Introduction to Web Application Technologies: Part IV

Model-View-Controller (MVC) Architecture in a Web Application: Early in the evolution of graphical user interface (GUI) applications, a paradigm was developed that separated the three main concerns of the architecture of a GUI application. The model is the conceptualization of the objects that the user is working with conceptually and the mapping of those concepts into the data structures: the user model and the data model. An example of the user model is a paper document, which is represented as a structure of encoded text character in a word processor software data model.…Read more

Introduction to Web Application Technologies : Part -III

In this article we are going to explore the information about Java Servlets in detail. In previous Part-II article of web application technologies, we had taken overview of java server technologies. Java Servlets: Servlets run within the Java EE component container architecture. This container is called as the web container (also known as the servlet engine). The web container is a Java virtual machine (JVM) tool interface that supplies an implementation of the servlet API. Servlet instances are components that are managed by the web container to respond to HTTP requests.    …Read more

Introduction to Web Application Technologies : Part-II

In the previous part of Web Application Technologies we had discussed about HTTP Client Server Architecture and Uniform Resource Locator. Today we will discuss about another few interesting technologies. Web Sites and Web Applications: A web site is a collection of the static files, HTML pages, graphics, and various other files. A web application is the web site with a dynamic functionality on the server.A web application doesrun programs on the server , for example: A browser does make a request, to the server, for an HTML form. The server does respond by sending…Read more

Introduction to Web Application Technologies : Part-I

Now, In this article, I will introduce you to some of the common web application technologies, so let's start with HTTP. Web Application Technologies: The Hypertext Transfer Protocol (HTTP) is similar to many other Internet Protocols, for example Simple Mail Transfer Protocol (SMTP) and File Transfer Protocol (FTP), because HTTP is a protocol to transfer data from the server to the client. One fundamental difference between most other Internet protocols and HTTP is that the typical Internet protocol support several requests per connections, HTTP supports only one request per connection. This means that…Read more

Elements of Advanced JAVA Programming : Part-3

The JavaBeans Component Model: The JavaBeans architecture is an integration technology, a component framework that allows reusable component objects (called bean) to communicate with one another and with the framework. The Java bean is an independent and reusable software component that you can manipulate visually in a builder tool. Beans can be visible objects, such as AWT components, or invisible objects such as queues and stacks. A builder or integration tool manipulates beans to create applets and applications. The component model specified by the JavaBeans 1.00-A specification defines five major services: Introspection: This…Read more

Elements of Advanced JAVA Programming : Part-2

Distributed Computing: There are JAVA technologies available for creating distributed computing environment. Two popular technologies are the remote method invocation (RMI) and the common object request broker architecture (CORBA). RMI analogous to the remote procedure call (RPC) and is preferred by programmers of the JAVA programming language. The CORBA does provide flexibility in heterogeneous development environments. The RMI featuresdo enable a program running on a client computer to make method call on an object located on a remote server machine. It gives a programmer the ability to distribute computing across a networked environment.…Read more

Elements of Advanced JAVA Programming : Part-1

Introduction to the Two- Tier and the Three-Tier Architectures: Client-server computing involves two or more computers sharing tasks related to a complete application. Ideally,, each computer is performing logic appropriate to its design and stated function. The most widely used form of client-server implementation is a two-tier client-server. This involves a front-end client application communicating with a back-end database engine running on a separate computer. Client program sends Structured Query Language (SQL) statements to the database servers. The server returns the appropriate results, and the client is responsible for handling the data. The…Read more

Networking Concepts in Java

Networking: In this, it describes the concept of networking by using sockets. Sockets: Socket is the name given, in one particular programming model, to the endpoints of a communication link between processes. Because of popularity of that particular programming model, the term socket has been reused in other programming models, including JAVA technology. When processes communicate over a network, JAVA technology uses the streams model.A socket can hold two streams: one input stream and one output stream. The  process does send the data to another process through the network by writing to the…Read more

Thread in Java : Part 4

In Part 3 of threads we looked at synchronization, monitor model of synchronization. Now, today we will look at Consumer-Producer Thread concept. Putting It Together: The code in this is an example of thread interaction that demonstrates the use of wait and notify methods to solve a classic producer-consumer problem. Start by looking at the outline of the stack object and the details of the threads that access it. Then look at the details of the stack and the mechanisms used to protect the stack’s data and to implement the thread communication based…Read more

Thread in JAVA : Part-3

In previous part 2 of threading, we had seen information about keywords and flags used in java threads. Today we go forward in java threading part 3. The synchronized – Putting It Together: The synchronized mechanism works only if all access to delicate data occurs within the synchronized blocks. You should mark delicate data protected by synchronized blocks as private. If you do not do this the delicate data can be accessed from code outside the class definition; such a situation would be able other programmers to bypass your protection and cause data corruption at run…Read more