Structure of client server systems, Database Management System

Assignment Help:

Structure of Client Server Systems:In client/server architecture, clients show users who require services while servers give services. Both client and server are a combination of hardware & software. Servers are divided logical objects that communicate with clients over a network to do tasks together. A client makes a request for a service & receives a reply to that request. A server gets & processes a request, and sends back the needed response. The client/server systems may have two different types of architecture -

2-Tier and 3-Tier Client/Server Architectures

Each client/server application contains three functional units:

  • Presentation logic which gives the human/machine interaction (the user interface). The presentation layer operates input from the mouse, keyboard or other input devices and gives output in the form of screen displays. For instance, the ATM machine of a bank gives such interfaces.
  • Business logic is the functionality given to an application program. For instance, software that enables a customer to ask for to operate his/her balance on his/her account with the bank is business logic. It contains rules for withdrawal, for minimum balance etc. It is often known as business logic because it includes the business rules that drive a given enterprise.
  • The bottom layer gives the generalized services required by the other layers including file services, communications services, print services and database services. One example of such a service may be to give the records of customer accounts.

These functional units can reside on either the client or on one or more servers in the application:

                         599_Structure of Client Server Systems.png

 

                                                                     Figure: A client-server system

 


Related Discussions:- Structure of client server systems

Differentiate between static hashing and dynamic hashing, Differentiate bet...

Differentiate between static hashing and dynamic hashing.  Ans: Static Hashing comprises the number of primary pages in the directory fixed. So, while a bucket is full, we requ

Naïve bayesian approach-id3 algorithm, You are working for the ABC Telecom ...

You are working for the ABC Telecom and are given some customer records for data mining. You are asked to discover, from the data, patterns that characterize low-, medium- and high

Mention the purpose of sid and sod lines, Mention the purpose of SID and SO...

Mention the purpose of SID and SOD lines SID (Serial input data line): It is an input line by which the microprocessor accepts serial data. SOD (Serial output data line)

Explain the deadlock avoidance, Define deadlock avoidance. An alternat...

Define deadlock avoidance. An alternative method for avoiding deadlocks is to needs additional information about how resources are to be requested. Each request requires the s

Create a database, The database will enable college administrators the abil...

The database will enable college administrators the ability to track students initial major. This will help college officials decide how best to prepare students for their goals an

Explain disadvantages of a dbms, Question : (a) Database Management Sy...

Question : (a) Database Management Systems (DBMS) is the foundation of business intelligence. Explain the following concepts related to DBMS: (i) Entity Relationship Diagr

Enforce referential integrity, Use Access 2007 to create a database calle...

Use Access 2007 to create a database called UniLib.mdb. - this file should be created on your personal drive at the university (or C: if you're using Access 2007 at home) and t

Briefly describe concurrency execution, Briefly describe concurrency execut...

Briefly describe concurrency execution? Lock - based protocols Locks There are several modes in which a data item may be locked in this section we restrict our attention

EER models, Ask question #MinimThe Georgia Tech Library (GTL) has approxima...

Ask question #MinimThe Georgia Tech Library (GTL) has approximately 16,000 members, 100,000 titles, and 250,000 volumes (an average of 2.5 copies per book). About 10 percent of the

Define 3nf normal form, 3NF Normal Form A relation schema R is in 3NF ...

3NF Normal Form A relation schema R is in 3NF if it is in 2NF and for each FD X A either of the following is true X is a Super-key of R. A is a prime attribute of R

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd