Sounds kind of like what hackers call a 'botnet'.
Basically, a lightweight daemon process is installed into each 'slave' that awaits an instructional message from the master, who sends commands to its entire list of slaves. Upon receipt of this message, the slave executes some other code installed by the hacker based on the instructions received.
In that sense, it is as if the slaves are 'servers'... the master is a client with many servers.
Why stream? Why not datagram?