0% found this document useful (0 votes)
20 views17 pages

Aligarh Muslim University: Mohd Shadab Ahmad PGDBF (PG Diploma in Business Finance) 22BFPCA126 GJ - 1971

1. The document discusses various topics related to distributed computing systems including client-server computing, web browsers and servers, proxy servers, peer-to-peer computing, network security techniques like firewalls, and hands-on effective browsing and searching. 2. In client-server computing, clients request resources from servers, which provide those resources, while in peer-to-peer computing tasks are partitioned equally between peer nodes. 3. A firewall is a network security device that filters incoming and outgoing network traffic based on security policies to protect the private internal network.

Uploaded by

Md AMsh Mahmood
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views17 pages

Aligarh Muslim University: Mohd Shadab Ahmad PGDBF (PG Diploma in Business Finance) 22BFPCA126 GJ - 1971

1. The document discusses various topics related to distributed computing systems including client-server computing, web browsers and servers, proxy servers, peer-to-peer computing, network security techniques like firewalls, and hands-on effective browsing and searching. 2. In client-server computing, clients request resources from servers, which provide those resources, while in peer-to-peer computing tasks are partitioned equally between peer nodes. 3. A firewall is a network security device that filters incoming and outgoing network traffic based on security policies to protect the private internal network.

Uploaded by

Md AMsh Mahmood
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

1 ALIGARH MUSLIM UNIVERSITY

Name : Mohd Shadab Ahmad


CLASS : PGDBF {PG Diploma In Business
Finance}
Faculty No : 22BFPCA126
Enrollment No : GJ -1971
2
Content
 Distributed Computing
 Client Server Computing
 Web Browsers and Web Server
 Proxy Server.
 Peer- To- Peer Computing
 Securing Networks: Firewall
 Hands-on effective Browsing and Searching
Distributed Computing
Distributed computing is the method of making multiple
computers work together to solve a common problem. It
makes a computer network appear as a powerful single
computer that provides large-scale resources to deal with
complex challenges.

3
Client Server Computing

In client server computing, the clients requests a resource and the server provides
that resource. A server may serve multiple clients at the same time while a client is
in contact with only one server. Both the client and server usually communicate via
a computer network but sometimes they may reside in the same system.
4
Client / Server Computing
Meaning

Client/Server is a term used to describe a computing model for the


development of computerized systems. This model is based on the
distribution of functions between two types of independent and
autonomous processors: servers and clients. A client is any process that
requests specific services from server processes. A server is a process that
provides requested services for clients. Client and server processes can
reside in the same computer or in different computers connected by a
network.
5
Web Server
A web server is software and hardware that
uses HTTP (Hypertext Transfer Protocol)
and other protocols to respond to client
requests made over the World Wide Web.
The main job of a web server is to display
website content through storing, processing
and delivering webpages to users.

6
Web Browser

A web browser takes you anywhere on the internet. It retrieves information


from other parts of the web and displays it on your desktop or mobile device.
The information is transferred using the Hypertext Transfer Protocol, which
defines how text, images and video are transmitted on the web. This
information needs to be shared and displayed in a consistent format so that
people using any browser, anywhere in the world can see the information.
7
Web Server and Web Browser

Web Server
Web Browser
Web server is a program or The web browser is an
a computer that can provide application program that
services to other programs displays a www document. It
called clients usually uses other internet
services to access the
8
document.
Proxy Server

A proxy server is a dedicated computer or a software system running on


a computer that acts as an intermediary between an endpoint device,
such as a computer, and another server from which a user or client is
requesting a service. 9
Proxy Server
The proxy server is a computer on the internet that accepts the incoming
requests from the client and forwards those requests to the destination
server. It works as a gateway between the end-user and the internet. It
has its own IP address. It separates the client system and web server
from the global network.

10
Peer-To-Peer Computing

Peer-to-peer computing or networking is a distributed application


architecture that partitions tasks or workloads between peers. Peers are
equally privileged, equipotent participants in the network. They are said
to form a peer-to-peer network of nodes. 11
Securing Network
Network Security protects your network and
data from breaches, intrusions and other
threats. This is a vast and overarching term
that describes hardware and software solutions
as well as processes or rules and
configurations relating to network use,
accessibility, and overall threat protection.

12
Network Security
• Network Security protects your network and data from breaches,
intrusions and other threats. This is a vast and overarching term that
describes hardware and software solutions as well as processes or
rules and configurations relating to network use, accessibility, and
overall threat protection.
• Network Security involves access control, virus and antivirus
software, application security, network analytics, types of network-
related security (endpoint, web, wireless), firewalls, VPN encryption
and more.

13
FIREWALL

A Firewall is a network security device that monitors and filters


incoming and outgoing network traffic based on an organization's
previously established security policies. At its most basic, a firewall is
essentially the barrier that sits between a private internal network and
the public Internet. 14
What is a Firewall?
Firewalls can be viewed as gated borders or gateways that manage the travel of
permitted and prohibited web activity in a private network. The term comes from the
concept of physical walls being barriers to slow the spread of fire until emergency
services can extinguish it. By comparison, network security firewalls are for web
traffic management — typically intended to slow the spread of web threats.

Firewalls create 'choke points' to funnel web traffic, at which they are then reviewed
on a set of programmed parameters and acted upon accordingly. Some firewalls also
15 track the traffic and connections in audit logs to reference what has been allowed or
blocked.
Hands On effective Browsing and Searching

Hands On Meaning

Relating to, being, or providing direct practical experience in the operation


or functioning of something. hands-on training. also : involving or allowing
use of or touching with the hands. a hands-on museum display.

16
17

You might also like