Define the example client-server implementations, Computer Engineering

Assignment Help:

Define the Example Client-server Implementations

Once you accept the client-server mindset, the process of architecting and developing applications becomes rather easy. Clearly, there is a wall of acceptance between requesting (client) and responding (server) components. This new architecture for applications can be easily achieved by creating application functions and procedures as self- contained components. Each component can only interact with others through this well- defined interface. Self- contained application components are a requirement for client server programming. The client- server application developer must make important architectural choices from the beginning. Choosing the interface between components is a fundamental decision affecting how the two application partners, client and server, interact. I will provide examples using both a procedural interface and a message- based interface for this interaction. In addition, my client- server application protocols will model the interface choices by being flexible and predefined, respectively. Each method, actually any client server interaction, has five main characteristics:

  • The interface between Request/response components
  • The formulation of requests from the client side
  • The transmission of request between components
  • Acceptance and unpacking of request from the client
  • The execution of request at the server side

 

For client and server components to interact, a series of steps must be taken as documented above. First, an interface needs to be defined between requesting and responding components. This interface will vary widely based on the communications technique being implemented. Requests then need to be broken down at the client, communicated to the server, accepted, and executed.

The formulation and acceptance or requests will vary based on implementation. The core transmission and execution requirements will remain relatively similar no matter what interface is chosen between client and server components. Please refer to the following sections for in-depth examples. It is also important to note that for client-server communications to take place in a secure environment, some form of authentication of client must be performed. This authentication will be performed when initial contact is made between the client and server. This contact (or location of services) will be initiated by the client application programmer and authenticated by the server.


Related Discussions:- Define the example client-server implementations

What is presentation layer, Q. What is Presentation layer? Presentatio...

Q. What is Presentation layer? Presentation layer: When two hosts are communicating with each other they might use different coding standards and character sets for represent

Difference between the functions unlink and unset?, Unlink() is a function ...

Unlink() is a function for file system handling. It will easily delete the file in context.   Unset() is a function for variable management. It will create a variable undefin

Cluster computing, The concept of clustering is definite as the use of mult...

The concept of clustering is definite as the use of multiple computers, typically PCs or multiple storage devices, UNIX workstations, and their interconnections, to form what appea

Example on sorting using combinational circuit, Q. Example on Sorting using...

Q. Example on Sorting using Combinational Circuit? Example: Think about a unsorted list having element values like given below {3,9,8,5,10,12,14,20,90,95,60,40,23,35,18,0}

Character and string processing instructions, Character and String Processi...

Character and String Processing Instructions: String manipulation usually is done in memory. Possible instructions comprise COMPARE STRING, COMPARE CHARACTER, MOVE STRING and MOVE

Illustrate why does a tea kettle sing, Q. Illustrate why does a tea kettle ...

Q. Illustrate why does a tea kettle sing? Answer:- There is a little attachment with a hole in it which acts as a whistle. It is inserted into the spout of the kettle as w

Discuss the csma/cd and csma/ca protocols, Discuss the CSMA/CD and CSMA/CA ...

Discuss the CSMA/CD and CSMA/CA protocols. CSMA/CD: this is an access method used mainly with LANs configured in a bus topology. Along with CSMA/CD, any station (node) can se

Illustrate working of synchronous counters, Q. Illustrate working of Synchr...

Q. Illustrate working of Synchronous Counters? The main drawback of ripple counter is delay in changing the value. How? To understand this let's take a case when state of rippl

What is cache memory, Q. What is Cache Memory? Cache memory is a very f...

Q. What is Cache Memory? Cache memory is a very fast and small memory between CPU and main memory whose access time is closer to processing speed of CPU. It behaves as a high-s

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd