How instant messaging works explain their process, JAVA Programming

Assignment Help:

How instant messaging works? Write the steps involved in this process?

The Instant Messaging services available permit us to manage a list of people (contacts) that we interact along with regularly. We can send instant messages to any of the contacts within our list as long as that contact is online. Subsequent steps are included in IM working:

1. User commences the IM client.
2. IM client finds the IM server & logs in.
3. It launches communication info (IP address, etc) to the IM server.
4. IM server searches user's contacts & sends him/her the communication info.
5. IM server also notifies the contacts which the user is online; sends his/her communication info to them.
6. The user's & the contact's IM clients are prepared to communicate directly (P2P).
7. As new contact has come online, IM server informs them about the user being online and many more.
8. Multiple, real-time chat are possible.
9. While the user logs-off, his/her IM client informs the IM server.
10. IM servers wipes away the temporary file and inform the user's contact's about his/her ‘offline' status.


Related Discussions:- How instant messaging works explain their process

A session facade? , Too many function invocations between the server and th...

Too many function invocations between the server and the client will lead to network overhead, tight coupling due to dependencies between the server and the client, misuse of serve

Rfid based student attendance system include biometrics, Develop a rfid bas...

Develop a rfid based student attendance system include biometrics Project Description: The aim of our project is using rfid technology student attendance has to be taken. whe

What is the problem along with relational database, What is the problem alo...

What is the problem along with Relational Database and what solution you could suggest for it? When we store object orientated data within RDBMS it required to translate in to

program to brute force search, Introduction As an alternative to the B...

Introduction As an alternative to the Binary Search algorithm, also it could be done by the brute-force method given below. public static int rank(int key, int[] a) {     f

How to integrate your struts application with spring, To integrate your Str...

To integrate your Struts application with Spring, we have two options: ? Configure Spring to manage your Actions as beans, using the ContextLoaderPlugin, and set their dependenc

Build encyption decryption code, Hi, For my network and security class. I ...

Hi, For my network and security class. I have a project where I need to create a program that take an input and encrypts it and then you can also enter that value into another tex

Explain the rules for tostring() methods, Explain the Rules for toString() ...

Explain the Rules for toString() Methods ? toString() methods should return a single line of text that does not contain any carriage returns or linefeeds. toString() methods

Listening for roster and presence changes, The typical use of the roster cl...

The typical use of the roster class is to display a tree view of groups and entries along with the current presence value of each entry. As an example, see the image showing a Rost

Life span of variables, While you declare a variable in a function, the var...

While you declare a variable in a function, the variable can be accessed within that function only.  While you exit the function, the variable is destroyed.  These variables are ca

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd