Define the example client-server implementations, Computer Engineering

Assignment Help:

Define the Example Client-server Implementations

Once you accept the client-server mindset, the process of architecting and developing applications becomes rather easy. Clearly, there is a wall of acceptance between requesting (client) and responding (server) components. This new architecture for applications can be easily achieved by creating application functions and procedures as self- contained components. Each component can only interact with others through this well- defined interface. Self- contained application components are a requirement for client server programming. The client- server application developer must make important architectural choices from the beginning. Choosing the interface between components is a fundamental decision affecting how the two application partners, client and server, interact. I will provide examples using both a procedural interface and a message- based interface for this interaction. In addition, my client- server application protocols will model the interface choices by being flexible and predefined, respectively. Each method, actually any client server interaction, has five main characteristics:

  • The interface between Request/response components
  • The formulation of requests from the client side
  • The transmission of request between components
  • Acceptance and unpacking of request from the client
  • The execution of request at the server side

 

For client and server components to interact, a series of steps must be taken as documented above. First, an interface needs to be defined between requesting and responding components. This interface will vary widely based on the communications technique being implemented. Requests then need to be broken down at the client, communicated to the server, accepted, and executed.

The formulation and acceptance or requests will vary based on implementation. The core transmission and execution requirements will remain relatively similar no matter what interface is chosen between client and server components. Please refer to the following sections for in-depth examples. It is also important to note that for client-server communications to take place in a secure environment, some form of authentication of client must be performed. This authentication will be performed when initial contact is made between the client and server. This contact (or location of services) will be initiated by the client application programmer and authenticated by the server.


Related Discussions:- Define the example client-server implementations

Define input-output interface, Define Input-Output Interface. I/O inter...

Define Input-Output Interface. I/O interface gives a method for transferring information among internal storage and external I/O devices

What specifies by environment variable in cgi script, The Environment varia...

The Environment variable SCRIPT_NAME in CGI script specifies? In CGI script gives the path of URL after server name.

Explain the fixed logic versus programmable logic, Explain the Fixed Logic ...

Explain the Fixed Logic Versus Programmable Logic? The Logic devices can be classified into two broad categories - fixed and programmable. The same as the name suggests, the ci

Translator for low level programming language, Translator for low level pro...

Translator for low level programming language were called as    Assembler

Explain how sap gui handles output screen for the user, Explain how SAP GUI...

Explain how SAP GUI handles output screen for the user. The SAP front-end s/w can either run on the similar computer or on dissimilar computers given for that purpose.  User t

Algorithm, i need algorithm for padovan string

i need algorithm for padovan string

Universal elimination, Universal Elimination: Here for any sentence, t...

Universal Elimination: Here for any sentence, there is A, containing a universally quantified variable, v, just for any ground term, g, so we can substitute g for v in A. Thus

Find out the number of control lines for 32 to 1 multiplexer, The number of...

The number of control lines for 32 to 1 multiplexer is ? Ans. For 32 (2 5 ) the number of control lines and to select one i/p between them total 5 select lines are needed.

What is the advantage of dividing an email address, What is the advantage o...

What is the advantage of dividing an email address into two parts? The division of an e-mail address in two parts is significant since it achieve two objectives. First, the div

Explain about the public key cryptography, Explain about the Public Key Cry...

Explain about the Public Key Cryptography. Public Key Cryptography: It is a cryptographic system which uses two keys as a public key identified to everyone and a private

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd