Design the communication protocol, Computer Engineering

Design, write, and implement distributed networked application using Java

Design the communication protocol (message format and exchange procedure) that your application will require

• Design a multithreaded, peer-to-peer or client/server, implementation of your application

• Develop your application using Java networking primitives: Java RMI, or Java Web Services

• Create and implement a test plan those documents whether your application fully works

Example applications include (but are certainly not limited to):

• Web Server/Browser - Client/Server implementation (HTTP protocol)

• Shared Whiteboard - Peer-to-Peer implementation (user defined protocol)

• Chat Application - Peer-to-Peer implementation (user defined protocol)

• Distributed Game - Peer-to-Peer or Client/Server implementation (user defined protocol)

You can use flesh or flex ...etc

Chat application and distributed game should be together in the same design  Do not use (Tic Tac Toe) game because it is included in our lecture (any game except tictactoe game).

Posted Date: 3/2/2013 3:11:03 AM | Location : United States







Related Discussions:- Design the communication protocol, Assignment Help, Ask Question on Design the communication protocol, Get Answer, Expert's Help, Design the communication protocol Discussions

Write discussion on Design the communication protocol
Your posts are moderated
Related Questions
B2B - Business to Business  It is a mode of conducting business among two or more companies over the Internet, rather than more traditional modes like as telephone, mail, and f

Write a CGI program that keeps a list of computers that have contacted the server. If comp1 is contacting first time it will display the message: "This is the first contact fr

Write a function that will get a variable number of input arguments: the length and width of a rectangle, and possibly also the height of a box that has this rectangle as its base.

Binary Resolution: However we saw unit resolution for a propositional inference rule in the previous lecture:  (A?  B,   ¬B) /A Thus we can take this a little further to

What is processor time of a program? The periods during which the processor is active is known as processor time of a program it depends on the hardware included in the executi

Rentrag has decided to replace all of the computers currently being used by all of the business and office staff. He has asked you to recommend a set of specification for computers

Q. Illustrate about fourth generation computers? One of the main milestones in IC technology is Very large scale integration (VLSI) where thousands of transistors can be integr

What are different types of Log records? V1 and V2.  V1 must be processed before V2.  But, we can have more than single V2 logs

Disadvantages  1.  The X12 standard is so large and general  2.  EDI communications negotiate a technical agreement to explain exactly what subset of EDI they will use

Q. Define syntax of barrier directive? Barrier Directive  The syntax of barrier directive is  #pragma omp barrier When a thread attains barrier it waits till all threa