Structure of client server systems, Database Management System

Assignment Help:

Structure of Client Server Systems:In client/server architecture, clients show users who require services while servers give services. Both client and server are a combination of hardware & software. Servers are divided logical objects that communicate with clients over a network to do tasks together. A client makes a request for a service & receives a reply to that request. A server gets & processes a request, and sends back the needed response. The client/server systems may have two different types of architecture -

2-Tier and 3-Tier Client/Server Architectures

Each client/server application contains three functional units:

  • Presentation logic which gives the human/machine interaction (the user interface). The presentation layer operates input from the mouse, keyboard or other input devices and gives output in the form of screen displays. For instance, the ATM machine of a bank gives such interfaces.
  • Business logic is the functionality given to an application program. For instance, software that enables a customer to ask for to operate his/her balance on his/her account with the bank is business logic. It contains rules for withdrawal, for minimum balance etc. It is often known as business logic because it includes the business rules that drive a given enterprise.
  • The bottom layer gives the generalized services required by the other layers including file services, communications services, print services and database services. One example of such a service may be to give the records of customer accounts.

These functional units can reside on either the client or on one or more servers in the application:

                         599_Structure of Client Server Systems.png

 

                                                                     Figure: A client-server system

 


Related Discussions:- Structure of client server systems

How can we classify the operations on classes, How can we Classify the oper...

How can we Classify the operations on classes  This step fundamentally means all three models functional, object and dynamic (studied in last section) must be combined so that

Conflicting operations in schedule, Conflicting Operations in Schedule: ...

Conflicting Operations in Schedule: The three simple ways of interleaved instruction implement of transactions T1 and T2. Please note that in the following tables the first col

Unnormalize form, employee(empid,empname,dept,telno,mobno, add,sssno,tinno,...

employee(empid,empname,dept,telno,mobno, add,sssno,tinno,WEdates,WEcomp,WEadd,WEpos,WEres) this is a employee record which is need to be normalize.the WE means work experience

Er model, There are a number of possible solutions to the open ended brief....

There are a number of possible solutions to the open ended brief. One of the simple ones is shown here without the PKs and FKs. It is important to think of how a number of tasks

Define what Immediate database modification technique uses, Define what Imm...

Define what Immediate database modification technique uses?  Ans: Both undo and redo.

Describe sequential file organization, Describe sequential file organizatio...

Describe sequential file organization.  Explain the rules for (i)  Inserting a new record. (ii)  Deleting an existing record.          Ans:A sequential f

What is the used of specifying alias, What is the used of specifying alias?...

What is the used of specifying alias? Specifying alias: is used to rename column or attribute in a table.

Enhanced entity relationship, what do you understand by enhanced entity-rel...

what do you understand by enhanced entity-relationship

Define deferred update technique of recovery, Discuss deferred update techn...

Discuss deferred update technique of recovery.  What are the advantages?  Ans:  The deferred update methods do not physically update the database on disk till after a transact

How many types of locks are there, Depending upon the rules we have found, ...

Depending upon the rules we have found, we can classify the locks into two types. Shared Lock: A transaction might be acquiring shared lock on a data item in order to read it

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd