Structure of client server systems, Database Management System

Assignment Help:

Structure of Client Server Systems:In client/server architecture, clients show users who require services while servers give services. Both client and server are a combination of hardware & software. Servers are divided logical objects that communicate with clients over a network to do tasks together. A client makes a request for a service & receives a reply to that request. A server gets & processes a request, and sends back the needed response. The client/server systems may have two different types of architecture -

2-Tier and 3-Tier Client/Server Architectures

Each client/server application contains three functional units:

  • Presentation logic which gives the human/machine interaction (the user interface). The presentation layer operates input from the mouse, keyboard or other input devices and gives output in the form of screen displays. For instance, the ATM machine of a bank gives such interfaces.
  • Business logic is the functionality given to an application program. For instance, software that enables a customer to ask for to operate his/her balance on his/her account with the bank is business logic. It contains rules for withdrawal, for minimum balance etc. It is often known as business logic because it includes the business rules that drive a given enterprise.
  • The bottom layer gives the generalized services required by the other layers including file services, communications services, print services and database services. One example of such a service may be to give the records of customer accounts.

These functional units can reside on either the client or on one or more servers in the application:

                         599_Structure of Client Server Systems.png

 

                                                                     Figure: A client-server system

 


Related Discussions:- Structure of client server systems

Write modified version of transfer that avoids deadlock, Your OS has a set ...

Your OS has a set of queues, each of which is protected by a lock. To enqueue or dequeue an item, a thread must hold the lock associated to the queue. You need to implement an a

Why a report generator is used, Why a report generator is used ? Report...

Why a report generator is used ? Report generator is used for print files on paper.

Explain the shadow paging recovery technique, Explain the shadow paging rec...

Explain the shadow paging recovery technique.  Ans: Shadow paging is a method used to acquire atomic and durable transactions, and provides the capability to manipulate pages i

Relational database management, For this application, we will consider IBM ...

For this application, we will consider IBM DB2 catalog data (i.e., metadata) for IBM's enterprise-class servers running the z/OS (formerly OS/390 or MVS) operating system.  One of

What is meant by normalization of data, What is meant by normalization of d...

What is meant by normalization of data? It is a process of examining the given relation schemas based on their Functional Dependencies (FDs) and primary key to achieve the prop

Define the one-way associations, One-way Associations When an associat...

One-way Associations When an association is traversed only in the one direction, then it is implemented as a pointer i.e.an attribute which contains an object reference. If mu

Client server databases, Client Server Databases- The concept behind the C...

Client Server Databases- The concept behind the Client/Server systems is simultaneous, cooperative processing. It is an approach that presents a one systems view from a user's vie

Cluster analysis project, (a) Data Mining Process : In the context of t...

(a) Data Mining Process : In the context of this cluster analysis project , and in your own words , explain how you would execute the first stage of data mining, namely the "P

What is the use of integrity constraints, What is the use of integrity cons...

What is the use of integrity constraints? Integrity constraints make sure that changes made to the database by authorized users do not result in a loss of data consistency. The

ERD DIAGRAM, Law Associates is a large legal practice based in Sydney. You...

Law Associates is a large legal practice based in Sydney. You have been asked to design a data model for the practice based upon the following specification: The practice employs

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd