Client server architecture - application layer, Computer Networking

Client  Server Architecture

There is an  always  on host  called  server  which  provides  service requests to many other hosts  called  clients. In other words  client program is  running  on one end system  that request and  receives a service from a server program running on another  end  system. The web email file transfer remote login news groups and many other popular applications which  adopt the client  server model. With the client  server  architecture  clients do not  directly communicate with  each other for e g  in the web  application two browsers do not  directly communicate.

Another characteristic of the client  server architecture is  that the  server has a fixed  well know  address  and because the server has a fixed well know address and because the server is always on thus a client  can always contact to the  server by sending  a packet to the server a address. Some  of the better know  application  with a client server architecture include the web file transfer remote login  and e mail. The client  server architecture is shown  in figure.

Since  a client  program  typically runs ones  computer  and the server  program runs on another compute client server internet applications are distributed applications. The client  program and the server program  interact by  sending  each other massage over  the internet. at  this level  of abstraction  the routers links  and other components  of the  internet  that transfer  message between  the distributed  communicating  components of an internet applications.



Posted Date: 3/5/2013 1:22:04 AM | Location : United States

Related Discussions:- Client server architecture - application layer, Assignment Help, Ask Question on Client server architecture - application layer, Get Answer, Expert's Help, Client server architecture - application layer Discussions

Write discussion on Client server architecture - application layer
Your posts are moderated
Related Questions
Security Security  is the  protection of hardware software and data  from  unauthorized access. Restricted physical  access to computer password protection limiting  user priv

Wide Area Network WAN Wide  Area Network  ( WANs) connect larger geographic  areas such as  London the UK or the  world. In this types  of networks  dedicated transoceanic cab

bit stuffing program in python

What are the benefits of Intranet applications The benefits of successful Intranet applications can be enumerated as follows: Cheaper: Use of client browsers with one

This assignment consists of both combinational logic circuit and analog counterpart to perform logical operations based on the given conditions. The first objective of this assignm

What are IP addresses? IP address refers to the name of a computer on a network, like the Internet. An Identifier for a computer or device on a TCP/IP network, like the

What does a Standard IP Access-list use as test criteria Ans) Standard IP access list use only source address.

Time out The  protocols  name Go Back  N is  derived  from the  sender behaviour in the  presence  of lost or  overly  delayed packets. A timer will again  be used  to recover

Which layer is responsible for routing by an internetwork Ans) The Network layer is responsible for routing. This is the primary job of routers, which handle at the Network laye

Q. What are the Tools sued for Cryptography and Web Security? Tools - Cryptography VPN - remote access PGP - email Dedicated Circuits -tunnels' - IPSec