Define the example client-server implementations, Computer Engineering

Assignment Help:

Define the Example Client-server Implementations

Once you accept the client-server mindset, the process of architecting and developing applications becomes rather easy. Clearly, there is a wall of acceptance between requesting (client) and responding (server) components. This new architecture for applications can be easily achieved by creating application functions and procedures as self- contained components. Each component can only interact with others through this well- defined interface. Self- contained application components are a requirement for client server programming. The client- server application developer must make important architectural choices from the beginning. Choosing the interface between components is a fundamental decision affecting how the two application partners, client and server, interact. I will provide examples using both a procedural interface and a message- based interface for this interaction. In addition, my client- server application protocols will model the interface choices by being flexible and predefined, respectively. Each method, actually any client server interaction, has five main characteristics:

  • The interface between Request/response components
  • The formulation of requests from the client side
  • The transmission of request between components
  • Acceptance and unpacking of request from the client
  • The execution of request at the server side

 

For client and server components to interact, a series of steps must be taken as documented above. First, an interface needs to be defined between requesting and responding components. This interface will vary widely based on the communications technique being implemented. Requests then need to be broken down at the client, communicated to the server, accepted, and executed.

The formulation and acceptance or requests will vary based on implementation. The core transmission and execution requirements will remain relatively similar no matter what interface is chosen between client and server components. Please refer to the following sections for in-depth examples. It is also important to note that for client-server communications to take place in a secure environment, some form of authentication of client must be performed. This authentication will be performed when initial contact is made between the client and server. This contact (or location of services) will be initiated by the client application programmer and authenticated by the server.


Related Discussions:- Define the example client-server implementations

Explain data warehousing, data warehousing Data warehouse means  ...

data warehousing Data warehouse means  Subject oriented Integrated Time variant Non-volatile collection of data for management's decisions. It is h

What are the update types possible, What are the update types possible? ...

What are the update types possible? The following update types are possible: Update type A: The matchcode data is updated asynchronously to database changes. Update

What is uml architecture, Takes care structural and behavioural aspect of a...

Takes care structural and behavioural aspect of a software system. Contains software usage, functionality, performance, economic, reuse, and technology constraints.

Explain file transfer protocol, Explain File Transfer Protocol . FTP is ...

Explain File Transfer Protocol . FTP is utilized to exchange files among computer accounts, to transfer files among an account and a desktop computer (upload) or to access softw

How e-commerce works for the shop owner, E-commerce is working in tandem wi...

E-commerce is working in tandem with the real shop and if all the products are online running the e-commerce shop is becoming simpler. Owner log in on the special admin side of the

How can a parent and child process communicate, How can a parent and child ...

How can a parent and child process communicate? A parent and child can communicate by any of the normal inter-process communication schemes (pipes, sockets, message queues, sha

Multithreaded architecture, Q. Multithreaded Architecture? It is clear ...

Q. Multithreaded Architecture? It is clear at the moment if we provide a lot of contexts to multiple threads then processors with numerous contexts are known as multithreaded s

Define critical mass and critical volume, Q. Define critical mass and criti...

Q. Define critical mass and critical volume? The minimum size in which at least one neutron is available for further fission reaction. The throng of the fissile material at the

Task gantt, The Task Gantt shows the various tasks being performed i.e., so...

The Task Gantt shows the various tasks being performed i.e., some type of activities by the set of processors attached to the parallel computer as shown in Figure . Task Gantt

Memory organization - computer architecture, Memory Organization - Computer...

Memory Organization - Computer architecture: BASIC CONCEPTS: Address space - 16-bit : 216 = 64K mem. locations - 32-bit : 232 = 4G mem. locations -          40-b

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd