Skip to main content

Newer Post or latest post

Li-Fi vs Wi-Fi: A Battle of Light and Waves

Li-Fi vs Wi-Fi: A Battle of Light and Waves Li-fi is a light fidelity device that supports only the infrared and other lighting systems to transfer the data to the device which is used to receive from the sender device. Wifi is a wireless fidelity device that supports the radio waves to transfer the data to the wifi device which is used to receive the wifi signals at the limited ranges due to the device version capacity. Introduction to the computer system and computer applications related topics are listed following below here: Li-Fi vs Wi-Fi: A Battle of Light and Waves Let’s discuss the computer system related topic and questions above listed and their answers are following below here: Li-Fi vs Wi-Fi: A Battle of Light and Waves There are some points on the computer system and data communication related to the topic of “Li-Fi vs Wi-Fi: A Battle of Light and Waves” following below here: Lifi based data communication system:- Li-Fi is a light based signal data transmission ...

Why Centralized Web Applications Fall Short: Key Disadvantages Explained

Discuss the disadvantages of web applications based on centralized systems?


Illustration showing the drawbacks of centralized web applications with icons of a server stack, red error symbol, warning sign, padlock, cloud, globe, and downward graphs representing issues like system failure, security risks, and performance decline.


Centralized models based web application provides many types of disadvantages for the client user.


Web applications use centralized models that make high security models to protect the database which can be lost due to any physical damage or logical level attack by cyber criminals or malicious files.


If the user has a long distance to access out of range of the server then it can be slow to access the web application data available to the internet service.


Web applications based on centralized systems have several disadvantages that can impact performance, reliability, and security. One major drawback is the single point of failure—if the central server experiences downtime, crashes, or is attacked, the entire application can become inaccessible to users. This lack of redundancy makes the system vulnerable to outages and disruptions. Additionally, centralized systems often struggle with scalability, as the central server may become overloaded with increasing user demand, leading to slower performance or service delays. Security is another concern, as storing all data in one location can make it an attractive target for cyberattacks, potentially exposing sensitive information. Moreover, users in geographically distant regions may experience latency issues due to their reliance on a single, central server. These limitations make centralized web applications less suitable for highly scalable, resilient, and globally distributed services.


Introduction to the computer system related topic of computer application and the question is below here:


Discuss the disadvantages of web applications based on centralized systems?


Let's discuss the computer system related topic of "Discuss the disadvantages of web application based on centralized system?" explained below here:


Discuss the disadvantages of web applications based on centralized systems?

There are some points on the computer system and the web application software related to the topic of “Discuss the disadvantages of web applications based on centralized systems?” following below here:


  • Services disappear problem through the centralized computing system based web application
  • Centralized system have centralized database model that high security but single database system can be hacked or corrupted data
  • User can create limited user account depends on the capacity of centralized models
  • Centralised system have poor connectivity system for the user to access and increases data latency


Let’s discuss the point on the computer system and the web application software related to the topic of “Discuss the disadvantages of web applications based on centralized systems?” explanation following below here:


Services disappear problem through the centralized computing system based web application


Services disappear because the centralized computing system does not provide the interface before they receive the request from the server of the web application software that provides services because of the long distance or poor connection due to being out of range.


The server does not work due to any reason then the centralised system does not work to provide service and it can be buffering or loading process displays due to not receiving signals from the servers.


The web application shows the errors due to disconnection from the web application server and the user reduces their interest from the web application service to give bad feedback to the web application services.


In a centralized computing system-based web application, the "services disappear" problem refers to the sudden unavailability of services due to dependence on a single central server or data center. When the central server fails because of technical issues, maintenance, cyberattacks, or even power outages, all services connected to it become inaccessible to users. This creates a major reliability issue, especially for critical applications that require constant availability. Unlike decentralized systems, where services can be maintained across multiple nodes, centralized systems lack redundancy, making the entire web application vulnerable to total shutdown. As a result, users may experience interrupted access, loss of productivity, or even data unavailability, highlighting a significant flaw in centralized web application design.


Centralized system have centralized database model that high security but single database system can be hacked or corrupted data


A Centralized system needs a high security layer to provide the protection because there is only one database center that provides the database access to all users through the web application software.


Once a centralized system has been cracked or hacked or attacked by malicious files or viruses then all databases will be lost. It cannot be recovered at all for the client users which is a very big drawback of the centralized system.


So, the company applies a high security feature; only privilege can be access to the centralized database models for their management system for the client users.


A centralized system uses a centralized database model, which is often easier to manage and secure under controlled conditions. Since all data is stored in a single location, administrators can implement strict access controls, monitor usage, and apply security updates more efficiently. However, this setup also creates a critical vulnerability—if the single database is hacked, corrupted, or experiences failure, all the stored data can be compromised or lost at once. This makes the system a high-value target for cybercriminals, and even a small breach can lead to massive data exposure or service disruption. Unlike distributed systems that spread data across multiple nodes, centralized databases lack redundancy and fault tolerance, making them more susceptible to total system failure in the event of a successful attack or hardware malfunction.


User can create limited user account depends on the capacity of centralized models


The Centralized system provides the limited services such as:- a user does not create more accounts on the web application software which gives only limited services to the users.


The centralized system provides limited features that a user account can only handle limited spaces and services that are provided by the web application services providers.


The user cannot store more available storage space that is provided to the user through the web application software.


In a centralized computing model, the ability to create user accounts is often limited by the capacity of the central server and its resources, such as processing power, memory, and storage. Since all user data and activities are managed through a single centralized system, there is a threshold to how many accounts can be effectively supported without affecting performance. As more user accounts are added, the server may become overloaded, leading to slower response times, reduced reliability, and potential system crashes. This limitation can be a significant drawback for growing organizations or applications expecting high user traffic, as scaling up the centralized infrastructure to accommodate more users can be both complex and costly.


Centralised system have poor connectivity system for the user to access and increases data latency


Centralized systems have poor connection between client user and server providing the interface of services to the user on their web application software.


The poor connection can occur due to basic reasons: the server provides service and client user is out of range of connectivity where the slow signals are reaching to the network device through the wireless depending on the request.


The poor connectivity increases the data latency for the data communication between client server and admin server or web application centralised servers.


Centralized systems often suffer from poor connectivity issues, especially when users are geographically distant from the central server, leading to increased data latency. Since all user requests and data exchanges must travel to and from a single central point, the physical distance and network traffic can significantly slow down the response time. This delay becomes more noticeable during peak usage hours or in regions with weak internet infrastructure. Additionally, if the central server experiences high load or technical issues, it further degrades the quality of connectivity for users, resulting in slower access to services and potential interruptions. As a result, centralized systems struggle to provide a smooth and responsive user experience, particularly for global or widely distributed user bases.

Comments

Popular posts from this blog

what are the function of the joystick and light pen?

Q 1. State the functions of a joystick and that of a light pen? Introduction to the joystick device, virtual or soft joystick tool, game controller, virtual or soft game controller and light pen topics are covered below here: Joystick What is the meaning of the joystick in computer? What is the joystick as a peripheral device in the computer system? What is main use of joystick in computer system peripheral devices? What is the purpose of the joystick in computer? What are the types of joysticks in the peripheral system for game purpose? What do you mean by analog joystick in peripheral system? What are the advantages of analog joystick device? What are the disadvantages or drawbacks of analog joystick device? What are the uses of joysticks? What are top 5 uses of joystick device in the computer system peripheral? Where is the use of joystick? How to connect the joystick for game in computer system? Can you connect the joystick to the laptop? Why do n...

Describe the different ways of mobile communication systems for users?

Describe the different ways of mobile communication systems for users? Mobile communication makes it easy to connect with many users through the different types of ways to provide the communication system, share the information to each other and make communication between two or more users through the mobile devices. Such as:- an internet service provides many ways to connect the users in the text, audio, image and video file or data connections sharing the information to each other using these data types to communicate to each other. The user needs to communicate with the other user on the data communication system application software provide the process the data to send the file or message to the user who is connected to the communication application software through their user ID name or email to communicate to share the text or audio file or video file or image file also can be shared into the application software to the user such as:- if the application software provide the chatt...

I am exploring the points on if data centers uses a SAN how it is bigger than SANs?

Is data centers using a SAN and how much are data centers bigger than SANs? The data centers are used to provide the big data analytics for the website and companies to provide the processed data for making different types of informed decisions at a large amount of data processing in the data centers because it is a very big area to install into the building and many buildings if it requires to install into many buildings. The large requirement of data centers installation is necessary because the data centers uses many types of computers, storage devices, network attached storages, network devices such as:- servers, switches, hubs, routers, bridges, repeaters, gateways etc. data cables and different types of network equipment to use in the data centers to make a large area of data processing for the companies uses and major projects for website at larger industrial area for website for data processing. The storage area network is used to provide the high performance of data processing...