Knowledge

Client–server model

Source 📝

133: 710: 403: 36: 1137:, however, specifically allocates a large number of resources to a small number of computers. The more computation is offloaded from client-hosts to the central computers, the simpler the client-hosts can be. It relies heavily on network resources (servers and infrastructure) for computation and storage. A 628:, while the bulk of the operations occur on the client side, the servers are responsible for coordinating the clients, sending them data to analyze, receiving and storing results, providing reporting functionality to project administrators, etc. In the case of an Internet-dependent user application like 859:
as necessary. Operations may be performed client-side because they require access to information or functionality that is available on the client but not on the server, because the user needs to observe the operations or provide input, or because the server lacks the processing power to perform the
1231:
Load balancing is defined as the methodical and efficient distribution of network or application traffic across multiple servers in a server farm. Each load balancer sits between client devices and backend servers, receiving and then distributing incoming requests to any available server capable of
225:
Whether a computer is a client, a server, or both, is determined by the nature of the application that requires the service functions. For example, a single computer can run a web server and file server software at the same time to serve different data to clients making different kinds of requests.
1105:
occurs in "Separating Data from Function in a Distributed File System", a 1978 paper by Xerox PARC computer scientists Howard Sturgis, James Mitchell, and Jay Israel. The authors are careful to define the term for readers, and explain that they use it to distinguish between the user and the user's
164:
runs one or more server programs, which share their resources with clients. A client usually does not share any of its resources, but it requests content or service from a server. Clients, therefore, initiate communication sessions with servers, which await incoming requests. Examples of computer
1042:
language called Decode-Encode Language (DEL). The purpose of this language was to accept commands from one computer (the user-host), which would return status reports to the user as it encoded the commands in network packets. Another DEL-capable computer, the server-host, received the packets,
181:
The "kushagra" characteristic describes the relationship of cooperating programs in an application. The server component provides a function or service to one or many clients, which initiate requests for such services. Servers are classified by the services they provide. For example, a
955:
operation) and sends it back to the client. The client then analyzes the data (a client-side operation), and, when the analysis is complete, displays it to the user (as with Google Earth) and/or transmits the results of calculations back to the server (as with SETI@home).
364:
In each step of this sequence of client–server message exchanges, a computer processes a request and returns data. This is the request-response messaging pattern. When all the requests are met, the sequence is complete and the web browser presents the data to the customer.
951:, rely primarily on client-side operations. They initiate a connection with the server (either in response to a user query, as with Google Earth, or in an automated fashion, as with SETI@home), and request some data. The server selects a data set (a 1219:
In the client-server model, the server is often designed to operate as a centralized system that serves many clients. The computing power, memory and storage requirements of a server must be scaled appropriately to the expected workload.
1043:
decoded them, and returned formatted data to the user-host. A DEL program on the user-host received the results to present to the user. This is a client–server transaction. Development of DEL was just beginning in 1969, the year that the
313:
are designed to exploit a server's obligation to process requests by overloading it with excessive request rates. Encryption should be applied if sensitive information is to be communicated between the client and the server.
1132:
The client-server model does not dictate that server-hosts must have more resources than client-hosts. Rather, it enables any general-purpose computer to extend its capabilities by using the shared resources of other hosts.
927:
to be installed on the client system, allowing the attacker to view the user's screen, record the user's keystrokes, and steal copies of the user's encryption keys, etc. Alternatively, an attacker might employ
1263:, and even peers with modest resources can help to share the load. If a node becomes unavailable, its shared resources remain available as long as other peers offer it. Ideally, a peer does not need to achieve 894:
Programs that run on a user's local computer without ever sending or receiving data over a network are not considered clients, and so the operations of such programs would not be termed client-side operations.
632:, while querying and display of map data takes place on the client side, the server is responsible for permanent storage of map data, resolving user queries into map data to be returned to the client, etc. 270:. To communicate, the computers must have a common language, and they must follow rules so that both the client and the server know what to expect. The language and rules of communication are defined in a 860:
operations in a timely manner for all of the clients it serves. Additionally, if operations can be performed by the client, without sending data over the network, they may take less time, use less
883:, users may have their choice of a number of client programs (e.g. most modern web browsers can request and receive data using both HTTP and FTP). In the case of more specialized applications, 923:
housed on the user's computer system, a client-side attack would normally be an attacker's only opportunity to gain access to the decrypted contents. For instance, the attacker might cause
2171: 697:
can be implemented in almost any language, as long as they can return data to standards-based web browsers (possibly via intermediary programs) in formats which they can use.
1830: 1820: 1504: 226:
The client software can also communicate with server software within the same computer. Communication between servers, such as to synchronize data, is sometimes called
1456: 576:
Server-side operations include both those that are carried out in response to client requests, and non-client-oriented operations such as maintenance tasks.
252:
with how the server performs while fulfilling the request and delivering the response. The client only has to understand the response based on the relevant
1164:
decreased in price and increased in power from the 1980s to the late 1990s, many organizations transitioned computation from centralized servers, such as
2304: 2164: 278:. The application layer protocol defines the basic patterns of the dialogue. To formalize the data exchange even further, the server may implement an 726: 538:, or other device. Operations may be performed server-side because they require access to information or functionality that is not available on the 419: 53: 2360: 1983: 1622: 2439: 2434: 2157: 625: 773: 588:
context, server-side vulnerabilities or attacks refer to those that occur on a server computer system, rather than on the client side, or
466: 100: 1044: 745: 438: 72: 1910: 907:
context, client-side vulnerabilities or attacks refer to those that occur on the client / user's computer system, rather than on the
2319: 2128: 1596: 1173: 792: 485: 279: 119: 752: 445: 79: 1650: 2141:
Distributed Peer-to-Peer Systems This is a generic style of which popular styles are the client-server and master-slave styles.
1098:
are just programs that run on a host. In the client–server model, a server is more likely to be devoted to the task of serving.
1735: 1690: 1376: 1834: 1582: 1420:
Benatallah, B.; Casati, F.; Toumani, F. (2004). "Web service conversation modeling: A cornerstone for e-business automation".
932:
vulnerabilities to execute malicious code on the client's system without needing to install any permanently resident malware.
2324: 1351: 759: 730: 643: 452: 423: 245: 86: 57: 1312: 297:
A server may receive requests from many distinct clients in a short period. A computer can only perform a limited number of
2444: 1193: 1119: 672: 2429: 2424: 1337: 1039: 741: 687: 434: 68: 2180: 1798: 1528: 876: 677: 657: 267: 1221: 608:
and then be able to access database and other files in the same manner as authorized administrators of the server.
249: 157: 2314: 1279: 1172:, to rich clients. This afforded greater, more individualized dominion over computer resources, but complicated 1268: 912: 589: 310: 2246: 1123: 888: 719: 570: 412: 271: 266:. The client sends a request, and the server returns a response. This exchange of messages is an example of 145: 46: 2299: 2281: 1471: 967: 880: 806: 373: 302: 766: 459: 93: 1952: 1327: 1209: 1134: 940: 861: 810: 617: 389: 1997: 604:. Alternatively, an attacker might break into a server system using vulnerabilities in the underlying 305:
system to prioritize incoming requests from clients to accommodate them. To prevent abuse and maximize
260: 1749: 1704: 1332: 1244: 1181: 929: 872: 836: 562: 515: 393: 253: 1476: 148:
structure that partitions tasks or workloads between the providers of a resource or service, called
2375: 1943: 1302: 1297: 1252: 1149:
has no operating system at all; it is only an input/output interface to the server. In contrast, a
385: 361:
to the webserver. Finally, the webserver returns the result to the client web browser for display.
215: 2380: 2286: 2269: 2193: 2036: 1964: 1916: 1437: 1165: 1004: 963:, commonly encountered computer languages which are evaluated or run on the client side include: 920: 856: 820: 539: 523: 503: 499: 350: 153: 149: 2054:
Cardellini, V.; Colajanni, M.; Yu, P.S. (1999). "Dynamic load balancing on Web-server systems".
2124: 2071: 1906: 1592: 1588: 1292: 1264: 1248: 1185: 1154: 1146: 1012: 947:
and the Great Internet Mersenne Prime Search, as well as Internet-dependent applications like
904: 865: 585: 547: 283: 275: 263: 1553: 2197: 2063: 2028: 1956: 1898: 1868: 1860: 1739: 1694: 1481: 1429: 1307: 1260: 1142: 1127: 989: 844: 824: 605: 527: 298: 207: 203: 2089: 2241: 2221: 1407: 1322: 1317: 1197: 1177: 997: 597: 346: 199: 1275:; as the availability and load capacity of peers change, the protocol reroutes requests. 871:
When the server serves data in a commonly used manner, for example according to standard
160:
on separate hardware, but both client and server may reside in the same system. A server
1031:), and these appear in the early documents RFC 5 and RFC 4. This usage was continued at 2264: 2236: 1988: 1778: 1032: 960: 636: 369: 354: 327: 287: 211: 170: 161: 60: in this article (some sections). Unsourced material may be challenged and removed. 1935: 334:(the client), the client initiates a request to the bank's web server. The customer's 17: 2418: 2355: 2251: 2226: 2211: 2040: 1680: 1255:
network, peers communicate with each other directly. In peer-to-peer networking, an
1161: 1138: 593: 553:
Client and server programs may be commonly available ones such as free or commercial
195: 1920: 1895:
Proceedings of the 11th annual ACM SIGUCCS conference on User services - SIGUCCS '83
1383: 2256: 1993: 1968: 1441: 1236: 1213: 1189: 1169: 948: 647: 629: 600:
in order to maliciously change or gain unauthorized access to data in the server's
358: 228: 132: 136:
A computer network diagram of clients communicating with a server via the Internet
2116: 1228:
systems are often employed to scale the server beyond a single physical machine.
2294: 1346: 1150: 952: 908: 840: 709: 694: 558: 543: 402: 331: 191: 35: 2403: 2329: 2231: 2149: 1485: 1355: 977: 916: 884: 852: 814: 566: 554: 535: 519: 502:. This is in contrast to client-side programs and operations which run on the 338: 183: 2075: 1752: 1729: 1707: 1684: 1433: 256:, i.e. the content and the formatting of the data for the requested service. 202:
may be any of the server computer's software and electronic components, from
1256: 1157:, has many resources and does not rely on a server for essential functions. 1090:
always refer to computers. The host is a versatile, multifunction computer;
944: 621: 1505:"What are the differences between server-side and client-side programming?" 2032: 1902: 1793: 2393: 1272: 1225: 1048: 1038:
One context in which researchers used these terms was in the design of a
848: 601: 531: 342: 187: 2067: 1960: 2365: 2334: 2019:
Barros, A. P.; Dumas, M. (2006). "The Rise of Web Service Ecosystems".
1893:
d'Amore, M. J.; Oberst, D. J. (1983). "Microcomputers and mainframes".
1825: 1008: 924: 733: in this section. Unsourced material may be challenged and removed. 682: 651: 426: in this section. Unsourced material may be challenged and removed. 291: 2062:(3). Institute of Electrical and Electronics Engineers (IEEE): 28–39. 294:. By abstracting access, it facilitates cross-platform data exchange. 1872: 1744: 1699: 993: 306: 286:
for accessing a service. By restricting communication to a specific
1623:"Week 4: Is There a Difference between Client Side and Server Side?" 1282:
are regarded as sub-categories of distributed peer-to-peer systems.
1251:
in a non-hierarchical network. Unlike clients in a client-server or
1934:
Tolia, Niraj; Andersen, David G.; Satyanarayanan, M. (March 2006).
1773:
Sturgis, Howard E.; Mitchell, James George; Israel, Jay E. (1978).
1074:. A host is any computer connected to a network. Whereas the words 2398: 2388: 2339: 2309: 1003:
While formulating the client–server model in the 1960s and 1970s,
335: 166: 2350: 2345: 2216: 2189: 1774: 972: 662: 323: 2153: 1554:"Server-side website programming - Learn web development | MDN" 1529:"Introduction to the server side - Learn web development | MDN" 639:, commonly encountered server-side computer languages include: 1341: 704: 667: 498:
Server-side refers to programs and operations that run on the
397: 29: 1984:"Is the Cloud Really Just the Return of Mainframe Computing?" 309:, the server software may limit the availability to clients. 1821:"Separating data from function in a distributed file system" 1775:"Separating Data from Function in a Distributed File System" 819:
Client-side refers to operations that are performed by the
1936:"Quantifying Interactive User Experience on Thin Clients" 1581:
Lehtinen, Rick; Russell, Deborah; Gangemi, G. T. (2006).
1082:
may refer either to a computer or to a computer program,
248:
of computer resources and a client does not have to be
919:
file or message which could only be decrypted using a
1861:"A Comparison of Thin-Client Computing Architectures" 1259:
in the peer-to-peer communications protocol balances
218:. The sharing of resources of a server constitutes a 353:
interprets the returned data by applying the bank's
2374: 2280: 2204: 561:, communicating with each other using standardized 165:applications that use the client–server model are 2090:"What Is Load Balancing? How Load Balancers Work" 1831:German National Library of Science and Technology 1644: 1642: 996:(announced 1964), where the request was to run a 1859:Nieh, Jason; Yang, S. Jae; Novik, Naomi (2000). 1499: 1497: 1495: 988:An early form of client–server architecture is 542:, or because performing such operations on the 156:. Often clients and servers communicate over a 2123:. Delhi: Pearson Education India. p. 29. 1464:International Journal of Web and Grid Services 1354:, a proprietary client-server architecture by 27:Distributed application structure in computing 2165: 1196:were among the factors that gave rise to the 1106:network node (the client). By 1992, the word 592:. For example, an attacker might exploit an 8: 2121:Software Architecture: A Case Based Approach 1243:) pool their resources and communicate in a 1854: 1852: 1675: 1673: 915:. As an example, if a server contained an 259:Clients and servers exchange messages in a 2172: 2158: 2150: 1743: 1698: 1576: 1574: 1475: 1204:Comparison with peer-to-peer architecture 891:which can only be used with one another. 793:Learn how and when to remove this message 573:which can only be used with one another. 486:Learn how and when to remove this message 120:Learn how and when to remove this message 1616: 1614: 1340:, a proprietary network architecture by 1208:In addition to the client-server model, 887:may write their own server, client, and 569:may write their own server, client, and 131: 1368: 372:applicable to the client–server model: 1457:"A survey on web services composition" 1377:"Distributed Application Architecture" 1509:softwareengineering.stackexchange.com 855:, or other device, and connects to a 7: 1066:have subtly different meanings than 1047:established ARPANET (predecessor of 731:adding citations to reliable sources 626:Great Internet Mersenne Prime Search 424:adding citations to reliable sources 58:adding citations to reliable sources 1455:Dustdar, S.; Schreiner, W. (2005). 1247:. Peers are coequal, or equipotent 1188:. This maturation, more affordable 1110:had entered into general parlance. 1045:United States Department of Defense 1000:, and the response was the output. 514:"Server-side software" refers to a 1649:Espinosa, Christian (2016-04-23). 25: 2117:"1: Software Architecture Primer" 1382:. Sun Microsystem. Archived from 1174:information technology management 815:Pagination § In web browsers 345:, and the webserver accesses the 280:application programming interface 152:, and service requesters, called 1728:Shapiro, Elmer B. (March 1969). 1239:network, two or more computers ( 1216:(P2P) application architecture. 708: 401: 34: 1982:Otey, Michael (22 March 2011). 1271:peers make up for any resource 718:needs additional citations for 411:needs additional citations for 301:at any moment, and relies on a 274:. All protocols operate in the 240:Client and server communication 45:needs additional citations for 1352:Configurable Network Computing 693:However, web applications and 546:would be slow, unreliable, or 1: 1194:service-oriented architecture 1120:History of personal computers 43:This article (some sections) 1338:Systems Network Architecture 1040:computer network programming 968:Cascading Style Sheets (CSS) 169:, network printing, and the 2440:Inter-process communication 2435:Application layer protocols 2181:Inter-process communication 1799:Online Etymology Dictionary 1212:applications often use the 1055:Client-host and server-host 1013:Stanford Research Institute 368:This example illustrates a 268:inter-process communication 244:Generally, a service is an 2461: 1117: 804: 394:Server Side Includes (SSI) 383: 2227:Message queue and mailbox 2187: 1486:10.1504/IJWGS.2005.007545 1313:Publish–subscribe pattern 1184:developed for a specific 1101:An early use of the word 835:Typically, a client is a 311:Denial of service attacks 2115:Varma, Vasudeva (2009). 1584:Computer Security Basics 1434:10.1109/MIC.2004.1260703 1180:matured enough to rival 1145:from the network, and a 2056:IEEE Internet Computing 1422:IEEE Internet Computing 1278:Both client-server and 1124:Decentralized computing 889:communications protocol 571:communications protocol 272:communications protocol 146:distributed application 959:In the context of the 807:Client-side prediction 635:In the context of the 522:, that runs on remote 374:separation of concerns 177:Client and server role 137: 18:Client/server protocol 2033:10.1109/MITP.2006.123 1953:IEEE Computer Society 1903:10.1145/800041.801417 1558:developer.mozilla.org 1533:developer.mozilla.org 1328:Remote procedure call 1210:distributed computing 1135:Centralized computing 1118:Further information: 1114:Centralized computing 992:, dating at least to 941:Distributed computing 864:, and incur a lesser 811:Front-end (computing) 742:"Client–server model" 618:distributed computing 435:"Client–server model" 390:Server-side scripting 282:(API). The API is an 135: 69:"Client–server model" 2445:Network architecture 1627:n3tweb.wordpress.com 1333:Server change number 1245:decentralized system 1200:trend of the 2010s. 1192:, and the advent of 1182:application software 1176:. During the 2000s, 930:cross-site scripting 837:computer application 727:improve this article 516:computer application 420:improve this article 254:application protocol 54:improve this article 2430:Clients (computing) 2425:Servers (computing) 2068:10.1109/4236.769420 1961:10.1109/mc.2006.101 1651:"Decoding the Hack" 1303:Modular programming 1298:Front and back ends 1253:client-queue-client 1005:computer scientists 596:vulnerability in a 526:, reachable from a 386:Backend (computing) 341:may be stored in a 142:client–server model 2376:Software libraries 2217:Memory-mapped file 2000:on 3 December 2013 1837:on 2 December 2013 1658:alpinesecurity.com 1035:in the mid-1970s. 913:in between the two 590:in between the two 351:application server 326:customer accesses 138: 2412: 2411: 2342:(various methods) 2198:computer programs 1792:Harper, Douglas. 1731:Network Timetable 1621:JS (2015-10-15). 1293:Endpoint security 1265:high availability 1232:fulfilling them. 1186:microarchitecture 1155:personal computer 1147:computer terminal 1015:) used the terms 943:projects such as 905:computer security 899:Computer security 843:, that runs on a 803: 802: 795: 777: 620:projects such as 586:computer security 580:Computer security 496: 495: 488: 470: 357:and provides the 290:, it facilitates 284:abstraction layer 276:application layer 264:messaging pattern 130: 129: 122: 104: 16:(Redirected from 2452: 2174: 2167: 2160: 2151: 2144: 2143: 2138: 2137: 2112: 2106: 2105: 2103: 2101: 2086: 2080: 2079: 2051: 2045: 2044: 2016: 2010: 2009: 2007: 2005: 1996:. Archived from 1979: 1973: 1972: 1940: 1931: 1925: 1924: 1890: 1884: 1883: 1881: 1879: 1873:10.7916/D8Z329VF 1865:Academic Commons 1856: 1847: 1846: 1844: 1842: 1833:. Archived from 1817: 1811: 1810: 1808: 1806: 1789: 1783: 1782: 1770: 1764: 1763: 1761: 1759: 1747: 1745:10.17487/RFC0004 1725: 1719: 1718: 1716: 1714: 1702: 1700:10.17487/RFC0005 1677: 1668: 1667: 1665: 1664: 1655: 1646: 1637: 1636: 1634: 1633: 1618: 1609: 1608: 1606: 1605: 1587:(2nd ed.). 1578: 1569: 1568: 1566: 1565: 1550: 1544: 1543: 1541: 1540: 1525: 1519: 1518: 1516: 1515: 1501: 1490: 1489: 1479: 1461: 1452: 1446: 1445: 1417: 1411: 1404: 1398: 1397: 1395: 1394: 1388: 1381: 1373: 1308:Observer pattern 1178:web applications 1143:operating system 1128:Computer cluster 990:remote job entry 831:General concepts 825:computer network 798: 791: 787: 784: 778: 776: 735: 712: 705: 606:operating system 510:General concepts 491: 484: 480: 477: 471: 469: 428: 405: 398: 349:as a client. An 330:services with a 261:request–response 234:server-to-server 158:computer network 125: 118: 114: 111: 105: 103: 62: 38: 30: 21: 2460: 2459: 2455: 2454: 2453: 2451: 2450: 2449: 2415: 2414: 2413: 2408: 2378: 2370: 2284: 2276: 2222:Message passing 2200: 2192:exchange among 2183: 2178: 2148: 2147: 2135: 2133: 2131: 2114: 2113: 2109: 2099: 2097: 2088: 2087: 2083: 2053: 2052: 2048: 2021:IT Professional 2018: 2017: 2013: 2003: 2001: 1981: 1980: 1976: 1938: 1933: 1932: 1928: 1913: 1892: 1891: 1887: 1877: 1875: 1858: 1857: 1850: 1840: 1838: 1819: 1818: 1814: 1804: 1802: 1791: 1790: 1786: 1772: 1771: 1767: 1757: 1755: 1727: 1726: 1722: 1712: 1710: 1679: 1678: 1671: 1662: 1660: 1653: 1648: 1647: 1640: 1631: 1629: 1620: 1619: 1612: 1603: 1601: 1599: 1580: 1579: 1572: 1563: 1561: 1552: 1551: 1547: 1538: 1536: 1527: 1526: 1522: 1513: 1511: 1503: 1502: 1493: 1477:10.1.1.139.4827 1459: 1454: 1453: 1449: 1419: 1418: 1414: 1410:is one example. 1408:X Window System 1405: 1401: 1392: 1390: 1389:on 6 April 2011 1386: 1379: 1375: 1374: 1370: 1365: 1360: 1323:Push technology 1318:Pull technology 1288: 1267:because other, 1206: 1198:cloud computing 1141:loads even its 1130: 1116: 1057: 986: 938: 901: 833: 817: 799: 788: 782: 779: 736: 734: 724: 703: 616:In the case of 614: 598:web application 582: 524:server hardware 512: 492: 481: 475: 472: 429: 427: 417: 396: 382: 347:database server 320: 242: 236:communication. 216:storage devices 200:shared resource 179: 126: 115: 109: 106: 63: 61: 51: 39: 28: 23: 22: 15: 12: 11: 5: 2458: 2456: 2448: 2447: 2442: 2437: 2432: 2427: 2417: 2416: 2410: 2409: 2407: 2406: 2401: 2396: 2391: 2385: 2383: 2372: 2371: 2369: 2368: 2363: 2358: 2353: 2348: 2343: 2337: 2332: 2327: 2322: 2317: 2312: 2307: 2302: 2297: 2291: 2289: 2278: 2277: 2275: 2274: 2273: 2272: 2267: 2259: 2254: 2249: 2244: 2239: 2237:Anonymous pipe 2234: 2229: 2224: 2219: 2214: 2208: 2206: 2202: 2201: 2188: 2185: 2184: 2179: 2177: 2176: 2169: 2162: 2154: 2146: 2145: 2129: 2107: 2096:. June 1, 2014 2081: 2046: 2011: 1989:SQL Server Pro 1974: 1926: 1912:978-0897911160 1911: 1885: 1848: 1812: 1784: 1765: 1720: 1681:Rulifson, Jeff 1669: 1638: 1610: 1597: 1589:O'Reilly Media 1570: 1545: 1520: 1491: 1447: 1412: 1399: 1367: 1366: 1364: 1361: 1359: 1358: 1349: 1344: 1335: 1330: 1325: 1320: 1315: 1310: 1305: 1300: 1295: 1289: 1287: 1284: 1222:Load-balancing 1205: 1202: 1162:microcomputers 1115: 1112: 1056: 1053: 985: 982: 981: 980: 975: 970: 961:World Wide Web 937: 934: 900: 897: 832: 829: 801: 800: 715: 713: 702: 699: 691: 690: 685: 680: 675: 670: 665: 660: 655: 637:World Wide Web 613: 610: 581: 578: 511: 508: 506:. (See below) 494: 493: 408: 406: 381: 378: 370:design pattern 355:business logic 328:online banking 319: 316: 288:content format 241: 238: 196:computer files 178: 175: 171:World Wide Web 128: 127: 42: 40: 33: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 2457: 2446: 2443: 2441: 2438: 2436: 2433: 2431: 2428: 2426: 2423: 2422: 2420: 2405: 2402: 2400: 2397: 2395: 2392: 2390: 2387: 2386: 2384: 2382: 2377: 2373: 2367: 2364: 2362: 2359: 2357: 2354: 2352: 2349: 2347: 2344: 2341: 2338: 2336: 2333: 2331: 2328: 2326: 2323: 2321: 2318: 2316: 2313: 2311: 2308: 2306: 2303: 2301: 2298: 2296: 2293: 2292: 2290: 2288: 2283: 2279: 2271: 2268: 2266: 2263: 2262: 2260: 2258: 2255: 2253: 2252:Shared memory 2250: 2248: 2245: 2243: 2240: 2238: 2235: 2233: 2230: 2228: 2225: 2223: 2220: 2218: 2215: 2213: 2210: 2209: 2207: 2203: 2199: 2195: 2191: 2186: 2182: 2175: 2170: 2168: 2163: 2161: 2156: 2155: 2152: 2142: 2132: 2130:9788131707494 2126: 2122: 2118: 2111: 2108: 2095: 2091: 2085: 2082: 2077: 2073: 2069: 2065: 2061: 2057: 2050: 2047: 2042: 2038: 2034: 2030: 2026: 2022: 2015: 2012: 1999: 1995: 1991: 1990: 1985: 1978: 1975: 1970: 1966: 1962: 1958: 1954: 1950: 1946: 1945: 1937: 1930: 1927: 1922: 1918: 1914: 1908: 1904: 1900: 1897:. p. 7. 1896: 1889: 1886: 1874: 1870: 1866: 1862: 1855: 1853: 1849: 1836: 1832: 1828: 1827: 1822: 1816: 1813: 1801: 1800: 1795: 1788: 1785: 1780: 1776: 1769: 1766: 1754: 1751: 1746: 1741: 1737: 1733: 1732: 1724: 1721: 1709: 1706: 1701: 1696: 1692: 1688: 1687: 1683:(June 1969). 1682: 1676: 1674: 1670: 1659: 1652: 1645: 1643: 1639: 1628: 1624: 1617: 1615: 1611: 1600: 1598:9780596006693 1594: 1590: 1586: 1585: 1577: 1575: 1571: 1559: 1555: 1549: 1546: 1534: 1530: 1524: 1521: 1510: 1506: 1500: 1498: 1496: 1492: 1487: 1483: 1478: 1473: 1469: 1465: 1458: 1451: 1448: 1443: 1439: 1435: 1431: 1427: 1423: 1416: 1413: 1409: 1403: 1400: 1385: 1378: 1372: 1369: 1362: 1357: 1353: 1350: 1348: 1345: 1343: 1339: 1336: 1334: 1331: 1329: 1326: 1324: 1321: 1319: 1316: 1314: 1311: 1309: 1306: 1304: 1301: 1299: 1296: 1294: 1291: 1290: 1285: 1283: 1281: 1276: 1274: 1270: 1266: 1262: 1258: 1254: 1250: 1246: 1242: 1238: 1233: 1229: 1227: 1223: 1217: 1215: 1211: 1203: 1201: 1199: 1195: 1191: 1187: 1183: 1179: 1175: 1171: 1170:minicomputers 1167: 1163: 1158: 1156: 1152: 1148: 1144: 1140: 1139:diskless node 1136: 1129: 1125: 1121: 1113: 1111: 1109: 1104: 1099: 1097: 1093: 1089: 1085: 1081: 1077: 1073: 1069: 1065: 1061: 1054: 1052: 1050: 1046: 1041: 1036: 1034: 1030: 1026: 1022: 1018: 1014: 1010: 1006: 1001: 999: 995: 991: 984:Early history 983: 979: 976: 974: 971: 969: 966: 965: 964: 962: 957: 954: 950: 946: 942: 935: 933: 931: 926: 922: 918: 914: 910: 906: 898: 896: 892: 890: 886: 882: 878: 874: 869: 867: 863: 858: 854: 850: 846: 842: 838: 830: 828: 826: 822: 816: 812: 808: 797: 794: 786: 783:December 2016 775: 772: 768: 765: 761: 758: 754: 751: 747: 744: –  743: 739: 738:Find sources: 732: 728: 722: 721: 716:This section 714: 711: 707: 706: 700: 698: 696: 689: 686: 684: 681: 679: 676: 674: 671: 669: 666: 664: 661: 659: 656: 653: 649: 645: 642: 641: 640: 638: 633: 631: 627: 623: 619: 611: 609: 607: 603: 599: 595: 594:SQL injection 591: 587: 579: 577: 574: 572: 568: 564: 560: 556: 551: 549: 545: 541: 537: 533: 529: 525: 521: 517: 509: 507: 505: 501: 490: 487: 479: 476:December 2016 468: 465: 461: 458: 454: 451: 447: 444: 440: 437: –  436: 432: 431:Find sources: 425: 421: 415: 414: 409:This section 407: 404: 400: 399: 395: 391: 387: 379: 377: 375: 371: 366: 362: 360: 356: 352: 348: 344: 340: 337: 333: 329: 325: 317: 315: 312: 308: 304: 300: 295: 293: 289: 285: 281: 277: 273: 269: 265: 262: 257: 255: 251: 247: 239: 237: 235: 231: 230: 223: 221: 217: 213: 209: 205: 201: 197: 193: 189: 185: 176: 174: 172: 168: 163: 159: 155: 151: 147: 143: 134: 124: 121: 113: 102: 99: 95: 92: 88: 85: 81: 78: 74: 71: –  70: 66: 65:Find sources: 59: 55: 49: 48: 41: 37: 32: 31: 19: 2295:Apple events 2140: 2134:. Retrieved 2120: 2110: 2098:. Retrieved 2093: 2084: 2059: 2055: 2049: 2024: 2020: 2014: 2002:. Retrieved 1998:the original 1994:Penton Media 1987: 1977: 1948: 1942: 1929: 1894: 1888: 1876:. Retrieved 1864: 1839:. Retrieved 1835:the original 1824: 1815: 1803:. Retrieved 1797: 1787: 1768: 1756:. Retrieved 1730: 1723: 1711:. Retrieved 1685: 1661:. Retrieved 1657: 1630:. Retrieved 1626: 1602:. Retrieved 1583: 1562:. Retrieved 1560:. 2023-06-30 1557: 1548: 1537:. Retrieved 1535:. 2023-11-05 1532: 1523: 1512:. Retrieved 1508: 1467: 1463: 1450: 1425: 1421: 1415: 1402: 1391:. Retrieved 1384:the original 1371: 1280:master-slave 1277: 1240: 1237:peer-to-peer 1234: 1230: 1218: 1214:peer-to-peer 1207: 1190:mass storage 1159: 1153:, such as a 1131: 1107: 1102: 1100: 1095: 1091: 1087: 1083: 1079: 1075: 1071: 1067: 1063: 1059: 1058: 1037: 1028: 1024: 1021:serving host 1020: 1016: 1002: 987: 958: 949:Google Earth 939: 902: 893: 870: 839:, such as a 834: 818: 789: 780: 770: 763: 756: 749: 737: 725:Please help 720:verification 717: 692: 654:environments 648:Visual Basic 634: 630:Google Earth 615: 583: 575: 559:web browsers 552: 518:, such as a 513: 497: 482: 473: 463: 456: 449: 442: 430: 418:Please help 413:verification 410: 367: 363: 321: 307:availability 296: 258: 243: 233: 229:inter-server 227: 224: 219: 180: 141: 139: 116: 107: 97: 90: 83: 76: 64: 52:Please help 47:verification 44: 2100:January 21, 1878:28 November 1841:29 November 1805:30 November 1758:30 November 1713:30 November 1347:Thin client 1151:rich client 1088:client-host 1084:server-host 1064:server-host 1060:Client-host 1017:server-host 953:server-side 909:server side 885:programmers 841:web browser 701:Client side 567:programmers 555:web servers 544:client side 380:Server-side 339:credentials 332:web browser 246:abstraction 192:file server 2419:Categories 2381:frameworks 2330:OpenBinder 2232:Named pipe 2136:2017-07-04 2004:1 December 1779:Xerox PARC 1663:2017-07-07 1632:2017-07-07 1604:2017-07-07 1564:2023-11-13 1539:2023-11-13 1514:2016-12-13 1393:2009-06-16 1356:JD Edwards 1166:mainframes 1033:Xerox PARC 1029:using-host 978:JavaScript 853:smartphone 805:See also: 753:newspapers 536:smartphone 520:web server 446:newspapers 384:See also: 303:scheduling 212:processors 184:web server 110:March 2024 80:newspapers 2287:standards 2282:Protocols 2247:Semaphore 2076:1089-7801 2041:206469224 2027:(5): 31. 1955:: 46–52. 1472:CiteSeerX 1428:: 46–54. 1269:redundant 1257:algorithm 1025:user-host 1007:building 945:SETI@home 917:encrypted 873:protocols 862:bandwidth 847:'s local 622:SETI@home 563:protocols 530:'s local 250:concerned 188:web pages 2394:libevent 2261:Sockets 1944:Computer 1921:14248076 1794:"server" 1286:See also 1273:downtime 1226:failover 1049:Internet 1011:(at the 936:Examples 875:such as 866:security 849:computer 695:services 624:and the 612:Examples 602:database 548:insecure 532:computer 343:database 204:programs 2366:XML-RPC 2335:Sun RPC 2265:Network 2205:Methods 2194:threads 1969:8399655 1826:GetInfo 1442:8121624 1096:servers 1092:clients 1009:ARPANET 925:malware 767:scholar 683:Node.js 652:ASP.NET 565:. Or, 460:scholar 322:When a 318:Example 292:parsing 220:service 194:serves 186:serves 154:clients 150:servers 94:scholar 2356:Thrift 2257:Signal 2127:  2074:  2039:  1967:  1919:  1909:  1595:  1474:  1440:  1126:, and 1108:server 1103:client 1080:client 1076:server 1072:server 1068:client 1023:) and 994:OS/360 868:risk. 857:server 821:client 813:, and 769:  762:  755:  748:  740:  673:Python 540:client 504:client 500:server 462:  455:  448:  441:  433:  392:, and 359:output 190:and a 96:  89:  82:  75:  67:  2399:SIMPL 2389:D-Bus 2340:POSIX 2310:D-Bus 2305:CORBA 2094:NGINX 2037:S2CID 1965:S2CID 1951:(3). 1939:(PDF) 1917:S2CID 1654:(PDF) 1470:: 1. 1460:(PDF) 1438:S2CID 1387:(PDF) 1380:(PDF) 1363:Notes 1249:nodes 1241:peers 1235:In a 911:, or 903:In a 823:in a 774:JSTOR 760:books 688:Swift 584:In a 467:JSTOR 453:books 336:login 299:tasks 167:email 144:is a 101:JSTOR 87:books 2404:LINX 2379:and 2361:TIPC 2351:REST 2346:SOAP 2300:COM+ 2285:and 2270:Unix 2242:Pipe 2212:File 2190:Data 2125:ISBN 2102:2020 2072:ISSN 2006:2013 1907:ISBN 1880:2018 1843:2013 1807:2013 1760:2013 1736:IETF 1715:2013 1691:IETF 1593:ISBN 1406:The 1261:load 1224:and 1168:and 1094:and 1086:and 1078:and 1070:and 1062:and 1027:(or 1019:(or 973:HTML 877:HTTP 845:user 746:news 678:Ruby 663:Perl 658:Java 557:and 528:user 439:news 324:bank 214:and 208:data 206:and 198:. A 162:host 140:The 73:news 2325:ICE 2320:DCE 2315:DDS 2196:in 2064:doi 2029:doi 1957:doi 1899:doi 1869:doi 1750:RFC 1740:doi 1705:RFC 1695:doi 1686:DEL 1482:doi 1430:doi 1342:IBM 1160:As 1051:). 998:job 921:key 881:FTP 879:or 729:by 668:PHP 650:in 646:or 422:by 232:or 210:to 56:by 2421:: 2139:. 2119:. 2092:. 2070:. 2058:. 2035:. 2023:. 1992:. 1986:. 1963:. 1949:39 1947:. 1941:. 1915:. 1905:. 1867:. 1863:. 1851:^ 1829:. 1823:. 1796:. 1777:. 1748:. 1738:. 1734:. 1703:. 1693:. 1689:. 1672:^ 1656:. 1641:^ 1625:. 1613:^ 1591:. 1573:^ 1556:. 1531:. 1507:. 1494:^ 1480:. 1466:. 1462:. 1436:. 1424:. 1122:, 851:, 827:. 809:, 644:C# 550:. 534:, 388:, 376:. 222:. 173:. 2173:e 2166:t 2159:v 2104:. 2078:. 2066:: 2060:3 2043:. 2031:: 2025:8 2008:. 1971:. 1959:: 1923:. 1901:: 1882:. 1871:: 1845:. 1809:. 1781:. 1762:. 1753:4 1742:: 1717:. 1708:5 1697:: 1666:. 1635:. 1607:. 1567:. 1542:. 1517:. 1488:. 1484:: 1468:1 1444:. 1432:: 1426:8 1396:. 796:) 790:( 785:) 781:( 771:· 764:· 757:· 750:· 723:. 489:) 483:( 478:) 474:( 464:· 457:· 450:· 443:· 416:. 123:) 117:( 112:) 108:( 98:· 91:· 84:· 77:· 50:. 20:)

Index

Client/server protocol

verification
improve this article
adding citations to reliable sources
"Client–server model"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message

distributed application
servers
clients
computer network
host
email
World Wide Web
web server
web pages
file server
computer files
shared resource
programs
data
processors
storage devices
inter-server

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.