Admin
C/s is also called client/server or client/server mode. Servers generally use high-performance PCs, workstations, or minicomputers, and large database systems such as Oracle, Sybase, Informix, or SQL Server. The client must install dedicated client software.
B/S is the abbreviation of Brower/server. to install a browser on a client, such as Netscape Navigator or Internet Explorer, the server installs Oracle, Sybase, Informix, SQL Server, and other databases. The browser interacts with the database through the Web server.
The advantage of c/s is that it can give full play to the processing capability of the client PC, and a lot of work can be submitted to the server after the client process. The advantage is that the client responds quickly. The main disadvantages are as follows:
Only applicable to lan. With the rapid development of the Internet, mobile office and Distributed Office are becoming more and more popular, which requires the scalability of our system. In this way, remote access requires special technologies, and the system must be specially designed to process distributed data.
The client must install dedicated client software. First, the installation workload is involved. Second, any computer problems, such as viruses and hardware damages, require installation or maintenance. In particular, there are many branch or specialty stores, not the workload, but the distance. In addition, when the system software is upgraded, each client needs to be re-installed, and the maintenance and upgrade costs are very high.
The operating system of the client is also limited. It may be applicable to Win98, but cannot be used for Win2000 or Windows XP. Or not suitable for Microsoft's new operating systems, not to mention Linux and UNIX.
B/S has the biggest advantage of being able to operate anywhere without installing any specialized software. Only one computer that can access the Internet can be used, and the client has no maintenance. System expansion is very easy. As long as you can access the Internet, the system administrator can allocate a user name and password. You can even apply online. After passing the company's internal security authentication (such as the CA certificate), the system can automatically assign an account to the user to enter the system without human intervention.