Client - server architecture, Basic Computer Science

Assignment Help:

Client/ Server Architecture:  

As the capacity and power of personal computers improved, the need to share the processing demands between the host server and the client workstation increased. This need for greater computing control and more computing value led to the evolution of client/server technology.  In client/server architecture, the tasks or workloads are partitioned as:  

  • server programs - providers of a resource or service  
  • client programs - requester of resource or service

Clients and servers may reside in the same machine or they typically reside in separate pieces of hardware and communicate over a computer network. A server machine is  a host that runs one or more server programs which share their resource with clients. A client does not share any of its resources, but requests a server function or service. The server program fulfills the client request. Clients initiate a communication session with the server. The client/ server system may be two-tiered, three-tiered or n-tiered.  


Related Discussions:- Client - server architecture

What is a middleware, QUESTION (a) Using diagrams, describe the 2-tier ...

QUESTION (a) Using diagrams, describe the 2-tier and 3-tier architectures. (b) What is a middleware? Explain the functions of a middleware. Give two examples of middleware.

Bandwidth, Bandwidth: Bandwidth is the second concept important for tr...

Bandwidth: Bandwidth is the second concept important for transmission. This concept can be explained with the help of the traffic network mentioned earlier. If there is a two-

Electronic mail , Electronic mail is another PC to PC and PC to mainframe ...

Electronic mail is another PC to PC and PC to mainframe data exchange. If you subscribe to an electronic mail service, it will enable your PC to gain access to a 'mailbox' on a ma

Distinguish between passive and active attacks, QUESTION (a) Distinguis...

QUESTION (a) Distinguish between passive and active attacks. (b) Give two reasons why it is important to organise security awareness programs for users. (c) Explain how s

Describe the binary search algorithm, QUESTION 1 Describe the binary se...

QUESTION 1 Describe the binary search algorithm using an example of your own. QUESTION 2 (a) By showing all your workings, give a big-O estimate for f(x) = (x + 1)lo

Elements of programming language, ELEMENTS OF PROGRAMMING LANGUAGE:  L...

ELEMENTS OF PROGRAMMING LANGUAGE:  Learning a programming language requires understanding of concepts such as representation of different types of data in the computer, the va

Artificial intelligence agents, Artificial Intelligence Agents: We dis...

Artificial Intelligence Agents: We discussed what we will be talking about in Artificial Intelligence and why those things are important. This chapter is all about how we wi

Properties of Dictionary Keys, Dictionary values encompass no limitations. ...

Dictionary values encompass no limitations. They can be any random Python object, moreover standard objects or user-defined objects. Though, same is not true for the keys. There ar

Read only memory (rom), Read only memory (rom): The problem with RAM is...

Read only memory (rom): The problem with RAM is that its memory is volatile, i.e. it loses all its data when the power supply is removed.  A non-volatile memory is a permanent

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd