473,803 Members | 3,725 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

What does it mean by "Project Architecture?"

16 New Member
Hi,
Good morning to all.

When I'm attending for interviews, the interviewers are asking this question?

What is the project architecture do you follow in your company?

Can anyone please tell what type of answer i can give to them? means,

Shall I describe about the forms flow structure I've developed in the project?
or
Shall I describe about the different Layers I've used in the project?
or
...

What does this question intended for?

Advanced thanks,

Regards...
Ashok kumar.
Aug 20 '07 #1
2 2654
aaryan
82 New Member
Hi,
Good morning to all.

When I'm attending for interviews, the interviewers are asking this question?

What is the project architecture do you follow in your company?

Can anyone please tell what type of answer i can give to them? means,

Shall I describe about the forms flow structure I've developed in the project?
or
Shall I describe about the different Layers I've used in the project?
or
...

What does this question intended for?

Advanced thanks,

Regards...
Ashok kumar.
may be it means the 3 tier architecture. dataaccess layer, business layer and the presentation layer
Aug 22 '07 #2
bhar
37 New Member
Hi,

In today’s programming world, applications are developed using different types of architectures. Common architectures are:

a. Single Tier Architecture
b. Two Tier Architecture
c. Three Tier Architecture
d. n-Tier Architecture

An application can be divided into three layers. The first layer constitutes the user interface (user services) of an application. This layer is also called as the presentation layer. The next layer is the business services layer which controls the enforcement of business rules on the data. Business rules include all the validations enforced when accepting or retrieving data in an application. For example, a company has decided that the credit limit of a particular client cannot exceed $100000. This rule is implemented using the business services layer of the application. In other words the business services layer performs validations pertaining to business rules. The business services layer also ensures that the back-end does not receive incorrect data. The third layer comprises of the data and the functions for manipulating this data. These three layers form the base of any application. The architectures used to develop applications can be identified on the basis of the implementation of the these three layers.

More on this

Refer the Title:

a. Single-tier Architecture

In the single-tier architecture, all the three layers are handled by a single executable file. Such an application is also referred to as a monolithic application.

b. Two-tier Architecture

The two tier architecture divides an application into the following two components:

Client : Implements the user interface.
Server : Stores data.

Thus, in case of the two-tier architecture, the user and data services are located separately, either on the same machine or on separate machines. For example, an application has a user interface developed using Visual Basic 2005 application on one machine and SQL Server 2005 on another machine or on the same machine. However, the total application has two components one to implement the UI and another to store data. The business services layer is combined with the client or with the server or divided between the client and server

c. Three - tier Architecture

In the case of a three-tier architecture, all the three service layers reside separately, either on the same machine or on different machines. The three layers are user services, business services and the data services. The user interface interacts with the user and accepts data, and passes it to the business services which validates the data and sends it to the data services.

It is to be noted that for any application there are only three logical layers and they are:

1. User Services Layer
2. Business Services Layer
3. Data Services Layer
Aug 22 '07 #3

Sign in to post your reply or Sign up for a free account.

Similar topics

2
1784
by: Scott | last post by:
MySQL calls 4.1.5 a "Gamma" release. What does that mean?
87
5268
by: ziliath | last post by:
I recently tried out the Google "top coder" contest, as a C++ coder. I noticed immediately that they expected me to know STL. To which I say, what the fuck?! I may be missing something, but at what point when learning C++ was I supposed to have picked up STL? I ask because at every job I've had, and every job interview for that matter, whenever STL comes up it's not I, but a manager who says effectively yuck, we don't use that crap.
1
2092
by: Eric Hirst | last post by:
I have a Visual Studio Solution .sln which contains multiple projects, including an ODBC driver .dll and a client .exe. The client .exe is a simple MFC query tool. Nothing I can find in the client references the driver directly. It uses a connection string to access the driver, and does not provide this string until the user has filled in a login dialog. But when I debug the .exe, I see that the ODBC driver .dll is being loaded very...
0
1123
by: M.Sauve | last post by:
Hi In VS 2003 I can't change the "Common Properties\General\Project Folder" property of my ASP project, it is disabled. Is there any work-around? Thank you
2
5073
by: Tom | last post by:
I'm getting this error when I try to pass a structure to a dll. An unhandled exception of type 'System.ArgumentException' occured in Test1.exe Additional Information: Type could not be marshaled because the length of an embedded array instance does not match the declared length in the layout What does it mean?
12
2054
by: spibou | last post by:
Why is a pointer allowed to point to one position past the end of an array but not to one position before the beginning of an array ? Is there any reason why the former is more useful than the later ? Spiros Bousbouras
4
3735
by: chandanlinster | last post by:
hello everybody, as i was going through the "printf" man page, i came across this statement. printf("%*d", width, num); what does "*" mean?
2
13708
by: riceyeh | last post by:
Hi, What does <xsl:if test="not($values)"mean? What I do not understand is $values? Here, means array? And . = $value means current node is equal to the variable value? So the total meaning is "if not exists of value in array of values" ? But the result of '. = $value' is a boolean value, so '$values' should not mean "the value in values". Rice
0
1678
by: howkoss | last post by:
Hi, I've been very frustrated for 2 days trying to make this work. I started with a built-in template "Projects" that came with Access 2007. On the "Employee List" I can click on any cell and bring up the Employee Detail" corresponding to that particular cell. That works fine. I want to be able to open "Employee Detail" when I click on a cell in "Project Detail". I got to the point that "Employee Detail" opens but only to the frst record. PLEASE...
0
9703
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
9566
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
10555
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
10317
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
0
9127
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
7607
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
5503
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
5636
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
2
3802
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.