0% found this document useful (0 votes)
2 views

WEB 1 INTERNET

The document provides an overview of the Internet, its protocols, and the World Wide Web, detailing various components such as FTP, Usenet, and web browsers. It explains the functionalities of web servers, proxy servers, and security measures like cookies and firewalls. Additionally, it discusses the importance of protocols like HTTP, SMTP, and the role of web applications in facilitating communication and data transfer online.

Uploaded by

manishgangwal
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

WEB 1 INTERNET

The document provides an overview of the Internet, its protocols, and the World Wide Web, detailing various components such as FTP, Usenet, and web browsers. It explains the functionalities of web servers, proxy servers, and security measures like cookies and firewalls. Additionally, it discusses the importance of protocols like HTTP, SMTP, and the role of web applications in facilitating communication and data transfer online.

Uploaded by

manishgangwal
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

Unit--1

The Internet — Basic of internet, file transfer, telnet, UseNet, gopher, wais, Archie and veronica.
Introduction 10

Internet Protocols-, HIP, FTP, SMTP protocols.

World Wide Web© Elements of the Web, Web browser and its architecture, The web server, the proxy
server

Microsoft internet explorer, viewing pages with a browser, using a browser for Mail, News and chat,
Security auc Privacy issues (cookies, firewalls, Data Security, executable Applets and scripts, blocking
system)

What is the Internet?

We always associate the internet with the web. But essentially the
internet is just a massive networking infrastructure that connects
millions of users and devices from across the world.

It connects more than 190 countries of the world allowing is a free


exchange of data and information at lightning fast speeds.

Now comes the question of how does this information flow on the
internet? The basic function of the internet is to move computerized
data from one place to another.

This happens as the internet is decentralized, i.e. not under any


control. Every computer or device is an independent host and the
information just moves from one host to another via the internet.
Browse more Topics under Basics Of Computers

 Number Systems
 Number System Conversions
 Generations of Computers
 Computer Organisation
 Computer Memory
 History of Computers
 Basic Computer Terminology
 Computer Languages
 Hardware and Software
 Keyboard Shortcuts
 I/O Devices
 Practice Problems On Basics Of Computers
Learn more about Input and Output Devices here in detail

Let us learn some important terms related to the internet

 WWW: World Wide Web. This is what we call the web. It is a


collection of information, data, videos, pictures, multimedia etc on
the internet. It is all linked together through the world wide web.
 URL: It stands for Universal Resource Locator. This is the link
that connects the user to the remote locator on the world wide web.
It is basically a link to a website, which opens when you click on
the URL.
 Host: Any computer or device that is used to transfer the data
 IP Address: IP Address is a unique code for each computer or
device that connects to the internet. It is four numbers between 0
and 255 separated by a dot. Example 23.187.09.65

FTP (File Transfer Protocol)

This protocol is used for transferring files from one system to the
other. This works on a client-server model. When a machine requests
for file transfer from another machine, the FTO ( freedom to operate)
sets up a connection between the two and authenticates each other
using their ID and Password. And, the desired file transfer takes place
between the machines.

Usenet

Usenet is the contraction of the User Network. It resembles just a


Bulletin Board System where users can post articles or posts on
various topics.

The Usenet of newsgroups is hierarchical and, similar to the Domain


Name System (DNS). A usenet is a collection of user-submitted
articles or posts on various topics/subjects that are posted to servers
on world wide network.
Network News Transfer Protocol(nntp)

TELNET(Terminal Network)

TELNET is a standard TCP/IP protocol used for virtual terminal


service given by ISO. This enables one local machine to connect with
another. The computer which is being connected is called a remote
computer and which is connecting is called the local computer.
TELNET operation lets us display anything being performed on the
remote computer in the local computer. This operates on the
client/server principle. The local computer uses the telnet client
program whereas the remote computer uses the telnet server program.

Gopher

Gopher is a type of file retrieval protocol that provides downloadable files


with some description for easy management, retrieving, and searching of
files. All the files are arranged on a remote computer in a stratified
manner. It is an old protocol and it is not much used nowadays.

Wide Area Information Server (WAIS)


(American National Standards Institute)

Wide Area Information Server (WAIS) is a client–server text


searching system that uses the ANSI Standard Z39.50 Information
Retrieval Service Definition and Protocol Specifications for Library
Applications" (Z39.50:1988) to search index databases on remote
computers. It was developed in 1990[1] as a project of Thinking
Machines, Apple Computer, Dow Jones, and KPMG Peat Marwick.

The WAIS protocol and servers were promoted by Thinking Machines


Corporation (TMC) of Cambridge.

Archie (search engine)

Archie is a tool for indexing FTP archives, allowing users to more


easily identify specific files. It is considered the first Internet search
engine.[3] The original implementation was written in 1990 by Alan
Emtage, then a postgraduate student at McGill University in
Montreal, Canada.

Veronica (search engine)

Veronica was a search engine system for the Gopher protocol,


released in November 1992 by Steven Foster and Fred Barrie at the
University of Nevada, Reno.

The search engine was named after the character Veronica Lodge from
Archie Comics, an intentional analogy with the naming of the Archie
search engine, a search engine for FTP servers. A backronym for Veronica
is "Very Easy Rodent-Oriented Net-wide Index to Computer Archives"
What are Internet Protocols?

The internet is a massive networking infrastructure. So there have to


be some rules that regulate such a network. So internet protocols are a
set of regulations and protocols that define and govern the format of
the data that is sent via the internet. It is the method by which the data
is sent over from one host to another.

When you send data over the internet this data is divided into smaller
packets. Each packet contains the senders and the receivers IP
address.

These packs first go to the gateway computer which reads the


destination address and forwards it to the adjacent gateway. The next
gateway will also do the same until the packet ultimately reaches its
destination address.

Let us take a look at some of the important types of internet


protocols:

TCP: Transmission Control Protocol. This is the protocol for


communicating over a network. The data is broken down into
smaller packets, identifiable by their IP address.
FTP: File Transfer Protocol. Used for transferring files over the
internet. This includes text and multimedia files as well. It is faster
than the other methods.
model. It facilitates the connection between web client and web
server.
HTTP: Hypertext Transfer Protocol. It follows the client and
server

HIP: Host Identity Protocol. The Host Identity Protocol (HIP) is an


internetworking architecture and an associated set of protocols,
developed at the IETF since 1999 and reaching their first stable
version in 2007. HIP enhances the original Internet architecture by
adding a name space used between the IP layer and the transport
protocols.
IEEE Communications Surveys and Tutorials, Vol 12, No 2, April
2010

SMTP(Simple Mail Transfer Protocol)


These protocols are important for sending and distributing outgoing
emails. This protocol uses the header of the mail to get the email id of
the receiver and enters the mail into the queue of outgoing mail. And
as soon as it delivers the mail to the receiving email id, it removes the
email from the outgoing list. The message or the electronic mail may
consider the text, video, image, etc. It helps in setting up some
communication server rules.

World Wide Web (WWW)

The World Wide Web is abbreviated as WWW and is commonly known


as the web. The WWW was initiated by CERN (European library for
Nuclear Research) in 1989.

It is a project created, by Timothy Berner Lee in 1989, for researchers to


work together effectively at CERN. is an organization, named the World
Wide Web Consortium (W3C), which was developed for further
development of the web. This organization is directed by Tim Berner’s
Lee, aka the father of the web.

The World Wide Web is based on several different technologies: Web


browsers, Hypertext Markup Language (HTML) and Hypertext Transfer
Protocol (HTTP)

A Web browser is used to access web pages. Web browsers can be


defined as programs which display text, data, pictures, animation and
video on the Internet. Hyperlinked resources on the World Wide Web
can be accessed using software interfaces provided by Web browsers.

Components of the Web: There are 3 components of the web:

Uniform Resource Locator (URL): serves as a system for resources on


the web.

HyperText Transfer Protocol (HTTP): specifies communication of


browser and server.
Hyper Text Markup Language (HTML): defines the structure,
organisation and content of a webpage.

Web browser
Web server
Hyperlinks
Web applications

Features of WWW:

 HyperText Information System


 Cross-Platform
 Distributed
 Open Standards and Open Source
 Uses Web Browsers to provide a single interface for many
services
 Dynamic, Interactive and Evolving(hyper).
 “Web 2.0”

web server
Web server: A web server is a computer program that serves web pages
to clients, such as web browsers, upon request. It is responsible for
hosting websites, processing HTTP requests, and delivering web content
to users online.
When a user types a website address into a web browser, the browser
sends a request to the web server hosting that website. The web server
then retrieves the requested resources, such as HTML files, images, and
videos, and sends them back to the user's browser, which renders them
into a viewable web page.
Web servers can run on various operating systems, including Windows,
Linux, and Unix. Some popular web servers include Apache, Nginx, and
Microsoft IIS. Web servers also support different web technologies such
as CGI scripts, PHP, and ASP.NET, which allow developers to create
dynamic web pages and web applications.

proxy server
A proxy server is a system or router that provides a gateway between
users and the internet. Therefore, it helps prevent cyber attackers from
entering a private network. It is a server, referred to as an “intermediary”
because it goes between end-users and the web pages they visit online.

Benefits of a Proxy Server


Proxies come with several benefits that can give your business an
advantage:
Enhanced security: Can act like a firewall between your systems and the
internet. Without them, hackers have easy access to your IP address,
which they can use to infiltrate your computer or network.
Private browsing, watching, listening, and shopping: Use different
proxies to help you avoid getting inundated with unwanted ads or the
collection of IP-specific data. With a proxy, site browsing is well-
protected and impossible to track.
Access to location-specific content: You can designate a proxy server
with an address associated with another country. You can, in effect,
make it look like you are in that country and gain full access to all the
content computers in that country are allowed to interact with. For
example, the technology can allow you to open location-restricted
websites by using local IP addresses of the location you want to appear
to be in.
Prevent employees from browsing inappropriate or distracting sites: You
can use it to block access to websites that run contrary to your
organization’s principles. Also, you can block sites that typically end up
distracting employees from important tasks. Some organizations block
social media sites like Facebook and others to remove time-wasting
temptations.
Internet Explorer
Internet Explorer is a free web browser, commonly called IE or MSIE,
that allows users to view web pages on the internet. It is also used to
access online banking, online marketing over the internet, listen to and
watch streaming videos, and many more. It was introduced
by Microsoft in 1995. It was produced in response to the first
geographical browser, Netscape Navigator.

Microsoft Internet Explorer was a more popular web browser for many
years from 1999 to 2012 as it surpassed the Netscape Navigator during
this time. It includes network file sharing, several internet connections,
active Scripting, and security settings.

It also provides other features such as:

o Remote administration
o Proxy server configuration
o VPN and FTP client capabilities

Internet Explorer 1 (first) In 1995, it was introduced.

Internet Explorer 11(last) On 17 October 2013, it was introduced.

viewing pages with a browser


"A web browser, or simply 'browser,' is an application used to access
and view websites. Common web browsers include Microsoft Edge,
Internet Explorer, Google Chrome, Mozilla Firefox, and Apple Safari.
Mail use in web browser
Gmail is a free email service provided by Google. As of 2019, it had 1.5
billion active users worldwide making it the largest email service in the
world. It also provides a webmail interface, accessible through a web
browser, and is also accessible through the official mobile application.

Chat
Every day millions of businesses use chat programs to communicate in
real time with associates, customers and suppliers across the street or on
the other side of the globe. Applications such as AIM, Gmail chat,
Skype and Yahoo Messenger enable businesses to send messages
instantly to people in their contact list. If you are using a chat service on
your computer, you probably already have the desktop version of the
chat client software installed on your computer.
Facebook

Yahoo Messenger

Imo.im

Gmail ect.

News
News websites are sites devoted to delivering the news in a different
format than television, print or radio.
Online news platforms NDTV News , India Today India , The Indian
Express ,The Hindu , News18 ect..
Security and privacy

Whereas privacy concerns mainly the protection of one's own


information and that of others, identity management is being in
control of our online profile, and security relates more to a
person's awareness of how online actions and behaviour can put
both at risk.

