Structure of client server systems, Database Management System

Assignment Help:

Structure of Client Server Systems:In client/server architecture, clients show users who require services while servers give services. Both client and server are a combination of hardware & software. Servers are divided logical objects that communicate with clients over a network to do tasks together. A client makes a request for a service & receives a reply to that request. A server gets & processes a request, and sends back the needed response. The client/server systems may have two different types of architecture -

2-Tier and 3-Tier Client/Server Architectures

Each client/server application contains three functional units:

  • Presentation logic which gives the human/machine interaction (the user interface). The presentation layer operates input from the mouse, keyboard or other input devices and gives output in the form of screen displays. For instance, the ATM machine of a bank gives such interfaces.
  • Business logic is the functionality given to an application program. For instance, software that enables a customer to ask for to operate his/her balance on his/her account with the bank is business logic. It contains rules for withdrawal, for minimum balance etc. It is often known as business logic because it includes the business rules that drive a given enterprise.
  • The bottom layer gives the generalized services required by the other layers including file services, communications services, print services and database services. One example of such a service may be to give the records of customer accounts.

These functional units can reside on either the client or on one or more servers in the application:

                         599_Structure of Client Server Systems.png

 

                                                                     Figure: A client-server system

 


Related Discussions:- Structure of client server systems

What is rigorous two phase locking protocol, Differentiate strict two phase...

Differentiate strict two phase locking protocol and rigorous two phase locking protocol. In strict two phase locking protocol all exclusive mode locks taken by a transaction is

Security and integrity, Security And Integrity After Reading the concep...

Security And Integrity After Reading the concepts of database recovery in the last section, let us now deal with a vital concept that helps in minimizing consistency errors in

Cluster analysis project, (a) Data Mining Process : In the context of t...

(a) Data Mining Process : In the context of this cluster analysis project , and in your own words , explain how you would execute the first stage of data mining, namely the "P

What is repository?, Problem 1 Why are the operational system keys not ...

Problem 1 Why are the operational system keys not recommended for forming data warehouse primary keys? Give any two examples 2 Explain the following performance tuning techn

What are the problems in database normalization, What are the problems if o...

What are the problems if one were not to normalize?  When do these problems surface?           Ans:  Database normalization, sometimes considered to as  canonical synthesis, is

How to create a table from existing table, How to create a table from exist...

How to create a table from existing table? Create table as e.g, To create a new table ‘N_emp' with employee names and their identification numbers only from employee ta

Describe object relational model, Describe Object Relational model ? O...

Describe Object Relational model ? Object Relational Model - This model combines the characteristics of both relational model and object oriented model. It extends the tradit

DSS, WHAT IS DSS? WRITE ITS REQUIREMENTS.

WHAT IS DSS? WRITE ITS REQUIREMENTS.

What are the responsibility of file manager, What are the responsibility of...

What are the responsibility of File manager? File Manager : Manager allocation of space on disk storage and the data structures used to represent within stored on disk. It is a

Describe analysis of access paths, Describe analysis of access paths To...

Describe analysis of access paths To describe analysis of access paths, consider an example of the design of a company's employee skills database. A part of the object model fr

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd