SlideShare a Scribd company logo
1 of 12
Download to read offline
CLIENT SERVER NETWORK SECURITY
MADE BY
MITHIL DOSHI
ROLL NO – 95
SUBJECT – E-COMMERCE
SEMESTER – II
CLASS – M.COM. PART – 1 (BUSINESS MANAGEMENT)
Content
1) Introduction
2) What is Client Server Networking ?
3) Benefits of Client Server Networking
4) Disadvantages of Client Server Networking
5) Client – Server Security
6) Types of way Servers can be kept Safe
7) Conclusion
1. Introduction
A client-server network is the medium through which clients
access resources and services from a central computer, via
either a local area network (LAN) or a wide-area network (WAN),
such as the Internet. A unique server called a daemon may be
employed for the sole purpose of awaiting client requests, at
which point the network connection is initiated until the client
request has been fulfilled.
Mithil Doshi
A computer network in which one centralized,
powerful computer (called the server) is a hub to
which many less powerful personal computers or
workstations (called clients) are connected. The
clients run programs and access data that are stored
on the server. Compare peer-to-peer network.
2. What is Client – Server Network ?
Client Server Network Architecture
Mithil Doshi
3. Benefits of Client – Server Networking
Mithil Doshi
There are numerous advantages of the client server architecture model:
• A single server hosting all the required data in a single place facilitates easy protection
of data and management of user authorization and authentication.
• Resources such as network segments, servers, and computers can be added to a client-
server network without any significant interruptions.
• Data can be accessed efficiently without requiring clients and the server to be in close
proximity.
• All nodes in the client-server system are independent, requesting data only from the
server, which facilitates easy upgrades, replacements, and relocation of the nodes.
• Data that is transferred through client-server protocols are platform-agnostic.
4. Disadvantages of Client Server Network
• A specialist network operating system is needed
• The server is expensive to purchase
• Specialist staff such as a network manager is needed
• If any part of the network fails a lot of disruption can occur
Mithil Doshi
• Client/server security uses various authorization methods to
make sure that only valid user and programs have access to
information resources such as databases.
• Access control mechanisms must be set up to ensure that
properly authenticated users are allowed access only to those
resources that they are entitled to use.
• Such mechanisms include password protection, encrypted
smart cards, biometrics, and firewalls.
5. Client – Server Security
Mithil Doshi
Firewall
Architecture
Mithil Doshi
6. Types of way Servers can be kept Safe
1. Establish and Use a Secure Connection
Using the SSH (Secure Shell) Protocol is the best way to establish a protected connection.
Unlike the previously used Telnet, SSH access encrypts all data transmitted in the exchange.
2. Monitor Login Attempts
Using intrusion prevention software to monitor login attempts is a way to protect your server
against brute force attacks.
3. Establish Password Requirements
The first thing is to set password requirements and rules that must be followed by all
members on the server.
Mithil Doshi
4. Set Password Expiration Policy
Setting an expiration date for a password is another routine practice when establishing
requirements for users. Depending on the level of security required, a password may last a
couple of weeks or a couple of months.
5. Update and Upgrade Software Regularly
Regularly updating the software on a server is a crucial step in keeping it safe from
hackers. Outdated software has already been explored for its weak points, leaving it open
for hackers to take advantage of these and harm your system.
6. Create Multi-Server Environments
Full separation would require having dedicated bare metal servers that do not share any
components with other servers. Although this is the easiest to manage and provides the
most security, it is also the most expensive.
Mithil Doshi
The online quiz system and
examination system are the
examples of the client-server
system. In this system admin of the
system can load a number of
questions of the different subject
with a right answer. So after taking
the test the result of every student
saved in the database. So assume
the world without this system so it
saves manpower and time. In the
recent time, all the applications
worked on the client server system.
In conclusion, the client server
system covers both areas of
networking and management due
to its flexibility in structure. So it is
very necessary for us to know the
advantage of this technology in the
IT world and different areas where
client-server system working
because if we do not know how this
technology will be used so we are
not able to take the full advantage
of its functionalities. So without
knowing the application of this
technology, it is very difficult for us to
execute the process.
7. Conclusion

More Related Content

What's hot

Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment SystemRitesh Goyal
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commercesadaf tst
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-CommerceHem Pokhrel
 
digital tokens based on E-payments
digital tokens based on E-paymentsdigital tokens based on E-payments
digital tokens based on E-paymentsraviteja reddy
 
Consumer Oriented E commerce Application
Consumer Oriented E commerce ApplicationConsumer Oriented E commerce Application
Consumer Oriented E commerce ApplicationMahesh Shetty
 
E commerce full notes for mba
E commerce full notes for mba E commerce full notes for mba
E commerce full notes for mba karishma
 
Advantages and Disadvantages of Ecommerce
Advantages and Disadvantages of EcommerceAdvantages and Disadvantages of Ecommerce
Advantages and Disadvantages of EcommerceAbsolute eCommerce
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & EncryptionBiroja
 
Electronic data interchange
Electronic data interchangeElectronic data interchange
Electronic data interchangeAbhishek Nayak
 
Consumer Oriented Application, Mercantile process and Mercantile models
Consumer Oriented Application, Mercantile process and Mercantile modelsConsumer Oriented Application, Mercantile process and Mercantile models
Consumer Oriented Application, Mercantile process and Mercantile modelsRabin BK
 
Electronic Payment Systems in E Commerce
Electronic Payment Systems in E CommerceElectronic Payment Systems in E Commerce
Electronic Payment Systems in E CommerceVinay Chaithanya
 
E commerce security
E commerce securityE commerce security
E commerce securityShakti Singh
 
E commerce in india challenges & opportunities
E commerce in india challenges & opportunitiesE commerce in india challenges & opportunities
E commerce in india challenges & opportunitiesKnowledge Center Computer
 
Client server network threat
Client server network threatClient server network threat
Client server network threatRaj vardhan
 

What's hot (20)

E-Commerce Security
E-Commerce SecurityE-Commerce Security
E-Commerce Security
 
Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment System
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
e-commerce
e-commercee-commerce
e-commerce
 
digital tokens based on E-payments
digital tokens based on E-paymentsdigital tokens based on E-payments
digital tokens based on E-payments
 
Consumer Oriented E commerce Application
Consumer Oriented E commerce ApplicationConsumer Oriented E commerce Application
Consumer Oriented E commerce Application
 
E commerce full notes for mba
E commerce full notes for mba E commerce full notes for mba
E commerce full notes for mba
 
E business- EDI
E business- EDIE business- EDI
E business- EDI
 
Advantages and Disadvantages of Ecommerce
Advantages and Disadvantages of EcommerceAdvantages and Disadvantages of Ecommerce
Advantages and Disadvantages of Ecommerce
 
Full Notes on E-Commerce | Study Material for E-Commerce
Full Notes on E-Commerce | Study Material for E-Commerce Full Notes on E-Commerce | Study Material for E-Commerce
Full Notes on E-Commerce | Study Material for E-Commerce
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
Electronic data interchange
Electronic data interchangeElectronic data interchange
Electronic data interchange
 
TYPES OF E-COMMERCE
TYPES OF E-COMMERCETYPES OF E-COMMERCE
TYPES OF E-COMMERCE
 
Consumer Oriented Application, Mercantile process and Mercantile models
Consumer Oriented Application, Mercantile process and Mercantile modelsConsumer Oriented Application, Mercantile process and Mercantile models
Consumer Oriented Application, Mercantile process and Mercantile models
 
Electronic Payment Systems in E Commerce
Electronic Payment Systems in E CommerceElectronic Payment Systems in E Commerce
Electronic Payment Systems in E Commerce
 
E commerce security
E commerce securityE commerce security
E commerce security
 
E commerce in india challenges & opportunities
E commerce in india challenges & opportunitiesE commerce in india challenges & opportunities
E commerce in india challenges & opportunities
 
Client server network threat
Client server network threatClient server network threat
Client server network threat
 

Similar to Client-Server Network Security Basics

E-Business And Technology Essay
E-Business And Technology EssayE-Business And Technology Essay
E-Business And Technology EssayPamela Wright
 
client-server.pptx
client-server.pptxclient-server.pptx
client-server.pptxEbukaChikodi
 
University Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical DataUniversity Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical DataNasser Hassan
 
Unit 4_Introduction to Server Farms.pptx
Unit 4_Introduction to Server Farms.pptxUnit 4_Introduction to Server Farms.pptx
Unit 4_Introduction to Server Farms.pptxRahul Borate
 
Types of networks according to security
Types of networks according to securityTypes of networks according to security
Types of networks according to securityAmjad Afridi
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesSahithi Naraparaju
 
On Premise Servers and Cloud-Based Servers.pptx
On Premise Servers and Cloud-Based Servers.pptxOn Premise Servers and Cloud-Based Servers.pptx
On Premise Servers and Cloud-Based Servers.pptxReyce Trono
 
Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver PresentationTuhin_Das
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud ComputingIJSRED
 
Data center proposal
Data center proposalData center proposal
Data center proposalMuhammad Ahad
 
Client Server Model and Distributed Computing
Client Server Model and Distributed ComputingClient Server Model and Distributed Computing
Client Server Model and Distributed ComputingAbhishek Jaisingh
 

Similar to Client-Server Network Security Basics (20)

E-Business And Technology Essay
E-Business And Technology EssayE-Business And Technology Essay
E-Business And Technology Essay
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
SOFTWARE COMPUTING
SOFTWARE COMPUTINGSOFTWARE COMPUTING
SOFTWARE COMPUTING
 
client-server.pptx
client-server.pptxclient-server.pptx
client-server.pptx
 
University Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical DataUniversity Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical Data
 
Unit 4_Introduction to Server Farms.pptx
Unit 4_Introduction to Server Farms.pptxUnit 4_Introduction to Server Farms.pptx
Unit 4_Introduction to Server Farms.pptx
 
