation (OSF),
includes a standard for RPC. Although the DCE standard has been around for some time, and was probably a
good idea, it has never gained wide acceptance and exists today as little more than an historical curiosity.

11. Why are language mappings a necessary part of CORBA?


Because CORBA object interfaces are specified in IDL, which is independent of any implementation language,
it is necessary to specify a methodology for converting IDL data types to data types of the implementation
language(s) chosen.
The language mapping for a particular implementation language describes this methodology.
Furthermore, language mappings for many common languages are standardized, meaning that an application
written to use one CORBA product can be made to work with a different product with little or no modification.

12. What is Naming Service?


Naming defines how CORBA objects can have friendly symbolic names

UNIT-V
1. What is Java RMI?
Java Remote Method Invocation helps to invoke remote object from remote server.

2. What is Client Stub?


A client stub, which is generated by the IDL compiler, is a small piece of code that makes a particular CORBA
server interface available to a client.

3. What is Server Skeleton?


A server skeleton, also generated by the IDL compiler, is a piece of code that provides the "framework" on
which the server implementation code for a particular interface is built.

4. What is Language mapping?


A language mapping is a specification that maps IDL language constructs to the constructs of a particular
programming language. For example, in the C++ language mapping, the IDL interface maps to a C++ class.

5. Define serialization.
Serialization refers to the encoding of an object’s state into a stream, such as a disk file or network connection.
When an object is serialized, it can be written to such a stream and subsequently read and deserialized, a
process that converts the serialized data containing the object’s state back into
an instance of the object.

6. Define activation policy.


A server activation policy indicates how that particular server is intended to be accessed; for example, if there
is a single server used by all clients, or a new instance of the server should be started for each client, and so on.

7. What is Callback method?


Client callback method, or simply callback, is a generic term given to a method that is implemented by a client
and called by a server. Callbacks essentially make a client

8. Define the capabilities of OMA?


OMA capabilities include event management, licensing, object persistence, naming, security, transactions, user
interface management, data interchange, and much more. The interfaces for using these capabilities are
standardized by the OMG, meaning that their usage is consistent across platforms and products.

9. What is Marshalling and Remoting ?


In computer programming, marshalling is the process of gathering data from one or more applications
or non-contiguous sources in computer storage, putting the data pieces into a message buffer, and organizing or
converting the data into a format that is prescribed for a particular receiver or programming interface.
Marshalling is usually required when passing the output parameters of a program written in one
language as input to a program written in another language. The process of gathering data and transforming it
into a standard format before it is transmitted over a network so that the data can transcend network boundaries.
In order for an object to be moved around a network, it must be converted into a data stream that corresponds

CSA 2 MARKS MVIT


with the packet structure of the network transfer protocol. This conversion is known as data marshalling. Data
pieces are collected in a message buffer before they are marshaled. When the data is transmitted, the receiving
computer converts the marshaled data back into an object.

10. Define Directory Services.


Directory services refers to a set of services that enable objects, which can be servers, businesses, or even
people, to be located by other objects.

11. What is Marshaling and unmarshaling?


Marhsaling refers to the process of translating input parameters to a format that can be transmitted across a
network. Unmarshaling is the reverse of marshaling; this process converts data from the network to output
parameters.

12 Define the term Interface ?


An interface is a collection of functionally related abstract methods, and is identified by a 128-bit globally
unique identifier (GUID) called the interface ID (IID).

CSA 2 MARKS MVIT

You might also like