Web Unit 1st
Web Unit 1st
Internet:
The internet is a global network of computers and other devices that are connected together and
communicate with each other using standardized protocols. It is a massive network of networks that
allows people and computers all over the world to exchange information and communicate with each
other in real time. The internet is used for a variety of purposes, including accessing and sharing
information, communication, online shopping, entertainment, and much more. It has become an
integral part of modern life and has revolutionized the way people interact with each other and with the
world around them.
History Of Internet:
The history of the internet can be traced back to the 1960s when the US Department of
Defense's Advanced Research Projects Agency (ARPA) created a network of computers to
share information and resources. This network was called ARPANET and it was designed to
allow researchers and scientists to collaborate on projects and share data.
In the 1970s, the TCP/IP protocol was developed, which allowed different computer networks to
communicate with each other. This led to the creation of the first email system and the
development of the first internet service providers.
In the 1980s, the World Wide Web (WWW) was invented by Tim Berners-Lee, a British computer
scientist. The WWW allowed people to access and share information using a graphical interface,
which made it much easier to use than the previous text-based interfaces.
In the 1990s, the internet became more widely available to the general public, with the
introduction of commercial internet service providers and the creation of popular websites like
Yahoo and Google.
Since then, the internet has continued to evolve and expand, with the development of social
media, online shopping, cloud computing, and many other applications and services. Today, the
internet has become an essential part of modern life, connecting people and businesses all over
the world in ways that were once unimaginable.
Features of Internet:
The internet is a vast and complex system, and it has many different features and capabilities that
make it a powerful tool for communication, information sharing, and collaboration. Here are some of
the key features of the internet:
1. Global connectivity: The internet is a network of networks that connects millions of
computers and other devices all over the world, making it possible for people and
organizations to communicate and collaborate regardless of geographic location.
2. Information sharing: The internet is an incredibly rich source of information, with millions of
websites, blogs, social media platforms, and other online resources that provide access to all
kinds of information on virtually any topic.
3. Communication: The internet enables real-time communication between people in different
parts of the world through email, instant messaging, video conferencing, and other tools.
4. E-commerce: The internet has revolutionized commerce by enabling businesses to sell
products and services online, allowing consumers to shop from anywhere and at any time.
5. Entertainment: The internet provides a wealth of entertainment options, including streaming
video and music services, online gaming, and social media.
6. Collaboration: The internet makes it easy for people to work together on projects, share
information, and collaborate in real time using online tools and platforms.
7. Cloud computing: The internet enables cloud computing, which allows businesses and
individuals to store and access data and applications remotely, without the need for local
servers or hardware.
Cons/ Disadvantage of Internet: While the internet has many advantages, there are also
some cons or disadvantages that are worth considering. Here are some of the key cons of the
internet:
1. Cybersecurity risks: The internet can be a breeding ground for cybercrime, including
hacking, identity theft, and malware attacks.
2. Cyberbullying and harassment: The anonymity of the internet can lead to cyberbullying and
harassment, which can have serious consequences for victims.
3. Addiction and mental health issues: The internet can be addictive, and excessive use of
social media and other online activities can lead to mental health issues such as anxiety and
depression.
4. Misinformation and fake news: The internet can be a source of misinformation, including
fake news and conspiracy theories, which can lead to confusion and mistrust.
5. Privacy concerns: The internet can be a threat to privacy, as personal information can be
collected and shared by companies and organizations without users' consent.
6. Digital divide: The internet can exacerbate the digital divide, as people in underserved or
rural areas may not have access to high-speed internet and other online resources.
7. Disinformation campaigns: The internet can be used as a tool for disinformation campaigns,
which can have serious consequences for public opinion and democratic institutions.
Protocol:
In the context of computer networking, a protocol is a set of rules and standards that govern the
communication between two or more devices on a network. Protocols define the format and
structure of messages exchanged between devices, as well as the procedures for establishing
and terminating connections.
Protocols are essential for enabling communication between devices that may be made by
different manufacturers or running different operating systems. By standardizing the way that
devices communicate, protocols ensure that data can be transmitted reliably and efficiently
across the network.
FTP (File Transfer Protocol): FTP stands for File Transfer Protocol. It is a protocol used for
transferring files between computers on the internet or on a network. FTP is a standard protocol
that has been widely used since the early days of the internet, and it is still in use today.
FTP works by establishing a connection between two computers: a client computer and a server
computer. The client computer sends commands to the server computer to request or transfer
files, and the server computer responds to these commands.
FTP can be used with a wide range of software tools, including web browsers and standalone
FTP clients. Users can connect to an FTP server using a username and password, and then
navigate the server's directory structure to find the files they want to download or upload.
FTP has some limitations and security issues. For example, files transferred using FTP are not
encrypted, which means that they can be intercepted and read by anyone who has access to the
Advantages:
1. FTP is widely supported by many operating systems and applications, making it a popular
and easily accessible method for transferring files.
2. FTP can handle large files and multiple files at once, making it a useful tool for transferring
large amounts of data.
3. FTP provides access control, allowing users to set permissions for files and folders to restrict
who can access them.
4. FTP supports both active and passive transfer modes, which makes it more flexible in
different network configurations.
5. FTP is a mature and stable protocol, with a large number of available clients and servers
that support it.
Disadvantages:
1. FTP does not provide encryption for data transfers, which means that data can be
intercepted and read by anyone with access to the network. This makes it less secure for
transferring sensitive data.
2. FTP uses separate connections for data transfer and authentication, which can sometimes
cause issues with firewalls or NAT devices that block certain ports.
3. FTP can be more difficult to set up and use than other file transfer protocols, such as HTTP
or SFTP.
4. FTP commands are sent in plain text, which makes them vulnerable to eavesdropping or
tampering by attackers.
5. FTP does not support resuming interrupted transfers by default, which means that large
transfers may need to be restarted from the beginning if they are interrupted.
SMTP: SMTP stands for Simple Mail Transfer Protocol. It is a protocol used for sending and
receiving email over the internet. SMTP is a client-server protocol, which means that it requires
two different software components to function: an SMTP client and an SMTP server.
When an email is sent using SMTP, the SMTP client on the sender's computer connects to the
SMTP server on the recipient's computer. The client then sends the email to the server, which
stores it in the recipient's email inbox. The recipient can then access the email using an email
client, such as Microsoft Outlook or Gmail.
SMTP is a reliable and widely used protocol for email transmission. It is used by most email
services and servers to send and receive email messages. SMTP also supports features such as
authentication, which allows users to verify their identity when sending email messages, and
encryption, which helps protect the privacy of email messages during transmission.
SMTP (Simple Mail Transfer Protocol) is a protocol used for sending email messages over the
internet. Here's a high-level overview of how SMTP works:
1. Client sends message: An email client, such as Microsoft Outlook or Gmail, sends an email
message to a mail server. The message includes the sender's email address, the recipient's
email address, the subject of the message, and the message body.
2. DNS lookup: The mail server looks up the domain name of the recipient's email address
using the DNS (Domain Name System) to find the recipient's mail server.
3. SMTP connection: The sending mail server establishes an SMTP connection with the
recipient's mail server using the SMTP protocol on port 25 or a secure version on port 587
or 465.
4. Sender identification: The sending mail server identifies itself to the receiving mail server
using a HELO or EHLO command and provides its own domain name.
5. Recipient identification: The sending mail server uses the RCPT TO command to identify
the recipient's email address to the receiving mail server.
6. Message transfer: The sending mail server sends the message to the recipient's mail server
using the DATA command. The message is sent in MIME (Multipurpose Internet Mail
Extensions) format, which allows for attachments and other multimedia content.
7. Delivery and storage: The recipient's mail server receives the message and stores it in the
recipient's mailbox. The recipient can then access the message using an email client or
webmail interface.
SMTP is a reliable and widely used protocol for sending email messages over the internet. However,
it is important to note that SMTP is susceptible to spam and other forms of email abuse, which is
why many mail servers use spam filters and other security measures to prevent unwanted
messages from being delivered.
POP3 (Post Office Protocol version 3) has advantages and disadvantages, which are:
Advantages:
1. Offline access: POP3 allows users to download email messages from a mail server to their
device, enabling them to access the messages offline. This is useful when an internet
connection is not available or when a user needs to access their email while traveling.
2. Simple to use: POP3 is a relatively simple protocol to set up and use. Most email clients have
built-in support for POP3, and configuring it usually only requires entering a few settings, such
as the server address, username, and password.
3. Easy to implement: POP3 is a widely supported protocol, and many mail servers and email
clients have built-in support for it. This makes it easy to implement on both the server and
client sides.
4. Reduced server load: Since POP3 only allows for downloading messages from the server and
not managing them, it can reduce the load on the server, making it a good choice for smaller
mail servers.
Disadvantages:
1. Limited synchronization: POP3 is a one-way protocol, which means that it downloads email
messages from the server to the client but does not provide a way to synchronize messages
HTTP
HTTP (Hypertext Transfer Protocol) is a protocol used for transmitting data over the internet. It is the
foundation of the World Wide Web and is responsible for allowing web browsers to communicate
with web servers and retrieve web pages.
HTTP works by establishing a connection between a client, such as a web browser, and a server. The
client sends an HTTP request message to the server, which includes the URL of the requested web
page and any other information necessary for the request. The server responds with an HTTP
response message, which includes the requested web page and any other information required by
the client.
Some of the key features of HTTP include:
Stateless protocol: HTTP is a stateless protocol, which means that each request/response cycle
is independent and does not rely on any information from previous cycles.
Client-server architecture: HTTP follows a client-server architecture, where the client initiates
the request and the server responds with the requested data.
Supports different HTTP methods: HTTP supports several different methods, such as GET,
POST, PUT, and DELETE, which allow for different types of data transmission and
manipulation.
Simple and widely used: HTTP is a simple and widely used protocol, which has made it the
standard for transmitting data over the web.
However, HTTP has some limitations, such as:
Lack of encryption: HTTP does not provide any encryption by default, which means that data
transmitted over HTTP is vulnerable to interception and modification by third parties.
Limited functionality: HTTP is a basic protocol and does not provide features for more advanced
tasks such as authentication, caching, and connection management. These features are
provided by other protocols, such as HTTPS, OAuth, and SPDY.
SHEKHAWATI INSTITUTE, SIKAR 9
HTTPS
HTTPS (Hypertext Transfer Protocol Secure) is a secure version of HTTP, the protocol used for
transmitting data over the internet. It is designed to provide encryption and data integrity for data
transmitted between a client, such as a web browser, and a server.
HTTPS works by adding an additional layer of security to the standard HTTP protocol. It uses SSL/TLS
(Secure Sockets Layer/Transport Layer Security) encryption to protect data transmitted over the
internet. When a client sends an HTTPS request, the server responds with a digital certificate that
contains a public key. The client then uses this public key to encrypt a symmetric key, which is used
to encrypt the data sent between the client and server. The server then uses its private key to decrypt
the symmetric key and decrypt the data.
Some of the advantages of HTTPS include:
Encryption: HTTPS provides encryption of data transmitted between the client and server,
which helps prevent third parties from intercepting and viewing the data.
Data integrity: HTTPS provides data integrity, which ensures that the data transmitted
between the client and server has not been modified or corrupted during transmission.
Authentication: HTTPS provides authentication of the server, which ensures that the client is
communicating with the correct server and not an imposter.
Improved search engine ranking: Google has stated that using HTTPS can improve a
website's search engine ranking, which can lead to increased traffic and revenue.
However, HTTPS also has some limitations and challenges, such as:
Increased server load: HTTPS requires more server resources than HTTP, which can lead to
slower response times and increased server load.
Complexity: HTTPS requires more setup and maintenance than HTTP, which can be
challenging for small websites or those without a dedicated IT team.
Mixed content warnings: If a website uses HTTPS but also includes non-secure content, such
as images or scripts, the browser may display warnings to the user, which can be confusing or
alarming.
The full form of Usenet is "User's Network". Usenet is a decentralized network of online discussion
forums that was established in 1980 before the advent of the World Wide Web. Usenet consists of
a collection of newsgroups, which are discussion forums cantered around specific topics.
Users can post messages to these newsgroups, and other users can read and respond to them.
Usenet was initially developed as a way for researchers to share information and collaborate on
Advantages of Usenet:
1. Wide Range of Topics: Usenet covers a wide range of topics, and there are thousands of
newsgroups on Usenet, each devoted to a specific topic or theme.
2. Decentralized Network: Usenet is a decentralized network, meaning that there is no central
server or organization that controls the network. This makes it difficult for messages to be
censored or blocked.
3. Resilient Architecture: Usenet has a robust and resilient architecture that allows messages
to be propagated between servers quickly and efficiently.
4. Privacy: Usenet is often considered more private than other forms of online communication
because messages are distributed over a decentralized network and are not subject to the
same level of surveillance and monitoring as other forms of online communication.
Newsgroup
For example, the newsgroup comp.lang.C++ contains discussion on C++ language. The leftmost
part comp classifies the newsgroup as one that contains discussion of computer related topics. The
second part identifies one of the subtopics lang that related to computer languages. The third part
identifiers one of the computer languages, in this case C++.
Gopher
The Gopher protocol is a simple and lightweight protocol used for distributing, searching, and
retrieving documents over the internet. It was developed in the early 1990s as an alternative to the
then-popular World Wide Web (WWW).
The Gopher protocol is based on a client-server architecture, where users access information using a
Gopher client, such as a web browser or command-line interface. Gopher servers organize information
into menus and submenus, and users can navigate through these menus to find the information they
need.
Unlike the WWW, which uses hypertext markup language (HTML) to format and display web pages,
the Gopher protocol uses plain text to present information. This makes the protocol lightweight and
fast, but also limits its ability to display multimedia content, such as images and videos.
Although the Gopher protocol was popular in the early days of the internet, it was eventually
overtaken by the WWW, which offered more advanced features and better multimedia support.
However, some Gopher servers still exist today, and the protocol is sometimes used by researchers
and enthusiasts who value its simplicity and speed.
Advantages of Gopher:
1. Simple interface: Gopher has a simple, text-based interface that is easy to use and does not
require a lot of technical expertise.
2. Low bandwidth requirements: Gopher's efficient protocol and simple interface make it
suitable for use over low-bandwidth networks, such as dial-up connections.
3. Hierarchical structure: Gopher's hierarchical structure allows for easy navigation through
menus and submenus, making it easy to find the information you need.
4. Cross-platform compatibility: Gopher can be used on a wide range of platforms and operating
systems, making it accessible to a large audience.
5. Open protocol: Gopher is an open protocol that is not controlled by any single organization or
company, making it accessible to anyone who wants to use it.
Disadvantages of Gopher:
1. Limited multimedia support: Gopher does not support multimedia content, such as images,
audio, or video, which limits its usefulness for certain types of content.
2. Limited interactivity: Gopher is primarily designed for browsing and retrieving information,
rather than for interactive applications, such as online shopping or social networking.
3. Limited search capabilities: While Gopher does include a search feature, it is not as advanced
as modern search engines and may not be effective for more complex searches.
4. Limited adoption: Gopher has been largely superseded by the World Wide Web, which offers
more advanced features and capabilities.
Disadvantages of WAIS:
1. Limited multimedia support: WAIS was primarily designed for text-based documents and did
not support multimedia content as well as modern search systems.
2. Complex setup: Setting up and configuring a WAIS server could be complex and time-
consuming.
3. Limited adoption: WAIS was not as widely adopted as other search systems, such as web
search engines, which limited its usefulness and popularity.
4. High cost: The cost of implementing a WAIS system could be high, which made it less
accessible for smaller organizations.
While WAIS was an innovative search system for its time, it has been largely superseded by
more advanced search technologies, such as web search engines and modern enterprise search
systems. However, the design and features of WAIS have influenced the development of these
more advanced search technologies.