What Is Client/Server?
Client-server (C/S) or "two-tier" architecture (in comparison with a peer-to-peer architecture) has two separate types of nodes on the network: servers, that store information and clients, that send requests for information to servers. Usually, but not always, a client computer and a server computer are two separate devices. A server computer contains large amounts of memory and disk space, while client computers features graphic user interface to support the display of data stored on server. There are many different types of client/server software however their basic architecture remains the same.
Client/server approach to networking has proven to be a cost-effective way to share data between tens or hundreds of computers. Considering the client/server computing in terms of a manager-employee relationship, the following list outlines some of the benefits and drawbacks of client/server solutions.
Centralized Information Storage.
The server stores the data and coordinates the access to information and its modification. This helps to keep the data consistent and up-to-date, even when multiple users/clients are working with it simultaneously.
Managers or team leaders have more information, experience and knowledge about the company and day-to-day operations. Their deep understanding of the business processes, priorities, strategy, goals, and important tasks allows them to easily share information as needed and delegate work to their employees.
The employees or team members may have less knowledge and experience or their vision of the strategy and goals is far from clear. By using client/server software they have more focused tasks and also they might get a clear picture of company strategy if their team leaders provide them with access to such information.
This is the essential aspect of how client/server computing works. It lets the manager plan, assign and notify the team members of their tasks. Once finished with their work, employees report the results back to the manager for verification.
Very often the database is securely locked away from unauthorized access and its data is denied 'view' and/or 'edit' permission, that prevents violations from outside and inside the office.