 Web server security and privacy: Concerned with the vulnerabilities and
threats associated with the platform that hosts a website, including the
operating system (OS), file and database systems, and network traffic
 Web application security and privacy: Concerned with web software,
including any applications accessible via the Web
 Web browser security and privacy: Concerned with the browser used from a
client system to access a web server

Web Server Security and Privacy


A web server is a platform that hosts one or more websites for an
organization. Often, the organization uses one or more dedicated servers
for this purpose. If the resource demands for the website do not require a
dedicated server, the system design may employ a virtual machine or
container architecture that partitions off part of a server’s resources for
the website.
OS
File and Database
Network
HyperText Transfer Protocol Secure (HTTPS)

 Encryption: .
 Data integrity
 Authentication

Cookies

Cookies and other technologies used for security help to authenticate users, prevent
fraud, and protect you as you interact with a service.

The cookies and other technologies used to authenticate users help ensure that only
the actual owner of an account can access that account. For example, cookies
called ‘SID’ and ‘HSID’ contain digitally signed and encrypted records of a user’s
Google Account ID and most recent sign-in time. The combination of these
cookies allows Google to block many types of attack, such as attempts to steal the
content of forms submitted in Google services.

Some cookies and other technologies are used to prevent spam, fraud, and abuse.
For example, the ‘pm_sess’, ‘YSC’, and ‘AEC’ cookies ensure that requests within
a browsing session are made by the user, and not by other sites. These cookies
prevent malicious sites from acting on behalf of a user without that user’s
knowledge. The ‘pm_sess’ cookie lasts for 30 minutes, while the ‘AEC’ cookie
lasts for 6 months. The ‘YSC’ cookie lasts for the duration of a user’s browsing
session.

Firewall
Web application attacks prevent important transactions and steal sensitive data.
Imperva Web Application Firewall (WAF) stops these attacks with near-zero false
positives and a global SOC to ensure your organization is protected from the latest
attacks minutes after they are discovered in the wild.

Executable applet

They are stored on an Internet Server, transported over the Internet and
automatically installed and executed as a part of a Webpage on the client machine.
Applets can perform arithmetic operation, display graphics, play sounds, accept
user inputs, create animations and support interactive games.
Applet :-

Applets a re small java program that are used for the internet. They are stored on an Internet Server,

transported over the Internet and automatically installed and executed as a part of a Webpage on the
client machine. Applets can perform arithmetic operation, display graphics, play sounds, accept user
inputs, create animations and support interactive games. Before the introduction of applets, web pages
were not as interactive and dynamic as today.

After an applet arise the client machine via a web page, it has a very limited access to the resources of

that machine and so, it can run several GUI applications without introducing the risk of viruses.

Web script, a computer programming language for


adding dynamic capabilities to World Wide Web pages. Web
pages marked up with HTML (hypertext markup language)
or XML (extensible markup language) are largely static
documents.

Vb script VB Script is a subset of Visual Basic. Originally


developed for Microsoft’s Office suite of programs, it was later
used for Web scripting as well. Its capabilities are similar to
those of JavaScript, and it may be embedded in HTML in the
same fashion.
Blocking system
Go to Manage Settings → Filters on Google Chrome → Manage sites → Blocked.
Tap the Add an exception icon. Type in the website or domain you want to block.

Blocking a website on Chrome using extensions is arguably the easiest method


since the tool will manage the task for you. This is also suitable for Windows,
Linux, and macOS users.

Here’s how to block websites on Chrome using BlockSite:

Visit the site you want to block.

Click on the BlockSite icon located at the top right corner of your browser.

Click the Block this site button to restrict access to the website.

Once you added the site to your block list, BlockSite will show a notice page like
the example below.

We recommend using BlockSite – one of the most popular website-blocking


extensions with over three million downloads. All you need to do to start using this
freemium extension is visit the Chrome Web Store and download it from there.

Thankyou ..!

You might also like