133:
710:
403:
36:
1137:, however, specifically allocates a large number of resources to a small number of computers. The more computation is offloaded from client-hosts to the central computers, the simpler the client-hosts can be. It relies heavily on network resources (servers and infrastructure) for computation and storage. A
628:, while the bulk of the operations occur on the client side, the servers are responsible for coordinating the clients, sending them data to analyze, receiving and storing results, providing reporting functionality to project administrators, etc. In the case of an Internet-dependent user application like
859:
as necessary. Operations may be performed client-side because they require access to information or functionality that is available on the client but not on the server, because the user needs to observe the operations or provide input, or because the server lacks the processing power to perform the
1231:
Load balancing is defined as the methodical and efficient distribution of network or application traffic across multiple servers in a server farm. Each load balancer sits between client devices and backend servers, receiving and then distributing incoming requests to any available server capable of
225:
Whether a computer is a client, a server, or both, is determined by the nature of the application that requires the service functions. For example, a single computer can run a web server and file server software at the same time to serve different data to clients making different kinds of requests.
1105:
occurs in "Separating Data from
Function in a Distributed File System", a 1978 paper by Xerox PARC computer scientists Howard Sturgis, James Mitchell, and Jay Israel. The authors are careful to define the term for readers, and explain that they use it to distinguish between the user and the user's
164:
runs one or more server programs, which share their resources with clients. A client usually does not share any of its resources, but it requests content or service from a server. Clients, therefore, initiate communication sessions with servers, which await incoming requests. Examples of computer
1042:
language called Decode-Encode
Language (DEL). The purpose of this language was to accept commands from one computer (the user-host), which would return status reports to the user as it encoded the commands in network packets. Another DEL-capable computer, the server-host, received the packets,
181:
The "kushagra" characteristic describes the relationship of cooperating programs in an application. The server component provides a function or service to one or many clients, which initiate requests for such services. Servers are classified by the services they provide. For example, a
955:
operation) and sends it back to the client. The client then analyzes the data (a client-side operation), and, when the analysis is complete, displays it to the user (as with Google Earth) and/or transmits the results of calculations back to the server (as with SETI@home).
364:
In each step of this sequence of client–server message exchanges, a computer processes a request and returns data. This is the request-response messaging pattern. When all the requests are met, the sequence is complete and the web browser presents the data to the customer.
951:, rely primarily on client-side operations. They initiate a connection with the server (either in response to a user query, as with Google Earth, or in an automated fashion, as with SETI@home), and request some data. The server selects a data set (a
1219:
In the client-server model, the server is often designed to operate as a centralized system that serves many clients. The computing power, memory and storage requirements of a server must be scaled appropriately to the expected workload.
1043:
decoded them, and returned formatted data to the user-host. A DEL program on the user-host received the results to present to the user. This is a client–server transaction. Development of DEL was just beginning in 1969, the year that the
313:
are designed to exploit a server's obligation to process requests by overloading it with excessive request rates. Encryption should be applied if sensitive information is to be communicated between the client and the server.
1132:
The client-server model does not dictate that server-hosts must have more resources than client-hosts. Rather, it enables any general-purpose computer to extend its capabilities by using the shared resources of other hosts.
927:
to be installed on the client system, allowing the attacker to view the user's screen, record the user's keystrokes, and steal copies of the user's encryption keys, etc. Alternatively, an attacker might employ
1263:, and even peers with modest resources can help to share the load. If a node becomes unavailable, its shared resources remain available as long as other peers offer it. Ideally, a peer does not need to achieve
894:
Programs that run on a user's local computer without ever sending or receiving data over a network are not considered clients, and so the operations of such programs would not be termed client-side operations.
632:, while querying and display of map data takes place on the client side, the server is responsible for permanent storage of map data, resolving user queries into map data to be returned to the client, etc.
270:. To communicate, the computers must have a common language, and they must follow rules so that both the client and the server know what to expect. The language and rules of communication are defined in a
860:
operations in a timely manner for all of the clients it serves. Additionally, if operations can be performed by the client, without sending data over the network, they may take less time, use less
883:, users may have their choice of a number of client programs (e.g. most modern web browsers can request and receive data using both HTTP and FTP). In the case of more specialized applications,
923:
housed on the user's computer system, a client-side attack would normally be an attacker's only opportunity to gain access to the decrypted contents. For instance, the attacker might cause
2171:
697:
can be implemented in almost any language, as long as they can return data to standards-based web browsers (possibly via intermediary programs) in formats which they can use.
1830:
1820:
1504:
226:
The client software can also communicate with server software within the same computer. Communication between servers, such as to synchronize data, is sometimes called
1456:
576:
Server-side operations include both those that are carried out in response to client requests, and non-client-oriented operations such as maintenance tasks.
252:
with how the server performs while fulfilling the request and delivering the response. The client only has to understand the response based on the relevant
1164:
decreased in price and increased in power from the 1980s to the late 1990s, many organizations transitioned computation from centralized servers, such as
2304:
2164:
278:. The application layer protocol defines the basic patterns of the dialogue. To formalize the data exchange even further, the server may implement an
726:
538:, or other device. Operations may be performed server-side because they require access to information or functionality that is not available on the
419:
53:
2360:
1983:
1622:
2439:
2434:
2157:
625:
773:
588:
context, server-side vulnerabilities or attacks refer to those that occur on a server computer system, rather than on the client side, or
466:
100:
1044:
745:
438:
72:
1910:
907:
context, client-side vulnerabilities or attacks refer to those that occur on the client / user's computer system, rather than on the
2319:
2128:
1596:
1173:
792:
485:
279:
119:
752:
445:
79:
1650:
2141:
Distributed Peer-to-Peer
Systems This is a generic style of which popular styles are the client-server and master-slave styles.
1098:
are just programs that run on a host. In the client–server model, a server is more likely to be devoted to the task of serving.
1735:
1690:
1376:
1834:
1582:
1420:
Benatallah, B.; Casati, F.; Toumani, F. (2004). "Web service conversation modeling: A cornerstone for e-business automation".
932:
vulnerabilities to execute malicious code on the client's system without needing to install any permanently resident malware.
2324:
1351:
759:
730:
643:
452:
423:
245:
86:
57:
1312:
297:
A server may receive requests from many distinct clients in a short period. A computer can only perform a limited number of
2444:
1193:
1119:
672:
2429:
2424:
1337:
1039:
741:
687:
434:
68:
2180:
1798:
1528:
876:
677:
657:
267:
1221:
608:
and then be able to access database and other files in the same manner as authorized administrators of the server.
249:
157:
2314:
1279:
1172:, to rich clients. This afforded greater, more individualized dominion over computer resources, but complicated
1268:
912:
589:
310:
2246:
1123:
888:
719:
570:
412:
271:
266:. The client sends a request, and the server returns a response. This exchange of messages is an example of
145:
46:
2299:
2281:
1471:
967:
880:
806:
373:
302:
766:
459:
93:
1952:
1327:
1209:
1134:
940:
861:
810:
617:
389:
1997:
604:. Alternatively, an attacker might break into a server system using vulnerabilities in the underlying
305:
system to prioritize incoming requests from clients to accommodate them. To prevent abuse and maximize
260:
1749:
1704:
1332:
1244:
1181:
929:
872:
836:
562:
515:
393:
253:
1476:
148:
structure that partitions tasks or workloads between the providers of a resource or service, called
2375:
1943:
1302:
1297:
1252:
1149:
has no operating system at all; it is only an input/output interface to the server. In contrast, a
385:
361:
to the webserver. Finally, the webserver returns the result to the client web browser for display.
215:
2380:
2286:
2269:
2193:
2036:
1964:
1916:
1437:
1165:
1004:
963:, commonly encountered computer languages which are evaluated or run on the client side include:
920:
856:
820:
539:
523:
503:
499:
350:
153:
149:
2054:
Cardellini, V.; Colajanni, M.; Yu, P.S. (1999). "Dynamic load balancing on Web-server systems".
2124:
2071:
1906:
1592:
1588:
1292:
1264:
1248:
1185:
1154:
1146:
1012:
947:
and the Great
Internet Mersenne Prime Search, as well as Internet-dependent applications like
904:
865:
585:
547:
283:
275:
263:
1553:
2197:
2063:
2028:
1956:
1898:
1868:
1860:
1739:
1694:
1481:
1429:
1307:
1260:
1142:
1127:
989:
844:
824:
605:
527:
298:
207:
203:
2089:
2241:
2221:
1407:
1322:
1317:
1197:
1177:
997:
597:
346:
199:
1275:; as the availability and load capacity of peers change, the protocol reroutes requests.
871:
When the server serves data in a commonly used manner, for example according to standard
160:
on separate hardware, but both client and server may reside in the same system. A server
1031:), and these appear in the early documents RFC 5 and RFC 4. This usage was continued at
2264:
2236:
1988:
1778:
1032:
960:
636:
369:
354:
327:
287:
211:
170:
161:
60: in this article (some sections). Unsourced material may be challenged and removed.
1935:
334:(the client), the client initiates a request to the bank's web server. The customer's
17:
2418:
2355:
2251:
2226:
2211:
2040:
1680:
1255:
network, peers communicate with each other directly. In peer-to-peer networking, an
1161:
1138:
593:
553:
Client and server programs may be commonly available ones such as free or commercial
195:
1920:
1895:
Proceedings of the 11th annual ACM SIGUCCS conference on User services - SIGUCCS '83
1383:
2256:
1993:
1968:
1441:
1236:
1213:
1189:
1169:
948:
647:
629:
600:
in order to maliciously change or gain unauthorized access to data in the server's
358:
228:
132:
136:
A computer network diagram of clients communicating with a server via the
Internet
2116:
1228:
systems are often employed to scale the server beyond a single physical machine.
2294:
1346:
1150:
952:
908:
840:
709:
694:
558:
543:
402:
331:
191:
35:
2403:
2329:
2231:
2149:
1485:
1355:
977:
916:
884:
852:
814:
566:
554:
535:
519:
502:. This is in contrast to client-side programs and operations which run on the
338:
183:
2075:
1752:
1729:
1707:
1684:
1433:
256:, i.e. the content and the formatting of the data for the requested service.
202:
may be any of the server computer's software and electronic components, from
1256:
1157:, has many resources and does not rely on a server for essential functions.
1090:
always refer to computers. The host is a versatile, multifunction computer;
944:
621:
1505:"What are the differences between server-side and client-side programming?"
2032:
1902:
1793:
2393:
1272:
1225:
1048:
1038:
One context in which researchers used these terms was in the design of a
848:
601:
531:
342:
187:
2067:
1960:
2365:
2334:
2019:
Barros, A. P.; Dumas, M. (2006). "The Rise of Web
Service Ecosystems".
1893:
d'Amore, M. J.; Oberst, D. J. (1983). "Microcomputers and mainframes".
1825:
1008:
924:
733: in this section. Unsourced material may be challenged and removed.
682:
651:
426: in this section. Unsourced material may be challenged and removed.
291:
2062:(3). Institute of Electrical and Electronics Engineers (IEEE): 28–39.
294:. By abstracting access, it facilitates cross-platform data exchange.
1872:
1744:
1699:
993:
306:
286:
for accessing a service. By restricting communication to a specific
1623:"Week 4: Is There a Difference between Client Side and Server Side?"
1282:
are regarded as sub-categories of distributed peer-to-peer systems.
1251:
in a non-hierarchical network. Unlike clients in a client-server or
1934:
Tolia, Niraj; Andersen, David G.; Satyanarayanan, M. (March 2006).
1773:
Sturgis, Howard E.; Mitchell, James George; Israel, Jay E. (1978).
1074:. A host is any computer connected to a network. Whereas the words
2398:
2388:
2339:
2309:
1003:
While formulating the client–server model in the 1960s and 1970s,
335:
166:
2350:
2345:
2216:
2189:
1774:
972:
662:
323:
2153:
1554:"Server-side website programming - Learn web development | MDN"
1529:"Introduction to the server side - Learn web development | MDN"
639:, commonly encountered server-side computer languages include:
1341:
704:
667:
498:
Server-side refers to programs and operations that run on the
397:
29:
1984:"Is the Cloud Really Just the Return of Mainframe Computing?"
309:, the server software may limit the availability to clients.
1821:"Separating data from function in a distributed file system"
1775:"Separating Data from Function in a Distributed File System"
819:
Client-side refers to operations that are performed by the
1936:"Quantifying Interactive User Experience on Thin Clients"
1581:
Lehtinen, Rick; Russell, Deborah; Gangemi, G. T. (2006).
1082:
may refer either to a computer or to a computer program,
248:
of computer resources and a client does not have to be
919:
file or message which could only be decrypted using a
1861:"A Comparison of Thin-Client Computing Architectures"
1259:
in the peer-to-peer communications protocol balances
218:. The sharing of resources of a server constitutes a
353:
interprets the returned data by applying the bank's
2374:
2280:
2204:
561:, communicating with each other using standardized
165:applications that use the client–server model are
2090:"What Is Load Balancing? How Load Balancers Work"
1831:German National Library of Science and Technology
1644:
1642:
996:(announced 1964), where the request was to run a
1859:Nieh, Jason; Yang, S. Jae; Novik, Naomi (2000).
1499:
1497:
1495:
988:An early form of client–server architecture is
542:, or because performing such operations on the
156:. Often clients and servers communicate over a
2123:. Delhi: Pearson Education India. p. 29.
1464:International Journal of Web and Grid Services
1354:, a proprietary client-server architecture by
27:Distributed application structure in computing
2165:
1196:were among the factors that gave rise to the
1106:network node (the client). By 1992, the word
592:. For example, an attacker might exploit an
8:
2121:Software Architecture: A Case Based Approach
1243:) pool their resources and communicate in a
1854:
1852:
1675:
1673:
915:. As an example, if a server contained an
259:Clients and servers exchange messages in a
2172:
2158:
2150:
1743:
1698:
1576:
1574:
1475:
1204:Comparison with peer-to-peer architecture
891:which can only be used with one another.
793:Learn how and when to remove this message
573:which can only be used with one another.
486:Learn how and when to remove this message
120:Learn how and when to remove this message
1616:
1614:
1340:, a proprietary network architecture by
1208:In addition to the client-server model,
887:may write their own server, client, and
569:may write their own server, client, and
131:
1368:
372:applicable to the client–server model:
1457:"A survey on web services composition"
1377:"Distributed Application Architecture"
1509:softwareengineering.stackexchange.com
855:, or other device, and connects to a
7:
1066:have subtly different meanings than
1047:established ARPANET (predecessor of
731:adding citations to reliable sources
626:Great Internet Mersenne Prime Search
424:adding citations to reliable sources
58:adding citations to reliable sources
1455:Dustdar, S.; Schreiner, W. (2005).
1247:. Peers are coequal, or equipotent
1188:. This maturation, more affordable
1110:had entered into general parlance.
1045:United States Department of Defense
1000:, and the response was the output.
514:"Server-side software" refers to a
1649:Espinosa, Christian (2016-04-23).
25:
2117:"1: Software Architecture Primer"
1382:. Sun Microsystem. Archived from
1174:information technology management
815:Pagination § In web browsers
345:, and the webserver accesses the
280:application programming interface
152:, and service requesters, called
1728:Shapiro, Elmer B. (March 1969).
1239:network, two or more computers (
1216:(P2P) application architecture.
708:
401:
34:
1982:Otey, Michael (22 March 2011).
1271:peers make up for any resource
718:needs additional citations for
411:needs additional citations for
301:at any moment, and relies on a
274:. All protocols operate in the
240:Client and server communication
45:needs additional citations for
1352:Configurable Network Computing
693:However, web applications and
546:would be slow, unreliable, or
1:
1194:service-oriented architecture
1120:History of personal computers
43:This article (some sections)
1338:Systems Network Architecture
1040:computer network programming
968:Cascading Style Sheets (CSS)
169:, network printing, and the
2440:Inter-process communication
2435:Application layer protocols
2181:Inter-process communication
1799:Online Etymology Dictionary
1212:applications often use the
1055:Client-host and server-host
1013:Stanford Research Institute
368:This example illustrates a
268:inter-process communication
244:Generally, a service is an
2461:
1117:
804:
394:Server Side Includes (SSI)
383:
2227:Message queue and mailbox
2187:
1486:10.1504/IJWGS.2005.007545
1313:Publish–subscribe pattern
1184:developed for a specific
1101:An early use of the word
835:Typically, a client is a
311:Denial of service attacks
2115:Varma, Vasudeva (2009).
1584:Computer Security Basics
1434:10.1109/MIC.2004.1260703
1180:matured enough to rival
1145:from the network, and a
2056:IEEE Internet Computing
1422:IEEE Internet Computing
1278:Both client-server and
1124:Decentralized computing
889:communications protocol
571:communications protocol
272:communications protocol
146:distributed application
959:In the context of the
807:Client-side prediction
635:In the context of the
522:, that runs on remote
374:separation of concerns
177:Client and server role
137:
18:Client/server protocol
2033:10.1109/MITP.2006.123
1953:IEEE Computer Society
1903:10.1145/800041.801417
1558:developer.mozilla.org
1533:developer.mozilla.org
1328:Remote procedure call
1210:distributed computing
1135:Centralized computing
1118:Further information:
1114:Centralized computing
992:, dating at least to
941:Distributed computing
864:, and incur a lesser
811:Front-end (computing)
742:"Client–server model"
618:distributed computing
435:"Client–server model"
390:Server-side scripting
282:(API). The API is an
135:
69:"Client–server model"
2445:Network architecture
1627:n3tweb.wordpress.com
1333:Server change number
1245:decentralized system
1200:trend of the 2010s.
1192:, and the advent of
1182:application software
1176:. During the 2000s,
930:cross-site scripting
837:computer application
727:improve this article
516:computer application
420:improve this article
254:application protocol
54:improve this article
2430:Clients (computing)
2425:Servers (computing)
2068:10.1109/4236.769420
1961:10.1109/mc.2006.101
1651:"Decoding the Hack"
1303:Modular programming
1298:Front and back ends
1253:client-queue-client
1005:computer scientists
596:vulnerability in a
526:, reachable from a
386:Backend (computing)
341:may be stored in a
142:client–server model
2376:Software libraries
2217:Memory-mapped file
2000:on 3 December 2013
1837:on 2 December 2013
1658:alpinesecurity.com
1035:in the mid-1970s.
913:in between the two
590:in between the two
351:application server
326:customer accesses
138:
2412:
2411:
2342:(various methods)
2198:computer programs
1792:Harper, Douglas.
1731:Network Timetable
1621:JS (2015-10-15).
1293:Endpoint security
1265:high availability
1232:fulfilling them.
1186:microarchitecture
1155:personal computer
1147:computer terminal
1015:) used the terms
943:projects such as
905:computer security
899:Computer security
843:, that runs on a
803:
802:
795:
777:
620:projects such as
586:computer security
580:Computer security
496:
495:
488:
470:
357:and provides the
290:, it facilitates
284:abstraction layer
276:application layer
264:messaging pattern
130:
129:
122:
104:
16:(Redirected from
2452:
2174:
2167:
2160:
2151:
2144:
2143:
2138:
2137:
2112:
2106:
2105:
2103:
2101:
2086:
2080:
2079:
2051:
2045:
2044:
2016:
2010:
2009:
2007:
2005:
1996:. Archived from
1979:
1973:
1972:
1940:
1931:
1925:
1924:
1890:
1884:
1883:
1881:
1879:
1873:10.7916/D8Z329VF
1865:Academic Commons
1856:
1847:
1846:
1844:
1842:
1833:. Archived from
1817:
1811:
1810:
1808:
1806:
1789:
1783:
1782:
1770:
1764:
1763:
1761:
1759:
1747:
1745:10.17487/RFC0004
1725:
1719:
1718:
1716:
1714:
1702:
1700:10.17487/RFC0005
1677:
1668:
1667:
1665:
1664:
1655:
1646:
1637:
1636:
1634:
1633:
1618:
1609:
1608:
1606:
1605:
1587:(2nd ed.).
1578:
1569:
1568:
1566:
1565:
1550:
1544:
1543:
1541:
1540:
1525:
1519:
1518:
1516:
1515:
1501:
1490:
1489:
1479:
1461:
1452:
1446:
1445:
1417:
1411:
1404:
1398:
1397:
1395:
1394:
1388:
1381:
1373:
1308:Observer pattern
1178:web applications
1143:operating system
1128:Computer cluster
990:remote job entry
831:General concepts
825:computer network
798:
791:
787:
784:
778:
776:
735:
712:
705:
606:operating system
510:General concepts
491:
484:
480:
477:
471:
469:
428:
405:
398:
349:as a client. An
330:services with a
261:request–response
234:server-to-server
158:computer network
125:
118:
114:
111:
105:
103:
62:
38:
30:
21:
2460:
2459:
2455:
2454:
2453:
2451:
2450:
2449:
2415:
2414:
2413:
2408:
2378:
2370:
2284:
2276:
2222:Message passing
2200:
2192:exchange among
2183:
2178:
2148:
2147:
2135:
2133:
2131:
2114:
2113:
2109:
2099:
2097:
2088:
2087:
2083:
2053:
2052:
2048:
2021:IT Professional
2018:
2017:
2013:
2003:
2001:
1981:
1980:
1976:
1938:
1933:
1932:
1928:
1913:
1892:
1891:
1887:
1877:
1875:
1858:
1857:
1850:
1840:
1838:
1819:
1818:
1814:
1804:
1802:
1791:
1790:
1786:
1772:
1771:
1767:
1757:
1755:
1727:
1726:
1722:
1712:
1710:
1679:
1678:
1671:
1662:
1660:
1653:
1648:
1647:
1640:
1631:
1629:
1620:
1619:
1612:
1603:
1601:
1599:
1580:
1579:
1572:
1563:
1561:
1552:
1551:
1547:
1538:
1536:
1527:
1526:
1522:
1513:
1511:
1503:
1502:
1493:
1477:10.1.1.139.4827
1459:
1454:
1453:
1449:
1419:
1418:
1414:
1410:is one example.
1408:X Window System
1405:
1401:
1392:
1390:
1389:on 6 April 2011
1386:
1379:
1375:
1374:
1370:
1365:
1360:
1323:Push technology
1318:Pull technology
1288:
1267:because other,
1206:
1198:cloud computing
1141:loads even its
1130:
1116:
1057:
986:
938:
901:
833:
817:
799:
788:
782:
779:
736:
734:
724:
703:
616:In the case of
614:
598:web application
582:
524:server hardware
512:
492:
481:
475:
472:
429:
427:
417:
396:
382:
347:database server
320:
242:
236:communication.
216:storage devices
200:shared resource
179:
126:
115:
109:
106:
63:
61:
51:
39:
28:
23:
22:
15:
12:
11:
5:
2458:
2456:
2448:
2447:
2442:
2437:
2432:
2427:
2417:
2416:
2410:
2409:
2407:
2406:
2401:
2396:
2391:
2385:
2383:
2372:
2371:
2369:
2368:
2363:
2358:
2353:
2348:
2343:
2337:
2332:
2327:
2322:
2317:
2312:
2307:
2302:
2297:
2291:
2289:
2278:
2277:
2275:
2274:
2273:
2272:
2267:
2259:
2254:
2249:
2244:
2239:
2237:Anonymous pipe
2234:
2229:
2224:
2219:
2214:
2208:
2206:
2202:
2201:
2188:
2185:
2184:
2179:
2177:
2176:
2169:
2162:
2154:
2146:
2145:
2129:
2107:
2096:. June 1, 2014
2081:
2046:
2011:
1989:SQL Server Pro
1974:
1926:
1912:978-0897911160
1911:
1885:
1848:
1812:
1784:
1765:
1720:
1681:Rulifson, Jeff
1669:
1638:
1610:
1597:
1589:O'Reilly Media
1570:
1545:
1520:
1491:
1447:
1412:
1399:
1367:
1366:
1364:
1361:
1359:
1358:
1349:
1344:
1335:
1330:
1325:
1320:
1315:
1310:
1305:
1300:
1295:
1289:
1287:
1284:
1222:Load-balancing
1205:
1202:
1162:microcomputers
1115:
1112:
1056:
1053:
985:
982:
981:
980:
975:
970:
961:World Wide Web
937:
934:
900:
897:
832:
829:
801:
800:
715:
713:
702:
699:
691:
690:
685:
680:
675:
670:
665:
660:
655:
637:World Wide Web
613:
610:
581:
578:
511:
508:
506:. (See below)
494:
493:
408:
406:
381:
378:
370:design pattern
355:business logic
328:online banking
319:
316:
288:content format
241:
238:
196:computer files
178:
175:
171:World Wide Web
128:
127:
42:
40:
33:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
2457:
2446:
2443:
2441:
2438:
2436:
2433:
2431:
2428:
2426:
2423:
2422:
2420:
2405:
2402:
2400:
2397:
2395:
2392:
2390:
2387:
2386:
2384:
2382:
2377:
2373:
2367:
2364:
2362:
2359:
2357:
2354:
2352:
2349:
2347:
2344:
2341:
2338:
2336:
2333:
2331:
2328:
2326:
2323:
2321:
2318:
2316:
2313:
2311:
2308:
2306:
2303:
2301:
2298:
2296:
2293:
2292:
2290:
2288:
2283:
2279:
2271:
2268:
2266:
2263:
2262:
2260:
2258:
2255:
2253:
2252:Shared memory
2250:
2248:
2245:
2243:
2240:
2238:
2235:
2233:
2230:
2228:
2225:
2223:
2220:
2218:
2215:
2213:
2210:
2209:
2207:
2203:
2199:
2195:
2191:
2186:
2182:
2175:
2170:
2168:
2163:
2161:
2156:
2155:
2152:
2142:
2132:
2130:9788131707494
2126:
2122:
2118:
2111:
2108:
2095:
2091:
2085:
2082:
2077:
2073:
2069:
2065:
2061:
2057:
2050:
2047:
2042:
2038:
2034:
2030:
2026:
2022:
2015:
2012:
1999:
1995:
1991:
1990:
1985:
1978:
1975:
1970:
1966:
1962:
1958:
1954:
1950:
1946:
1945:
1937:
1930:
1927:
1922:
1918:
1914:
1908:
1904:
1900:
1897:. p. 7.
1896:
1889:
1886:
1874:
1870:
1866:
1862:
1855:
1853:
1849:
1836:
1832:
1828:
1827:
1822:
1816:
1813:
1801:
1800:
1795:
1788:
1785:
1780:
1776:
1769:
1766:
1754:
1751:
1746:
1741:
1737:
1733:
1732:
1724:
1721:
1709:
1706:
1701:
1696:
1692:
1688:
1687:
1683:(June 1969).
1682:
1676:
1674:
1670:
1659:
1652:
1645:
1643:
1639:
1628:
1624:
1617:
1615:
1611:
1600:
1598:9780596006693
1594:
1590:
1586:
1585:
1577:
1575:
1571:
1559:
1555:
1549:
1546:
1534:
1530:
1524:
1521:
1510:
1506:
1500:
1498:
1496:
1492:
1487:
1483:
1478:
1473:
1469:
1465:
1458:
1451:
1448:
1443:
1439:
1435:
1431:
1427:
1423:
1416:
1413:
1409:
1403:
1400:
1385:
1378:
1372:
1369:
1362:
1357:
1353:
1350:
1348:
1345:
1343:
1339:
1336:
1334:
1331:
1329:
1326:
1324:
1321:
1319:
1316:
1314:
1311:
1309:
1306:
1304:
1301:
1299:
1296:
1294:
1291:
1290:
1285:
1283:
1281:
1276:
1274:
1270:
1266:
1262:
1258:
1254:
1250:
1246:
1242:
1238:
1233:
1229:
1227:
1223:
1217:
1215:
1211:
1203:
1201:
1199:
1195:
1191:
1187:
1183:
1179:
1175:
1171:
1170:minicomputers
1167:
1163:
1158:
1156:
1152:
1148:
1144:
1140:
1139:diskless node
1136:
1129:
1125:
1121:
1113:
1111:
1109:
1104:
1099:
1097:
1093:
1089:
1085:
1081:
1077:
1073:
1069:
1065:
1061:
1054:
1052:
1050:
1046:
1041:
1036:
1034:
1030:
1026:
1022:
1018:
1014:
1010:
1006:
1001:
999:
995:
991:
984:Early history
983:
979:
976:
974:
971:
969:
966:
965:
964:
962:
957:
954:
950:
946:
942:
935:
933:
931:
926:
922:
918:
914:
910:
906:
898:
896:
892:
890:
886:
882:
878:
874:
869:
867:
863:
858:
854:
850:
846:
842:
838:
830:
828:
826:
822:
816:
812:
808:
797:
794:
786:
783:December 2016
775:
772:
768:
765:
761:
758:
754:
751:
747:
744: –
743:
739:
738:Find sources:
732:
728:
722:
721:
716:This section
714:
711:
707:
706:
700:
698:
696:
689:
686:
684:
681:
679:
676:
674:
671:
669:
666:
664:
661:
659:
656:
653:
649:
645:
642:
641:
640:
638:
633:
631:
627:
623:
619:
611:
609:
607:
603:
599:
595:
594:SQL injection
591:
587:
579:
577:
574:
572:
568:
564:
560:
556:
551:
549:
545:
541:
537:
533:
529:
525:
521:
517:
509:
507:
505:
501:
490:
487:
479:
476:December 2016
468:
465:
461:
458:
454:
451:
447:
444:
440:
437: –
436:
432:
431:Find sources:
425:
421:
415:
414:
409:This section
407:
404:
400:
399:
395:
391:
387:
379:
377:
375:
371:
366:
362:
360:
356:
352:
348:
344:
340:
337:
333:
329:
325:
317:
315:
312:
308:
304:
300:
295:
293:
289:
285:
281:
277:
273:
269:
265:
262:
257:
255:
251:
247:
239:
237:
235:
231:
230:
223:
221:
217:
213:
209:
205:
201:
197:
193:
189:
185:
176:
174:
172:
168:
163:
159:
155:
151:
147:
143:
134:
124:
121:
113:
102:
99:
95:
92:
88:
85:
81:
78:
74:
71: –
70:
66:
65:Find sources:
59:
55:
49:
48:
41:
37:
32:
31:
19:
2295:Apple events
2140:
2134:. Retrieved
2120:
2110:
2098:. Retrieved
2093:
2084:
2059:
2055:
2049:
2024:
2020:
2014:
2002:. Retrieved
1998:the original
1994:Penton Media
1987:
1977:
1948:
1942:
1929:
1894:
1888:
1876:. Retrieved
1864:
1839:. Retrieved
1835:the original
1824:
1815:
1803:. Retrieved
1797:
1787:
1768:
1756:. Retrieved
1730:
1723:
1711:. Retrieved
1685:
1661:. Retrieved
1657:
1630:. Retrieved
1626:
1602:. Retrieved
1583:
1562:. Retrieved
1560:. 2023-06-30
1557:
1548:
1537:. Retrieved
1535:. 2023-11-05
1532:
1523:
1512:. Retrieved
1508:
1467:
1463:
1450:
1425:
1421:
1415:
1402:
1391:. Retrieved
1384:the original
1371:
1280:master-slave
1277:
1240:
1237:peer-to-peer
1234:
1230:
1218:
1214:peer-to-peer
1207:
1190:mass storage
1159:
1153:, such as a
1131:
1107:
1102:
1100:
1095:
1091:
1087:
1083:
1079:
1075:
1071:
1067:
1063:
1059:
1058:
1037:
1028:
1024:
1021:serving host
1020:
1016:
1002:
987:
958:
949:Google Earth
939:
902:
893:
870:
839:, such as a
834:
818:
789:
780:
770:
763:
756:
749:
737:
725:Please help
720:verification
717:
692:
654:environments
648:Visual Basic
634:
630:Google Earth
615:
583:
575:
559:web browsers
552:
518:, such as a
513:
497:
482:
473:
463:
456:
449:
442:
430:
418:Please help
413:verification
410:
367:
363:
321:
307:availability
296:
258:
243:
233:
229:inter-server
227:
224:
219:
180:
141:
139:
116:
107:
97:
90:
83:
76:
64:
52:Please help
47:verification
44:
2100:January 21,
1878:28 November
1841:29 November
1805:30 November
1758:30 November
1713:30 November
1347:Thin client
1151:rich client
1088:client-host
1084:server-host
1064:server-host
1060:Client-host
1017:server-host
953:server-side
909:server side
885:programmers
841:web browser
701:Client side
567:programmers
555:web servers
544:client side
380:Server-side
339:credentials
332:web browser
246:abstraction
192:file server
2419:Categories
2381:frameworks
2330:OpenBinder
2232:Named pipe
2136:2017-07-04
2004:1 December
1779:Xerox PARC
1663:2017-07-07
1632:2017-07-07
1604:2017-07-07
1564:2023-11-13
1539:2023-11-13
1514:2016-12-13
1393:2009-06-16
1356:JD Edwards
1166:mainframes
1033:Xerox PARC
1029:using-host
978:JavaScript
853:smartphone
805:See also:
753:newspapers
536:smartphone
520:web server
446:newspapers
384:See also:
303:scheduling
212:processors
184:web server
110:March 2024
80:newspapers
2287:standards
2282:Protocols
2247:Semaphore
2076:1089-7801
2041:206469224
2027:(5): 31.
1955:: 46–52.
1472:CiteSeerX
1428:: 46–54.
1269:redundant
1257:algorithm
1025:user-host
1007:building
945:SETI@home
917:encrypted
873:protocols
862:bandwidth
847:'s local
622:SETI@home
563:protocols
530:'s local
250:concerned
188:web pages
2394:libevent
2261:Sockets
1944:Computer
1921:14248076
1794:"server"
1286:See also
1273:downtime
1226:failover
1049:Internet
1011:(at the
936:Examples
875:such as
866:security
849:computer
695:services
624:and the
612:Examples
602:database
548:insecure
532:computer
343:database
204:programs
2366:XML-RPC
2335:Sun RPC
2265:Network
2205:Methods
2194:threads
1969:8399655
1826:GetInfo
1442:8121624
1096:servers
1092:clients
1009:ARPANET
925:malware
767:scholar
683:Node.js
652:ASP.NET
565:. Or,
460:scholar
322:When a
318:Example
292:parsing
220:service
194:serves
186:serves
154:clients
150:servers
94:scholar
2356:Thrift
2257:Signal
2127:
2074:
2039:
1967:
1919:
1909:
1595:
1474:
1440:
1126:, and
1108:server
1103:client
1080:client
1076:server
1072:server
1068:client
1023:) and
994:OS/360
868:risk.
857:server
821:client
813:, and
769:
762:
755:
748:
740:
673:Python
540:client
504:client
500:server
462:
455:
448:
441:
433:
392:, and
359:output
190:and a
96:
89:
82:
75:
67:
2399:SIMPL
2389:D-Bus
2340:POSIX
2310:D-Bus
2305:CORBA
2094:NGINX
2037:S2CID
1965:S2CID
1951:(3).
1939:(PDF)
1917:S2CID
1654:(PDF)
1470:: 1.
1460:(PDF)
1438:S2CID
1387:(PDF)
1380:(PDF)
1363:Notes
1249:nodes
1241:peers
1235:In a
911:, or
903:In a
823:in a
774:JSTOR
760:books
688:Swift
584:In a
467:JSTOR
453:books
336:login
299:tasks
167:email
144:is a
101:JSTOR
87:books
2404:LINX
2379:and
2361:TIPC
2351:REST
2346:SOAP
2300:COM+
2285:and
2270:Unix
2242:Pipe
2212:File
2190:Data
2125:ISBN
2102:2020
2072:ISSN
2006:2013
1907:ISBN
1880:2018
1843:2013
1807:2013
1760:2013
1736:IETF
1715:2013
1691:IETF
1593:ISBN
1406:The
1261:load
1224:and
1168:and
1094:and
1086:and
1078:and
1070:and
1062:and
1027:(or
1019:(or
973:HTML
877:HTTP
845:user
746:news
678:Ruby
663:Perl
658:Java
557:and
528:user
439:news
324:bank
214:and
208:data
206:and
198:. A
162:host
140:The
73:news
2325:ICE
2320:DCE
2315:DDS
2196:in
2064:doi
2029:doi
1957:doi
1899:doi
1869:doi
1750:RFC
1740:doi
1705:RFC
1695:doi
1686:DEL
1482:doi
1430:doi
1342:IBM
1160:As
1051:).
998:job
921:key
881:FTP
879:or
729:by
668:PHP
650:in
646:or
422:by
232:or
210:to
56:by
2421::
2139:.
2119:.
2092:.
2070:.
2058:.
2035:.
2023:.
1992:.
1986:.
1963:.
1949:39
1947:.
1941:.
1915:.
1905:.
1867:.
1863:.
1851:^
1829:.
1823:.
1796:.
1777:.
1748:.
1738:.
1734:.
1703:.
1693:.
1689:.
1672:^
1656:.
1641:^
1625:.
1613:^
1591:.
1573:^
1556:.
1531:.
1507:.
1494:^
1480:.
1466:.
1462:.
1436:.
1424:.
1122:,
851:,
827:.
809:,
644:C#
550:.
534:,
388:,
376:.
222:.
173:.
2173:e
2166:t
2159:v
2104:.
2078:.
2066::
2060:3
2043:.
2031::
2025:8
2008:.
1971:.
1959::
1923:.
1901::
1882:.
1871::
1845:.
1809:.
1781:.
1762:.
1753:4
1742::
1717:.
1708:5
1697::
1666:.
1635:.
1607:.
1567:.
1542:.
1517:.
1488:.
1484::
1468:1
1444:.
1432::
1426:8
1396:.
796:)
790:(
785:)
781:(
771:·
764:·
757:·
750:·
723:.
489:)
483:(
478:)
474:(
464:·
457:·
450:·
443:·
416:.
123:)
117:(
112:)
108:(
98:·
91:·
84:·
77:·
50:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.