0% found this document useful (0 votes)
10 views2 pages

Clientserver

The document discusses the client-server model, how it works, and how a browser interacts with servers. It describes clients as computers that request services or data from servers. Servers provide information or access to services. The document then covers the steps a browser takes to interact with servers when a user enters a URL, including contacting DNS servers and sending HTTP requests.

Uploaded by

Aayush Mittal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views2 pages

Clientserver

The document discusses the client-server model, how it works, and how a browser interacts with servers. It describes clients as computers that request services or data from servers. Servers provide information or access to services. The document then covers the steps a browser takes to interact with servers when a user enters a URL, including contacting DNS servers and sending HTTP requests.

Uploaded by

Aayush Mittal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

The Client-server model is a distributed application structure that partitions task or

workload between the providers of a resource or service, called servers, and service
requesters called clients. In the client-server architecture, when the client computer
sends a request for data to the server through the internet, the server accepts the
requested process and deliver the data packets requested back to the client. Clients do
not share any of their resources. Examples of Client-Server Model are Email, World
Wide Web, etc.
How the Client-Server Model works ?
In this article we are going to take a dive into the Client-Server model and have a look
at how the Internet works via, web browsers. This article will help us in having a solid
foundation of the WEB and help in working with WEB technologies with ease.
 Client: When we talk the word Client, it mean to talk of a person or an
organization using a particular service. Similarly in the digital world
a Client is a computer (Host) i.e. capable of receiving information or using a
particular service from the service providers (Servers).
 Servers: Similarly, when we talk the word Servers, It mean a person or
medium that serves something. Similarly in this digital world a Server is a
remote computer which provides information (data) or access to particular
services.
So, its basically the Client requesting something and the Server serving it as long as its
present in the database.

How the browser interacts with the servers ?


There are few steps to follow to interacts with the servers a client.
 User enters the URL(Uniform Resource Locator) of the website or file. The
Browser then requests the DNS(DOMAIN NAME SYSTEM) Server.
 DNS Server lookup for the address of the WEB Server.
 DNS Server responds with the IP address of the WEB Server.
 Browser sends over an HTTP/HTTPS request to WEB Server’s
IP (provided by DNS server).
 Server sends over the necessary files of the website.
 Browser then renders the files and the website is displayed. This rendering is
done with the help of DOM (Document Object Model)
interpreter, CSS interpreter and JS Engine collectively known as the JIT or
(Just in Time) Compilers.

Advantages of Client-Server model:


 Centralized system with all data in a single place.
 Cost efficient requires less maintenance cost and Data recovery is possible.
 The capacity of the Client and Servers can be changed separately.
Disadvantages of Client-Server model:
 Clients are prone to viruses, Trojans and worms if present in the Server or
uploaded into the Server.
 Server are prone to Denial of Service (DOS) attacks.
 Data packets may be spoofed or modified during transmission.
 Phishing or capturing login credentials or other useful information of the user
are common and MITM(Man in the Middle) attacks are common.
Feeling lost in the vast world of System Design? It's time for a transformation! Enroll in
our Mastering System Design From Low-Level to High-Level Solutions - Live Course
and embark on an exhilarating journey to efficiently master system design concepts and
techniques.
What We Offer:
 Comprehensive Course Coverage
 Expert Guidance for Efficient Learning
 Hands-on Experience with Real-world System Design Project
 Proven Track Record with 100,000+ Successful Enthusiasts

You might also like