Ajax, Computer Networking

Assignment Help:

Ajax is a relatively new set of techniques that, in a sense, implement some of the functionalities originally provided by RPC. Ajax is primarily used to build web applications with good performance and interactive responsiveness. The name comes from "Asynchronous JavaScript and XML" (though the general technique doesn't necessarily need to use JavaScript or XML).

The idea is to use JavaScript (or the equivalent) to run a web application in your browser, and do as much as possible on your computer, minimizing data exchanges over the network. Typically, Ajax applications are designed so that most data exchanges can be asynchronous and in the background. This means that you will be able to keep doing useful work with the application even on a relatively slow network connection.

Ajax resembles RPC because most of the processing can be done "remotely" on the client, instead of on the server. A good example of this technology is Google Maps. One reason why Google Maps works so well is because it explicitly uses the fact that most users own a fairly fast computer, and thus lots of the actual processing can be done locally. The user just needs to fetch asynchronously each piece (tile) of the map, and, when these are received, he or she can process them locally. If, on the other hand, we were to send every mouse movement to Google, and expect all processing to be performed remotely, we would end up with a very slow and impractical system. Notice that because Ajax is asynchronous, it scales very well with slow connections. Ajax does not block waiting for pieces of data to arrive beforemaking the systemusable. Instead (in the case of Google Maps), we notice that the user is allowed to manipulate the map (panning around, zooming in, etc) even when the map itself has not yet been completely received.


Related Discussions:- Ajax

Leased satellite channel, LEASED SATELLITE CHANNEL: It may span arbitr...

LEASED SATELLITE CHANNEL: It may span arbitrarily big distance. It is given in the figure below.   Figure Satellite connections are low bandwidth to protect cost

virtual private network - virtual private network vpns, Virtual private ne...

Virtual private network The virtual  private  networks takes the  user data  encrypts them and sends them  to their  destination over  the internet. the sender  and the receiv

Redhat, short note on redhat updation details? why redhat is popular?

short note on redhat updation details? why redhat is popular?

Cable connection, - EIA/ TIA specifies and RJ-45 connector for unshielded t...

- EIA/ TIA specifies and RJ-45 connector for unshielded twisted-pair (UTP) cable. The letter RJ stand for registered jack and the number 45 refers to a specific wiring sequence.

What is aspects of security, Q. What is Aspects of Security? - Securit...

Q. What is Aspects of Security? - Security Attack: Any action whichcompromises the security of information owned by an organization. - Security Mechanism: A mechanism th

Show the security policy as well integrated security, Q. Show the Security ...

Q. Show the Security Policy as well Integrated Security ? Security policy is on paper statement describing what assets are to be protected and why who is responsible and which

What is the function of the osi session layer, What is the function of the ...

What is the function of the OSI Session Layer? This layer gives the protocols and means for two devices on the network to communicate with each other by holding a session.  Thi

Access-list range for an extended ip access-list, Recognize the access-list...

Recognize the access-list range for an extended IP access-list? Ans) IP extended access-lists use the number range of 100-199.

What is the purpose of cables being shielded, What is the purpose of cables...

What is the purpose of cables being shielded and having twisted pairs? The main purpose of this is to stop crosstalk. Crosstalks are electromagnetic interferences or noise that

Packet takes through an internetwork, What utility can you use to see the p...

What utility can you use to see the path a packet takes through an internetwork? Ans) Trace - Uses Time-To-Live (TTL) values to make messages from each router used along the pat

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd