0% found this document useful (0 votes)
83 views23 pages

Internet

internet related topics

Uploaded by

shawntel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
83 views23 pages

Internet

internet related topics

Uploaded by

shawntel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 23

Introduction to Internet

Internet is a global communication system that links together thousands of individual networks. It allows exchange of
information between two or more computers on a network. Thus internet helps in transfer of messages through mail,
chat, video & audio conference, etc. It has become mandatory for day-to-day activities: bills payment, online shopping
and surfing, tutoring, working, communicating with peers, etc. Internet was evolved in 1969, under the project called
ARPANET (Advanced Research Projects Agency Network) to connect computers at different universities and U.S.
defence. Soon after the people from different backgrounds such as engineers, scientists, students and researchers
started using the network for exchanging information and messages. In 1990s the internet working of ARPANET, NSFnet
and other private networks resulted into Internet. Therefore, Internet is a global network of computer networks’ . It
comprises of millions of computing devices that carry and transfer volumes of information from one device to the
other. Desktop computers, mainframes, GPS units, cell phones, car alarms, video game consoles, are connected to the
Net.

How Do I Connect to the Internet?


 Computer
 Connection - Phone Line, Cable, DSL, Wireless,
 Modem
 Network Software - TCP/IP
 Application Software - Web Browser, Email,
 Internet Service Provider (ISP)
What Can I Do on the Internet?
 Send and receive email messages.
 Download free software with FTP (File Transfer Protocol).
 Post our opinion to a Usenet newsgroup.
 Surf the World Wide Web.

World Wide Web(WWW)


The World Wide Web (WWW) or web is an internet based service, which uses common set of rules known as
protocols, to distribute documents across the Internet in a standard way. World Wide Web, which is also known as a
Web, is a collection of websites or web pages stored in web servers and connected to local computers through the
internet.
These websites contain text pages, digital images, audios, videos, etc. Users can access the content of these
sites from any part of the world over the internet using their devices such as computers, laptops, cell phones, etc. The
WWW, along with internet, enables the retrieval and display of text and media to your device. The World Wide Web.
Or ‘Web’ is a part of the Internet.
The Web is viewed through web browser software such as Google chrome, Internet Explorer, Mozilla Firefox
etc. Using browsers one can access the digital libraries containing innumerable articles, journals, e-books, news,
tutorials stored in the form of web pages on computers around the world called web servers-Today thousands of web
pages/websites are added to the WWW every hour.

 The Web was invented in 1991 by Tim Berners-Lee, while consulting at CERN (European Organization for Nuclear
Research) in Switzerland.
 The Web is a distributed information system.
 The Web contains multimedia.
 Information in the Web is connected by hyperlinks

Difference between Internet and WWW:


The Internet is known as “interconnection of computer networks”. The Internet is a massive network of
networks. It connects millions of computers together globally, forming a network in which any computer can
communicate with any other computer as long as they are both connected to the Internet. Information that travels
over the Internet does so via a variety of languages known as protocols.
The World Wide Web, or “Web” for short, or simply Web, is a massive collection of digital pages to access
information over the Internet. The Web uses the HTTP protocol, to transmit data and allows applications to
communicate in order to exchange business logic. The Web also uses browsers, such as Internet Explorer or Firefox. to
access web documents called Web pages that are linked to each other via hyperlinks. Web documents also contain
graphics, sounds, text and video.
Hardware and Software Requirements
The internet is mostly responsible for our daily activities, communication, and entertainment. You must have a
computer system with some additional functions in order to use the Internet. It is a multimedia computer system
because it has features like speakers, headphones, a microphone, etc. To connect to the internet, all you require is a
modem, a wireless router, a computer or smartphone, and an internet connection from an internet service provider.
Hardware Requirements of the Internet Any one of the following must be present in order to connect to the
Internet.The Internet is connected over a telephone connection using a Modem. The most crucial piece of hardware
needed to connect to the Internet is the NIC - Network Interface Card (wired/wireless) facility.
For instance, the laptop might be tethered or wirelessly connected to the internet.Utilising a cellular network,
a dongle is used to connect to the Internet.A Wi-Fi router or hotspot is used when using a wireless network to access
the Internet.Cellular network-capable electronic device.Internet connectivity through wired and wireless (cellular)
networks, cable TV, ISDN, DSL, and dial-up connections.
Hardware Requirements for InternetSoftware PrerequisitesThe operating system should support the TCP/IP
(Transfer Control Protocol) and HTTP (HyperText Transfer Protocol Secure) protocols, as well as SMTP (Simple Mail
Transfer Protocol), FTP (File Transfer Protocol), and HTTP (HyperText Transfer Protocol).Access to web apps like
Outlook, Gmail, Whatsapp, Facebook, Twitter, and others through browsers and other Internet clients.
Software Requirements to set up InternetOther Requirements for Internet Connection SetupYou require a
computer, a connecting device, and an ISP in order to access the internet (ISP). An ISP is a firm that connects people,
companies, and organisations to the internet. Additionally, it could offer services like storage space for your personal
data. A personal computer, a laptop, a tablet, or a hand-held device like a smartphone can be a computing
device.Additionally, you'll want a network connection device of some kind. This may be a router linked to your phone
line, a wireless network or a network provided by a mobile phone operator.
Usually, the item you need to connect is already incorporated into your computer equipment, but it can also be
externally linked. You connect to your ISP via this connection.You can physically connect to your network connection
device using a cable or a wireless method. This wireless method will often use the Wi-Fi protocol. The Wi-Fi standard is
compatible with the majority of wireless devices.
Requirements to Set-up InternetTypes of Equipment Required to Set Up Internet ConnectionTo connect to the
Internet, the following tools are needed:A modemA phone line A multimedia PCModem: You don't need a lot of extra
gear to connect to the Internet once you have your computer. A modem is the main piece of gear you require. The
modem you require depends on the type of Internet access you select.

ModemRouter: A router is a piece of hardware that enables you to create a home network or many computers
and other devices connected to a single Internet connection. You may build a home wireless network, sometimes
known as a Wi-Fi network, because many routers are wireless.

What is the Internet?


Internet is a global network that connects billions of computers across the world with each other and to the World
Wide Web. It uses standard internet protocol suite (TCP/IP) to connect billions of computer users worldwide. It is set up
by using cables such as optical fibers and other wireless and networking technologies. At present, internet is the fastest
mean of sending or exchanging information and data between computers across the world.

It is believed that the internet was developed by "Defense Advanced Projects Agency" (DARPA) department of the
United States. And, it was first connected in 1969.
Why is the Internet Called a Network?
Internet is called a network as it creates a network by connecting computers and servers across the world using
routers, switches and telephone lines, and other communication devices and channels. So, it can be considered a global
network of physical cables such as copper telephone wires, fiber optic cables, tv cables, etc. Furthermore, even wireless
connections like 3G, 4G, or Wi-Fi make use of these cables to access the Internet.
Internet is different from the World Wide Web as the World Wide Web is a network of computers and servers created
by connecting them through the internet. So, the internet is the backbone of the web as it provides the technical
infrastructure to establish the WWW and acts as a medium to transmit information from one computer to another
computer. It uses web browsers to display the information on the client, which it fetches from web servers.
The internet is not owned by a single person or organization entirely. It is a concept based on physical infrastructure
that connects networks with other networks to create a global network of billions of computers. As of 12 August 2016,
there were more than 300 crores of internet users across the world.
Set Up
Physical copper or optical fiber data transmission cables, as well as other networking technologies like LAN, WAN, and
MAN, are used to set up the internet. Even the 2g, 3g, and 4g services, as well as Wi-Fi, need this physical cable
arrangement in order to access the Internet connection. The Internet Corporation for Assigned Names and Numbers
(ICANN), a US-based organization, is in charge of overseeing the management of the Internet and its related protocols,
including IP addresses.
How does internet work?
Before understanding this let us understand some basics related to internet:
The internet works with the help of clients and servers. A device such as a laptop, which is connected to the internet is
called a client, not a server as it is not directly connected to the internet. However, it is indirectly connected to the
internet through an Internet Service Provider (ISP) and is identified by an IP address, which is a string of numbers. Just
like you have an address for your home that uniquely identifies your home, an IP address acts as the shipping address
of your device. The IP address is provided by your ISP, and you can see what IP address your ISP has given to your
system.
A server is a large computer that stores websites. It also has an IP address. A place where a large number of servers are
stored is called a data center. The server accepts requests send by the client through a browser over a network
(internet) and responds accordingly.
To access the internet we need a domain name, which represents an IP address number, i.e., each IP address has been
assigned a domain name. For example, youtube.com, facebook.com, paypal.com are used to represent the IP
addresses. Domain names are created as it is difficult for a person to remember a long string of numbers. However,
internet does not understand the domain name, it understands the IP address, so when you enter the domain name in
the browser search bar, the internet has to get the IP addresses of this domain name from a huge phone book, which is
known as DNS (Domain Name Server).
For example, if you have a person's name, you can find his phone number in a phone book by searching his name. The
internet uses the DNS server in the same way to find the IP address of the domain name. DNS servers are managed by
ISPs or similar organizations.
Now after understanding the basics, let us see how internet works?

When you turn on your computer and type a domain name in the browser search bar, your browser sends a request to
the DNS server to get the corresponding IP address. After getting the IP address, the browser forwards the request to
the respective server.
Once the server gets the request to provide information about a particular website, the data starts flowing. The data is
transferred through the optical fiber cables in digital format or in the form of light pulses. As the servers are placed at
distant places, the data may have to travel thousands of miles through optical fiber cable to reach your computer.
The optical fiber is connected to a router, which converts the light signals into electrical signals. These electrical signals
are transmitted to your laptop using an Ethernet cable. Thus, you receive the desired information through the internet,
which is actually a cable that connects you with the server.
Furthermore, if you are using wireless internet using wifi or mobile data, the signals from the optical cable are first sent
to a cell tower and from where it reaches to your cell phone in the form of electromagnetic waves.
The internet is managed by ICANN (Internet Corporation for Assigned Names and Numbers) located in the USA. It
manages IP addresses assignment, domain name registration, etc.
The data transfer is very fast on the internet. The moment you press enter you get the information from a server
located thousands of miles away from you. The reason for this speed is that the data is sent in the binary form (0, 1),
and these zeros and ones are divided into small pieces called packets, which can be sent at high speed.
Uses of the internet
Generally speaking, the Internet may be used to exchange information with people all over the world, communicate
across great distances, and locate information or answers fast on almost any subject.
Here are some examples of specific uses for the Internet:
o Using social media and content sharing.
o Instant messaging, video conferencing, Internet Relay Chat (IRC), Internet telephony, and email are all
examples of electronic communication. These all are used through the Internet.
o Access to online degree programs, courses, and workshops for education and self-improvement.
o Searching for jobs: To advertise available positions, submit job applications, and hire candidates identified on
social networking sites like LinkedIn, both employers and applicants use the Internet.
Other examples include:
o Online dating
o Online gaming
o Research
o Reading electronic newspapers and magazines
o Online shopping, or e-commerce.
o Online discussion groups and forums
Difference between the World Wide Web and the Internet
The World Wide Web (also known as the Web) and the Internet are fundamentally dissimilar from one another because
the Web is a collection of information that can be accessed using the Internet, whereas the Internet is a global network
of networks that offers access to almost all types of information. In other words, the Web is a service that was added to
the Internet's foundation.
The Web is the part of the Internet that gets the greatest traffic. One unique aspect of this is hypertext, a rapid cross-
referencing method. The majority of websites feature text that highlights keywords or phrases by being a different
color than the rest of the text. When a user selects one of these words or phrases, they will be sent to the chosen
website or page. Buttons, graphics, and even particular areas of images are also utilized as hyperlinks.
On the Internet, there are billions of pages of information. The most popular web browsers are Google Chrome, Firefox,
and Internet Explorer. A web browser is used to surf the internet or do online browsing. A certain Web site's look may
vary slightly depending on the browser being used. A certain browser's later or more updated versions have the
potential to render more complicated features like music files, sound, animation, and virtual reality.
Security and the Internet
Due to the volume of private and public information collected online, customers are at risk for security attacks and data
breaches. Crackers and hackers have access to networks and systems, and they are able to steal personal data, such as
login passwords or information on bank and credit card accounts. Among the steps that may be taken to protect online
privacy are:
o You can install antivirus and antimalware on your system.
o Generating complex, unique passwords that are impossible to decipher by anyone.
o A virtual private network (VPN) can be used, or at least a private browsing mode like the Incognito window in
Google Chrome.
o Only using HTTPS
o Keep private your all-social media accounts.
o Deactivate the autofill feature.
o Turn off the GPS of the device.
o Instead of just closing the tab or window, log out of accounts.
o Update cookies so that if a cookie is set, an alert is sent anytime.
o Spam emails should be avoided, and never open or download files from sources you are not aware of.
o Need to use caution when using hotspots or public Wi-Fi.
Furthermore, the "dark web" is an additional component of the Internet. Standard browsers do not allow users to
access the dark web, which is hidden. It instead makes use of the Tor and I2P browsers, which let users maintain
complete anonymity. While this anonymity can be a fantastic way to safeguard a user's security and freedom of speech
online or for the government to conceal confidential information, the dark web also fosters an environment that makes
cybercrime, the transfer of illicit commodities, and terrorism easier.
Social impact of the Internet
Both positive and negative effects of the Internet on society can be observed. On the one hand, some people claim that
the Internet has raised the risk of withdrawal, social exclusion, alienation, and citing a rise in FOMO, or the fear of
missing out, as evidence. On the other hand, some people also believe that the Internet has had the opposite impact on
society, increasing sociability, civic participation, and the depth of connections.
The Internet has changed how society communicates and interacts, whether the effects are positive or negative on
society. The increased focus on personal growth is one example of change and the fall in a community that is
determined by space, job, and family. People increasingly now build social connections on the basis of their unique
projects, values, as well as interests. In addition to offline and in person, communities are being created by like-minded
people through the Internet and the abundance of online settings it provides and produces. Social networking sites like
Facebook and LinkedIn are the preferred platforms for both businesses and individuals wishing to carry out various
tasks and connect with others.
Internet Connection Protocols
Protocols are a set of guidelines that aid in regulating the operation of any specific organization or technology.
Three main categories of Internet Connection Protocols are discussed below:
o TCP/IP Network Model: The most popular protocols for linking networks are Transmission Control Protocol
(TCP) and Internet Protocol (IP). Any communication is split up into a number of packets that are sent from
source to destination.
o File Transfer Protocol: With the help of FTP (File Transfer Protocol), a user can transfer documents, text files,
multimedia files, program files, etc., from one device to another.
o Hypertext Transfer Protocol: It is used to move a hypertext between two or more computers or other devices.
Links can be made using HTML tags and can take the form of text or graphics.
History of the Internet
The forerunner of the Internet, the ARPANet, went live for the first time in 1969. The TCP/IP, open networking protocol
suite, was adopted by the ARPANet in 1983, and the National Science Foundation Network (NSFN) developed the
network to link university computer science departments across the US in 1985.
When the hypertext transfer protocol (HTTP) was developed in 1989, it enabled different computer platforms to
connect to the same Internet sites, which dramatically improved communications over the network. The Mosaic Web
browser was developed in 1993.
Over the years of its existence, the Internet has remained a constant growth and development. For instance, IPv6 was
created to provide for a significant future rise in the number of IP addresses that could be used. In a related
development, the Internet of Things (IoT) refers to the rapidly developing environment where nearly any entity or
device can be given a unique identifier (UID) and the capability to communicate data automatically over the Internet.
Advantages of the Internet:
o Instant Messaging: You can send messages or communicate to anyone using internet, such as email, voice chat,
video conferencing, etc.
o Get directions: Using GPS technology, you can get directions to almost every place in a city, country, etc. You
can find restaurants, malls, or any other service near your location.
o Online Shopping: It allows you to shop online such as you can be clothes, shoes, book movie tickets, railway
tickets, flight tickets, and more.
o Pay Bills: You can pay your bills online, such as electricity bills, gas bills, college fees, etc.
o Online Banking: It allows you to use internet banking in which you can check your balance, receive or transfer
money, get a statement, request cheque-book, etc.
o Online Selling: You can sell your products or services online. It helps you reach more customers and thus
increases your sales and profit.
o Work from Home: In case you need to work from home, you can do it using a system with internet access.
Today, many companies allow their employees to work from home.
o Entertainment: You can listen to online music, watch videos or movies, play online games.
o Cloud computing: It enables you to connect your computers and internet-enabled devices to cloud services
such as cloud storage, cloud computing, etc.
o Career building: You can search for jobs online on different job portals and send you CV through email if
required.
Disadvantages of the Internet
o Time wastage: Although, Internet has a lot of advantages, it also contains some limitations. Time wasting is one
of among them. It can decrease your productivity if you are spending too much time on the Internet using
social media apps while doing nothing. Rather than squandering time, one should use that time to do
something useful and even more productive.
o Bad impacts on health: You can get health related issues if you spend too much time online; your body needs
outside activities, exercise, and many other things. If you look at the screen for a long time, it causes negative
effects on the eyes.
o Cyber Crimes: These days, crimes including cyberbullying, spam, viruses, hacking, and data theft are increasing
day by day. Cybercriminals can quickly break into your system, which store all of your private information.
o Effects on children: The constant watching of videos and playing games on the Internet by young children is
bad for their social and overall personality development.
o Bullying and spreading negativity: Social media applications have provided a free tool to all those people who
regularly attempt to spread negativity with really repulsive and humiliating comments and try to bully each
other, which is wrong and does bad impact on society.
Different ways to Connect to the Internet
The various methods for connecting to the Internet are briefly discussed below:
o Dial-Up: Users must connect their phone line to a computer system in such connections in order to access the
Internet connection. The user is unable to make or receive calls using the tier home phone service while
connected.
o Broadband: Today's most popular high-speed internet connection, broadband is offered either by cable or
phone companies.
o Wireless Connection: This category includes Mobile and Wi-Fi services providers. No matter where you are, you
can connect to the Internet anywhere because connectivity is made possible by radio waves. Several instances
of wireless connections are provided below:
o Wi-fi: Without the use of cables, wi-fi or wireless fidelity, enables high-speed internet connectivity.
o Mobile Phones: In modern times, all smartphones include an Internet connectivity option that can be availed
using Internet packs and coupons. These don't require a wire or external connection as well.
o Satellite: Satellites are utilized for wireless Internet connectivity in areas Where broadband connections is not
available.
o Integrated Services Digital Network: With the help of using telephone lines, ISDN enables users to send audio
or video data.
Other things you can do on the Internet
The ability to communicate with anyone in the world virtually immediately is one of the best features of the Internet.
With billions of users worldwide, email is one of the most established and widely used methods of online
communication as well as information sharing with others. People can communicate with each other in a number of
ways and create online communities with the help of using social media platforms.

Also, you can use the Internet for a variety of additional purposes. There are multiple ways to stay up to date on news
and do online shopping. You can take care of your financial affairs, meet new people, watch TV, or enhance new skills.
With the help of Internet, you can do or learn anything online.

Intranet
The intranet is a private network that belongs to a particular organization. It is designed for the exclusive use of an
organization and its associates, such as employees, customers, and other authorized people. It offers a secure platform
to convey information and share data with authorized users. Confidential information, database, links, forms, and
applications can be made available to the staff through the intranet. So, it is like a private internet or an internal
website that is operating within an organization to provide its employees access to its information and records. Each
computer in intranet is identified by a unique IP Address.

It is based on internet protocols (TCP/IP) and is protected from unauthorized access with firewalls and other security
systems. The firewall monitors the incoming and outgoing data packets to ensure they don't contain unauthorized
requests. So, users on the intranet can access the internet, but the internet users can't access the intranet if they are
not authorized for it. Furthermore, to access the intranet, the authorized user is required to be connected to
its LAN (Local Area Network).
Benefits of the intranet:
Some of the benefits of the intranet are:
o It is cheap and easy to implement and run, and is more safe than the internet and extranet.
o It streamlines communication that enables the company to share its data, information, and other resources
among employees without any delay. The entire staff can receive company's announcements, ask questions,
and access internal documents.
o It provides a secure space to store and develop applications to support business operations.
o It improves the efficiency of the company by speeding up workflow and reducing errors. Thus, it helps achieve
targets by completing the tasks on time.
o It offers a testing platform for new ideas before they are uploaded on the company's internet webpage. Thus, it
helps maintain the credibility of the company
o Information is shared in real-time, or updates are reflected immediately to all the authorized users.
o Modern intranets also offer a mobile app that allows employees to stay connected on the go.
o It aids in project management and tracking workflow and teams' progress.
o It can work with mobile devices, which means it can provide information that exists on intranet directly to
mobile devices of employees such as phones, tablets, etc.
o It can also be used to motivate employees, facilitate employee recognition, and to reward them for performing
beyond expectations.

Extranet
Extranet is a part of an organization's intranet. It is a communication network that is based on internet protocols
(TCP/IP). It provides controlled access to firm's intranet to its trading partners, customers, and other businesses. So, it is
a private network that securely shares internal information and operations of a firm with authorized people outside the
firm without giving access to the company's entire network. The users are required to have IDs, passwords, and other
authentication mechanisms to access this network.

Some of the benefits of extranet:


o It acts as a single interface between the company and its trading partners.
o It automates the firm's processes like automatically places an order with suppliers when inventory drops.
o It improves customer service by providing customers a platform to resolve their queries and complaints.
o It enables the firm to share information with trading partners without engaging in paper-based publishing
processes.
o It streamlines business processes that are repetitive in nature, such as ordering from a vendor on a regular
basis.
How is Extranet Established?
It is set up in the form of a Virtual Private Network as it is prone to security threats due to the use of the internet to
connect outsiders to an organization's intranet. VPN can assure you a safe network in a public network such as the
internet. The transmission control protocol (TCP) and internet protocol (IP) are used for the data transfer.
VPN assures secure transactions based on Internet Protocol Security Architecture (IPSEC) protocol as it provides an
extra security layer to TCP/IP protocol, which is used for data transfer in the extranet. In this layer, the IP packet is
encapsulated to form a new IP packet, as shown below:

Furthermore, to provide more security to Intranet, the following two measures are also taken by an organization:
o Firewall: It prevents unauthorized users from accessing the extranet.
o Passwords: It also prevents unauthorized users, including the company's employees from accessing the data
stored on its server.
Limitations of Extranet:
o Hosting: If you host extranet pages on your own server, it requires a high bandwidth internet connection,
which is may be very expensive.
o Security: You need extra firewall security if you host it on your own server. It increases the workload and makes
security mechanism very complex.
o Dependency: It is dependent on the internet as outsiders cannot access information without using the internet.
o Less Interaction: It reduces the face to face interaction between customers, business partners, vendors, etc.,
which results in poor relationship building.

Difference between Intranet and Extranet:


Intranet Extranet
It is a private network, which cannot be It may not be called a private network, as it can be assessed
accessed externally. externally. It provides limited access to authorized outside-users such
as vendors, partners, etc.
It connects the employees of the It connects the company's employees with partners.
company.
It is an independent network, not a part It is an additional part of company's Intranet.
or extension of any other network.
Communication takes place only within External users such as suppliers, customers, and partners are allowed
the organization that owns the network. to be a part of intranet to get information, updates, about the
organization.

Website
Website is a collection of related web pages that may contain text, images, audio, and video, etc. The first page of a
website is called a home page. Each website has a specific internet address (URL) that you need to enter in your
browser to access a website.
A website is hosted on one or more servers and can be accessed by visiting its homepage using a computer network. A
website is managed by its owner that can be an individual, company, or organization.
The first website was introduced on 6 August 1991. It was developed by Tim Berners-Lee at CERN. As of January 2018,
there were around 1.7 billion websites on the internet.
What is the need for a website?
A popular website is another name of success in modern times as today we are living in a digital world where people
are spending most of their spare time on internet browsing news, images, videos, and more. A website is the first thing
that appears on the screen of your laptop when you search for a product or service, or any other information online.
So, it is very important to have a website whether you are a businessman, organization, online store, etc. Let us
understand how a website can help you grow your business!
The benefits of having a website are as follows:
1. Cost-effective: The marketing of products and services through a website is less costly than print advertising, TV, and
radio advertising. It also allows you to make changes related to your products and services such as you can edit
products' specifications, features, discount offers, etc.
2. Broder demographic reach: A website can help your business reach people with diverse backgrounds throughout the
world.
3. Business credibility: Having a website that is user-friendly and professional looking for your business makes people
consider your business more credible than others who don't have a website to represent their businesses online.
4. 24/7 availability: You can keep your products available for sale around the clock through a website. Customers can
buy anytime, and thus you can earn more profits than a traditional storefront.
5. Consumer convenience: It improves the shopping experience of your customers; they can buy your products from
the comfort of their home.
6. Build customer rapport: Online presence helps you build and maintain a rapport among your customers. You can
also introduce special offers or discounts for your loyal customers.
7. Improves productivity: It saves your time as you don't need to explain your products or services to each customer
separately, as all the information is already available on the website.
8. Educate your customers: You can educate people about the benefits of your products and can show them how they
are betters than the competitors' products.
9. Change location: You can move your business to another location without affecting your sales as customers still can
find you through your website.
10. Grow manpower: You can post job openings for vacant positions and allow applicants to check job descriptions and
apply online.
11: Personalized email address: It allows you to set up personalized email addresses for employees, companies,
partners, etc. You can receive mails on these mail ids and reply accordingly. Furthermore, you can share offers, happy
hours, updates, and can get feedback through email.
12. Improve customer service: It allows you to improve customer services such as you can share phone numbers to
contact you, and display other relevant information such as order status, delivery status, refund or replacement
procedure, etc.
Types of Websites:
A website can be of two types based on the type of webpages:
o Static Website
o Dynamic Website
Static website
A static website, as the name suggests, is a website in which pages do not change or remain the same. It is the basic
type of website that is easy to create, maintain, and host. You don't need web programming and database design to
create a static website. Its webpages are coded in HTML. The codes are fixed for each page, so the information
contained in the page does not change, and it looks like a printed page. However, changes can be made by changing the
codes if required.
You can think of it as a brochure for a business that has the same information for every user. So, all users see the same
information irrespective of their location, interests, etc., when they open a particular page of a static website.
In the case of a static website, the content or webpage is taken directly form the file stored in the server without
requiring any interpreter (application software) to interact with a database to fetch data from the database. So,
database and server-site scripting are not required in static websites.

Benefits of a Static Website:


o It takes less time to create a static website.
o It is less costly to develop this website.
o The webpages are delivered at high speed by the servers.
o Hosting through dedicated servers is available at a low price.
o It is more secure than dynamic sites as it does not rely on CMS plugins and server-side scripting.

Dynamic website
A dynamic website is a collection of dynamic web pages whose content changes dynamically. It accesses content from a
database or Content Management System (CMS). Therefore, when you alter or update the content of the database, the
content of the website is also altered or updated.
A dynamic website uses client-side scripting or server-side scripting, or both to generate the dynamic content. For
example, when a browser sends a request to the server, the server contacts the application server with further
interacts with the database server to fetch the content, which is customized as per the user's requests and
requirements. For example, a Facebook page may appear different to different users as per their friends' list, interests,
location, etc.
Benefits of a Dynamic Website:
1. It is very quick and easy to make changes in a dynamic website as it is integrated with high-end programming.
2. The webpages are easier to maintain despite of being full of information and graphics.
3. E-commerce sites are dynamic as they need to be impressive and have easy navigation from one page to other
pages.
4. It makes your site look professional.
5. The users can get customized information as per their interests, needs, and profile, etc. For example,
facebook.com, flipkart.com, etc.
Difference between Static Website and Dynamic Website:
Static Website Dynamic Website
As the name suggests, Its webpages do not As the name suggests, the webpages keep changing as per
change in terms of design, content, etc. The users' requirements such as Facebook profile pages and an E-
information or content remains the same. commerce site. So, the content does not remain the same.
It mainly uses HTML and CSS and does not It requires server-side scripting, application server, and
require server-side scripting, application server, database to create and send dynamic webpages to the client.
and database.
It has a limited number of pages. It may contain thousands of pages in the database.
Its hosting cost is low, as HTML files need less Its hosting cost is higher as dynamic pages need more space
space on the server. on the server.
It requires low maintenance. It requires high maintenance.
It loads quickly as it involves the use of mark-up It takes more time to load due to the more processing time.
languages to create a webpage.
It lacks the Content management feature. It makes use of the Content Management Feature.
The content of the webpage cannot be changed The webpage content can be changed during runtime.
during runtime.
It does not require interaction with a database. Interaction with the database occurs.
It is more secure or fewer chances of it getting It is less secure and may get hacked easily as it uses many
hacked as it doesn't use plugins. plugins and content sources.
It is more reliable, e.g., whenever the server is It is less reliable, as it may go down for hours if the server
down, it is redirected to other nearby nodes. breaks down.

Types of Websites based on their purpose, target audience, etc.


1. Blog: It is a type of website that provides information or in which posts are added regularly in reverse chronological
order, latest post or entries on top of the main page, and old ones towards the bottom. A blog is usually owned by a
single person or a small group of people.
The content in a blog is written in an informal or conversational style and can be focused on one subject or a wide
range of related subjects. Furthermore, the posts are organized into categories if required, e.g., posts that provide
similar information can be kept in a separate category.
The content of a blog is generally referred to as a blog post, and it generally appears as posts on a streaming page. The
information is regularly updated in a blog, e.g., articles, photos, and videos are added on a daily basis to keep readers
engaged and increase the traffic to the blog. It also allows readers to leave a comment about the posts.
2. E-commerce: These types of websites are like online shops where people can buy products through online payment
from the comfort of their home, office, etc. Anyone who wants to sell products online can create an E-commerce site
instead of investing in setting up a traditional brick-and-mortar shop.
3. Informational: These websites are created to provide free online information to users, e.g., tutorials, news, general
knowledge-based sites. Today, you don't need to visit libraries to read a book, newspaper, novel, etc. owing to the
presence of lots of informational sites.
4. Online Community: These sites offer a platform to interact and share ideas with others through internet. You can
find people with similar interests and backgrounds and interact with them to fulfil your objectives that may include
promoting a product or service, taking feedback about your products, or asking questions related to a survey.
5. Social Media: These sites are created to provide users a platform where they can build their personal profiles with a
lot of features such as creating a friend list, sending and accepting friend requests, sending messages, creating and
joining groups, and share information with others users, comment on others' post, pictures, videos, etc.
6. Brochure: It is the simplest type of website which comprises few pages. It is used by small businesses to have a
simple online presence or to provide an overview of their business. Such websites are generally static where the
content does not change, i.e., the same information is displayed to all users.
7. Non-profit: The sites are created to raise money for social causes such as to provide free medical treatment to poor,
free basic education to children, free food to children to prevent malnutrition, etc.
Types of computer network architectures
Computer network architectures are of three types
1) Client-Server architecture
The architecture consists of a system that manages and delivers the services and resources via the network that the
client requests. In the client-server architecture, each and every computer or process on the network is considered as a
client or server. The servers (like computers) perform various operations to satisfy the client's requests.
The main methodology of client-server architecture is as follows:
o Initially, by using the network-enabled device, the client sends the request.
o Further, the network server acquires, agrees to, and processes the request.
o Lastly, the servers dispatch the reply information to the client.
Examples of client-server architecture include Email servers, Web servers.
2) Peer-to-peer architecture
In the Peer-to-Peer (P2P) architecture, linked computers have the same power and status. There is no central server for
processing. Every peer may share some of its resources, like memory and processing power, with the entire computer
network. Unlike the client-server architecture, peer-to-peer is a decentralized system in which files will be transferred
from one system to another without using a central server.
3) Hybrid Network
The hybrid network architecture includes both client-server architecture and peer-to-peer architecture.

The Internet is a huge collection of networks, a networking infrastructure. It encapsulates millions of computers
together globally, forming a network in which any computer can communicate with any other computer as long as they
are both connected to the Internet. In other words, it is a worldwide system of cross-connected computer networks,
connecting millions of devices through which the exchange of information such as data, news, and opinions, etc. is
possible.
It utilizes the TCP/IP (Transmission Control Protocol/Internet Protocol) to aid billions of users across the globe. So,
TCP/IP can be called the backbone of the Internet. It is considered as a network of networks that consists of thousands
of private and public, academic, business, and government interconnections.
Through the article, we shall learn about what is the internet? its evolution, advantages, and disadvantages followed by
the various protocols used by the internet, and various services provided by the internet.
Know more about Computer Networks here.
Internet Definition
The Internet is often considered as “The Information Highway”, which implies that there is a straight and clear way of
obtaining information. It connects thousands of computer networks. Each device connected to the Internet is known as
a host and is independent. Through telephone wires, Fiber optical cable, and satellite links, Internet users can share a
variety of information.
Key Points
1. Each device connected to the internet is identified by its unique IP or Internet Protocol address. IP Address is a
unique set of numbers (such as 109.12.31.115) that identifies a computer location.
2. A special computer DNS (Domain Name Server) is employed to provide a name to the IP Address so that the
user can trace a computer by a name.
3. For example, a DNS server will resolve a name http://www.testbook.com to a particular IP address to uniquely
recognize the computer on which this website is hosted.
4. The Internet is available to every user across the globe.
5. ISP or Internet Service Provider helps the users to connect to the internet from home or office via landlines.
Although with the introduction of broadband and Wi-fi connecting to the Internet has gone wireless.
6. A web browser is a software application used for obtaining information on the World Wide Web. Some of the
commonly used web browsers are Google Chrome, Internet Explorer, Mozilla Firefox, etc.

Evolution of Internet
1. The methodology of the Internet was coined in 1969 and has undergone various technological & Infrastructural
amendments that are discussed below:
2. The origin of the Internet came from the concept of the Advanced Research Project Agency Network
(ARPANET) designed by the Department of Defence of The United States. The primary goal of ARPANET was to
facilitate interaction among the different bodies of the government.
3. The next was the evolution of the Transmission Control Protocol (TCP) in the 1980s which enabled different
machines and networks across the world to assemble data packets.
4. With the start of personal computers, the demand for commercial Internet usage progressed and this was the
time when Ethernet and other Local Area Networks came into existence.
5. In 1990 with the introduction of the web browser, the Internet became widely used amongst users.
6. And then the 21st century induced an amalgamation of technology and wireless Internet accessibility for its
users.

Internet Protocols
Transmission Control Protocols (TCP)
TCP is a connection-oriented protocol and allows end-to-end packet delivery. It serves as a backbone for connection.
The Transmission Control Protocol (TCP) functions at the Transport Layer of the OSI Model. TCP is a secure and
connection-oriented protocol.
TCP guarantees reliability by sequencing bytes with a forwarding confirmation number that indicates to the target the
next byte the source expects to receive. It retransmits the bytes not acknowledged in a specified period.
Internet Protocols (IP)
Internet Protocol is a connectionless and unreliable protocol. It does not ensure a guarantee of successful delivery of
data. To make it reliable, it should be paired with reliable protocols such as TCP at the transport layer.
Learn more about Input and Output Devices, here.
User Datagram Protocols (UDP)
Similar to IP, UDP is a connectionless and unreliable protocol. It is not required to make a connection with the host to
transmit the data. As UDP is an unreliable protocol, there is no tool for ensuring that data sent is received.
File Transfer Protocols (FTP)
Program files, text files, multimedia files, documents, etc. can be transferred from one device to another or from one
host to another using FTP. FTP offers the mechanism of creating files by two processes namely Control Process and
Data Transfer Process at both terminals, i.e., at the client as well as a server by establishing two different types of
connections(one for data transfer and another for controlling the information).
Know more about Computer Network, here.
Trivial File Transfer Protocols (TFTP)
Trivial File Transfer Protocol is also employed for the transfer of the files but it carries the files with no authentication.
HyperText Transfer Protocols (HTTP)
HTTP is a communication protocol that illustrates a mechanism for communication between the browser and the
webserver. It is also known as the request and response protocol as the interaction between browser and server takes
place in request and response pairs.
Telnet
Telnet is a protocol applied to log in to remote computers on the internet.
Know more about Computer Abbreviations here.
Internet Services
Internet Services enables us to access a tremendous amount of information such as text, graphics, sound, and software
over the internet. Some of the internet services are as follows:
1. Communication Services: There are multiple Communication Services available that allow the transfer of
information with individuals or groups, some of them are: Electronic Mail; for sending an electronic
message/information across the internet, Telnet; for remote login and more, Internet Relay Chat; real-time
communication all over the world.
2. Information Retrieval Services: There exist numerous Information retrieval services allowing easy access to
information present on the internet for example the File Transfer Protocol (FTP) for transferring the files.
3. Web Services: allows the transfer of information between applications on the web.
4. World Wide Web (WWW): offers a way to reach documents(texts, graphics, audio, video, hyperlinks, etc)
spread over several servers over the internet.
5. Video Conferencing: for video and audio transmission with help of telecommunication technologies.
World Wide Web (WWW)
The World Wide Web, or simply the Web, is a way of accessing information over the medium of the Internet. It is a
communications model and enables the exchange of information over the Internet through HTTP. It was developed
by Tim Berners Lee in 1990.
The Web is just one of the ways that information can be distributed over the Internet. And, we don’t use the Web to
send an email, but the Internet.
Unique Resource Locator (URL):
Just like we have a postal address, resources on the Internet have unique addresses – URL.
A URL has two main components:
o Protocol identifier: For the URL https://testbook.com, the protocol identifier is HTTP.
o Resource name: For the URL https://testbook.com, the resource name is testbook.com.

What Is a Network Protocol?


A network protocol is a mechanism or a set of procedures that enables devices to communicate back and forth across
the internet. In order to communicate together, two devices must support the same protocol or a gateway will need to
be used to translate the communication.
There are three main types of network protocols you need to be aware of:
 Network management protocols – These protocols set out policies designed to monitor, manage and maintain
a network. Examples include SNMP, FTP, POP3 and Telnet.
 Network communication protocols – A group of protocols used to establish rules and formatting (such as
syntax, synchronization and semantics) for exchanging data across a network. Types of network communication
protocols include TCP, UDP, IP, HTTP, IRC, BGP and ARP.
 Network security protocols – Security protocols are protocols that use security measures such as cryptography
and encryption to protect data. Examples include SFTP, SSL and HTTPS.
Network Protocol vs. Internet Protocol
While there are many different types of network protocols, Transmission Control Protocol (TCP) is one of the most
widely used due to its ability to break down data into packets so they can be transferred (you can read more about TCP
further below).
Under the traditional TCP/IP model of networking, TCP is used alongside the Internet Protocol (IP) to identify hosts to
send data across the internet.
Within this model, IP identifies and defines the IP address of devices or applications that data will be forwarded to, and
then TCP routes the data through a network to guide the content to its final destination.
Network Protocol vs. Communication Protocol
Network management and communication protocols are two of the most important types of protocols.
Essentially, communication protocols including TCP/IP and HTTP are designed to enable two devices to exchange data,
whereas network management protocols are designed to help manage and troubleshoot performance.
For example, network management protocols such as Simple Network Management Protocol (SNMP) can monitor and
troubleshoot the connection between an endpoint and the network so that administrators can better understand the
status and availability of infrastructure.
In contrast, communication protocols are mainly concerned with defining formatting and syntax rules to set out a
framework for two devices to exchange data with each other.
Below we’re going to look at nine types of network protocols that empower and drive modern networking.
1. Transmission Control Protocol (TCP) A.K.A. Internet Protocol (IP)
TCP is a protocol that converts data into packets so that it can be sent between a server and a client. Organizations use
TCP to transfer content such as files, text, images and emails because it guarantees that the packets will be delivered
accurately and in the correct order.
It’s worth noting that TCP will establish a connection between the origin and the destination devices before attempting
to transfer data. This three-way handshake is outlined briefly below:
 The client or web browser sends the destination server a Synchronize Sequence Number (SYN).
 The destination server sends an acknowledgement message known as SYN-ACK.
 The origin device receives the SYN-ACK message and generates an ACK acknowledgement message, which
finalizes the connection.
2. User Datagram Protocol (UDP)
UDP is a communication protocol that’s designed to send packets from one device to another on a network. Many
organizations use UDP as an alternative to TCP because it offers higher transfer speeds.
While this increase in speed comes at the cost of accuracy, UDP better supports video/audio streaming services, online
games or voice-over-internet-protocol (VoIP) calls, which can handle some degree of data loss.
Another key difference between the two is that UDP won’t attempt to establish a connection before sending packets on
to the destination. At the same time, it also doesn’t guarantee the delivery of data to the other device.
3. File Transfer Protocol (FTP)
FTP is a network protocol that’s used to transfer files from one device to another over an unencrypted TCP/IP
connection. With FTP, a user can load up a web browser or FTP client such as FileZilla or FTP Voyager and send up to
2GB at once.
Many organizations use FTP because of its ability to send large files or lots of files at once in a way that’s fast and
efficient. Unfortunately, this efficiency comes at the cost of security as FTP transmits all data in plain text.
For this reason, many organizations opt to use a secure version of FTP called File Transfer Protocol Secure Sockets Layer
(FTPS), which functions the same but uses SSL encryption to obscure the transferred data.
4. Hypertext Transfer Protocol (HTTP)
HTTP is a communication protocol that enables systems to communicate on the World Wide Web. With HTTP, a client
will send a hypertext message request to a web server asking for access to the resources needed to load a web page.
The server hosting the content will then respond and enable the client to load all the necessary text, images and videos
featured on the page. HTTP’s request-response cycle is outlined briefly below:
 The client sends an HTTP request message to the web server to request access to the web page content.
 The web server processes the request message.
 The web server sends a response message that includes the requested content or web page.
 The client receives the message and loads the content in the web browser for the end user to view.
There is also an encrypted version of HTTP called HTTPS, which uses SSL/TLS encryption to encrypt requests and
responses so they can’t be accessed by third parties.
5. Simple Network Management Protocol (SNMP)
SNMP is an application layer protocol that’s used to collect management information from devices such as computers,
routers, switchers, firewalls and printers.
Network monitoring platforms often use SNMP to monitor the performance and status of devices throughout a
network in real time.
The protocol works with an SNMP manager or software client sending SNMP GET requests to SNMP-enabled devices.
SNMP-enabled devices each have a local SNMP agent that collects performance data from the device and will forward
this information to the SNMP manager so that an administrator can get a top-down view of performance and status.
6. Internet Control Message Protocol (ICMP)
ICMP is a network protocol that devices use to warn about connectivity issues and errors. ICMP can notify devices that
a forwarded message was too long or arrived out of order, and will issue an error message requesting that the device
resend the content.
Troubleshooting tools such as Ping send ICMP requests to a device and measure the round-trip time, or the time it
takes for the device to respond to the request. The amount of delay in the response can then be used to measure the
quality of the connection.
Other tools such as traceroute use ICMP to troubleshoot and measure the efficiency of network routes, telling the user
how much time it took to traverse from one device to another.
Sometimes, cybercriminals will use the protocol as part of an ICMP flood attack where they attempt to overwhelm a
server with illegitimate ICMP requests to take its computing resources away from the end user.
7. Post Office Protocol (POP)
POP3 is a network protocol that enables a server to retrieve emails from a remote server and download them to the
local device. Whenever the client connects to the server via TCP, it automatically downloads all the new messages to it,
making them accessible to the user both online and off-line.
Email platforms like Microsoft Outlook can use POP3 to collect email messages from remote servers via TCP/IP so that
they’re available off-line.
Under the default setting, all emails are deleted from the server automatically once the download is complete, but the
user can also configure it to store emails on the server for a certain time period.
8. Internet Message Access Protocol (IMAP)
IMAP is another protocol that’s used for retrieving emails. With IMAP, whenever a user clicks on an email, it isn’t
downloaded or stored on their computer locally but remains on the remote server, enabling the user to check their
email from multiple devices.
The main difference between IMAP and POP3 is that the latter only allows users to download and access emails locally
on the same computer. IMAP also doesn’t automatically delete emails from the server.
9. Simple Mail Transfer Protocol (SMTP)
SMTP is a mail delivery protocol that allows a device to send and deploy email to a remote endpoint with a TCP
connection. Many providers including Microsoft Outlook, Gmail and Yahoo Mail use SMTP to send messages to remote
servers.
Briefly, an organization will first create an SMTP server, which employees can connect to and communicate with via a
mail user agent (MUA) or email client such as Gmail. Through this connection, they can deliver emails to the SMTP
server and other users.
Unlike POP3, SMTP cannot retrieve emails from a mailbox, and unlike POP3, it doesn’t automatically delete emails.
. TCP/IP(Transmission Control Protocol/ Internet Protocol)
These are a set of standard rules that allows different types of computers to communicate with each other. The IP
protocol ensures that each computer that is connected to the Internet is having a specific serial number called the IP
address. TCP specifies how data is exchanged over the internet and how it should be broken into IP packets. It also
makes sure that the packets have information about the source of the message data, the destination of the message
data, the sequence in which the message data should be re-assembled, and checks if the message has been sent
correctly to the specific destination. The TCP is also known as a connection-oriented protocol.
For more details, please refer TCP/IP Model article.
2. SMTP(Simple Mail Transfer Protocol)
These protocols are important for sending and distributing outgoing emails. This protocol uses the header of the mail to
get the email id of the receiver and enters the mail into the queue of outgoing mail. And as soon as it delivers the mail
to the receiving email id, it removes the email from the outgoing list. The message or the electronic mail may consider
the text, video, image, etc. It helps in setting up some communication server rules.
3. PPP(Point-to-Point Protocol)
It is a communication protocol that is used to create a direct connection between two communicating devices. This
protocol defines the rules using which two devices will authenticate with each other and exchange information with
each other. For example, A user connects his PC to the server of an Internet Service Provider and also uses PPP.
Similarly, for connecting two routers for direct communication it uses PPP.
4. FTP (File Transfer Protocol)
This protocol is used for transferring files from one system to the other. This works on a client-server model. When a
machine requests for file transfer from another machine, the FTO sets up a connection between the two and
authenticates each other using their ID and Password. And, the desired file transfer takes place between the machines.
5. SFTP(Secure File Transfer Protocol)
SFTP which is also known as SSH FTP refers to File Transfer Protocol (FTP) over Secure Shell (SSH) as it encrypts both
commands and data while in transmission. SFTP acts as an extension to SSH and encrypts files and data then sends
them over a secure shell data stream. This protocol is used to remotely connect to other systems while executing
commands from the command line.
6. HTTP(Hyper Text Transfer Protocol)
This protocol is used to transfer hypertexts over the internet and it is defined by the www(world wide web) for
information transfer. This protocol defines how the information needs to be formatted and transmitted. And, it also
defines the various actions the web browsers should take in response to the calls made to access a particular web page.
Whenever a user opens their web browser, the user will indirectly use HTTP as this is the protocol that is being used to
share text, images, and other multimedia files on the World Wide Web.
Note: Hypertext refers to the special format of the text that can contain links to other texts.
7. HTTPS(HyperText Transfer Protocol Secure)
HTTPS is an extension of the Hypertext Transfer Protocol (HTTP). It is used for secure communication over a computer
network with the SSL/TLS protocol for encryption and authentication. So, generally, a website has an HTTP protocol but
if the website is such that it receives some sensitive information such as credit card details, debit card details, OTP, etc
then it requires an SSL certificate installed to make the website more secure. So, before entering any sensitive
information on a website, we should check if the link is HTTPS or not. If it is not HTTPS then it may not be secure
enough to enter sensitive information.
8. TELNET(Terminal Network)
TELNET is a standard TCP/IP protocol used for virtual terminal service given by ISO. This enables one local machine to
connect with another. The computer which is being connected is called a remote computer and which is connecting is
called the local computer. TELNET operation lets us display anything being performed on the remote computer in the
local computer. This operates on the client/server principle. The local computer uses the telnet client program whereas
the remote computer uses the telnet server program.
9. POP3(Post Office Protocol 3)
POP3 stands for Post Office Protocol version 3. It has two Message Access Agents (MAAs) where one is client MAA
(Message Access Agent) and another is server MAA(Message Access Agent) for accessing the messages from the
mailbox. This protocol helps us to retrieve and manage emails from the mailbox on the receiver mail server to the
receiver’s computer. This is implied between the receiver and the receiver mail server. It can also be called a one-
way client-server protocol. The POP3 WORKS ON THE 2 PORTS I.E. PORT 110 AND PORT 995.
10. IPv4
The fourth and initially widely used version of the Internet Protocol is called IPv4 (Internet Protocol version 4). It is the
most popular version of the Internet Protocol and is in charge of distributing data packets throughout the network.
Maximum unique addresses for IPv4 are 4,294,967,296 (232), which are possible due to the use of 32-bit addresses.
The network address and the host address are the two components of each address. The host address identifies a
particular device within the network, whereas the network address identifies the network to which the host belongs. In
the “dotted decimal” notation, which is the standard for IPv4 addresses, each octet (8 bits) of the address is
represented by its decimal value and separated by a dot (e.g. 192.168.1.1).
11. IPv6
The most recent version of the Internet Protocol, IPv6, was created to address the IPv4 protocol’s drawbacks. A
maximum of 4.3 billion unique addresses are possible with IPv4’s 32-bit addresses. Contrarily, IPv6 uses 128-bit
addresses, which enable a significantly greater number of unique addresses. This is significant because IPv4 addresses
were running out and there are an increasing number of devices that require internet access. Additionally, IPv6 offers
enhanced security features like integrated authentication and encryption as well as better support for mobile devices.
IPv6 support has spread among websites and internet service providers, and it is anticipated to gradually displace IPv4
as the main internet protocol.
For more details, please refer Differences between IPv4 and IPv6 article.
12. ICMP
ICMP (Internet Control Message Protocol) is a network protocol that is used to send error messages and operational
information about network conditions. It is an integral part of the Internet Protocol (IP) suite and is used to help
diagnose and troubleshoot issues with network connectivity. ICMP messages are typically generated by network
devices, such as routers, in response to errors or exceptional conditions encountered in forwarding a datagram. Some
examples of ICMP messages include:
 Echo Request and Echo Reply (ping)
 Destination Unreachable
 Time Exceeded
 Redirect
ICMP can also be used by network management tools to test the reachability of a host and measure the round-trip time
for packets to travel from the source to the destination and back. It should be noted that ICMP is not a secure protocol,
it can be used in some types of network attacks like DDoS amplification.
13. UDP
UDP (User Datagram Protocol) is a connectionless, unreliable transport layer protocol. Unlike TCP, it does not establish
a reliable connection between devices before transmitting data, and it does not guarantee that data packets will be
received in the order they were sent or that they will be received at all. Instead, UDP simply sends packets of data to a
destination without any error checking or flow control. UDP is typically used for real-time applications such as
streaming video and audio, online gaming, and VoIP (Voice over Internet Protocol) where a small amount of lost data is
acceptable and low latency is important. UDP is faster than TCP because it has less overhead. It doesn’t need to
establish a connection, so it can send data packets immediately. It also doesn’t need to wait for confirmation that the
data was received before sending more, so it can transmit data at a higher rate.
14. IMAP
IMAP (Internet Message Access Protocol) is a protocol used for retrieving emails from a mail server. It allows users to
access and manage their emails on the server, rather than downloading them to a local device. This means that the
user can access their emails from multiple devices and the emails will be synced across all devices. IMAP is more
flexible than POP3 (Post Office Protocol version 3) as it allows users to access and organize their emails on the server,
and also allows multiple users to access the same mailbox.
15. SSH
SSH (Secure Shell) is a protocol used for secure remote login and other secure network services. It provides a secure
and encrypted way to remotely access and manage servers, network devices, and other computer systems. SSH uses
public-key cryptography to authenticate the user and encrypt the data being transmitted, making it much more secure
than traditional remote login protocols such as Telnet. SSH also allows for secure file transfers using the SCP (Secure
Copy) and SFTP (Secure File Transfer Protocol) protocols. It is widely used in Unix-based operating systems and is also
available for Windows. It is commonly used by system administrators, developers, and other technical users to
remotely access and manage servers and other network devices.
16. Gopher
Gopher is a type of file retrieval protocol that provides downloadable files with some description for easy management,
retrieving, and searching of files. All the files are arranged on a remote computer in a stratified manner. It is an old
protocol and it is not much used nowadays.
ISP (internet service provider)
What is an ISP?
An ISP (internet service provider) is a company that provides individuals and organizations access to the internet and
other related services. An ISP has the equipment and the telecommunication line access required to have a point of
presence on the internet for the geographic area served.
ISPs make it possible for customers to access the internet while also providing additional services such as email, domain
registration and web hosting. ISPs may also provide different internet connection types, such as cable and fiber.
Connections can also come in the form of high-speed broadband or non-broadband. The Federal Communications
Commission (FCC) states that to be considered high-speed, a connection must have download speeds of at least 25
megabits per second (Mbps) and upload speeds a minimum of 3 Mbps.
An ISP is also sometimes referred to as an internet access provider. ISP is also sometimes used as an abbreviation
for independent service provider to distinguish a service provider that is a separate company from a telephone
company.
How do ISPs work?
ISPs are connected to one or more high-speed internet lines. Larger ISPs have their own high-speed leased lines, so
they are less dependent on telecommunications services and can provide better service to their customers.
ISPs also keep thousands of servers in data centers -- the number of servers depends on their internet service area.
These large data centers manage all customer traffic. Multiple ISPs are also connected to large backbone routing
centers.
ISPs and the different types of services
ISPs provide the following internet services:
 Cable. This service uses coaxial cable -- the same type of cable that delivers TV. Cable internet has low latency,
which is good for users who need less delay or lag time. Cable has a download speed of 10 to 500 Mbps and an
upload speed of 5 to 50 Mbps.
 Fiber. Fiber internet uses fiber optic cable to transmit data to provide much faster speeds compared with cable
or digital subscriber line (DSL). Fiber has download speeds of 250 to 1,000 Mbps and upload speeds of 250 to
1,000 Mbps. Fiber is good for online gamers and other heavy internet users.
 DSL. DSL connects users to the internet using a telephone line. It is widely available, but is slowly being
replaced by more reliable broadband connections such as cable and fiber. DSL is slower and offers download
speeds of 5 to 35 Mbps and upload speeds of 1 to 10 Mbps. It is a good option for users in rural areas and those
who mainly surf the web or stream TV on only one device.
 Satellite. Satellite internet access works through the use of communication satellites. Ground stations relay
internet data as radio waves to and from satellites that are likely in low Earth orbit and to farther ground
stations. Satellite is slower, with download speeds of 12 to 100 Mbps and upload speeds of 3 Mbps, but it is a
good option for users in remote areas.
Most ISPs offer a combination of these services.
Jio, bsnl,act, excitel broadband, Vodafone idea limited, you broadband, tata communiocations , airtel network, sify,
bsnl, vsnl etc are examples of isp’s in India.
How to choose an ISP
Users should choose an ISP based on several factors, including the following:
 Coverage area. Which providers offer service to the user's region? If the user lives in a rural area, there may be
limited options.
 Types of services offered. In addition to cable, fiber, DSL or satellite, does the ISP offer online security? Free
email access? Hosting for websites? What about mesh Wi-Fi? Be sure the ISP's offerings match the user's
needs.
 Download and upload speeds. Will the user be gaming online or working from home and using video
teleconferencing? Both require different levels of service. For example, at least 25 Mbps of bandwidth is
needed to stream 4K video.
 Pricing. Does the ISP bundle services such as internet, phone and TV, and if so, does combining services save
money? Are there any data caps? What about equipment costs? Is there a contract?
 Consumer satisfaction rating. Check unbiased sources for provider ratings.

Bandwidth requirements for various multimedia and voice functions.


ISPs may throttle, or slow down, a user's internet speed in order to regulate traffic and clear up network congestion.
ISPs may also throttle a user's internet speed when the user reaches a specific data limit. However, throttling violates
the idea of net neutrality, which is the prevailing thought that ISPs should give equal treatment to all communications
over the internet.
As an example, ISPs can choose to throttle specific websites that users visit simply because they take up a lot of data.
ISPs have, in the past, throttled their customers' internet when connecting to Netflix -- meaning the user experience on
Netflix's platform is diminished due to the ISP.

What is the URL?


A URL is a type of uniform resource identifier and is address of a resource on the World Wide Web and the protocol
used to access it. It is used to indicate the location of a web resource to access the web pages. For example, to visit the
javatpoint website, you will go to the URL www.javatpoint.com, which is the URL for the javatpoint website.

The URL sends users to a specific resource online such as video, webpage, or other resources. When you search any
query on Google, it will display the multiple URLs of the resource that are all related to your search query. The
displayed URLs are the hyperlink to access the webpages.
A URL (Uniform Resource Locator) contains the information, which is as follows:
o The port number on the server, which is optional.
o It contains a protocol that is used to access the resource.
o The location of the server
o A fragment identifier
o In the directory structure of the server, it contains the location of the resource.
The additional information about the URL is described below with the help of an example:
Let's take an example: https://www.javatpoint.com/jtp.htm, it indicates the jtp.htm is a file located on the server with
the address of javatpoint.com.
http:// or https://
The http is a protocol that stands for Hypertext Transfer Protocol. It tells the browser to which protocol will be
preferred to use for accessing the information that is specified in the domain.
The https (Hypertext Transfer Protocol Secure) is an enhanced protocol as compared to http as it concerned with
security. It provides the surety that the information, which is transmitted over HTTP is secure and encrypted. The colon
(:) and two forward slashes (//) are used to separate the protocol from the rest of the part of the URL.
www.
The www is used to distinguish the content, which stands for World Wide Web. This portion of the URL can be left out
many times, as it is not required. For instance, if you type "http://javatpoint.com," you will still get the javatpoint
website. For an important subpage, this portion can also be substituted, which is known as a subdomain.
javatpoint.com
The javatpoint.com is the domain name for the website, and the .com is called TLD or suffix. It helps to identify the
location or type of the website. For example, ".org" stands for an organization, ".co.uk" stands for the United Kingdom,
and ".com" is for commercial. There are various types of domain suffixes available; you are required to register the
name through a domain registrar to get a domain.
jtp.htm
The jtp.htm is the name of the web page, and the .htm is the file extension of the web page, which describes the file is
an HTML file. There are many other file extensions available on the internet such as .php, .html, .xml, .jpg, .gif, .asp, .cgi,
etc.
Where is the URL located?
A URL is located in the address bar or search bar at the top of the browser window. The URL is always visible in the
desktop computers and laptop unless your browser is being displayed in full screen. In most of the smartphones and
tablets, when you scroll down the page, the URL will disappear and only show the domain when visible. To visible the
address bar, you need to scroll up the page. And, if only the domain is shown and you want to see full address, tapping
on the address bar to show the full address.
What characters cannot be used in the URL?
It is realized by many people that space is not allowed in a URL. The URL string can contain only symbols ! $-_+*'(),
including alphanumeric characters as it is documented in RFC 1738. Any other characters must be encoded in the URL
if needed.
Is an IP address the same as a web address or a URL?
An IP address is not the same as a web address or a URL, as it is a unique number that is assigned to each device on a
network. A domain name is assigned a unique IP address on the World Wide Web, and when entered an URL like
javatpoint.com, it is translated by DNS into an IP address that used by routers to find web servers. Instead of using an IP
address, a domain name is used as it is easy to remember by humans. For example, to remember an IP address like
216.58.216.164 is hard, and much easier to remember 'javatpoint.com.'
Understanding more complex URLs and parameters
A URL performs additional functions and added the parameters (additional information) to the end of the URL when it
points to a script. For example, when you search any query on any search engine, it points to a search results page,
including the additional information with the search query words.
An URL example is given below that points to the javatpoint search page, including the search query parameter of
example search.
1. https://www.javatpoint.com/cgi-bin/search.cgi?q=example%20search
In cgi-bin directory, the script file being pointed to is search.cgi in the above URL example. It is assumed to be a Perl
script as this file ends with .cgi.
The file name is a question mark (?) after the script. In the URL, the question mark separates the URL from all the
variables or parameters to be sent to the script. The parameter being sent is q=example%20search, in the above URL
example. The "example%20search" is the value that is sent to the "q" variable. Space is encoded as %20 as spaces are
allowed in a URL. Furthermore, a+ is also used to represent space in many scripts.
There is a variable in the example that is executed, as the script uses it. Also, scripts can contain multiple variables; each
variable is separated by a symbol & (ampersand), as shown in the following example:
1. https://www.javatpoint.com/cgi-bin/search.cgi?q=example%20search&example=test
The above example contains two different variables; the q" variable equals "example search" and the "example"
variable equals "test."
Why URL?
o The URL is beneficial, as the written information in the URL provides users the option to switch from one web
page to another by clicking only one mouse click.
o Every URL is unique and tells users how to access a specific resource.
o When a user types a URL into the web browser and opens any hyperlink from search results, the browser
forwards a request to a webserver to fetch files related to thesearch query.
o A website domain or URL identifies one particular file, and it is the most important part of your website.
Usually, by using words that end with .net, .com, or .org, you can get traffic on your website.
What is URL Redirect?
A URL redirect is a web server function that takes your URL and points it to another. For example, consider, you had the
old URL "myvlogsite.com," and you wanted to visitors' access directly to the new URL "javatpoint.com." Redirect is the
best solution for it; when anyone type "myvlogsite.com" in the browser would be redirected to the new
URL "javatpoint.com." There are various kinds of redirects for web developers, such as HTTP 3xx series status codes,
manual redirects, JavaScript, metatag refreshes, server-side scripts, frame redirects, and more. Furthermore, the URL
redirect may also be known as URL forwarding, domain forwarding, HTTP code 3xx redirect, and domain redirection.
There are many reasons for web users may be redirected from one URL to another, such are as follows:
o Merging of two websites
o Change of business name
o To direct content to a recently updated domain name
o Landing page-split testing for marketing tests
o To direct traffic toward recently updated content
A URL redirect is also used to cause problems for users and their computers through illegal activities like phishing.
Additionally, it can be used to remove the search results of web browsers, but nowadays, most of the search engines
are capable of detecting these types of fraud attempts. Redirect a web page, the several HTTP protocol 3xx series codes
are the most common way. The members of this series have various attributes, such are as follows:
o The number 300 provides various redirect choices. For instance, an option to select alternative languages.
o The number 301 indicates when a site is moved permanently. For example, when the name of a business has
changed.
o The number 302 is used for an unspecified redirect.
o 303 display the output of CGI (common gateway interface) scripts.
o 307 is used, when a site is to be redesigned.
The website address obtains a new URL when a website visitor is redirected to a newly named website URL. Businesses
often change their website's homepage into a redirect page. They transform page with a concurrent message briefly
describing the redirect. A meta tag is embedded into the website's source code behind the scenes. The regular visitors
of the website will receive an error message "404 - Not Found" without a redirect.
Different types of redirects
1. 301 Redirect
It is a permanent type of unmasked redirect that instructs web browsers to move from one site destination to another
automatically. It is one of the most common and searches engine-friendly method for implementing redirects. It should
be used when your website was permanently moved to the new address.
2. The redirect can also be used in some programming languages like PHP; programmers can use a canonical 301
redirect to perform a change for many pages in a domain. Furthermore, the 301 redirect passes over 90% of the link
juice; thus, it is also beneficial for SEO purposes.
3. 302 Redirect
It is a temporary type of unmasked redirect and not widely used. It is a name for an HTTP status code that is used when
a certain URL has been changed temporarily to a different address. Search engines will not index the destination URL,
index the original URL, and display it in search results. The browser is redirected from one URL to another with the help
of 302 redirects. Additionally, it is characterized as a permanent redirect and based on a different HTTP status code. In
many cases, it can return a cleaner and simpler URL for users. To use 302 redirects, other technologies and different
search engines have their own specific strategies.
4. 303 Redirect
A 303 redirect is also known as HTTP 303 that is a response to an HTTP status code. It is a specific type of redirect as a
response to a request for a URI (Unified Resource Identifier). It also has its own syntax; the W3C specifies to use a GET
method to access the desired destination if a request for a different URI.
When should be used a redirect?
1. You have duplicate content
Duplicate content is that it appears more than once on the page. There are multiple pages on Google that contain
duplicate content. In this situation, it is difficult for Google to understand which page is the correct one. You can use a
301 redirect on the duplicate piece of content to direct to the original page. It will create a better experience for your
users and help to improve your search engine rankings.
ADVERTISEMENT
ADVERTISING
ADVERTISEMENT
2. You have changed your domain
The use of redirect is useful when you are making change your domain name and probably do not want to lose any
built links.
3. You have multiple domains
To protect the online brand, some people purchase multiple domain names. So, they will need to redirect any of the
old domain to the new domain. Many companies do this to gain additional traffic from common misspellings. Also, they
can prevent competitors from buying a similar domain and can redirect them to their own site.

Difference between URL and URI


There are numerous differences between URL and URI, which are as follows:
URL URI
URL stands for Uniform Resource Locator that URI stands for Uniform Resource Identifier, which offers a
used to describe the identity of an item. technique for defining the identity of an item.
The primary objective of the URL is to get the The primary objective is to find a resource and distinguish it
address or location of the resource. from other resources with the help of a name or location.
URL is a type of URI; therefore, all URLs can be URI is the superset of URL; thus, all URIs are not URLs as a
URIs. URI can be a name rather than a locator.
It is only used for locating web pages. It is used in various languages such as HTML, XML and other
files XSLT, and more.
A URL specifies where a resource is occurring and A URI identifies a resource either by URL or URN or both.
a way for retrieving a resource.
In URL, the scheme must be a protocol such as The scheme may be anything in URI like a name,
FTP, HTTP, HTPPS, and more. specification, protocol, and more.
It contains the protocol information in the URL. It does not include protocol information.
It includes components like path, domain, hash, It includes components such as path, scheme, query,
string, query, and more. fragment component, and more.
It offers specification on what type of protocol is It does not contain protocol specification.
to be used.
An example of URL: https://google.com An example of URI: urn:isbn:0-486-27557-4

Malware
Malware is a software that is specifically designed to disrupt, damage, or gain authorized access to a computer system.
The common types of malware are:
o Adware: Displays ads while a program is running.
o Spyware: Tracking software. For instance, spyware can be installed on computers to track employees’ browsing
activities.
o Virus: A contagious program or code that attaches itself to another piece of software, and then reproduces
itself when that software is run. It is spread by sharing software or files between computers.
o Worm: A program that replicates itself and destroys data and files on the computer just like a worm eats
leaves.
o Trojan: The most dangerous software used to obtain personal information.
o Rootkit: Enables an unauthorized user to gain control of a computer system without being detected.
o Backdoors or trap – doors: Provides a hidden method of bypassing security to gain access to a restricted part of
a computer system for hackers or other malware.
o Key (stroke) loggers: Used to acquire computer usage information. Parents can install a key logger to monitor
their children’s activity on the internet.
o Rogue security software: A Wolf in sheep’s clothing – It pretends to be a good program to remove Malware
infections, but all the while it is the Malware and turns off the real antivirus program.
o Ransomware: Blocks access to a computer system until a sum of money is paid. Recent ransomware
attacks – Wannacry and Petya (Petwrap)
o Browser hijacker: Changes your computer’s browser settings so that you are redirected to Web sites that you
had no intention of visiting.
How does malware infect your PC?
o Spam emails – When the attachments of spam emails are opened, the malicious files get installed on the
computer. Petya ransomware attack used this method to install the malware.
o Infected removable drives – Many worms spread by infecting removable drives such as USB flash drives or
external hard drives. The malware can be automatically installed when you connect the infected drive to your
PC. Some worms can also spread by infecting PCs connected to the same network.
o Bundled with other software – Some malware can be installed at the same time as other programs that you
download. This includes software from third-party websites or files shared through peer-to-peer networks.
o Hacked or compromised web pages – Software vulnerabilities of your software can give malware access to
your PC. When you go to a website, it can try to use those vulnerabilities to infect your PC with malware. The
website might be malicious or it could be a legitimate website that has been compromised or hacked. Beware
of web pages allowing free downloads of pirated copies!
o Malware – Some types of malware can download other threats to your PC. Once these threats are installed on
your PC they will continue to download more threats.

Antivirus
Anti-virus software is a program or set of programs that are designed to prevent, search for, detect, and remove
software viruses, and other malicious software like worms, trojans, adware, and more. For Instance – Kaspersky,
McAfee, Norton, AVG, Panda, Microsoft Security Essentials
Cybersecurity is the body of technologies, processes, and practices designed to protect networks, computers,
programs, and data from attack, damage, or unauthorized access. Many countries have a computer emergency
response team (CERT) to handle computer security incidents.
Indian Computer Emergency Response Team (ICERT or CERT-In), under the Department of Information Technology of
Ministry of Communications and Information Technology, has been designated under Section 70B of Information
Technology (Amendment) Act 2008 to serve as the national agency to perform the following functions in the area of
cyber security:
o Collection, analysis, and dissemination of information on cyber incidents
o Forecast and alerts of cyber security incidents
o Emergency measures for handling cyber security incidents
o Coordination of cyber incident response activities
o Issue guidelines, advisories, vulnerability notes, and white papers relating to information security practices,
procedures, prevention, response, and reporting of cyber incidents
Advantages and Disadvantages of Internet
Advantages
The Internet incorporates almost every aspect of life, one can imagine. Here, we will discuss some of the advantages of
the Internet:
1. The Internet enables us to “interact” with people at remote locations. There are various applications ready on
the web that utilize the Internet as a medium for communication.
2. The Internet provides “easy access to information” as anything and everything is available online nowadays.
3. With the Internet, it has become convenient to learn about new things, technologies and more at any point in
time and get details on various subjects(Technology, Health & Science, News and much more), irrespective of
time and place.
4. Apart from communication and source of information, the internet also works as a medium for entertainment
and services. Some of the examples are internet banking, online shopping, e-mail, online bill payment, ticket
booking, data Sharing, online television, games, social networking apps, and so on.
5. With the advancement of technology, the Internet has evolved as a platform for online education and job
searching through various means.
6. Social media has lessened the gap between people as communication has become much easier because of the
Internet connection.
With the Internet being an extremely necessary part of our daily life, a user must be well aware of the limitations of the
Internet and its excess usage.
Disadvantages
Though the Internet has emerged as a powerful medium of information in almost every domain, yet there are
associated disadvantages of the internet as discussed below:
1. The dependency of users for looking at things and information online has grown massively since the
introduction of the Internet and its easy access, this sometimes also leads to the possibility to lose personal
information such as an address, name, credit card number, and other essential information. Therefore users
must provide the essential details to authenticated websites.
2. The spread of the virus to computers connected to the internet is a very common disadvantage of the internet.
Such virus attacks may even lead to the user’s system crash or the important data may get destroyed. In such a
case the user must ensure to have a strong antivirus installed in the system.
3. People do not just employ the internet for learning purposes, cybercrime has also stood at a distinctive high
because of the easy availability of resources.
4. Another drawback is Spamming. Spamming corresponds to undesired emails in bulk. These emails serve no
purpose and drive to obstruction of the entire system.
5. As the information on the internet is very easily available, this does not imply the authenticity of the
information which many a time leads to misconception among users.

You might also like