0% found this document useful (0 votes)
22 views

Client and Server

Uploaded by

Rachana Kamarthi
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

Client and Server

Uploaded by

Rachana Kamarthi
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

CLIENT-SERVER MODEL

The Client-server model is a distributed application structure that partitions task or


workload between the providers of a resource or service, called servers, and service
requesters called clients. In the client-server architecture, when the client computer
sends a request for data to the server through the internet, the server accepts the
requested process and deliver the data packets requested back to the client. Clients
do not share any of their resources. Examples of Client-Server Model are Email,
World Wide Web, etc.
How the Client-Server Model works ?
In this article we are going to take a dive into the Client-Server model and have a
look at how the Internet works via, web browsers. This article will help us in having
a solid foundation of the WEB and help in working with WEB technologies with ease.
 Client: When we talk the word Client, it mean to talk of a person or an
organization using a particular service. Similarly in the digital world
a Client is a computer (Host) i.e. capable of receiving information or using
a particular service from the service providers (Servers).
 Servers: Similarly, when we talk the word Servers, It mean a person or
medium that serves something. Similarly in this digital world a Server is a
remote computer which provides information (data) or access to particular
services.
So, its basically the Client requesting something and the Server serving it as long as
its present in the database.

How the browser interacts with the servers ?


There are few steps to follow to interacts with the servers a client.
 User enters the URL(Uniform Resource Locator) of the website or file. The
Browser then requests the DNS(DOMAIN NAME SYSTEM) Server.
 DNS Server lookup for the address of the WEB Server.
 DNS Server responds with the IP address of the WEB Server.
 Browser sends over an HTTP/HTTPS request to WEB Server’s
IP (provided by DNS server).
 Server sends over the necessary files of the website.
 Browser then renders the files and the website is displayed. This rendering
is done with the help of DOM (Document Object Model)
interpreter, CSS interpreter and JS Engine collectively known as the JIT or
(Just in Time) Compilers.

Advantages of Client-Server model:


 Centralized system with all data in a single place.
 Cost efficient requires less maintenance cost and Data recovery is possible.
 The capacity of the Client and Servers can be changed separately.
Disadvantages of Client-Server model:
 Clients are prone to viruses, Trojans and worms if present in the Server or
uploaded into the Server.
 Server are prone to Denial of Service (DOS) attacks.
 Data packets may be spoofed or modified during transmission.
 Phishing or capturing login credentials or other useful information of the
user are common and MITM(Man in the Middle) attacks are common.

Peer-to-Peer Network
A peer-to-peer network is a simple network of computers. Here each computer acts
as a node for file sharing within the formed network. Here each node acts as a server
and thus there is no central server in the network. This allows the sharing of a huge
amount of data. The tasks are equally divided amongst the nodes. Each node
connected in the network shares an equal workload. For the network to stop
working, all the nodes need to individually stop working. This is because each node
works independently.
P2P Network Architecture

In the P2P network architecture, the computers connect with each other in a
workgroup to share files, and access to internet and printers.
 Each computer in the network has the same set of responsibilities and
capabilities.
 Each device in the network serves as both a client and server.
 The architecture is useful in residential areas, small offices, or small
companies where each computer act as an independent workstation and
stores the data on its hard drive.
 Each computer in the network has the ability to share data with other
computers in the network.
 The architecture is usually composed of workgroups of 12 or more
computers.
How Does P2P Network Work?

Let’s understand the working of the Peer-to-Peer network through an example.


Suppose, the user wants to download a file through the peer-to-peer network then the
download will be handled in this way:
 If the peer-to-peer software is not already installed, then the user first has to
install the peer-to-peer software on his computer.
 This creates a virtual network of peer-to-peer application users.
 The user then downloads the file, which is received in bits that come from
multiple computers in the network that have already that file.
 The data is also sent from the user’s computer to other computers in the
network that ask for the data that exist on the user’s computer.
Thus, it can be said that in the peer-to-peer network the file transfer load is distributed
among the peer computers.

How to Use a P2P Network Efficiently?

Firstly secure your network via privacy solutions. Below are some of the measures to
keep the P2P network secure:
 Share and download legal files: Double-check the files that are being
downloaded before sharing them with other employees. It is very important
to make sure that only legal files are downloaded.
 Design strategy for sharing: Design a strategy that suits the underlying
architecture in order to manage applications and underlying data.
 Keep security practices up-to-date: Keep a check on the cyber security
threats which might prevail in the network. Invest in good quality software
that can sustain attacks and prevent the network from being exploited.
Update your software regularly.
 Scan all downloads: This is used to constantly check and scan all the files
for viruses before downloading them. This helps to ensure that safe files are
being downloaded and in case, any file with potential threat is detected then
report to the IT Staff.
 Proper shutdown of P2P networking after use: It is very important to
correctly shut down the software to avoid unnecessary access to third
persons to the files in the network. Even if the windows are closed after file
sharing but the software is still active then the unauthorized user can still
gain access to the network which can be a major security breach in the
network.

Applications of P2P Network

Below are some of the common uses of P2P network:


 File sharing: P2P network is the most convenient, cost-efficient method for
file sharing for businesses. Using this type of network there is no need for
intermediate servers to transfer the file.
 Blockchain: The P2P architecture is based on the concept of
decentralization. When a peer-to-peer network is enabled on the blockchain
it helps in the maintenance of a complete replica of the records ensuring the
accuracy of the data at the same time. At the same time, peer-to-peer
networks ensure security also.
 Direct messaging: P2P network provides a secure, quick, and efficient way
to communicate. This is possible due to the use of encryption at both the
peers and access to easy messaging tools.
 Collaboration: The easy file sharing also helps to build collaboration
among other peers in the network.
 File sharing networks: Many P2P file sharing networks like G2, and
eDonkey have popularized peer-to-peer technologies.
 Content distribution: In a P2P network, unline the client-server system so
the clients can both provide and use resources. Thus, the content serving
capacity of the P2P networks can actually increase as more users begin to
access the content.
 IP Telephony: Skype is one good example of a P2P application in VoIP.

Advantages of P2P Network

 Easy to maintain: The network is easy to maintain because each node is


independent of the other.
 Less costly: Since each node acts as a server, therefore the cost of the
central server is saved. Thus, there is no need to buy an expensive server.
 No network manager: In a P2P network since each node manages his or
her own computer, thus there is no need for a network manager.
 Adding nodes is easy: Adding, deleting, and repairing nodes in this
network is easy.
 Less network traffic: In a P2P network, there is less network traffic than in
a client/ server network.

Disadvantages of P2P Network

 Data is vulnerable: Because of no central server, data is always vulnerable


to getting lost because of no backup.
 Less secure: It becomes difficult to secure the complete network because
each node is independent.
 Slow performance: In a P2P network, each computer is accessed by other
computers in the network which slows down the performance of the user.
 Files hard to locate: In a P2P network, the files are not centrally stored,
rather they are stored on individual computers which makes it difficult to
locate the files.

You might also like