COMPUTER SYSTEMS and NETWORKS Client-Server Interaction

COMPUTER SYSTEMS and NETWORKS Client-Server Interaction

COMPUTER SYSTEMS AND NETWORKS the use of these protocols may have problems in passing Client-Server Interaction data packets through the firewall on the WWW (System Network Security). However, one report has received widespread. This is a hypertext transfer protocol 1 2 Iryna Pasternak , Yuriy Morozov file HTTP (Hypertext Transfer Protocol)[7-8]. Because of the ubiquity of the protocol HTTP, companies Microsoft 1ECM Department, Lviv Polytechnic National University, UKRAINE, Lviv, S. Bandery street 12, and other manufacturers of network software had to E-mail: [email protected] develop a new protocol , called SOAP ( Simple Object Access Protocol - simple object access protocol ). The 2 ECM Department, Lviv Polytechnic National University, encryption method request objects related data in SOAP UKRAINE, Lviv, S. Bandery street 12, E-mail: [email protected] protocol used text language XML ( Extensible Markup Abstract – Shows the client interaction with the server in Language). The big advantage of SOAP protocol is its WAN. As well the realization of this interaction using the simplicity. Due to its simplicity, this protocol can easily WWW. The model object client interaction with the server for be implemented on many devices. Protocol SOAP more efficient operation of global network. We consider the (Simple Object Access Protocol) can run on top of any software implementation of the web server and client. standard protocol. But the possibility of working at the Кеу words client, server, object, service, network interface, – top level of standard Internet protocols like hypertext WWW. transfer protocol file HTTP (Hypertext Transfer Protocol) and the protocol SMTP ( Simple mail Transfer Protocol - I. Introduction simple mail transfer protocol), allows data packets to pass Client-server architecture is one of the architectural through the system without network protection any patterns and software is the dominant concept in the problems associated with the possibility of a connection. creation of distributed network applications and provides Trends in client- server systems lead to the transfer interaction and communication between them [ 4-6]. It function to a specialized client software, which is also includes the following main components: located on the server and downloaded to the workstation • a set of servers that provide information or other user when it is connected to the information system. This services programs that appeal to them; user workstation provides a framework for implemen- • a set of customers using services provided by servers; tation of client software. • network that provides communication between clients Thus, the development of mechanisms for loading and and servers. executing client software and its interaction with the Servers are independent of each other. Customers also server is actual scientific and applied problems . operate in parallel and independently of each other. There is no strict binding clients to servers . More than typical II. Client-server interaction situation is when one server simultaneously handles To find out if an effective principle of modular in requests from different clients, on the other hand , the client-server interaction, we consider some aspects of client can access it to a single server, then another . client-server interaction in a global network. With a Clients need to know about available servers , but may modular client-server interaction is an exchange of data not have any idea about the existence of other customers. packets over a communications channel in a global In our case, the technology for building client software network. Of the network can be observed in Figure. 1. based on the use of different types of protocols. One of them is the TCP / IP that uses sockets [1-3]. But programming using sockets regarded as too low-level programmers . It is the need of programming at a low level prevents persistent productive writing distributed applications. Another type of protocol is a protocol RPC (Remote Procedure Call). But the protocol is a remote procedure call RPC is quite complex, and in addition there are a large number of its varieties. And also very popular high-level protocols such as CORBA (Common Object Request Broker Architecture - Architecture intermediary object queries ), RMI (Remote Method Invocation - a technology remote method invocation ) and Distributed Component Object Model DCOM (Distributed Component Object Model). These proto- cols still difficult for the organization of their work requires special protection as server-side and client-side . Fig. 1. Working with global network All they have also other disadvantages. For example, in of modular client-server interaction 10 “COMPUTER SCIENCE & ENGINEERING 2013” (CSE-2013), 21–23 NOVEMBER 2013, LVIV, UKRAINE http://cse.ukrscience.org Lviv Polytechnic National University Institutional Repository http://ena.lp.edu.ua As we can see in Figure 1, mt0.googleapis.com requests TABLE 3 from clients and other server response and connecting diffe- CONTENT CACHE rent modules, one