Preview

INVENTORY

Good Essays
Open Document
Open Document
661 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
INVENTORY
Chapter II This chapter is about the related literature of Web Based Inventory in any other Department of the Divine Word College of Laoag. This chapter of this research thesis illustrates literature reviewed before the analysis of the individual research questions outlined in "Chapter One". Since each research question itself presents explanation and exploration of an individual sub area concerning "Organization Development" and its association with IT sector. The main body presents the details of the literature available in thematic form. Finally this chapter presents conclusions telling us where the discussion will proceed and what have we drawn for the literature.

Related Literature - N Tier and 3 Tier

N-tier and 3-tier are architectural deployment styles that describe the separation of functionality into segments in much the same way as the layered style, but with each segment being a tier that can be located on a physically separate computer. They evolved through the component-oriented approach, generally using platform specific methods for communication instead of a message-based approach. N-tier application architecture is characterized by the functional decomposition of applications, service components, and their distributed deployment, providing improved scalability, availability, manageability, and resource utilization. Each tier is completely independent from all other tiers, except for those immediately above and below it. The nth tier only has to know how to handle a request from the n+1th tier, how to forward that request on to the n-1th tier (if there is one), and how to handle the results of the request. Communication between tiers is typically asynchronous in order to support better scalability.
N-tier architectures usually have at least three separate logical parts, each located on a separate physical server. Each part is responsible for specific functionality. When using a layered design approach, a layer is deployed on a tier if

You May Also Find These Documents Helpful

  • Good Essays

    In order to provide speed and reliability, large and enterprise-level networks today are typically constructed in multiple layers. They are the access layer, also called the network edge layer, the aggregation or distribution layer; and the network core layer. The access layer is usually a mesh of network switches, linked to other switches in the aggregation layer, which in turn is linked to the core.…

    • 681 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 4

    • 3225 Words
    • 13 Pages

    The value of layers in the OSI reference model is that it divides networking into a series of tasks, and then illustrates how those tasks relate to each other.…

    • 3225 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    The application Set 3 requires a multi-tier network as the requirements vary a lot from one application to another. Application 1 could be classified in one tier and applications 2 and 3 in one as their requirement is quite similar. Applications 4 and application 5 can be a part of 2 more tiers.…

    • 785 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Bsa/375 Ind Wk3

    • 1284 Words
    • 6 Pages

    Application architecture is the structure of automatic services that bring and perform such functional needs that have the interfaces through which structure apply the functional needs of the organization. For efficient operating, there should be only one structure of application architecture and development design, but in different organizations, different application architectures are employed. There are mostly three views which are used in application architecture, these are as follow:…

    • 1284 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    The 7 layers can be split logically into two subgroups. Layers 7 thru 4 focus on the end to end communication of data source and destinations. Layers 3 thru 1 are provide consistent communication between the network devices. An easier way of looking at the OSI model is dividing the upper layers (7, 6, 5) from the lower layers (4, 3, 2, 1). The upper layers deal with application issues and are implemented only in software. The highest layer, the application layer, is the closest to the end user. The lower layers are responsible for the transportation of the data. The physical layer and the data link layer are implemented in hardware and software. The lowest layer, the physical layer, is closest to the physical network medium (the wires, for example) and is responsible for placing data on the medium.…

    • 1266 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Applications in the enterprise come in different forms, client run apps, client/server apps, and distributed apps.…

    • 431 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    nt1210 lab3

    • 324 Words
    • 2 Pages

    Combines layers 5, 6 and 7: provides network services such as email, file transfers, exchanges of data, support connections between sessions and inner host communications…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 2 Essay

    • 418 Words
    • 2 Pages

    The Application Layer is launched when an application operation starts. It starts the communication with another computer when an application starts. It is in software packages that use client-server software. Examples of services within this layer are DNS, web browser, and NFS.…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    For the recommendations on the tiered architecture I suggest three-tier architecture. This architecture is the most common. It consists of three tiers; a presentation tier, a logic tier, and a data tier…

    • 429 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Cis 210 Research Paper

    • 1323 Words
    • 6 Pages

    Whether you are planning to implement a new site or upgrading an existing site to meet growing needs, the following provides guidelines for meeting the performance and availability demands of today’s online business environment. The mature business site is multi-tiered, with several hardware components,…

    • 1323 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Tier 1 – Fault-tolerant with no impact on the users. If the system goes down, a built in recovery plan gets implemented with no data loss.…

    • 1932 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    IT245 PH3 DB1

    • 310 Words
    • 1 Page

    Layer 4 - The Application layer is the top layer, it closely correlate with the functions of the top three layers of the OSI Model (Session layer, Presentation layer, Application layer). It is responsible for handling high-level protocols, supports network applications and provides for users and other programs an interface and how they interact with the lower layers.…

    • 310 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    ch02 c

    • 2468 Words
    • 11 Pages

    7. The “blueprints” that guide and govern software add-ons, upgrades, hardware, systems, networks, cloud services and other IT are known as IT architectures.…

    • 2468 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    ShortAnswer

    • 544 Words
    • 2 Pages

    Having your application not layered means that you have to deal with all security threats in one place which is very difficult. Having your application distributed to layers makes it much easier for design and implement…

    • 544 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    centralized, and hybrid. Numerous and broad variations of these architectures currently exist. These architectures also are used…

    • 3649 Words
    • 15 Pages
    Powerful Essays