JSPM’s
Jayawantrao Sawant College of
Engineering, Pune
Department of
Artificial Intelligence & Data Science
Unit I
Fundamentals of Computer Network
1
• CO1: Describe the responsibilities, services offered and protocol used at application
layer of network.
• TLO1: Explain the basics of Client Server Paradigm and Peer to Peer Paradigm
Prof.M.K.Gawali
2
Client-server model
• The Client-server model is a distributed application structure that partitions task or
workload between the providers of a resource or service, called servers, and service
requesters called clients.
• In the client-server architecture, when the client computer sends a request for data to
the server through the internet, the server accepts the requested process and deliver
Prof.M.K.Gawali
the data packets requested back to the client. Clients do not share any of their
resources.
• Examples of Client-Server Model are Email, World Wide Web, etc.
3
Client-server model
Prof.M.K.Gawali
4
How the Client-Server Model works ?
• Client: When we talk the word Client, it mean to talk of a person or an organization using a
particular service. Similarly in the digital world a Client is a computer (Host) i.e. capable of
receiving information or using a particular service from the service providers (Servers).
• Servers: Similarly, when we talk the word Servers, It mean a person or medium that serves
Prof.M.K.Gawali
something. Similarly in this digital world a Server is a remote computer which provides
information (data) or access to particular services.
5
Advantages of Client-Server model:
• Centralized system with all data in a single place.
• Cost efficient requires less maintenance cost and Data recovery is possible.
• The capacity of the Client and Servers can be changed separately.
Prof.M.K.Gawali
6
Disadvantages of Client-Server model:
• Clients are prone to viruses, Trojans and worms if present in the Server or uploaded into
the Server.
• Server are prone to Denial of Service (DOS) attacks.
• Data packets may be spoofed or modified during transmission.
Prof.M.K.Gawali
• Phishing or capturing login credentials or other useful information of the user are
common and MITM(Man in the Middle) attacks are common.
7
Peer to Peer Paradigm
• P2P is a file-sharing technology, allowing the users to access mainly the multimedia
files like videos, music, e-books, games, etc.
• The individual users in this network are referred to as peers.
Prof.M.K.Gawali
• The peers request files from other peers by establishing TCP or UDP connections.
8
How P2P works
A peer-to-peer network allows computer hardware and software to communicate without
the need for a server.
Unlike client-server architecture, there is no central server for processing requests in a P2P
architecture.
Prof.M.K.Gawali
The peers directly interact with one another without the requirement of a central server.
9
How P2P works
• when one peer makes a request, it is possible that multiple peers have a copy of that
requested object.
• Now the problem is how to get the IP addresses of all those peers.
• This is decided by the underlying architecture supported by the P2P systems.
Prof.M.K.Gawali
• By means of one of these methods, the client peer can get to know about all the peers
which have the requested object/file and the file transfer takes place directly between
these two peers.
10
How P2P works
Three such Architectures exist:
• Centralized Directory
• Query Flooding
Prof.M.K.Gawali
• Exploiting Heterogeneity
11
Prof.M.K.Gawali
12
1.Centralized Directory
• It is somewhat similar to client-server architecture in the sense that it maintains a huge
central server to provide directory service.
• All the peers inform this central server of their IP address and the files they are making
available for sharing.
Prof.M.K.Gawali
• The server queries the peers at regular intervals to make sure if the peers are still
connected or not.
• So basically this server maintains a huge database regarding which file is present at
which IP addresses.
13
2. Query Flooding
• Unlike the centralized approach, this method makes use of distributed systems.
• In this, the peers are supposed to be connected to an overlay network. It means if a
connection/path exists from one peer to another, it is a part of this overlay network.
• In this overlay network, peers are called nodes, and the connection between peers is
Prof.M.K.Gawali
called an edge between the nodes, thus resulting in a graph-like structure.
14
3. Exploiting heterogeneity
• This P2P architecture makes use of both the above-discussed systems.
• It resembles a distributed system like Gnutella because there is no central server for
query processing.
• The peers with higher bandwidth and network connectivity are at a higher priority and
Prof.M.K.Gawali
are called group leaders/super nodes. The rest of the peers are assigned to these super
nodes.
• These super nodes are interconnected and the peers under these super nodes inform
their respective leaders about their connectivity, IP address, and the files available for
sharing.
15
• Video Link :
https://www.youtube.com/watch?v=hTaCLXMmDQM
Prof.M.K.Gawali
16
References:
• https://www.geeksforgeeks.org/p2ppeer-to-peer-file-sharing/
• https://www.tutorialspoint.com/Peer-to-Peer-Computing
Prof.M.K.Gawali
• https://
www.computerworld.com/article/2588287/networking-peer-to-peer-network.html
17