Featured Post
Assignment Example | Topics and Well Written Essays - 1750 words - 3
Task Example Exceptionally referencing, the above portrayed ââ¬Å"soft sideâ⬠of venture the executives would bolster in disco...
Tuesday, May 5, 2020
Custom Validation Using Framework In Java -Myassignmenthelp.Com
Question: Discuss About The Custom Validation Using Framework In Java? Answer: Introducation The client-server architecture is a system-user computing model in which the system (server houses) offers high-end computing solution to the user based on the interactive data from the user (Bibinagar and Kim 2013). These services include accessing the applications, storage, sharing of files and others. The active server can manage multiple clients at a particular time. The most basic example of the considered architecture is the internet where multiple users are served with websites and data. The client desires a system primarily designed to keep track of the movement in a companys stock and the factors which resulted in the same. A simulation system to assess various investment scenarios is the other management of the client. To meet the following requirements, the system must be developed based on AJAX (Asynchronous JavaScript and XML) and Struts 2 framework along with Hibernate framework for object-relational mapping. The system architecture will need two separate sections based on the requirements. The first section will be for the gathering information of the stocks and the second section will be used for the simulation. The first section will be general website model that will be used designed with the help of AJAX and used to browse the stocks and other relevant purposes (Saxena 2015). The simulation section is the one dealing with data acquisition and interactive processing. Hence, 3-tier architecture is recommended for the client. 3-tier client-server architecture consists of three tiers namely presentation, logic and data tier (Oluwatosin 2014). Presentation tier is the tier where the assigned task to the server is translated and reverts the results understandable to the end-user. The logic tier performs all the complex tasks associated with the process. The applications, processing of the commands, logical decision marketing and evaluation of the input are all part of the talked about tier. The operations that require the involvement of two layers are processed by the agile tier. Finally, the data tiers purpose is to store the information and provide that information when demanded by the logic tier. The reason for adopting for equipping the agile model for the needs of the client is because all those requirements can be easily satisfied. The 2-tier architecture could have been equipped with the requirements, but the simulation part of the requirement would not have been fulfilled. On the other hand, 3-tier offers various other advantages while meeting the requirements. The foremost of all the advantages offered by the considered model is its capability to work in the heterogeneous data source environment (Bachmann et al. 2014). The above mentioned capability is required for the broker as they have to access the different stock website for data collection and processing. Trading of stocks is done in real-time and hence it is mandatory to maintain high-speed which 3-tier model offers (Oluwatosin 2014). The agile model uses middleware server as the database gateway which enables the server to gain independence of the database. Other benefits are also offered by the considered model which are fit for the client and hence it is recommended. References: Bachmann, R. and Brucker, A.D., 2014. Developing secure software.Datenschutz und Datensicherheit, management, pp.257-261. Bibinagar, N. and Kim, W.J., 2013. Switched Ethernet-based real-time networked control system with multiple-clientserver architecture.IEEE/ASME transactions on Mechatronics,18(1), pp.104-112. Oluwatosin, H.S., 2014. Client-server model.IOSR Journal of Computer civil- Engineering (IOSR-JCE),16(1), p.67. Saxena, A., 2015. Web Based Custom Validation Using Framework in Java.International Journal of Computer Science Trends and Technology (IJCST),3(1), pp.90-96.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.