Peer to peer
Peer to peerPeer to peer
Peer to peer
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Types of networks according to security
Types of networks according to securityTypes of networks according to security
Types of networks according to security
 
unit 4-1.pptx
unit 4-1.pptxunit 4-1.pptx
unit 4-1.pptx
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
 
On Premise Servers and Cloud-Based Servers.pptx
On Premise Servers and Cloud-Based Servers.pptxOn Premise Servers and Cloud-Based Servers.pptx
On Premise Servers and Cloud-Based Servers.pptx
 
Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver Presentation
 
Unit-II-part 3.pdf
Unit-II-part 3.pdfUnit-II-part 3.pdf
Unit-II-part 3.pdf
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud Computing
 
Data center proposal
Data center proposalData center proposal
Data center proposal
 
Client Server Model and Distributed Computing
Client Server Model and Distributed ComputingClient Server Model and Distributed Computing
Client Server Model and Distributed Computing
 
CLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGECLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGE
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
 
AZURE CC JP.pptx
AZURE CC JP.pptxAZURE CC JP.pptx
AZURE CC JP.pptx
 

Recently uploaded

Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxnada99848
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 

Recently uploaded (20)

Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptx
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 

Client-Server Network Security Basics

  • 1. CLIENT SERVER NETWORK SECURITY MADE BY MITHIL DOSHI ROLL NO – 95 SUBJECT – E-COMMERCE SEMESTER – II CLASS – M.COM. PART – 1 (BUSINESS MANAGEMENT)
  • 2. Content 1) Introduction 2) What is Client Server Networking ? 3) Benefits of Client Server Networking 4) Disadvantages of Client Server Networking 5) Client – Server Security 6) Types of way Servers can be kept Safe 7) Conclusion
  • 3. 1. Introduction A client-server network is the medium through which clients access resources and services from a central computer, via either a local area network (LAN) or a wide-area network (WAN), such as the Internet. A unique server called a daemon may be employed for the sole purpose of awaiting client requests, at which point the network connection is initiated until the client request has been fulfilled. Mithil Doshi
  • 4. A computer network in which one centralized, powerful computer (called the server) is a hub to which many less powerful personal computers or workstations (called clients) are connected. The clients run programs and access data that are stored on the server. Compare peer-to-peer network. 2. What is Client – Server Network ?
  • 5. Client Server Network Architecture Mithil Doshi
  • 6. 3. Benefits of Client – Server Networking Mithil Doshi There are numerous advantages of the client server architecture model: • A single server hosting all the required data in a single place facilitates easy protection of data and management of user authorization and authentication. • Resources such as network segments, servers, and computers can be added to a client- server network without any significant interruptions. • Data can be accessed efficiently without requiring clients and the server to be in close proximity. • All nodes in the client-server system are independent, requesting data only from the server, which facilitates easy upgrades, replacements, and relocation of the nodes. • Data that is transferred through client-server protocols are platform-agnostic.
  • 7. 4. Disadvantages of Client Server Network • A specialist network operating system is needed • The server is expensive to purchase • Specialist staff such as a network manager is needed • If any part of the network fails a lot of disruption can occur Mithil Doshi
  • 8. • Client/server security uses various authorization methods to make sure that only valid user and programs have access to information resources such as databases. • Access control mechanisms must be set up to ensure that properly authenticated users are allowed access only to those resources that they are entitled to use. • Such mechanisms include password protection, encrypted smart cards, biometrics, and firewalls. 5. Client – Server Security Mithil Doshi
  • 10. 6. Types of way Servers can be kept Safe 1. Establish and Use a Secure Connection Using the SSH (Secure Shell) Protocol is the best way to establish a protected connection. Unlike the previously used Telnet, SSH access encrypts all data transmitted in the exchange. 2. Monitor Login Attempts Using intrusion prevention software to monitor login attempts is a way to protect your server against brute force attacks. 3. Establish Password Requirements The first thing is to set password requirements and rules that must be followed by all members on the server. Mithil Doshi
  • 11. 4. Set Password Expiration Policy Setting an expiration date for a password is another routine practice when establishing requirements for users. Depending on the level of security required, a password may last a couple of weeks or a couple of months. 5. Update and Upgrade Software Regularly Regularly updating the software on a server is a crucial step in keeping it safe from hackers. Outdated software has already been explored for its weak points, leaving it open for hackers to take advantage of these and harm your system. 6. Create Multi-Server Environments Full separation would require having dedicated bare metal servers that do not share any components with other servers. Although this is the easiest to manage and provides the most security, it is also the most expensive. Mithil Doshi
  • 12. The online quiz system and examination system are the examples of the client-server system. In this system admin of the system can load a number of questions of the different subject with a right answer. So after taking the test the result of every student saved in the database. So assume the world without this system so it saves manpower and time. In the recent time, all the applications worked on the client server system. In conclusion, the client server system covers both areas of networking and management due to its flexibility in structure. So it is very necessary for us to know the advantage of this technology in the IT world and different areas where client-server system working because if we do not know how this technology will be used so we are not able to take the full advantage of its functionalities. So without knowing the application of this technology, it is very difficult for us to execute the process. 7. Conclusion