3.3.11
Client-Server Model
Client-Server Model
Client-Server Model
The client-server model is the most common modern networking model.
![Illustrative background for The model](https://image-v2.cdn.app.senecalearning.com/2018-07/e5f703ea-874d-4d0f-8ef6-2cdc726e3e07/Computer-Data-Screen-Analysis-Computing-,h_400,q_80,w_640.jpg)
![Illustrative background for The model ?? "content](https://image-v2.cdn.app.senecalearning.com/2018-07/e5f703ea-874d-4d0f-8ef6-2cdc726e3e07/Computer-Data-Screen-Analysis-Computing-,h_400,q_80,w_640.jpg)
The model
The model
- In the client-server model, computers on the network each take the role of either the central server or a client.
![Illustrative background for The client](https://image-v2.cdn.app.senecalearning.com/2018-07/31c77d00-497e-4e13-9319-bd43c2c1c731/Computer-Binary-1-0-Byte-,h_400,q_80,w_640.jpg)
![Illustrative background for The client ?? "content](https://image-v2.cdn.app.senecalearning.com/2018-07/31c77d00-497e-4e13-9319-bd43c2c1c731/Computer-Binary-1-0-Byte-,h_400,q_80,w_640.jpg)
The client
The client
- The client can request a service from the server.
- The server will process the request, and then send a response.
![Illustrative background for The server](https://image-v2.cdn.app.senecalearning.com/courseImages/physics/Edexcel/7 electricity/photocopying,h_400,q_80,w_640.jpg)
![Illustrative background for The server ?? "content](https://image-v2.cdn.app.senecalearning.com/courseImages/physics/Edexcel/7 electricity/photocopying,h_400,q_80,w_640.jpg)
The server
The server
- The server provides services such as:
- Storing files.
- Printing.
- Hosting a website.
- The network is known as centralised since clients communicate with a central server.
Pros of the Client-Server Model
Pros of the Client-Server Model
The client-server model works well for almost all network communications, but it isn't always the best way.
![Illustrative background for Centralised server](https://image-v2.cdn.app.senecalearning.com/2018-07/843d5668-3909-471c-a999-ce2d089e8476/Computer-Laptop-Cafe-Screen-Mac-,h_400,q_80,w_640.jpg)
![Illustrative background for Centralised server ?? "content](https://image-v2.cdn.app.senecalearning.com/2018-07/843d5668-3909-471c-a999-ce2d089e8476/Computer-Laptop-Cafe-Screen-Mac-,h_400,q_80,w_640.jpg)
Centralised server
Centralised server
- User's files can be stored centrally so it is easy to access them from any networked computer.
- Team members can easily share files.
![Illustrative background for Monitoring](https://image-v2.cdn.app.senecalearning.com/2018-07/10b0729f-1ddb-4fa5-89f5-fa0dcca7854f/Monitoring-Watching-Screens-Sontrol-Room-Man-,h_400,q_80,w_640.jpg)
![Illustrative background for Monitoring ?? "content](https://image-v2.cdn.app.senecalearning.com/2018-07/10b0729f-1ddb-4fa5-89f5-fa0dcca7854f/Monitoring-Watching-Screens-Sontrol-Room-Man-,h_400,q_80,w_640.jpg)
Monitoring
Monitoring
- Client machines can be monitored centrally.
- This means that administrators can make sure that nobody breaks the terms and conditions of the network.
- User accounts can be managed centrally. For example, an administrator could:
- Retrieve lost files.
- Recover lost passwords.
![Illustrative background for Security](https://image-v2.cdn.app.senecalearning.com/2018-07/85022e76-668d-464d-b34c-aecd57ee3a90/Lock-Locksmith-Padlock-Secure-Security,h_400,q_80,w_640.jpg)
![Illustrative background for Security ?? "content](https://image-v2.cdn.app.senecalearning.com/2018-07/85022e76-668d-464d-b34c-aecd57ee3a90/Lock-Locksmith-Padlock-Secure-Security,h_400,q_80,w_640.jpg)
Security
Security
- Software and security updates can be managed centrally and applied to all computers.
- This saves time.
Cons of the Client-Server Model
Cons of the Client-Server Model
The client-server model works well for almost all network communications, but it isn't always the best way.
![Illustrative background for Risk of downtime](https://image-v2.cdn.app.senecalearning.com/2018-07/07c93b1b-b326-4f84-b1b4-3aa193ce9200/Broken-Computer-Pliars-Tools-Screen-Keyboard-,h_400,q_80,w_640.jpg)
![Illustrative background for Risk of downtime ?? "content](https://image-v2.cdn.app.senecalearning.com/2018-07/07c93b1b-b326-4f84-b1b4-3aa193ce9200/Broken-Computer-Pliars-Tools-Screen-Keyboard-,h_400,q_80,w_640.jpg)
Risk of downtime
Risk of downtime
- If the central server fails, then the whole of the network would not be able to function.
![Illustrative background for High cost](https://image-v2.cdn.app.senecalearning.com/2018-07/91927448-437c-4af6-9978-61cc1aab2d74/Money-Tax-Bag-Sack-MoneySack-Taxation-,h_400,q_80,w_640.jpg)
![Illustrative background for High cost ?? "content](https://image-v2.cdn.app.senecalearning.com/2018-07/91927448-437c-4af6-9978-61cc1aab2d74/Money-Tax-Bag-Sack-MoneySack-Taxation-,h_400,q_80,w_640.jpg)
High cost
High cost
- Server hardware is usually very expensive.
![Illustrative background for Security](https://image-v2.cdn.app.senecalearning.com/2018-07/e7480a99-5489-4ef2-9156-454a45e0803e/Security-Cyber-Computer-Lock-Padlock-,h_400,q_80,w_640.jpg)
![Illustrative background for Security ?? "content](https://image-v2.cdn.app.senecalearning.com/2018-07/e7480a99-5489-4ef2-9156-454a45e0803e/Security-Cyber-Computer-Lock-Padlock-,h_400,q_80,w_640.jpg)
Security
Security
- Servers are often targeted in cyber attacks such as:
- Ransomware attacks.
- Denial of service attacks.
1Components of a Computer
1.1Structure & Function of the Processor
1.2Types of Processors
2Software & Software Development
2.1Systems Software
2.2Applications Generation
2.3Software Development
3Exchanging Data
3.1Compression, Encryption & Hashing
3.3Networks
4Data Types, Data Structures & Algorithms
4.1Data Types
5Legal, Moral, Cultural & Ethical Issues
5.1Computing Related Legislation
6Elements of Computational Thinking
6.1Thinking Abstractly
6.2Thinking Procedurally
6.3Thinking Logically
7Problem Solving & Programming
7.1Programming Techniques
7.2Programming Construction
Jump to other topics
1Components of a Computer
1.1Structure & Function of the Processor
1.2Types of Processors
2Software & Software Development
2.1Systems Software
2.2Applications Generation
2.3Software Development
3Exchanging Data
3.1Compression, Encryption & Hashing
3.3Networks
4Data Types, Data Structures & Algorithms
4.1Data Types
5Legal, Moral, Cultural & Ethical Issues
5.1Computing Related Legislation
6Elements of Computational Thinking
6.1Thinking Abstractly
6.2Thinking Procedurally
6.3Thinking Logically
7Problem Solving & Programming
7.1Programming Techniques
7.2Programming Construction
![Go student ad image](/en-GB/revision-notes/_next/image?url=%2Fen-GB%2Frevision-notes%2Fimages%2Fgo-student-uk-ad.jpg&w=640&q=100)
Unlock your full potential with GoStudent tutoring
Affordable 1:1 tutoring from the comfort of your home
Tutors are matched to your specific learning needs
30+ school subjects covered