Client server architecture - application layer, Computer Networking

Client  Server Architecture

There is an  always  on host  called  server  which  provides  service requests to many other hosts  called  clients. In other words  client program is  running  on one end system  that request and  receives a service from a server program running on another  end  system. The web email file transfer remote login news groups and many other popular applications which  adopt the client  server model. With the client  server  architecture  clients do not  directly communicate with  each other for e g  in the web  application two browsers do not  directly communicate.

Another characteristic of the client  server architecture is  that the  server has a fixed  well know  address  and because the server has a fixed well know address and because the server is always on thus a client  can always contact to the  server by sending  a packet to the server a address. Some  of the better know  application  with a client server architecture include the web file transfer remote login  and e mail. The client  server architecture is shown  in figure.

Since  a client  program  typically runs ones  computer  and the server  program runs on another compute client server internet applications are distributed applications. The client  program and the server program  interact by  sending  each other massage over  the internet. at  this level  of abstraction  the routers links  and other components  of the  internet  that transfer  message between  the distributed  communicating  components of an internet applications.

 

 

Posted Date: 3/5/2013 1:22:04 AM | Location : United States







Related Discussions:- Client server architecture - application layer, Assignment Help, Ask Question on Client server architecture - application layer, Get Answer, Expert's Help, Client server architecture - application layer Discussions

Write discussion on Client server architecture - application layer
Your posts are moderated
Related Questions
Q. Which steps are used at receiver end by check sum? The receiver follows these steps: The unit is divided into "k" sections each of "n" bits All sections are


What is Beaconing? The process that permits a network to self-repair networks problems. The stations on the network notify the other stations on the ring when they are not rece

Describe in proper details about OSI Model ? Explain the functions and protocols and services of each layer ?

show cdp is the command to verify if CDP is enabled.

Q. Show the Data Encryption Standard? Data Encryption Standard - Bit-level encryption method designed by IBM - Adopted as standard for nonmilitary and nonclassified us

Plot way forms for the following modulation schemes using Mathlab: a) 2 ASK   4 ASK                       b)  BFSK     4 FSK                             c) BPSK 4

The distance over which data moves within a computer may differ from a few thousandths of an inch, as is the case within a one IC chip, to as much as lot of feet along the backplan

working of belmen ford algorithm

ARP is used to search a devices MAC address given an IP address.