Explain the client-server interaction using messages, Computer Engineering

Assignment Help:

Explain the Client-Server Interaction Using Messages

As we have learned, client- server interaction may be managed in many ways. A message- based interaction is perhaps the best choice for many reasons. It turns out that applications architected specifically for client-server may be optimized with the processing of client server messages and by the facilities used to manage the message. As such, the message-based interaction for client -to-server interaction is becoming a preferred model.

The mechanisms of client-to-server interaction remain relatively similar to the previous example using procedures. Clients make logical request of the server component and expect result returned (either synchronously or asynchronously). Client developers are faced with different method of passing parameters, calling the server, and receiving results. Even with the different semantics, however, creating client-server applications is very straightforward. A message-passing model is employed by many of today's popular driven graphical operating systems. Event loops and action based upon them is the native model for many of these client operating environments. Client- Server interaction should work very similarly. The major difference is that the application components and the message difference is that the application components and the message communication itself may be distributed over the network to a server.


Related Discussions:- Explain the client-server interaction using messages

Why eprom chips are mounted in packages, Why EPROM chips are mounted in pac...

Why EPROM chips are mounted in packages that have transparent window? Since the erasure needs dissipating the charges trapped in the transistors of memory cells. This can be co

What is internet routing hierarchy, Q. What is Internet Routing Hierarchy? ...

Q. What is Internet Routing Hierarchy? So how do packets find their way across Internet? Does every computer connected to Internet know where other computers are? Do packets ba

Multi-threaded processors, Multi-Threaded Processors In unit 2, we have...

Multi-Threaded Processors In unit 2, we have gone through the use of distributed shared memory in parallel computer architecture. Although the use of distributed shared memory

Nix commands, reate a directory "Unix" under your home directory. Command(...

reate a directory "Unix" under your home directory. Command(s): ………………………………………….

What are function modules, What are function modules? Function m...

What are function modules? Function modules are general-purpose library routines that are available system-wide.

How many two-input AND and OR gates are required to realize , How many two-...

How many two-input AND and OR gates are required to realize Y=CD+EF+G ? Ans. Y=CD+EF+G No. of two i/p AND gates=2 No. of two i/p OR gates = 2 One OR gate to OR CD and EF

Advanced microprocessor, Write a program to mask bits D3D2D1D0 and to set ...

Write a program to mask bits D3D2D1D0 and to set bits D5D4 and to invert bits D7D6 of the AX register.

How many flip-flops are required to construct mod 30 counter, How many flip...

How many flip-flops are required to construct mod 30 counter ? Ans. Mod - 30 counter +/- requires 5 Flip-Flop as 30 5 . Mod - N counter counts overall ' N ' number of state

Python implementation of a solver for the desert cro, Python implementation...

Python implementation of a solver for the desert crossing, Python Programming #Minimum 100 words accepted#

Internal conditioning, types of internal conditioning with explanations and...

types of internal conditioning with explanations and examples

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd