INTRODUCTION TO CLIENT SERVER | CLIENT SERVER MODEL (REPORTS)

0.0(0)
studied byStudied by 16 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/187

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

188 Terms

1
New cards

Client-server model

A networking architecture where client computers request services or resources from a more powerful centralized server.

2
New cards

• Open applications

• Retrieve files

• Maintain consistency across devices

Client-server model enables multiple clients to?

3
New cards

LAN

more secure, local

4
New cards

WAN / Internet

broader access, but requires stronger security

5
New cards

Thin clients

rely heavily on server for processing

6
New cards

Thick clients

process data independently, minimal server assistance

7
New cards

Hybrid clients

handle local processing but use server for storage or heavy tasks

8
New cards

Database servers

host structured data like spreadsheets, accounting records etc.

9
New cards

Application servers

deliver apps without requiring local installation

10
New cards

Web servers

facilitate client access to web content

11
New cards

Computing servers

provide extra processing power or storage

12
New cards

Web proxy servers

act as intermediaries between user and browser

13
New cards

DNS servers

translate domain names to IP addresses

14
New cards

One Tier

Everything runs on a single device no network is needed and minimal traffic

15
New cards

Two Tier

Client handles GUI, server hosts business logic and often built using Java or C++

16
New cards

Three Tier

Split across:

Presentation layer (UI)

Application layer (processing/services)

Data layer (database)

17
New cards

N Tier

Multiple layers across different machines, for better scalability and separation of concerns, can be open (free communication) or closed (strict layer hierarchy)

18
New cards

Centralization

o Easier updates and access management

o Reduced network redundancy

19
New cards

Enhanced Security

o Central point for enforcing cybersecurity

o Simplifies backups and data protection

20
New cards

Scalability

o Horizontal scaling: add more servers to distribute load

o Vertical scaling: enhance server capabilities with more RAM or stronger hardware

21
New cards

Accessibility

o Secure remote access with proper credentials

o Supports remote working

22
New cards

Improved Management

o Streamlined data tracking

o Coordinated updates and feature deployment

o Simultaneous handling of multiple requests

o Lower maintenance costs

23
New cards

Single Point of Failure

If the server goes down or experiences downtime, all clients lose access to the web application.

24
New cards

Single Point of Failure

This can lead to service disruptions and negatively impact user experience.

25
New cards

Server Overload

High traffic or many client requests at the same time can overload the server.

26
New cards

Server Overload

This results in slow response times, crashes, or unavailability

27
New cards

Scalability Challenges

Scaling a traditional client-server setup requires adding more resources (hardware, servers, etc.).

28
New cards

Scalability Challenges

This can be costly and complex to implement, especially for rapidly growing web applications.

29
New cards

Security Risks

The server is a central target for cyberattacks (e.g., DDoS attacks, data breaches).

30
New cards

Security Risks

Sensitive data in transit between client and server can also be intercepted if not encrypted

31
New cards

Social Media (Facebook, Instagram, TikTok)

Client (app/browser) — sends request for posts/messages

Server — processes request and sends back feed, notifications, or messages.

32
New cards

E-commerce (Shopee, Lazada)

Client (Shopee app) — searches for an item Server — returns product list, prices, and stock info.

33
New cards

Online Banking

Client (banking app) — login request

Server — verifies credentials and sends account info.

34
New cards

Gaming (Mobile Legends, Valorant)

Client (game app) — sends player actions (move, attack)

Server — processes actions and updates the game for all players

35
New cards

Cloud Computing

Data and apps stored in cloud servers (Google Drive, iCloud, Dropbox)

36
New cards

Microservices

Systems split into smaller services (Netflix - one service for recommendations, another for video streaming, another for payments)

37
New cards

Mobile & IoT Growth

More devices (phones, smartwatches, smart home devices) acting as clients.

38
New cards

Request services and display information

What is the main function of the client in a client–server model?

39
New cards

Servers are central targets for cyberattacks

Why is security a challenge in the client–server model?

40
New cards

If there is no server to process client requests in a web application, the application will fail to function properly.

What will happen if there is no server to process client requests in a web application?

41
New cards

HyperText Transfer protocol (HTTP)

It is the foundational protocol used by the World Wide Web browsers (clients) and web servers.

42
New cards

HyperText Transfer protocol (HTTP)

developed by Tim Berners-Lee and his team between 1989-1991

43
New cards

HyperText Transfer protocol (HTTP)

It started as a simple protocol for sharing files in a lab and evolved into flexible system that powers today’s rich web content like images, videos, and 3D media

44
New cards

HTTP 0.9

1991 was the first simple version, supporting only basic web page requests

45
New cards

HTTP 1.0

1996 added headers and status codes for better communication

46
New cards

HTTP 1.1

1997/1999 improved speed with persistent connections and caching

47
New cards

HTTP 2.0

2015 made web pages load faster by allowing multiple requests at once

48
New cards

HTTP 3

uses Google’s QUIC protocol to enhance speed and reliability on modern networks.

49
New cards

HTTP Methods

instructions that tell a web server what action the client wants to perform on a resource

50
New cards

GET “Give me this resource“

Used to request data from a server without changing anything

51
New cards

POST “Here’s some data, please process it“

Used to send data to the server, usually to create something new

52
New cards

PUT “Update this resource with my data“

Used to update existing data on the server

53
New cards

DELETE “Remove this resource“

Used to delete specified resource from the server

54
New cards

HEAD “Retrieves“

Like GET, but only returns headers, not the body

55
New cards

OPTIONS “Check responsibilities“

its like checking what you’re allowed to do before you actually do it

56
New cards

TRACE “Debug“

is used for diagnostic purposes

It asks the server to send back the exact HTTP request it received, so the client can see how the request looks when it reaches the server

57
New cards

CONNECT “Open a tunnel“

used to establish a network tunnel to a server, typically for secure HTTPS connections through a proxy

58
New cards

Status code

This is a 3-digit number that tells your browser whether the request was successful, failed, redirected, or had some other issue

59
New cards

1xx

Informational

The request was received, and the process is contuining

60
New cards

100 Continue

Server says “keep sending your request“

61
New cards

2xx

Success

the request worked as expected

62
New cards

200 OK

Success everything went well

63
New cards

3xx

Redirection

The resource has moved; the client should try another location

64
New cards

301

Moved permanently

65
New cards

4xx

Client errors

Something went wrong with the request from the client side

66
New cards

404 Not Found

The requested page doesn’t exist

67
New cards

5xx

Server Errors

the server failed to fulfill a valid request

68
New cards

500 Internal Server Error

Something went wrong on the server

69
New cards

HyperText Transfer Protocol Secure (HTTPS)

the secure version of the HTTP, the standard communication protocol used for transferring data between a web browser(client) and a web server

70
New cards

HyperText Transfer Protocol Secure (HTTPS)

establishes the communication between the browser and the web server

71
New cards

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

HTTPS uses the ___________ and ____________ protocols for establishing the communications.

72
New cards

Transport Layer Security (TLS)

newer version of the SSL

73
New cards

HyperText Transfer Protocol Secure (HTTPS)

It keeps the information on websites safe from being easily viewed or stolen by anyone who might be spying on the network.

74
New cards

Secure Socket Layer (SSL)

Ensures that the data transfer between the communicating systems is secure and reliable.

75
New cards

Secure Socket Layer (SSL)

It is the standard security technology that is used for encryption and decryption of data during the transmission of requests.

76
New cards

Transport Layer Security (TLS)

A protocol that secures communication on the internet by encrypting data, authenticating websites, and ensuring that information is not altered during transmission.

77
New cards

Secure Communication

Data Integrity

Privacy and Security

Faster Performance

Advantages of HTTPS

78
New cards

Secure Communication

HTTPS establishes a secure communication link between the communicating system by providing encryption during transmission.

79
New cards

Data Integrity

By encrypting the data, HTTPS ensures data integrity. This implies that even if the data is compromised at any point, the hackers won't be able to read or modify the data being exchanged.

80
New cards

Privacy and Security

HTTPS prevents attackers from accessing the data being exchanged passively, thereby protecting the privacy and security of the users.

81
New cards

Faster Performance

TTPS encrypts the data and reduces its size. Smaller size accounts for faster data transmission in the case of HTTPS.

82
New cards

HyperText Transfer protocol (HTTP)

URL begins with "http://".

83
New cards

HyperText Transfer protocol (HTTP)

Works at the Application Layer

84
New cards

HyperText Transfer protocol (HTTP)

speed is faster than HTTPS

85
New cards

HyperText Transfer Protocol Secure (HTTPS)

URL starts with "https://".

86
New cards

HyperText Transfer Protocol Secure (HTTPS)

works at Transport Layer

87
New cards

HyperText Transfer Protocol Secure (HTTPS)

speed is slower than HTTP

88
New cards

TCP/IP (Transmission Control Protocol/Internet Protocol) model

a conceptual framework used to understand and design how data is transmitted over a network, especially the Internet.

89
New cards

TCP/IP (Transmission Control Protocol/Internet Protocol) model

It defines how computers communicate by breaking down the communication process into layers, each with specific functions.

90
New cards

TCP/IP (Transmission Control Protocol/Internet Protocol) model

create a robust, fault-tolerant communication system that could survive even if parts of the network failed

91
New cards

TCP/IP (Transmission Control Protocol/Internet Protocol) model

was developed from real-world networking experiments, making it easier to implement.

92
New cards

Application Layer

Provides services and applications for the end user (e.g., web browsing, email, file transfer).

93
New cards

Application Layer

OSI Equivalent: Combines Application + Presentation + Session layers of OSI

94
New cards

Transport Layer

Ensures reliable communication between devices. Handles error checking, data segmentation, and flow control.

95
New cards

TCP (Transmission Control Protocol)

Reliable, connection-oriented

96
New cards

UDP (User Datagram Protocol)

Fast, connectionless, but no guarantee of delivery.

97
New cards

Internet Layer

Determines how data is addressed and routed across networks. Ensures packets find the correct destination.

98
New cards

Internet Layer

OSI Equivalent: Network Layer

99
New cards

Network Access Layer (or Link Layer)

Deals with the physical transmission of data on the network. Defines how data is formatted into frames and transmitted over hardware like Ethernet, Wi-Fi, etc.

100
New cards

Network Access Layer (or Link Layer)

OSI Equivalent: Data Link + Physical Layers