Structure of client server systems, Database Management System

Assignment Help:

Structure of Client Server Systems:In client/server architecture, clients show users who require services while servers give services. Both client and server are a combination of hardware & software. Servers are divided logical objects that communicate with clients over a network to do tasks together. A client makes a request for a service & receives a reply to that request. A server gets & processes a request, and sends back the needed response. The client/server systems may have two different types of architecture -

2-Tier and 3-Tier Client/Server Architectures

Each client/server application contains three functional units:

  • Presentation logic which gives the human/machine interaction (the user interface). The presentation layer operates input from the mouse, keyboard or other input devices and gives output in the form of screen displays. For instance, the ATM machine of a bank gives such interfaces.
  • Business logic is the functionality given to an application program. For instance, software that enables a customer to ask for to operate his/her balance on his/her account with the bank is business logic. It contains rules for withdrawal, for minimum balance etc. It is often known as business logic because it includes the business rules that drive a given enterprise.
  • The bottom layer gives the generalized services required by the other layers including file services, communications services, print services and database services. One example of such a service may be to give the records of customer accounts.

These functional units can reside on either the client or on one or more servers in the application:

                         599_Structure of Client Server Systems.png

 

                                                                     Figure: A client-server system

 


Related Discussions:- Structure of client server systems

Example of database optimisation, Create 1 experiment to demonstrate an asp...

Create 1 experiment to demonstrate an aspect of query optimisation by using access-path structures (indexes), decomposition, or denormalisation. Once satisfied with your experiment

What are the issues are formed while selecting a database, What are the Iss...

What are the Issues when Selecting a Database Issues when Selecting a Database Storage space requirement: A database requires about triple storage space of the actua

Security and integrity, Security And Integrity After Reading the concep...

Security And Integrity After Reading the concepts of database recovery in the last section, let us now deal with a vital concept that helps in minimizing consistency errors in

Describe application programming interface, Describe Application programmin...

Describe Application programming interface? Application Programming Interface - Commercial SQL implementations take one of the two primary techniques for involving SQL in a p

Describe the candidate key functions, Describe the candidate key functions ...

Describe the candidate key functions ? Candidate Key and Alternate Key: In some instances, an entity will have more than one attribute which can serve as a primary key. Any key

What are uncommitted modifications, What are uncommitted modifications? ...

What are uncommitted modifications? The immediate-modification technique permits database modifications to be output to the database whereas the transaction is still in the act

What are the failures of controlling events between objects, What are the f...

What are the failures of Controlling Events Between Objects  Failure Unintentional termination of system. Several possible causes: failure of system hardware, o

Advantages to copying records from one table to another, What kind of advan...

What kind of advantages to copying records from one table to another? -) When an algorithm that modifies a table is used after that it's safer to work with the copy -) When

Define deadlock term, a. Define the term "deadlock". There are four conditi...

a. Define the term "deadlock". There are four conditions that must hold before deadlock is possible. Name them. b. Outline an algorithm that detects whether there is a deadlock.

Define the relations as tables in sql, Consider the relations given below ...

Consider the relations given below Borrower (id_no, name) Book (accno., title, author, borrower_idno) (a) Define the above relations as tables in SQL forming real world assumptio

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd