B/S is the abbreviation of Brower/Server. As long as a browser such as Netscape Navigator or Internet Explorer is installed on the client, a database such as Oracle, Sybase, Informix or SQL Server is installed on the server. The browser interacts with the database through the Web server.
The advantage of C/S is that it can give full play to the processing power of the client PC, and a lot of work can be submitted to the server after the client has finished processing. The corresponding advantage is that the client responds quickly. Disadvantages mainly include the following points:
Only applicable to LAN. With the rapid development of Internet, mobile office and distributed office are becoming more and more popular, which requires our system to be scalable. Remote access in this way requires special technology, and the system should be specially designed to handle distributed data.
The client needs to install special client software. The first involves the workload of installation. Secondly, any computer with problems, such as virus and hardware damage, needs to be installed or maintained. Especially when there are many branches or specialty stores, it is not a heavy workload, but a long distance. In addition, when the system software is upgraded, each client needs to be reinstalled, and its maintenance and upgrade costs are very high.
There are also restrictions on the operating system of the client. It may be suitable for Win98, but it cannot be used for Win2000 or Windows XP. Either it is not suitable for Microsoft's new operating system, let alone Linux, Unix and so on.
The biggest advantage of B/S is that it can be operated anywhere without installing any special software. As long as there is a computer with internet access, it can be used, and the client has zero maintenance. The expansion of the system is very easy, as long as you can access the internet, and then the system administrator assigns a user name and password, you can use it. You can even apply online. After passing the company's internal security authentication (such as CA certificate), the system can automatically assign an account to the user to enter the system without the participation of others.