0% found this document useful (0 votes)
74 views19 pages

Web Unit 1st

The document provides information about the Internet and its history, components, and uses. It discusses how the Internet began as a network for researchers and scientists in the 1960s, became more widely available to the public in the 1990s, and has since revolutionized communication, information sharing, and collaboration globally. The document also outlines key features of the Internet like global connectivity, information sharing, e-commerce, and entertainment. It discusses advantages such as access to information and convenience as well as disadvantages like cybersecurity risks, addiction issues, and the digital divide.

Uploaded by

vidhyadevi888666
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views19 pages

Web Unit 1st

The document provides information about the Internet and its history, components, and uses. It discusses how the Internet began as a network for researchers and scientists in the 1960s, became more widely available to the public in the 1990s, and has since revolutionized communication, information sharing, and collaboration globally. The document also outlines key features of the Internet like global connectivity, information sharing, e-commerce, and entertainment. It discusses advantages such as access to information and convenience as well as disadvantages like cybersecurity risks, addiction issues, and the digital divide.

Uploaded by

vidhyadevi888666
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Unit 1

The Internet and World Wide Web

Internet:
The internet is a global network of computers and other devices that are connected together and
communicate with each other using standardized protocols. It is a massive network of networks that
allows people and computers all over the world to exchange information and communicate with each
other in real time. The internet is used for a variety of purposes, including accessing and sharing
information, communication, online shopping, entertainment, and much more. It has become an
integral part of modern life and has revolutionized the way people interact with each other and with the
world around them.

History Of Internet:

 The history of the internet can be traced back to the 1960s when the US Department of
Defense's Advanced Research Projects Agency (ARPA) created a network of computers to
share information and resources. This network was called ARPANET and it was designed to
allow researchers and scientists to collaborate on projects and share data.
 In the 1970s, the TCP/IP protocol was developed, which allowed different computer networks to
communicate with each other. This led to the creation of the first email system and the
development of the first internet service providers.
 In the 1980s, the World Wide Web (WWW) was invented by Tim Berners-Lee, a British computer
scientist. The WWW allowed people to access and share information using a graphical interface,
which made it much easier to use than the previous text-based interfaces.
 In the 1990s, the internet became more widely available to the general public, with the
introduction of commercial internet service providers and the creation of popular websites like
Yahoo and Google.
 Since then, the internet has continued to evolve and expand, with the development of social
media, online shopping, cloud computing, and many other applications and services. Today, the
internet has become an essential part of modern life, connecting people and businesses all over
the world in ways that were once unimaginable.

SHEKHAWATI INSTITUTE, SIKAR 1


How will you connect through internet?
There are several ways to connect to the internet, depending on the type of device and the available
infrastructure in your area. Here are some common ways to connect to the internet:
1. Wired Connection: You can connect to the internet using an Ethernet cable, which is typically
used to connect a computer or laptop directly to a router or modem.
2. Wi-Fi Connection: Many devices, including smartphones, tablets, and laptops, can connect to
the internet wirelessly using Wi-Fi. You'll need to have a wireless router or access point in your
home or office to use Wi-Fi.
3. Cellular Connection: If you have a smartphone or tablet with a cellular data plan, you can use
the cellular network to connect to the internet. This can be useful when you're on the go and
don't have access to Wi-Fi.
4. Satellite Connection: In remote areas where traditional wired or wireless connections are not
available, satellite internet may be an option. This involves installing a satellite dish to receive
internet signals from space.
5. Dial-Up Connection: This is an older technology that uses a phone line to connect to the
internet. It's not commonly used anymore, but may be an option in some areas with limited
infrastructure.
6. Powerline Connection: This technology uses your home's electrical wiring to transmit data and
create a wired internet connection. It can be useful in areas where Wi-Fi signals are weak or
unreliable.

Features of Internet:
The internet is a vast and complex system, and it has many different features and capabilities that
make it a powerful tool for communication, information sharing, and collaboration. Here are some of
the key features of the internet:
1. Global connectivity: The internet is a network of networks that connects millions of
computers and other devices all over the world, making it possible for people and
organizations to communicate and collaborate regardless of geographic location.
2. Information sharing: The internet is an incredibly rich source of information, with millions of
websites, blogs, social media platforms, and other online resources that provide access to all
kinds of information on virtually any topic.
3. Communication: The internet enables real-time communication between people in different
parts of the world through email, instant messaging, video conferencing, and other tools.
4. E-commerce: The internet has revolutionized commerce by enabling businesses to sell
products and services online, allowing consumers to shop from anywhere and at any time.
5. Entertainment: The internet provides a wealth of entertainment options, including streaming
video and music services, online gaming, and social media.
6. Collaboration: The internet makes it easy for people to work together on projects, share
information, and collaborate in real time using online tools and platforms.
7. Cloud computing: The internet enables cloud computing, which allows businesses and
individuals to store and access data and applications remotely, without the need for local
servers or hardware.

SHEKHAWATI INSTITUTE, SIKAR 2


Pros/ Advantage of Internet: The internet has many pros or advantages that have made it an
indispensable tool for modern life. Here are some of the key pros of the internet:
1. Access to Information: The internet provides access to an incredible amount of information
on virtually any topic, making it an excellent resource for education, research, and learning.
2. Communication: The internet has revolutionized communication by enabling real-time
communication between people in different parts of the world through email, instant
messaging, video conferencing, and other tools.
3. E-commerce: The internet has made it possible for businesses to sell products and services
online, allowing consumers to shop from anywhere and at any time.
4. Entertainment: The internet provides a wealth of entertainment options, including streaming
video and music services, online gaming, and social media.
5. Online Education: The internet has enabled online education, making it possible for people to
access educational resources and courses from anywhere in the world.
6. Collaboration: The internet makes it easy for people to work together on projects, share
information, and collaborate in real time using online tools and platforms.
7. Convenience: The internet has made many everyday tasks more convenient, such as online
shopping, banking, and bill payment.
8. Global Connectivity: The internet connects people and organizations all over the world,
making it possible to collaborate and communicate with people from different countries and
cultures.
9. Improved Access to Services: The internet has made it easier for people to access
government services, healthcare, and other essential services, particularly for people living in
remote or underserved areas.

Cons/ Disadvantage of Internet: While the internet has many advantages, there are also
some cons or disadvantages that are worth considering. Here are some of the key cons of the
internet:
1. Cybersecurity risks: The internet can be a breeding ground for cybercrime, including
hacking, identity theft, and malware attacks.
2. Cyberbullying and harassment: The anonymity of the internet can lead to cyberbullying and
harassment, which can have serious consequences for victims.
3. Addiction and mental health issues: The internet can be addictive, and excessive use of
social media and other online activities can lead to mental health issues such as anxiety and
depression.
4. Misinformation and fake news: The internet can be a source of misinformation, including
fake news and conspiracy theories, which can lead to confusion and mistrust.
5. Privacy concerns: The internet can be a threat to privacy, as personal information can be
collected and shared by companies and organizations without users' consent.
6. Digital divide: The internet can exacerbate the digital divide, as people in underserved or
rural areas may not have access to high-speed internet and other online resources.
7. Disinformation campaigns: The internet can be used as a tool for disinformation campaigns,
which can have serious consequences for public opinion and democratic institutions.

SHEKHAWATI INSTITUTE, SIKAR 3


File Transfer:
File transfer refers to the process of transmitting or copying digital files from one device to another
over a network or through a storage medium. The purpose of file transfer may vary depending on
the context, but some common use cases include sharing files between devices, backing up
important data, and sending files to others.
There are several methods for file transfer, including:
1. Email: One of the easiest and most commonly used methods of file transfer is via email.
Most email providers allow users to attach files up to a certain size limit and send them to
recipients.
2. Cloud storage services: Cloud storage services such as Google Drive, Dropbox, and
Microsoft OneDrive provide users with a convenient way to store and share files over the
internet.
3. File transfer protocol (FTP): FTP is a protocol used for transferring files over the internet.
It allows users to upload and download files from a remote server using an FTP client.
4. Peer-to-peer (P2P) file sharing: P2P file sharing allows users to transfer files directly
between two or more devices without the need for a central server. Popular P2P file-sharing
platforms include BitTorrent and uTorrent.
5. Physical storage devices: Files can also be transferred using physical storage devices
such as USB flash drives, external hard drives, and memory cards.
The method of file transfer chosen will depend on several factors, including the size of the files
being transferred, the speed of the internet connection, and the security requirements of the
transfer.

Some key features of effective file transfer include:


1. Speed: The transfer of files should be as fast as possible to minimize the time required to
transfer large amounts of data.
2. Security: The transfer of files should be secure to protect the data from unauthorized access or
interception. This may involve using encryption or secure file transfer protocols such as SFTP
or HTTPS.
3. Reliability: The transfer of files should be reliable to ensure that all data is transferred
successfully without any loss or corruption of data.
4. Scalability: The transfer of files should be scalable to accommodate larger files or increasing
numbers of files being transferred.
5. Accessibility: The transfer of files should be accessible to users regardless of their location or
device.
6. User-friendliness: The transfer of files should be easy to use and understand, with clear
instructions and intuitive interfaces.
7. Compatibility: The transfer of files should be compatible with the software and systems being
used, to avoid any compatibility issues that may result in failed transfers.

SHEKHAWATI INSTITUTE, SIKAR 4


Internet Protocol:
Internet Protocol (IP) is a set of rules and protocols that govern how data is transmitted over the
internet. It defines the format of data packets, how they are addressed, routed, and delivered to their
intended destinations.
IP is a connectionless protocol, which means that it does not establish a dedicated connection
between the sender and receiver before transmitting data. Instead, data is divided into small packets
and transmitted across the network. Each packet is addressed and routed independently, and may
take a different path through the network to reach its destination.
There are two main versions of IP in use today: IPv4 and IPv6. IPv4 is the older and more widely used
version, while IPv6 offers greater address space and improved security features. IP is a fundamental
protocol of the internet, and is used by a wide range of applications and services, including email, file
sharing, and web browsing.

Protocol:
In the context of computer networking, a protocol is a set of rules and standards that govern the
communication between two or more devices on a network. Protocols define the format and
structure of messages exchanged between devices, as well as the procedures for establishing
and terminating connections.
Protocols are essential for enabling communication between devices that may be made by
different manufacturers or running different operating systems. By standardizing the way that
devices communicate, protocols ensure that data can be transmitted reliably and efficiently
across the network.

Some common protocols used in computer networking include:

 FTP (File Transfer Protocol): FTP stands for File Transfer Protocol. It is a protocol used for
transferring files between computers on the internet or on a network. FTP is a standard protocol
that has been widely used since the early days of the internet, and it is still in use today.

FTP works by establishing a connection between two computers: a client computer and a server
computer. The client computer sends commands to the server computer to request or transfer
files, and the server computer responds to these commands.

FTP can be used with a wide range of software tools, including web browsers and standalone
FTP clients. Users can connect to an FTP server using a username and password, and then
navigate the server's directory structure to find the files they want to download or upload.

FTP has some limitations and security issues. For example, files transferred using FTP are not
encrypted, which means that they can be intercepted and read by anyone who has access to the

SHEKHAWATI INSTITUTE, SIKAR 5


network. However, secure versions of FTP, such as FTPS (FTP over SSL) and SFTP (Secure File
Transfer Protocol), are available to provide encryption and other security features.

Advantages:
1. FTP is widely supported by many operating systems and applications, making it a popular
and easily accessible method for transferring files.
2. FTP can handle large files and multiple files at once, making it a useful tool for transferring
large amounts of data.
3. FTP provides access control, allowing users to set permissions for files and folders to restrict
who can access them.
4. FTP supports both active and passive transfer modes, which makes it more flexible in
different network configurations.
5. FTP is a mature and stable protocol, with a large number of available clients and servers
that support it.
Disadvantages:
1. FTP does not provide encryption for data transfers, which means that data can be
intercepted and read by anyone with access to the network. This makes it less secure for
transferring sensitive data.
2. FTP uses separate connections for data transfer and authentication, which can sometimes
cause issues with firewalls or NAT devices that block certain ports.
3. FTP can be more difficult to set up and use than other file transfer protocols, such as HTTP
or SFTP.
4. FTP commands are sent in plain text, which makes them vulnerable to eavesdropping or
tampering by attackers.
5. FTP does not support resuming interrupted transfers by default, which means that large
transfers may need to be restarted from the beginning if they are interrupted.

 SMTP: SMTP stands for Simple Mail Transfer Protocol. It is a protocol used for sending and
receiving email over the internet. SMTP is a client-server protocol, which means that it requires
two different software components to function: an SMTP client and an SMTP server.
When an email is sent using SMTP, the SMTP client on the sender's computer connects to the
SMTP server on the recipient's computer. The client then sends the email to the server, which
stores it in the recipient's email inbox. The recipient can then access the email using an email
client, such as Microsoft Outlook or Gmail.
SMTP is a reliable and widely used protocol for email transmission. It is used by most email
services and servers to send and receive email messages. SMTP also supports features such as
authentication, which allows users to verify their identity when sending email messages, and
encryption, which helps protect the privacy of email messages during transmission.

SHEKHAWATI INSTITUTE, SIKAR 6


Working Of Smtp

SMTP (Simple Mail Transfer Protocol) is a protocol used for sending email messages over the
internet. Here's a high-level overview of how SMTP works:
1. Client sends message: An email client, such as Microsoft Outlook or Gmail, sends an email
message to a mail server. The message includes the sender's email address, the recipient's
email address, the subject of the message, and the message body.
2. DNS lookup: The mail server looks up the domain name of the recipient's email address
using the DNS (Domain Name System) to find the recipient's mail server.
3. SMTP connection: The sending mail server establishes an SMTP connection with the
recipient's mail server using the SMTP protocol on port 25 or a secure version on port 587
or 465.
4. Sender identification: The sending mail server identifies itself to the receiving mail server
using a HELO or EHLO command and provides its own domain name.
5. Recipient identification: The sending mail server uses the RCPT TO command to identify
the recipient's email address to the receiving mail server.
6. Message transfer: The sending mail server sends the message to the recipient's mail server
using the DATA command. The message is sent in MIME (Multipurpose Internet Mail
Extensions) format, which allows for attachments and other multimedia content.
7. Delivery and storage: The recipient's mail server receives the message and stores it in the
recipient's mailbox. The recipient can then access the message using an email client or
webmail interface.
SMTP is a reliable and widely used protocol for sending email messages over the internet. However,
it is important to note that SMTP is susceptible to spam and other forms of email abuse, which is
why many mail servers use spam filters and other security measures to prevent unwanted
messages from being delivered.

 POP (Post Office Protocol)


POP stands for Post Office Protocol, which is a protocol used for retrieving email messages
from a mail server. It is commonly used by email clients, such as Microsoft Outlook and Apple
Mail, to access email stored on a remote mail server.
POP works by downloading all of the messages from the mail server to the client's device, and
then deleting them from the server. This means that once the messages have been
downloaded, they are no longer available on the server and can only be accessed on the device
where they were downloaded.
There are two versions of the POP protocol in use: POP3 and POP2. POP3 is the more widely
used version and is supported by most email servers and clients. POP2 is an older version that
is no longer widely used.

SHEKHAWATI INSTITUTE, SIKAR 7


POP3 (Post Office Protocol version 3) is a protocol used for retrieving email messages from a mail
server. It is a newer version of the original POP protocol and is the most widely used version of the
protocol.
POP3 works by establishing a connection between an email client, such as Microsoft Outlook or Apple
Mail, and a mail server. The client sends login credentials to the server, and the server responds by
sending a list of all the email messages stored on the server for the user's account. The client can
then choose to download all of the messages or only select ones. Once the messages have been
downloaded, they are removed from the server.
Some of the key features of POP3 include:
 Support for secure connections: POP3 can be used over a secure connection, such as SSL or
TLS, to encrypt email messages and login credentials.
 Simplified message management: POP3 only allows for the downloading of messages from
the server, but does not allow for any message management on the server. This simplifies
message management and reduces the load on the server.
 Offline access: POP3 allows for offline access to email messages, as they are downloaded to
the client's device and can be accessed even when an internet connection is not available.
 Limited message synchronization: Since POP3 is a one-way protocol, it does not provide full
synchronization of email messages between multiple devices.

POP3 (Post Office Protocol version 3) has advantages and disadvantages, which are:
Advantages:
1. Offline access: POP3 allows users to download email messages from a mail server to their
device, enabling them to access the messages offline. This is useful when an internet
connection is not available or when a user needs to access their email while traveling.
2. Simple to use: POP3 is a relatively simple protocol to set up and use. Most email clients have
built-in support for POP3, and configuring it usually only requires entering a few settings, such
as the server address, username, and password.
3. Easy to implement: POP3 is a widely supported protocol, and many mail servers and email
clients have built-in support for it. This makes it easy to implement on both the server and
client sides.
4. Reduced server load: Since POP3 only allows for downloading messages from the server and
not managing them, it can reduce the load on the server, making it a good choice for smaller
mail servers.
Disadvantages:
1. Limited synchronization: POP3 is a one-way protocol, which means that it downloads email
messages from the server to the client but does not provide a way to synchronize messages

SHEKHAWATI INSTITUTE, SIKAR 8


between multiple devices. This can lead to inconsistencies in message access and can be a
challenge for users who access their email from multiple devices.
2. No message management: POP3 does not provide any features for managing email messages
on the server. This means that messages can only be managed on the client device, which can
be inconvenient if the user needs to access their email from a different device.
3. No encryption by default: POP3 does not provide any encryption by default, which means that
email messages and login credentials are sent in plain text. This can be a security risk,
especially if the user is accessing their email over a public Wi-Fi network.
4. Limited functionality: POP3 is a basic protocol and only provides limited functionality
compared to more advanced protocols like IMAP or Exchange. For example, it does not support
folder management or searching of email messages.

HTTP
HTTP (Hypertext Transfer Protocol) is a protocol used for transmitting data over the internet. It is the
foundation of the World Wide Web and is responsible for allowing web browsers to communicate
with web servers and retrieve web pages.
HTTP works by establishing a connection between a client, such as a web browser, and a server. The
client sends an HTTP request message to the server, which includes the URL of the requested web
page and any other information necessary for the request. The server responds with an HTTP
response message, which includes the requested web page and any other information required by
the client.
Some of the key features of HTTP include:
 Stateless protocol: HTTP is a stateless protocol, which means that each request/response cycle
is independent and does not rely on any information from previous cycles.
 Client-server architecture: HTTP follows a client-server architecture, where the client initiates
the request and the server responds with the requested data.
 Supports different HTTP methods: HTTP supports several different methods, such as GET,
POST, PUT, and DELETE, which allow for different types of data transmission and
manipulation.
 Simple and widely used: HTTP is a simple and widely used protocol, which has made it the
standard for transmitting data over the web.
However, HTTP has some limitations, such as:
 Lack of encryption: HTTP does not provide any encryption by default, which means that data
transmitted over HTTP is vulnerable to interception and modification by third parties.
 Limited functionality: HTTP is a basic protocol and does not provide features for more advanced
tasks such as authentication, caching, and connection management. These features are
provided by other protocols, such as HTTPS, OAuth, and SPDY.
SHEKHAWATI INSTITUTE, SIKAR 9
HTTPS
HTTPS (Hypertext Transfer Protocol Secure) is a secure version of HTTP, the protocol used for
transmitting data over the internet. It is designed to provide encryption and data integrity for data
transmitted between a client, such as a web browser, and a server.
HTTPS works by adding an additional layer of security to the standard HTTP protocol. It uses SSL/TLS
(Secure Sockets Layer/Transport Layer Security) encryption to protect data transmitted over the
internet. When a client sends an HTTPS request, the server responds with a digital certificate that
contains a public key. The client then uses this public key to encrypt a symmetric key, which is used
to encrypt the data sent between the client and server. The server then uses its private key to decrypt
the symmetric key and decrypt the data.
Some of the advantages of HTTPS include:
 Encryption: HTTPS provides encryption of data transmitted between the client and server,
which helps prevent third parties from intercepting and viewing the data.
 Data integrity: HTTPS provides data integrity, which ensures that the data transmitted
between the client and server has not been modified or corrupted during transmission.
 Authentication: HTTPS provides authentication of the server, which ensures that the client is
communicating with the correct server and not an imposter.
 Improved search engine ranking: Google has stated that using HTTPS can improve a
website's search engine ranking, which can lead to increased traffic and revenue.
However, HTTPS also has some limitations and challenges, such as:
 Increased server load: HTTPS requires more server resources than HTTP, which can lead to
slower response times and increased server load.
 Complexity: HTTPS requires more setup and maintenance than HTTP, which can be
challenging for small websites or those without a dedicated IT team.
 Mixed content warnings: If a website uses HTTPS but also includes non-secure content, such
as images or scripts, the browser may display warnings to the user, which can be confusing or
alarming.

There are some key differences between the two protocols.


1. Encryption: One of the most significant differences between HTTP and HTTPS is encryption.
HTTP does not provide any encryption by default, which means that data transmitted over
HTTP is vulnerable to interception and modification by third parties. In contrast, HTTPS
provides encryption of data transmitted between the client and server, which helps prevent
third parties from intercepting and viewing the data.
2. Data integrity: Another important difference between HTTP and HTTPS is data integrity.
HTTPS provides data integrity, which ensures that the data transmitted between the client and

SHEKHAWATI INSTITUTE, SIKAR 10


server has not been modified or corrupted during transmission. HTTP does not provide any
guarantees of data integrity.
3. Authentication: HTTPS provides authentication of the server, which ensures that the client is
communicating with the correct server and not an imposter. HTTP does not provide any
authentication.
4. Port: HTTP uses port 80 by default, while HTTPS uses port 443 by default.
5. Performance: HTTPS can be slower than HTTP due to the additional overhead of encryption
and decryption. However, advances in SSL/TLS encryption have reduced this performance gap
in recent years.

TCP/IP (Transmission Control Protocol/Internet Protocol)


TCP/IP (Transmission Control Protocol/Internet Protocol) is a set of networking protocols used for
transmitting data over the internet. It is the foundation of the internet and allows devices to
communicate with each other across different networks and systems.
TCP is responsible for ensuring that data is transmitted reliably and accurately between devices. It
breaks data into packets and sends them across the internet, using a process called flow control to
ensure that packets are sent and received in the correct order. It also uses error checking to detect
and correct any errors in the transmission.
IP is responsible for routing packets between devices on the internet. It assigns unique IP addresses
to each device and uses a process called routing to direct packets to their intended destination. It also
provides fragmentation and reassembly of packets, allowing large amounts of data to be transmitted
across the internet.
Some of the key features of TCP/IP include:
 Layered architecture: TCP/IP uses a layered architecture, where each layer has a specific
function and communicates with the layers above and below it.
 Open standard: TCP/IP is an open standard, which means that it can be used by anyone
without having to pay for proprietary software or protocols.
 Widely used: TCP/IP is a widely used protocol, which has made it the standard for transmitting
data over the internet.
Some of the protocols that are part of the TCP/IP suite include:
 HTTP: Hypertext Transfer Protocol, used for transmitting data over the web.
 FTP: File Transfer Protocol, used for transmitting files over the internet.
 SMTP: Simple Mail Transfer Protocol, used for transmitting email over the internet.

SHEKHAWATI INSTITUTE, SIKAR 11


Telnet:
Telnet is a network protocol used to provide two-way communication between devices over the
internet or a local area network (LAN). It allows users to connect to and control remote devices
using a text-based interface.
Telnet works by establishing a connection between a client device and a server device, allowing
the user to enter commands on the client device that are executed on the server device. Telnet is
often used to remotely access and control devices such as servers, routers, switches, and other
network equipment.
Telnet is primarily used for administrative purposes, such as configuring and managing network
devices, but it can also be used for other applications, such as remote access to a computer or for
testing connectivity.
While Telnet is still available on many devices and operating systems, it is not considered a secure
protocol because the data transmitted over Telnet is not encrypted, meaning that it can be easily
intercepted and viewed by anyone with access to the network.
As a result, Telnet is often replaced by more secure protocols such as SSH (Secure Shell) that
provide encryption and authentication, making them a better choice for remote access and
management of network devices.

Secure Shell (SSH)


Secure Shell (SSH) is a network protocol used to securely connect and communicate with remote
devices over an unsecured network, such as the internet or a local area network (LAN). SSH
provides encrypted communication between devices, ensuring that sensitive data such as
passwords, login credentials, and other information is protected from interception or unauthorized
access.
SSH is often used for remote management of servers, routers, switches, and other network
equipment, as well as for secure file transfer and tunneling. SSH provides several security features,
including:
1. Encryption: SSH encrypts all data transmitted between devices, ensuring that it cannot be
intercepted and viewed by unauthorized parties.
2. Authentication: SSH uses public-key cryptography and digital certificates to authenticate
the identity of devices and users, preventing unauthorized access.
3. Integrity: SSH uses digital signatures to ensure the integrity of data transmitted between
devices, preventing data tampering.
4. Forward secrecy: SSH uses a different encryption key for each session, ensuring that even
if one session is compromised, subsequent sessions remain secure.

Usenet (USEr NETwork)

The full form of Usenet is "User's Network". Usenet is a decentralized network of online discussion
forums that was established in 1980 before the advent of the World Wide Web. Usenet consists of
a collection of newsgroups, which are discussion forums cantered around specific topics.
Users can post messages to these newsgroups, and other users can read and respond to them.
Usenet was initially developed as a way for researchers to share information and collaborate on

SHEKHAWATI INSTITUTE, SIKAR 12


projects, but it quickly grew in popularity and became a hub for discussion and sharing of information
on a wide range of topics.
Usenet is decentralized, meaning that there is no central server or organization that controls the
network. Instead, Usenet servers are operated independently by individuals or organizations, and
messages are propagated between servers through a process called Usenet news feeds.
Usenet has been largely superseded by web-based discussion forums and social media platforms,
but it still has a devoted following among users who appreciate its decentralized nature, the variety
of topics it covers, and its robust and resilient architecture.

Some key features of Usenet include:

1. Decentralization: Usenet is a decentralized network, meaning that there is no central server or


organization that controls the network. Instead, Usenet servers are operated independently by
individuals or organizations, and messages are propagated between servers through a process
called Usenet news feeds.
2. Wide range of topics: Usenet covers a wide range of topics, from technology and science to
politics and entertainment. There are thousands of newsgroups on Usenet, each devoted to a
specific topic or theme.
3. Robust and resilient architecture: Usenet has a robust and resilient architecture that allows
messages to be propagated between servers quickly and efficiently. This architecture also makes
it difficult for messages to be censored or blocked.
4. Rich history: Usenet has been around since the early days of the internet and has a rich history
that spans several decades. Usenet has been an important forum for discussion and collaboration
among researchers, technologists, and other communities.
5. Privacy: Usenet is often considered more private than other forms of online communication
because messages are distributed over a decentralized network and are not subject to the same
level of surveillance and monitoring as other forms of online communication.
6. File sharing: Usenet has historically been used for file sharing, including software, music, and other
media. While many Usenet providers have implemented policies to prohibit or limit file sharing on
their networks, the ability to share files remains an important feature of Usenet.

Advantages of Usenet:
1. Wide Range of Topics: Usenet covers a wide range of topics, and there are thousands of
newsgroups on Usenet, each devoted to a specific topic or theme.
2. Decentralized Network: Usenet is a decentralized network, meaning that there is no central
server or organization that controls the network. This makes it difficult for messages to be
censored or blocked.
3. Resilient Architecture: Usenet has a robust and resilient architecture that allows messages
to be propagated between servers quickly and efficiently.
4. Privacy: Usenet is often considered more private than other forms of online communication
because messages are distributed over a decentralized network and are not subject to the
same level of surveillance and monitoring as other forms of online communication.

SHEKHAWATI INSTITUTE, SIKAR 13


5. File Sharing: Usenet has historically been used for file sharing, including software, music,
and other media. While many Usenet providers have implemented policies to prohibit or limit
file sharing on their networks, the ability to share files remains an important feature of Usenet.
Disadvantages of Usenet:
1. Complexity: Usenet can be complex and difficult to navigate for new users. The
decentralized nature of the network and the large number of newsgroups can be
overwhelming.
2. Spam: Usenet is often a target for spam and other unwanted messages. While many Usenet
providers have implemented measures to combat spam, it remains a problem.
3. Lack of Moderation: Usenet is largely unmoderated, meaning that anyone can post
messages to newsgroups. This can lead to a lack of quality control and the proliferation of
offensive or inappropriate content.
4. Legal Issues: Usenet has been associated with copyright infringement and other legal
issues related to file sharing. Many Usenet providers have implemented policies to prohibit
or limit file sharing on their networks in order to avoid legal liability.

Newsgroup

A newsgroup is a discussion forum on Usenet that is dedicated to a specific topic or theme.


Newsgroups are organized hierarchically and are identified by a unique name that reflects their
topic or theme.
Users can post messages to newsgroups, and other users can read and respond to them.
Newsgroups can be accessed through Usenet clients, which allow users to subscribe to and
participate in discussions on specific newsgroups.
Newsgroups can cover a wide range of topics, from technology and science to politics and
entertainment. Some newsgroups are moderated, meaning that a designated person or group is
responsible for reviewing and approving messages before they are posted to the newsgroup. Other
newsgroups are unmoderated, meaning that anyone can post messages to the newsgroup without
prior approval.

For example, the newsgroup comp.lang.C++ contains discussion on C++ language. The leftmost
part comp classifies the newsgroup as one that contains discussion of computer related topics. The
second part identifies one of the subtopics lang that related to computer languages. The third part
identifiers one of the computer languages, in this case C++.

SHEKHAWATI INSTITUTE, SIKAR 14


The following table shows the top-level hierarchies of Usenet Newsgroup:

Comp.* Computer related topics including computer hardware, Comp.lang.java.beans


software, languages etc. Comp.database.oracle
News.* Newsgroup and Usenet topics News.software.nntp
Rec.* Artistic activities, hobbies, or recreational activities Rec.arts.animation
such as books, movies etc.
Sci.* Scientific topics Sci.bio.botany
Soc.* Social issues and various culture Soc.culture.india
Talk.* Conventional subjects such as religion, politics etc. Soc.politics.india
Humanities.* Art, literature, philosophy and culture Humanities.classics
Misc.* Miscellaneous topics i.e. issues tat may not fit into Misc.answers
other categories Misc.books.technical

The working of Usenet newsgroups involves the following steps:


1. Posting a message: A user composes a message and posts it to a specific newsgroup. The
message is transmitted to the Usenet server to which the user is connected.
2. Replication: The Usenet server that receives the message replicates it to other servers in the
Usenet network. This process is called propagation.
3. Distribution: Once the message has been replicated to multiple servers, it is distributed to
subscribers who have subscribed to that particular newsgroup. The message may be further
replicated to other servers in the network, depending on the number of subscribers and the
popularity of the newsgroup.
4. Reading and responding: Subscribers can read the message and respond to it by posting their
own messages in the same newsgroup. The process of replication and distribution continues
for all new messages posted to the newsgroup.
5. Archiving: Messages posted to Usenet newsgroups are typically archived on Usenet servers
for a period of time. This allows users to access and search for messages that were posted in
the past.

Difference between Mailing list vs. Newsgroup


S.N. Mailing List Newsgroup
1. Messages are delivered to individual Messages are not posted to individual mailboxes
mailboxes of subscribed member of but can be viewed by anyone who has subscribed
group. to that newsgroup.
2. Working with mailing list is easier than Working with a particular newsgroup requires
newsgroup. It is easy to compose and proper knowledge of that newsgroup.
receive emails.

SHEKHAWATI INSTITUTE, SIKAR 15


3. In order to send or receive mails, you It requires a newsgroup reader.
required an email program.
4. Messages are delivered to certain group Messages are available to public.
of people.
5. Mailing list does not support threaded Newsgroup supports threaded discussion.
discussion.
6. Messages delivered to listed subscribers Article posted on a newsgroup can be cancelled.
can not be cancelled.

Gopher
The Gopher protocol is a simple and lightweight protocol used for distributing, searching, and
retrieving documents over the internet. It was developed in the early 1990s as an alternative to the
then-popular World Wide Web (WWW).
The Gopher protocol is based on a client-server architecture, where users access information using a
Gopher client, such as a web browser or command-line interface. Gopher servers organize information
into menus and submenus, and users can navigate through these menus to find the information they
need.
Unlike the WWW, which uses hypertext markup language (HTML) to format and display web pages,
the Gopher protocol uses plain text to present information. This makes the protocol lightweight and
fast, but also limits its ability to display multimedia content, such as images and videos.
Although the Gopher protocol was popular in the early days of the internet, it was eventually
overtaken by the WWW, which offered more advanced features and better multimedia support.
However, some Gopher servers still exist today, and the protocol is sometimes used by researchers
and enthusiasts who value its simplicity and speed.

Here are some of the key features of Gopher:


1. Simple interface: Gopher has a simple, text-based interface that allows users to navigate
through menus and select documents to view.
2. Hierarchical structure: Gopher organizes documents in a hierarchical structure, with menus
and submenus that allow users to navigate through different levels of content.
3. Uniform resource locator (URL) support: Gopher supports URLs that allow users to link to
specific documents or directories within the Gopher system.
4. Search capabilities: Gopher includes a search feature that allows users to search for specific
documents or keywords within the Gopher system.
5. Cross-platform compatibility: Gopher can be used on a wide range of platforms and operating
systems, including Unix, Windows, and Mac OS.

SHEKHAWATI INSTITUTE, SIKAR 16


6. Low bandwidth requirements: Gopher's simple, text-based interface and efficient protocol
make it suitable for use over low-bandwidth networks.
7. Open protocol: Gopher is an open protocol that is not controlled by any single organization or
company, making it accessible to anyone who wants to use it.
While Gopher is not as widely used today as it was in the early days of the internet, it remains an
important part of the history of the internet and the development of online information retrieval
systems.

