Internet
Internet
Internet is a global communication system that links together thousands of individual networks. It allows exchange of
information between two or more computers on a network. Thus internet helps in transfer of messages through mail,
chat, video & audio conference, etc. It has become mandatory for day-to-day activities: bills payment, online shopping
and surfing, tutoring, working, communicating with peers, etc. Internet was evolved in 1969, under the project called
ARPANET (Advanced Research Projects Agency Network) to connect computers at different universities and U.S.
defence. Soon after the people from different backgrounds such as engineers, scientists, students and researchers
started using the network for exchanging information and messages. In 1990s the internet working of ARPANET, NSFnet
and other private networks resulted into Internet. Therefore, Internet is a global network of computer networks’ . It
comprises of millions of computing devices that carry and transfer volumes of information from one device to the
other. Desktop computers, mainframes, GPS units, cell phones, car alarms, video game consoles, are connected to the
Net.
The Web was invented in 1991 by Tim Berners-Lee, while consulting at CERN (European Organization for Nuclear
Research) in Switzerland.
The Web is a distributed information system.
The Web contains multimedia.
Information in the Web is connected by hyperlinks
ModemRouter: A router is a piece of hardware that enables you to create a home network or many computers
and other devices connected to a single Internet connection. You may build a home wireless network, sometimes
known as a Wi-Fi network, because many routers are wireless.
It is believed that the internet was developed by "Defense Advanced Projects Agency" (DARPA) department of the
United States. And, it was first connected in 1969.
Why is the Internet Called a Network?
Internet is called a network as it creates a network by connecting computers and servers across the world using
routers, switches and telephone lines, and other communication devices and channels. So, it can be considered a global
network of physical cables such as copper telephone wires, fiber optic cables, tv cables, etc. Furthermore, even wireless
connections like 3G, 4G, or Wi-Fi make use of these cables to access the Internet.
Internet is different from the World Wide Web as the World Wide Web is a network of computers and servers created
by connecting them through the internet. So, the internet is the backbone of the web as it provides the technical
infrastructure to establish the WWW and acts as a medium to transmit information from one computer to another
computer. It uses web browsers to display the information on the client, which it fetches from web servers.
The internet is not owned by a single person or organization entirely. It is a concept based on physical infrastructure
that connects networks with other networks to create a global network of billions of computers. As of 12 August 2016,
there were more than 300 crores of internet users across the world.
Set Up
Physical copper or optical fiber data transmission cables, as well as other networking technologies like LAN, WAN, and
MAN, are used to set up the internet. Even the 2g, 3g, and 4g services, as well as Wi-Fi, need this physical cable
arrangement in order to access the Internet connection. The Internet Corporation for Assigned Names and Numbers
(ICANN), a US-based organization, is in charge of overseeing the management of the Internet and its related protocols,
including IP addresses.
How does internet work?
Before understanding this let us understand some basics related to internet:
The internet works with the help of clients and servers. A device such as a laptop, which is connected to the internet is
called a client, not a server as it is not directly connected to the internet. However, it is indirectly connected to the
internet through an Internet Service Provider (ISP) and is identified by an IP address, which is a string of numbers. Just
like you have an address for your home that uniquely identifies your home, an IP address acts as the shipping address
of your device. The IP address is provided by your ISP, and you can see what IP address your ISP has given to your
system.
A server is a large computer that stores websites. It also has an IP address. A place where a large number of servers are
stored is called a data center. The server accepts requests send by the client through a browser over a network
(internet) and responds accordingly.
To access the internet we need a domain name, which represents an IP address number, i.e., each IP address has been
assigned a domain name. For example, youtube.com, facebook.com, paypal.com are used to represent the IP
addresses. Domain names are created as it is difficult for a person to remember a long string of numbers. However,
internet does not understand the domain name, it understands the IP address, so when you enter the domain name in
the browser search bar, the internet has to get the IP addresses of this domain name from a huge phone book, which is
known as DNS (Domain Name Server).
For example, if you have a person's name, you can find his phone number in a phone book by searching his name. The
internet uses the DNS server in the same way to find the IP address of the domain name. DNS servers are managed by
ISPs or similar organizations.
Now after understanding the basics, let us see how internet works?
When you turn on your computer and type a domain name in the browser search bar, your browser sends a request to
the DNS server to get the corresponding IP address. After getting the IP address, the browser forwards the request to
the respective server.
Once the server gets the request to provide information about a particular website, the data starts flowing. The data is
transferred through the optical fiber cables in digital format or in the form of light pulses. As the servers are placed at
distant places, the data may have to travel thousands of miles through optical fiber cable to reach your computer.
The optical fiber is connected to a router, which converts the light signals into electrical signals. These electrical signals
are transmitted to your laptop using an Ethernet cable. Thus, you receive the desired information through the internet,
which is actually a cable that connects you with the server.
Furthermore, if you are using wireless internet using wifi or mobile data, the signals from the optical cable are first sent
to a cell tower and from where it reaches to your cell phone in the form of electromagnetic waves.
The internet is managed by ICANN (Internet Corporation for Assigned Names and Numbers) located in the USA. It
manages IP addresses assignment, domain name registration, etc.
The data transfer is very fast on the internet. The moment you press enter you get the information from a server
located thousands of miles away from you. The reason for this speed is that the data is sent in the binary form (0, 1),
and these zeros and ones are divided into small pieces called packets, which can be sent at high speed.
Uses of the internet
Generally speaking, the Internet may be used to exchange information with people all over the world, communicate
across great distances, and locate information or answers fast on almost any subject.
Here are some examples of specific uses for the Internet:
o Using social media and content sharing.
o Instant messaging, video conferencing, Internet Relay Chat (IRC), Internet telephony, and email are all
examples of electronic communication. These all are used through the Internet.
o Access to online degree programs, courses, and workshops for education and self-improvement.
o Searching for jobs: To advertise available positions, submit job applications, and hire candidates identified on
social networking sites like LinkedIn, both employers and applicants use the Internet.
Other examples include:
o Online dating
o Online gaming
o Research
o Reading electronic newspapers and magazines
o Online shopping, or e-commerce.
o Online discussion groups and forums
Difference between the World Wide Web and the Internet
The World Wide Web (also known as the Web) and the Internet are fundamentally dissimilar from one another because
the Web is a collection of information that can be accessed using the Internet, whereas the Internet is a global network
of networks that offers access to almost all types of information. In other words, the Web is a service that was added to
the Internet's foundation.
The Web is the part of the Internet that gets the greatest traffic. One unique aspect of this is hypertext, a rapid cross-
referencing method. The majority of websites feature text that highlights keywords or phrases by being a different
color than the rest of the text. When a user selects one of these words or phrases, they will be sent to the chosen
website or page. Buttons, graphics, and even particular areas of images are also utilized as hyperlinks.
On the Internet, there are billions of pages of information. The most popular web browsers are Google Chrome, Firefox,
and Internet Explorer. A web browser is used to surf the internet or do online browsing. A certain Web site's look may
vary slightly depending on the browser being used. A certain browser's later or more updated versions have the
potential to render more complicated features like music files, sound, animation, and virtual reality.
Security and the Internet
Due to the volume of private and public information collected online, customers are at risk for security attacks and data
breaches. Crackers and hackers have access to networks and systems, and they are able to steal personal data, such as
login passwords or information on bank and credit card accounts. Among the steps that may be taken to protect online
privacy are:
o You can install antivirus and antimalware on your system.
o Generating complex, unique passwords that are impossible to decipher by anyone.
o A virtual private network (VPN) can be used, or at least a private browsing mode like the Incognito window in
Google Chrome.
o Only using HTTPS
o Keep private your all-social media accounts.
o Deactivate the autofill feature.
o Turn off the GPS of the device.
o Instead of just closing the tab or window, log out of accounts.
o Update cookies so that if a cookie is set, an alert is sent anytime.
o Spam emails should be avoided, and never open or download files from sources you are not aware of.
o Need to use caution when using hotspots or public Wi-Fi.
Furthermore, the "dark web" is an additional component of the Internet. Standard browsers do not allow users to
access the dark web, which is hidden. It instead makes use of the Tor and I2P browsers, which let users maintain
complete anonymity. While this anonymity can be a fantastic way to safeguard a user's security and freedom of speech
online or for the government to conceal confidential information, the dark web also fosters an environment that makes
cybercrime, the transfer of illicit commodities, and terrorism easier.
Social impact of the Internet
Both positive and negative effects of the Internet on society can be observed. On the one hand, some people claim that
the Internet has raised the risk of withdrawal, social exclusion, alienation, and citing a rise in FOMO, or the fear of
missing out, as evidence. On the other hand, some people also believe that the Internet has had the opposite impact on
society, increasing sociability, civic participation, and the depth of connections.
The Internet has changed how society communicates and interacts, whether the effects are positive or negative on
society. The increased focus on personal growth is one example of change and the fall in a community that is
determined by space, job, and family. People increasingly now build social connections on the basis of their unique
projects, values, as well as interests. In addition to offline and in person, communities are being created by like-minded
people through the Internet and the abundance of online settings it provides and produces. Social networking sites like
Facebook and LinkedIn are the preferred platforms for both businesses and individuals wishing to carry out various
tasks and connect with others.
Internet Connection Protocols
Protocols are a set of guidelines that aid in regulating the operation of any specific organization or technology.
Three main categories of Internet Connection Protocols are discussed below:
o TCP/IP Network Model: The most popular protocols for linking networks are Transmission Control Protocol
(TCP) and Internet Protocol (IP). Any communication is split up into a number of packets that are sent from
source to destination.
o File Transfer Protocol: With the help of FTP (File Transfer Protocol), a user can transfer documents, text files,
multimedia files, program files, etc., from one device to another.
o Hypertext Transfer Protocol: It is used to move a hypertext between two or more computers or other devices.
Links can be made using HTML tags and can take the form of text or graphics.
History of the Internet
The forerunner of the Internet, the ARPANet, went live for the first time in 1969. The TCP/IP, open networking protocol
suite, was adopted by the ARPANet in 1983, and the National Science Foundation Network (NSFN) developed the
network to link university computer science departments across the US in 1985.
When the hypertext transfer protocol (HTTP) was developed in 1989, it enabled different computer platforms to
connect to the same Internet sites, which dramatically improved communications over the network. The Mosaic Web
browser was developed in 1993.
Over the years of its existence, the Internet has remained a constant growth and development. For instance, IPv6 was
created to provide for a significant future rise in the number of IP addresses that could be used. In a related
development, the Internet of Things (IoT) refers to the rapidly developing environment where nearly any entity or
device can be given a unique identifier (UID) and the capability to communicate data automatically over the Internet.
Advantages of the Internet:
o Instant Messaging: You can send messages or communicate to anyone using internet, such as email, voice chat,
video conferencing, etc.
o Get directions: Using GPS technology, you can get directions to almost every place in a city, country, etc. You
can find restaurants, malls, or any other service near your location.
o Online Shopping: It allows you to shop online such as you can be clothes, shoes, book movie tickets, railway
tickets, flight tickets, and more.
o Pay Bills: You can pay your bills online, such as electricity bills, gas bills, college fees, etc.
o Online Banking: It allows you to use internet banking in which you can check your balance, receive or transfer
money, get a statement, request cheque-book, etc.
o Online Selling: You can sell your products or services online. It helps you reach more customers and thus
increases your sales and profit.
o Work from Home: In case you need to work from home, you can do it using a system with internet access.
Today, many companies allow their employees to work from home.
o Entertainment: You can listen to online music, watch videos or movies, play online games.
o Cloud computing: It enables you to connect your computers and internet-enabled devices to cloud services
such as cloud storage, cloud computing, etc.
o Career building: You can search for jobs online on different job portals and send you CV through email if
required.
Disadvantages of the Internet
o Time wastage: Although, Internet has a lot of advantages, it also contains some limitations. Time wasting is one
of among them. It can decrease your productivity if you are spending too much time on the Internet using
social media apps while doing nothing. Rather than squandering time, one should use that time to do
something useful and even more productive.
o Bad impacts on health: You can get health related issues if you spend too much time online; your body needs
outside activities, exercise, and many other things. If you look at the screen for a long time, it causes negative
effects on the eyes.
o Cyber Crimes: These days, crimes including cyberbullying, spam, viruses, hacking, and data theft are increasing
day by day. Cybercriminals can quickly break into your system, which store all of your private information.
o Effects on children: The constant watching of videos and playing games on the Internet by young children is
bad for their social and overall personality development.
o Bullying and spreading negativity: Social media applications have provided a free tool to all those people who
regularly attempt to spread negativity with really repulsive and humiliating comments and try to bully each
other, which is wrong and does bad impact on society.
Different ways to Connect to the Internet
The various methods for connecting to the Internet are briefly discussed below:
o Dial-Up: Users must connect their phone line to a computer system in such connections in order to access the
Internet connection. The user is unable to make or receive calls using the tier home phone service while
connected.
o Broadband: Today's most popular high-speed internet connection, broadband is offered either by cable or
phone companies.
o Wireless Connection: This category includes Mobile and Wi-Fi services providers. No matter where you are, you
can connect to the Internet anywhere because connectivity is made possible by radio waves. Several instances
of wireless connections are provided below:
o Wi-fi: Without the use of cables, wi-fi or wireless fidelity, enables high-speed internet connectivity.
o Mobile Phones: In modern times, all smartphones include an Internet connectivity option that can be availed
using Internet packs and coupons. These don't require a wire or external connection as well.
o Satellite: Satellites are utilized for wireless Internet connectivity in areas Where broadband connections is not
available.
o Integrated Services Digital Network: With the help of using telephone lines, ISDN enables users to send audio
or video data.
Other things you can do on the Internet
The ability to communicate with anyone in the world virtually immediately is one of the best features of the Internet.
With billions of users worldwide, email is one of the most established and widely used methods of online
communication as well as information sharing with others. People can communicate with each other in a number of
ways and create online communities with the help of using social media platforms.
Also, you can use the Internet for a variety of additional purposes. There are multiple ways to stay up to date on news
and do online shopping. You can take care of your financial affairs, meet new people, watch TV, or enhance new skills.
With the help of Internet, you can do or learn anything online.
Intranet
The intranet is a private network that belongs to a particular organization. It is designed for the exclusive use of an
organization and its associates, such as employees, customers, and other authorized people. It offers a secure platform
to convey information and share data with authorized users. Confidential information, database, links, forms, and
applications can be made available to the staff through the intranet. So, it is like a private internet or an internal
website that is operating within an organization to provide its employees access to its information and records. Each
computer in intranet is identified by a unique IP Address.
It is based on internet protocols (TCP/IP) and is protected from unauthorized access with firewalls and other security
systems. The firewall monitors the incoming and outgoing data packets to ensure they don't contain unauthorized
requests. So, users on the intranet can access the internet, but the internet users can't access the intranet if they are
not authorized for it. Furthermore, to access the intranet, the authorized user is required to be connected to
its LAN (Local Area Network).
Benefits of the intranet:
Some of the benefits of the intranet are:
o It is cheap and easy to implement and run, and is more safe than the internet and extranet.
o It streamlines communication that enables the company to share its data, information, and other resources
among employees without any delay. The entire staff can receive company's announcements, ask questions,
and access internal documents.
o It provides a secure space to store and develop applications to support business operations.
o It improves the efficiency of the company by speeding up workflow and reducing errors. Thus, it helps achieve
targets by completing the tasks on time.
o It offers a testing platform for new ideas before they are uploaded on the company's internet webpage. Thus, it
helps maintain the credibility of the company
o Information is shared in real-time, or updates are reflected immediately to all the authorized users.
o Modern intranets also offer a mobile app that allows employees to stay connected on the go.
o It aids in project management and tracking workflow and teams' progress.
o It can work with mobile devices, which means it can provide information that exists on intranet directly to
mobile devices of employees such as phones, tablets, etc.
o It can also be used to motivate employees, facilitate employee recognition, and to reward them for performing
beyond expectations.
Extranet
Extranet is a part of an organization's intranet. It is a communication network that is based on internet protocols
(TCP/IP). It provides controlled access to firm's intranet to its trading partners, customers, and other businesses. So, it is
a private network that securely shares internal information and operations of a firm with authorized people outside the
firm without giving access to the company's entire network. The users are required to have IDs, passwords, and other
authentication mechanisms to access this network.
Furthermore, to provide more security to Intranet, the following two measures are also taken by an organization:
o Firewall: It prevents unauthorized users from accessing the extranet.
o Passwords: It also prevents unauthorized users, including the company's employees from accessing the data
stored on its server.
Limitations of Extranet:
o Hosting: If you host extranet pages on your own server, it requires a high bandwidth internet connection,
which is may be very expensive.
o Security: You need extra firewall security if you host it on your own server. It increases the workload and makes
security mechanism very complex.
o Dependency: It is dependent on the internet as outsiders cannot access information without using the internet.
o Less Interaction: It reduces the face to face interaction between customers, business partners, vendors, etc.,
which results in poor relationship building.
Website
Website is a collection of related web pages that may contain text, images, audio, and video, etc. The first page of a
website is called a home page. Each website has a specific internet address (URL) that you need to enter in your
browser to access a website.
A website is hosted on one or more servers and can be accessed by visiting its homepage using a computer network. A
website is managed by its owner that can be an individual, company, or organization.
The first website was introduced on 6 August 1991. It was developed by Tim Berners-Lee at CERN. As of January 2018,
there were around 1.7 billion websites on the internet.
What is the need for a website?
A popular website is another name of success in modern times as today we are living in a digital world where people
are spending most of their spare time on internet browsing news, images, videos, and more. A website is the first thing
that appears on the screen of your laptop when you search for a product or service, or any other information online.
So, it is very important to have a website whether you are a businessman, organization, online store, etc. Let us
understand how a website can help you grow your business!
The benefits of having a website are as follows:
1. Cost-effective: The marketing of products and services through a website is less costly than print advertising, TV, and
radio advertising. It also allows you to make changes related to your products and services such as you can edit
products' specifications, features, discount offers, etc.
2. Broder demographic reach: A website can help your business reach people with diverse backgrounds throughout the
world.
3. Business credibility: Having a website that is user-friendly and professional looking for your business makes people
consider your business more credible than others who don't have a website to represent their businesses online.
4. 24/7 availability: You can keep your products available for sale around the clock through a website. Customers can
buy anytime, and thus you can earn more profits than a traditional storefront.
5. Consumer convenience: It improves the shopping experience of your customers; they can buy your products from
the comfort of their home.
6. Build customer rapport: Online presence helps you build and maintain a rapport among your customers. You can
also introduce special offers or discounts for your loyal customers.
7. Improves productivity: It saves your time as you don't need to explain your products or services to each customer
separately, as all the information is already available on the website.
8. Educate your customers: You can educate people about the benefits of your products and can show them how they
are betters than the competitors' products.
9. Change location: You can move your business to another location without affecting your sales as customers still can
find you through your website.
10. Grow manpower: You can post job openings for vacant positions and allow applicants to check job descriptions and
apply online.
11: Personalized email address: It allows you to set up personalized email addresses for employees, companies,
partners, etc. You can receive mails on these mail ids and reply accordingly. Furthermore, you can share offers, happy
hours, updates, and can get feedback through email.
12. Improve customer service: It allows you to improve customer services such as you can share phone numbers to
contact you, and display other relevant information such as order status, delivery status, refund or replacement
procedure, etc.
Types of Websites:
A website can be of two types based on the type of webpages:
o Static Website
o Dynamic Website
Static website
A static website, as the name suggests, is a website in which pages do not change or remain the same. It is the basic
type of website that is easy to create, maintain, and host. You don't need web programming and database design to
create a static website. Its webpages are coded in HTML. The codes are fixed for each page, so the information
contained in the page does not change, and it looks like a printed page. However, changes can be made by changing the
codes if required.
You can think of it as a brochure for a business that has the same information for every user. So, all users see the same
information irrespective of their location, interests, etc., when they open a particular page of a static website.
In the case of a static website, the content or webpage is taken directly form the file stored in the server without
requiring any interpreter (application software) to interact with a database to fetch data from the database. So,
database and server-site scripting are not required in static websites.
Dynamic website
A dynamic website is a collection of dynamic web pages whose content changes dynamically. It accesses content from a
database or Content Management System (CMS). Therefore, when you alter or update the content of the database, the
content of the website is also altered or updated.
A dynamic website uses client-side scripting or server-side scripting, or both to generate the dynamic content. For
example, when a browser sends a request to the server, the server contacts the application server with further
interacts with the database server to fetch the content, which is customized as per the user's requests and
requirements. For example, a Facebook page may appear different to different users as per their friends' list, interests,
location, etc.
Benefits of a Dynamic Website:
1. It is very quick and easy to make changes in a dynamic website as it is integrated with high-end programming.
2. The webpages are easier to maintain despite of being full of information and graphics.
3. E-commerce sites are dynamic as they need to be impressive and have easy navigation from one page to other
pages.
4. It makes your site look professional.
5. The users can get customized information as per their interests, needs, and profile, etc. For example,
facebook.com, flipkart.com, etc.
Difference between Static Website and Dynamic Website:
Static Website Dynamic Website
As the name suggests, Its webpages do not As the name suggests, the webpages keep changing as per
change in terms of design, content, etc. The users' requirements such as Facebook profile pages and an E-
information or content remains the same. commerce site. So, the content does not remain the same.
It mainly uses HTML and CSS and does not It requires server-side scripting, application server, and
require server-side scripting, application server, database to create and send dynamic webpages to the client.
and database.
It has a limited number of pages. It may contain thousands of pages in the database.
Its hosting cost is low, as HTML files need less Its hosting cost is higher as dynamic pages need more space
space on the server. on the server.
It requires low maintenance. It requires high maintenance.
It loads quickly as it involves the use of mark-up It takes more time to load due to the more processing time.
languages to create a webpage.
It lacks the Content management feature. It makes use of the Content Management Feature.
The content of the webpage cannot be changed The webpage content can be changed during runtime.
during runtime.
It does not require interaction with a database. Interaction with the database occurs.
It is more secure or fewer chances of it getting It is less secure and may get hacked easily as it uses many
hacked as it doesn't use plugins. plugins and content sources.
It is more reliable, e.g., whenever the server is It is less reliable, as it may go down for hours if the server
down, it is redirected to other nearby nodes. breaks down.
The Internet is a huge collection of networks, a networking infrastructure. It encapsulates millions of computers
together globally, forming a network in which any computer can communicate with any other computer as long as they
are both connected to the Internet. In other words, it is a worldwide system of cross-connected computer networks,
connecting millions of devices through which the exchange of information such as data, news, and opinions, etc. is
possible.
It utilizes the TCP/IP (Transmission Control Protocol/Internet Protocol) to aid billions of users across the globe. So,
TCP/IP can be called the backbone of the Internet. It is considered as a network of networks that consists of thousands
of private and public, academic, business, and government interconnections.
Through the article, we shall learn about what is the internet? its evolution, advantages, and disadvantages followed by
the various protocols used by the internet, and various services provided by the internet.
Know more about Computer Networks here.
Internet Definition
The Internet is often considered as “The Information Highway”, which implies that there is a straight and clear way of
obtaining information. It connects thousands of computer networks. Each device connected to the Internet is known as
a host and is independent. Through telephone wires, Fiber optical cable, and satellite links, Internet users can share a
variety of information.
Key Points
1. Each device connected to the internet is identified by its unique IP or Internet Protocol address. IP Address is a
unique set of numbers (such as 109.12.31.115) that identifies a computer location.
2. A special computer DNS (Domain Name Server) is employed to provide a name to the IP Address so that the
user can trace a computer by a name.
3. For example, a DNS server will resolve a name http://www.testbook.com to a particular IP address to uniquely
recognize the computer on which this website is hosted.
4. The Internet is available to every user across the globe.
5. ISP or Internet Service Provider helps the users to connect to the internet from home or office via landlines.
Although with the introduction of broadband and Wi-fi connecting to the Internet has gone wireless.
6. A web browser is a software application used for obtaining information on the World Wide Web. Some of the
commonly used web browsers are Google Chrome, Internet Explorer, Mozilla Firefox, etc.
Evolution of Internet
1. The methodology of the Internet was coined in 1969 and has undergone various technological & Infrastructural
amendments that are discussed below:
2. The origin of the Internet came from the concept of the Advanced Research Project Agency Network
(ARPANET) designed by the Department of Defence of The United States. The primary goal of ARPANET was to
facilitate interaction among the different bodies of the government.
3. The next was the evolution of the Transmission Control Protocol (TCP) in the 1980s which enabled different
machines and networks across the world to assemble data packets.
4. With the start of personal computers, the demand for commercial Internet usage progressed and this was the
time when Ethernet and other Local Area Networks came into existence.
5. In 1990 with the introduction of the web browser, the Internet became widely used amongst users.
6. And then the 21st century induced an amalgamation of technology and wireless Internet accessibility for its
users.
Internet Protocols
Transmission Control Protocols (TCP)
TCP is a connection-oriented protocol and allows end-to-end packet delivery. It serves as a backbone for connection.
The Transmission Control Protocol (TCP) functions at the Transport Layer of the OSI Model. TCP is a secure and
connection-oriented protocol.
TCP guarantees reliability by sequencing bytes with a forwarding confirmation number that indicates to the target the
next byte the source expects to receive. It retransmits the bytes not acknowledged in a specified period.
Internet Protocols (IP)
Internet Protocol is a connectionless and unreliable protocol. It does not ensure a guarantee of successful delivery of
data. To make it reliable, it should be paired with reliable protocols such as TCP at the transport layer.
Learn more about Input and Output Devices, here.
User Datagram Protocols (UDP)
Similar to IP, UDP is a connectionless and unreliable protocol. It is not required to make a connection with the host to
transmit the data. As UDP is an unreliable protocol, there is no tool for ensuring that data sent is received.
File Transfer Protocols (FTP)
Program files, text files, multimedia files, documents, etc. can be transferred from one device to another or from one
host to another using FTP. FTP offers the mechanism of creating files by two processes namely Control Process and
Data Transfer Process at both terminals, i.e., at the client as well as a server by establishing two different types of
connections(one for data transfer and another for controlling the information).
Know more about Computer Network, here.
Trivial File Transfer Protocols (TFTP)
Trivial File Transfer Protocol is also employed for the transfer of the files but it carries the files with no authentication.
HyperText Transfer Protocols (HTTP)
HTTP is a communication protocol that illustrates a mechanism for communication between the browser and the
webserver. It is also known as the request and response protocol as the interaction between browser and server takes
place in request and response pairs.
Telnet
Telnet is a protocol applied to log in to remote computers on the internet.
Know more about Computer Abbreviations here.
Internet Services
Internet Services enables us to access a tremendous amount of information such as text, graphics, sound, and software
over the internet. Some of the internet services are as follows:
1. Communication Services: There are multiple Communication Services available that allow the transfer of
information with individuals or groups, some of them are: Electronic Mail; for sending an electronic
message/information across the internet, Telnet; for remote login and more, Internet Relay Chat; real-time
communication all over the world.
2. Information Retrieval Services: There exist numerous Information retrieval services allowing easy access to
information present on the internet for example the File Transfer Protocol (FTP) for transferring the files.
3. Web Services: allows the transfer of information between applications on the web.
4. World Wide Web (WWW): offers a way to reach documents(texts, graphics, audio, video, hyperlinks, etc)
spread over several servers over the internet.
5. Video Conferencing: for video and audio transmission with help of telecommunication technologies.
World Wide Web (WWW)
The World Wide Web, or simply the Web, is a way of accessing information over the medium of the Internet. It is a
communications model and enables the exchange of information over the Internet through HTTP. It was developed
by Tim Berners Lee in 1990.
The Web is just one of the ways that information can be distributed over the Internet. And, we don’t use the Web to
send an email, but the Internet.
Unique Resource Locator (URL):
Just like we have a postal address, resources on the Internet have unique addresses – URL.
A URL has two main components:
o Protocol identifier: For the URL https://testbook.com, the protocol identifier is HTTP.
o Resource name: For the URL https://testbook.com, the resource name is testbook.com.
The URL sends users to a specific resource online such as video, webpage, or other resources. When you search any
query on Google, it will display the multiple URLs of the resource that are all related to your search query. The
displayed URLs are the hyperlink to access the webpages.
A URL (Uniform Resource Locator) contains the information, which is as follows:
o The port number on the server, which is optional.
o It contains a protocol that is used to access the resource.
o The location of the server
o A fragment identifier
o In the directory structure of the server, it contains the location of the resource.
The additional information about the URL is described below with the help of an example:
Let's take an example: https://www.javatpoint.com/jtp.htm, it indicates the jtp.htm is a file located on the server with
the address of javatpoint.com.
http:// or https://
The http is a protocol that stands for Hypertext Transfer Protocol. It tells the browser to which protocol will be
preferred to use for accessing the information that is specified in the domain.
The https (Hypertext Transfer Protocol Secure) is an enhanced protocol as compared to http as it concerned with
security. It provides the surety that the information, which is transmitted over HTTP is secure and encrypted. The colon
(:) and two forward slashes (//) are used to separate the protocol from the rest of the part of the URL.
www.
The www is used to distinguish the content, which stands for World Wide Web. This portion of the URL can be left out
many times, as it is not required. For instance, if you type "http://javatpoint.com," you will still get the javatpoint
website. For an important subpage, this portion can also be substituted, which is known as a subdomain.
javatpoint.com
The javatpoint.com is the domain name for the website, and the .com is called TLD or suffix. It helps to identify the
location or type of the website. For example, ".org" stands for an organization, ".co.uk" stands for the United Kingdom,
and ".com" is for commercial. There are various types of domain suffixes available; you are required to register the
name through a domain registrar to get a domain.
jtp.htm
The jtp.htm is the name of the web page, and the .htm is the file extension of the web page, which describes the file is
an HTML file. There are many other file extensions available on the internet such as .php, .html, .xml, .jpg, .gif, .asp, .cgi,
etc.
Where is the URL located?
A URL is located in the address bar or search bar at the top of the browser window. The URL is always visible in the
desktop computers and laptop unless your browser is being displayed in full screen. In most of the smartphones and
tablets, when you scroll down the page, the URL will disappear and only show the domain when visible. To visible the
address bar, you need to scroll up the page. And, if only the domain is shown and you want to see full address, tapping
on the address bar to show the full address.
What characters cannot be used in the URL?
It is realized by many people that space is not allowed in a URL. The URL string can contain only symbols ! $-_+*'(),
including alphanumeric characters as it is documented in RFC 1738. Any other characters must be encoded in the URL
if needed.
Is an IP address the same as a web address or a URL?
An IP address is not the same as a web address or a URL, as it is a unique number that is assigned to each device on a
network. A domain name is assigned a unique IP address on the World Wide Web, and when entered an URL like
javatpoint.com, it is translated by DNS into an IP address that used by routers to find web servers. Instead of using an IP
address, a domain name is used as it is easy to remember by humans. For example, to remember an IP address like
216.58.216.164 is hard, and much easier to remember 'javatpoint.com.'
Understanding more complex URLs and parameters
A URL performs additional functions and added the parameters (additional information) to the end of the URL when it
points to a script. For example, when you search any query on any search engine, it points to a search results page,
including the additional information with the search query words.
An URL example is given below that points to the javatpoint search page, including the search query parameter of
example search.
1. https://www.javatpoint.com/cgi-bin/search.cgi?q=example%20search
In cgi-bin directory, the script file being pointed to is search.cgi in the above URL example. It is assumed to be a Perl
script as this file ends with .cgi.
The file name is a question mark (?) after the script. In the URL, the question mark separates the URL from all the
variables or parameters to be sent to the script. The parameter being sent is q=example%20search, in the above URL
example. The "example%20search" is the value that is sent to the "q" variable. Space is encoded as %20 as spaces are
allowed in a URL. Furthermore, a+ is also used to represent space in many scripts.
There is a variable in the example that is executed, as the script uses it. Also, scripts can contain multiple variables; each
variable is separated by a symbol & (ampersand), as shown in the following example:
1. https://www.javatpoint.com/cgi-bin/search.cgi?q=example%20search&example=test
The above example contains two different variables; the q" variable equals "example search" and the "example"
variable equals "test."
Why URL?
o The URL is beneficial, as the written information in the URL provides users the option to switch from one web
page to another by clicking only one mouse click.
o Every URL is unique and tells users how to access a specific resource.
o When a user types a URL into the web browser and opens any hyperlink from search results, the browser
forwards a request to a webserver to fetch files related to thesearch query.
o A website domain or URL identifies one particular file, and it is the most important part of your website.
Usually, by using words that end with .net, .com, or .org, you can get traffic on your website.
What is URL Redirect?
A URL redirect is a web server function that takes your URL and points it to another. For example, consider, you had the
old URL "myvlogsite.com," and you wanted to visitors' access directly to the new URL "javatpoint.com." Redirect is the
best solution for it; when anyone type "myvlogsite.com" in the browser would be redirected to the new
URL "javatpoint.com." There are various kinds of redirects for web developers, such as HTTP 3xx series status codes,
manual redirects, JavaScript, metatag refreshes, server-side scripts, frame redirects, and more. Furthermore, the URL
redirect may also be known as URL forwarding, domain forwarding, HTTP code 3xx redirect, and domain redirection.
There are many reasons for web users may be redirected from one URL to another, such are as follows:
o Merging of two websites
o Change of business name
o To direct content to a recently updated domain name
o Landing page-split testing for marketing tests
o To direct traffic toward recently updated content
A URL redirect is also used to cause problems for users and their computers through illegal activities like phishing.
Additionally, it can be used to remove the search results of web browsers, but nowadays, most of the search engines
are capable of detecting these types of fraud attempts. Redirect a web page, the several HTTP protocol 3xx series codes
are the most common way. The members of this series have various attributes, such are as follows:
o The number 300 provides various redirect choices. For instance, an option to select alternative languages.
o The number 301 indicates when a site is moved permanently. For example, when the name of a business has
changed.
o The number 302 is used for an unspecified redirect.
o 303 display the output of CGI (common gateway interface) scripts.
o 307 is used, when a site is to be redesigned.
The website address obtains a new URL when a website visitor is redirected to a newly named website URL. Businesses
often change their website's homepage into a redirect page. They transform page with a concurrent message briefly
describing the redirect. A meta tag is embedded into the website's source code behind the scenes. The regular visitors
of the website will receive an error message "404 - Not Found" without a redirect.
Different types of redirects
1. 301 Redirect
It is a permanent type of unmasked redirect that instructs web browsers to move from one site destination to another
automatically. It is one of the most common and searches engine-friendly method for implementing redirects. It should
be used when your website was permanently moved to the new address.
2. The redirect can also be used in some programming languages like PHP; programmers can use a canonical 301
redirect to perform a change for many pages in a domain. Furthermore, the 301 redirect passes over 90% of the link
juice; thus, it is also beneficial for SEO purposes.
3. 302 Redirect
It is a temporary type of unmasked redirect and not widely used. It is a name for an HTTP status code that is used when
a certain URL has been changed temporarily to a different address. Search engines will not index the destination URL,
index the original URL, and display it in search results. The browser is redirected from one URL to another with the help
of 302 redirects. Additionally, it is characterized as a permanent redirect and based on a different HTTP status code. In
many cases, it can return a cleaner and simpler URL for users. To use 302 redirects, other technologies and different
search engines have their own specific strategies.
4. 303 Redirect
A 303 redirect is also known as HTTP 303 that is a response to an HTTP status code. It is a specific type of redirect as a
response to a request for a URI (Unified Resource Identifier). It also has its own syntax; the W3C specifies to use a GET
method to access the desired destination if a request for a different URI.
When should be used a redirect?
1. You have duplicate content
Duplicate content is that it appears more than once on the page. There are multiple pages on Google that contain
duplicate content. In this situation, it is difficult for Google to understand which page is the correct one. You can use a
301 redirect on the duplicate piece of content to direct to the original page. It will create a better experience for your
users and help to improve your search engine rankings.
ADVERTISEMENT
ADVERTISING
ADVERTISEMENT
2. You have changed your domain
The use of redirect is useful when you are making change your domain name and probably do not want to lose any
built links.
3. You have multiple domains
To protect the online brand, some people purchase multiple domain names. So, they will need to redirect any of the
old domain to the new domain. Many companies do this to gain additional traffic from common misspellings. Also, they
can prevent competitors from buying a similar domain and can redirect them to their own site.
Malware
Malware is a software that is specifically designed to disrupt, damage, or gain authorized access to a computer system.
The common types of malware are:
o Adware: Displays ads while a program is running.
o Spyware: Tracking software. For instance, spyware can be installed on computers to track employees’ browsing
activities.
o Virus: A contagious program or code that attaches itself to another piece of software, and then reproduces
itself when that software is run. It is spread by sharing software or files between computers.
o Worm: A program that replicates itself and destroys data and files on the computer just like a worm eats
leaves.
o Trojan: The most dangerous software used to obtain personal information.
o Rootkit: Enables an unauthorized user to gain control of a computer system without being detected.
o Backdoors or trap – doors: Provides a hidden method of bypassing security to gain access to a restricted part of
a computer system for hackers or other malware.
o Key (stroke) loggers: Used to acquire computer usage information. Parents can install a key logger to monitor
their children’s activity on the internet.
o Rogue security software: A Wolf in sheep’s clothing – It pretends to be a good program to remove Malware
infections, but all the while it is the Malware and turns off the real antivirus program.
o Ransomware: Blocks access to a computer system until a sum of money is paid. Recent ransomware
attacks – Wannacry and Petya (Petwrap)
o Browser hijacker: Changes your computer’s browser settings so that you are redirected to Web sites that you
had no intention of visiting.
How does malware infect your PC?
o Spam emails – When the attachments of spam emails are opened, the malicious files get installed on the
computer. Petya ransomware attack used this method to install the malware.
o Infected removable drives – Many worms spread by infecting removable drives such as USB flash drives or
external hard drives. The malware can be automatically installed when you connect the infected drive to your
PC. Some worms can also spread by infecting PCs connected to the same network.
o Bundled with other software – Some malware can be installed at the same time as other programs that you
download. This includes software from third-party websites or files shared through peer-to-peer networks.
o Hacked or compromised web pages – Software vulnerabilities of your software can give malware access to
your PC. When you go to a website, it can try to use those vulnerabilities to infect your PC with malware. The
website might be malicious or it could be a legitimate website that has been compromised or hacked. Beware
of web pages allowing free downloads of pirated copies!
o Malware – Some types of malware can download other threats to your PC. Once these threats are installed on
your PC they will continue to download more threats.
Antivirus
Anti-virus software is a program or set of programs that are designed to prevent, search for, detect, and remove
software viruses, and other malicious software like worms, trojans, adware, and more. For Instance – Kaspersky,
McAfee, Norton, AVG, Panda, Microsoft Security Essentials
Cybersecurity is the body of technologies, processes, and practices designed to protect networks, computers,
programs, and data from attack, damage, or unauthorized access. Many countries have a computer emergency
response team (CERT) to handle computer security incidents.
Indian Computer Emergency Response Team (ICERT or CERT-In), under the Department of Information Technology of
Ministry of Communications and Information Technology, has been designated under Section 70B of Information
Technology (Amendment) Act 2008 to serve as the national agency to perform the following functions in the area of
cyber security:
o Collection, analysis, and dissemination of information on cyber incidents
o Forecast and alerts of cyber security incidents
o Emergency measures for handling cyber security incidents
o Coordination of cyber incident response activities
o Issue guidelines, advisories, vulnerability notes, and white papers relating to information security practices,
procedures, prevention, response, and reporting of cyber incidents
Advantages and Disadvantages of Internet
Advantages
The Internet incorporates almost every aspect of life, one can imagine. Here, we will discuss some of the advantages of
the Internet:
1. The Internet enables us to “interact” with people at remote locations. There are various applications ready on
the web that utilize the Internet as a medium for communication.
2. The Internet provides “easy access to information” as anything and everything is available online nowadays.
3. With the Internet, it has become convenient to learn about new things, technologies and more at any point in
time and get details on various subjects(Technology, Health & Science, News and much more), irrespective of
time and place.
4. Apart from communication and source of information, the internet also works as a medium for entertainment
and services. Some of the examples are internet banking, online shopping, e-mail, online bill payment, ticket
booking, data Sharing, online television, games, social networking apps, and so on.
5. With the advancement of technology, the Internet has evolved as a platform for online education and job
searching through various means.
6. Social media has lessened the gap between people as communication has become much easier because of the
Internet connection.
With the Internet being an extremely necessary part of our daily life, a user must be well aware of the limitations of the
Internet and its excess usage.
Disadvantages
Though the Internet has emerged as a powerful medium of information in almost every domain, yet there are
associated disadvantages of the internet as discussed below:
1. The dependency of users for looking at things and information online has grown massively since the
introduction of the Internet and its easy access, this sometimes also leads to the possibility to lose personal
information such as an address, name, credit card number, and other essential information. Therefore users
must provide the essential details to authenticated websites.
2. The spread of the virus to computers connected to the internet is a very common disadvantage of the internet.
Such virus attacks may even lead to the user’s system crash or the important data may get destroyed. In such a
case the user must ensure to have a strong antivirus installed in the system.
3. People do not just employ the internet for learning purposes, cybercrime has also stood at a distinctive high
because of the easy availability of resources.
4. Another drawback is Spamming. Spamming corresponds to undesired emails in bulk. These emails serve no
purpose and drive to obstruction of the entire system.
5. As the information on the internet is very easily available, this does not imply the authenticity of the
information which many a time leads to misconception among users.