Network communication

Posted on 2007-10-03
Last Modified: 2013-12-23
As you can tell I know very little on how networks communicate. I read up on client and server sockets and I understand how they connect. My question is when I have my software loaded on a server and a user working on a remote work station wants to run my software and have it appear on his remote screen what is the sequence of events. First he opens a connection to the server. Then I suppose some how he executes my software. How does my software appear on his remote screen? Do I have to write event handlers when he connects? My software accesses several different Paradox databases. I use aliases. Does the connection to these databases happen automatically or again do I have to write event handlers to do this?
Question by:baby8830
    LVL 6

    Expert Comment


    I think you're describing some sort of thin client application solution.

    Correct me here;
    You have an Application which feeds data off a database. You want to give access to this application by your users?
    Is your application a desktop application?
    What is your application build on?



    Author Comment

    The application is a desktop application. I want to give the users the ability to control the application from their remote work stations. The application was built using BCB4. It uses Paradox databases.


    LVL 36

    Accepted Solution

    if your BCB4 application is an *interactive* desktop application, the remote users need to use Remote Desktop (RDP) to use the application. only RDP port (3389) is used in its network communication.

    if your BCB4 application is a *network* application which listens network requests from remote workstations on a specific network port and talks to your paradox database locally, your BCB4 application has to deal with the related TCP communication through WINSOCK.

    however, the relevant network activities should follow the well-known three-way handshake model.

    FYI - Explanation of the Three-Way Handshake via TCP/IP

    hope it helps,

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    What Is Threat Intelligence?

    Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

    Suggested Solutions

    This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
    PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
    Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
    In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    14 Experts available now in Live!

    Get 1:1 Help Now