0% found this document useful (0 votes)
12 views17 pages

Chap 3

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views17 pages

Chap 3

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Internet Architecture :

- In the late 1960s, the US Department of Defense decides to make an extensive


network from many small networks, all different, which begin to abound everywhere
in North America. We had to find a way for these networks to coexist and give them
outdoor visibility, the same for all users. Hence, inter-Network (interline),
abbreviated as the Internet, data this network of networks.
- Internet architecture represents the protocols and the structure that make the
global network work. Meanwhile, network architecture refers to a specific networks
structure and connectivity of its devices and services.
- Internet is network of network that is used to interlinked many different types of
computers all over the world.
- Internet architecture refers to the design and structure of the internet, which is
global network.
- It relies on a layered approach to handle various aspects of communication and data
exchange.
- The internet architecture is based on a simple idea: ask all networks to carry a single
packet type, a specific format, the IP protocol. Besides, this IP packet must have an
address defined with sufficient generality to identify each computer and terminals
scattered throughout the world.
- This architecture is illustrated in figure.

- The user who wishes to make on this internetwork must store its data in IP packets
delivered to the first network to cross. This first network encapsulates the IP packet
in its packet structure, package A, which circulates in this form until an exit door,
where it is de-capsulated to retrieve the IP packet. The IP address is examined to
locate, thanks to a routing algorithm, the following network to cross, and so on until
arriving at the destination terminal.

B.C.A TY Notes By - Sandeep Chavan


- To complete the IP, the US Defense added the TCP protocol; specify the nature of
the interface with the user. This protocol further determines how to transform a
stream of bytes in an IP packet while ensuring the quality of transport of this IP
packet. Both protocols, assembled under the TCP / IP abbreviation, are in the form
of a layered architecture.

- IP packets are independent of each other and are individually routed in the network
by interconnecting devices, subnets, routers. The quality of service offered by IP is
minimal and provides no detection of lost or possibility of error recovery packages.
- TCP combines the functionality of the message-level reference model. It is a fairly
complex protocol with many options for solving all packet loss problems in the lower
levels. In particular, a lost fragment can be recovered by retransmission on the
stream of bytes. TCP uses a connection-oriented mode.

B.C.A TY Notes By - Sandeep Chavan


Internet Service Provider

- ISP stands for Internet Service Provider which is a term used to a company that
provides internet service to its customers or people who pay the company or
subscribe to the company. For their services, the customers have to pay the
internet service provider a nominal fee which varies according to the amount of
data they actually use or the data plan which they purchase.
- An Internet Service Provider is also known as an Internet Access Provider or an
online service provider. An Internet Service Provider is a must if one wants to
connect to the internet.

- Data is transmitted through different technologies, including cable modem, DSL, high
speed interconnects. Accordingly, based on the method of data transmission.

B.C.A TY Notes By - Sandeep Chavan


Different Types of ISP Connections
 DSL
 Wi-Fi broadband
 mobile broadband
 fiber optic broadband
 cable broadband

List of ISP
 Reliance Jio
 Vodafone Idea
 Airtel
 BSNL
 Hathway

Typical Services Offered by ISPs


Almost all types of ISPs offer some set of services to clients. Among the usual services ISPs
provide to their customers are :

 Internet Access: All types of ISPs grant their customers access to the Internet through
DSL, cable, fiber-optic, and wireless technologies.
 Email Services: Most of the ISPs provide email accounts to their customers. They can
create and manage their email addresses for communicating purposes.
 Web Hosting: Few of the ISPs provide web-hosting services, hence customers and
businesses can host their websites on the internet.
 Domain Registration: A few ISPs provide for domain registration services, hence
customers can easily register and manage website domain names.
 Online Security: An ISP also provides security services, which include antivirus
software, firewalls, and spam filters, to protect customers from online threats.

B.C.A TY Notes By - Sandeep Chavan


Internet Service Provider (ISP) hierarchy

Internet Service Provider (ISP) is a company which provides internet connection to end
user, but there are basically three levels of ISP. There are 3 levels of Internet Service
Provider (ISP): Tier-1 ISP, Tier-2 ISP, and Tier-3 ISP.

These are explained as following below.


Tier-1 ISP:
These ISPs are at the top of the hierarchy and they have a global reach they do not pay for
any internet traffic through their network instead lower-tier ISPs have to pay a cost for
passing their traffic from one geolocation to another which is not under the reach of that
ISPs. Generally, ISPs at the same level connect to each other and allow free traffic passes
to each other. Such ISPs are called peers. Due to this cost is saved. They build
infrastructure, such as the Atlantic Internet sea cables, to provide traffic to all other
Internet service providers, not to end users.

Tier-2 ISP:
These ISPs are service provider who connect between tier 1 and tier 3 ISPs. They have
regional or country reach and they behave just like Tier-1 ISP for Tier-3 ISPs.

Tier-3 ISP:
These ISPs are closest to the end users and helps them to connect to the internet by
charging some money. These ISPs work on purchasing model. These ISPs have to pay some
cost to Tier-2 ISPs based on traffic generated.

B.C.A TY Notes By - Sandeep Chavan


Internet Addressing System :
IP Address:
- An IP address is a unique number that identifies a device on a network or the internet. IP
addresses are used to differentiate between devices and make it possible for information to
be sent between them.

- IP addresses can be formatted differently depending on whether they use IPv4 or IPv6
protocol. IPv4 can support up to 4.3 billion unique IP addresses, while IPv6 can support a
much higher number.

- All the computers of the world on the Internet network communicate with each other with
underground or underwater cables or wirelessly. If I want to download a file from the
internet or load a web page or literally do anything related to the internet, my computer
must have an address so that other computers can find and locate mine in order to deliver
that particular file or webpage that I am requesting. In technical terms, that address is called
IP Address or Internet Protocol Address.

- Let us understand it with another example, like if someone wants to send you a mail then
he/she must have your home address. Similarly, your computer too needs an address so
that other computers on the internet can communicate with each other without the
confusion of delivering information to someone else’s computer. And that is why each
computer in this world has a unique IP Address. Or in other words, an IP address is a unique
address that is used to identify computers or nodes on the internet.

- This address is just a string of numbers written in a certain format. It is generally expressed
in a set of numbers for example 192.155.12.1. Here each number in the set is from 0 to 255
range. Or we can say that a full IP address ranges from 0.0.0.0 to 255.255.255.255. And
these IP addresses are assigned by IANA (known as Internet Corporation For Internet
Assigned Numbers Authority).

- But what is Internet protocol? This is just a set of rules that makes the internet work. You
are able to read this article because your computer or phone has a unique address where
the page that you requested has been delivered successfully.

- The working of IP addresses is similar to other languages. It can also use some set of rules
to send information. Using these protocols we can easily send, and receive data or files to
the connected devices.

B.C.A TY Notes By - Sandeep Chavan


Types of IP Address:

IP Address is of two types:

1) IPv4: Internet Protocol version 4. It consists of 4 numbers separated by the dots. Each
number can be from 0-255 in decimal numbers. But computers do not understand decimal
numbers, they instead change them to binary numbers which are only 0 and 1. Therefore, in
binary, this (0-255) range can be written as (00000000 – 11111111). Since each number N
can be represented by a group of 8-digit binary digits. So, a whole IPv4 binary address can
be represented by 32-bits of binary digits.

Class A: Addresses that start with 1–126, and are reserved for large public networks and
corporate networks.

Class B: Addresses that start with 128–191, and can support 16,384 networks. They are
used by government agencies and large corporations.

Class C: Addresses that start with 192–223, and are intended for most users.

Class D: Addresses that start with 224–239, and are used for multicast groups.

Class E: Addresses that start with 240–255, and are reserved for experimental use.

IPv4 addresses are 32-bit numbers, usually written in decimal format as four octets
separated by periods

An ip address is divided into two parts:

o Network ID: It represents the number of networks.


o Host ID: It represents the number of hosts.

B.C.A TY Notes By - Sandeep Chavan


2) IPv6: But, there is a problem with the IPv4 address. With IPv4, we can connect only the
above number of 4 billion devices uniquely, and apparently, there are much more devices in
the world to be connected to the internet. So, gradually we are making our way to IPv6
Address which is a 128-bit IP address. In human-friendly form, IPv6 is written as a group of 8
hexadecimal numbers separated with colons(:). But in the computer-friendly form, it can be
written as 128 bits of 0s and 1s. Since, a unique sequence of binary digits is given to
computers, smartphones, and other devices to be connected to the internet. So, via IPv6 a
total of (2^128) devices can be assigned with unique addresses which are actually more
than enough for upcoming future generations.

Format of IPV6
IPv6 addresses are written in hexadecimal, with each section ranging from 0 to FFFF. For
example, 2001:0000:130F:0000:0000:09C0:876A:130B is an IPv6 address.

B.C.A TY Notes By - Sandeep Chavan


DNS :
- The Domain Name System (DNS) is a system that translates domain names into IP
addresses, which allow browsers to get to websites and other internet resources.
- It is an automatic process that converts the domain name to its corresponding ip
address (number) so, that web browser can understand which web page you want to
access on internet.
- If DNS is not available then you have to remember the IP address of website.
- Every host is identified by the IP address but remembering numbers is very difficult
for people also the IP addresses are not static therefore a mapping is required to
change the domain name to the IP address. So DNS is used to convert the domain
name of the websites to their numerical IP address.
- The Domain Name System (DNS) is the phonebook of the Internet. Humans access
information online through domain names, like facebook.com or gmail.com. Web
browsers interact through Internet Protocol (IP) addresses. DNS translates domain
names to IP addresses so browsers can load Internet resources.
- Each device connected to the Internet has a unique IP address which other machines
use to find the device. DNS servers eliminate the need for humans to memorize IP
addresses such as 192.168.1.1 (in IPv4), or more complex newer alphanumeric IP
addresses such as 2400:cb00:2048:1::c629:d7a2 (in IPv6).

How does DNS work?

- The process of DNS resolution involves converting a hostname (such as


www.example.com) into a computer-friendly IP address (such as 192.168.1.1). An IP
address is given to each device on the Internet, and that address is necessary to find
the appropriate Internet device - like a street address is used to find a particular
home. When a user wants to load a webpage, a translation must occur between
what a user types into their web browser (example.com) and the machine-friendly
address necessary to locate the example.com webpage.

B.C.A TY Notes By - Sandeep Chavan


URL :
- URL is an address of your webpage.
- A Uniform Resource Locator (URL) is an address that indicates the location of a specific
file or resource on the Internet. It can help to locate a particular resource due to its
uniqueness. It is also known as the web address. A URL consists of different parts
like protocol, domain name, etc. The users can access the URLs by simply typing
them inside the address bar or by clicking any button or link web page.

- Example URL: https://www.google.com/gmail/inbox.html


- A URL consists of mutliple parts that can helps you to visit a particular page on the
internet. Every part of a URL has its own importance.

- A URL starts with a protocol followed by the name of the resource that has to be
accessed. URL uses the protocols as the primary access medium to access the
domain or subdomain specified after that wherever the resource is located. It uses
multiple protocols like HTTP (Hypertext Transfer Protocol), HTTPS
Protocol (Secured HTTP), mailto for emails, FTP (File Transfer Protocol) for files,
and TELNET to access remote computers. Mostly the protocol names are specified
using the colons and the double forward slashes, but the mailto protocol is
specified using the colons only.

Types of URL :

1) Absolute URL :
- The complete address of a document on the internet is known as an absolute URL.
- All the information needed to locate files online is contained in the absolute url.
- Example: http://www.facebook.com/login.html/

2) Relative URL :
- The relative URL is a document online partial address.
- Only file name or file names with folder name are contained in relative URL.
- Example: <a href = "/login.html"> hello </a>

B.C.A TY Notes By - Sandeep Chavan


internet vs intranet vs Extranet :
- The internet is a public network accessible to anyone, while intranets are private
networks accessible only to authorized users within an organization. Extranets are
private networks that allow external parties to access certain parts of an
organization's intranet.

internet:
- A public network that anyone can access, allowing people to share information and
communicate globally.
- The Internet is a huge network of millions of computers and related devices from
all corners of the globe through which users are able to communicate, exchange
information, and resources. The Internet is the tool that links people, companies,
and organizations, offering various opportunities for cooperation and
development, as well as offering various possibilities to find the necessary
information. such as websites and services, research data, and social networks.

intranet :
- A private network that's only accessible to authorized users within an organization,
allowing them to store, organize, and share information.
- An Intranet is a local area network that has been designed for use within an
organization by its employees to share information as well as work together.
Extranet :
- A private network that allows authorized external parties to access certain parts of
an organization's intranet, such as vendors, suppliers, partners, and customers.
- An Extranet is an extended form of an Intranet that enables secure communication
and collaboration between an organization and external entities, such as suppliers,
partners, or clients. An Extranet is controlled and accessible only to authorized
users with login credentials.

B.C.A TY Notes By - Sandeep Chavan


Networking Protocols :
- Network protocols are a set of rules that are responsible for the communication of
data between various devices in the network. These protocols define guidelines
and conventions for transmitting and receiving data, ensuring efficient and reliable
data communication.
- It determines what is being communicated, how it is being communicated, and
when it is being communicated. It permits connected devices to communicate with
each other, irrespective of internal and structural differences.
- Some examples of networking protocols include:

Transmission Control Protocol (TCP)

- TCP stands for Transmission Control Protocol. it is a connection-oriented protocol


that means it establishes the connection prior to the communication that occurs
between the computing devices in a network. This protocol is used with
an IP protocol, so together, they are referred to as a TCP/IP.
- A common networking protocol that ensures data is sent accurately by establishing a
connection before data transmission and closing the connection after data
transmission has ended.
- The main functionality of the TCP is to take the data from the application layer. Then
it divides the data into a several packets, provides numbering to these packets, and
finally transmits these packets to the destination. The TCP, on the other side, will
reassemble the packets and transmits them to the application layer. As we know
that TCP is a connection-oriented protocol, so the connection will remain established
until the communication is not completed between the sender and the receiver.

The following are the features of a TCP protocol:

- Transport layer protocol


- Reliable
- Order of the data is maintained
- Connection oriented
- Full duplex

B.C.A TY Notes By - Sandeep Chavan


User Datagram Protocol (UDP)

- A lighter, faster alternative to the Transmission Control Protocol (TCP), UDP is used
to quickly transmit datagrams in IP networks without establishing a connection.

- UDP is a connectionless protocol. Unlike the TCP which first requires a connection to
be established, before packets can be transmitted. UDP does not require the
establishment of any connection between the sending and receiving machines. Once
the receiving machine makes a request to the sending machine, the sending machine
will continuously send datagrams over without establishing any connection.

- The main benefit of UDP is reduced time between the transmission of individual
units of data. In UDP, these units are called datagrams. For TCP, for each unit of data
(i.e. packets), an acknowledgement receipt needs to be sent back to the sender,
which increases the delay between transmission of packets. UDP minimizes this
delay because it sends datagrams continuously, one after another, to the receiver
without requiring the receiver to acknowledge receipt of the datagrams.

- Unlike TCP, which uses ACK packets to track data's movement, UDP doesn't require
acknowledgement receipts. This means that if datagrams are lost in transmit, there's
no record of how many are sent or when they arrived.

B.C.A TY Notes By - Sandeep Chavan


Simple Mail Transfer Protocol (SMTP)

- it is an internet standard protocol that allows for the transmission of electronic


mail. It is used for send and receive emails.
- The sender's email client or server acts as the SMTP client, and the sender's email
server acts as the SMTP server. The client connects to the server and sends the
email, including the recipient's details, subject, and body.

Hypertext Transfer Protocol (HTTP)

- A networking protocol used to transfer hypertext from the client to the server, and is the
basis of data communication on the World Wide Web (WWW).
- When you visit a website, HTTP helps your browser request and received the data
needed to display the web pages you see. It is a fundamental part of how the
internet works, making it possible for us to browse and interact with websites.

B.C.A TY Notes By - Sandeep Chavan


File Transfer Protocol (FTP)

- FTP stands for File Transfer Protocol. The main purpose of FTP is use to download
and upload the file over the internet.
- FTP uses the TCP/IP protocol to enable the data transfer. FTP promote sharing of
files via the remote computer with reliable and efficient data transfer.
- A protocol that uses a client-server model to transfer files between remote
computers through an FTP server.

FTP is especially useful for:


 Transferring Large Files.
 Remote File Management.
 Automating File Transfers.
 Accessing Public Files.

How to Use FTP?


To use FTP, follow these steps:
 Connect to the FTP Server: One can connect to the server using the address, username
and password through an FTP client or a command line interface. Anonymous
Information may not need a username and password.
 Navigate Directories: Some commands include is that is used to list directories and cd
that is used to change directories.
 Transfer Files: File transfer may be done by using the commands such as get for
downloading files, and put for uploading files.
 Manage Files: Make operations like deletion (Delete), renaming (Rename) as well as
copying (Copy) of files.
 Close the Connection: Once file transfer has been accomplished, terminate the
connection by giving the bye or quit command.

B.C.A TY Notes By - Sandeep Chavan


Internet Protocol (IP)

- The Internet Protocol (IP) is a protocol, or set of rules, for routing and addressing
packets of data so that they can travel across networks and arrive at the correct
destination. Data traversing the Internet is divided into smaller pieces,
called packets. IP information is attached to each packet, and this information
helps routers to send packets to the right place. Every device or domain that
connects to the Internet is assigned an IP address, and as packets are directed to the
IP address attached to them, data arrives where it is needed.
- Once the packets arrive at their destination, they are handled differently depending
on which transport protocol is used in combination with IP. The most common
transport protocols are TCP and UDP.
- The first major version of the internet protocol was IPv4, which was version 4.
- After IPv4, the second major version of the internet protocol was IPv6, which was
version 6. The main reason behind the development of IPv6 was to replace IPv4.
There is a big difference between IPv4 and IPv6 is that IPv4 uses 32 bits for
addressing, while IPv6 uses 128 bits for addressing.
- The main function of the internet protocol is to provide addressing to the hosts,
encapsulating the data into a packet structure, and routing the data from source to
the destination across one or more IP networks.

B.C.A TY Notes By - Sandeep Chavan


Dynamic Host Configuration Protocol (DHCP)

- Dynamic Host Configuration Protocol (DHCP) is a network protocol that


automatically assigns IP addresses and other configuration information to devices on
a network.
- A protocol that allows network administrators to automatically assign IP addresses
to devices connecting to the internet.
- DHCP It is the critical feature on which the users of an enterprise network
communicate. DHCP helps enterprises to smoothly manage the allocation of IP
addresses to the end-user clients’ devices such as desktops, laptops, cellphones,
etc.
- DHCP helps in managing the entire process automatically and centrally. DHCP helps
in maintaining a unique IP Address for a host using the server.

Two ways that a computer can assign an IP address are Static IP or Dynamic IP:

Static IP :

- In this, the user assigns an IP address manually. This was the original method that
was done at the beginning of the networking. You have a computer network
configuration page for each device and type the IP address manually. In addition to
this, you also have to type a subnet mask, default gateway, and DNS server. You do
the same every time you incorporate a new device. It was not feasible with a lot
number of devices. All the IP addresses should be unique to avoid the IP conflict.

Dynamic IP :

- In this, the device automatically receives an IP address from a DHCP server. It also
features a subnet mask, default gateway, and DNS server. Our home router supports
an embedded DHCP server

B.C.A TY Notes By - Sandeep Chavan

You might also like