Complete Book PoI
Complete Book PoI
AN Publications
No: 29,Moorthy Street,Balavinayagar nagar,
Tiruvallur-602001,
Tamilnadu,India
Title: Principles of Internet
ISBN: 978-81-959579-6-5
Authors: Ms.L.Hemalatha, Ms.S.Abirami, Ms.T.Thenmozhi ,Ms.A.Poornima
Ms.R.Sandhiya, Ms.K.Suganya
First published 2022 by AN PUBLICATIONS
No:29,Moorthy street,Balavinayagar Nagar,Tiruvallur-602001
Copyright © AN PUBLICATIONS
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system,
or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or
otherwise), without the prior written permission of the publisher.
This publication is designed to provide accurate and authoritative information. It is sold under
the express understanding that any decisions or actions you take as a result of reading this book
must be based on your judgment and will be at your sole risk. The editor and publications will
not be held responsible for the consequences of any actions and/or decisions taken as a result of
any information given or recommendations made.
L.Hemalatha
Head & Assistant Professor, Department of Computer Science
S.Abirami
Head & Assistant Professor, Department of Computer Applications
T.Thenmozhi
Assistant Professor, Department of Computer Applications
A.Poornima
Assistant Professor, Department of Computer Science
R.Sandhiya
Assistant Professor, Department of Computer Applications
K.Suganya
Assistant Professor, Department of Computer Science
Marudhar Kesari Jain College for Women
Vaniyambadi – 635751, Tamil Nadu, India
Table of Contents
Chapter -1
1.1 Introduction
1.2 What is Internet?
1.3 Evolution of Internet
1.4Advantages and Disadvantages of Internet
1.4.1 Advantages of Internet
1.4.2 Disadvantages of Internet
1.5 Information Travels across the Internet
1.6 How Data travels across the Internet?
1.7 TCP/IP (Transmission Control Protocol / Internet Protocol)
1.7.1 Introduction
1.7.2 Internet Protocol (IP)
1.7.3 TCP/IP Vs OSI Model
1.8 TCP/IP Model Layers
1.9 Functions of TCP/IP Layers
1.10 Working of TCP/IP Protocol
1.11 Importance of TCP/IP
1.12 Uses of TCP/IP
1.13 Pros and Cons of TCP/IP
1.14 Understanding Internet Addresses and Domains
1.14.1 Introduction
1.14.2 What is IP Addresses?
1.15 Uniform Resource Locator (URL)
1.16 Difference between Absolute and Relative URL
1.17 Understanding domains
1.18 Anatomy of Web Connections
1.18.1 Introduction
1.18.2 Internet File Types
1.18.3 Different File Types
1.19 Internet’s Underlying Architecture
1.19.1 Introduction
1.19.2 Domain Name System (DNS)
1.19.3 Domain Name System Architecture
1.19.4 How DNS Working?
1.20 Router
1.20.1 How does Router work?
1.20.2 Features of Router
1.20.3 Applications of Routers
1.20.4 Types of Routers
1.20.5 Benefits of Router
1.21 Difference between Bridge and Router
1.22 Difference between Hub, Switch, and Router
1.23 The Internet Client/Server Architecture
1.23.1 Introduction
1.23.2 Client/Server Architecture
Review Questions
Chapter -2
2.1 Connecting Your Computer
2.2 Types of Internet Connections- Wireless, Dial-up, DSL, Fiber, Cable, ISDN
2.3 Different Types of Internet Connections
2.4 Cable Internet Connection
2.5 Connecting to the Internet from Online Services
2.5.1 Connecting Using Wireless Broadband
2.5.2 Connecting Using an Ethernet Cable
2.5.3 Connecting a Computer Using Dial-Up
2.6 ISDN (Integrated Services Digital Network)
2.6.1 ISDN Services
2.7 Computer Networks
2.8 Digital Subscriber Line (DSL)
2.9 Communicating on the Internet
2.9.1 Email
2.9.2 E-Mail Address
2.9.3 E-mail Message Components
2.9.4 E-mail Header
2.9.5 Advantages
2.9.6 Disadvantages
2.10 Usenet and Newsgroups
2.10.1 Usenet (User Network)
2.10.2 Working of Usenet Newsgroup
2.10.3 Mailing list vs. Newsgroup
2.11 Internet Chat and Instant Messaging
2.11.1 Chatting on the Internet
2.12 History of Instant message
2.12.1 Using Instant Messaging
Review Questions
Chapter-3
3.1 World Wide Web (WWW)
3.2 WWW Architecture
3.3 Web Page
3.3.1 Static Web page
3.3.2 Dynamic Web page
3.4 Web Browser
3.4.1 Features of Web Browser
3.5 URL (Uniform Resource Locator)
3.6 Component of a Web Browser
3.7 Markup Languages vs. Programming Languages
3.8 Hyper Text Markup Language
3.9 eXtensible Markup Language
3.10 Standardized Generalized Markup Language (SGML)
3.11 Hypertext Markup Language
3.12 HTML Tags
3.13 Basic tags
3.14 Formatting Tags
3.15 Table Tags
3.16 List tags
3.17 Frames
3.18 Forms
3.19 Image Maps
3.20 Forms
3.21 Web Hosting
3.22 Web database definition
3.23 MySQL
3.24 Gopher
3.25 Telnet
3.26 Searching the internet
Review Questions
Chapter -4
4.1 Audio on the Internet
4.2 VIDEO on the internet
4.3 The <video> element
4.4 Contents of a media file
4.5 Intranet
4.6 Benefits of Intranet
4.7 Applications
Review Questions
Chapter -5
5.1 Motivation for Firewall
5.2 Firewalls
5.3 Working of Firewall
5.4 Advantages of Firewall
5.5 Disadvantages of Firewall
5.6 How does a firewall work?
5.7 Functions of Firewall
5.8 Limitations of Firewall
5.9 Types of Firewall
5.10 Difference between a Firewall and Anti-virus
5.11 Virus
5.12 Computer Virus
5.13 Trojan Virus
5.14 Worm Virus
5.15 Ransomware virus
5.16 Rootkit virus
5.17 Protection from Computer Virus
5.18 Digital Certificates
5.18.1 Types of Digital Certificate
5.19 Digital Certificate Standards
Review Questions
Chapter-1
The Wired World of the Internet
1.1 Introduction
Internet is a global network that connects billions of computers across the world with each
other and to the World Wide Web. It uses standard internet protocol suite (TCP/IP) to connect
billions of computer users worldwide. It is set up by using cables such as optical fibers and
other wireless and networking technologies. At present, internet is the fastest mean of sending
or exchanging information and data between computers across the world. It is a network of
networks that consists of millions of private, public academic, business, and government
networks.
1
As of 12 August 2016, there were more than 300 crores of internet users across the world.
2
ARPANET was developed by United States Department of Defense.
Basic purpose of ARPANET was to provide communication among the various bodies of
government.
Initially, there were only four nodes, formally called Hosts.
In 1972, the ARPANET spread over the globe with 23 nodes located at different
countries and thus became known as Internet.
By the time, with invention of new technologies such as TCP/IP protocols, DNS, WWW,
browsers, scripting languages etc., Internet provided a medium to publish and access
information over the web.
Cashless Transactions
Most countries are promoting cashless transactions and digital payments. This helps people
notcarry much cash. People can pay their bills through debit or credit cards using POS devices.
3
Education
The Internet has the availability of broad educational content on any topic with different types.
People can study the relevant topic just by spending a couple of minutes over the Internet.
Research
The Internet is playing a significant role in the field of research. In research, people can study
about the success and failed research and work further for the improvements. Uses of the Internet
in research have incredibly beneficial for the researchers.
Electronic Mail
Email or electronic mail is one of the first significant uses of the Internet. The email has enabled
faster communication between people on the Internet. Using email, people can quickly share
information, data files, such as images, audio, video, and other types of files.
Job Search
Getting a job is a lot easier than before. Any person can view relevant job information using the
Internet. However, the Internet has enabled people to find employment sitting at home to suit
their interests. Many websites provide details about job availability. Once people submit their
resumes, these websites keep informing about vacancies through email
Social Networking
Social networking sites have connected people around the world. Social networking is an
essential part of the Internet. With the help of the Internet, people have got the ability to form
social groups where they can share information, thoughts and ideas about anything
Collaboration
Due to the Internet, communication has become easier and better. You can easily connect with
anyone on the Internet, either texting, calling or video calling. It has created new cooperation
opportunities for the people. Besides, there are many cloud-based software and websites that
offer people to work on the same project simultaneously at the same time. People from different
places can easily connect and support their specialties using the Internet.
Entertainment
The Internet is the most effective means of entertainment. There are various options available on
the Internet, which people can try, such as watching movies, playing online games, listening to
songs, etc. The Internet has also made it easy for people to download entertainment items to their
local storage. Using the Internet, people can also share their videos, songs, pictures online with
others. Also, nowadays, people can watch live TV or sports on the Internet.
4
E-Commerce
The Internet is not just limited to ordering things; it can also be used to sell products. Many e-
commerce websites allow businesses and individuals to sell their products. Products are
purchased by these e-commerce companies, stored in their warehouses, packaged in their brand
packaging, and distributed by themselves.
File Transfer
The Internet has made file transfer between systems or devices easier. With FTP (File Transfer
Protocol), data can be securely exchanged over the Internet. FTP is mainly beneficial when large
files need to be transferred because email allows sharing files with limited size.
Navigation
Once a user put the location in the online maps (such as Google maps), it provides all the details
about that location. Users can even find the best route to visit that particular location. The map
also provides the distance between the locations. One can also search for any specific place like
the nearest hotel, restaurants, banks, ATM, etc.
Advertising
Because most people use the Internet, it is the best means of promoting something or advertising.
There are options for paid promotion as well as free promotion. There are many advertising
platforms on the Internet that help promote products or businesses online. These platforms
advertise products on other related websites using banners, videos, email etc.
Real-time updates
The Internet is helping people to keep up with what is happening around the world. Many news
and information websites provide real-time updates on various categories, such as politics,
history, news, geology, leisure, sports, technology, marketing, and more. The presence of e-
newspapers and magazines is updating people and helping to cut paper usage.
Internet allows us to communicate with the people sitting at remote locations. There are
various apps available on the wed that uses Internet as a medium for communication. One
can find various social networking sites such as:
o Facebook, Twitter, Yahoo, Google+, Flickr, Orkut
One can surf for any kind of information over the internet. Information regarding various
topics such as Technology, Health & Science, Social Studies, Geographical Information,
Information Technology, Products etc can be surfed with help of a search engine.
Apart from communication and source of information, internet also serves a medium for
entertainment. Following are the various modes for entertainment over internet.
• Online Television, Online Games, Songs, Videos, Social Networking Apps.
Internet allows us to use many services like:
• Internet Banking, Matrimonial Services, Online Shopping, Online Ticket Booking,
Online Bill Payment, Data Sharing, E-mail.
5
Internet provides concept of electronic commerce that allows the business deals to be
conducted on electronic systems.
Spamming
Another disadvantage is the Spamming. Spamming corresponds to the unwanted e-mails in bulk.
These e-mails serve no purpose and lead to obstruction of entire system.
Virus Attacks
Virus can easily be spread to the computers connected to internet. Such virus attacks may cause
your system to crash or your important data may get deleted.
Cyber Crime
There are various websites that do not provide the authenticated information. This leads to
misconception among many people. Also a biggest threat on internet is pornography. There are
many pornographic sites that can be found, letting your children to use internet which indirectly
affects the children healthy mental life.
Addiction, time-waster
If any person is spending much time on the Internet connected devices, he can be addicted to the
Internet. An Internet addictive person can lead to spending his precious time on the Internet,
rather than doing something productive. Thus, anyone who is addicted to surf the Internet can
6
hamper workplace productivity as well.
Although social networking sites can give you benefits to find new connections
all over theworld, you may find yourself disconnected from your real-life friends.
7
All data transfers across the Internet work on this principle. It helps networks manage
traffic -- if one pathway becomes clogged with traffic, packets can go through a different
route. This is different from the traditional phone system, which creates a dedicated
circuit through a series of switches.
All information through the old analog phone system would pass back and forth between
a dedicated connection. If something happened to that connection, the call would end.
That's not the case with traffic across IP networks. If one connection should fail, data can
travel across an alternate route. This works for individual networks and the Internet as a
whole.
For instance, even if a packet doesn't make it to the destination, the machine receiving the
data can determine which packet is missing by referencing the other packets. It can send a
message to the machine sending the data to send it again, creating redundancy. This all
happens in the span of just a few milliseconds.
If you're interested in switching to an IP convergence system, do some research first.
Many companies provide installation services. While an IP system is relatively easy to
maintain, it does require an up-front investment to put the system in place.
You'll need to outfit your organization with the proper servers, handsets, video conferencing
equipment and wiring to take full advantage of the system's capabilities.
8
Fig-1.5 : Data Travelling
9
functions. TCP defines how applications can create channels of communication across a
network. It also manages how a message is assembled into smaller packets before they
are then transmitted over the internet and reassembled in the right order at the destination
address.
IP defines how to address and route each packet to make sure it reaches the right
destination. Each gateway computer on the network checks this IP address to determine
where to forward the message.
A subnet mask is what tells a computer, or other network device, what portion of the IP
address is used to represent the network and what part is used to represent hosts (other
computers) on the network.
A Network Address Translator (NAT) is the virtualization of Internet Protocol addresses.
NAT helps improve security and decrease the number of IP addresses an organization
needs.
Common protocols of TCP/IP include the following:
o HTTP (Hyper Text Transfer Protocol) handles the communication between a web
server and a web browser.
o HTTPS (Secure HTTP) handles secure communication between a web server and
a web browser.
o FTP (File Transfer Protocol) handles transmission of files between computers.
10
THE NETWORK STACK
Application HTTP
Session Socket
Network Internet IP
The functions performed in each model are also similar because each uses a network layer and
transport to operate. The TCP/IP and OSI models are each mostly used to transmit data packets.
Although they will do so by different means and by different paths, they will still reach their
destinations.
The similarities between the TCP/IP model and the OSI model include the following:
They are both logical models.
They define networking standards.
They divide the network communication process in layers.
They provide frameworks for creating and implementing networking standards and
devices.
They enable one manufacturer to make devices and network components that can Coexist
and work with the devices and components made by other manufacturers.
The differences between the TCP/IP model and the OSI model include the following:
TCP/IP uses just one layer (application) to define the functionalities of the upper layers,
while the OSI model uses three layers (application, presentation and session).
The TCP/IP model uses one layer (link) to define the functionalities of the bottom layers,
while the OSI uses two layers (physical and data link).
The TCP/IP model use the internet layer to define the routing standards and protocols,
while OSI uses the network layer.
The TCP/IP header size is 20 bytes while the OSI header is 5 bytes.
11
The TCP/IP model is a protocol-oriented standard, whereas the OSI model is a generic
model based on the functionalities of each layer.
TCP/IP follows a horizontal approach, while OSI follows a vertical approach.
In the TCP/IP suite, the protocols were developed first, and then the model was
developed. In OSI, the model was developed first, and then the protocols in each layer
were developed.
TCP/IP helps establish a connection between different types of computers, whereas the
OSI model helps standardize routers, switches, motherboards and other hardware.
The network layer, also called the internet layer, deals with packets and connects
independent networks to transport the packets across network boundaries. The network
layer protocols are the IP and the Internet Control Message Protocol (ICMP), which is
used for error reporting.
The physical layer, also known as the network interface layer or data link layer, consists
of protocols that operate only on a link -- the network component that interconnects
nodes or hosts in the network. The protocols in this lowest layer include Ethernet for
local area networks (LANs) and the Address Resolution Protocol (ARP).
Applications
TEL TF
SMTP FTP NET DNS SNMP NFS TP
Presentation
RPC
Session
Network
12
Network Access Layer
A network layer is the lowest layer of the TCP/IP model.
A network layer is the combination of the Physical layer and Data Link layer defined in
the OSI reference model.
It defines how the data should be sent physically through the network.
This layer is mainly responsible for the transmission of the data between two devices on
the same network.
The functions carried out by this layer are encapsulating the IP datagram into frames
transmitted by the network and mapping of IP addresses into physical addresses.
The protocols used by this layer are ethernet, token ring, FDDI, X.25, frame relay.
Internet Layer
An internet layer is the second layer of the TCP/IP model.
An internet layer is also known as the network layer.
The main responsibility of the internet layer is to send the packets from any network, and
they arrive at the destination irrespective of the route they take.
IP Protocol: IP protocol is used in this layer, and it is the most significant part of
the entireTCP/IP suite.
13
network, then the IP datagram is sent indirectly. This can be accomplished by routing the
IP datagram through various devices such as routers.
ARP Protocol
ARP stands for Address Resolution Protocol.
ARP is a network layer protocol which is used to find the physical address from the IP
address.
The two terms are mainly associated with the ARP Protocol:
o ARP request: When a sender wants to know the physical address of the device, it
broadcasts the ARP request to the network.
o ARP reply: Every device attached to the network will accept the ARP request
and process the request, but only recipient recognize the IP address and sends
back its physical address in the form of ARP reply. The recipient adds the
physical address both to its cache memory and to the datagram header
ICMP Protocol
ICMP stands for Internet Control Message Protocol.
It is a mechanism used by the hosts or routers to send notifications regarding datagram
problems back to the sender.
A datagram travels from router-to-router until it reaches its destination. If a router is
unable to route the data because of some unusual conditions such as disabled links, a
device is on fire or network congestion, then the ICMP protocol is used to inform the
sender that the datagram is undeliverable.
An ICMP protocol mainly uses two terms:
o ICMP Test: ICMP Test is used to test whether the destination is reachable or not.
o ICMP Reply: ICMP Reply is used to check whether the destination device is
responding or not.
The core responsibility of the ICMP protocol is to report the problems, not correct them.
The responsibility of the correction lies with the sender.
ICMP can send the messages only to the source, but not to the intermediate routers
because the IP datagram carries the addresses of the source and destination but not of the
router that it is passed to.
Transport Layer
The transport layer is responsible for the reliability, flow control, and correction of data which is
being sent over the network. The two protocols used in the transport layer are User Datagram
protocol and TransmissionControl Protocol.
14
that has created the message.
Destination port address: The destination port address is the address of the application
program that receives the message.
Total length: It defines the total number of bytes of the user datagram in bytes.
Checksum: The checksum is a 16-bit field used in error detection.
UDP does not specify which packet is lost. UDP contains only checksum; it does not contain
any ID of a data segment.
Variable
8 bytes
Header Data
Header Format
Source port Destination port
Address 16bits Address 16 bits
Application Layer
An application layer is the topmost layer in the TCP/IP model.
It is responsible for handling high-level protocols, issues of representation.
This layer allows the user to interact with the application.
When one application layer protocol wants to communicate with another application
layer, it forwards its data to the transport layer.
There is an ambiguity occurs in the application layer. Every application cannot be placed
inside the application layer except those who interact with the communication system.
For example: text editor cannot be considered in application layer while web browser
using HTTP protocol to interact with the network where HTTP protocol is an
application layer protocol.
15
Following are the main protocols used in the application layer:
HTTP: HTTP stands for Hypertext transfer protocol. This protocol allows us to access
the data over the world wide web. It transfers the data in the form of plain text, audio,
video. It is known as a Hypertext transfer protocol as it has the efficiency to use in a
hypertext environment where there are rapid jumps from one document to another.
SNMP: SNMP stands for Simple Network Management Protocol. It is a framework used
for managing the devices on the internet by using the TCP/IP protocol suite.
SMTP: SMTP stands for Simple mail transfer protocol. The TCP/IP protocol that
supports the e-mail is known as a Simple mail transfer protocol. This protocol is used to
send the data to another e-mail address.
DNS: DNS stands for Domain Name System. An IP address is used to identify the
connection of a host to the internet uniquely. But, people prefer to use the names instead
of addresses. Therefore, the system that maps the name to the address is known as
Domain Name System.
TELNET: It is an abbreviation for Terminal Network. It establishes the connection
between the local computer and remote computer in such a way that the local terminal
appears to be a terminal at the remote system.
FTP: FTP stands for File Transfer Protocol. FTP is a standard internet protocol used for
transmitting the files from one computer to another computer.
16
Server
Client
SYN
Segment
Active Passive
Open Open
SYN+ACK
Segment
ACK
Segment
17
Supports several routing protocols; and
Is lightweight and doesn't place unnecessary strain on a network or computer.
18
1.10 Example for IP Address
Formats of IP Addresses
The four formats of IP Addresses
Class A
128 possible network IDs over
4 million host IDs per network ID
Class B
16K possible network IDs
64K host IDs per network ID
Class C
Over 2 million possible network IDs
254 host IDs per network ID
IP Address Representation
IP Addresses are usually shown in dotted decimal notation:
00000001 00000010 00000011 00000100
cs.williams.edu is 137.165.8.2
10001001 10100101 00001000 00000010
19
A host may have multiple interfaces, and therefore multiple host addresses.
Hosts that share a network all have the same IP network address (the network ID).
Subnet Addresses
An organization can subdivide it's host address space into groups called subnets.
The subnet ID is generally used to group hosts based on the physical network topology.
Sub netting
Subnets can simplify routing.
IP subnet broadcasts have a host ID of all 1s.
It is possible to have a single wire network with multiple subnets.
Services provided by IP
Connectionless Delivery (each packet is treated individually).
Unreliable (delivery is not guaranteed).
Fragmentation / Reassembly (based on hardware MTU).
Routing.
20
Error detection.
IP Datagram Fragmentation
Each fragment (packet) has the same structure as the IP datagram.
IP specifies that datagram reassembly is done only at the destination (not on a hop-by-hop
basis).
If any of the fragments are lost - the entire datagram is discarded (and an ICMP messageis
sent to the sender).
If packets arrive too fast - the receiver discards excessive packets and sends an ICMP
message to the sender (SOURCE QUENCH).
If an error is found (header checksum problem) the packet is discarded and an ICMP
message is sent to the sender.
UDP
UDP is a transport protocol
communication between processes
UDP uses IP to deliver datagrams to the right host.
UDP uses ports to provide communication services to individual processes.
Datagram Delivery
Connectionless
Unreliable
Minimal
Ports
TCP/IP uses an abstract destination point called a protocol port.
Ports are identified by a positive integer.
Operating systems provide some mechanism that processes use to specify a port or access
it.
21
TCP Segment Format : Addressing in TCP/IP
Each TCP/IP address includes:
Internet Address
Protocol (UDP or TCP)
Port Number
URL Types
There are two forms of URL as listed below:
Absolute URL
Relative URL
Absolute URL
Absolute URL is a complete address of a resource on the web. This completed address comprises
of protocol used, server name, path name and file name.
Relative URL
Relative URL is a partial address of a webpage. Unlike absolute URL, the protocol and serverpart
are omitted from relative URL.
Relative URLs are used for internal links i.e. to create links to file that are part of same websiteas
the WebPages on which you are placing the link.
For example : to link an image on www.mkjc.in, we can use the relative URL which can takethe
form like /internet_technologies/internet-osi_model.jpg.
22
1.16 Difference between Absolute and Relative URL
Absolute URL Relative URL
Used to link web pages on different Used to link web pages within the same
websites website.
Difficult to manage. Easy to Manage
Changes when the server name or Remains same even of we change the server
directory name changes name or directory name.
Take time to access Comparatively faster to access.
A subdomain — an optional addition to the main domain. Subdomains are created to organize
and navigate to different sections of your website. In our example, “support” is the subdomain.
A top-level domain — the last label in your domain name, in the above example it is .com
When you register an ecwid account, you get a site with your store – Instant Site. Together with
the Instant Site, you get a free domain for it. You can customize the domain so it represents your
business and makes it easy for the customers to find your store.
23
When information is sent across the Internet, the Transmission Control Protocol (TCP: the
networking-language computers use when communicating over the Internet) first breaks the
information up into packets of data. The Client computer sends those packets travel through
many levels of networks, computers, communications lines until they reach their final
destinations. Many types of hardware help the packets on their way. These are:
24
pick up WinAmp or QuickTime.
25
The QuickTime format was designed by Apple and originated on the Mac, but has made the
transition to the PC and is hugely popular.
Get the » QuickTime Player for all your moving picture needs.
26
Zipped files are really groups of other types of files kept together and compressed a bit. Many
downloads will consist of zip collections, so be sure to have something to open them with.
» WinZip is the best shareware program for unzipping files and making your own zips.
Streaming Media
Over the past few years many new file formats were brought in for the reason of allowing
streaming — that is, the file starts playing as soon as it begins to be downloaded, and keeps on
playing as more of the file makes its way to your computer. The hugely successful mp3 quickly
became the most popular of these formats. The proprietary RealAudio and RealVideo formats
from » Real are popular among multimedia sites, but are terrible formats that require a truly
horrible piece of software to play. Mpeg, AVI and MP4 video are also very popular, and can be
played in many programs like Quick time Player, VLC and Windows Media Player. These
typeof files are most important when embedding multimedia.
Domain Name System helps to resolve the host name to an address. It uses a hierarchical naming
scheme and distributed database of IP addresses and associated names
Domain Names
Domain Name is a symbolic string associated with an IP address. There are several domain
names available; some of them are generic such as com, edu, gov, net etc, while some country
level domain names such as au, in, za, us etc.
Edu Education
27
Gov U.S. government agency
28
Figure 1.13 : Tree Format of DNS
In the above diagram each subtree represents a domain. Each domain can be partitioned into sub
domains and these can be further partitioned and so on.
Name Server
Name server contains the DNS database. This database comprises of various names and
their corresponding IP addresses. Since it is not possible for a single server to maintain
entire DNS database, therefore, the information is distributed among many DNS servers.
Hierarchy of server is same as hierarchy of names.
The entire name space is divided into the zones
Zones
Zone is collection of nodes (sub domains) under the main domain. The server maintains a
database called zone file for every zone.
If the domain is not further divided into sub domains then domain and zone refers to the same
thing.
The information about the nodes in the sub domain is stored in the servers at the lower levels
however; the original server keeps reference to these lower levels of servers.
29
Types of Name Servers
Following are the three categories of Name Servers that manages the entire Domain Name
System:
Root Server
Primary Server
Secondary Server
Root Server
Root Server is the top level server which consists of the entire DNS tree. It does not contain the
information about domains but delegates the authority to the other server
Primary Servers
Primary Server stores a file about its zone. It has authority to create, maintain, and update the
zone file.
Secondary Server
Secondary Server transfers complete information about a zone from another server which may be
primary or secondary server. The secondary server does not have authority to create or update a
zone file.
1.20 Router
The router is a physical or virtual internetworking device that is designed to receive, analyze, and
forward data packets between computer networks. A router examines a destination IP address of
a given data packet, and it uses the headers and forwarding tables to decide the best way to
transfer the packets. There are some popular companies that develop routers; such
are Cisco, 3Com, HP, Juniper, D-Link, Nortel, etc. Some important points of routers are given
below:
30
A router is used in LAN (Local Area Network) and WAN (Wide Area Network)
environments. For example, it is used in offices for connectivity, and you can also
establish the connection between distant networks such as from Bhopal to
It shares information with other routers in networking.
It uses the routing protocol to transfer the data across a network.
Furthermore, it is more expensive than other networking devices like switches and hubs.
A router works on the third layer of the OSI model, and it is based on the IP address of a
computer. It uses protocols such as ICMP to communicate between two or more networks. It is
also known as an intelligent device as it can calculate the best route to pass the network packets
from source to the destination automatically.
A virtual router is a software function or software-based framework that performs the same
functions as a physical router. It may be used to increase the reliability of the network by virtual
router redundancy protocol, which is done by configuring a virtual router as a default gateway.
A virtual router runs on commodity servers, and it is packaged with alone or other network
functions, like load balancing, firewall packet filtering, and wide area network optimization
capabilities.
Why Routers?
A router is more capable as compared to other network devices, such as a hub, switch, etc., as
these devices are only able to execute the basic functions of the network.
For example, a hub is a basic networking device that is mainly used to forward the data between
connected devices, but it cannot analyze or change anything with the transferring data.
On the other hand, the router has the capability to analyze and modify the data while transferring
it over a network, and it can send it to another network. For example, generally, routers allow
sharing a single network connection between multiple devices.
31
Fig - 1.16 : Router with Multiple Devices
32
1.20.1 How does Router work?
A router analyzes a destination IP address of a given packet header and compares it with the
routing table to decide the packet's next path. The list of routing tables provides directions to
transfer the data to a particular network destination. They have a set of rules that compute the
best path to forward the data to the given IP address.
Routers use a modem such as a cable, fiber, or DSL modem to allow communication between
other devices and the internet. Most of the routers have several ports to connect different devices
to the internet at the same time. It uses the routing tables to determine where to send data and
from where the traffic is coming.
A routing table mainly defines the default path used by the router. So, it may fail to find the best
way. To forward the data for a given packet. For example, the office router along a single default
path instructs all networks to its internet services provider.
There are two types of tables in the router that are static and dynamic. The static routing tables
are configured manually, and the dynamic routing tables are updated automatically by dynamic
routers based on network activity.
33
Routers provide the redundancy as it always works in master and slave mode.
It allows the users to connect several LAN and WAN.
Furthermore, a router creates various paths to forward the data.
34
In modern times, routers have the facility of inbuilt USB ports within the hardware. They
have enough internal storage capacity. External storage devices can be used with routers
to store and share data.
Routers are used to set up the operation and maintenance center of an organization, which
is known as the NOC center. All equipment at a distant location are connected by routers
on optical cable at a central location, which also offer redundancy through the main link
and protection link topology.
Wireless Router: Wireless routers are used to offer Wi-Fi connectivity to laptops, smartphones,
and other devices with Wi-Fi network capabilities, and it can also provide standard Ethernet
routing for a small number of wired network systems.
Wireless routers are capable of generating a wireless signal in your home or office, and it allows
the computers to connect with routers within a range, and use the internet. If the connection is
indoors, the range of the wireless router is about 150 feet, and when the connection is outdoors,
then its range is up to 300 feet.
Furthermore, you can make more secure wireless routers with a password or get your IP address.
Thereafter, you can log in to your router by using a user ID and password that will come with
your router.
Brouter: A brouter is a combination of the bridge and a router. It allows transferring the data
between networks like a bridge. And like a router, it can also route the data within a network to
the individual systems. Thus, it combines these two functions of bridge and router by routing
some incoming data to the correct systems while transferring the other data to another network.
Core router: A core router is a type of router that can route the data within a network, but it is
not able to route the data between the networks. It is a computer communication system device
and the backbone of networks, as it helps to link all network devices. It is used by internet
service providers (ISPs), and it also provides various types of fast and powerful data
communication interfaces.
Edge router: An edge router is a lower-capacity device that is placed at the boundary of a
network. It allows an internal network to connect with the external networks. It is also called as
an access router. It uses an External BGP (Border Gateway Protocol) to provides connectivity
with remote networks over the internet.
35
The subscriber edge router belongs to an end-user organization, and it works in a situation
where it acts on a border device.
The label edge router is used in the boundary of Multiprotocol Label Switching (MPLS)
networks. It acts as a gateway between the LAN, WAN, or the internet.
Broadband routers: Broadband routers are mainly used to provide high-speed internet access to
computers. It is needed when you connect to the internet through phone and use voice over IP
technology (VOIP).
All broadband routers have the option of three or four Ethernet ports for connecting the laptop
and desktop systems. A broadband router is configured and provided by the internet service
provider (ISP). It is also known as a broadband modem, asymmetric digital subscriber line
(ADSL), or digital subscriber line (DSL) modem.
Performance enhancement: It enhances the performance within the individual network. For
example, if a network has 14 workstations, and all generate approximately the same volume of
traffic. The traffic of 14 workstations runs through the same cable in a single network. But if the
network is divided into two sub-networks each with 7 workstations, then a load of traffic is
reduced to half. As each of the networks has its own servers and hard disk, so fewer PCs will
need the network cabling system.
Reliability: Routers provide reliability. If one network gets down when the server has stopped,
or there is a defect in the cable, then the router services, and other networks will not be affected.
The routers separate the affected network, whereas the unaffected networks remain connected,
without interrupting the work and any data loss.
Networking Range: In networking, a cable is used to connect the devices, but its length cannot
exceed 1000 meters. A router can overcome this limitation by performing the function of a
repeater (Regenerating the signals). The physical range can be as per the requirement of a
particular installation, as long as a router is installed before the maximum cable range exceeds.
Routing Protocols
Routing protocols specify a way for the router to identify other routers on the network and make
dynamic decisions to send all network messages. There are several protocols, which are given
below:
Open Shortest Path First (OSPF): It is used to calculate the best route for the given packets to
reach the destination, as they move via a set of connected networks. It is identified by the
Internet Engineering Task Force (IETF) as Interior Gateway Protocol.
Border Gateway Protocol (BGP): It helps manage how packets are routed on the internet via
36
exchange of information between edge routers. It provides network stability for routers if one
internet connection goes down while forwarding the packets, it can adapt another network
connection quickly to send the packets.
Interior Gateway Routing Protocol (IGRP): It specifies how routing information will be
exchanged between gateways within an independent network. Then, the other network protocols
can use the routing information to determine how transmissions should be routed.
Enhanced Interior Gateway Routing Protocol (EIGRP): In this protocol, if a router is unable
to find a path to a destination from the tables, it asks route to its neighbors, and they pass the
query to their neighbors until a router has found the path. When the entry of routing table
changes in one of the routers, it informs its neighbors only about the changes, but do not send the
entire table.
Exterior Gateway Protocol (EGP): It decides how routing information can be exchanged
between two neighbor gateway hosts, each of which has its own router. Additionally, it is
commonly used to exchange routing table information between hosts on the internet.
Routing Information Protocol (RIP): It determines how routers can share information while
transferring traffic among connected group of local area networks. The maximum number of
hops that can be allowed for RIP is 15, which restricts the size of networks that RIP can support.
Bridge Router
A bridge transfers the data in the form of frames. A router transfers the data in the
formof packets.
It sends data based on the MAC address of It sends data based on the IP address
adevice. ofa device.
The bridge has only one port to connect the The router has several ports to
device. connectthe devices.
37
The bridge does not use any table to forward The router uses a routing table to
thedata. sendthe data.
There are three primarily networking devices that connect the computers from one to another.
These devices are hub, switch, and router. These all have the ability to connect one computer
to another, but there is some difference between them. The difference between a hub, switch,
and router are given below:
Hub: A hub is a basic networking device that is used to connect computers or other
networking devices together. A hub does not use any routing table to send the data to the
destination. Although it can identify basic errors of networks like collisions, it can be a
security risk to broadcast all information to the multiple ports. As the hub is a dumb device, it
does not need an IP address. Furthermore, Hubs are cheaper than a switch or router.
Switch: A switch is a hardware device that also connects computers to each other. A switch
is different as compared to a hub in that way; it handles packets of data. Whenever a switch
receives a packet, it decides the device to which the packet can be sent, and sends it to that
device only. A hub broadcasts the packet to all computers, but the switch does not circulate
the packet to all devices, which means bandwidth is not shared with the network, and thus it
increases the efficiency of the network. That's why switches are more preferred as compared
to a hub.
Router: A router is more different from a switch or hub. It is mainly used to route the data
packets to another network instead of transmitting the data to the local networks only. A
router is commonly found in homes and offices as it allows your network to communicate
with other networks through the internet. Basically, a router provides more features to your
networks like firewall, VPN, QoS, traffic monitoring, etc.
For example:
A routing table contains the following entities:
It contains an IP address of all routers which are required to decide the way to reach the
destination network.
It includes extrovert interface information.
Furthermore, it is also contained IP addresses and subnet mask of the destination host.
38
1.23 The Internet Client/Server Architecture
1.23.1 Introduction
In the late 1960s, the US Department of Defense decides to make a large network from a
multitude of small networks, all different, which begin to abound everywhere in North
America.
We had to find a way to these networks coexist and give them an outdoor visibility, the same
for all users. Hence the name of InterNetwork (interline), abbreviated as Internet, data this
network of networks.
The Internet architecture is based on a simple idea: ask all networks want to be part of
carrying a single packet type, a specific format the IP protocol. In addition, this IP packet
must carry an address defined with sufficient generality in order to identify each computer
and terminals scattered throughout the world. This architecture is illustrated in Figure.
Table- : List of Subnet mask and Interface
Default Eth3
39
where it is decapsulated so as to retrieve the IP packet. The IP address is examined to
locate, thanks to a routing algorithm, the next network to cross, and so on until arriving at
the destination terminal.
To complete the IP, the US Defense added the TCP protocol; specify the nature of the
interface with the user. This protocol further determines how to transform a stream of
bytes in an IP packet, while ensuring quality of transport this IP packet. Both protocols,
assembled under the TCP / IP abbreviation, are in the form of a layered architecture.
They correspond to the packet level and message-level reference model.
The Internet model is completed with a third layer, called the application level, which
includes different protocols on which to build Internet services. Email (SMTP), the file
transfer (FTP), the transfer of hypermedia pages, transfer of distributed databases (World
Wide Web), etc., are some of these services. Figure shows the three layers of the Internet
architecture.
Application
TCP
IP
IP packets are independent of each other and are individually routed in the network by
interconnecting devices subnets, routers. The quality of service offered by IP is very small and
offers no detection of lost or possibility of error recovery packages.
TCP combines the functionality of message-level reference model. This is a fairly complex
protocol, which has many options for solving all packet loss problems in the lower levels. In
particular, a lost fragment can be recovered by retransmission on the stream of bytes. TCP
uses a connection-oriented mode.
The flexibility of the Internet architecture can sometimes be a default, to the extent that global
optimization of the network is carried out by sub-network subnet, by a succession of local
optimizations. This does not allow a homogeneous function in different subnets traversed.
Another important feature of this architecture is to place the entire control system, that is to say,
intelligence and control of the network, in the terminal machine leaving virtually nothing in the
network, at least in the current version, IPv4, the IP protocol. The control intelligence is in the
TCP software on the PC connected to the network.
40
It is the TCP protocol which takes care of sending more or fewer packets according to network
load. Precise control window the maximum number of unacknowledged fragments that may be
issued. The TCP window control increases or decreases the traffic following the time required to
complete a round trip.
Over this time increases, Considering the more congested network, and the transmission rate
must decrease to counter saturation. In return, the infrastructure cost is extremely low; no
intelligence is not in the network. The service provided by the network of networks corresponds
to a quality called best effort, which means that the network does its best to carry the traffic. In
other words, the service quality is not assured.
The new generation of IP, IPv6, introduces new features that make the nodes of the network
smarter. The new generation of routers comes with QoS management algorithms, which allow
them to provide transportation can meet time constraints or packet loss. We expect the arrival of
IPv6 for ten years, but it’s still IPv4 IP that governs the world. The reason for this is that every
new need achievable with IPv6, IPv4 has been able to find the algorithms needed to do as well.
In IPv4, each new customer is treated the same way as those already connected with resources
being distributed equitably among all users. The resource allocation policies of telecom
operator’s networks are totally different, since, on these networks, a customer who already has a
certain quality of service does not suffer any penalty because of the arrival of a new customer.
As discussed, the now advocated solution in the Internet environment is to encourage customers
with real-time requirements, using appropriate protocols, using priority levels.
The IP protocol for thirty years, but remained almost confidential for twenty years before taking
off, unless its properties as a result of the failure of the protocols directly related to the reference
model, too many and often incompatible. The IP world growth comes from the simplicity of its
protocol, with very few options, and it’s free.
1.23.2 Client/Server Architecture
The client/server architecture significantly decreased network traffic by providing a query
response rather than total file transfer. It allows multi-user updating through a GUI front end toa
shared database. Remote Procedure Calls (RPCs) or standard query language (SQL) statements
are typically used to communicate between the client and server.
Three tier architectures The three tier architecture is introduced to overcome the
drawbacks of the two tier architecture. In the three tier architecture, a middleware is used
41
between the user system interface client environment and the database management
server environment.
These middleware are implemented in a variety of ways such as transaction processing
monitors, message servers or application servers. The middleware perform the function
of queuing, application execution and database staging. In addition the middleware adds
scheduling and prioritization for work in progress.
The three tier client/server architecture is used to improve performance for large number of
users and also improves flexibility when compared to the two tier approach.
The drawback of three tier architectures is that the development environment is more difficult to
use than the development of two tier applications.
The widespread use of the term 3-tier architecture also denotes the following architectures:
Application sharing between a client, middleware and enterprise server
Application sharing between a client, application server and enterprise database server.
Three tier with message server. In this architecture, messages are processed and prioritized
asynchronously. Messages have headers that include priority information, address and
identification number. The message server links to the relational DBMS and other data sources.
Messaging systems are alternative for wireless infrastructures.
Three tier with an application server This architecture allows the main body of an application
to run on a shared host rather than in the user system interface client environment. The
application server shares business logic, computations and a data retrieval engine. In this
architecture applications are more scalable and installation costs are less on a single server than
maintaining each on a desktop client.
3-tier architecture provides
A greater degree of flexibility
Increased security, as security can be defined for each service, and at each level
Increased performance, as tasks are shared between servers
42
interfaces (API’s) andRPC’s.
An important characteristic of client-server systems is scalability. They can be scaled
horizontally or vertically. Horizontal scaling means adding or removing client
workstations with only a slight performance impact. Vertical scaling means migrating to
a larger and faster server machine or multi servers.
Review Questions
1. What is Internet?
2. Define TCP/IP .
3. What is Internet Protocol (IP)?
4. Define Router.
5. What is DNS?
6. Discuss about advantages of Internet.
7. Explain the Disadvantages of Internet.
8. Explain the TCP/IP Model Layers.
9. Explain the functions of TCP/IP Layers
10. Explain the working of TCP/IP Protocol
11. Explain Uniform Resource Locator.
12. Difference between Absolute and Relative URL
13. Explain about Domain Name System (DNS
14. Explain the Domain Name System Architecture
15. How DNS Working? Explain.
16. How does Router work? Explain.
17. Explain the types of Routers.
18. Difference between Bridge and Router.
19. Difference between Hub, Switch, and Router.
43
Chapter -2
Connecting to the Internet
2.1 Connecting Your Computer
Whether you're using Wi-Fi, Ethernet, or the slowly fading dial-up, connecting to the internet is a
simple task that's important to learn.
Fig - 2.1 Connecting the Computera)Ensure that the source of the internet is on
It may seem obvious, but a common mistake that's often made when connecting to the internet is not
making surethe source of the internet is on.
Especially if you've just set up a router and/or modem, ensure that it's on and that everything is plugged
in properly, and that any lights on it aren't indicating that there are problems.
Make sure that everything is plugged in properly and is working right before getting started.
44
Understand that most mobile devices can only connect to wireless broadband
Devices like smartphones, mobile tablets, iPods, handheld gaming systems, and so forth can usually
only connect to Wi-Fi services, due to the portable nature of them. Therefore, you won't be able to
connect a mobile device to ethernet or to a dial-up network. Ethernet and dial- up connections are
limited to computers and non-portable gaming devices.
Some common devices or operating systems, and their paths to the settings, are listed below.
Windows XP: S /tart –> Control Panel –> Network and Internet Connections
Windows Vista: Start –> Network –> Network and Sharing Center
Windows 7: Start –> Control Panel –> Network and Internet
Windows 8: Start –> Search "View network connections" –> View Network Connections
Windows 10: Search "View network connections" –> View Network Connections
Android: Settings –> Wi-Fi (or Wireless & Networks)
45
2.2 Types of Internet Connections- Wireless, Dial-up, DSL, Fiber, Cable, ISDN
Internet connections are of different types depending upon the cost, speed, availability, etc. which
type of internet connection is most beneficial for you? It depends upon many factors.
Internet connections are categorized according to their uses like at home, offices, organization,etc.
Dial-up
In the past, the internet is connected by the dial-up lines.
The dial-up line uses PSTN (Public Switched Telephone Network).
PSTN may be of the telephone line, fiber optic, Microwave transmission or communicationssatellite.
Here is the same line for internet and telephone, so at a time only one task can take place either you can
run internet or talk on the telephone. It is the main disadvantage of a Dial-up connection.
It is the most inexpensive form of the internet connection, apart from it, its speed is also very slow from
28 Kbps to 56 Kbps.
46
It has a very high ping (Latency) speed so we cannot watch online movies and play online games.
ISDN
ISDN stands for Integrated Service Digital Network.
This connection is nearly similar to the DSL.
ISDN is a set of international communication standards designed in 1980 and improved in the 1990s.
47
It is a digital network to transmit voice, image, video, and text over the existing circuit- switched PSTN
telephone network. Different types of devices, such as analog phone, a fax machine, or a computer, are
connected to an ISDN terminal adaptor, which converts different types of data into ISDN format so that
they can share the same digital PSTN network.
48
In a DSL internet connection, both voice and internet data can flow over the same telephone line
at the same time.
It has a DSL modem which filters the voice and data.
DSL represents a high-speed connection, much fast than the ancient dial-up connection, but it is
not as fast as a cable connection.
So due to DSL modem, you can go on the internet and talk on the phone at the same time
(Modem convert analog signal to digital signal).
Speed of DSL varies; depending upon the place where you live, but on an average, download
speed varies from 5Mbps to 100 Mbps.
SDSL (Symmetric Digital Subscriber Line): In SDSL connection, Download and upload speedare
equal. It is typically used in businesses.
49
Broadband Cable is typically provided by the same provider that provides cable television to its
customers. Here we use cable modem/wifi router combo. Because of the connection of your neighbors
and you are on the same cable line so during the peak hours you have experienced slow speed. The
reason behind is that your neighbors are alsousing at the same time.
Fiber
A fiber internet connection provides the fastest internet speed today. It can provide download
and upload speed of up to 1000 Mbps.
It uses light to transfer the data through the optical fiber cable.
In other forms of internet, connection data is transferred in electrical form, so signal get weaker
and weaker at large distances because singles in the copper cable can be affected by
electromagnetic interference.
But in the fiber optic cable, signal transfers in the glass in the form of light, it can travel to long
distances without any losses.
Fiber is more expensive than the DSL and cable.
Satellite
50
Satellite internet is the internet which uses the path of the outer space. Satellite internet signal
travels more than 46,000 miles (From ISP to user through satellite).
In rural area satellite internet will be the best option for high speed, it is a faster option than
dial-up.
Still, large-scale improvements are going on for making it more usable and reliable in the field
of infrastructure and technology.
At many places, its speed is less than the cable and DSL connection.
Satellites are orbiting directly over the equator, means it is a geostationary satellite.
Working
In this internet connection when you search about anything, on your internet devices, its signal send to
the satellite via a satellite dish and from satellite to NOC (Network Operation Center) retrieves data on
earth, and sends it back to the satellite, the whole process take place in reverse.
Distance from satellite ISP to satellite or from satellite to the user is more than 23000 miles. It means
data travels more than 46,000 miles. This process takes place in a fraction of seconds.
High Latency represents a bad signal in satellite internet connection. For browsing and downloading,
latency does not affect much but during gaming and streaming it affects lots.
Cellular
In this network, radio waves are used for transfer signal to and from the mobile phone.
In cellular technology geographic area is divided into hexagonal cells, with it each cell having
its tower and frequency slot.
Generally, these cellular towers are connected through a wire or more specifically optical fiber
cable. These optical fiber cables are laid under the ground or ocean for providing national or
international connectivity.
During the use of the internet; Smartphone transmits a signal in the form of electromagnetic
waves.
The electromagnetic wave produces by your phone are picked up by the tower and system on
the tower convert them high-frequency light pulses.
These light pulses are further transferred to the base transceiver for the further signal
51
transferring.
After that signal transferred to the destination server, for what you searched, after that reverse
process takes place.
Hotspot
A hotspot is a technology which is relatively similar to the wifi. Hotspot provides internet
access to users via WLAN in the specific area to their location.
For illustration; router and modem are like hotspots which transfer the data in the form of a
radiofrequency wave in the surrounding of its centralized position.
Like Smartphone and mobile hotspots, here you can share your data with your friends.
You can say that by the help of a hotspot we can create wifi.
They are of two types: Passwords protected and free to uses.
But beware that free hotspots are most of the time on the target of the hackers.
Wireless
The wireless network is built with the help of several hardware components like wireless
excess point or router and user devices like mobile phone, tablets, laptop, etc. which are
equipped with the wifi adaptor.
52
On the other hand, a wireless router is connected to the internet via a physical connection i.e.
with the fiber cable or analog line which uses a telephone and modem, after that connected to
the router.
The wireless router is then connected to the devices via radio waves established an end to end
internet connection.
A router receives the data from the internet and translates it is to a radio signal and sends it to
the wireless network to the connected devices.
The identical process also happens in reverse.
Broadband
Broadband is also known as a wideband because during communication it uses and provides a
wide band of frequencies. The wider the bandwidth of a channel, the greater will be the
information-carrying capacity.
Here you can achieve speed up to 100 Mbps, it typically depends upon the cables we use like in
case of coaxial cable data transfer speed may vary but in optical fiber cables speed will be high.
Generally, its speed in Mbit/sec but it can be Gbit/sec. (Found during testing in optical fiber
cable)
ADSL broadband is used in homes and offices.
These are well-known types of internet connections, which generally people use.
53
Fig:2.3 Connecting with Wireless
Make sure that the computer does not have the Wi-Fi capability turned off before proceeding.
54
Find the name of your Wi-Fi network
Your broadband network's router should have the default name written on it. The name of a hotspot
network will usually show up by default as the name of your cellular device (e.g. "[Your name]'s
iPhone").Find this name and select it.
Wi-Fi or hotspot names can be changed, but if you've changed the name of your network or hotspot, you
probably know what it is.
Some protected public networks may have varying passwords per person.
55
Wait for the computer to connect
It often takes a few seconds for a computer to connect to a wireless source, but if the computer can't
establish the connection to the router, it will time out the Wi-Fi connection.
56
2.5.2 Connecting Using an Ethernet Cable
Get an Ethernet cable and any needed adapters
Many recent devices can connect directly to the router via an ethernet cable. However, some aren't
built to do that. Laptops, for example, often don't have components for using ethernet. For that reason,
make sure you get any adapters you may need for the ethernet
cable to ensure that you can use it.
Ethernet cables are all different; for example, a Cat-5 or Cat-5e cable runs at slower speeds than a Cat-
6. However, it's also largely dependent on the router's connection and how many people will be
connecting to the network at once. Unless you're doing very, very intensive upload work, you're
probably not going to need a Cat-6 cable if you're the only one on the network.
57
Fig:2.12 connect Ethernet to brand band source
Connect the other end of the cable to the computer
Find the Ethernet jack on your computer andplug it in. This jack will typically be located
on the back of the computer, where the other components plug in.
If your computer doesn't support Ethernet, you'll need to make sure the computer is connected to the
adapter, and then connect the cord via the adapter.
58
Test out your internet connection
Open up a page in a web browser and see if it loads. Some web pages can take longer to load than
others, and others crash sometimes, so you may want to try and load a reliable website (e.g. google.com
or isup.me) to ensure that the connection is running.
59
Ethernet is more reliable than Wi-Fi, but that doesn't mean that things still can't go wrong.
If you're having trouble with the ethernet, it can stem from many problems, but make sure that the
basics (e.g. the router being connected) are established, and that your computer isn't being troublesome.
If you want to do some very serious internet browsing, it will be best to find a Wi-Fi hotspot in a public
location. However, dial-up is still commonplace in a few rural areas, which means that you may find
yourself needing to connect to it.
60
Plug in the modem to the phone jack
Oftentimes, places with dial-up internet will have two phone lines - one for the phone, and one for the
modem. However, if the modem isn't often used, it may be unplugged, or there may only be one phone
line.
Make sure that the phone cable is plugged into both the phone jack on the wall, and the plug on the
modem.
Fig:2.20 Status
61
62
Access your computer's network settings
You'll need to manually set up the dial-up connection on the computer. From there, configure the modem
settings. If this is your first time connecting to the dial-up source, you'll most likely need to configure the
modem's network settings
While the process is slightly different for every OS, you'll need to enter the same information: the dial-up
phone number, a username, and a password. The settings paths that you'll need to follow in order to
configure the network are:
On Windows XP: Network and Internet Connections –> Set up or change your Internet connection –
> Setup
On Windows Vista: Network and Sharing Center –> Set up a connection or network –> Set up a
dial-up connection
You may want to try and load a solely text-based webpage to increase the loading speed and tell if your
internet is working.
63
Fig:2.22 Test connection Fig:2.23 Troubleshoot8)Troubleshoot if you can't connect
While dial-up is no longer widely supported, it's still possible to have issues with it. Ensure that thephone
line is properly plugged in and that your system can connect to dial-up internet.
Windows 10 has been known to have some trouble with dial-up connections sometimes. You may have to
use a computer with an older operating system, if available.
Ensure that you haven't accidentally plugged the phone cable into the ethernet jack by mistake. The phone
cable's jack is smaller and is often denoted by a phone symbol.
Before Integrated Services Digital Network (ISDN), the telephone system was seen as a way to transmit
voice, with some special services available for data. The main feature of ISDN is that it can integrate speech
and data on the same lines, which were not available in the classic telephone system.
ISDN is a circuit-switched telephone network system, but it also provides access to packet switched
networks that allows digital transmission of voice and data. This results in potentially better voice or data
quality than an analog phone can provide.
ISDN provides simultaneous voice, video, and text transmission between individual desktop
videoconferencing systems and group videoconferencing systems.
ISDN Interfaces
64
The following are the interfaces of ISDN:
Basic Rate Interface (BRI)
There are two data-bearing channels (‘B’ channels) and one signaling channel (‘D’ channel) in BRI toinitiate
connections.
The B channels operate at a maximum of 64 Kbps while the D channel operates at a maximum of 16
Kbps. The two channels are independent of each other.
For example, one channel is used as a TCP/IP connection to a location while the other channelis used
to send a fax to a remote location. In iSeries ISDN supports basic rate interface (BRl).
Broadband-ISDN (B-ISDN)
Narrowband ISDN has been designed to operate over the current communications infrastructure, which is
heavily dependent on the copper cable however B-ISDN relies mainlyon the evolution of fiber optics.
According to CCITT B-ISDN is best described as ‘a service requiring transmission channels capable of
supporting rates greater than the primary rate.
Bearer Services
Transfer of information (voice, data and video) between users without the network manipulating the content
of that information is provided by the bearer network.
There is no need for the network to process the information and therefore does not change thecontent. Bearer
services belong to the first three layers of the OSI model.
They are well defined in the ISDN standard. They can be provided using circuit-switched, packet-switched,
frame-switched, or cell-switched networks.
Teleservices
In this the network may change or process the contents of the data. These services corresponds to layers 4-7
of the OSI model.
Teleservices relay on the facilities of the bearer services and are designed to accommodate complex user
needs.
The user need not to be aware of the details of the process. Teleservices include telephony, teletex, telefax,
videotex, telex and teleconferencing. Though the ISDN defines these services by name yet they have not yet
become standards.
Supplementary Service
Additional functionality to the bearer services and teleservices are provided by supplementaryservices.
Reverse charging, call waiting, and message handling are examples of supplementary services which are all
65
familiar with today’s telephone company services.
How to connect?
Find the Ethernet port on the back of your TV
Connect an Ethernet cable from your router to the port on your TV
Select Menu on your TV’s remote and then go to Network Settings
66
Select the option to enable wired internet
Type your Wi-Fi password using your remote’s buttons
When your TV is upstairs, use a powerline
TV upstairs or in another room from your router? It doesn't mean you can't watch Netflix or iPlayer.
The further away you are from your router, the weaker the signal becomes. But you can extend thereach
of your home network for smoother streaming with a powerline kit.
A powerline kit includes 2 adapters and 2 Ethernet cables. Once the adapters are plugged into power sockets
and your router, the internet signal is sent down your electricity cables.
Benefits of powerline
It delivers a strong internet connection upstairs or through thick walls
You will extend the internet to the far corners of your home
Easy to set up
How to connect
Plug the first powerline adapter into a socket in the same room as your router
Wse an Ethernet cable to connect the adapter to your broadband router
Plug the second powerline adapter into a socket in the same room as your Smart TV
Then plug an Ethernet cable into the Ethernet port on your Smart TV
Connect the other end of the Ethernet cable to your powerline adapter
67
A network cable plugged into the NIC on one end and plugged into a cable modem, DSL
modem, router, or switch can allow a computer to access the Internet and connect to other
computers.
Home Network
If you have a home computer network, the computers are also using TCP/IP to connect. The
TCP/IP protocol allows each computer to "see" the other computers on the network, and share
filesand printers.
When computers connect on the same network, it is called a local area network, or LAN. When
multiple networks are connected, it is called a wide area network, or WAN. With this type of
network, your home has a network router that connects to your ISP.
The router is given the IP address for your connection to the Internet and then assigns local IP
addresses to each device in your network. These local addresses are often 192.168.1.2-255.
When accessing a local computer in your network, your router sends your TCP/IP
packets between the local IP addresses.
when you want to connect to the Internet, your router uses the IP address assigned by the ISP.
Your IP address is not a 192.168.x.x address because the ISP assigns that IP address and not your
router.
When requesting information from a web page, such as Computer Hope, you enter a URL that is
easy to understand and remember. For your computer to access the computer containing the
pages, that URL must be converted into an IP address, which is done with DNS.
68
Once DNS has converted the URL into an IP address, the routers on the Internet will know how
to route your TCP/IP packet.
The below Fig:2.26 helps explain the information in the previous sections about your
computer communicates with others on the Internet.
Windows, macOS, and Linux computers use the TCP/IP protocol to connect to other
computers on a LAN or WAN. Connecting to a LAN or WAN requires either a wired
connection or a wireless connection.
A wired connection is usually done using a network cable . A wireless connection (Wi-
Fi) uses an 802.11b wireless network card. With both connection types, a network router
is usually required to connect to other computers. Connecting to the Internet at your
home also requires either a cable modem or a DSL modem, depending on which ISP you
use.
Its aim is to maintain the high speed of the internet being transfered.
If both telephone and internet facility, then the answer is by using splitters or DSL filters(shown
in below diagram).Basically, the use splitter is to splits the frequency and make sure that they
can’t get interrupted.
69
Fig:2.27 Digital Subscriber Line
Types of DSL
1. Symmetric DSL – SDSL, splits the upstream and downstream frequencies evenly,
providing equal speeds to both uploading and downloading data transfer. This connection
may provide 2 Mbps upstream and downstream.it is mostly preferred by small
organizations.
2. Asymmetric DSL – ADSL, provides a wider frequency range for downstream transfers,
which offers several times faster downstream speeds.an ADSL connection may offer 20
Mbps downstream and 1.5 Mbps upstream, it is because most users download more data
than they upload.
Benefits
No Additional Wiring – A DSL connection makes use of your existing telephone
wiring, so you will not have to pay for expensive upgrades to your phone system.
Cost Effective – DSL internet is a very cost-effective method and is best in connectivity
Availability of DSL modems by the service providers.
User can use the both telephone line and internet at a same time.And it is because the
voice istransferred on other frequency and digital signals are transferred on others.
User can choose between different connection speeds and pricing from various providers.
DSL Internet service only works over a limited physical distance and remains unavailable
inmany areas where the local telephone infrastructure does not support DSL technology.
The service is not available everywhere. The connection is faster for receiving data than it
is forsending data over the Internet.
70
2.9.2 E-Mail Address
Each user of email is assigned a unique name for his email account. This name is known as E-
mail address. Different users can send and receive messages according to the e-mail address.
E-mail isgenerally of the form username@domainname.
For example,
[email protected] is an e-mail address where webmaster is username and
tutorialspoint.com is domain name.
The username and the domain name are separated by @(at) symbol.
Email addresses are not case sensitive.
Spaces are not allowed in e-mail address.
Someone
Cc Accidently finished off the black bean dip last night. Can one of
: [email protected]
you pick up another case of it on your way home? I think Luke on his bike
Text today so might have to.talk Body
------Alex
Signature
East Providence.
2.9.4 E-mail Header | tax(401)347-0013
The first five lines of an E-mail message is called E-mail header. The header part
Rhode island
comprises offollowing fields:05983
From
Date
To
Subject
71
CC
BCC
From
The From field indicates the sender’s address i.e. who sent the e-mail.
Date
The Date field indicates the date when the e-mail was sent.To
The To field indicates the recipient’s address i.e. to whom the e-mail is sent.
Subject
The Subject field indicates the purpose of e-mail. It should be precise and to the point.
CC
CC stands for Carbon copy. It includes those recipient addresses whom we want to keep
informed but not exactly the intended recipient.
BCC
BCC stands for Black Carbon Copy. It is used when we do not want one or more of the
recipients to know that someone else was copied on the message. Greeting. Greeting is the
opening of the actual message. Eg. Hi Sir or Hi Guys etc.
Text
It represents the actual content of the message.
Signature
This is the final part of an e-mail message. It includes Name of Sender, Address, and
Contact Number.
2.9.5 Advantages
E-mail has proved to be powerful and reliable medium of communication. Here are the
benefits of E-mail:
Reliable
Convenience
Speed
Inexpensive
Printable
Global
Generality
Reliable
Many of the mail systems notify the sender if e-mail message was undeliverable.
Convenience
There is no requirement of stationary and stamps. One does not have to go to post office. But all
thesethings are not required for sending or receiving an mail.
72
Speed
E-mail is very fast. However, the speed also depends upon the underlying network.
Inexpensive
The cost of sending e-mail is very low.
Printable
It is easy to obtain a hardcopy of an e-mail. Also an electronic copy of an e-mail can also be
saved forrecords.
Global
E-mail can be sent and received by a person sitting across the globe.
Generality
It is also possible to send graphics, programs and sounds with an e-mail.
2.9.6 Disadvantages
Apart from several benefits of E-mail, there also exists some disadvantages as discussed below:
Forgery
Overload
Misdirection
Junk
No response
Forgery
E-mail doesn’t prevent from forgery, that is, someone impersonating the sender, since
sender isusually not authenticated in any way.
Overload
Convenience of E-mail may result in a flood of mail.
Misdirection
It is possible that you may send e-mail to an unintended recipient.
Junk
Junk emails are undesirable and inappropriate emails. Junk emails are sometimes referred to as
spam.
No Response
It may be frustrating when the recipient does not read the e-mail and respond on a regular basis.
73
Usenet is a kind of discussion group where people can share views on topic of their interest.
Newsgroup Classification
There exist a number of newsgroups distributed all around the world. These are identified using a
hierarchical naming system in which each newsgroup is assigned a unique name that consists of
alphabetic strings separated by periods.
The leftmost portion of the name represents the top-level category of the newsgroup followed by
subtopic. For example,
Camp
74
Talk. Conventional subjects such as religion, politics etc. Soc.politics.india
Misc. Miscellaneous topics i.e. issues tat may not fit Misc.answers
intoother categories Misc.books.technical
The article posted to a news server is appended to the file maintained for that newsgroup thenthe
news server shares article with other news servers that are connected to it.
Then each news server compares if both carry the same newsgroup. If yes, then by comparing
the files it checks that if there are any new articles in the file, if so they are appended to the file.
The updated file of the news servers is then sent to other news servers connected to it. This
process is continues until all of the news servers have updated information.
75
2.10.3 Mailing list vs. Newsgroup
S. Mailing List Newsgroup
N.
2. Working with mailing list is easier Working with a particular newsgroup requires
than newsgroup. It is easy to proper knowledge of that newsgroup.
compose and receive emails.
A screen name is the name you are known by to this chat group. You may use the same
screen name each time, or choose a different one for each chat session. For security
reasons, do not use your real name.
The people you are chatting to may use different names as well. You may talk to Rose
one session, Wonder Woman the next session and Shyness the next, and be chatting to
76
the same person in all three sessions.
On the other hand, you may talk to Master Fox in five chat sessions and be talking to a
differentperson each time.
You can chat in two ways: using a channel, or using a direct connection.
A channel is where a lot of people are talking together. It is another name for a chat
room. Each channel has a name that should indicate what the people in the room are
talking about. A direct connection is a private conversation between you and another
person using the Internet.
You join chat groups in different ways, depending on what sort of ISP you have.
If you have a PPP account with your ISP, you use the IRC (Internet Relay Chat) to talk.
If you use a large company (such as CompuServe) you chat with other users of that
company.
When you first join a chat group, you will see the screen names of people who are
already chatting and a window that is keeping track of their messages. Everyone in the
group will be notified when you join it, so if it is friendly someone should send you a
welcome message.
77
Things to remember to chat safely:
Many people lie. About anything. This includes personal information.
Do not reveal information that enables someone to find you - name, address, phone
number,place of work, suburb, mailing address etc.
Never give your password to anyone. No exceptions.
Be very cautious if someone without a profile wants to chat with you.
If you ever choose to meet a chat friend in person, be very cautious and plan your
meeting withsafety in mind
The Internet has revolutionized the way we communicate. E-mail has been the most
rapidly adopted form of communication ever known. People around the world send out
billions of e-mail messages every day.
With IM, you can keep a list of people you interact with. You can IM with anyone on
your buddy list or contact list as long as that person is online. You type messages to
each other into a small window that shows up on both of your screens.
Features IM programs
Instant messages - Send notes back and forth with a friend who is online
Chat - Create a chat room with friends or co-workers
Web links - Share links to your favorite Web sites
Video - Send and view videos, and chat face to face with friends
Images - Look at an image stored on your friend's computer
Sounds - Play sounds for your friends
Files - Share files by sending them directly to your friends
Talk - Use the Internet instead of a phone to actually talk with friends
Streaming content - Real-time or near-real-time stock quotes and news
Mobile capabilities - Send instant messages from your cell phone
78
2.12.1 Using Instant Messaging
Look at the steps below to understand exactly what happens with an instant-messaging
service.
You go to the download page and get a copy of the free software client for your
computer.
You install the software and open the client.
The client tries to connect to the server. It uses a proprietary protocol for communication.
Once the client is connected to the server, you can enter your name and password to log
in to the server. If this is your first time on, you can sign up for an account and
immediately begin using it. When the server verifies your name and password, you are
logged in.
The client sends the server the connection information (IP address and number of the port
assigned to the client) of the computer you are using. It also provides the user with the
names of everyone in your contacts list.
The server creates a temporary file that has the connection information for you and the
list of your contacts. It then checks to see if any of the users in your contact list are
currently logged in.
If the server finds any of your contacts logged in, it sends a message back to the client on
your computer with the connection information for that user. The server also sends your
connection information to the people in your contact list that are signed on.
When your client gets the connection information for a person in your contact list, it
changes the status of that person to "online." You click on the name of a person in your
contact list who is online, and a window opens that you can enter text into. You enter a
message and click "send" or hit return to communicate with that person.
Because your client has the IP address and port number for the computer of the person
that you sent the message to, your message is sent directly to the client on that person's
computer. In other words, the server is not involved at this point. All communication is
directly between the two clients.
The other person gets your instant message and responds. The window that each of you
sees on your respective computers expands to include a scrolling dialog of the
conversation. Each person's instant messages appears in this window on both computers.
When the conversation is complete, you close the message window. Eventually, you go
offline and exit. When this happens, your client sends a message to the server to
terminate the session. The server sends a message to the client of each person on your
contact list who is currently online to indicate that you have logged off. Finally, the server
deletes the temporary file that contained the connection information for your client. In the
clients of your contacts that are online, your name moves to the offline status section.
Google Voice is one of the best ways to make free internet phone calls. With Google Voice, you
can make free calls to an actual phone number, PC to PC calls, and free PC to phone calls.
Google Voice is much more than a way to make free phone calls on the internet. Google Voice is
primarily a way to manage the phone numbers in your life and can be used to intelligently route
incoming calls to your free phone number provided by Google Voice to any other phone you
have. With Google Voice, you can also get free SMS, make a free conference call, and get free
voicemail services.
Free calls you make with Google Voice must be to numbers in the United States or Canada.
Free phone calls with Google Voice are limited to three hours. However, you can continue to
make a free call to the same number over and over again.
The Google Voice app works from the web as well as iPhone, iPad, and Android devices.
WhatsApp is owned by Facebook and is a popular texting app with hundreds of millions of
users. However, you can also call your WhatsApp friends right from the app using only your
internet connection (doesn't count against your phone plan's voice minutes).
You just need to confirm your phone number to get started. Once you're using the app, you can
start a new conversation to clearly see which of your contacts are also using WhatsApp, after
which you can call them for free, no matter where in the world they're located. Group calls can
include as many as eight people.
WhatsApp also lets you send videos, photos, your location, and contacts, to other users. End- to-
end encryption is supported for all communication within the app.
Because WhatsApp requires the app to make free phone calls, you can not use it to make free
calls to phones that don't have the app installed, nor to landlines.
You can use WhatsApp from a computer or mobile device, including Android, iPhone, iPad,
Windows, and Mac.
TextNow is a mobile app that can send and receive free phone calls with other users. You can
also text any phone because you're given an actual number to use. To make phone calls to non-
users, like landline phones, you'll need to buy or earn redeemable credits.
The interface is very nice. It keeps track of call history right within the message center, it's quick
and easy to start a phone call, and you can even send messages while actively in a call.
80
In addition to sending text messages, TextNow lets you send photos, drawings, emoticons, and
your location. You can also customize the voicemail greeting, get email alerts when you get
messages, change the message screen background, use a different alert for different contacts,
customize the overall theme, and use a signature with all your messages.
You can login to your TextNow account on a different device, and all your saved messages and
phone number will remain and can be used immediately.Because you don't need an actual phone
number to set up TextNow (just an email address), it works with devices that might not have a
phone number,like the iPad, iPod touch, and Kindle.
If you're using TextNow on Windows or Mac, or from the web, you can both call and text from
your computer.
A TextNow app is available for Android, Windows Phone, iPhone, iPad, Windows, and Mac.
Google Duo is another audio calling app from Google. You can make audio calls only or you
can use it for free video calling. You can not send or receive text messages with Google Duo,
though.
When you choose a contact to call, Google Duo puts other Google Duo users from your contact
list at the very top of the list. Everyone else is listed below with an invite button next to them so
you can ask them to join you on Google Duo for free audio and video calls.
The way this app works is by calling other Google Duo users, so you cannot call house phones or
any other phone that isn't using the app.
Google Duo can be used for website or Google's Nest Hub Max. It's also available as an app for
Android, iPhone, and iPad.
Textfree is a free application that gives you your own phone number to make free app to app
calls and text messages, and you can even customize the voicemail greeting.
The texting feature can actually be used on non-app phones as well, which means you can use
Text free as another way to text your friends over the internet. Every Textfree user begins with a
limited number of minutes for free calling to phones not using the app, like landlines.
There are ways to get more free minutes like watching video advertisements and completing free
offers.
If you fail to use your Textfree phone number for 30 days, it will be returned to the "pool" of
numbers for new Textfree users, and thus become inactive. You can always get another one if
your current number expires.
In addition to the web, Textfree is usable through the Android, iPhone, and iPad app.
81
Review Questions
1. Define DSL
2. What is ISDN?
3. Define Usenet
4. Define Email
5. What is Computer Network?
6. Explain the types of Internet Connections
7. Explain ISDN Services
8. What is Digital Subscriber Line?
9. Explain E-mail Message Components
10. Discuss about working of Usenet Newsgroup
11. Explain Instant Messaging in detail.
82
Chapter - 3
World Wide Web (WWW)-I
3.1 World Wide Web (WWW)
The World Wide Web allows computer users to locate and view multimedia-based
documents (i.e., documents with text, graphics, animations, audios or videos) on almost
any subject.
Even though the Internet was developed more than three decades ago, the introduction of
the World Wide Web is a relatively recent event. In 1990, Tim Berners-Lee of CERN
(the European Laboratory for Particle Physics) developed the World Wide Web and
several communication protocols that form the backbone of the Web.
The Internet and the World Wide Web surely will be listed among the most important
and profound creations of humankind.
In the past, most computer applications executed on “stand-alone” computers (i.e.,
computers that were not connected to one another).
The W3C is also a standardization organization.
Web technologies standardized by the W3C are called Recommendations. W3C
Recommendations include the Extensible Hyper-Text Markup Language (XHTML),
Cascading Style Sheets (CSS), Hypertext Markup Language (HTML; now considered a
“legacy” technology) and the Extensible Markup Language (XML).
The W3C homepage (www.w3.org) provides extensive resources on Internet and Web
technologies.
Syntax XML (Extensible Markup Language) helps to define common syntax in semantic web.
Data Interchange
Resource Description Framework (RDF) framework helps in defining core representation of
data for web. RDF represents data about resource in graph form.
83
User interface and applications
Cryptography Trust C
r
Proof y
p
t
Ontologies Rules: o
Querying: OWL RIF/SWR
g
SPARQL L
r
Taxonomies:RDFS a
p
Data Interchange :RDF h
y
Syntax:XML
Fig-3.1-WWW Architecture
Taxonomies
RDF Schema (RDFS) allows more standardized description of taxonomies and other
ontological
constructs.
Ontology
Web Ontology Language (OWL) offers more constructs over RDFS. It comes in
followingthree versions:
OWL Lite for taxonomies and simple constraints.
OWL DL for full description logic support.
OWL for more syntactic freedom of RDF
Rules
RIF (Rule Interchange Format) and SWRL (Semantic Web Rule Language) offers rules beyond
the constructs that are available from RDFs and OWL. Simple Protocol and RDF Query
Language (SPARQL) is SQL like language used for querying RDF data and OWL Ontologies.
Proof
84
All semantic and rules that are executed at layers below Proof and their result will be used to
prove deductions.
Cryptography
Cryptography means such as digital signature for verification of the origin of sources is
used.
Web pages can contain huge information including text, graphics, audio, video and hyper links.
These hyper links are the link to other web pages.
Collection of linked web pages on a web server is known as website. There is unique Uniform
Resource Locator (URL) is associated with each web page.
85
Server-side dynamic web page
It is created by using server-side scripting. There are server-side scripting parameters that
determine how to assemble a new web page which also include setting up of more client-side
processing.
86
pictures, web pages, videos, and other files that all are connected via hyperlinks and
categorized with the help of URLs (Uniform Resource Identifiers).
For example, you are viewing this page by using a browser. On behalf of the users, the
browser sends requests to web servers all over the internet by using HTTP (Hypertext
Transfer Protocol).
A browser requires a smart phone, computer, or tablet and internet to work.
87
is a Uniform Resource Identifier, which refers to all kinds of names and addresses of
the resources on the web servers.
URL's first part is known as a protocol identifier, and it specifies the protocol to use, and the
second part, which is known as a resource name, represents the IP address or the domain name of
a resource. Both parts are differentiated by a colon and two forward slashes like
http://www.google.com.
User Interface
Data Persistances
Browser Engine
Rendering Engine
Netw Javascript UI
orkin Interpreter Backend
g
User Interface: The user interface is an area where the user can use several options like address
bar, back and forward button, menu, bookmarking, and many other options to interact with the
browser.
Browser Engine: It connects the UI (User Interface) and the rendering engine as a bridge. It
queries and manipulates the rendering engine based on inputs from several user interfaces.
Rendering Engine: It is responsible for displaying the requested content on the browser screen.
It translates the HTML, XML files, and images, which are formatted by using the CSS. It
generates the layout of the content and displays it on the browser screen. Although it can also
display the other types of content by using different types of plugins or extensions. such as:
Internet Explorer uses Trident
Chrome & Opera 15+ use Blink
Chrome (iPhone) & Safari use Webkit
Firefox & other Mozilla browsers use Gecko
Networking: It retrieves the URLs by using internet protocols like HTTP or FTP. It is
responsible for maintaining all aspects of Internet communication and security. Furthermore, it
may be used to cache a retrieved document to reduce network traffic.
88
JavaScript Interpreter: As the name suggests, JavaScript Interpreter translates and executes the
JavaScript code, which is included in a website. The translated results are sent to the rendering
engine to display results on the device screen.
UI Backend: It is used to draw basic combo boxes and Windows (widgets). It specifies a generic
interface, which is not platform-specific.
Data Storage: The data storage is a persistence layer that is used by the browser to store all sorts
of information locally, like cookies. A browser also supports different storage mechanisms such
as IndexedDB, WebSQL, localStorage, and FileSystem. It is a database stored on the local drive
of your computer where the browser is installed. It handles user data like cache, bookmarks,
cookies, and preferences.
Microsoft Edge was developed under the Spartan codename Project. In April 2015, Microsoft
changed the project Spartan name as Microsoft Edge.
Although Internet Explorer and Edge are included with Windows 10, Edge act as a default
browser. It combines new web technology evaluations and enhances the speed of browsing.
Fig-3.4: Edge
Although, Internet Explorer 11 was available in Microsoft Windows operating system, Microsoft
Edge has become the default browser in Windows 10. It needs at least 1 gigabyte of memory. It
offers several types of features, such as annotation features, a new rendering engine, and easy-to-
use icons, etc.
89
Latest versions of Edge browser
Platform Versions Release Date
Window 10 79.0.309.71 22-01-2020
Window 10 40.15254.603 21-01-2020
Mobile
Xbox One 40.15063.0 30-08-2018
Amazon Silk: Amazon silk is a proprietary Internet browser. It was released for Fire OS devices
on 15 November 2011. It is based on the open-source Chromium project and derives most of the
features from the Google Chrome browser.
It divides the task of loading webpages between Amazon's servers and Fire.
Silk is the default browser on most Amazon hardware devices as well as on app-based Kindle
devices, TV, Fire, and compatible Echo devices. Furthermore, it is the first new mass-market,
client software delivery mechanism, which should be built from the base of the cloud, not only
the web.
Opera: An Opera web browser was first conceived at Telenor company in 1994, later bought by
the Opera Software on 1 April 1995. It was designed for desktop and mobile interfaces, but it is
more popular now for mobile phones. It is based on Chromium, and it uses the blink layout
engine.
Apple Safari: Safari is an internet browser available for the Macintosh, and Windows operating
systems included the iPhone, iPad, and iPod Touch. It was developed by Apple, Inc.
Mozilla Firefox: The Mozilla Firefox web browser is developed by the Mozilla Foundation and
its subordinate company, Mozilla Corporation. The First version 1.0 of Firefox was introduced
on 9 November 2004.
90
Markup Language
A markup language is a computer language that uses tags to define elements within a document.
It is human-readable, meaning markup files contain standard words, rather than typical
programming syntax.
Markup languages define the style and structure of a document so that a computer knows how
you want that document to appear.
Markup languages are used extensively across web development. They are used to describe how
a particular set of data should be represented on a web document.
HTML (HyperText Markup Language) describes the structure of a web page. XML, on the other
hand, describes a particular type of data.
<a href="https://google.com">Google</a>
We have used an <a> tag to define this link, and when our link is over we close it with an </a>
tag.
These tags tell our computer that we want to render a link, or an anchor (which is where the “a”
comes from). These tags will not appear on our web page. They are instructions for our web
browser to read, so they know how to show a particular web page.
Markup files are saved as plain text documents. This means you can open them using a standard
text editor.
HTML is one of the standard markup languages. In HTML, tags are used to define every element
on a web page, from titles to images to forms. The HTML language is governed by the
91
international organization World Wide Web Consortium, or the W3C. HTML is so essential to
how the web works that a set of international standards are necessary to write and process it
consistently.
HTML is a markup language used for creating WebPages. The contents of each webpage are
defined by HTML tags. Basic page tags, such as <head>, <body>, and <div> define sections of
the page, while tags such as <table>, <form>, <image>, and <a> define elements within the
page.
<a href="https://google.com">Google</a>
XML is used for storing structured data, rather than formatting information on a page. While
HTML documents use predefined tags (like the examples above), XML files use custom tags to
define elements.
This is because there are no limits to what you can name your XML tags. There are no
predefined tags, so you can choose names that precisely describe each point of data within an
XML document.
Let’s say you are creating a markup document to keep track of your favorite books. In XML, you
could use the following structure:
<book>
<title>How to Win Friends and Influence People</title>
<author>Dale Carnegie</author>
<rating>⅘</rating>
</book>
For example, an XML file that stores information about computer models may include the
followingsection:
<computer>
<manufacturer>Dell</manufacturer>
<model>XPS 17</model>
<components>
<processor>2.00 GHz Intel Core i7</processor>
<ram>6GB</ram>
<storage>1TB</storage>
</components>
</computer>
XML is called the "Extensible Markup Language" since custom tags can be used to support a
wide range of elements.
92
eXtensible HyperText Markup Language
XHTML is a version of HTML4 which meets the XML standard. It’s largely been replaced by
HTML5 thanks to demands for a more diverse feature set. XHTML and HTML are very similar,
but there are a few differences that you may notice.
For instance, HTML attributes must have both a name and a value; you can’t use standalone
attributes. In addition, all XHTML tags are written in lowercase. In HTML, you can write using
uppercase or lowercase, even though best practices suggest you should use lowercase.
Example:
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width">
<title>Sample HTML page</title>
<link rel="stylesheet" href="style.css" type="text/css"/>
</head>
<body>
<div>
<header>
93
3.10 Standardized Generalized Markup Language (SGML)
The markup languages that carry the instruction for text processing are known as ‘Procedural
Markup’. The idea of markup was to format a particular kind of document. But later on it was
felt that markup languages could be used for system-to-system information interchange also.
This was first realized by Charles Goldfarb, Ed Mosherand Ray Lorie when they were working
with legal documents. They designed the first markup language known as GML (Generalized
Markup Language) based on the following observation:
Once GML was designed, Goldfarb fine-tuned his work and proposed the SGML(Standardised
Generalised Markup Language) which was further approved by ISO(International Organization
for Standardization) in 1986. Hence, SGML is for defining the format in a text document.
Readable by both humans and computer programs, SGML is usable in a wide range of
applications such as print publishing, CD-ROMs, and database systems. SGML was not a
language itself but it was a meta language to develop other markup languages.
94
video on a web page.
Key Points:
The word Hypertext refers to the text which acts as a link.
The word markup refers to the symbols that are used to define structure of the text.
The markup symbols tells the browser how to display the text and are often called tags.
The word Language refers to the syntax that is similar to any other language.
HTML was created by Tim Berners-Lee at CERN.
Key Points:
Tags are indicated with pair of angle brackets.
They start with a less than (<) character and end with a greater than (>) character.
The tag name is specified between the angle brackets.
Most of the tags usually occur in pair: the start tag and the closing tag.
The start tag is simply the tag name is enclosed in angle bracket whereas the
closing tag isspecified including a forward slash (/).
Some tags are the empty i.e. they don’t have the closing tag.
Tags are not case sensitive.
The starting and closing tag name must be the same. For example <b> hello </i> is
invalid asboth are different.
If you don’t specify the angle brackets (<>) for a tag, the browser will treat the tag
name as asimple text.
The tag can also have attributes to provide additional information about the tag to the
browser.
Tag Description
<html> </html> Specifies the document as a web page.
<head> </head> Specifies the descriptive information about the web documents.
<title> </title> Specifies the title of the web page.
<body> </body> Specifies the body of a web document.
95
3.14 Formatting Tags
The following table shows the HTML tags used for formatting the text:
Tag Description
<b> </b> Specifies the text as bold. Eg. this is bold text
<em> </em> It is a phrase text. It specifies the emphasized text. Eg. Emphasized text
<strong> </strong> It is a phrase tag. It specifies an important text. Eg. this is strong text
<i> </i> The content of italic tag is displayed in italic. Eg. Italic text
<sub> </sub> Specifies the subscripted text. Eg. X1
<sup> </sup> Defines the superscripted text. Eg. X2
<ins> </ins> Specifies the inserted text. Eg. The price of pen is now 15.
<del> </del> Specifies the deleted text. Eg. The price of pen is now 15.
<mark> </mark> Specifies the marked text. Eg. It is raining
3.17 Frames
Frames help us to divide the browser’s window into multiple rectangular regions. Each region
contains separate html web page and each of them work independently.
A set of frames in the entire browser is known as frameset. It tells the browser how to divide
browser window into frames and the web pages that each has to load.
96
The following table describes the various tags used for creating frames:
Tag Description
<frameset> It is replacement of the <body> tag. It doesn’t contain the tags that are normally
</frameset> used in
<body> element; instead it contains the <frame> element used to add each frame.
<frame> </frame> Specifies the content of different frames in a web page.
<base> </base> It is used to set the default target frame in any page that contains links whose
contents
are displayed in another frame.
3.18 Forms
Forms are used to input the values. These values are sent to the server for processing. Forms
uses input elements such as text fields, check boxes, radio buttons, lists, submit buttons etc. to
enter the data into it.
The following table describes the commonly used tags while creating a form:
Tag Description
<form> </form> It is used to create HTML form.
<input> </input> Specifies the input field.
<textarea> </textarea> Specifies a text area control that allows to enter multi-line text.
<label> </label> Specifies the label for an input element.
3.20 Forms
A form is a template for a form data set and an associated method and action URI. A form data
set is a sequence of name/value pair fields. The names are specified on the NAME attributes of
form input elements, and the values are given initial values by various forms of markup and
edited by the user.
97
The resulting form data set is used to access an information service as a function of the action
and method.
Forms elements can be mixed in with document structuring elements. For example, a <PRE>
element may contain a <FORM> element, or a <FORM> element may contain lists which
contain
The <FORM> element contains a sequence of input elements, along with document
structuring elements.
METHOD - selects a method of accessing the action URI. The set of applicable methods is a
function of the scheme of the action URI of the form. See 8.2.2, "Query Forms:
METHOD=GET" and 8.2.3, "Forms with Side- Effects: METHOD=POST
ENCTYPE - specifies the media type used to encode the name/value pairs for transport, in
case the protocol does not itself impose a format. See 8.2.1, "The form-urlencoded Media Type".
The <INPUT> element has a number of attributes. The set of applicable attributes depends on
the value of the TYPE attribute.
98
SIZE specifies the amount of display space allocated to this input field.
VALUE according to its type. The default depends on the user agent. The initial value of
the field.
For example:
<p>Street Address: <input name=street><br>
Postal City code: <input name=city size=16 maxlength=16><br>
Zip Code: <input name=zip size=10 maxlength=10 value="99999-9999"><br>
For example:
<p>Name: <input name=login> Password: <input type=password name=passwd>
VALUE The portion of the value of the field contributed by this element.
For example:
<p>What flavors do you like?
<input type=checkbox name=flavor value=vanilla>Vanilla<br>
<input type=checkbox name=flavor value=strawberry>Strawberry<br>
<input type=checkbox name=flavor value=chocolate checked>Chocolate<br>
99
For example:
<p>Which is your favorite?
<input type=radio name=flavor value=vanilla>Vanilla<br>
<input type=radio name=flavor value=strawberry>Strawberry<br>
<input type=radio name=flavor value=chocolate>Chocolate<br>
For example:
<p>Choose a point on the map:
<input type=image name=point src="map.gif">
For example:
<input type=hidden name=context value="l2k3j4l2k3j4l2k3j4lk23">
An <INPUT> element with ‘TYPE=RESET’ represents an input option, typically a button, that
instructs the user agent to reset the form’s fields to their initial states. The VALUE attribute, if
present, indicates a label for the input (button).
100
When you are finished, you may submit this request:
<input type=submit><br>
You may clear the form and start over at any time: <input type=reset>
Selection: SELECT
The <SELECT> element constrains the form field to an enumerated list of values. The values are
given in <OPTION> elements.
Attributes are:
MULTIPLE indicates that more than one option may be included in thevalue.
NAME SIZE specifies the name of the form field
It specifies the number of visible items. Select fields of size one are typically pop-down menus,
whereas select fields with size greater than one are typically lists.
For example:
<SELECT NAME="flavor">
<OPTION>Vanilla
<OPTION>Strawberry
<OPTION value="RumRasin">Rum and Raisin
<OPTION selected>Peach and Orange
</SELECT>
The initial state has the first option selected, unless a SELECTED attribute is present on any of
the <OPTION> elements.
Option: OPTION
The Option element can only occur within a Select element. It represents one choice, and has
the following attributes:
SELECTED Indicates that this option is initially selected.
VALUE indicates the value to be returned if this option is chosen. The field value defaults
tothe content of the
<OPTION> element.
The content of the <OPTION> element is presented to the user to represent the option. It is used
as a returned value if the VALUE attribute is not present.
101
For example:
<TEXTAREA NAME="address" ROWS=6 COLS=64>
HaL ComputerSystems 1315 Dell Avenue
Campbell, California 95008
</TEXTAREA>
Form Submission
An HTML user agent begins processing a form by presenting the document with the fields in
their initial state. The user is allowed to modify the fields, constrained by the field type etc.
When the user indicates that the form should be submitted (using a submit button or image
input), the form data set is processed according to its method, action URI and enctype.
When there is only one single-line text input field in a form, the user agent should accept Enter
in thatfield as a request to submit the form.
The servers on which web site is hosted remain switched on 24 x7. These servers are run by web
hosting companies. Each server has its own IP address. Since IP addresses are difficult to
remember therefore, webmaster points their domain name to the IP address of the server their
website is stored on.
It is not possible to host your website on your local computer, to do so you would have to leave
your computer on 24 hours a day.
102
Dedicated server
Dedicated servers are the easiest to explain. They are, as their name says, dedicated. It is a
physical server that you do not share with anyone else and no one else has access to. You can
host one or more websites, it is up to you.
Co-located hosting
It is similar to dedicated hosting, it literally means co-located hosting. It allows you to place your
own server on the service provider’s location. It is the same as having a server in your own
office, but located in a place specifically designed for servers.
Managed hosting
Managed hosting is almost the same as the dedicated hosting. You get your own server; the only
difference is that you do not have full control over it.
Reseller hosting
It is where you (as a client) can become a web host yourself. What it means is that you buy a
provider’s services and sell them (for a profit) to third party.
Clustered hosting
It is where you have multiple servers that host the same content. That way even if one server
needs a reboot or goes down, your site will still be online. This option is for sites with very high
traffic.
Grid hosting
It utilizes several server clusters that act like a grid and is com- posed of multiple nodes. That
way multiple servers serve to one cluster or in this instance one site and different parts of the
website can operate independently of each other.
One of the types of web databases that you may be more familiar with is a relational database.
Relational databases allow you to store data in groups (known as tables), through its ability to
link records together
103
Some advantages of using a web database include:
Web database applications can be free or require payment, usually through monthly
subscriptions. Because of this, you pay for the amount you use. So whether your business shrinks
or expands, your needs can be accommodated by the amount of server space. You also don’t
have to fork out for the cost of installing an entire software program.
The information is accessible from almost any device. Having things stored in a cloud means that
it is not stuck to one computer. As long as you are granted access, you can technically get a hold
of the data from just about any compatible device.
Web database programs usually come with their own technical support team so your IT
department folks can focus on other pressing company matters.
It’s convenient: web databases allow users to update information so all you have to do is to
create simple web forms.
3.23 MySQL
Something you’ll see commonly attached to the topic of web databases, and also worth noting
due to its use in many high profile websites, such as Google, Facebook, Twitter, and WordPress,
is MySQL. Based on Structured Query Language, MySQL is a relational database management
system (DBMS).
Just so you know, a database management system is the software that manages moving data in,
out, and around the database. The term ‘database’ refers to the actual data that is being stored.
MySQL isn’t the only database management system, but it is one of the more popular types.
It is known to be user-friendly, promising that even the most inadequate technology users will
find the initial setup, and use, relatively straightforward. Some Common Used Databases
There are many types of databases available to help you develop a website. Before choosing a
web hosting service, you need to have a comprehensive understanding about its database,
because it plays an important role in website development. Some popular databases are listed as
below.
104
Fig-3.6 Mysql Database
MySQL: It is a free open source relational database management system, so that it attracts most
web hosting providers. Besides, MySQL are available in both Linux web hosting and Windows
web hosting and it is appropriate for small websites.
MS SQL: It is developed by Microsoft and only allowed to run on Windows platform, which is
not free. MS SQL is suitable for some business websites, because it can serve thousands
concurrent users.
PostgreSQL: It is a free open source object-relational database. PostgreSQL is one of the most
reliable and advanced databases in the industry, which is suitable for some business websites.
Access: It is a Microsoft database and runs on Windows OS only, which is easy-to-use. If you
develop a small website with low number of visitors, Access is a good choice for your website.
3.24 Gopher
The Gopher technology was invented at the University of Minnesota, whose mascot is, not
surprisingly, the Golden Gopher. The gopher system allows people to search for and retrieve
information using a text interface.
The University of Minnesota began a licensing program for the gopher technology in 1993 as the
use of gopher was spreading rapidly over the Internet.
Gopher is an application-layer protocol that provides the ability to extract and view. Gopher was
designed to access a Web server or database via the Internet.
It initially supported only text-based file/document access but later came to support some image
formats such as GIF and JPEG.
Gopher was succeeded by the HTTP protocol and now has very few implementations. Gopher-
based databases, servers or websites can be accessed through two search engines: Veronica and
Jughead.
105
Most of these programs involved direct connection between the servers and the clients (like
telnet and ftp) or they require knowing exact addresses (like e-mail).
Gopher is different from these other Internet services. Although you may need to know the
address of a gopher server to start, once there, you can traverse the Internet by selecting sites
from a menu.
There is free gopher client software available for most computers including UNIX and X-
Windows, IBM/PC DOS and Windows, Macintosh, VAX/VMS, VM/CMS and many others.
The source for most of this software can be found by anonymous FTPing to
boombox.micro.umn.edu and accessing the appropriate files from /pub/gopher.
Fig-3.7 Gopher
3.25 Telnet
The main task of the internet is to provide services to users. For example, users want to run
different application programs at the remote site and transfers a result to the local site. This
requires a client-server program such as FTP, SMTP. But this would not allow us to create a
specific program for each demand.
The better solution is to provide a general client-server program that lets the user access any
application program on a remote computer. Therefore, a program that allows a user to log on to
a remote computer. A popular client-server program Telnet is used to meet such demands. Telnet
is an abbreviation for Terminal Network.
Telnet provides a connection to the remote computer in such a way that a local terminal appears
to be at the remote side.
106
Application Program
…..
….
Terminal
Terminal driver
Operating
system
When a user logs into a local computer, then it is known as local login.
When the workstation running terminal emulator, the keystrokes entered by the user are accepted
by the terminal driver. The terminal driver then passes these characters to the operating system
which in turn, invokes the desired application program.
However, the operating system has special meaning to special characters. For example, in UNIX
some combination of characters have special meanings such as control character with "z" means
suspend. Such situations do not create any problem as the terminal driver knows the meaning of
such characters. But, it can cause the problems in remote login. Remote login
107
Network Virtual Terminal (NVT)
The network virtual terminal is an interface that defines how data and commands are sent across
the network. In today's world, systems are heterogeneous. For example, the operating system
accepts a special combination of characters such as end-of-file token running a DOS operating
system ctrl+z while the token running a UNIX operating system is ctrl+d.
TELNET solves this issue by defining a universal interface known as network virtual interface.
The TELNET client translates the characters that come from the local terminal into NVT form
and then delivers them to the network. The Telnet server then translates the data from NVT form
into a form which can be understandable by a remote computer.
Anonymous FTP
Some FTP servers provide public access through anonymous FTP.
Login with username anonymous; give your email address as password.
Access is granted to a limited slice of the system.
Widely (but not universally) supported convention is to place public files in /pub area.
Typical uses:
Retrieve software, e.g. ftp://ftp.netscape.com/pub/communicator/
Publish information, e.g. ftp://ftp.isi.edu/in-notes/
108
FTP Clients
Both web browsers and dedicated clients may be used for FTP.
Browser typically limited to anon FTP.
Dedicated client offers control of transfer type.
Dedicated client can do FTP upload.
Dedicated client can transfer multiple files.
Non-Anonymous FTP
If you have permission or access privileges to an FTP site, you can use your browser to log into
the site via your user name. The FTP format (syntax) is changed to:
ftp://[email protected]
where username is your user name and address is the FTP site address you want to go to,
including ftp only if it is actually in the address; otherwise it is not included. Your browser
displays a dialog box to enter your password. Type in your password and press Enter to continue.
You can use a different format instead and include your password:
ftp://username:[email protected]
You must have previously gained access privileges before using non-anonymous FTP.
Downloading Files
While working on the Internet, any web page can be seen in the browser window only
after it has been copied to the main memory of the computer.
This process of copying web pages from the Internet to the computer is called
downloading. Apart from the web pages which are downloaded whenever we type in
the address or click on its link, we can also download files from the Internet.
109
To Download Files
One popular use of the Internet is downloading software files and their updates.
There are a number of ways in which a file can be downloaded:
There may be a download button which can be clicked. Click and follow the
instructions that appear on the screen for downloading the particular software.
A web page can be saved by selecting ‘Save’ or ‘Save As’ option.
Right click a link and then choose the option ‘Save Target As’.
Hold the Shift Key and click the link.
This opens up another download window from where we can save the file.
Computers and Communication Technology The above image shows the popup menu
which appears when one right clicks a hyperlink.
The ‘Save Target As’ is the selection needed for saving. Some files may be in
compressed form having extensions like .zip, .tar, rar, etc. Such files need to be
decompressed after downloading using software meant for this purpose. An example of
such software is WinZip. Apart from downloading files, we can also save some pictures
or texts.1.To save pictures:(a)Right click on the picture.(b)Choose the option ‘Save
picture’ from the popup menu.(c)Save the picture at the desired location when the dialog
box gets opened up.
To save the text:
(a)Entire text from a web page can be copied to a word processor file by choosing
Select All option from Edit menu. Choose Copy option from Edit. Open a blank
document file in the word processor and select the Paste option from the Edit Menu.
(b)To copy only a part of the text from a web page, select the text or matter to be copied.
Once selected open a blank document and paste.
We can directly set the picture seen on the Internet as the background image of our
computer. Right click on the picture and select the option ‘Set As Background’
110
3.26 Searching the internet
Search tool with organized set of topics and subtopics• Lets you find information by clicking
linksrather than entering keywords
Review Questions
1. Define WWW.
2. Define Web Page.
3. Define Web Browser.
4. Define URL.
5. Define SGML.
111
6. Explain the WWW Architecture.
7. Explain the features of Web Browser.
8. Explain the component of a Web Browser.
9. Explain Hyper Text Markup Language.
10. Explain Formatting Tags
11. Explain Table Tags.
12. Explain List tags.
13. Explain Frames with example.
14. Write a note on Web Hosting.
15. Write a short note on MySQL.
112
Chapter -4
World Wide Web (WWW)-II
4.1 Audio on the Internet
The <audio> element
The <audio> element works just like the <video> element, with a few small differences as
outlined below. A typical example might look like so:
<audio controls>
<source src="viper.mp3" type="audio/mp3">
<source src="viper.ogg" type="audio/ogg">
<p>Your browser doesn't support HTML5 audio. Here is a <a href="viper.mp3">link tothe
audio</a> instead. </p> hellooo
</audio>
The <audio> element doesn't support the width/height attributes — again, there is no visual
component, so there is nothing to assign a width or height to.
113
4.2 VIDEO on the internet
Web developers have wanted to use video and audio on the Web for a long time, ever since the
early 2000s when we started to have bandwidth fast enough to support any kind of video (video
files are much larger than text or even images A native solution would solve much of this if
implemented correctly. Fortunately, a few years later the HTML5 specification had such
features added, with the <video> and <audio> elements, and some shiny new JavaScript APIs
for controlling them. We'll not be looking at JavaScript here — just the basic foundations that
can be achieved with HTML.
We won't be teaching you how to produce audio and video files — that requires a completely
different skillset. We have provided you with sample audio and video files and example code for
your own experimentation, in case you are unable to get hold of your own.
controls
Users must be able to control video and audio playback (it's especially critical for people who
have epilepsy.) You must either use the controls attribute to include the browser's own control
interface, or build your interface using the appropriate JavaScript API. At a minimum, the
interface must include a way to start and stop the media, and to adjust the volume.
The paragraph inside the <video> tags
This is called fallback content — this will be displayed if the browser accessing the page
doesn't support the <video> element, allowing us to provide a fallback for older browsers. This
can be anything you like; in this case, we've provided a direct link to the video file, so the user
can at least access it some way regardless of what browser they are using.
114
The embedded video will look something like this:
A WebM file containing a movie which has a main video track and one alternate angle track,
plus audio for both English and Spanish, in addition to audio for an English commentary track
can be conceptualized as shown in the diagram below.
115
The audio and video tracks within the container hold data in the appropriate format for the codec
used to encode that media.
For example:
A WebM container typically packages Vorbis or Opus audio with VP8/VP9 video. This is
supported in all modern browsers, though older versions may not work.
An MP4 container often packages AAC or MP3 audio with H.264 video. This is alsosupported
in all modern browsers, as well as Internet Explorer.
Example:
<video controls>
<source src="rabbit320.mp4" type="video/mp4">
<source src="rabbit320.webm" type="video/webm">
<p>Your browser doesn't support HTML5 video. Here is a <a href="rabbit320.mp4">link to
thevideo</a> instead.</p>
</video>
116
The resulting UI looks something like this:
autoplay
Makes the audio or video start playing right away, while the rest of the page is loading. You are
advised not to use autoplaying video (or audio) on your sites, because users can find it really
annoying.
Loop mutedposter
Makes the video (or audio) start playing again whenever it finishes. This can also be
annoying, so only use if really necessary.
Causes the media to play with the sound turned off by default.
The URL of an image which will be displayed before the video is played. It is intended tobe
used for a splash screen or advertising screen.
preload
Used for buffering large files; it can take one of three values:
"none" does not buffer the file
"auto" buffers the media file
"metadata" buffers only the metadata for the file
4.5 Intranet
Intranet is defined as private network of computers within an organization with its own
server andfirewall. Moreover we can define Intranet as:
Intranet is system in which multiple PCs are networked to be connected to each other.
PCsin intranet are not available to the world outside of the intranet.
Every computer in internet is identified by a unique IP address.
Each computer in Intranet is also identified by a IP Address, which is unique among
thecomputers in that Intranet.
117
Fig-4.2 Intranet
Communication
Intranet offers easy and cheap communication within an organization. Employees can
communicate using chat, e-mail or blogs.
Time Saving
Information on Intranet is shared in real time.
Collaboration
Information is distributed among the employees as according to requirement and it can be
accessed by the authorized users, resulting in enhanced teamwork.
Platform Independency
Intranet can connect computers and other devices with different architecture.
Cost Effective
Employees can see the data and other documents using browser rather than printing themand
distributing duplicate copies among the employees, which certainly decreases the cost.
Workforce Productivity
Data is available at every time and can be accessed using company workstation. This helpsthe
employees work faster.
Business Management
It is also possible to deploy applications that support business operations.
118
Security
Since information shared on intranet can only be accessed within an organization, thereforethere
is almost no chance of being theft.
Specific Users
Intranet targets only specific users within an organization therefore, once can exactly know
whom he is interacting.
Immediate Updates
Any changes made to information are reflected immediately to all the users.
Issues
Apart from several benefits of Intranet, there also exist some issues.. These issues are
shown in the following diagram:
Management Concerns
Loss of control
Hidden Complexity
Potential for chaos
Security
Unauthorized access
Denial of Services
Packet sniffing
Productivity
Information overload lowers productivity
Users set up own pages
Overabundances of information
4.7 Applications
Intranet applications are same as that of Internet applications. Intranet applications are also
accessed through a web browser. The only difference is that, Intranet applications reside on local
server while Internet applications reside on remote server. Here, we've discussed some of these
applications:
Document Electronic
Publication Resource
applications applications
Intranet
application
s
Interactive Support for
Publication Internet
applications applications
119
Fig- Applications
Apart from similarities there are some differences between the two. Following are the
differences between Internet and Intranet:
Intranet Internet
Localized Network. Worldwide Network
Doesn't have access to Have access to Internet.
Intranet
More Expensive Less Expensive
More Safe Less Safe
More Reliability Less Reliability
Shopping on Internet
Most traditional stores also have an online version of their store (For example, Walmart also sells
products through www.walmart.com). However, you should be aware of some of the very well-
known and trusted online-only retailers.
Amazon.com: Amazon started out as an online book retailer, but today the site sells
everything from books and DVDs to kitchen appliances and groceries. Amazon is the creator and
sole seller of the Kindle eBook reader. It is the world’s largest online retailer.
Zappos.com: When Zappos started in 1999, it only sold shoes, but quickly grew, in part because
of its free shipping both ways (i.e., free returns up to 365 days later) policy. Today, Zappos sells
clothing and shoes, and has become famous for their customer service.
120
Etsy.com: Etsy is a marketplace for handmade, DIY, and vintage items. You can find everything
from handmade clothing, photographs, and bathproducts to craft supplies and antique
housewares.
eBay: The most well-known auction site on the Internet, eBay allows you to bid on anything
from playing cards to cars. eBay now also offers a “Buy-It-Now” feature, making it much more
like a traditional retail site.
eBay was the first site to use PayPal as a means of payment; we will talk about this service and
its pros and cons later in this handout.
Groupon: If you love a bargain, Groupon offers daily deals that you can buy to local businesses.
They also sell discounted limited-length sale items, like electronics or other luxury items. Deals
are delivered to your e-mail inbox daily, so that you don’t miss out on any of the latest deals!
As with most online activities, there are definite tradeoffs in online shopping between
convenience, cost savings, choice, and privacy. Before you decide whether or not online
shopping is for you, it is important to weigh the pros and cons of entering into the world of e-
commerce.
Benefits of Online Shopping
Convenience
One of the biggest benefits of online shopping is that you can buy almost anything you could
imagine without ever leaving your house. Online stores are open 24 hours a day and are
accessible from any location with an Internet connection.
Selection
In general, online stores are able to carry more selection than traditional brick-and- mortar stores.
Because online stores don’t need to attractively display their items on shelves, they can keep a
larger amount of inventory on hand.
Information
Online shops tend to provide more information about items for sale than you would get in a
physical store (unless you asked a sales associate, and that can be hit-or- miss). Product
descriptions most often include a description from the manufacturer, another description from
the vendor, specific technical and size details, reviews from professional magazines and journals,
and reviews from people who have bought the product.
121
Price
Because online stores don’t have to pay rent for a storefront in a nice part of town and tend to
sell much larger quantities of goods, they can offer to sell products fora much lower price.
Discounts online can be substantial—up to 25-50 percent off the suggested retail price. There are
even some sites that only sell clearance items! However, buying online does take away from
local business, so that is a consideration to keep in mind.
Shipping
Some major online retailers now offer free shipping for their products, but many require you to
meet a minimum order cost to qualify or only offer this incentive at certain times of year. In
general, you should expect to pay an additional shipping cost on top of the price of the items that
you order.
Wait Time
Waiting for your item to arrive is another downside of online shopping. One of the great
pleasures of shopping at a store is the instant gratification—you see something you like, you pay
for it, and then you get to take it home and use it right away! In the case of online shopping, you
may have to wait days or even weeks for the item to arrive at your door. Especially if you are in
a time crunch, then you maywant to consider purchasing your item at a local retailer.
Privacy
When you shop online, you waive certain privacy rights to the online retailer. Onlinestores can
track your purchases over time to give you more suggestions of things you might like to buy,
send you e-mails with sale information, and, occasionally, sell your contact information to other
companies.
These days, many brick-and-mortar stores do the same thing, tracking your information through
your credit card (Target is a notable example). In contrast, by purchasing something in an online
store, you sign away certain privacy rights—this is why it is always a good idea to read the
Terms of Service.
122
Review Questions
1. Explain Audio on the Internet.
2. Explain VIDEO on the internet.
3. Explain Contents of a media file.
4. Discuss about Intranet.
5. Explain Benefits of Intranet.
6. Explain the Applications of Intranet.
123
Chapter-5
Safeguarding the Internet
Although these techniques can be used to protect data in transfer, it does not protect data from digital
hackers. Toaccomplish this it is necessary to perform user authentication and access control to protect
the networks from unauthorized traffic. This is known as firewalls.
5.2 Firewalls
A firewall is a network security device, either hardware or software-based, which monitors all
incoming and outgoing traffic and based on a defined set of security rules it accepts, rejects or drops that
specific traffic.
It is a single point between two or more networks, where all traffics must pass, the firewall
authenticates, controls and logs all the traffic. It builds the bridge between internal and external
network and protects against
Remote login
Application back doors
Virus, spams ,malware etc.
Fig-5.1 : Firewall
It protects the interface between a private network and an insecure public network.
125
For example, Rules are defined as any employee from HR department cannot access the data from code
server and at the same time another rule is defined like system administrator can access the data from
both HR and technical department.
Rules can be defined on the firewall based on the necessity and security policies of the organization.
From the perspective of a server, network traffic can be either outgoing or incoming. Firewall
maintains a distinct set of rules for both the cases. Mostly the outgoing traffic, originated from the
server itself, allowed to pass.
Incoming traffic is treated differently. Most traffic which reaches on the firewall is one of these three
major Transport Layer protocols- TCP, UDP or ICMP. All these types have a source address and
destination address. Also, TCP and UDP have port numbers. ICMP uses type code instead of port
number which identifies purpose of that packet.
Default policy: It is very difficult to explicitly cover every possible rule on the firewall. For this
reason, the firewall must always have a default policy. Default policy only consists of action (accept,
reject or drop).
Accept : allow the traffic
Reject : block the traffic but reply with an “unreachable error”
Drop : block the traffic with no reply
Suppose no rule is defined about SSH (Secure Shell) connection to the server on the firewall. It
follows the default policy.
Service Control
Determines the types of internet services to be accessed
Filters traffic based on IP addresses and TCP port numbers
Provides Proxy servers that receives and interprets service requests before it is passed on
Direction Control
Determines the direction in which a particular service request may be initiated and allowed to flow
through the firewall
User Control
Controls access to a service according to which user is attempting to access it
Typically applied to the users inside the firewall perimeter
Can be applied to the external users too by using secure authentication technique
Behavioral Control
Controls how a particular service is used
For example, a firewall may filter email to eliminate spam
Firewall may allow only a portion of the information on a local web server to an external user
126
5.4 Advantages of Firewall
Monitor Traffic
To monitor the traffic passing through it. Whatever the information traveling through a network isin the
form of packets. Firewall inspects each of these packets for any hazardous threats. If any chance the
firewall happens to find them it will immediately block them.
Prevent Hackers
Hackers on the internet constantly look for computers in order for carrying out their illegal activities.
When the hackers happen to find such computers they will start to do even malicious activities such as
spreading viruses. Apart from those hackers there can be unknown people such as the neighbors
looking out for an open internet connection. Hence to prevent such intrusions it is a good idea to be
with a firewall security.
Access Control
Firewalls come with an access policy that can be implemented for certain hosts and services. Somehosts
can be exploited with the attackers. So the best in case is to block such hosts from accessingthe system.
If a user feels that they need protection from these types of unwanted access, this access policy can be
enforced.
Better Privacy
Privacy is one of the major concerns of a user. Hackers constantly look out for privacy information’s
for getting clues about the user. But by using a firewall many of the services offeredby a site such as the
domain name service and the finger can be blocked. Hence the hackers are with no chance of getting
privacy details. Additionally firewalls can block the DNS information’s of the site system. Due to this
the names and the IP address will not be visible to the attackers.
User Restriction
Firewalls prevent unauthorized access to your system from the network. This can actually be a
problem for large organizations.
Performance
Firewalls especially the software based has the capability to limit your computer's overallperformance.
The processing power and the RAM resources are some of the factors which decides the computer's
overall performance. When the software firewalls constantly run on the background they consume more
the processing power and the RAM resources. This can lead to a diminished system performance.
However hardware firewalls does not impact the system performance since they do not rely upon the
computer resources.
127
Malware Attacks
Therefore even if you have firewall, it is still recommended to have an anti-malware software
installed on your PC. Because the only way to remove them is through an anti-malware scan.
Complex Operations
Firewalls for large organizations require separate set of staffs for operating them. These people make
sure that the firewall is safe enough to protect the network from intruders.
Typically, firewalls intercept network traffic at a computer's entry point, known as a port. Firewalls
perform this task by allowing or blocking specific data packets (units of communication transferred over
a digital network) based on pre-defined security rules. Incoming traffic is allowed only through trusted
IP addresses, or sources.
Since the firewall acts as a barrier or filter between the computer system and other networks (i.e., the
public Internet), we can consider it as a traffic controller. Therefore, a firewall's primary function is to
secure our network and information by controlling network traffic, preventing unwanted incoming
network traffic, and validating access by assessing network traffic for malicious things such as hackers
and malware.
128
Generally, most operating systems (for example - Windows OS) and security software come with built-
in firewall support. Therefore, it is a good idea to ensure that those options are turned on. Additionally,
we can configure the security settings of the system to be automatically updated whenever available.
Firewalls have become so powerful, and include a variety of functions and capabilities with built- in
features:
Network Threat Prevention
Application and Identity-Based Control
Hybrid Cloud Support
Scalable Performance
Network Traffic Management and Control
Access Validation
Record and Report on Events
The best practice is to use a firewall system when using the Internet. However, it is important to use
other defense systems to help protect the network and data stored on the computer. Because cyber
threats are continually evolving, a firewall should not be the only consideration forprotecting the home
network.
The importance of using firewalls as a security system is obvious; however, firewalls have some
limitations:
Firewalls cannot stop users from accessing malicious websites, making it vulnerable to
internal threats or attacks.
Firewalls cannot protect against the transfer of virus-infected files or software.
Firewalls cannot prevent misuse of passwords.
Firewalls cannot protect if security rules are misconfigured.
Firewalls cannot protect against non-technical security risks, such as social engineering.
Firewalls cannot stop or prevent attackers with modems from dialing in to or out of the
internal network.
Firewalls cannot secure the system which is already infected.
Therefore, it is recommended to keep all Internet-enabled devices updated. This includes the latest
operating systems, web browsers, applications, and other security software (such as anti-virus).
Besides, the security of wireless routers should be another practice. The process of protecting a
router may include options such as repeatedly changing the router's name and password, reviewing
security settings, and creating a guest network for visitors.
129
5.9 Types of Firewall
Depending on their structure and functionality, there are different types of firewalls. The following is a
list of some common types of firewalls:
Proxy Firewall
Packet-filtering firewalls
Stateful Multi-layer Inspection (SMLI) Firewall
Unified threat management (UTM) firewall
Next-generation firewall (NGFW)
Network address translation (NAT) firewalls
Definition A firewall is defined as the system Anti-virus is defined as the special type of
which analyzes and filters incoming software that acts as a cyber-security
or outgoing data packets based on mechanism. The primary function of Anti-
pre-defined rules. virus is to monitor, detect, and remove any
apprehensive or distrustful file or software
from the device.
Structure Firewalls can be hardware and Anti-virus can only be used as software. Anti-
software both. The router is an virus is a program that is installed on the
example of a physical firewall, and a device, just like the other programs.
simple firewall program on the
system is an example of a software
firewall.
Implementation Because firewalls come in the form Because Anti-virus comes in the form of
of hardware and software, a firewall software, therefore, Anti-virus can be
can be implemented implemented only at the software level.
either way.
130
Responsibility A firewall is usually defined as a Anti-viruses are primarily responsible for
network controlling system. It detecting and removing viruses from
means that firewalls are primarily computer systems or other devices. These
responsible for monitoring and viruses can be in the form of infected files or
filtering network traffic. software.
Scalability Because the firewall supports both Anti-viruses are generally considered less-
types of implementations, hardware, scalable than firewalls. This is because anti-
and software, therefore, it is more virus can only be implemented at the software
scalable thananti-virus. level. They don't support hardware-level
implementation.
Threats A firewall is mainly used to prevent Anti-virus is mainly used to scan, find, and
network related attacks. It mainly remove viruses, malware, and Trojans, which
includes external network threats?for can harm system files and software and share
example- Routing attacks and IP personal information (such as login
Spoofing. credentials, credit card details, etc.) with
hackers.
5.11 Virus
“A Computer Virus is a malicious software program “Malware” that can infect a computer by
modifying or deleting data files, boot sector of a hard disk drive or causes a software program to work
in an unexpected manner”.
A computer virus resides on a host computer and can replicate itself when executed. Virus can steal
user data, delete or modify files & documents, records keystrokes & web sessions of a user. It can also
steal or damage hard disk space, it can slowdown CPU processing.
Activation of Virus
When the computer virus starts working, it is called the activation of virus. A virus normally runs all
the time in the computer. Different viruses are activated in different ways. Many viruses are activated
on a certain data. For example, a popular virus “Friday, the 13th” is activated only if thedate is 13 and
the day is Friday.
131
Damages caused by virus
Computer virus cannot damage computer hardware. IT may cause many damages to a computer
system. A virus can:
A computer virus can damage data or software on the computer.
It can delete some or all files on the computer system.
It can destroy all the data by formatting hard drive.
It may display a political or false message very few times.
Email Attachments
Most of the viruses spread through emails. Email attachment is a file that is sent along with an email.
An email may contain an infected file attachment. Virus can spread if the users opens and downloads
an email attachment. It may harm the computer when it is activated. It may destroy files on the hard
disk or may send the virus automatically to all email addresses saved in the addressbook.
Networks
Virus can spread if an infected computer is connected to a network. The internet is an example of such
network. When a user downloads a file infected with virus from the internet, the virus is copied to the
computer. It may infect the files stored on the computer.
Pirated Software
An illegal copy of software is called pirated software. Virus can spread if user installs pirated software
that contains a virus. A variety of pirated software is available in CDs and from the internet. Some
companies intentionally add virus in the software. The virus is automatically activated if the user uses
the software without purchasing license.
132
5.12 Computer Virus
Nowadays, most ransomware comes as a result of computer worm, capable of spreading from one
system to the next and across networks without user action (e.g. WannaCry).
133
5.16 Rootkit virus
Rootkits are not viruses. A rootkit is a software package designed to give attackers “root” access or
admin access to a given system. Crucially, rootkits cannot self-replicate and don’tspread across systems.
Cybercriminals can take advantage of bugs in order to gain unauthorized access to a system for the
purposes of dropping malware, stealing private information, or opening up a backdoor. This is known
as an exploit.
Digital certificates are the equivalent of a driver's license, a marriage license, or any other form of
identity. The only difference is that a digital certificate is used in conjunction with a public key
encryption system. Digital certificates are electronic files that simply work as an online passport.
Digital certificates are issued by a third party known as a Certification Authority such as VeriSign or
Thawte. These third party certificate authorities have the responsibility to confirm the identity of the
certificate holder as well as provide assurance to the website visitors that the website is one that is
trustworthy and capable of serving them in a trustworthy manner.
Digital certificates have two basic functions. The first is to certify that the people, the website, and the
network resources such as servers and routers are reliable sources, in other words, who or what they
claim to be. The second function is to provide protection for the data exchanged from the visitor and
the website from tampering or even theft, such as creditcard information.
Accreditation Certificates
This is a certificate that identifies the key holder as a member of a specified group or organization
without necessarily identifying them.
For example, such a certificate could indicate that the key holder is a medical doctor or a lawyer. In
many circumstances, a particular signature is needed to authorize a transaction but the identity of the
key holder is not relevant.
For example, pharmacists might need to ensure that medical prescriptions are signed by doctors but
they do not need to know the specific identities of the doctorsinvolved.
Here the certificate states in effect that the key holder, whoever they are, has ‘permission to write
medical prescriptions’. Accreditation certificates can also be viewed as authorization (or permission)
certificates.
135
It might be thought that a doctor’s key without identity would undermine the ability to audit the issue
of medical prescriptions. However, while such certificate might not contain key holder identity data, the
certificate issuer will know this so such requirements can be met if necessary.
In general, the owner of any resource that involves electronic access can use an authorization certificate
to control access to it. Other examples include control of access to secure computing facilities and to
World Wide Web pages.
In banking an identity certificate might be used to set up an account but the authorization certificate
for the account will not itself contain identity data. To identify the owner of a certificate a bank will
typically look up the link between account numbers and owners in its internal databases. Placing such
information in an authorization certificate is actually undesirable since it could expose the bank or its
customers to additional risks.
The term ‘relying party’ is sometimes uses instead of ‘verifying party’ but this can be misleading since
the real purpose is to identify a party who checks the certificate before relying on it. In a credit card
transaction many parties might handle a certificate and hence rely on it in some way but only a few of
these might actually check the validity of the certificate. Hence a ‘verifying party’ is a party that
checks and then relies on the contents of a certificate, not just one that depends on it without checking
its validity. The actual parties involved in using a certificate will vary depending on the type of
certificate.
136
Public and Private key-
Public-key refers to a cryptographic mechanism. It has been named public-key to differentiate it from
the traditional and more intuitive cryptographic mechanism known as: symmetric-key, shared secret,
secret-key and also called private-key.
Symmetric-key cryptography is a mechanism by which the same key is used for both encrypting and
decrypting; it is more intuitive because of its similarity with what you expect to use for locking and
unlocking a door: the same key.
This characteristic requires sophisticated mechanisms to securely distribute the secret-key to both
parties2. Public-key on the other hand, introduces another concept involving key pairs: one for
encrypting, the other for decrypting.
However, it is important to note that symmetric-key still plays a major role in the implementation of a
Public-key Infrastructure or PKI.
A definition
Public-key is commonly used to identify a cryptographic method that uses an asymmetric- key pair3: a
public-key and a private-key 4. Public-key encryption uses that key pair for encryption and decryption.
The public-key is made public and is distributed widely and freely.
The private-key is never distributed and must be kept secret. Given a key pair, data encrypted with the
public-key can only be decrypted with its privatekey; conversely, data encrypted with the private-key
can only be decrypted with its public key. This characteristic is used to implement encryption and
digital signature.
137
Fig: Encryption/ Decryption
The aim here is to ensure that a verifying party will not accept a certificate as valid if there are critical
extensions present that it cannot interpret. In contrast, a non-critical extension is not essential for
validating the certificate and any inability to interpret it does not necessarily make the certificate
invalid. More generally X.509 allows fields for which there is no universal definition of the semantics
involved.
Although X.509 is widely used, it does have some potentially serious weaknesses including the
assumption that it is always necessary to link a key to an identified person or entity; theassumption that,
even when such a link is appropriate, it is always possible to uniquely identify the person or entity
involved.
The problem here is that X.500 presumes the existence of a global directory structure in which every
entity that needs to be identified can be traced somewhere within its hierarchy
138
Thawte is a leading global Certification Authority. Our SSL and code signing digital certificates are
used globally to secure servers, provide data encryption, authenticate users, protect privacy and assure
online identifies through stringent authentication and verification processes. Our SSL certificates
include Wildcard SSL Certificates, SGC SuperCerts and Extended Validation SSL Certificates.
Verisign ( www.verisign.com )
VeriSign (Nasdaq: VRSN) is the trusted provider of Internet infrastructure services for the digital
world. Billions of times each day, companies and consumers rely on our Internet infrastructure to
communicate and conduct commerce with confidence. VeriSign offerings include SSL, SSL
Certificates, and digital content solutions, Extended Validation, two- factor authentication, identity
protection, managed network security, public key infrastructure (PKI), security consulting,
information management, and solutions for intelligent communications, and content.
Review Questions
1. Define Firewalls
2. Define Virus
3. What is Digital Certificate?
4. Explain the working of Firewall
5. Explain the advantages of Firewall
6. Explain the disadvantages of Firewall
7. Explain the functions of Firewall
8. Explain the types of Firewall
9. Explain Digital Certificates
10. Explain the types of Digital Certificate
139