internet
internet
The Internet
The Internet is a global computer
network that provides various
technologies and services using
standard communication protocols
3
▪ Web applications:
Web software that can be accessed through a browser.
▪ VoIP:
Voice over Internet Protocol enables users to place voice calls over the Internet.
▪ Email:
Email servers allow users to store emails securely and retrieve them when
necessary.
5
DNS 1:
https:\\www.amazon.co.uk
1 is not in this database
4
3 2 5
Cookie
▪ A message generated by a web server and sent to a web browser; every time a
user visits a website.
▪ Collects important information about the user, which is then used by the web
server to track the user and maintain user preferences.
▪ Only used to remember a user’s habits such as reading, purchases, music, etc.
Cookies do not perform any operation. It is only used to store data.
▪ Personal information such as banking details and passwords are not stored in
cookies.
▪ Information collected in cookies is also subject to data protection and privacy
laws.
12
Digital currency
▪ Digital currency exists only in electronic form. Unlike conventional currencies, it does
not have a physical form.
Digital currency
▪ The block diagram given below illustrates how digital currency is transferred
from a sender’s account to a receiver’s account.
▪ The bank used by the sender and receiver may be different and, in such
cases, a central bank is required to process the transaction. A disadvantage
of using a central system is maintaining confidentiality and security.
14
Digital currency
▪ Cryptocurrency: A form of digital currency that uses decentralised
databases such as blockchain to store and manage the details of
transactions.
Digital currency
▪ Differences between cryptocurrency and traditional digital currency:
Implementing Cryptocurrency
▪ A cryptocurrency is implemented within a blockchain, which makes it more
secure.
▪ Data: Information about the sender, receiver, amount of money, currency, and
much more.
▪ Hash value: A unique value generated for each block based on cryptographic
algorithm (SHA 256). This value also contains a timestamp to identify an event.
Example of blockchain
18
Implementing Cryptocurrency
▪ Block 1 is also called the genesis block, as it doesn’t point to any previous block.
▪ Consider if block 2 is altered in some way, then it would not have the same hash
value (A489) and, hence, all the further blocks will become invalid because their
hash values are dependent on the hash value of block 2.
19
Implementing Cryptocurrency
▪ When a new block is created, it is sent to all computers in the network to check its
correctness. If it’s valid, then it is added to the blockchain. When a new user joins
the blockchain, they receive a copy of the whole blockchain system.
▪ Miners get commission for each new block created. Hence, a hacker will not be
able to modify a block and the further blocks in a short duration of time.
▪ The currency exchange values are also regulated by all computers in the network.
20