Define the example client-server implementations, Computer Engineering

Assignment Help:

Define the Example Client-server Implementations

Once you accept the client-server mindset, the process of architecting and developing applications becomes rather easy. Clearly, there is a wall of acceptance between requesting (client) and responding (server) components. This new architecture for applications can be easily achieved by creating application functions and procedures as self- contained components. Each component can only interact with others through this well- defined interface. Self- contained application components are a requirement for client server programming. The client- server application developer must make important architectural choices from the beginning. Choosing the interface between components is a fundamental decision affecting how the two application partners, client and server, interact. I will provide examples using both a procedural interface and a message- based interface for this interaction. In addition, my client- server application protocols will model the interface choices by being flexible and predefined, respectively. Each method, actually any client server interaction, has five main characteristics:

  • The interface between Request/response components
  • The formulation of requests from the client side
  • The transmission of request between components
  • Acceptance and unpacking of request from the client
  • The execution of request at the server side

 

For client and server components to interact, a series of steps must be taken as documented above. First, an interface needs to be defined between requesting and responding components. This interface will vary widely based on the communications technique being implemented. Requests then need to be broken down at the client, communicated to the server, accepted, and executed.

The formulation and acceptance or requests will vary based on implementation. The core transmission and execution requirements will remain relatively similar no matter what interface is chosen between client and server components. Please refer to the following sections for in-depth examples. It is also important to note that for client-server communications to take place in a secure environment, some form of authentication of client must be performed. This authentication will be performed when initial contact is made between the client and server. This contact (or location of services) will be initiated by the client application programmer and authenticated by the server.


Related Discussions:- Define the example client-server implementations

Fundamental difference between smart card and e-cash, What is the fundament...

What is the fundamental difference between the transactions made using Smart Card and E-cash? Smart Card and E-Cash: E-cash storable smart cards can dispense and store ca

Write shorts notes on remote procedure call, Write shorts notes on Remote P...

Write shorts notes on Remote Procedure Call (RPC) The facility whihc was created to help the programmers write client server software is termed as Remote Procedure Call. Within

What is the gray equivalent of decimal number 25, What is the Gray equivale...

What is the Gray equivalent of  (25) 10 Ans. Gray equivalent of (25) 10 : The Decimal number 25 has binary equivalent as (00100101) 2 The left most bits (MSB) into gray

Can you define a field without a data element, Can you define a field witho...

Can you define a field without a data element? Yes.  If you require specifying no data element and thus no domain for a field, you can enter data type and field length and a sh

Testmanagers wizard, TestManager has a wizard that you can use to copy or i...

TestManager has a wizard that you can use to copy or import test scripts and other test assets (Datapools) from one to another.

What are sequential algorithms, What are Sequential Algorithms? The cen...

What are Sequential Algorithms? The central assumption of the RAM model is that instructions are implemented one after   another, one operation at a time. Accordingly, algorith

Diffrentiate between non-relocatable & relocatable programs, How non-reloca...

How non-relocatable programs are different from relocatable programs? Non relocatable program: It is one that cannot be made to execute in any type of area of storage other t

Explain rudimentary file formats, Q. Explain rudimentary file formats? ...

Q. Explain rudimentary file formats? FTP only understands two rudimentary file formats. It classifies every file either as a text file or a binary file. A text file comprise a

Explain disk cartridges, Q. Explain Disk Cartridges ? Disk Cartridges:...

Q. Explain Disk Cartridges ? Disk Cartridges: Removable disk cartridges are an option to hard disk units as a form of secondary storage. Cartridge generally comprises one or

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd