Computing Paradigm
Computing Paradigm
• The World Wide Web (WWW), often called the Web, is a system of interconnected
webpages and information that you can access using the Internet.
• All public websites or web pages that people may access on their local computers
and other devices through the internet are collectively known as the World Wide
Web or W3.
• Users can get further information by navigating to links interconnecting these
pages and documents. This data may be presented in text, picture, audio, or
video formats on the internet.
• Web pages are linked together using hyperlinks which are HTML-formatted and,
also referred to as hypertext, these are the fundamental units of the Internet and
are accessed through Hypertext Transfer Protocol(HTTP).
• Such digital connections, or links, allow users to easily access desired information
by connecting relevant pieces of information.
Working of WWW
• A Web browser is used to access web pages. Web browsers can be defined as
programs which display text, data, pictures, animation and video on the Internet.
• When users request web pages or other information, then the web browser of
your system request to the server for the information and then the web server
provide requested services to web browser back and finally the requested
service is utilized by the user who made the request. The below diagram
indicates how the Web operates just like client-server architecture of the
internet.
COMPONENTS OF WEB
There are 3 components of the web:
• Uniform Resource Locator (URL): URL serves as a system for resources on
the web.
• URLs consist of multiple parts -- including a protocol and domain name -- that tell web
browsers how and where to retrieve a resource.
• To communicate with each other, computers identify another computer via its
IP address. It is represented in either dotted decimal notation or in binary decimal
notation.
• As from the above example, it is clear that domain names are easy to remember
than an IP address.
PEER-TO-PEER NETWORK
• The failure of one or a few nodes does not disrupt the entire network, as the data and services are
distributed.
5. Direct Communication: Nodes connect directly to exchange data without intermediary servers.
ADVANTAGES OF P2P NETWORKS:
1. Cost-Efficiency:
• No need for expensive centralized servers.
• Resources are shared among participants.
2. Scalability:
• Adding new nodes increases the network's capacity and resources.
3. Speed:
• Data transfer is often faster because it is distributed across multiple nodes.
4. Autonomy:
• Nodes have more control over their data and resources compared to centralized systems.
DISADVANTAGES OF P2P NETWORK:
1. Security Concerns:
• Lack of central control can make the network vulnerable to malicious activities.
• Malware or viruses can spread easily between nodes.
2. Performance Issues:
• If many nodes leave the network or go offline, performance can degrade.
3. Legal Risks:
• P2P networks are sometimes used for illegal file sharing, raising legal concerns.
• This network is useful for small environments, if we increase number of computers more than 10
performance , security and access may all become big issues.
4. Files Hard to Locate: In a P2P network, the files are not centrally stored, rather they are stored on
individual computers which makes it difficult to locate the files.
TCP/IP
• The TCP/IP model is a fundamental framework for computer networking. It stands for Transmission
Control Protocol/Internet Protocol, which are the core protocols of the Internet. This model defines
how data is transmitted over networks, ensuring reliable communication between devices.
• It consists of four layers: the Link Layer, the Internet Layer, the Transport Layer, and the Application
Layer.
• Each layer has specific functions that help manage different aspects of network communication,
making it essential for understanding and working with modern networks.
What does TCP/IP do?
• The main work of TCP/IP is to transfer the data of a computer from one device to another.
• The main condition of this process is to make data reliable and accurate so that the receiver will receive
the same information which is sent by the sender.
• To ensure that, each message reaches its final destination accurately, the TCP/IP model divides its data
into packets and combines them at the other end, which helps in maintaining the accuracy of the data
while transferring from one end to another end.
How does the TCP/IP Model Work?
• Whenever we want to send something over the internet using the TCP/IP Model, the TCP/IP Model
divides the data into packets at the sender’s end and the same packets have to be recombined at the
receiver’s end to form the same data, and this thing happens to maintain the accuracy of the data
• TCP/IP model divides the data into a 4-layer procedure, where the data first go into this layer in one
order and again in reverse order to get organized in the same way at the receiver’s end.
• Application Layer
• Transport Layer
• Internet Layer
• Link Layer
1. Application Layer:
• This is the topmost layer, where user interaction with the network occurs. It provides services and
protocols that allow applications to communicate over the network.
• Functions:
• Protocols:
• This layer ensures end-to-end communication and manages the delivery of data between devices.
• Functions:
• Protocols:
• TCP (Transmission Control Protocol): Ensures reliable and ordered delivery of data.
• UDP (User Datagram Protocol): Offers fast but unreliable communication, useful for real-time
applications.
3. Internet Layer:
• This layer is responsible for routing data across different networks and ensuring the data reaches its
destination.
• Functions:
• Breaks data into packets and ensures they are routed to the correct destination.
• Protocols:
• ICMP (Internet Control Message Protocol): Handles error reporting and diagnostics.
• This is the lowest layer in the TCP/IP model. It deals with the physical hardware and how data is sent
over the network.
• Functions:
• Converts packets into signals for transmission over the medium (e.g., cables, wireless).
• Examples:
• The Internet Protocol (IP), which establishes the technique for sending data packets between
computers, works with TCP.
Features of TCP:
• TCP keeps track of the segments being transmitted or received by assigning numbers to every single
one of them.
• Flow control limits the rate at which a sender transfers data. This is done to ensure reliable delivery.
• UDP does not establish a connection before sending data. It sends packets directly, making it faster than
connection-oriented protocols like TCP.
• There is no guarantee of data delivery, ordering, or error correction. Lost packets are not retransmitted.
• UDP does not manage congestion or regulate the flow of data, so it does not adjust based on network
conditions.
• UDP supports sending messages to multiple recipients (multicasting) and broadcasting across a network.
HyperText Transfer Protocol
• HyperText Transfer Protocol (HTTP) is a protocol using which hypertext is transferred over the Web.
• Due to its simplicity, HTTP has been the most widely used protocol for data transfer over the Web but
the data (i.e. hypertext) exchanged using HTTP isn’t as secure as we would like it to be.
• In fact, hyper-text exchanged using HTTP goes as plain text i.e. anyone between the browser and
server can read it relatively easily if one intercepts this exchange of data.
•The web server delivers the desired data to the user in the form of web pages
when the user initiates an HTTP request through their browser.
HyperText Transfer Protocol Secure
• Hypertext Transfer Protocol Secure (HTTPS) is an extended version of the Hypertext Transfer Protocol
(HTTP). It is used for secure communication.
• In HTTPS, the communication protocol is encrypted using Transport Layer Security.
• While HTTPS guarantees data security, the HTTP protocol does not provide data security.
• As a result, HTTPS can be defined as a secure variant of the HTTP protocol. Data can be transferred
using this protocol in an encrypted format.
• In most cases, the HTTPS protocol must be used while entering bank account information.
• HTTPS employs an encryption mechanism called Secure Sockets Layer (SSL), also known as Transport
Layer Security, to enable encryption.
Difference between HTTP / HTTPS
HTTP HTTPS
In HTTP, URL begins with “http://”. In HTTPs, URL starts with “https://”.
HTTP uses port number 80 for HTTPs uses 443 port number for
communication. communication.
• Router: A Router is a networking device that forwards data packets between computer
networks. One or more packet-switched networks or subnetworks can be connected using a
router. By sending data packets to their intended IP addresses, it manages traffic between
different networks and permits several devices to share an Internet connection.
• Wi-Fi: Wi-Fi is a wireless networking technology, by which we can access networks or
connect with other computers or mobile using a wireless medium. In Wi-Fi, data are
transferred over radio frequencies in a circular range.
Steps for Connecting to the Internet:
• Find an ISP in your area that provides you with a better plan that is budget-friendly
and best for the user's usage.
• After finding the ISP choose the plan that is first in the budget.
• Modem Setup :
• Setting up the modem requires it to connect to the cable or optical fibre that the
ISP provides to you.
• After connecting to the wire turn on the modem and let the modem establish the
connection to the ISP.
• Router Setup
• Router setup includes the configuration of the router and the client ID provided by
the ISP
• Boot the router to get the following configurations.
• Connect Your Devices:
• Connect any device to the router to access the internet on the device of your
choice.
• Connect to the ethernet cable to get the flawless speed of the internet.
• Accessing the router page through the IP address of the router to configure the
setting of WiFi and passwords.