Internet and Web Technologies - Notes X2023 April-1
Internet and Web Technologies - Notes X2023 April-1
WEB TECHNOLOGIES
NDIT 115
E.M Oporia
Microsoft Certified Professional
Microsoft Incorporation.
Page 1
CERTIFICATE / DIPLOMA
IN INTERNET AND WEB
DESIGN
1 INTERNET TECHNOLOGY
Page 2
UNIT - 1 INTERNET CONCEPTS
Learning objectives:-
At the end of this unit you will be able to:
STRUCTURE
1.1 Introduction
Page 3
1.11 Web Browser
1.13 Summary
1.15 References
Introduction
information on
almost every
subject. In this
chapter we will
learn about what
is Internet and
how it came in to
existence. Also
we will discuss
some of the
services and tools
which are
commonly used to access the Internet, and will learn about how to begin
searching the Internet for information. A specific technology which is rapidly
becoming one of the central mechanisms for providing information on the
Internet, the World Wide Web, will also be explained in it. The Internet is a
communication system that connects computers and computer networks all over
the world. Thus, we define the Internet as a global network of computers/devices.
“Inter” comes from the word
Page 4
“International”, “Net” here refers to a computer network. The Internet is an
arrangement of connected computers, which lets the computer users all over the
globe to exchange data or information.
In 1969 when man walked on the moon; the U.S. defense department set an
Advanced Research project Agency (ARPA) for further research. They designed a
network of four computers to exchange and share their data. This network was
called ARPANET (Advanced Research Project Agency Network). Later, many
universities were allowed to join this network and share the information. This was
the beginning of 'Networking of computers' which grew bigger day by day and
gave birth to INTERNET- the technology which has changed our life. Ear-lier,
Internet was used by engineers, scientists and computer experts for re-search
purpose. Gradually, the network was made accessible to private agencies and
general public. People started using it for sending messages and files be-tween
the computers. The most interesting thing about Internet is that no single agency
controls or maintains the Internet.
In 1972, the ARPANET spread over the globe with 23 nodes located at different
countries and thus became known as Internet. Later, many universities were
allowed to join this network and share the information. Internet is that no single
agency controls it or maintains it. It cannot be hijacked or monopolized. Rather
for its smooth functioning, some task forces have been established they are -
Page 5
In India, internet services started on 15th August 1995 through gov-ernment
owned VSNL. Now many private internet service providers like Airtel, Reliance,
Sify, and Tata etc. have also been allowed to provide internet services.
Page 6
academic, business, and government networks. The Internet connects
millions of computers. These computers are called hosts.
The communication protocol
used for Internet is TCP/IP. The
computers on Internet
are linked through
different communication
media. The
commonly used
communication media are
telephone lines, fiber optic
cables, microwave and satellite.
In today's age, there are numerous ways to connect laptops, desktops, mobile
phones and tablets to the Internet. When determining which type of Internet
connection is right for us, it's important to understand the distinction between
Page 7
each connection. Some of the most widely used Internet connections are listed
below.
After the dial-up connection has been established, it is active until the user
disconnects from the ISP. Typically, this is done by selecting the “Disconnect”
option using the ISP’s software or a modem utility program. However, if a dial-up
connection is interrupted by an incoming phone call or someone picking up a
phone in the house, the service may also be disconnected.
Advantages
• Low Price
• Secure connection – your IP address continually changes
• Offered in rural areas – you need a phone line
Disadvantages
• Slow speed.
• Phone line is required.
• Busy signals for friends and family members.
Page 8
1.6.2 Leased Connection
For example, a T-1 channel is a type of leased line that provides maximum
transmission speed of 1.544 Mbps. You can divide the connection into different
lines for data and voice communication or use the channel for one high speed
data du primary circuit. Dividing the connection is called multiplexing.
Increasingly, leased lines are being used by companies, and even individuals, for
Internet access because they afford faster data transfer rates and are cost-
effective if the Internet is used heavily.
Advantage
• Secure and private: dedicated exclusively to the customer
• Speed: symmetrical and direct
• Reliable: minimum down time
• Wide choice of speeds: bandwidth on demand, easily
• upgradeable
• Leased lines are suitable for in-house office web hosting
Disadvantages
• Leased lines can be expensive to install and rent.
• Not suitable for single or home workers
• Lead times can be as long as 65 working days
• Distance dependent to nearest POP
• Leased lines have traditionally been the more expensive
• It access option. A Service Level Agreement (SLA) confirms
Page 9
1.6.3 DSL Connection
Digital Subscriber Line (DSL) is a family of technologies that provides digital
data transmission over the wires of a local telephone network. DSL originally
stood for digital subscriber loop. In
telecommunications marketing,
the term DSL is widely understood
to mean Asymmetric Digital
Subscriber Line (ADSL), the most
commonly installed DSL
technology. DSL service is
delivered simultaneously with
wired telephone service on the
same telephone line. This is
possible because DSL uses higher frequency bands for data separated by filtering.
On the customer premises, a DSL filter on each outlet removes the high frequency
interference, to enable simultaneous use of the telephone and data. The data bit
rate of consumer DSL services typically ranges from 256 Kbit/s to 40 Mbit/s in the
direction to the customer(downstream), depending on DSL technology, line
conditions, and service-level implementation. In ADSL, the data throughput in the
upstream direction, (the direction to the service provider) is lower, hence the
designation of asymmetric service. In Symmetric Digital Subscriber Line (SDSL)
services, the downstream and upstream data rates are equal.
Advantages:
• Security: Unlike cable modems, each subscriber can be configured so that it will not be
on the same network. In some cable modem networks, other computers on the cable
modem network are left visibly vulnerable and are easily susceptible to break in as well
as data destruction.
• Integration: DSL will easily interface with ATM and WAN technology.
• High bandwidth
Page 10
• Cheap line charges from the phone company.
• Good for “bursty” traffic patterns Disadvantages
• No current standardization: A person moving from one area to
another might find that their DSL modem is just another paper
weight. Customers may have to buy new equipment to simply change
ISPs.
• Expensive: Most customers are not willing to spend more than
rupees 200to 250 per months for Internet access. Current installation
costs, including the modem, can be high.
• Distance Dependence: The farther you live from the DSLAM (DSL
Access Multiplexer), the lower the data rate. The longest run lengths
are 18,000 feet, or a little over 3 miles.
Advantages
Disadvantages
• Cable internet technology excels at maintaining signal strength over
distance. Once it is delivered to a region, however, such as a
neighborhood, it is split among that regions subscribers. While increased
capacity has diminished the effect somewhat, it is still possible that users
will see significantly lower speeds at peak times when more people are
using the shared connection.
• Bandwidth equals money, so cable’s advantage in throughput comes with
a price. Even in plans of similar speeds compared with DSL, customers
spend more per Mb with cable than they do with DSL.
• It’s hard to imagine, but there are still pockets of the United States
without adequate cable television service. There are far fewer such
pockets without residential land-line service meaning cable internet is on
balance less accessible in remote areas.
1.6.5 VSAT
It stands for very small aperture
terminal, an earthbound station used in
satellite communications of data, voice
and video signals, excluding broadcast
computer that acts as a hub for the system. Each end user is interconnected with
the hub station via the satellite, forming a star topology. The hub controls the
entire operation of the network. For one end user to communicate with another,
each transmission has to first go to the hub station that then retransmits it via the
satellite to the other end user’s VSAT.
Advantages
Satellite communication systems have some advantages that can be exploited for
the provision of connectivity. These are:
Disadvantages
• High start-up costs (hubs and basic elements must be in place before the
services can be provided)
• Higher than normal risk profiles
• Severe regulatory restrictions imposed by countries that prevent VSAT
networks and solutions from reaching critical mass and therefore
profitability
• Some service quality limitations such the high signal delays (latency)
Satellite: A satellite connection uses broadband but does not require cable or
phone lines; it connects to the Internet through satellites orbiting the Earth.
As a result, it can be used almost anywhere in the world, but the connection
may be affected by weather patterns. Satellite connections are also usually
slower than DSL or cable.
In addition to serving
individuals, ISPs also serve large companies, provid-ing a direct connection from
the company's networks to the Internet. ISPs themselves are connected to one
another through Network Access Points (NAPs).ISPs may also be called IAPs
(Internet Access Providers).
The World Wide Web, abbreviated as WWW or W3 and commonly known as the
Web, is a system of interlinked hypertext documents accessed via the Internet.
With a web browser, one can view web pages that may contain text, images,
videos, and other multimedia and navigate between them via hyperlinks.
Evolution of WWW
In March 1989, Tim Berners-Lee wrote a proposal that referenced ENQUIRE, a
database and software project he had built in 1980, and described a more
elaborate information management system.
On November 12, 1990, with help from Robert Cailliau, Tim BernersLee
published a more formal proposal to build a "Hypertext project" called
"Worldwide Web" (one word, also "W3") as a "web" of "hypertext
documents" to be viewed by "browsers" using client–server architecture.
This proposal estimated that a read-only web would be developed within
three months and that it would take six months to achieve "the creation of
new links and new material by readers, to achieve universal authorship" as
well as "the automatic notification of a reader when new material of interest
to him/her has become available."
A NeXT Computer was used by Berners-Lee as the world's first web server and
also to write the first web browser, Worldwide Web, in 1990.
Tools needed were a working Web the first web browser (which was a web
editor as well); the first web server; and the first web pages, which described
the project itself.
On August 6, 1991, Tim Berners-Lee posted a short summary of the World
Wide Web project on the .hypertext newsgroup.
This date also marked the debut of the Web as a publicly available service on
the Internet. The first photo on the web was uploaded by Berners-Lee in
1992, an image of the CERN house band Les Horribles Cernettes.
The first server outside Europe was set up at SLAC to host the SPIRESHEP
database in 91 – 92.
The concept of hypertext originated with older projects from the 1960s, such
as the Hypertext Editing System (HES) at Brown University by Ted Nelson and
Douglas Engelbart.
Tim Berners Lee introduced the concept of the Universal Document Identifier
(UDI), later known as Uniform Resource Locator (URL) and Uniform Resource
Identifier (URI); the publishing language Hypertext Markup Language (HTML);
and the Hypertext Transfer Protocol (HTTP).
In 1993, a graphical browser was developed by a team at the National Center
for Supercomputing Applications at the University of Illinois at Urbana-
Champaign (NCSA-UIUC), led by Marc Andreessen. This was the first web
browser ever.
favorite pastime for many Internet users. Just as in "1V channel surfing," where
one clicks the remote to go from channel to channel, the hyperlinks on Web
pages make it easy to go from one page to another.
A web search engine is designed to search for information on the World Wide
Web and FTP servers.
Google - www.google.com
Bing -www.bing.com
ASK -www.ask.com
Yahoo -www.yahoo.com
A browser is a software that lets you view web pages, graphics and the online
content. Browser software is specifically
designed to convert HTML and XML into
readable documents. The most popular
web browsers are: Google Chrome,
Firefox, Internet Explorer, Safari, Opera
and UC Browser.
Purpose:
Web browser is used to run the software application that allows retrieving,
presenting and traversing the information from one place to another.
◼ Web browser provides the resources using the WWW (World Wide Web)
this can be identified by URI (Uniform Resource Identifier).
◼ Web browser fetches the data like web page, image, video or other piece
of content from the server and displays it accordingly.
◼ Web browser uses hyperlinks to display the resources and allow the users
to navigate their browsers according to the resources.
◼ Web browser defines the application software that is designed for the
user to access and retrieve the documents using the Internet.
Internet Explorer (IE - created by Microsoft) is a very prominent web browser
for the Windows OS. IE is the most popular web browser. It comes pre-installed
on all Windows computers. The latest version of IE is IE7 with IE8 in beta. IE was
designed to view a broad range of web pages and to provide certain features
within the OS.
TOOLBARS
The Microsoft Internet Explorer toolbar consists of buttons that are shortcuts for
menu commands. They make browsing faster and easier.
1. Back. Let’s you return to pages you've viewed, beginning with the most
recent. Right click the Back button and select from a list of recently visited
sites.
2. Forward. Let’s you move forward through pages you've viewed using the
Back button. Right click the Forward button and select from a list of recently
visited sites.
3. Stop. Halts the process of downloading a Web page. Click this if you want to
stop downloading a page for any reason for example, if you're having trouble
A client – server relationship is many – to –one. Many clients can use the services
of one server.
1.13 Summary
“Inter” comes from the word “International”,.
“Net” refers to a computer network.
The Internet is a communication system that connects computers and
computer networks all over the world.
The Internet is a massive network of networks. It connects millions of
computers together globally, forming a network in which any computer can
communicate with any other computer as long as they are both connected to
the Internet.
IETF- Internet Engineering Task Force.
I RTF-Internet Research Task Force. IAB- Internet Architecture Board.
ISP - Internet Service Provider
The World Wide Web, abbreviated as WWW or W3 and commonly known as
the Web, is a system of interlinked hypertext documents accessed via the
Internet.
Leased line provides maximum transmission speed of 1.544 Mbps.
The most popular web browsers are: Google Chrome, Firefox, Internet
Explorer, Safari, Opera and UC Browser.
Search engine – a computer program that searches for specific words or
phrases on the web
Internet service provider (ISP) - a company that provides customers access
to the internet
A search engine works in the following order: Web crawling, Indexing, and
Searching.
A web server commonly known as HTTP server or application server is a
program that serves content using the HTTP protocol.
A browser is a software that lets you view web pages, graphics and the online
content.
b) Define www?
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
1.15 References
1. Computer Networks and Internets with Internet Applications (Third
Edition)
2. P.K. Sinha and P. Sinha,
3. Andrew S. Tanenbaum, “Computer Networks”, PHI Learning Pvt. Ltd
4. www.google.com
Learning objectives:-
At the end of this unit the students will be able to:
Define a Protocol.
Know the list of Protocols.
Understands the Internet Addresses.
Know the IP address of the System.
Understand the Domain Name System.
Understand the URL.
Know the working of VoIP.
Know the IPV4& IPV6 Addresses.
STRUCTURE
2.1 Introduction
2.2 Types of Internet protocol
2.2.1 TCP / IP
2.2.2 FTP
2.2.3 HTTP
2.2.4 PPP
2.2.5 TELNET
2.2.6 UDP
2.2.7 NNTP
2.3 E-Mail Protocols
2.3.1 SMTP
2.3.2 POP3
2.4 IP Address
2.5 Domain Name System
2.6 URL
2.1 Introduction
When we have to communicate with anyone, then we need to follow the same
language, so that communication can be done in an effective manner. In the same
way, whenever there is need to exchange data or information among different or
same type of networks on internet, they need to follow same set of rules.
The Internet is based on many layers of information, where each layer is
dedicated to a different kind of documentation. These different layers are called
Protocols. A protocol is a set of rules that governs the communication between
computers on a network. They exist at several levels in a telecommunication
connection.
The most popular protocols used on internet are the World Wide Web, FTP,
Telnet, Gopher space, instant messaging, and email.
2.2.1 TCP/IP
TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic pointto-
point meaning each communication is from one point (or host computer) in the
network to another point or host computer communication protocol on the
Internet. It is used as a communication protocol in all types of networks. When
you are connected to the Internet, your computer provides you a copy of the
TCP/IP program when you need to send messages to or get information from the
other computer. TCP/IP is a two layer protocol. The top layer, TCP(Transmission
Control Protocol) manages the assembling of a message or file divided into
smaller packets that are transmitted over the Internet and received by a TCP that
reassembles the packets into the original message on the destination computer.
The lower layer, Internet Layer, handles the address part of each packet so that it
gets to the right destination. Each gateway computer on the network checks for
the address to forward the message. Some packets from the same message are
routed differently than others, but they are reassembled at the destination.
2.2.2 HTTP:
To transfer files with FTP, use a program often called the client. An FTP client
program initiates a connection to a remote computer running FTP server
software. After the connection is established, the client can choose to send
and/or receive files. To connect to an FTP server, a client requires a username and
password as set on the server. Many FTP servers use a username as
“anonymous”. Using FTP, you can also update (delete, rename, move, and copy)
files at a server. You need to logon to an FTP server. However, publicly available
files are easily accessed using anonymous FTP.
FTP using TCP/IP, works in the same way as HTTP used for transferring Web pages
from a server to a user’s browser. FTP sites are heavily used and require several
attempts before connecting.
To use your web browser to connect to an FTP site, where you normally enter a
URL as: ftp://[email protected] name/
2.2.5 TELNET
Telnet is the main internet protocol for creating a connection with a remote
machine. It allows you to connect to remote computers (called remote hosts)
over a TCP/IP network (such as the Internet). Once your telnet client establishes a
connection to the remote host, your client becomes a virtual terminal, allowing
you to communicate with the remote host from your computer with whatever
privileges you may have been granted to the specific application and data on that
host computer.
Telnet clients are available for all major operating systems viz. Mac OS X,
Windows, UNIX, and Linux. To use these clients, go to their respective command
lines and then enter: telnet host where host is the name of the remote computer
to which you wish to connect. In most cases, you'll need to have an account on
that system but canals log in as guest or public without having an account.
Telnet is most likely to be used by program developers and anyone who has a
need to use specific applications or data located at a particular host computer. It
gives the user the opportunity to be on one computer system and do work on
another, which may be anywhere across the globe. Telnet provides an error free
connection which is always faster than the latest conventional modems.
2.2.6 UDP
2.2.7 NNTP
Network News Transfer Protocol is used to manage the notes posted
on unset newsgroup (a collection of posted notes on a subject posted
by different users). NNTP servers are responsible for managing
Usenet newsgroup collected globally. A NTTP client is a part of the
web browser also called as a news reader. It uses a reserve port no
119.
SMTP stands for Simple Mail Transfer Protocol that allows transmission of email
over the Internet. Most email software is designed to use SMTP for
communication purposes when sending email. It only works for outgoing
messages. So when an email has to be sent, the address of their Internet Service
Provider's SMTP server has to be given. The actual mail transfer is done through
Message Transfer Agents (MTA). So the client computer must have a client MTA
and the server must have a server MTA. SMTP actually defines the MTA client and
the server on the internet.
SMTP is a reliable and easy to set up protocol. Messages either get to a recipient,
or there is an error message that explains why that wasn't possible. One of the
purposes of an SMTP is that it simplifies the communication of email messages
between servers. It allows the server to break up different parts of a message into
categories the other server can understand. Any email message has a sender, a
recipient or sometimes multiple recipients - a message body, and usually a title
heading. Once a message goes out on the internet, everything is turned into
strings of text. This text is separated by code words or numbers that identify the
purpose of each section of an email. SMTP provides those codes, and email server
software is designed to interpret these codes.
SMTP has a major disadvantage that it is relatively easy to send a message with a
fake sender address. This results in spread of many email-based viruses. Someone
may receive a message that they think is coming from a friend, when someone
else is actually sending it. Although attempts are being made to overcome this
disadvantage but it still causes some problems.
Most servers these days actually us a slightly updated version of the SMTP
protocol called ESMTP (Extended Simple Mail Transfer Protocol). This was created
to allow transmission of multimedia through email. When someone sends a
picture or music file through their email program, ESMTP communication codes
are used to identify the kind of data being transferred.
POP3 makes it easy for anyone to check their email if their email program is
configured properly to work with the protocol. It is extremely common among
most mail servers because of its simplicity and high success rate and minimum
errors. Also it can work with virtually any email program, as long as the email
program is configured to host the protocol. Many popular email programs,
including Microsoft Outlook, are automatically designed to work with POP3. Each
POP3 mail server has a different address, which is usually provided to an
individual by their web hosting company. This address must be entered into the
email program so that the program can connect effectively with the protocol. The
individuals receiving POP3 email will have to input their username and password
in order to successfully receive email.
2.4 IP Addresses
All networks follow some agreed upon set of rules for communication. For
example, when you speak to one another, you follow one rule which is "when one
person is speaking, the other would listen". Similarly, computers on a network
also follow some set of rules for communicating with one another. These set of
rules are called protocols. There are many networking protocols. One of the most
common networking protocols TCP/TP protocol. Today's most commonly known
network, the Internet, also follows this protocol. A network that follows TCP/TP
protocol can also be termed as TCP/IP network.
1. www
2. name describing the website purpose
3. TLD (Top level domain) such as .com, .net, .org, .edu, .in, .ca etc.
Example:
1.www.google.com
2.www.cbse.nic.in
3.www.dce.edu
4.www.yahoo.co.in
Domains are classified as non-geographic and geographic figure 3 lists various
common domain names. The domain names in India come under a larger
domain "in".
Non-Geographic domains
2.6 URL
The standard way to give the address of any resource on the Internet
that is part of the World Wide Web (WWW). A URL looks like this:
http://www.matisse.net/seminars.html
telnet://well.sf.ca.us
gopher://gopher.ed.gov/
Here's an example:
http://www.vrml.k12.la.us/tltc/mainmenu.htm
▪ http is the protocol
▪ www.vrml.k12.la.us is the server
▪ tltc/ is the path
▪ mainmenu.htm is the filename of the page on the site
1. You do not have to enter http://, most browsers will add that
information when you press Enter or click
the button at the end of the Address Bar.
2. To view recently visited Web sites, click the down arrow at the end of
the address field.
3. When you start typing a frequently used Web address in the Address
bar, a list of similar addresses appears that you can choose from. And
if a Webpage address is wrong, Internet Explorer can search for
similar addresses to try to find a match.
4. The URL must be typed correctly. If you get a “Server Does Not Have A
DNS Entry” message, this message tells you that your browser can't
locate the server (i.e. the computer that hosts the Web page). It could
mean that the network is busy or that the server has been removed
or taken down for maintenance. Check your spelling and try again
later.
IPv4 Addresses
In IPv4 an address consists of 32 bits which limits the address space to
4294967296 (232) possible unique addresses. IPv4 reserves some addresses for
◼ Class A: It uses first octet for network addresses and last three octets for
host addressing.
◼ Class B: It uses first two octets for network addresses and last two for
host addressing.
◼ Class C: It uses first three octets for network addresses and last one for
host addressing.
◼ Class D: It provides flat IP addressing scheme in contrast to hierarchical
structure for above three.
◼ Class E: It is used as experimental.
IPv4 also has well-defined address spaces to be used as private addresses (not
routable on internet), and public addresses (provided by ISPs and are routable on
internet).
IPv6 Addresses
The rapid exhaustion of IPv4 address space prompted the Internet Engineering
Task Force (IETF) to explore new technologies to expand the addressing capability
in the Internet. The permanent solution was deemed to be a redesign of the
Internet Protocol itself. This new generation of the Internet Protocol was
eventually named Internet Protocol Version 6 (IPv6) in 1995. The address size was
increased from 32 to 128 bits (16 octets), thus providing up to 2128
(approximately 3.403×1038) addresses. This is deemed sufficient for the
foreseeable future.
individual allocation is a subnet for 264 hosts, which is the square of the size of
the entire IPv4 Internet. At these levels, actual address utilization rates will be
small on any IPv6 network segment. The new design also provides the
opportunity to separate the addressing infrastructure of a network segment, i.e.
the local administration of the segment's available space, from the addressing
prefix used to route traffic to and from external networks. IPv6 has facilities that
automatically change the routing prefix of entire networks, should the global
connectivity or the routing policy change, without requiring internal redesign or
manual renumbering. The large number of IPv6 addresses allows large blocks to
be assigned for specific purposes and, where appropriate, to be aggregated for
efficient routing. With a large address space, there is no need to have complex
address conservation methods as used in CIDR.
All modern desktop and enterprise server operating systems include native
support for the IPv6 protocol, but it is not yet widely deployed in other devices,
such as residential networking routers, voice over IP (VoIP) and multimedia
equipment, and network peripherals.
2.8 VoIP
VOIP stands for voice over internet protocol. It enables the transfer of voice
using packet switched network rather than using public switched telephone
network. By using VOIP software, phone calls can be done using standard internet
connection. This method of making phone calls is much cheaper than
convectional way because the service of Telecommunication Company is not
used. There are three different methods of VoIP service in common use today:
2.9 Summary
▪ Protocol: A special set of rules that two or more machines on a network
follow to communicate with each other.
▪ Transmission Control Protocol (TCP): It breaks the data into packets
that the network can handle efficiently.
▪ Internet protocol (IP): It gives distinct address (called IP address) to each
data packet.
▪ File Transfer Protocol (FTP): It is used for transferring files from one
system to another on the internet.
▪ Hypertext Transfer Protocol (HTTP): It is the protocol that is used for
transferring hyper text files on the World Wide Web.
▪ Point-to-Point Protocol (PPP): It is used for communication between two
computers using a serial interface.
▪ Simple Mail Transfer Protocol (SMTP): It allows transmission of email
over the Internet.
▪ Post Office Protocol 3(POP3): It receives and holds email for an
individual until they pick it up.
▪ Telnet: A protocol for creating a connection with a remote machine.
▪ VOIP: VOIP stands for voice over internet protocol. It enables the
transfer of voice using packet switched network rather than using public
switched telephone network.
SMTP : ________________________________________
VoIP : ________________________________________
HTTP : ________________________________________
POP : ________________________________________
____________________________________________________
____________________________________________________
____________________________________________________
____________________________________________________
____________________________________________________
____________________________________________________
b) HTTP
____________________________________________________
____________________________________________________
____________________________________________________
____________________________________________________
____________________________________________________
____________________________________________________
____________________________________________________
____________________________________________________
____________________________________________________
____________________________________________________
____________________________________________________
____________________________________________________
c) SMTP
____________________________________________________
____________________________________________________
____________________________________________________
____________________________________________________
____________________________________________________
____________________________________________________
____________________________________________________
____________________________________________________
d) FTP
____________________________________________________
____________________________________________________
____________________________________________________
____________________________________________________
____________________________________________________
____________________________________________________
____________________________________________________
____________________________________________________
____________________________________________________
e) TELNET
_____________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________
3. What is VOIP?
_____________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________
4. What is IP V4& IPV6?
_____________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________
5. What is URL?
_____________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________
6. What is IPV4?
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
7. What is Protocol?
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
8. What is NNTP?
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
2.11 References
Learning objectives:-
At the end of this unit the students will be able to:
STRUCTURE
3.1 Introduction
3.2 Webpage
3.3 website
3.6 Videoconferencing
3.10 E-Reservation
3.13 Summary
3.15 References
3.1 Introduction
Everyone is using internet irrespective of their background & interest. The types
of services available on net are as diverse as the interest of the people .Internet
application or Web Services mean the services provided by World Wide Web. The
World Wide Web provides services like chatting, emailing, video conferencing, e-
learning, e-shopping, e-reservation, e-groups and social networking. These
services may mean different things to different people but in simple words, they
are the ways to communicate and here the communication takes place between
two electronic devices.
When two persons are talking to each other, we say they are chatting. Likewise
when two computers (or two electronic devices) exchange data and information,
we say two computers are e-chatting. They communicate with each other with
the help of technology and programming standards used on Internet. Let us
discuss the services provided by World Wide Web in detail in the following
sections.
3.2 Webpage
A Web page also known as Electronic Page is a part of the World Wide Web. It is
just like a page in a book. The basic unit of every Web site or document on the
Web is a Web page containing the information. A Web page can contain an
article, or a single paragraph, photographs, and it is usually a combination of text
and graphics.
3.3 Website
The collection of web pages on the World Wide Web that is accessed by its own
Internet address is called a Web site. Thus, a Web site is a collection of related
Web pages. Each Web site contains a home page and contains other additional
pages. Each Web site is owned and updated by an individual, company, or an
organization. Web is a dynamically moving and changing entity; today web sites
generally change on a daily or even hourly basis.
Web portal is a medium by which users access the resources, while a website is a
destination in itself. Portals and websites are distinct entities which are linked
together, but they should not replace each other. A website is also a portal, if it
broadcast information from different independent resources whereas Web Portal
refers to a website or services that provide varied resources and services such as
email, forums, search engines and online shopping malls. Some of the web portals
are AOL, iGoogle, Yahoo and even more.
Step 1: Hosting
The first step in constructing a website is to decide about the web hosting
provider for your site. There are several types of Web hosting options you
can choose from such as:
Free Web hosts: Most people want to go for free Web hosting. On one
hand it is free but on the other hand, you don’t always get much space,
due to low bandwidth.
Search a Web Hosting Provider: These are the links to other sites for
finding a good host for your site.
1. Static Websites
Static websites are also known as flat or stationary websites. They are
loaded on the client’s browser as exactly they are stored on the web
server. Such websites contain only static information. User can only read
the information but can’t do any modification or interact with the
information.
Static websites are created using only HTML. Static websites are only used
when the information is no more required to be modified.
2. Dynamic Websites
Dynamic websites shows different information at different point of time.
It is possible to change a portion of a web page without loading the entire
web page. It has been made possible using Ajax technology.
Wire frame
Wireframe refers to a visual guide to appearance of web pages. It helps to define structure of web
site, linking between web pages and layout of visual elements.
1. Photoshop CC
This is a great web designing tool provided by Adobe. The latest Photoshop
CC 2014 supports many new features such as smart objects, layer comps,
smart guides, Type kit integration, font search, and workflow
enhancements.
2. Illustrator CC
Illustrator CC is also a web designing tool comes with powerful features like
AutoCAD libraries, white overprint, fill and stroke proxy swap for text,
automatic corner generation, unnamed images and touch type tools etc.
3. Sublime Text
Sublime Text is a source code editor with Python application programming
interface. It's functionality can be extended using plugin.
4. Image optim
It is basically used for optimizing images on a website in order to load them
faster by finding best compression parameters and by removing
unnecessary comments.
5. Sketch 3
Sketch 3 is a web desiging tool developed specifically for designing
interfaces, websites, icons etc.
6. Heroku
It is also a great web development tool which supports Ruby, Node.js,
Python, java and PHP.
7. Axure
It supports prototyping, documentation, and wire framing tools for making
interactive website design.
8. Hype 2
The Hype 2 offers: Easiest way to Animate & add interactivity, Hardness the
power of HTML5, Mobile responsiveness, and WYSIWYG features.
9. Image Alpha
This tool helps to reduce file sizes of 24-bit PNG files. It does so by applying
lossy compression and convert it to PNG8+alpha format which more
efficient.
10. Hammer
This tool is suitable for non-programmers and good only for small projects.
1. Containing Block
Container can be in the form of page’s body tag, an all containing div tag. Without container
there would be no place to put the contents of a web page.
2. Logo
Logo refers to the identity of a website and is used across a company’s various forms of
marketing such as business cards, letterhead, broachers and so on.
3. Navigation
The site’s navigation system should be easy to find and use. Often the navigation is placed right
at the top of the page.
4. Content
The content on a web site should be relevant to the purpose of the web site.
5. Footer
Footer is located at the bottom of the page. It usually contains copyright, contract and legal
information as well as few links to the main sections of the site.
6. Whitespace
It is also called as negative space and refers to any area of page that is not covered by type or
illustrations.
Before developing a web site once should keep several aspects in mind like:
What to put on the web site?
Who will host it?
How to make it interactive?
How to code it?
How to create search engine friendly web site?
How to secure the source code frequently?
Will the web site design display well in different browsers?
Will the navigation menus be easy to use?
Will the web site loads quickly?
How easily will the site pages print?
How easily will visitors find important details specific to the web site?
How effectively the style sheets be used on your web sites?
These tools allow the web developer to use HTML, CSS and JavaScript etc.. These are
accessed by hovering over an item on a web page and selecting the “Inspect Element” from
the context menu.
Features
Following are the common features that every web development tool exhibits:
INFORMATION
Web development tools also help to inspect the resources that are loaded and available on
the web page.
Skill Required
For being a successful web developer, one should possess the following skills:
▪ uploading files
▪ updating web pages
▪ posting blogs
Website is published by uploading files on the remote server which is provided by the hosting
company.
2. Internet Connection
Internet connection is required to connect to a remotely located web server.
3. Web Server
Web server is the actual location where your website resides on. A web server may host
single or multiple sites depending on what hosting service you have paid for.
A domain name is the part of your Internet address that comes after "www". For example, in
www.google.com the domain name is google.com. A domain name becomes your Business Address
so care should be taken to select a domain name. Your domain name should be easy to remember
and easy to type.
Domain Extensions
The final letter at end of internet address is known as top level domain names. They are called top
level because they are read from right to left, and the part after the dot is the highest in a hierarchy.
Domain Meaning
.com Commercial Business
.edu Education
.gov U.S. government agency
.int International Entity
.mil U.S. military
.net Networking organization
.org Non-profit organization
Registering a Domain Name is very simple. You can take following step to get your desired domain
name registered:
▪ Think of a name that justifies your business need. To find out the available names you
can enter a name at commercial domain name registrar such as GoDaddy.
▪ If the domain name entered by you is available, then select that particular domain
name.
▪ Now it will ask you for other additional services such as Email inbox, hosting etc. that
host also provides. You may choose what’s best for you.
▪ Now they will ask you for your personal information which is stored in WHOIS database.
▪ It will then ask for payment information. Pay for the purchase you have made. Make
sure you enter the correct payment information.
▪ Once you are done with all above steps, you are ready to use their tools to upload your
stuff to your site.
Web hosting is a service of providing online space for storage of web pages. These web
pages are made available via World Wide Web. The companies which offer website hosting
are known as Web hosts. The servers on which web site is hosted remain switched on 24
x7. These servers are run by web hosting companies. Each server has its own IP address.
Since IP addresses are difficult to remember therefore, webmaster points their domain
name to the IP address of the server their website is stored on.
It is not possible to host your website on your local computer, to do so you would have to
leave your computer on 24 hours a day. This is not practical and cheaper as well. This is
where web hosting companies comes in.
Types of Hosting
The following table describes different types of hosting that can be availed as per the need:
3.4 E-Mail
E-mail or Email is simply the short form of “electronic mail”. It is a system of receiving, sending, and
storing electronic messages. An electronic
from any age group and from any background can use it and the
delivery of the message is instant. The speed is much higher than the speed of the traditional postal
or the courier service.
Email uses multiple protocols within the TCP/IP (Transmission Control Protocol / Internet Protocol)
suite. For example, SMTP (simple mail transmission protocol) is used to send messages, while the
POP or IMAP (Internet Message Access Protocol) protocols are used to retrieve messages from a
mail server. When we configure an email account, we must define our email address, password, and
the mail servers used to send and receive messages. Fortunately, most webmail services configure
our account automatically, so we only need to enter our email address and password. Some of the
free e-mail services are Gmail (Google Mail), Yahoo mail, Rediff mail, Hotmail etc.
1. Cost effective –The message sent through e-mail cost very low. It is very cheaper than
courier or fax or telegram.
2. High Speed- Email can be sent very fast and almost instantaneously.
3. Easy to use- It is very easy to use e-mail to send a message through internet.
4. Time saving- we can sent the same message to a number of person at a time. So, we can
save a lot of time.
5. Message storing: we can store the send and received message in our mail box.
6. Address book: we can store a number of e-mail address and contact details in address
book.
7. Wait for you: The mail is lies in mail box, until the user login mail ID.so the e-mail waits for
you.
8. Security: Your email is delivered to your own personal and private account with a password
required to access and view emails.
9. Accessible anywhere at any time: You don’t have to be at home to get your mail. You can
access it from any computer or mobile device that has an Internet connection.
Sending and receiving emails require an e-mail address. An email address is divide into two parts
namely, the user name & name of the mail server. The two parts are separated by the symbol “@”.
The structure of an Emil address is given here [email protected]
e.g. [email protected]
Here
dcp3380 username
1. LOG-IN: To send or receive e-mail, we have to first log onto our e-mail account by visiting
its web site and typing the user name and password.
2. LOG-OUT / SIGNOUT: Click this option, once you have finished reading or sending the e-
mails. This option brings you out from your e-mail account.
3. IN-BOX: It displays information about all the mails that we receive in our e-mail account.
To read any mail click on it. The mail will be displayed in the new window.
4. COMPOSE / WRITE MAIL: To write mail to any one, we have to click on this option (or
any other similar option). It will open a new window wherein we type the e-mail address of
the person, subject of the mail and the text in the mail.
5. SEND AN E-MAIL: After composing an e-mail, click the Send button. We can send the
same mail to many persons by typing their e-mail address separated by commas (,).
6. REPLY: This option is displayed when we open any mail. It is used to send replay to the
received e-mail. We can simply type in our reply and click on the send button.
An email client can be Outlook Express, Hotmail or Gmail. The email client may typically consist of
four important fields. They are To:; Cc:; Bcc: and Subject:
To: This field is used to write the email address of the person to
whom the message is to be sent.
Cc: This field is optional and is used to send a message to multiple
additional addresses.
Bcc: This field is also optional and is used to send a message to
multiple additional addresses. The difference between Cc and
Bcc: field is decided in terms of visibility. The address in Bcc:
field is termed as blind carbon copy, the addresses mentioned
in this field are not visible to the recipients of
the “To:” and the “Cc:” fields.
Subject: This field is used to mention short title for what is included in the body of the
message.
within seconds. The message can include text, images and numerous types of formatted documents.
These days, it is no longer necessary to be sitting in front of a PC to send or receive an email. A
variety of mobile devices, such as tablet computers and smart phones make it possible to send the
message via E-mail. The following diagram displays how an e-mail moves from the sender to the
receiver.
3.5 CHAT and IRC
messages (or “chat site”) and a group of users who take part from
anywhere on the Internet.
The group chats can be ongoing or scheduled for a particular time and duration. Most chats are
focused on a particular topic of interest and some involve guest experts or famous people who
“talk” to anyone joining the chat. Alternatively two users can chat when they are using the Internet
and the platform at the same time.
Several browser interfaces provide the chat facility these days such as Instant messaging, Windows,
Skype and ICQ. With the invent of 3G technology not only text data but video data can also be
streamlined at the same time
CHATTING
A real time informal communication over the Internet is chatting. A chat program is software which
is required for chatting over the internet. AOL Instant Messenger, Campfire, Internet Messenger,
MSN Messenger are some commonly used chat programs. In order to chat, the user should have an
account on a chatting program. A phone call is a voice based chat while online chat is textual
conversation.
IRC protocol is used for chatting. It provides chatting between groups or between two individuals. It
was developed by Jarkko Oikarinen in Finland in the late 1980s. It is based on client/server model.
The IRC client sends and receives messages to and from an IRC server. The IRC server transports the
message from one client to another. The IRC server is linked to many other servers to form an IRC
network. IRC server identifies every user through a unique nickname. Each user is assigned a unique
channel in case multiple discussions are taking place.
3.6 Videoconferencing
The video conferencing is a conference between two or more people sitting at various remote
locations around the world. They can talk to each other when they are connected to each other
using Internet. Thus, they are able to transmit both the video and audio data.
In video conferencing, several computer networks relay the information through the Internet. Each
of the end user has a camera known as Webcam as well microphone to capture the video data and
the voice data in real time
and this is
transmitted
over Internet.
The participants
can view each
other over their
monitors as
well as hear the
voice data over
speakers of
their laptop or desktop computers. These days equipment such as smart phones and tablets has the
capability of capturing the video data as well voice data. Therefore, it is possible to conduct video
conferencing from any part of the world not necessarily connected to Internet through wires.
Multipoint videoconferencing allows three or more participants to sit in virtual conference room
and communicate, as though they are all sitting together. With the rapidly changing cost of the
hardware and accessibility of
Internet across the world, video conferencing is changing the way people conduct meetings. The
business class all around the world consider video conferencing as a rapid tool to reduce the need
for personal meetings and hence the need for all participants to get together at one location. The
high speed of Internet connectivity not only allows the video and audio data but participants can
open, review, share and discuss the documents.
On the television, we see a number of times that the program host is conducting the interview
among several participants sitting in different cities or countries. This is done with the technology
used in video conferencing. The participants are not only able to hear each other but can see and
talk to each other live. The entire proceedings of the interview such as the data transmission
between or among participants across the world can be seen clearly by the viewers of the television.
3. 7 Net Banking
A system of banking in which customers can view their account details, pay bills, and transfer money
by means of the Internet is known as net banking. Internet banking, sometimes called online
banking. Internet banking uses the Internet to conduct banking activity, for example, transferring
funds,
paying bills, viewing checking and savings account balances etc. Internet banks are also known as
virtual, cyber, net, interactive, or web banks. Following figure shows the login for SBI Account
Holder.
The good thing is that purchasing things online is very easy. The advantage for online shopping is we
can start at home and the item comes to. Do we have plenty of time to go to the store and look up
and down for the item like? Most people say NO, time is precious. So on line shopping is considered
as a time saving activity.
3. 9 E-Learning
3. 10 E-Reservation
E-Reservation System is an online reservation system that enables hotels, resorts, property owners,
operators, theater operators and transport companies to maximize revenues without having to put
human booking agents.
This system works with the Web and the Internet helps provide an access to a user/ customer to
book a ticket, room etc. without ever having to go to the booking office. Since such systems are
internally integrated with the database of the companies, the booking system helps to monitor
access to the client as long as there is availability of the seats/ rooms etc. The diagram below shows
the process of e-reservation in case of a hotel room booking.
Advantages:
3. 11 Mobile Technology
Mobile technology is exactly what the name implies - technology that is portable. Mobile technology
is rapidly changing the face of communication
in the most remote areas of the world. Today, out of
the seven billion people in the world, approximately
six billion are cell phone subscribers. In response,
companies, governments, and NGOS alike have realized
the potential of this tool in addressing today's most
pressing global challenges. Here are some important uses
of Mobile Technology.
1. Education
2. Surveys and Polling
3. Banking
4. Data Analysis
3.12 Social Network
Social Networking is a platform that helps people to connect with others and build a social relation.
The last 15 years has seen a splurge of social networking sites where people can search / choose to
make friends, post pictures and photos, comment on each other’s activities. Social networking has
opened the doors where people can connect and share their lives and the activities by them without
being close geographically. People can connect from anywhere in the world with the internet
connection. They can become the member of one or other available social networking site.
Social networking site allows a user to share ideas, activities, events, and interests among the
people. The individuals can also have the control of the content they share and the person with
whom they are or want to communicate with.
An individual can share text information, photos, data files or even videos. Many people now a day
use social networking sites to market their business and thus reach the potential customer. Using an
account of these sites they can showcase their product and services that the people interested can
follow and review.
3.13 Summary
Web site is a collection of one or more web pages grouped under the same domain name.
E-mail or Email is simply the short form of “electronic mail”. It is a system of receiving,
sending, and storing electronic messages.
E-mail allows us to send and receive messages to and from anyone with an email address,
anywhere in the world.
Net banking: A system of banking in which customers can view their account de-tails, pay
bills, and transfer money by means of the Internet is known as net banking.
The word chat as it literally means in English is communication between two or more
people. The electronic chat is the communication between two or more individuals using
their computers
Video conferencing, several computer networks relay the information through the Internet.
Each of the end user has a camera known as Webcam as well microphone to capture the
video data and the voice data in real time.
The E-Learning is a method of providing guidance and/or delivering information to
students of university or the employees of companies
E-Reservation System is an online reservation system that enables hotels, resorts, property
owners, operators, theater operators and transport companies to maximize revenues
without having to put human booking agents.
Social Networking is a platform that helps people to connect with others and build a social
relation.
Social networking site allows a user to share ideas, activities, events, and interests among
the people.
_______________________________________________________
_______________________________________________________
_______________________________________________________
2. Write the difference between Webpage and Website.
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_____________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_____________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_____________________________________________________
6. What is e-mail?
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_____________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_____________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_____________________________________________________
3.15 Reference
Learning objectives:-
At the end of this unit the students will be able to learn:
Internet security
E-mail security
How to safe your password How to secure personal data
How to secure one’s Smartphone.
STRUCTURE
4.1 Introduction
4.2 Understanding basic internet security
4.3 Secure your computer
4.4 Keeping passwords safe
4.5 Encrypting passwords with a password manager
4.6 Protecting your internet passwords
4.7 Introduction to e-mail safety
4.8 Introduction to securing personal data
4.9 Introduction to mobile phone security
4.10 Summary
4.11 Check your Progress
4.12 References
4.1 Introduction
Cyberspace (internet, work environment, intranet) is becoming a dangerous place for all
organizations and individuals to protect their sensitive data or reputation. This is because of the
numerous people and machines accessing it. It is important to mention that the recent studies have
shown a big danger is coming from internal threats or from disappointed employees like the Edward
Snowden case, another internal threat is that information material can be easy accessible over the
intranet.
One important indicator is the IT skills of a person that wants to hack or to breach your security has
decreased but the success rate of it has increased, this is because of three main factors −
➢ Hacking tools that can be found very easily by everyone and they are endless.
➢ Technology with the end-users has increased rapidly within these years, like internet
bandwidth and computer processing speeds.
➢ Access to hacking information manuals
Now let’s go directly to the point of what all to secure in a computer environment −
• First of all, is to check the physical security by setting control systems like motion alarms,
door accessing systems, humidity sensors, and temperature sensors. All these components
decrease the possibility of a computer to be stolen or damaged by humans and environment
itself.
• People having access to computer systems should have their own user id with password
protection.
• Monitors should be screen saver protected to hide the information from being displayed
when the user is away or inactive.
• Secure your network especially wireless, passwords should be used.
• Internet equipment as routers to be protected with password.
• Data that you use to store information which can be financial, or non-financial by
encryption.
• Information should be protected in all types of its representation in transmission by
encrypting it.
To understand basic internet security we should have a basic understanding of how the Internet is
organized and which path our information travels. With this knowledge we can easily assess which
measures we can take to protect ourselves.
If you want to communicate with a friend you can send her/his a letter and post it to the nearest
mailbox; it then travels through an extensive network to (hopefully) reach the person the
information is intended for. Internet is just like that, however, the message is sent in an open
envelope and every postman on the way can read the message, alter its content and/or the
destination without you knowing.
To counter this, people have long used secret languages to communicate safely. In this section we
will explain two methods of encryption. The first method explains an end-to-end encryption,
encrypting the whole way from sender to receiver. The second method partly encrypts the route.
1. END-TO-END ENCRYPTION
If you encrypt your message and only the recipient can read it, it will be meaningless to all
the postmen in between, and if they alter it you will notice it directly. In order to make such
an encryption work, you still have to be sure to trust the recipient and be sure that you are
really exchanging information with her and not with someone pretending to be her. This
method is called end-to-end encryption and is the safest way of communication. You also
have to be sure that no one is watching over your shoulder while you write your message.
Some of the end-to-end encryption methods that we cover in this book are HTTPS for
browsing and PGP for e-mailing.
Unfortunately for end-to-end encryption to work, both you and your friend (source, co-
worker) need to have the tools to use it and have to agree on the secret language used. On
the internet this means the website you are visiting or the people you are e-mailing. This
not always the case, still, we can considerably increase our online safety by encrypting a
part of the route.
In this scenario you have to trust your local post office, all the postmen after that and of
course your friend.
Installing new updates on a new computer is very important. A new computer you buy in the
shop can be there for some months already. This means the computer is often behind with the
security updates. So when buying a new computer, please take some time to update your
Operating System.
Use good passwords: no password selection system can guard against being threatened with
violence, but you can improve your security by making it harder to guess. Use combinations of
letters, punctuation, and numbers. Combine lower and upper case letters. Do not use birth
dates, telephone numbers, or words that can be guessed by going through public information
about you. More information about this can be found in the chapter on passwords.
Modern operating systems separate normal tasks from administrative tasks like installing
software. This division is very important, as administrative tasks need extra privileges and have
total access to your hardware and software. Be sure to create a normal user account for day to
day usage and never use the administrative account for this.
Last but not least: Never store your password on a post-it on your computer or underneath your
keyboard.
3. PHYSICAL PROTECTION
A lot of people do not realize the information on your computer can be very valuable for others.
If you are working in an unknown/uncontrolled environment or area, always keep a good look
on your belongings and never leave them unattended. Take some time to think over what the
risks are if the data on your computers fall in the wrong hands. Ask yourself, "which information
is actually stored on my computer and what can other people do with this information?". Please
realize, a password on your computer will maybe protect against quick access, but it doesn't
protect your data once the whole system is lost. With physical access to a computer it's very
simple to access the data on your hard disk (with the use of another computer) without
knowing even the first character of your password. If the information on your laptop is very
valuable, have special attention to the section about securing personal data. The above is also
true when you lend your equipment to someone else. Although you might completely trust the
person you lend to, you don't have control on how secure they may handle your equipment.
4. SMOKING A CIGARETTE
It is very well possible you are working in a cafe or other (semi) public place on your laptop.
Maybe you have opened some password protected websites (webmail) and maybe even have
opened some encrypted files or emails. Once you go out for a quick break and a cigarette,
please be sure at least your screen is locked. All mainstream operating systems can be used to
lock your screen automatically if you close your lid or after a few minutes of inactivity. Be sure
to enable these options, failing to do so will certainly at least sometimes result in good
opportunity for attackers to access your private data. Unfortunately this habit is still not very
common with users but very important.
malware can gain access to your system, make changes and hide themselves. They could be sent
to you in an e-mail, be on a Web page you visit, or be part of a file that does not appear to be
suspicious. Antivirus software providers constantly research emerging threats and add them to
lists of things that your computer will block. In order to allow the software to recognize new
threats, you must install updates as they are released. Be aware of scareware. Scareware is
software which advertises itself as anti-virus software, but is in fact a virus or spyware itself. If
you install (free or commercial) anti-virus software, please be sure it's not scareware. A quick
search of the name of the vendor/product in combination of the term "scareware" on Google
will be enough to find out if you've just downloaded scareware. Scareware can be often found
in "advertisements" on dodgy websites with warnings about "found viruses"
Use Free and Open Source Software (FOSS). Open source software is made available both as a
working product and as a work in progress to users and software engineers. This offers several
security advantages over closed source, for-profit software that may only be available in your
country through illegal channels due to export restrictions or expense. You may not be able to
download official updates for pirated software and often pirated versions already include
viruses. With Open Source software there is no need to search through several suspicious sites
for a copy free of spyware and security glitches. Any legitimate copy will be free and is available
from the creators. If security flaws emerge, they can be spotted by volunteers or interested
users. A community of software engineers will then work on a solution, often very quickly.
Another problem that has occurred in some countries with regards to illegally installed closed
source software is that equipment of NGOs or journalists were confiscated by the government
based on copyright regulations as a measure to gain access to the information that was on the
devices.
8. BE UPDATED
Keep yourself updated on the latest security threats: the effort put into harming you may
change. Methods to protect yourself that works today may stop working or even become a
threat themselves tomorrow. Even if you don't need it now, know where to find information
and use different sources of information.
Passwords are for the computer world basically what keys are in the physical world. If you lose a
password you will not be able to get in, and if others copy or steal it they can use it to enter. As a
minimum measure a good password should not be easy to guess by people and not easy to crack by
computers, while still easy enough for you to remember.
PASSWORD LENGTH AND COMPLEXITY
To protect your passwords from being guessed, length and complexity are the key factors.
Passwords like the name of your pet or a birth date are very unsafe; also any word that appears in a
dictionary is easily guessed by a computer. You should also never use a password containing only
numbers. You should use a password containing a combination of lower case letters, capitals,
numbers and special characters and it should have a minimum length of 8 characters for basic
security.
MINIMIZING DAMAGE
If your password is leaked or guessed, it is very important to minimize the damage as much as
possible. To this end there are two measures you can take. Firstly, be sure to keep different
passwords for different sites, otherwise if your password for one site is compromised it is very easy
for the attacker to gain access to your other accounts. You can for example do this by choosing a
few basic passwords to which you add a unique suffix per site. Secondly, change your password
from time to time, at least for things you consider to be sensitive. In that way, if an attacker has got
access to your account without you noticing, you effectively block him out.
PHYSICAL PROTECTION
Especially if you are traveling and using internet cafes, or other un-trusted computers, you have to
be aware that there are other ways for people to obtain your passwords. Firstly there is "over the
shoulder" surveillance, where someone, or a camera, watches your actions and might see the
password you are typing (or where you are browsing). A second typical threat is the presence of key
loggers. Key loggers are software or hardware devices that record key-strokes, they can be hidden
inside a computer or keyboard and hence totally invisible to you. Be very careful what you do in
those places and which sites you visit there. If you really have to use such a place be sure to change
your passwords as soon as possible. For more tips on Internet Cafes read the chapter on them.
One way to create strong and easy-to-remember passwords are to start with a sentence you can
easily remember, like: "this book really helps for securing my digital life!"
Take for instance the first letter of every word: "tbrhfsmdl" and now add some more substitutions,
the "f" can be the 4 (for "for") and we can add some capitals and special characters. The end result
might be something like "TbRh4$mdL!” This is secure and easy to remember. Just try to think of a
system that works for you to remember the passwords. Alternatively you might want to use one
strong password that is easy to remember and keep all your other secure (less easy to remember)
passwords by using a tool that keeps them securely on your computer or phone.
Even easy-to-remember passwords might be difficult to manage. One solution is to use a dedicated
application to manage most of your passwords. The application we will discuss is Keepass which is a
free and open password manager that is considered to be secure (given that you chose a safe and
secure "master password" for the keepass application).
For website passwords a more convenient solution that is probably safe enough for most of your
passwords is to use the built-in password manager of the Firefox browser. Be sure to set a master
password as is explained in the chapter on safe browsing, otherwise this is very insecure! Other
browsers might also come with built-in password managers, but remember that if you don't have to
unlock them with a master password they are mostly unsafe and easily retrievable by attackers
having access to your computer.
Browsers offer to save the login information and passwords for websites you use. If you choose to
save the passwords, you should make sure that the passwords are stored in a safe way. See the
chapter about Keeping your internet passwords safe in Firefox.
To encrypt password we use KeePass on Windows and KeePassX Ubuntu, and Keychain on OSX. The
basic principle is the same; you have a file on your computer which is encrypted with one single very
secure password. This is sometimes referred to as a
'Master Password', 'Admin- Password',
Choose a strong
password for this field -
refer to the chapter about
passwords if you would like some
tips on how to do this. Enter the
password and press 'OK'. You then
are asked to enter the
password again. Do so and press
'OK'. If the passwords are the same
you will see a new KeePassX
'database' ready for you to use.
Now you have a place to store all your passwords and protect them by the 'master' password you
just set. You will see two default categories 'Internet' and 'Email' - you can store passwords just
under these two categories, you can delete categories, add sub-groups, or create new categories.
For now we just want to stay with these two and add a password for our email to the email group.
Right click on the email category and choose 'Add New
Entry...':
KeePassX gives some indication if the passwords you are using are 'strong' or 'weak'...you should try
and make passwords stronger and for advice on this read the chapter about creating good
passwords. Press 'OK' when you are done and you will see something like this:
To recover the passwords (see them) you must double click on the enter and you will see the same
window you used for recording the information. If you click on the 'eye' icon to the right of the
passwords they will be converted from stars (***) to the plain text so you can read it.
When you want to access the passwords you must then open KeePassX and you will be asked for the
master key. After typing this in you can add all your passwords to the database and see all your
entries. It is not a good idea to open KeePassX and have it open permanently as then anyone could
see your passwords if they can access your computer. Instead get into the practice of just opening it
when you need it and then closing it again.
Firefox can remember your internet passwords. This can be a very convenient option to use with all
those different sites requiring passwords nowadays. However, if you use this function you have to
set a master password, otherwise this feature is a real security threat.
To enable a master password, open your Firefox preferences and select the security icon. Check the
"use a master password" box.
After launching Firefox is will ask you once for the master password, after that the internet
password keyring will be unlocked. If the internet password keyring is unlocked, you can
inspect all saved passwords in the Preferences -> Security -> "Saved Passwords ..." dialog. If you
browse to a known website with a login form, the password is entered automatically.
Please note that at the time of this writing the implementation of Firefox' internet password key
ring is not complete, as it is not locked automatically after a certain time of inactivity or before
closing your laptop lid. If you want Firefox to lock your internet password key ring automatically
after a certain time of you not using your computer, you might install the "Master Password
Timeout" Plugin.
E-mail is one of the oldest forms of communication on the Internet. We often use it to communicate
very personal or otherwise sensitive information. It is very important to understand why e-mail in its
default configuration is not secure. In the
following chapters we will describe
the different methods necessary to secure
your e-mail against known threats. We will
also provide you with basic
knowledge to assess the risks involved
in sending and receiving e-mail. This
section will start by describing the security considerations when using e-mail.
There are two levels of security that protect against such e-mail interception. The first one is making
sure the connection to your e-mail server is secured by an encryption mechanism. The second is by
encrypting the message itself, to prevent anyone other than the recipient from understanding the
content. Connection security is covered extensively in this section and in the sections about VPN. E-
mail encryption is also covered in detail in the chapters about using PGP.
You may find it necessary or perhaps re-assuring to encrypt some data on your computer. Hard
drives are not very well protected by the Operating Systems password mechanism - it is pretty easy
to remove a hard disk from a laptop and access it from another computer, similar to how you would
access any hard disk you use for back-up or storage. So if you want to avoid this possibility you
should encrypt the data on your hard disk or, better still, encrypt your entire hard disk.
You can also take this protection another level and encrypt the data and store it on another device
like a USB stick or small hard disk. This means the data can also be very easily physically hidden and
it’s also very portable. If you want to be really sneaky you can also create hidden encrypted volumes
which means if someone accesses your hard disk they must know quite a bit about computers to
know how to find it - of course if you have the software installed to do this kind of thing that might
not look so friendly to someone prepared to go to these measures.
'Encrypting your data' like this means locking away your data in a very secure 'container'. If you do
not know the passwords then that data will look like a mess of letters, numbers and other
characters. If you know the password you can easily open and access the files.
We will look mainly at TrueCrypt - a free/open source solution to this issue. TrueCrypt is very nice
software that can be used on MaxOSX, Linux or Windows for establishing and maintaining an on-
the-fly-encrypted container ('volume'). On-the-fly encryption means that your data is encrypted
when you save it and then also decrypted when you open (access) it without you needing to do
anything. You can continue to use your computer like you normally would - you can drag and drop
files to an encrypting data etc. When you turn off the computer the data is encrypted automatically
- the same thing happens if your computer's power supply is interrupted or if the disk is removed
from your computer. The only way to access the data is to start your computer in the normal fashion
and entering the necessary passwords. It's actually pretty easy to use and in a sensible world all data
would be stored in this fashion. The only issue you really need to consider is that the data is not
encrypted automatically if you put your machine 'to sleep'. If you want this type of security you
need to get used to waiting a while and do a real shutdown of your computer and a real start-up
each time you use it. This is not the way people are usually working with laptops but this little extra
attention and pause for a few moments is a small price to pay for good data security
Most people have mobile phones today. In the past these devices were primarily used to call and
send text messages. In addition, all mobiles have at least an ability to keep an address book. There is
a new generation of mobile devices that come with Internet access, built-in video cameras and the
ability to install additional software. These smart phones can be very convenient and provide you
with very powerful and useful tools. These phones contain a lot of private data and, unfortunately, a
phone can be lost easily. The following chapter deals with some methods to use them more secure.
SMS - Text messages are sent in plain text over the network, so they are also not considered secure,
additionally they are not securely stored at your device, so anyone with access to it will be able to
read them. If you are using an Android based phone read the chapter on 'Secure Text Messaging'
Smartphone - Smartphone’s are quite new and unfortunately most advanced (and even some basic)
ways of securing that are available on normal computers are not available on smart phones. They
pose additional risk since you are also using them for things like agendas, and personal note taking.
Also not all applications in an appstore or market are safe to use, because there are a considerable
number of malware apps on the market which are passing your personal data to other companies.
You should always check if the app's you want to use can be trusted. Internet on your mobile device
is subject to the same problems as all wireless communications. Read the chapter on VPN for mobile
devices to improve this.
Prepaid SIM cards - In some countries you are still able to use prepaid locally bought SIM cards
without identifying yourself. Beware that your phone also has a unique identifier (known as the IMEI
number) so switching SIM cards will not guarantee to protect your privacy.
The following chapters will deal with different methods that are available today to secure your
mobile communications. Note that mobile phone security in particular is developing very fast and
users should check out the current status of premier open source efforts like the Guardian Project
4.10 Summary
E-MAIL
E-mail, short for electronic mail, is a method to send and receive messages over the Internet. It is
possible to use a Web mail service or to send e-mails with the SMTP protocol and receive them with
the POP3 protocol by using an e-mail client such as Outlook Express or Thunderbird. It is
comparatively rare for a government to block e-mail, but e-mail surveillance is common. If e-mail is
not encrypted, it could be read easily by a network operator or government.
FILE SHARING
File sharing refers to any computer system where multiple people can use the same information,
but often refers to making music, films or other materials available to others free of charge over the
Internet.
FILE SPREADING ENGINE
A file spreading engine is a Web site a publisher can use to get around censorship. A user only has to
upload a file to publish once and the file spreading engine uploads that file to some set of share
hosting services (like Rapid share or Mega upload).
INTERNET
The Internet is a network of networks interconnected using TCP/IP and other communication
protocols.
bytes (128 bits). It can be written as 8 groups of 4 hex digits separated by colons, such as
2001:0db8:85a3:0000:0000:8a2e:0370:7334.
MALWARE
Malware is a general term for malicious software, including viruses that may be installed or
executed without your knowledge. Malware may take control of your computer for purposes such
as sending spam. (Malware is also sometimes called bad ware.)
PACKET
A packet is a data structure defined by a communication protocol to contain specific information in
specific forms, together with arbitrary data to be communicated from one point to another.
Messages are broken into pieces that will fit in a packet for transmission, and reassembled at the
other end of the link.
PROTOCOL
A formal definition of a method of communication, and the form of data to be transmitted to
accomplish it. Also, the purpose of such a method of communication. For example, Internet Protocol
(IP) for transmitting data packets on the Internet, or Hypertext Transfer Protocol for interactions on
the World Wide Web.
PROXY SERVER
A proxy server is a server, a computer system or an application program which acts as a gateway
between a client and a Web server. A client connects to the proxy server to request a Web page
from a different server. Then the proxy server accesses the resource by connecting to the specified
server, and returns the information to the requesting site. Proxy servers can serve many different
purposes, including restricting Web access or helping users’ route around obstacles.
SCRIPT
A script is a program, usually written in an interpreted, non-compiled language such as JavaScript,
Java, or a command interpreter language such as bash. Many Web pages include scripts to manage
user interaction with a Web page, so that the server does not have to send a new page for each
change.
SMARTPHONE
A Smartphone is a mobile phone that offers more advanced computing ability and connectivity than
a contemporary feature phone, such as Web access, ability to run elaborated operating systems and
run built-in applications.
SPAM
Spam is messages that overwhelm a communications channel used by people, most notably
commercial advertising sent to large numbers of individuals or discussion groups. Most spam
advertises products or services that are illegal in one or more ways, almost always including fraud.
Content filtering of e-mail to block spam, with the permission of the recipient, is almost universally
approved of.
The standard SSH port is 22. It can be used to bypass Internet censorship with port forwarding or it
can be used to tunnel other programs like VNC.
WEBMAIL
Webmail is e-mail service through a Web site. The service sends and receives mail messages for
users in the usual way, but provides a Web interface for reading and managing messages, as an
alternative to running a mail client such as Outlook Express or Thunderbird on the user's computer.
questions:
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
3. What is Password?
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
5. How to secure your personal data?
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
6. How to secure your Smartphone?
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
4.12 References
1.
a) Internet
b) World wide web
c) Client
d) Server
e) Uniform Resource Locator
f) Internet Service Provider
g) Advanced Research Project Agency Network
h) Internet Engineering Task Force.
i) Internet Research Task Force.
j) Internet Architecture Board.
2.
a) Internet: The Internet is a communication system that connects computers and computer
networks all over the world. Thus, we define the Internet as a global network of
computers/devices.
b) WWW (World Wide Web) - A technical definition of the World Wide Web is: all the
resources and users on the Internet that are using the Hypertext Transfer Protocol (HTTP).
c) Search Engine _ A web server that collects data from other web servers and puts it into a
database (much like an index), it provides links to pages that contain the object of your
search.
d) URL (Uniform Resource Locator) _ The Internet address. The prefix of a URL indicates
which area of the Internet will be accessed. URLs look differently depending on the Internet
resource you are seeking.
1.
2.
(a). TCP/IP (Transmission Control Protocol/Internet Protocol) is the
basic communication language or protocol of the Internet. It can also
be used as a communications protocol in a private network (either an
intranet or an extranet).When you are set up with direct access to the
Internet, your computer is provided with a copy of the TCP/IP program
just as every other computer that you may send messages to or get
information from also has a copy of TCP/IP.
(b). HTTP or Hyper Text Transfer Protocol is provides a set of rules to
transfer files, videos, images over the World Wide Web. When the web
browser is opened, a HTTP request call is made. A web server contains
a HTTP daemon. This daemon is used to wait for HTTP requests and
handles them when they arrive. The web browser from where HTTP
requests are made is called as a client. These requests are sent to the
server. It uses a reserved port no 80.
(c). SMTP or Simple Mail Transfer Protocol is used to send email messages
between servers. The messages are retrieved using email clients. SMTP
is more commonly used to send messages from a mail client to a mail
server. And hence the email client like POP needs to be configured.
Hence, SMTP is used to send emails while POP or IMAP are used to
receive messages. It is usually operated on port25 on the internet.
(d). File Transfer Protocol (FTP), a standard Internet protocol, is the
simplest way to exchange files between computers on the Internet.
Like the Hypertext Transfer Protocol (HTTP), which transfers
displayable Web pages and related files, and the Simple Mail Transfer
Protocol (SMTP), which transfers e-mail, FTP is an application protocol
that uses the Internet's TCP/IP protocols. FTP is commonly used to
transfer Web page files from their creator to the computer that acts as
their server for everyone on the Internet. It's also commonly used to
download programs and other files to your computer from other
servers.
(e). Telnet is the main Internet protocol for creating a connection to a
remote server.
3. Refer Section 2.8
4. Refer Section 2.7
5. URL: The standard way to give the address of any resource on the Internet
that is part of the World Wide Web (WWW).
A URL looks like this: http://www.matisse.net/seminars.html
The URL is divided into sections: transfer/transport protocol: // server (or
domain)
6. IPv4 provides hierarchical addressing scheme which enables it to divide the network into
sub-networks, each with well-defined number of hosts. IP addresses are divided into many
categories:
▪ Class A: It uses first octet for network addresses and last three octets for host
addressing.
▪ Class B: It uses first two octets for network addresses and last two for host addressing.
▪ Class C: It uses first three octets for network addresses and last one for host
addressing.
▪ Class D: It provides flat IP addressing scheme in contrast to hierarchical structure for
above three.
▪ Class E: It is used as experimental.
IPv4 also has well-defined address spaces to be used as private addresses (not routable on
internet), and public addresses (provided by ISPs and are routable on internet).
1. Web site is a collection of one or more web pages grouped under the same domain name.
2. A web page is one single page of information, while a website is made up of a number of
different web pages connected by links known as Hyperlinks.
3. The components of website are :
Contents of a Web Page, Website Graphics, Effective Color Contrast
A. Answer
1. WWW stands for World Wide Web.
2. SSL Stands for Secure Sockets Layer.
3. IM stands for Instant Message.
4. HTTP Stands for Hyper Text Transfer Protocol.
5. SMTP stands for Simple Mail Transfer Protocol.
B. Answer
1. Information security is the process of preventing and identifying unauthorized use of
computer, when transforming information over internet or network.
2. There are different techniques have been used to protect transfer of data or information
from unauthorized user. Such as- ➢ Keep the operating system updated
➢ Use a Firewall
➢ Anti-virus software is crucial to preventing virus attacks, but this strategy only works if
users update their software. Know that the only way a virus spreads is either by
launching an infected file or by booting an infected disk. You cannot get a virus by simply
being online or by reading e-mail.
3. A password is a string of character used to verify the identity of user during the
authentication process. Passwords are typically used in conjuncture with a user name.
4. E-mail security refers to the collective measures used to secure the access and the content
of the e-mail account or service. It allows an individual or organization to protect the overall
access to one or more e-mail address/ accounts.
1.