0% found this document useful (0 votes)
15 views16 pages

BT Unit 3

The document outlines the evolution of the web from Web 1.0, characterized by static content and limited interaction, to Web 2.0, which introduced dynamic, user-generated content, and finally to Web 3.0, emphasizing decentralization and user control. It discusses technologies like IPFS and Storj that enable decentralized file storage and sharing, contrasting them with traditional HTTP protocols. Additionally, it highlights the challenges of transitioning to Web 3.0, including scalability, user experience, and regulatory uncertainty.

Uploaded by

22amtics203
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views16 pages

BT Unit 3

The document outlines the evolution of the web from Web 1.0, characterized by static content and limited interaction, to Web 2.0, which introduced dynamic, user-generated content, and finally to Web 3.0, emphasizing decentralization and user control. It discusses technologies like IPFS and Storj that enable decentralized file storage and sharing, contrasting them with traditional HTTP protocols. Additionally, it highlights the challenges of transitioning to Web 3.0, including scalability, user experience, and regulatory uncertainty.

Uploaded by

22amtics203
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Unit 3 : Technology Use-Cases

1. Write the key characteristics of Web 1.0 and Web 2.0.

Web 1.0 – The First Generation of the Web:


Static Content: Mostly read-only websites with static HTML pages.

Centralized Structure: Built as a centralized system, extending ideas from


DARPA's ARPANET.

Fat Client Setup (Before Web): Business PCs had individual copies of
applications and data, leading to high synchronization costs.

Content Consumption: Users could view content but not interact or


contribute much.

Tools: Browsers like Netscape were used to access and render information.

Limited Interaction: Websites served content but didn’t allow much user
feedback or collaboration.

Web 2.0 – The Interactive Web:


Dynamic Content: Content is interactive, user-generated, and updated in
real-time.

Massive Data Growth: The web began growing rapidly—especially surface


web content since 2012.

Decentralized Usage: Though still managed through centralized platforms,


applications began to communicate and store data online.

User Participation: Users could now contribute content (e.g., through


blogs, social media).

Centralized Intermediaries: Companies like Google emerged as powerful


intermediaries, offering search, storage, messaging, and traffic routing.

Application Integration: Programs could connect through APIs, enabling


rich and scalable web services.

Unit 3 : Technology Use-Cases 1


2. Explain the InterPlanetary File System (IPFS) and its architecture.

What is IPFS?
IPFS (InterPlanetary File System) is a peer-to-peer (P2P) protocol designed
for storing, accessing, and sharing files in a decentralized manner. It provides
a distributed alternative to traditional web protocols like HTTP/HTTPS.

Key Features:
Content-addressed Storage: Every file is given a unique cryptographic
hash (a content address). This makes data immutable and tamper-proof.

Decentralization: No central server. Data is spread across multiple nodes,


similar to how BitTorrent works.

Distributed Hash Table (DHT): Used to locate which peer (node) has which
file, enabling efficient file lookup and retrieval.

Resilient and Redundant: Because many users can host the same file,
availability remains high even if some nodes go offline.

IPFS Architecture:
1. Content-Based Addressing:

Files are not located using URLs (like in HTTP), but by hashes of their
content.

Example: Instead of example.com/file.jpg , IPFS uses /ipfs/<hash> .

2. Distributed Hash Table (DHT):

Peers store mappings of content hashes to node addresses.

Enables quick search of “who has what content.”

3. Data Storage and Exchange:

Files are split into small blocks and stored across different nodes.

Unit 3 : Technology Use-Cases 2


Uses Merkle DAGs (Directed Acyclic Graphs) to link blocks together
securely.

4. Peer-to-Peer Network:

Any peer can request and serve content.

The system is self-healing: if a node goes down, others can still serve
the file.

5. Versioning & Linking:

Like Git, IPFS tracks versions of files using cryptographic links.

Files and directories can be versioned and updated seamlessly.

How is IPFS Different from HTTP?

Feature HTTP IPFS

Location-based
Addressing Content-based ( /ipfs/<hash> )
( example.com/file )

Centralization Central servers Decentralized P2P nodes

Multiple sources serve the same


Availability One server fails = data loss
data

Speed Often slower and bottlenecked Faster with nearby peers

Trust Depends on trusted servers Cryptographically verified content

Conclusion:
IPFS is a next-gen file sharing protocol that brings the principles of
decentralization, integrity, and high availability to how we store and access
data. It’s a foundational technology for Web3, enabling trustless and distributed
applications.

3. Explain Storj and how it enables decentralized cloud storage.

Unit 3 : Technology Use-Cases 3


Storj is a decentralized cloud storage platform that allows users to store their
data securely across a distributed network. It transforms unused hard drive
space from computers around the world into a shared, efficient storage system.

How Storj Works:


1. Renting Storage Space:

Anyone can run Storj software and rent out their unused disk space.

Users who want to store files use this global network instead of relying
on centralized services like Google Drive or Dropbox.

2. Decentralized Protocol:

Storj uses a peer-to-peer protocol to manage:

Storage contracts

Data transfer

Payment for services

Integrity and availability checks

3. Autonomous Peers:

Each node (peer) in the network is an independent agent.

These nodes can negotiate contracts, verify data, and receive


payments automatically, with minimal human involvement.

4. Encrypted Sharding:

Files are split into small pieces called shards.

Each shard is encrypted before being distributed to various nodes.

This ensures privacy, security, and redundancy—even if someone


intercepts a shard, they cannot read the data.

5. Data Retrieval:

When a user wants to access their file, the protocol retrieves the
necessary shards and reassembles them.

Built-in integrity checks ensure the data is correct and has not been
tampered with.

Unit 3 : Technology Use-Cases 4


Key Features of Storj:

Feature Description

No central server—data is stored across many independent


Decentralization
nodes.

Encryption Files are encrypted before sharding, protecting user privacy.

Files are broken into small encrypted parts (shards) to improve


Sharding
performance and security.

Resilience & Redundant storage ensures high availability even if some nodes
Availability go offline.

Storj uses tokens (STORJ) to pay hosts for their storage space
Payment System
and bandwidth.

Benefits of Storj:
Lower cost than traditional cloud providers.

Greater privacy and security, as data is encrypted and distributed.

More reliable, due to its global, redundant architecture.

Eco-friendly, using existing hardware instead of massive data centers.

Conclusion:
Storj reimagines cloud storage by using a decentralized, secure, and cost-
effective network powered by community-run nodes. It enables users to store
their files safely while rewarding others for sharing unused disk space—a win-
win for privacy, efficiency, and innovation.

4. Describe the evolution from Web 1.0 to Web 3.0 with examples.

🌐 Evolution from Web 1.0 to Web 3.0


Web Version Description Key Features Examples

Unit 3 : Technology Use-Cases 5


The “Static Web”: The 🔹 Static pages🔹 📄 Early websites
first generation of the Read-only🔹 like Yahoo!
Web 1.0 (1990s
– early 2000s)
internet. Mostly read- Centralized servers 🔹 Directory,
only content, limited No user-generated GeoCities,
user interaction. content Britannica.com

The “Social Web”:

🔹 Dynamic content🔹 💬YouTube,


Focus on user-
Facebook,
generated content,
Web 2.0 (early interactivity, and Social media🔹 Cloud
computing🔹 Mobile
Instagram,
2000s – collaboration.
apps🔹 Centralized
Twitter,
present) Platforms became
Wikipedia, Google
central hubs for platforms
Docs
sharing and
communication.

The “Decentralized
Web”: Powered by 🔹 Decentralization🔹 🧠 Ethereum,
blockchain, AI, Trustless systems🔹
IPFS, Filecoin,
Web 3.0 semantic web, and Blockchain-based
apps (dApps)🔹
Uniswap, Brave
(emerging now) decentralization.
Semantic search🔹 AI
browser,
Users control their own
Decentraland
data and interact peer- and ML integration
to-peer.

🔁 Key Differences:
Web 1.0: Read →

Web 2.0: Read + Write →

Web 3.0: Read + Write + Own

📌 Example Progression:
Web 1.0: You read articles on a static site like Britannica.com.

Web 2.0: You write a blog on Medium or share videos on YouTube.

Web 3.0: You publish content on a decentralized platform like Mirror.xyz


and get paid directly in crypto tokens.

✅ Summary:
Web 1.0 laid the foundation, Web 2.0 made the web interactive and social, and
Web 3.0 is making it decentralized, secure, and user-owned.

Unit 3 : Technology Use-Cases 6


5. Write the difference between HTTP and IPFS in terms of content

📡Delivery
Difference Between HTTP and IPFS in Terms of Content

HTTP (HyperText Transfer IPFS (InterPlanetary File


Feature
Protocol) System)

Decentralized peer-to-peer
Type Centralized client-server protocol
protocol

Data is requested using a


Data is requested based on
Data Access cryptographic hash (content
location (e.g., URL of a server)
address)

Data is not persistent; if server


Data is persistent; available as
Persistence goes down, content becomes
long as any peer has a copy
unavailable

Less efficient; relies on a single More efficient; fetches from


Efficiency
server for multiple requests closest available peer

Hosting Requires a central server or third- No central server needed; any


Requirement party hosting service node can host data

Higher bandwidth via


Limited bandwidth due to server
Bandwidth distributed downloads from
load
multiple nodes

Failure Vulnerable to server failures and Fault-tolerant due to


Resistance broken links distributed copies

Well-established and widely used Still growing and less adopted


Popularity
standard globally

Built-in support on almost all web Requires IPFS client or access


Usage Access
browsers and devices through IPFS gateways

✅ Summary:
HTTP = Centralized, location-based content delivery (e.g.,
https://example.com/image.jpg )

Unit 3 : Technology Use-Cases 7


IPFS = Decentralized, content-based delivery using a unique hash (e.g.,
ipfs://QmHashValue )

IPFS aims to make the web faster, safer, and more resilient by shifting from
server-based access to peer-based content sharing.

6. Describe Swarm as a decentralized storage system and its core


functionalities.

🐝 Swarm: A Decentralized Storage System


Swarm is a distributed storage and content distribution platform that acts as
a native base-layer service in the Ethereum Web3 stack. It is designed to store
and serve:

Ethereum’s public records

Decentralized applications (dApps) and their data

General-purpose blockchain data

It supports the Web 3.0 vision of a decentralized, resilient internet by offering


an alternative to centralized storage systems.

⚙️ Core Functionalities of Swarm


Functionality Description

Decentralized Data is stored across a peer-to-peer network rather than centralized


Storage servers, ensuring decentralization and resilience.

Ensures multiple copies of the data exist in the network, increasing


Redundancy
data availability and reducing the chance of loss.

Low Latency Designed for fast access to data, with content caching and auto-
Retrieval scaling features.

Fault Swarm can continue functioning even when individual nodes


Tolerance disconnect or go offline.

Its distributed nature guarantees continuous access to stored content


Zero Downtime
without a single point of failure.

Unit 3 : Technology Use-Cases 8


Censorship Data cannot be easily taken down or blocked by any authority, making
Resistance it ideal for free and open information sharing.

Permanent Swarm supports versioned archives of content that can be stored


Archival potentially forever, ideal for immutable data records.

✅ Swarm vs IPFS
Both Swarm and IPFS are decentralized storage protocols aiming to replace
traditional Web 2.0 data layers.

They both offer features like distributed document storage, auto-scaling,


reliability, and censorship resistance.

However, Swarm is more tightly integrated with the Ethereum ecosystem,


serving as a core component of its infrastructure.

