Design the communication protocol, Computer Engineering

Assignment Help:

Design, write, and implement distributed networked application using Java

Design the communication protocol (message format and exchange procedure) that your application will require

• Design a multithreaded, peer-to-peer or client/server, implementation of your application

• Develop your application using Java networking primitives: Java RMI, or Java Web Services

• Create and implement a test plan those documents whether your application fully works

Example applications include (but are certainly not limited to):

• Web Server/Browser - Client/Server implementation (HTTP protocol)

• Shared Whiteboard - Peer-to-Peer implementation (user defined protocol)

• Chat Application - Peer-to-Peer implementation (user defined protocol)

• Distributed Game - Peer-to-Peer or Client/Server implementation (user defined protocol)

You can use flesh or flex ...etc

Chat application and distributed game should be together in the same design  Do not use (Tic Tac Toe) game because it is included in our lecture (any game except tictactoe game).


Related Discussions:- Design the communication protocol

Search-based tools in parallel computers, The search-based tools initially ...

The search-based tools initially recognize problem and afterwards suitably give advice on how to correct it.  AT Expert from Cray Research is one of the tools being employed for

Graphics, what is bitmap and pixmap

what is bitmap and pixmap

Calculate the blocking probability of three stage network, A three stage ne...

A three stage network is designed with the following parameters: M=N=512, p = q = 16 and α = 0.65. Calculate the blocking probability of the network, if s=16. Symbols carry th

Scope of supply chain management consultancy, What are included in scope of...

What are included in scope of Supply Chain Management Consultancy? Supply Chain Management Consultancy's scope is extensive, and classically includes as given here: a. Sales

Example of pruning, Example of Pruning: As an example, we are assume t...

Example of Pruning: As an example, we are assume that the four choices for player one, there we are looking only two moves ahead 1 for player one and 1 for player two such as

Which one memory requires refreshing, Which of following requires refreshin...

Which of following requires refreshing SRAM., DRAM., ROM. or EPROM. ? Ans. DRAM. requires refreshing.

Explain extended binary coded decimal interchange code, Q. Explain Extended...

Q. Explain Extended Binary Coded Decimal Interchange Code? Extended Binary Coded Decimal Interchange Code (EBCDIC) is a character-encoding format employed by IBM mainframes. It

Sorting algorithms, Two way merge sort for 84,83,78,90,23,123,98,159,8,200

Two way merge sort for 84,83,78,90,23,123,98,159,8,200

Illustrate about fifth generation electronic computers, Fifth Generation (1...

Fifth Generation (1984-1990) The advancement of the next generation of computer systems is characterized majorly by the acceptance of parallel processing.  Until this time para

Differentiate among validation and exception testing, Differentiate between...

Differentiate between validation and exception testing. - Validation testing is done to test software in conformance to requirements specified. It aims to demonstrate that soft

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd