0% found this document useful (0 votes)
2 views

Client Server Paradigm

The client-server paradigm consists of two main roles: clients, which request services or resources, and servers, which provide them. Communication follows a request-response cycle using standardized protocols, and interactions can be either stateless or stateful. Key features include centralized resources, scalability, and security measures like encryption.

Uploaded by

cloud.domain23
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Client Server Paradigm

The client-server paradigm consists of two main roles: clients, which request services or resources, and servers, which provide them. Communication follows a request-response cycle using standardized protocols, and interactions can be either stateless or stateful. Key features include centralized resources, scalability, and security measures like encryption.

Uploaded by

cloud.domain23
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Client-Server Paradigm

What it is:
 In the client-server model, there are two main roles: the
client and the server.
o Client: The client is the entity that requests services or
resources. It can be a user’s device (like a computer or
smartphone) running software (like a web browser) that
makes requests for information or functionality.
o Server: The server is the entity that provides services
or resources to clients. It is typically a more powerful
machine that hosts applications, databases, or
websites.
How it works:
1. Request-Response Cycle:
o The client sends a request (typically over a network) to
the server, asking for a specific service or resource.
o The server processes the request, performs the
necessary operations (like retrieving data, performing
calculations, or rendering a webpage), and sends a
response back to the client.
2. Communication Protocol:
o Communication between clients and servers usually
follows standardized protocols, like HTTP (for web
traffic), FTP (for file transfers), or SMTP (for email).
o The client initiates a connection using a specific
protocol and sends a request. The server listens for
incoming requests on specific ports and responds
according to the protocol.
3. Roles:
o Client: Initiates requests, usually on behalf of the user.
Examples: web browsers, mobile apps, email clients.
o Server: Waits for incoming requests and processes
them. Examples: web servers (hosting websites),
database servers, email servers.
4. Stateless or Stateful:
o Stateless: In many cases, especially with HTTP, each
request is independent, and the server doesn't retain
information about previous requests (this is known as a
stateless interaction).
o Stateful: In some cases, the server retains information
about the client session, like with persistent
connections or databases.
5. Types of Servers:
o Web Server: Hosts websites and serves HTML, CSS,
JavaScript, images, etc.
o Database Server: Manages and responds to queries
related to databases (e.g., SQL queries).
o Application Server: Hosts business logic or
application-specific services, often acting as an
intermediary between a database and a client.
Example of Client-Server Interaction (Web Browsing):
1. The client (your browser) makes an HTTP request for
example.com.
2. The DNS resolves example.com to an IP address (let's say
192.0.2.1).
3. The client sends an HTTP request to 192.0.2.1 (the web
server).
4. The web server processes the request, retrieves the
requested webpage, and sends an HTTP response back to
the client with the HTML content.
5. The client (your browser) receives the content and renders
the webpage for the user to see.
Key Features:
 Centralized Resources: Servers often host shared
resources, and clients can access them over the network.
 Scalability: Servers can be scaled vertically (more powerful
servers) or horizontally (more servers) to handle increasing
client requests.
 Security: Communication often uses encryption (e.g.,
HTTPS) to protect data between clients and servers.

You might also like