7. Discuss the challenges in transitioning from Web 2.0 to Web 3.0.

🚧 Challenges in Transitioning from Web 2.0 to Web 3.0


Transitioning from Web 2.0 (centralized, user-generated web) to Web 3.0
(decentralized, semantic, and blockchain-powered web) presents several
technical, economic, and social challenges:

1. Scalability Issues
Web 3.0 platforms, especially blockchain-based systems, struggle with
scalability.

Blockchains like Ethereum have limited transaction throughput, leading to


network congestion and high gas fees.

2. User Experience (UX)


Current Web 3.0 apps (dApps) often have complex interfaces.

They require wallets, private key management, and crypto knowledge,


making them less user-friendly for non-tech-savvy users.

Unit 3 : Technology Use-Cases 9


3. Interoperability
Lack of standardization and compatibility between different blockchains
and protocols.

Data and assets often cannot move freely between ecosystems like
Ethereum, Solana, Polkadot, etc.

4. Regulatory Uncertainty
Governments and regulators are still trying to define how to treat
cryptocurrencies, smart contracts, and tokenized assets.

Legal uncertainty can discourage mainstream adoption and investment.

5. Data Privacy vs Transparency


Web 3.0 promotes transparency, but data on public blockchains is visible
to everyone.

Balancing transparency with user privacy and data protection is a complex


challenge.

6. Energy Consumption
Many early Web 3.0 systems (like Bitcoin) use energy-intensive Proof of
Work.

There’s growing concern over the environmental impact, although newer


systems (e.g., Ethereum 2.0) use Proof of Stake to reduce energy usage.

7. Digital Identity Management


Web 3.0 lacks a unified digital identity system.

Users must manage multiple wallets and credentials, increasing


complexity and risk.

8. Adoption and Awareness


The general public is still largely unaware of the benefits and workings of
Web 3.0.

Unit 3 : Technology Use-Cases 10


Education, awareness, and trust-building are needed for mass adoption.

9. Security Concerns
Web 3.0 apps and smart contracts are vulnerable to hacks and exploits.

Smart contracts, once deployed, are immutable, making bugs difficult to


fix.

🔚 Conclusion
Despite its promise, Web 3.0 faces multiple hurdles on the path to replacing
Web 2.0. Addressing these challenges requires collaboration among
developers, regulators, businesses, and users to build a more open, secure,
and decentralized internet.

10. What are the advantages of using distributed storage systems over
centralized cloud services?

✅Centralized
Advantages of Using Distributed Storage Systems over
Cloud Services
Distributed storage systems, such as IPFS, Storj, and Swarm, offer several
benefits compared to traditional centralized cloud services (e.g., Google Drive,
AWS S3, Dropbox):

1. Decentralization
Data is not stored on a single central server.

Eliminates a single point of failure, improving resilience and fault tolerance.

2. Enhanced Privacy and Security


Files are often encrypted and split into shards.

Only users with the correct decryption key can access the data, increasing
data security.

Unit 3 : Technology Use-Cases 11


3. Improved Data Availability
Data is replicated across multiple nodes.

Even if some nodes go offline, the data remains accessible from others.

4. Censorship Resistance
No central authority can control or remove content.

Useful in environments with restricted internet freedom.

5. Cost Efficiency
Users can rent out unused storage space (e.g., in Storj), leading to a more
competitive pricing model.

Reduces dependency on large infrastructure providers.

6. Scalability
As more nodes join the network, storage capacity and bandwidth increase
automatically.

Supports rapid global expansion without the need for physical


infrastructure.

7. Data Integrity
Uses cryptographic hashes to ensure data has not been tampered with.

Any unauthorized change can be easily detected.

🔚 Conclusion
Distributed storage systems provide greater control, security, and resilience
for users. They align well with the Web 3.0 vision of a trustless, decentralized
internet, making them a promising alternative to centralized cloud platforms.

Unit 3 : Technology Use-Cases 12


11. Explain Golem and its working principle in distributed computing.

✅ Golem and Its Working Principle in Distributed Computing


Golem is a decentralized platform that functions as a global supercomputer,
enabling users to buy and sell computing power through a peer-to-peer
network. It allows anyone with idle computing resources to share them with
others, creating a marketplace for computation.

🔧 Working Principle of Golem


Golem operates through a decentralized network where tasks are distributed
among various nodes (computers), removing the need for centralized cloud
platforms like AWS or Google Cloud.

🧩 Key Steps in Golem’s Task Execution


1. Task Request

A requestor (user) submits a computational task (e.g., 3D rendering, AI


model training) on the Golem network.

2. Broadcasting the Demand

The task is broadcast to the network with specifications like required


CPU, RAM, or GPU.

3. Providers Respond

Providers (users with spare computing resources) offer their services,


stating their capabilities.

4. Matching Supply and Demand

The Golem system matches the requestor's task requirements with the
provider’s capabilities.

5. Negotiation

Both parties agree on the terms of service (cost, time, resources).

6. Task Execution

The input files are securely transferred to the provider.

Unit 3 : Technology Use-Cases 13


The provider executes the task locally.

7. Result Delivery

Once done, the output files are sent back to the requestor.

8. Payment

The provider is paid in Golem Token (GNT) for their service.

💡 Use Case Example


Instead of using a cloud service to render a complex video, a developer can
use Golem to tap into dozens of individual providers’ machines around the
world for faster and cheaper processing.

🔚 Conclusion
Golem revolutionizes computing by turning underused devices into on-demand
processing units, making decentralized distributed computing accessible,
efficient, and cost-effective.

12. What are the distinguishing features of Web 3.0 compared to its
predecessors?

🌐 1. Web 1.0 – “Read-Only Web” (Static)


Time Period: Early 1990s – early 2000s

Main Feature: Static websites with minimal interaction

Content: Created and controlled by a few; users could only read

Technology Used: HTML, static files, server-side rendering

Examples: Early websites like personal blogs, Yahoo directory

🌍 2. Web 2.0 – “Read-Write Web” (Interactive)


Time Period: 2004 onwards

Unit 3 : Technology Use-Cases 14


Main Feature: Dynamic and interactive user-generated content

Content: Users can read and write, contribute, and interact

Technology Used: JavaScript, AJAX, social platforms, centralized


databases

Examples: Facebook, YouTube, Twitter, Wikipedia

Monetization: Platforms monetized user data and content

🌎Intelligent)
3. Web 3.0 – “Read-Write-Own Web” (Decentralized &

Time Period: Emerging since 2014 – present

Main Features:

✅ Decentralization: No central authority (powered by blockchain)


✅ Data Ownership: Users control their own data
✅ Interoperability: Apps and platforms work seamlessly across
systems

✅ Semantic Web: Machines understand and interpret data contextually


✅ AI and Machine Learning: Intelligent automation and personalization
✅ Trustless Transactions: Smart contracts enable secure peer-to-peer
interaction

Technology Used: Blockchain, IPFS, Ethereum, NFTs, smart contracts

Examples: MetaMask, Uniswap, Filecoin, Decentraland, OpenSea

📊 Summary Table:
Feature Web 1.0 Web 2.0 Web 3.0

Reader, Contributor &


User Role Reader Reader & Contributor
Owner

Dynamic, User-
Content Static Decentralized, Tokenized
generated

Control Centralized Centralized platforms Decentralized networks

Data
Site owners Platforms Users
Ownership

Unit 3 : Technology Use-Cases 15


Blockchain, AI, IPFS, Smart
Tech Examples HTML, HTTP AJAX, JS, APIs
Contracts

Ads, data
Revenue Model Ads (basic) Tokens, crypto incentives
monetization

Unit 3 : Technology Use-Cases 16

You might also like