Advantages of Gopher:
1. Simple interface: Gopher has a simple, text-based interface that is easy to use and does not
require a lot of technical expertise.
2. Low bandwidth requirements: Gopher's efficient protocol and simple interface make it
suitable for use over low-bandwidth networks, such as dial-up connections.
3. Hierarchical structure: Gopher's hierarchical structure allows for easy navigation through
menus and submenus, making it easy to find the information you need.
4. Cross-platform compatibility: Gopher can be used on a wide range of platforms and operating
systems, making it accessible to a large audience.
5. Open protocol: Gopher is an open protocol that is not controlled by any single organization or
company, making it accessible to anyone who wants to use it.
Disadvantages of Gopher:
1. Limited multimedia support: Gopher does not support multimedia content, such as images,
audio, or video, which limits its usefulness for certain types of content.
2. Limited interactivity: Gopher is primarily designed for browsing and retrieving information,
rather than for interactive applications, such as online shopping or social networking.
3. Limited search capabilities: While Gopher does include a search feature, it is not as advanced
as modern search engines and may not be effective for more complex searches.
4. Limited adoption: Gopher has been largely superseded by the World Wide Web, which offers
more advanced features and capabilities.

WAIS (Wide Area Information Server)


WAIS stands for "Wide Area Information Server". It is an early internet search system that was
developed in the 1980s and 1990s. WAIS was designed to allow users to search for information
across a wide range of documents, including text-based documents, images, and other multimedia
content. It included natural language processing capabilities, which allowed users to enter queries in
natural language rather than using complex search syntax. WAIS used indexing algorithms to
improve search performance and organized information in a hierarchical structure, allowing users to
SHEKHAWATI INSTITUTE, SIKAR 17
navigate through different levels of content. It also used a client-server architecture, with clients
accessing servers over the internet to retrieve search results. While WAIS was an innovative search
system for its time, it has been largely superseded by more advanced search technologies, such as
web search engines and modern enterprise search systems.
Here are some key features/ Advantages of WAIS:
1. Full-text search: WAIS was designed to allow users to search for information across a wide
range of documents, including text-based documents, images, and other multimedia content.
2. Natural language processing: WAIS included natural language processing capabilities, which
allowed users to enter queries in natural language rather than using complex search syntax.
3. Client-server architecture: WAIS used a client-server architecture, with clients accessing
servers over the internet to retrieve search results.
4. Hierarchical organization: WAIS organized information in a hierarchical structure, allowing
users to navigate through different levels of content.
5. Indexing: WAIS used indexing algorithms to improve search performance, allowing users to
quickly retrieve relevant information.

Disadvantages of WAIS:
1. Limited multimedia support: WAIS was primarily designed for text-based documents and did
not support multimedia content as well as modern search systems.
2. Complex setup: Setting up and configuring a WAIS server could be complex and time-
consuming.
3. Limited adoption: WAIS was not as widely adopted as other search systems, such as web
search engines, which limited its usefulness and popularity.
4. High cost: The cost of implementing a WAIS system could be high, which made it less
accessible for smaller organizations.

While WAIS was an innovative search system for its time, it has been largely superseded by
more advanced search technologies, such as web search engines and modern enterprise search
systems. However, the design and features of WAIS have influenced the development of these
more advanced search technologies.

Archie and Veronica


Archie and Veronica are two early internet search tools that were developed in the late 1980s and
early 1990s, before the rise of modern web search engines.

SHEKHAWATI INSTITUTE, SIKAR 18


Archie (short for "Archive") was created in 1990 at McGill University in Montreal, Canada. It was a
system for indexing and searching for files on anonymous FTP (File Transfer Protocol) sites. Archie
allowed users to search for files by keyword, file type, and other criteria. It was widely used in the
early days of the internet, before the development of the World Wide Web.
Veronica (short for "Very Easy Rodent-Oriented Network-wide Index to Computerized Archives") was
developed in 1992 at the University of Nevada, Reno. It was a search tool for the Gopher protocol,
which was an early internet protocol for organizing and accessing information. Veronica allowed users
to search for information across multiple Gopher servers, using keyword searches and other criteria.
Both Archie and Veronica were important early internet search tools that helped users to find
information on the internet before the advent of modern web search engines like Google. However,
their use declined as the popularity of the World Wide Web grew and more advanced search
technologies were developed.

Here are the features of Archie and Veronica:


Archie:
1. Indexing of anonymous FTP sites: Archie indexed anonymous FTP sites on the internet,
allowing users to search for files hosted on these sites.
2. Command-line interface: Users interacted with Archie using a command-line interface,
entering search queries and receiving results in text format.
3. Search filters: Archie provided users with the ability to filter search results by file type, date,
and other criteria.
4. Centralized index: Archie maintained a centralized index of FTP sites, allowing users to search
for files across multiple sites at once.
Veronica:
1. Search for Gopher menus: Veronica was designed to search for Gopher menus, which were
hierarchical lists of files and documents organized by topic or subject.
2. Keyword searches: Users could search for information on Gopher servers using keyword
searches.
3. Centralized index: Veronica maintained a centralized index of Gopher servers, allowing users
to search for information across multiple servers at once.
4. Client-server architecture: Veronica used a client-server architecture, with clients accessing
servers over the internet to retrieve search results.

SHEKHAWATI INSTITUTE, SIKAR 19

You might also like