of which is GET vt? Lyrs = m @ 21209. Data Size 54 Sometimes the server uses at same module only Device disk changing its parameters according to the customer Expires Thu Jan 01 1970 02:00:00 request, this is an advantage of modular. Also in Figure 1 GMT+0200 shows the transmission rate of data packets from the Fetch Count 2 client to the server and their size. Last Fetched Mon Apr 08 2013 19:06:28 Seeing how the global network, now see what it looks like GMT+0300 client request that the server sends it, and the contents of data Last Modified Mon Apr 08 2013 19:06:28 packets that the client sends to the server (Table 1, 2). GMT+0300 TABLE 1 In Table 3 we see that the data remains in the cache REQUEST FROM CLIENT TO SERVER server, as follows: 1shttp://194.44.247.7:808... Data Size - the size of the data; 3sAIzaSyCMZsCHIVKue55SRgr. Device - specific device (drive name); . Expires - start exchanging data between client and 4e1 server; 5e0 6u1 Fetch Count - the number of pairing between the 7s9u1p15 client and the corresponding server; callback _xdc_._bkr06s Last Fetched - client date of last connection to the token 86408 server; Last Modified - last modified request. In Table 1, we see the IP-address of the server, and If necessary the system administrator so having encrypted data as a function callback, which the customer information about all connections to the server, to requests the server to create a connection. determine the client's global network. TABLE 2 CONTENT OF PACKAGE III. Object model Access-Control-Allow-Orig.. * With the prevalence of Internet working with remote Cache-Control private data become commonplace. Technology client - server Content-Encoding gzip commonly used when working with remote data in the Content-Length 54 network. Today, with the development of the Internet , Content-Type text/javascript; charset=UTF-8 this technology is increasingly attracting the views of Date Mon, 08 Apr software developers , because the world has accumulated 2013 16:06:28 GMT a wealth of information on various issues. Server mafe The system is divided into two parts that can be X-Frame-Options SAMEORIGIN executed in different nodes of the network - client and X-XSS-Protection 1; mode=block server . An application or end user interact with the client part of the system, which in the simplest case provides a In Table 2, we see that the same information maybe network interface. The client part of the system if contained in the packet with data. The content of this necessary calls over the network to server side. package depends on that same client request to the server. Technology client - server can be described by the In the data packets sent by the client for server contains following algorithm: the following standard fields: • the user changes the state of a client program object , • Access-Control-Allow-Orig ...- feature is the control which in turn generates and sends a request to the server , of access to the server; rather - for a program that handles requests; • Cache-Control- control access to the data in the cache; • this program carries out the appropriate manipulation • Content-Encoding - function for unzipping the package with the data; of the data stored on the server, according to the request • Content-Length - length of the data packet; state changes associated object and passes it to the client • Content-Type - the type of data in the packet; program; • Date - the date of your request; • client receives the object, taking into account the new • Server - server name; state of the object and waits for further user action. The • X-Frame-Options - Advanced options; cycle repeats until the user terminates the service.\ • X-XSS-Protection - protection function. Standard software technology implemented client - After receiving a packet with data from relevant field, server features: scalability (effective use of extension the server treated with this package and answer form hardware), resistance to work, protected from (Pasternak, 2012, 102-106). A server would look like a unauthorized access and power when working with large this: _xdc_._bkr06s && _xdc_._bkr06s ([0, null, 1]) , and projects in the area of databases. stores all sent data in the cache, and that is where we can Model of client-server interaction is determined see the remains in Table 3. primarily by the distribution of responsibilities between “COMPUTER SCIENCE & ENGINEERING 2013” (CSE-2013), 21–23 NOVEMBER 2013, LVIV, UKRAINE 11 Lviv Polytechnic National University Institutional Repository http://ena.lp.edu.ua the client and server applications. In our case the server network interactions. Thus , the specific network program will provide information and other services environment and protocol is hidden from the application programs that appeal to her, the client will use these programmer [3]. services . Model object interaction - is the fastest way of Consider the problem of the formation of probability to communication for the transmission states of objects describe the reaction network interface on request.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    6 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us