Client - server architecture, Basic Computer Science

Assignment Help:

Client/ Server Architecture:  

As the capacity and power of personal computers improved, the need to share the processing demands between the host server and the client workstation increased. This need for greater computing control and more computing value led to the evolution of client/server technology.  In client/server architecture, the tasks or workloads are partitioned as:  

  • server programs - providers of a resource or service  
  • client programs - requester of resource or service

Clients and servers may reside in the same machine or they typically reside in separate pieces of hardware and communicate over a computer network. A server machine is  a host that runs one or more server programs which share their resource with clients. A client does not share any of its resources, but requests a server function or service. The server program fulfills the client request. Clients initiate a communication session with the server. The client/ server system may be two-tiered, three-tiered or n-tiered.  


Related Discussions:- Client - server architecture

File sharing architecture, File Sharing Architecture:   The developmen...

File Sharing Architecture:   The development of microprocessor, PC and LAN transformed dumb terminals into -smart? clients. This brought a complete change in the computing env

Concept in programming language, CONCEPT IN PROGRAMMING LANGUAGE: A Pr...

CONCEPT IN PROGRAMMING LANGUAGE: A Programming Language is used to design and describe a set of instructions and computations to be executed by a computer. To do programming,

System software, SYSTEMS SOFTWARE Systems Software generally is ...

SYSTEMS SOFTWARE Systems Software generally is the software which control the computers and other peripherals. Ex: MS DOS, Windows 95, Unix, NetWare and Windows NT et

Quantitative Methods in Business Decision Making, 4. Union City Al has dec...

4. Union City Al has decided to upgrade their tornado warning system. The city leaders have identified six potential locations for erecting a warning siren tower. They want to e

Software licensing, Software Licensing: Until early 1970's, sharing of...

Software Licensing: Until early 1970's, sharing of software was the accepted norm. Hardware came bundled with software products which could be freely redistributed and the acc

Virtual memory, What is virtual memory? How address mapping is done in cach...

What is virtual memory? How address mapping is done in cache memory? Elaborate your answer with examples.

How will url services be affected, URL services has two divisions. Basic we...

URL services has two divisions. Basic webpages and custom webpages. Ricky Vega, Custom's manager wants to find out why Custom is not profitable. He has prepared the following repor

Digital wireless telephone networks, Mobile telephone networks started with...

Mobile telephone networks started with analog technology. Analog cellular networks were known as first generation (1G) networks. Such networks had limited capacity, and were subjec

HACKER, Briefly explain who a hacker is and what the activities of a hacker...

Briefly explain who a hacker is and what the activities of a hacker are?k question #Minimum 100 words accepted#

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd