0% found this document useful (0 votes)
17 views29 pages

Computing Paradigm

The World Wide Web (WWW) is a system of interconnected webpages accessible via the Internet, using hyperlinks and protocols like HTTP. Key components include URLs for resource identification, and the TCP/IP model for data transmission across networks. The document also discusses peer-to-peer networks, their advantages and disadvantages, and the differences between HTTP and HTTPS for secure communication.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views29 pages

Computing Paradigm

The World Wide Web (WWW) is a system of interconnected webpages accessible via the Internet, using hyperlinks and protocols like HTTP. Key components include URLs for resource identification, and the TCP/IP model for data transmission across networks. The document also discusses peer-to-peer networks, their advantages and disadvantages, and the differences between HTTP and HTTPS for secure communication.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 29

World Wide Web (WWW)

• The World Wide Web (WWW), often called the Web, is a system of interconnected
webpages and information that you can access using the Internet.
• All public websites or web pages that people may access on their local computers
and other devices through the internet are collectively known as the World Wide
Web or W3.
• Users can get further information by navigating to links interconnecting these
pages and documents. This data may be presented in text, picture, audio, or
video formats on the internet.
• Web pages are linked together using hyperlinks which are HTML-formatted and,
also referred to as hypertext, these are the fundamental units of the Internet and
are accessed through Hypertext Transfer Protocol(HTTP).
• Such digital connections, or links, allow users to easily access desired information
by connecting relevant pieces of information.
Working of WWW
• A Web browser is used to access web pages. Web browsers can be defined as
programs which display text, data, pictures, animation and video on the Internet.

• When users request web pages or other information, then the web browser of
your system request to the server for the information and then the web server
provide requested services to web browser back and finally the requested
service is utilized by the user who made the request. The below diagram
indicates how the Web operates just like client-server architecture of the
internet.
COMPONENTS OF WEB
There are 3 components of the web:
• Uniform Resource Locator (URL): URL serves as a system for resources on
the web.

• Hyper Text Transfer Protocol (HTTP): HTTP specifies communication of


browser and server.

• Hyper Text Markup Language (HTML): HTML defines the structure,


organisation and content of a web page.
URL (Uniform Resource Locator)
• A URL (Uniform Resource Locator, also called a web address) is a unique identifier used
to locate a resource on the internet.

• URLs consist of multiple parts -- including a protocol and domain name -- that tell web
browsers how and where to retrieve a resource.

A URL IS COMPOSED OF MULTIPLE PARTS:

• Protocol: Specifies the communication method. Common examples are:

1. http:// (Hypertext Transfer Protocol)

2. https:// (Hypertext Transfer Protocol, more secure)

• Domain Name: The human-readable address of the website, such as example.com. It


represents the web server where the resource is hosted.
• Path: It refers to the path or location of a particular file or page stored on the web
server to access the content of it.

EXAMPLE OF URL: https://www.example.com/products


DOMAIN NAME:

• Every computer on the Internet has an address which is unique in nature. It is a


string of numbers and is referred to as IP address.

• To communicate with each other, computers identify another computer via its
IP address. It is represented in either dotted decimal notation or in binary decimal
notation.

• Example: The address 172.16.122.204 when represented like these in dotted-


decimal notation and it can be converted into binary notation. After conversion, it
becomes 10101100 00010000 01111010 11001100.
• But it is difficult for humans to remember this IP address. Thus, to find the location
on the Internet easily, DNS was invented. DNS stands for Domain Name Server.

• It implements a distributed database which translates IP address into a unique


alphanumeric address which is referred to as Domain Names.

• Basically, a domain name is the sequence of letters and or numbers separated by


one or more period (“.”). It is just like a pointer to a unique IP address on the
computer network.

• For example: www.google.com, www.yahoo.com

• As from the above example, it is clear that domain names are easy to remember
than an IP address.
PEER-TO-PEER NETWORK

• A peer-to-peer (P2P) network is a decentralized network architecture where each


computer (node) in the network acts as both a client and a server. In this model,
nodes communicate directly with each other to share resources, such as files or
services, without relying on a centralized authority or server.
Key Features of a P2P Network:
1. Decentralization:
• No single central server; each node has equal responsibilities.
• All nodes can initiate or complete requests for resources and services.
2. Resource Sharing:
• Nodes share resources like files.
• Data is distributed across multiple nodes, reducing reliance on any single machine.
3. Scalability:
• The network can grow easily as new nodes join, distributing load among participants.
4. Fault Tolerance:

• The failure of one or a few nodes does not disrupt the entire network, as the data and services are
distributed.

5. Direct Communication: Nodes connect directly to exchange data without intermediary servers.
ADVANTAGES OF P2P NETWORKS:

1. Cost-Efficiency:
• No need for expensive centralized servers.
• Resources are shared among participants.
2. Scalability:
• Adding new nodes increases the network's capacity and resources.
3. Speed:
• Data transfer is often faster because it is distributed across multiple nodes.
4. Autonomy:
• Nodes have more control over their data and resources compared to centralized systems.
DISADVANTAGES OF P2P NETWORK:
1. Security Concerns:
• Lack of central control can make the network vulnerable to malicious activities.
• Malware or viruses can spread easily between nodes.
2. Performance Issues:
• If many nodes leave the network or go offline, performance can degrade.
3. Legal Risks:
• P2P networks are sometimes used for illegal file sharing, raising legal concerns.

• This network is useful for small environments, if we increase number of computers more than 10
performance , security and access may all become big issues.

4. Files Hard to Locate: In a P2P network, the files are not centrally stored, rather they are stored on
individual computers which makes it difficult to locate the files.
TCP/IP
• The TCP/IP model is a fundamental framework for computer networking. It stands for Transmission
Control Protocol/Internet Protocol, which are the core protocols of the Internet. This model defines
how data is transmitted over networks, ensuring reliable communication between devices.

• It consists of four layers: the Link Layer, the Internet Layer, the Transport Layer, and the Application
Layer.

• Each layer has specific functions that help manage different aspects of network communication,
making it essential for understanding and working with modern networks.
What does TCP/IP do?
• The main work of TCP/IP is to transfer the data of a computer from one device to another.

• The main condition of this process is to make data reliable and accurate so that the receiver will receive
the same information which is sent by the sender.

• To ensure that, each message reaches its final destination accurately, the TCP/IP model divides its data
into packets and combines them at the other end, which helps in maintaining the accuracy of the data
while transferring from one end to another end.
How does the TCP/IP Model Work?
• Whenever we want to send something over the internet using the TCP/IP Model, the TCP/IP Model
divides the data into packets at the sender’s end and the same packets have to be recombined at the
receiver’s end to form the same data, and this thing happens to maintain the accuracy of the data

• TCP/IP model divides the data into a 4-layer procedure, where the data first go into this layer in one
order and again in reverse order to get organized in the same way at the receiver’s end.

LAYERS OF TCP/IP MODEL:

• Application Layer

• Transport Layer

• Internet Layer

• Link Layer
1. Application Layer:

• This is the topmost layer, where user interaction with the network occurs. It provides services and
protocols that allow applications to communicate over the network.

• Functions:

• Provides interfaces for applications to send/receive data.

• Handles data formatting, encryption, and translation for compatibility.

• Protocols:

• HTTP/HTTPS: For web communication.

• FTP (File Transfer Protocol): For file transfers.

• SMTP (Simple Mail Transfer Protocol): For sending emails.

• DNS (Domain Name System): Resolves domain names to IP addresses.


2. Transport Layer:

• This layer ensures end-to-end communication and manages the delivery of data between devices.

• Functions:

• Provides reliable data transmission (error detection, correction, and retransmission).

• Splits data into segments and reassembles them at the destination.

• Differentiates between multiple applications using port numbers.

• Protocols:

• TCP (Transmission Control Protocol): Ensures reliable and ordered delivery of data.

• UDP (User Datagram Protocol): Offers fast but unreliable communication, useful for real-time
applications.
3. Internet Layer:

• This layer is responsible for routing data across different networks and ensuring the data reaches its
destination.

• Functions:

• Assigns logical addresses (IP addresses) to devices.

• Breaks data into packets and ensures they are routed to the correct destination.

• Handles packet fragmentation and reassembly.

• Protocols:

• IP (Internet Protocol): Provides addressing and routing.

• ICMP (Internet Control Message Protocol): Handles error reporting and diagnostics.

• ARP (Address Resolution Protocol): Resolves IP addresses to MAC addresses.


4. Link Layer:

• This is the lowest layer in the TCP/IP model. It deals with the physical hardware and how data is sent
over the network.

• Functions:

• Handles data transmission between devices on the same network.

• Converts packets into signals for transmission over the medium (e.g., cables, wireless).

• Manages MAC (Media Access Control) addressing and Ethernet frames.

• Examples:

• Ethernet, Wi-Fi, ARP (Address Resolution Protocol).


Transmission Control Protocol (TCP)
• TCP (Transmission Control Protocol) is one of the main protocols of the Internet protocol suite.

• It is a connection-oriented protocol for communications that helps in the exchange of messages


between different devices over a network.

• The Internet Protocol (IP), which establishes the technique for sending data packets between
computers, works with TCP.

Features of TCP:
• TCP keeps track of the segments being transmitted or received by assigning numbers to every single
one of them.

• Flow control limits the rate at which a sender transfers data. This is done to ensure reliable delivery.

• TCP implements an error control mechanism for reliable data transfer.

• TCP takes into account the level of congestion in the network.


User Datagram Protocol (UDP)
• The User Datagram Protocol (UDP) is a lightweight and connectionless communication protocol in the
Transport Layer of the TCP/IP model. It is widely used for applications where speed is more critical than
reliability.

• UDP does not establish a connection before sending data. It sends packets directly, making it faster than
connection-oriented protocols like TCP.

• There is no guarantee of data delivery, ordering, or error correction. Lost packets are not retransmitted.

• UDP does not manage congestion or regulate the flow of data, so it does not adjust based on network
conditions.

• UDP supports sending messages to multiple recipients (multicasting) and broadcasting across a network.
HyperText Transfer Protocol
• HyperText Transfer Protocol (HTTP) is a protocol using which hypertext is transferred over the Web.

• Due to its simplicity, HTTP has been the most widely used protocol for data transfer over the Web but
the data (i.e. hypertext) exchanged using HTTP isn’t as secure as we would like it to be.

• In fact, hyper-text exchanged using HTTP goes as plain text i.e. anyone between the browser and
server can read it relatively easily if one intercepts this exchange of data.

•The web server delivers the desired data to the user in the form of web pages
when the user initiates an HTTP request through their browser.
HyperText Transfer Protocol Secure
• Hypertext Transfer Protocol Secure (HTTPS) is an extended version of the Hypertext Transfer Protocol
(HTTP). It is used for secure communication.
• In HTTPS, the communication protocol is encrypted using Transport Layer Security.

• HTTPS stands for Hypertext Transfer Protocol Secure.

• While HTTPS guarantees data security, the HTTP protocol does not provide data security.

• As a result, HTTPS can be defined as a secure variant of the HTTP protocol. Data can be transferred
using this protocol in an encrypted format.

• In most cases, the HTTPS protocol must be used while entering bank account information.

• HTTPS employs an encryption mechanism called Secure Sockets Layer (SSL), also known as Transport
Layer Security, to enable encryption.
Difference between HTTP / HTTPS
HTTP HTTPS

HTTP stands for HyperText Transfer HTTPS for HyperText Transfer


Protocol. Protocol Secure.

In HTTP, URL begins with “http://”. In HTTPs, URL starts with “https://”.

HTTP uses port number 80 for HTTPs uses 443 port number for
communication. communication.

HTTP is considered to be unsecure. HTTPs is considered as secure.

HTTP works at Application Layer. HTTPS works at Transport Layer.

In HTTP, Encryption is absent. Encryption is present in HTTPS.

HTTP faster than HTTPS HTTPS slower than HTTP


In HTTP Data is transfer in plaintext. In HTTPS Data transfer in ciphertext.
How to connect to Internet?
• The Internet connects millions of computers, webpages, websites, and servers.
• Using internet, we can send emails, photos, videos, and messages. It creates a
communication medium to share and get information online.
• If your device is connected to the Internet then only you will be able to access all the
applications, websites, social media apps, and many more services.
• The Internet nowadays is considered the fastest medium for sending and receiving
information developed a lot from 2G to 3G and now 5G(G stands for generation).
What is Internet?
• The Internet is a group of computer systems connected from all around the world.
• The Internet is a worldwide interconnected network of hundreds of thousands of
computers of various types that belong to multiple networks.

Essential Components for connecting to the


Internet
• Internet Service Provider: Internet Service Provider is a term used to refer to a
company that provides internet access to people who pay the company or subscribe to
the company for the same. For their services, the customers have to pay the internet
service provider a nominal fee which varies according to the amount of data they use or
the data plan they purchase. An Internet Service Provider is also known as an Internet
Access Provider or an online service provider.
• Modem: A modem or router are the two main components to set up the internet anywhere.
The working of the router is to establish a Local area network (LAN), on the other side, the
modem connects it to an ISP for the access of the internet by the devices.

• Router: A Router is a networking device that forwards data packets between computer
networks. One or more packet-switched networks or subnetworks can be connected using a
router. By sending data packets to their intended IP addresses, it manages traffic between
different networks and permits several devices to share an Internet connection.
• Wi-Fi: Wi-Fi is a wireless networking technology, by which we can access networks or
connect with other computers or mobile using a wireless medium. In Wi-Fi, data are
transferred over radio frequencies in a circular range.
Steps for Connecting to the Internet:

• Find ISP and choose a Plan

• Find an ISP in your area that provides you with a better plan that is budget-friendly
and best for the user's usage.
• After finding the ISP choose the plan that is first in the budget.
• Modem Setup :

• Setting up the modem requires it to connect to the cable or optical fibre that the
ISP provides to you.
• After connecting to the wire turn on the modem and let the modem establish the
connection to the ISP.
• Router Setup

• Router setup includes the configuration of the router and the client ID provided by
the ISP
• Boot the router to get the following configurations.
• Connect Your Devices:

• Connect any device to the router to access the internet on the device of your
choice.
• Connect to the ethernet cable to get the flawless speed of the internet.

• Configure Network Settings:

• Accessing the router page through the IP address of the router to configure the
setting of WiFi and passwords.

You might also like