• Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

Computer Notes

Library
    • Computer Fundamental
    • Computer Memory
    • DBMS Tutorial
    • Operating System
    • Computer Networking
    • C Programming
    • C++ Programming
    • Java Programming
    • C# Programming
    • SQL Tutorial
    • Management Tutorial
    • Computer Graphics
    • Compiler Design
    • Style Sheet
    • JavaScript Tutorial
    • Html Tutorial
    • Wordpress Tutorial
    • Python Tutorial
    • PHP Tutorial
    • JSP Tutorial
    • AngularJS Tutorial
    • Data Structures
    • E Commerce Tutorial
    • Visual Basic
    • Structs2 Tutorial
    • Digital Electronics
    • Internet Terms
    • Servlet Tutorial
    • Software Engineering
    • Interviews Questions
    • Basic Terms
    • Troubleshooting
Menu

Header Right

Home » Networking » Technologies » Client Server Architecture
Next →
← Prev

Client Server Architecture

By Dinesh Thakur

Client/Server Architecture The client/server architecture significantly decreased network traffic by providing a query response rather than total file transfer. It allows multi-user updating through a GUI front end to a shared database. Remote Procedure Calls (RPCs) or standard query language (SQL) statements are typically used to communicate between the client and server.

The following are the examples of client/server architectures.

1) Two tier architectures A two-tier architecture is where a client talks directly to a server, with no intervening server. It is typically used in small environments(less than 50 users).

In two tier client/server architectures, the user interface is placed at user’s desktop environment and the database management system services are usually in a server that is a more powerful machine that provides services to the many clients. Information processing is split between the user system interface environment and the database management server environment.

2) Three tier architectures The three tier architecture is introduced to overcome the drawbacks of the two tier architecture. In the three tier architecture, a middleware is used between the user system interface client environment and the database management server environment.

These middleware are implemented in a variety of ways such as transaction processing monitors, message servers or application servers. The middleware perform the function of queuing, application execution and database staging. In addition the middleware adds scheduling and prioritization for work in progress.

The three tier client/server architecture is used to improve performance for large number of users and also improves flexibility when compared to the two tier approach.

The drawback of three tier architectures is that the development environment is more difficult to use than the development of two tier applications.

 The widespread use of the term 3-tier architecture also denotes the following architectures:

• Application sharing between a client, middleware and enterprise server

• Application sharing between a client, application server and enterprise database server.

i) Three tier with message server. In this architecture, messages are processed and prioritized asynchronously. Messages have headers that include priority information, address and identification number. The message server links to the relational DBMS and other data sources. Messaging systems are alternative for wireless infrastructures.

ii) Three tier with an application server This architecture allows the main body of an application to run on a shared host rather than in the user system interface client environment. The application server shares business logic, computations and a data retrieval engine. In this architecture applications are more scalable and installation costs are less on a single server than maintaining each on a desktop client.

 3-tier architecture provides

• A greater degree of flexibility

• Increased security, as security can be defined for each service, and at each level

      • Increased performance, as tasks are shared between servers

 

The basic characteristics of client/server architectures are: 

1) Combination of a client or front-end portion that interacts with the user, and a server or back-end portion that interacts with the shared resource. The client process contains solution-specific logic and provides the interface between the user and the rest of the application system. The server process acts as a software engine that manages shared resources such as databases, printers, modems, or high powered processors.

2) The front-end task and back-end task have fundamentally different requirements for computing resources such as processor speeds, memory, disk speeds and capacities, and input/output devices.

3) The environment is typically heterogeneous and multivendor. The hardware platform and operating system of client and server are not usually the same.Client and server processes communicate through a well-defined set of standard application program interfaces (API’s) and RPC’s.

4) An important characteristic of client-server systems is scalability. They can be scaled horizontally or vertically. Horizontal scaling means adding or removing client workstations with only a slight performance impact. Vertical scaling means migrating to a larger and faster server machine or multiservers.

You’ll also like:

  1. Benefits of the Client/Server Model ?
  2. Client Server Networks
  3. What is Server? What is Difference between Network Server and dedicated server.
  4. Architecture of Java Based web Server
  5. Client process – What is a Client process?
Next →
← Prev
Like/Subscribe us for latest updates     

About Dinesh Thakur
Dinesh ThakurDinesh Thakur holds an B.C.A, MCDBA, MCSD certifications. Dinesh authors the hugely popular Computer Notes blog. Where he writes how-to guides around Computer fundamental , computer software, Computer programming, and web apps.

Dinesh Thakur is a Freelance Writer who helps different clients from all over the globe. Dinesh has written over 500+ blogs, 30+ eBooks, and 10000+ Posts for all types of clients.


For any type of query or something that you think is missing, please feel free to Contact us.


Primary Sidebar

Internet

Internet Terminology

    • Internet - Home
    • Internet - Email
    • Internet - www
    • Internet - Telnet
    • Internet - Architecture
    • Internet - FTP
    • Internet - HTTP
    • Internet - MIME
    • Internet - SMTP
    • Internet - DNS
    • Internet - POP3
    • Internet - Intranet
    • Internet - SNMP
    • Internet - BOOTP
    • Internet - TFTP
    • Internet - URL
    • Internet - NAT
    • Internet - DHCP
    • Internet - Cellular Radio
    • Internet - VSAT
    • Internet - TCP/IP Services
    • Internet - IMAP4
    • Internet - GSM Architecture
    • Internet - VOIP
    • Internet - GSM Features
    • Internet - SSL
    • Internet - Web Server
    • Internet - File Server
    • Internet - NNTP
    • Internet - UUCP
    • Internet - ADSL
    • Internet - FTP
    • Internet - NFS
    • Internet - Videoconferencing
    • Internet - Audio Compression
    • Internet - xDSL
    • Internet - ADSL Protocols
    • Internet - HTTP Cookie
    • Internet - Wireless Principles
    • Internet - X.400
    • Internet - IP Standardization
    • Internet - 4G
    • Internet - CompuServe
    • Internet - Anonymous FTP
    • Internet - File Sharing
    • Internet - WRAN
    • Internet - FQDN
    • Internet - CNAME
    • Internet - Buffering
    • Internet - Cluster Computing
    • Internet - WiMAX
    • Internet - Client/Server
    • Internet - ATM
    • Internet - DSL
    • Internet - GPRS
    • Internet - Transfer rate
    • Network - Cable Modem

Network Server Technique

    • Server - Home
    • Server - Proxy
    • Server - BBS
    • Server - B Channel
    • Server - Process
    • Server - AAL
    • Server - ISDN Features
    • Server - Multicasting
    • Server - Client/Server Benefits
    • Server - Client process
    • Server - Ad-Hoc
    • Server - ISDN Interfaces
    • Server - Guided Transmission
    • Server - SONET
    • Server - ISDN Standards
    • Server - WAP
    • Server - Broadband ISDN

Networking Encryption System

    • Security - Firewall
    • Security - Cryptography
    • Security - Firewall Architectures
    • Security - Network Security Services
    • Security - VPN
    • Security - Security Threats
    • Security - Encryption
    • Security - SHA-1
    • Security - Requirements
    • Security - Digital Signatures
    • Security - Message Authentication
    • Security - MD5
    • Security - Tunneling (VPN)
    • Security - Remote Access Security

Some Other Tutorials

  • Tutorials - QOS
  • Tutorials - CTS
  • Tutorials - LTE
  • Tutorials - CDDI
  • Tutorials - AppleTalk
  • Tutorials - EtherTalk
  • Tutorials - Flooding
  • Tutorials - Tunneling
  • Ethernet - Frame
  • Ethernet - Expansion
  • Ethernet - 10 Mbit/s
  • Ethernet - Local Loop
  • Broadband vs Baseband
  • Wi-Fi vs. Mobile Broadband
  • Optical Source
  • Implementation Wireless Technology
  • Applications of Wifi
  • Wireless Router Installation
  • Networking Your Devices
  • Type of Wi-Fi equipment
  • Multi-point Architectures
  • Frame-level Architecture
  • Circuits, Channels and Multichanneling
  • Single Bit Error Vs Burst Error

Other Links

  • Internet Terminology - PDF Version

Footer

Basic Course

  • Computer Fundamental
  • Computer Networking
  • Operating System
  • Database System
  • Computer Graphics
  • Management System
  • Software Engineering
  • Digital Electronics
  • Electronic Commerce
  • Compiler Design
  • Troubleshooting

Programming

  • Java Programming
  • Structured Query (SQL)
  • C Programming
  • C++ Programming
  • Visual Basic
  • Data Structures
  • Struts 2
  • Java Servlet
  • C# Programming
  • Basic Terms
  • Interviews

World Wide Web

  • Internet
  • Java Script
  • HTML Language
  • Cascading Style Sheet
  • Java Server Pages
  • Wordpress
  • PHP
  • Python Tutorial
  • AngularJS
  • Troubleshooting

 About Us |  Contact Us |  FAQ

Dinesh Thakur is a Technology Columinist and founder of Computer Notes.

Copyright © 2025. All Rights Reserved.

APPLY FOR ONLINE JOB IN BIGGEST CRYPTO COMPANIES
APPLY NOW