Design the communication protocol, Computer Engineering

Design, write, and implement distributed networked application using Java

Design the communication protocol (message format and exchange procedure) that your application will require

• Design a multithreaded, peer-to-peer or client/server, implementation of your application

• Develop your application using Java networking primitives: Java RMI, or Java Web Services

• Create and implement a test plan those documents whether your application fully works

Example applications include (but are certainly not limited to):

• Web Server/Browser - Client/Server implementation (HTTP protocol)

• Shared Whiteboard - Peer-to-Peer implementation (user defined protocol)

• Chat Application - Peer-to-Peer implementation (user defined protocol)

• Distributed Game - Peer-to-Peer or Client/Server implementation (user defined protocol)

You can use flesh or flex ...etc

Chat application and distributed game should be together in the same design  Do not use (Tic Tac Toe) game because it is included in our lecture (any game except tictactoe game).

Posted Date: 3/2/2013 3:11:03 AM | Location : United States







Related Discussions:- Design the communication protocol, Assignment Help, Ask Question on Design the communication protocol, Get Answer, Expert's Help, Design the communication protocol Discussions

Write discussion on Design the communication protocol
Your posts are moderated
Related Questions
What are the different storage classes in C?  Storage classes in C  There are four storage classes in C:  a. Automatic storage class:  b. Register storage class:  c

Give an account of the issue pertaining to compilation of if statement in C language Control structures as if cause significant gap in between the PL domain and the execution d

IDA* Search - artificial intelligence: A* search is a sophisticated and successful search strategy. In fact, a problem with A* search is that it must keep all states in its me

1- The Privacy Policy: The vendor must explain to the customer how all his information especially sensitive ones will be totally private, and no one can read them or use them i

Two computers using TDM take up turns to send 100-bytes packet over a shared channel that operates at 64000 bits per second. The hardware takes 100 microseconds after one computer

How can we decrement and increment  operations We  can  implement decrement  and increment  operations  by  using  a  combinational circuit  or  binary  down/up counters.  In

Explain Advantages and Disadvantages of Static Document. The chief advantages of a static document are reliability, performance and simplicity. A browser can display a static d

Array Processing We have seen that for performing vector operations, the pipelining concept has been taken. There is another method for vector operations. If we have an array o

Hi I need a help in this question : A telephone switchboard handles ? calls on average during a rush hour, and the switchboard can at most make k connections per minute. Write a

Classification of interrupts:   1. a) asynchronous   external components or hardware malfunction 1.b)synchronous   function of program state (for example over