Notes of Class X Chapter1
Notes of Class X Chapter1
Summery : In this chapter, we will learn about Internet basics and different protocols.
Networking
What is Network:-
A network is an interconnected collection of autonomous computer that can
share and exchange information.
Need of Networking:-
Internet Basics
Internet:- The internet is a global system of interconnected computer
networks that use the standard internet protocol suite (TCP/IP) to serve
billions of users worldwide.
The Internet has gained popularity and emerged as an important and
efficient means of communication. The term Internet is derived from the
words ‘interconnection’ and ‘networks’. A network is a collection of two or
more computers, which are connected together to share information and
resources. The Internet is a worldwide system of computer
networks, i.e. network of networks. Through Internet, computers become
able to exchange information with each other and find diverse perspective
on issues from a global audience. Most of the people uses Internet for
sending and receiving E-mail and net surfing for retrieving information.
History of internet
Page 1
2
In mid 80’s another federal agency, the National Science Foundation (NSF)
created a new high capacity network called NSFnet (National Science
Foundation Network), which was more capable than ARPANET. The only
drawback of NSFnet was that it allowed only academic research on its network
and not any kind of private business on it. Now, several private organisations and
people started working to build their own networks, named private networks,
which were later (in 1990’s) connected with ARPANET and NSFnet to form the
Internet. The Internet really became popular in 1990’s after the development of
World Wide Web (WWW).
WORKING OF INTERNET
The computers on the Internet are connected to each other through small networks.
These networks are connected through the gateways to the Internet backbone.
All computers on the Internet, communicate with one another using TCP/IP, which is a
basic protocol (i.e. set of rules) of the Internet. TCP/IP (Transmission Control
Protocol/Internet Protocol) manages the transmission of data/file/document on the
Internet by breaking the data/file/document into small pieces or parts called packets
or datagrams.
Each packet contains actual data and address part, i.e. addresses of destination
and source upto 1500 characters. Functioning of TCP and IP are as follows:
• TCP It breaks message into smaller packets that are transmitted over the
Internet and also reassembles these smaller packets into the original
message that are received from the Internet.
• IP It handles the address part of each packet, so that the data is sent to the
correct address. Each gateway on the network check this address to see
where to forward the message.
Internet Engineering Task Force (IETF):- It develops and maintains the Internet’s
communication protocols.
Page 2
3
Internet Research Task Force (IRTF):- It looks into long-term research problems that could be
critical in five or ten years.
World Wide Web Consortium (W3C):- It develops standards for the evolution of the Web.
Internet Network Information Center (InterNIC):- It provides various registry services needed for
the Internet to operate effectively.
Internet Society (ISOC): It concerns with the growth and evolution of the Internet and the way
in which the Internet can be used.
Uses of Internet?
Internet has been the most useful technology of the modern time, which helps us not only
in our daily lives, but also in our personal and professional lives developments.
1. E-commerce:- The Process of carrying out business online is called E-commerce which
include the auction, buying and selling product.
2. Education:- The Internet has become a major tool for effective teaching as well as a
learning tool. for Example- E-learning, distance Learning.
3. Research:-The internet is used in research for online journals, magazines, information
etc.
4. E-Reservation:- The internet is useful in booking online ticket and online reservation
etc.
5. Online Payments:- Now a days, we can make payment online using Debit card, credit
card and internet banking.
Advantages of internet
1. Greater access to information reduces research time.
2. Allows you to easily communicate with other people.
3. Global reach enables one to connect everyone on the Internet.
4. Publishing documents on the Internet saves paper.
5. A valuable resource for companies to advertise and conduct business.
Disadvantages of internet
1. Cyber frauds may take place involving credit/ debit card numbers and details.
Page 3
4
WWW(World wide web):- The World wide web is most often referred to as “the Web”. The World
wide web is what most people think of as the internet.
It is all the web pages, pictures, videos and other online content that can be accessed via a web
browser. The internet, in contrast, is underlying network connection that allows us to send email and
access the world wide web.
The world wide web (WWW) is a network of online content that is formatted in HTML and accessed
over the internet. The WWW was originally designed in 1991 by Tim Berners Lee while he was a
British computer Scientist at CERN.
Website:
A website is a collection of related network web resources, such as web pages, multimedia content,
which are typically identified with a common domain name, and published on at least one web server.
Examples of websites are amazon.com, flipkart.com etc.
Webpage:-
A website typically consists of many web pages linked together in a coherent fashion.
There are 2 types of webpages.
Web Browser:- It is a software application that is used to locate, retrieve and display some
content on the World Wide Web, including Web pages. These are programs used to explore
the Internet. It is an interface that helps a computer user to gain access over all the content
on the internet. We can install more than one Web browser on a single computer. The user
Page 4
5
can navigate files, folders and Websites with the help of a browser. Infact, browser is called
web client.
There are two types of Web browsers, which are as follows:
Text Web Browser: A Web browser that displays only text-based information is known as
text Web browser, e.g. Lynx.
Graphical Web Browser: A Web browser that supports both text anu graphic information is
known as graphical Web browser. e.g. Internet Explorer, Firefox, Netscape, Safari, Google
Chrome, Opera.
NETSCAPE – It was introduced in 1994. Netscape comprises the major portion of the browser’s market.
INTERNET EXPLORER (IE) – It is a product of Microsoft. This is the most commonly used browser in
the world. This was introduced in 1995 alongwith Windows 95 launch and it has passed Netscape popularity
in 1998.
SAFARI – It is a Web browser developed by Apple Incorporation and included in Mac OS X. It was first
released as a public beta in January 2003. Safari provides good support for latest technologies like XHTML,
CSS2 etc.
FIREFOX – It is a new browser derived from Mozilla. It was released in 2004 and has grown to be the
second most popular browser on the Internet.
GOOGLE CHROME – This Web browser was developed by Google. Its beta and commercial versions
was released in September 2008 for Microsoft Windows.
OPERA – It is smaller and faster than most other browsers, yet it is fully featured. It is the most popular
mobile Web browser.
Web Server
It is a computer program that serves requested HTML pages or files from the Web client. A
Web client is the requesting program associated with the user. The Web browser is a client
that requests. HTML files from Web servers.
Every Web server that is connected to the Internet is associated with a unique address, i.e. IP
address which is made up of a series of four numbers between 0 to 255 separated by
periods!.), e.g. 68.178.157.132 or 68.122.35.127.
there are five major Web servers commonly used for hosting Websites as follows:
1. Apache HTTP Server
2. Internet Information Server
3. Lighttpd
4. Sun Java System Web Server
5. Jigsaw Server
Page 5
6
Web Server
Client-Server Model(Architecture):-
When a client requests a connection to a server, the server can either accept or reject the
connection. If the connection is accepted, the server establishes and maintains a connection
with the client over a specific protocol. For example, an email client may request an SMTP
connection to a mail server in order to send a message. The SMTP connection on the mail
server will then request authentication from the client, such as the email address and
password. If these credentials match an account on the mail server, the server will send the
email to the intended recipient.
Parts of URL
The URL contains three parts, which are as follows:
Page 6
7
Where https is the protocol and www.cbsetuts.com is the domain name and cbse-notes-
class-10-foundation-information-technology-internet-basics/ is the path name.
E-mail:
E-mail stands for ‘Electronic Mail’. It is a paperless method of sending messages, notes, pictures and even
sound files from one place to another using the Internet as a medium. It is an individual name, which is used
to send and receive E-mail on the Internet. It is used to specify the source or destination of an E-mail
message.
Parts of E-mail:-
To- The To field is where you type the E-mail address of the person who
is the recipient of your message.
From- The from field should contain your e-mail address.
Cc(Carbon copy)- field allows you to specify recipients who are not
direct addresses . when you CC people on an email, the CC list is visible
to all other recip ients.
BCC(Blind Carbon copy)- Each BCC recipient will receive the e-mail, but
will not see who else received a copy.
Blogs
A blog is a website in which information and articles posted on a
regular basis and displayed on newest first basis. The term blog is a
shortened form of web-log. Authoring a blog, maintaining a blog or
adding an article to an existing blog is called “blogging”. Individual
articles on a blog are called “blog posts”, “posts” or “entries”. A person
Page 7
8
1. You can work at any time of the day and work with your ease.
2. Blogger does not require more efforts to write articles for his/her blog.
3. Easy and quick to update or add new posts.
4. People can leave comments on your blog.
5. It increases blog revenue.
6. Blogs can be set-up quickly.
7. It is all about being social. You (blogger) need to answer to peoples’ queries and for that, reading
should be a part of day-to-day tasks.
Disadvantages of Blogs
Newsgroups:- Newsgroup is an online discussion group that allows interaction through electronic bulletin board
system (Usenet) and chat sessions. There are 3 different types of newsgroup-
1. Standard Newsgroups: These includes high quality discussions which can not be established without a
formal voting procedure. Hiearchies- Comp, Sci, Soc, News, Rec, Talk etc.
2. Alt Newsgroups:- These include the discussion which can be established by anyone with the requisite
technical knowledge.
3. Biz Newsgroups:- These include the discussion on commercial uses.
To simplify the selection of suitable newsgroup, they are divided into subject classification which are as
follows:
Downloading is transmitting data or file from a remote computer to a local computer. Downloading
enables user to save files on their own computers. These files are downloaded using FTP(File Transfer
Protocol). We can also use HTTP protocols to download files from the web. From the internet
Page 8
9
client/user’s point of view , to download a file is to request it from another computer or from a web page
on another computer and then receive or reterive it. whereas Uploading is the transmission of data or
files from a local computer to remote computer, as from your PC to a website you are constructing. It
allows users to easily exchange files over networks.
HTML:
It is used for designing Web pages. A markup language is a set of markup (angular bracket,
<>) tags, which tells the Web browser, how to display a Web page’s words and images for
the user. Each individual markup code is referred to as an element or a tag. The text placed
between a pair of angular brackets (<>) defines an HTML element.
HTML elements have two basic properties, i.e. attributes and content.
Attributes are used to apply the desired style on the text and content refers to the text that
you want to display on the browser. When a Web page is opened in a Web browser, then the
formatted content is displayed.
FTP(File Transfer Protocol): This protocol is used to move file between to and from
another computer across the internet. FTP works on the principal of Client/Server model. A
FTP client program enables the user to interact with a FTP server program in order to access
information and services on the server computer. To access FTP server program, users must
be able to connect to the internet or interact with FTP client program.
E-mail Protocols: Electronic mail protocols are useful to transfer files and messages over a
communication channel including wireless technology. These re SMTP, POP, IMAP.
Page 9
10
SMTP(Simple Mail Transfer Protocol): SMTP is a part of the TCP/IP Protocol suite.
SMTP is a protocol that enables electronic mail to move smoothly through the internet.
POP3(Post Office Protocol): This protocol is used to retrieve email from a mail server.
There are 2 versions of POP, The First called POP2, became a standard in the mid-80’s and
requires SMTP to send messages. The newer version POP3, can be used with or without
SMTP.
HTTP(Hyper Text Transfer Protocol):- It is the protocol used to transfer data over the World Wide
Web. It defines how messages are formatted and transmitted and what actions should be
taken by the Web servers and browsers in response to various commands.
e.g. when you enter a URL in your browser, this actually sends a HTTP command to the Web
server directing it to fetch and transmit the requested Web page. The other main standard
that controls how the World Wide Web works is HTML, which covers how Web pages are
formatted and displayed. HTTP is a stateless protocol because each command is executed
independently without any knowledge of the commands that came before it.
HTTPS:- Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of
HTTP, the protocol over which data is sent between your browser and the website
that you are connected to. The 'S' at the end of HTTPSs tands for 'Secure'. It means
all communications between your browser and the website are encrypted.
Page 10
11
Remote Login Protocols: A user can log in and run application on another computer on the
internet. The user has to create a client/server session with the target computer. Logging
into another machine on the internet or any network is known as remote login. SSH and
Telnet are two remote login protocols widely used on the internet.
SSH Protocols:- The SSH protocol (also referred to as Secure Shell) is a method for secure
remote login from one computer to another. It provides several alternative options for
strong authentication, and it protects the communications security and integrity with strong
encryption. It is a secure alternative to the non-protected login protocols (such as telnet,
rlogin) and insecure file transfer methods (such as FTP).
Telnet: Telnet is a terminal emulation protocol that provides the ability to log into a remote system over a
TCP/IP connection. The access is text based allowing the user to type into a command prompt on the
remote host and text displayed by the remote host is displayed on the local Telnet client.
Secure copy protocol (SCP): is a means of securely transferring computer files between a local host
and a remote host or between two remote hosts. It is based on the Secure Shell (SSH) protocol. SCP
commonly refers to both the Secure Copy Protocol and the program itself.
SFTP:- SFTP (SSH File Transfer Protocol) is a secure file transfer protocol. It runs over the
SSH protocol. It supports the full security and authentication functionality of SSH.
Exercises
Objective type questions:
1. Fill in the blanks
a. A Protocols is a set of rules that computers uses to communicate with each other.
b. Each web page has a unique address called its Uniform Resource Locator.
c. The home page of a website is called its home pages.
d. In order to navigate the internet, one has to use Web browser software
e. A Web page is an electronic document written in HTML.
f. The Secure Shell protocol offers a secured method to log into a remote host.
g. Downloading means transferring a file from remote computer to the local computer.
h. The HTTPS protocol is used by e-commerce websites for accepting online payments.
Page 11
12
d. The first thing you need to have to send/receive e-mails is an e-mail address.
Answer: True
e. Two computers with different operating system can communicate if they follow the same
protocol.
Answer: True
f. URL is an addressing method by which a document is addressed on the web.
Answer: True
g. The letter addressing system also uses country codes comprising four letters.
Answer: False
h. Internet Explorer is one of the most commonly used web browser.
Answer: True
3. MCQ
a. The ___ part of the TCP/IP protocol is responsible for breaking up the data into small
packets at the source computer.
Answer: (a) TCP only
b. A web page is a special type of file written in
Answer: ii. HTML
c. A ______ is a collection of web pages interconnected through hypertext.
Answer:
d. Which of the following can be done on the internet?
Answer: (iii) Both I and ii
e. which symbols separate the two parts of an email address?
Answer: (iv) None of these
f. http://www. abc.com is an example of ….
Answer: (ii) absolute url
g. _________ is the main protocol to connect to a remote computer
Answer.(i) Telnet
h. Protocols commonly used with internet are
Answer (c) both I and ii
Page 12
13
h. What is SCP?
Answer: It is a means of securely transferring computer files between a local host and a
remote host or between two remote hosts. It is based on the Secure Shell (SSH) protocol. SCP
commonly refers to both the Secure Copy Protocol and the program itself.
2. Can you name the set of rules used by e-commerce websites or other websites accepting
online payments?
Answer: HTTPS Protocols.
Page 13