Define the example client-server implementations, Computer Engineering

Assignment Help:

Define the Example Client-server Implementations

Once you accept the client-server mindset, the process of architecting and developing applications becomes rather easy. Clearly, there is a wall of acceptance between requesting (client) and responding (server) components. This new architecture for applications can be easily achieved by creating application functions and procedures as self- contained components. Each component can only interact with others through this well- defined interface. Self- contained application components are a requirement for client server programming. The client- server application developer must make important architectural choices from the beginning. Choosing the interface between components is a fundamental decision affecting how the two application partners, client and server, interact. I will provide examples using both a procedural interface and a message- based interface for this interaction. In addition, my client- server application protocols will model the interface choices by being flexible and predefined, respectively. Each method, actually any client server interaction, has five main characteristics:

  • The interface between Request/response components
  • The formulation of requests from the client side
  • The transmission of request between components
  • Acceptance and unpacking of request from the client
  • The execution of request at the server side

 

For client and server components to interact, a series of steps must be taken as documented above. First, an interface needs to be defined between requesting and responding components. This interface will vary widely based on the communications technique being implemented. Requests then need to be broken down at the client, communicated to the server, accepted, and executed.

The formulation and acceptance or requests will vary based on implementation. The core transmission and execution requirements will remain relatively similar no matter what interface is chosen between client and server components. Please refer to the following sections for in-depth examples. It is also important to note that for client-server communications to take place in a secure environment, some form of authentication of client must be performed. This authentication will be performed when initial contact is made between the client and server. This contact (or location of services) will be initiated by the client application programmer and authenticated by the server.


Related Discussions:- Define the example client-server implementations

Bubbling the pipeline - computer architecture, Bubbling the Pipeline: B...

Bubbling the Pipeline: Bubbling the pipeline (also known as a pipeline break or pipeline stall) is a technique for preventing, structural, data and branch hazards from taking p

Explain the features of major scheduling algorithms, Explain the Features o...

Explain the Features of Major scheduling algorithms. The Features of Major scheduling algorithms is given below: FCFS - i.e. First come first served scheduli

Calculate register transfer time, Q. Calculate Register Transfer Time? ...

Q. Calculate Register Transfer Time? A clock isn't included explicitly in any statements discussed above. But it is presumed that all transfers take place during clock edge tra

What do you mean by file, Q. What do you mean by File? In computer voca...

Q. What do you mean by File? In computer vocabulary, file is a collection of text or data stored on a storage device, such as a Floppy Disk or Hard Disk. If you a fresher to c

Credit line, The Credit Line The Credit Line is a set of informational f...

The Credit Line The Credit Line is a set of informational facts usually found below or beside a picture of a work of art. Should the picture appear in a book, magazine, poster,

Explain virtual memory, In a memory hierarchy system, data and programs are...

In a memory hierarchy system, data and programs are first stored in secondary or auxiliary memory. Program and its related data are brought in main memory for execution. What if th

Adder substractor, how can we bimpliment half substractor using nand gate

how can we bimpliment half substractor using nand gate

What is laser printers, Q. What is Laser Printers? Laser Printers are p...

Q. What is Laser Printers? Laser Printers are page printers. For print quality they also face same addressability issues as DMP/InkJet Printers. Though some other methods are p

Explain about interrupt procedure, Q. Explain about Interrupt Procedure? ...

Q. Explain about Interrupt Procedure? The interrupt procedure uses request header to conclude the function requested by DOS. It also performs all functions for device driver. T

What is difference between cgi and java, CGI and JAVA are fundamentally dis...

CGI and JAVA are fundamentally dissimilar, and for most applications are NOT interchangable. CGI is a protocol for running programs on a WWW server. Whilst JAVA can also be us

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd