Explain the client-server interaction using messages, Computer Engineering

Assignment Help:

Explain the Client-Server Interaction Using Messages

As we have learned, client- server interaction may be managed in many ways. A message- based interaction is perhaps the best choice for many reasons. It turns out that applications architected specifically for client-server may be optimized with the processing of client server messages and by the facilities used to manage the message. As such, the message-based interaction for client -to-server interaction is becoming a preferred model.

The mechanisms of client-to-server interaction remain relatively similar to the previous example using procedures. Clients make logical request of the server component and expect result returned (either synchronously or asynchronously). Client developers are faced with different method of passing parameters, calling the server, and receiving results. Even with the different semantics, however, creating client-server applications is very straightforward. A message-passing model is employed by many of today's popular driven graphical operating systems. Event loops and action based upon them is the native model for many of these client operating environments. Client- Server interaction should work very similarly. The major difference is that the application components and the message difference is that the application components and the message communication itself may be distributed over the network to a server.


Related Discussions:- Explain the client-server interaction using messages

Pci bus transactions - computer architecture, PCI bus transactions: PC...

PCI bus transactions: PCI bus traffic is prepared of a series of PCI bus transactions. Each transaction is build up of an address phase that is followed by 1 or more data phas

Functions for message passing, Functions for Message Passing: MPI proc...

Functions for Message Passing: MPI processes don't share memory space and one process can't directly access other process's variables. Therefore they need some form of communi

What is pointers function, Visual basic applications have very rich and fle...

Visual basic applications have very rich and flexible applications but there is single limitation when using pointer function. Windows API has limited support for function pointers

What are the aspects of security policy, What are the aspects of security p...

What are the aspects of security policy The security policy should cover aspects such as network service access, physical access, limits of acceptable behaviour, company's pro

Develop a system to store change logs, The ?rst task in the project is to d...

The ?rst task in the project is to develop a sane system to store change logs and versions of ?les. The simplest approach is to create a "dot" directory in the location of the ?le

Cookies, basic purpose of cookies

basic purpose of cookies

War (write after read) - data hazards , WAR (write after read) - Data hazar...

WAR (write after read) - Data hazards in computer architecture: WAR (write after read) - j tries to write at destination before it is read by i , hence i  wrongly gets the n

Solve the assignment of finite automata, Solve the assignment of NFA-- Fini...

Solve the assignment of NFA-- Finite Automata and Formal Language Project Description: I have an assignment on Finite Automata and Formal Languages ( Nondeterministic Fini

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd