Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
12 views17 pages

Unit I

The document discusses the fundamentals of computer networks, focusing on the Client-Server model and Peer-to-Peer (P2P) paradigm. It explains the roles of clients and servers, the advantages and disadvantages of the Client-Server model, and outlines how P2P networks function, including their architectures such as Centralized Directory, Query Flooding, and Exploiting Heterogeneity. Additionally, it provides references for further reading on P2P file-sharing technologies.

Uploaded by

gabaro2602
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views17 pages

Unit I

The document discusses the fundamentals of computer networks, focusing on the Client-Server model and Peer-to-Peer (P2P) paradigm. It explains the roles of clients and servers, the advantages and disadvantages of the Client-Server model, and outlines how P2P networks function, including their architectures such as Centralized Directory, Query Flooding, and Exploiting Heterogeneity. Additionally, it provides references for further reading on P2P file-sharing technologies.

Uploaded by

gabaro2602
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

JSPM’s

Jayawantrao Sawant College of


Engineering, Pune
Department of
Artificial Intelligence & Data Science

Unit I

Fundamentals of Computer Network


1
• CO1: Describe the responsibilities, services offered and protocol used at application

layer of network.

• TLO1: Explain the basics of Client Server Paradigm and Peer to Peer Paradigm

Prof.M.K.Gawali
2
Client-server model

• The Client-server model is a distributed application structure that partitions task or


workload between the providers of a resource or service, called servers, and service
requesters called clients.
• In the client-server architecture, when the client computer sends a request for data to
the server through the internet, the server accepts the requested process and deliver

Prof.M.K.Gawali
the data packets requested back to the client. Clients do not share any of their
resources.
• Examples of Client-Server Model are Email, World Wide Web, etc.

3
Client-server model

Prof.M.K.Gawali
4
How the Client-Server Model works ?
• Client: When we talk the word Client, it mean to talk of a person or an organization using a
particular service. Similarly in the digital world a Client is a computer (Host) i.e. capable of
receiving information or using a particular service from the service providers (Servers).
• Servers: Similarly, when we talk the word Servers, It mean a person or medium that serves

Prof.M.K.Gawali
something. Similarly in this digital world a Server is a remote computer which provides
information (data) or access to particular services.

5
Advantages of Client-Server model:

• Centralized system with all data in a single place.


• Cost efficient requires less maintenance cost and Data recovery is possible.
• The capacity of the Client and Servers can be changed separately.

Prof.M.K.Gawali
6
Disadvantages of Client-Server model:
• Clients are prone to viruses, Trojans and worms if present in the Server or uploaded into
the Server.
• Server are prone to Denial of Service (DOS) attacks.
• Data packets may be spoofed or modified during transmission.

Prof.M.K.Gawali
• Phishing or capturing login credentials or other useful information of the user are
common and MITM(Man in the Middle) attacks are common.

7
Peer to Peer Paradigm
• P2P is a file-sharing technology, allowing the users to access mainly the multimedia
files like videos, music, e-books, games, etc.
• The individual users in this network are referred to as peers.

Prof.M.K.Gawali
• The peers request files from other peers by establishing TCP or UDP connections.

8
How P2P works
A peer-to-peer network allows computer hardware and software to communicate without
the need for a server.
Unlike client-server architecture, there is no central server for processing requests in a P2P
architecture.

Prof.M.K.Gawali
The peers directly interact with one another without the requirement of a central server.

9
How P2P works
• when one peer makes a request, it is possible that multiple peers have a copy of that
requested object.
• Now the problem is how to get the IP addresses of all those peers.
• This is decided by the underlying architecture supported by the P2P systems.

Prof.M.K.Gawali
• By means of one of these methods, the client peer can get to know about all the peers
which have the requested object/file and the file transfer takes place directly between
these two peers.

10
How P2P works
Three such Architectures exist:

• Centralized Directory
• Query Flooding

Prof.M.K.Gawali
• Exploiting Heterogeneity

11
Prof.M.K.Gawali
12
1.Centralized Directory
• It is somewhat similar to client-server architecture in the sense that it maintains a huge
central server to provide directory service.
• All the peers inform this central server of their IP address and the files they are making
available for sharing.

Prof.M.K.Gawali
• The server queries the peers at regular intervals to make sure if the peers are still
connected or not.
• So basically this server maintains a huge database regarding which file is present at
which IP addresses.

13
2. Query Flooding
• Unlike the centralized approach, this method makes use of distributed systems.
• In this, the peers are supposed to be connected to an overlay network. It means if a
connection/path exists from one peer to another, it is a part of this overlay network.
• In this overlay network, peers are called nodes, and the connection between peers is

Prof.M.K.Gawali
called an edge between the nodes, thus resulting in a graph-like structure.

14
3. Exploiting heterogeneity

• This P2P architecture makes use of both the above-discussed systems.


• It resembles a distributed system like Gnutella because there is no central server for
query processing.
• The peers with higher bandwidth and network connectivity are at a higher priority and

Prof.M.K.Gawali
are called group leaders/super nodes. The rest of the peers are assigned to these super
nodes.
• These super nodes are interconnected and the peers under these super nodes inform
their respective leaders about their connectivity, IP address, and the files available for
sharing.
15
• Video Link :

https://www.youtube.com/watch?v=hTaCLXMmDQM

Prof.M.K.Gawali
16
References:
• https://www.geeksforgeeks.org/p2ppeer-to-peer-file-sharing/

• https://www.tutorialspoint.com/Peer-to-Peer-Computing

Prof.M.K.Gawali
• https://
www.computerworld.com/article/2588287/networking-peer-to-peer-network.html

17

You might also like