How instant messaging works explain their process, JAVA Programming

Assignment Help:

How instant messaging works? Write the steps involved in this process?

The Instant Messaging services available permit us to manage a list of people (contacts) that we interact along with regularly. We can send instant messages to any of the contacts within our list as long as that contact is online. Subsequent steps are included in IM working:

1. User commences the IM client.
2. IM client finds the IM server & logs in.
3. It launches communication info (IP address, etc) to the IM server.
4. IM server searches user's contacts & sends him/her the communication info.
5. IM server also notifies the contacts which the user is online; sends his/her communication info to them.
6. The user's & the contact's IM clients are prepared to communicate directly (P2P).
7. As new contact has come online, IM server informs them about the user being online and many more.
8. Multiple, real-time chat are possible.
9. While the user logs-off, his/her IM client informs the IM server.
10. IM servers wipes away the temporary file and inform the user's contact's about his/her ‘offline' status.


Related Discussions:- How instant messaging works explain their process

Difference between object declaration and object creation, Question: (a...

Question: (a) (i) Describe the purpose of comments when writing programs in Java. (ii) Name the types of comments available and illustrate with simple examples. (b) (i)

Types of dependency injection spring supports, What are the types of Depend...

What are the types of Dependency Injection Spring supports? Ans) there are two types of Dependency Injection Spring a)  Setter Injection: b)  Constructor Injection:

How to write exception subclasses, How to Write Exception Subclasses ? ...

How to Write Exception Subclasses ? Most exception subclasses inherit all their functionality from the superclass. Each subclass majorly serves as a marker for a various types

Explain the difference between hash map and hash table, Difference between ...

Difference between Hash Map and Hash Table? The HashMap class is roughly equivalent to Hashtable, except that it is unsynchronized and allows nulls. (HashMap allows null values

Explain the reading documentation for a class in the class, Explain the Rea...

Explain the Reading documentation for a class in the class library For instance, let's suppose you need to use the URL class in the java.net package. Through reading the docume

Application for minesweeper, This program will help you start doing GUI pro...

This program will help you start doing GUI programming, and is a good example of 2D arrays. Mine Sweeper is a classic game that is played on a 2D grid of cells. At the beginning of

State about the performance of java, State about the performance of java ...

State about the performance of java First versions of java were pretty slow. Java performance has gotten a lot better with aggressive just-in-time-compiler (JIT) techniques

Explain the three benefits of access protection, Explain the Three Benefits...

Explain the Three Benefits of Access Protection ? Access protection has three major benefits: 1. It permits you to enforce constraints on an object's state. 2. It gives a si

We are in need of programmer, We are in need of Programmer In search of ...

We are in need of Programmer In search of someone who know java well enough to work under my in-house programmer and take work form him to keep the project moving. The project d

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd