Unit VI - Internet & Services
Unit VI - Internet & Services
INTRODUCTION
Detailed History
WHO CONTROLS THE INTERNET?
• While the Internet is theoretically decentralized and thus controlled by no single entity,
many argue that tech companies such as Amazon, Facebook, and Google represent a
small concentration of organizations that have unprecedented influence over the
information and money on the Internet. In some countries, certain parts of the Internet
are blocked via censorship.
INTERNET ARCHITECTURE
• Backbone ISP (Internet Service Provider) − Backbone ISPs are large international backbone networks.
They are equipped with thousands of routers and store enormous amounts of information in data
centers, connected through high bandwidth fiber optic links. Everyone needs to connect with a
backbone ISP to access the entire Internet.
• There are different ways through which a client can connect to the ISP. A commonly used way is DSL
(Digital Subscriber Line) which reuses the telephone connection of the user for transmission of digital
data. The user uses a dial-up connection instead of the telephone call. Connectivity is also done by
sending signals over cable TV system that reuses unused cable TV channels for data transmission. For
high-speed Internet access, the connectivity can be done through FTTH (Fiber to the Home), that uses
optical fibers for transmitting data. Nowadays, most Internet access is done through the wireless
connection to mobile phones from fixed subscribers, who transmit data within their coverage area.
CONNECTING THE INTERNET
• There exist several ways to connect to the internet. Following are these connection types available:
1. Dial-up Connection
2. Leased Line
3. ISDN
4. DSL
5. Cable TV Internet connections
6. Satellite Internet connections
7. Wireless Internet Connections
INTERNET CONNECTIONS
• Dial-up Connection
• Dial-up connection uses telephone line to connect PC to the
internet. It requires a modem to setup dial-up connection. This
modem works as an interface between PC and the telephone
line.
• There is also a communication program that instructs the
modem to make a call to specific number provided by an ISP.
• Dial-up connection uses either of the following protocols:
1. Serial Line Internet Protocol (SLIP)
2. Point to Point Protocol (PPP)
• The following diagram shows the accessing internet using
modem:
INTERNET CONNECTIONS
• Leased Line
• A leased line is a dedicated, fixed-bandwidth data connection. It allows data-hungry
businesses to have a reliable, high-quality internet connection with guarantees of upload
and download speed, uptime and resilience. “Leased” refers to the connection which is
rented by the Internet Service Provider (ISP) directly to a business, resulting in a service
above and beyond what standard broadband provides.
INTERNET CONNECTIONS
• ISDN
• ISDN is acronym of Integrated Services Digital Network. It
establishes the connection using the phone lines which carry digital
signals instead of analog signals.
• There are two techniques to deliver ISDN services:
• ISN
• Key points:
• The BRI ISDN consists of three distinct channels on a
single ISDN line: t1o 64kbps B (Bearer) channel and one
16kbps D (Delta or Data) channels.
• The PRI ISDN consists of 23 B channels and one D
channels with both have operating capacity of 64kbps
individually making a total transmission rate of 1.54Mbps.
• The following diagram shows accessing internet using
ISDN connection:
INTERNET CONNECTIONS
• DSL
• DSL is acronym of Digital Subscriber Line. It is a form of broadband connection as it
provides connection over ordinary telephone lines.
• Following are the several versions of DSL technique available today:
1. Asymmetric DSL (ADSL)
2. Symmetric DSL (SDSL)
3. High bit-rate DSL (HDSL)
4. Rate adaptive DSL (RDSL)
5. Very high bit-rate DSL (VDSL)
6. ISDN DSL (IDSL)
7. All of the above mentioned technologies differ in their upload and download speed, bit transfer
rate and level of service.
INTERNET CONNECTIONS
• An IP address is a unique address that identifies a device on the internet or a local network. IP
stands for "Internet Protocol," which is the set of rules governing the format of data sent via
the internet or local network.
• In essence, IP addresses are the identifier that allows information to be sent between devices
on a network: they contain location information and make devices accessible for
communication. The internet needs a way to differentiate between different computers,
routers, and websites. IP addresses provide a way of doing so and form an essential part of
how the internet works.
• An IP address is a string of numbers separated by periods. IP addresses are expressed as a set
of four numbers — an example address might be 192.158.1.38. Each number in the set can
range from 0 to 255. So, the full IP addressing range goes from 0.0.0.0 to 255.255.255.255
INTERNET PROTOCOL (IP)
0 8 16 24 31
Decimal 192 168 21 76
Hex C0 A8 15 4C
1-126
0 2 8 16 24 31
Example: NEU
Class B 10 Network Host
129.10.*.*
128-191
0 3 8 16 24 31
Example:
Class C 110 Network Host
216.63.78.*
192-223
CLASS SIZES
• IPV6
• IPv6 is the latest version of the Internet Protocol, which identifies devices across the internet so they can be
located. Every device that uses the internet is identified through its own IP address in order for internet
communication to work. In that respect, it’s just like the street addresses and zip codes you need to know in
order to mail a letter.
• The previous version, IPv4, uses a 32-bit addressing scheme to support 4.3 billion devices, which was
thought to be enough at the time it was implemented. However, with the growth of the internet, personal
computers, smartphones and now Internet of Things, it became clear that the world needed more addresses.
• Fortunately, the Internet Engineering Task Force (IETF) recognized this nearly 25 years ago. In 1998, it created
IPv6, which instead uses 128-bit addressing to support approximately 340 trillion trillion (or 2 to the 128th
power). Instead of the IPv4 address method of four sets of one- to three-digit numbers, IPv6 uses eight groups of
four hexadecimal digits, separated by colons.
INTERNET PROTOCOL (IP)
DOMAIN NAME SYSTEM (DNS)
• The Domain Name System (DNS) is the Internet's system for mapping alphabetic names
to numeric Internet Protocol (IP) addresses like a phone book maps a person's name to
a phone number.
• DNS, or the Domain Name System, translates human readable domain names (for
example, www.amazon.com) to machine readable IP addresses (for example,
192.0.2.44).
• For example, when a Web address (URL) is typed into a browser, a DNS query is made
to learn an IP address of a Web server associated with that name.
DOMAIN NAME SYSTEM (DNS)
• Name space
The name assigned to a machine must be unique because the addresses are unique. A name space that maps
each address to a unique name cab be organised in two ways:
Flat name space
Hierarchical name space
• Flat Name Space
In flat name space, a name is provided to an address. The name is this space is a sequence of
characters without structure. (like com1,com2 etc). The main disadvantages of flat name space is that it
cannot be used in large system such as internet as it must be centrally controlled to avoid the ambiguity
and duplication. Hierarchical name space overcomes the disadvantages of flat name space.
DOMAIN NAME SYSTEM (DNS)
• The Organizational generic domains such as com, gov, edu, org etc and listed as below:
• com: commercial organization
• int: International organizations Some new generic domains are:
• biz: Business
• gov: Government institutions • info: Information
• name: Peoples' name
• edu: Educational institutions .
• pro: Professional such as doctor, layer
• mil: U.S. military institutions. • aero: Aerospace industries
• coop: Co-operative
• net: Networking organizations • museum: Museums
• org: Non-profit organizations
DOMAIN NAME SYSTEM (DNS)
• In this article we are going to take a dive into the Client-Server model and have a look at how
the Internet works via, web browsers. This article will help us in having a solid foundation of the WEB and help in
working with WEB technologies with ease.
• Client: When we talk the word Client, it mean to talk of a person or an organization using a particular service.
Similarly in the digital world a Client is a computer (Host) i.e. capable of receiving information or using a particular
service from the service providers (Servers).
• Servers: Similarly, when we talk the word Servers, It mean a person or medium that serves something. Similarly in
this digital world a Server is a remote computer which provides information (data) or access to particular services.
• So, its basically the Client requesting something and the Server serving it as long as its present in the database.
HYPER TEXT TRANSFER PROTOCOL (HTTP)
• Definition : The Hypertext Transfer Protocol is an application protocol for distributed, collaborative,
hypermedia information systems that allows users to communicate data on the World Wide Web.
• Purpose : HTTP was invented alongside HTML to create the first interactive, text-based web browser: the
original World Wide Web.Today, the protocol remains one of the primary means of using the Internet.
• How HTTP works : As a request-response protocol, HTTP gives users a way to interact with web resources
such as HTML files by transmitting hypertext messages between clients and servers. HTTP clients generally
use Transmission Control Protocol (TCP) connections to communicate with servers.
• HTTP utilizes specific request methods in order to perform various tasks. All HTTP servers use the GET and
HEAD methods, but not all support the rest of these request methods:
HYPER TEXT TRANSFER PROTOCOL (HTTP)
(HOW HTTP WORKS)
• FTP works on the client server model. FTP client is a program running on the user’s computer that enables the user to
talk to and get the files from remote computers. FTP server is the remote computer or the host computer from
which files are accessed by the FTP client.
• The FTP client –server works as fallows:
The FTP client gives the ftp command with the addresses of FTP server, using a URL.
When the FTP client gets connected to FTP server the user enters the User Login and password. A user can login to a
FTP server even if they don’t have an account on the FTP server. For this the user uses the anonymous login, where
the User Login is anonymous and password is the email address of the FTP client.
FTP servers verifies the user login and password to allow the FTP client to access its files.
FTP client gets the requested files and quits.
WORLD WIDE WEB (WWW)
• World Wide Web is an architecture framework for accessing interlinked hypertext documents spread out
over millions of computers all over the internet.
• Information in WWW as a collection of documents that are interconnected with each other via links.
• The interconnected documents may be located on one or more than one computer worldwide thus the
name world wide web.
• WWW uses the concept of hypertext and hyper media.
• In hyper text environment information is stored in the form of documents that are linked together.
• In hyper media document can contain pictures , graphics, animation and sound.
WORLD WIDE WEB (WWW)
• Features of WWW :
• HyperText Information System
• Cross-Platform
• Distributed
• Open Standards and Open Source
• Uses Web Browsers to provide a single interface for many services
• Dynamic, Interactive and Evolving.
• “Web 2.0”
HOW WWW WORKS?
• The World Wide Web is based on several different technologies: Web browsers,
Hypertext Markup Language (HTML) and Hypertext Transfer Protocol (HTTP).
• A Web browser is used to access web pages. Web browsers can be defined as programs
which display text, data, pictures, animation and video on the Internet. Hyperlinked
resources on the World Wide Web can be accessed using software interfaces provided
by Web browsers. Initially, Web browsers were used only for surfing the Web but now
they have become more universal. Web browsers can be used for several tasks including
conducting searches, mailing, transferring files, and much more. Some of the commonly
used browsers are Internet Explorer, Opera Mini, and Google Chrome.
REMOTE LOGIN (TELNET_
• Telnet, developed in 1969, is a protocol that provides a command line interface for communication with a
remote device or server, sometimes employed for remote management but also for initial device setup like
network hardware.
• Telnet stands for Teletype Network, but it can also be used as a verb; 'to telnet' is to establish a connection
using the Telnet protocol.
• Because it was developed before the mainstream adaptation of the internet, Telnet on its own does not employ
any form of encryption, making it outdated in terms of modern security.
• It has largely been overlapped by Secure Shell (SSH) protocol (which has its own security considerations
around remote access), at least on the public internet, but for instances where Telnet is still in use, there are a
few methods for securing your communications.
WEB BROWSER
• Web Browser is a client program that runs on an Internet-connected computer and uses
the Hypertext Transport Protocol (HTTP) to connect to Web servers. Web browsers are
of two kinds: text-only browsers and graphical Web browsers.
• Basic web browsers examples are Microsoft Internet Explorer, Google Chrome, Mozilla
Firefox, and Apple Safari.
UNIFORM RESOURCE LOCATOR (URL)
• URL stands for Uniform Resource Locator. A URL is nothing more than the address of a given
unique resource on the Web.
• In theory, each valid URL points to a unique resource. Such resources can be an HTML page, a
CSS document, an image, etc.
• In practice, there are some exceptions, the most common being a URL pointing to a resource
that no longer exists or that has moved. As the resource represented by the URL and the
URL itself are handled by the Web server, it is up to the owner of the web server to carefully
manage that resource and its associated URL.
• Examples of URL :https://developer.mozilla.org
• https://developer.mozilla.org/en-US/docs/Learn/
• https://developer.mozilla.org/en-US/search?q=URL
SEARCH ENGINE
• The term electronic commerce (ecommerce) refers to a business model that allows
companies and individuals to buy and sell goods and services over the Internet.
• Ecommerce operates in four major market segments and can be conducted over
computers, tablets, smartphones, and other smart devices.
• Nearly every imaginable product and service is available through ecommerce
transactions, including books, music, plane tickets, and financial services such as stock
investing and online banking.As such, it is considered a very disruptive technology.
E COMMERCE
• E-commerce provides the sellers with a global reach. They remove the barrier of place
(geography). Now sellers and buyers can meet in the virtual world, without the hindrance of
location.
• Electronic commerce will substantially lower the transaction cost. It eliminates many fixed
costs of maintaining brick and mortar shops. This allows the companies to enjoy a much
higher margin of profit.
• It provides quick delivery of goods with very little effort on part of the
customer. Customer complaints are also addressed quickly. It also saves time, energy and
effort for both the consumers and the company.
• One other great advantage is the convenience it offers. A customer can shop 24×7. The
website is functional at all times, it does not have working hours like a shop.
ECOMMERCE DISADVANTAGES
• The start-up costs of the e-commerce portal are very high. The setup of the hardware and the software, the
training cost of employees, the constant maintenance and upkeep are all quite expensive.
• Although it may seem like a sure thing, the e-commerce industry has a high risk of failure. Many companies
riding the dot-com wave of the 2000s have failed miserably.The high risk of failure remains even today.
• At times, e-commerce can feel impersonal. So it lacks the warmth of an interpersonal relationship which is
important for many brands and products. This lack of a personal touch can be a disadvantage for many types
of services and products like interior designing or the jewelry business.
• Security is another area of concern. Only recently, we have witnessed many security breaches where the
information of the customers was stolen. Credit card theft, identity theft etc. remain big concerns with the
customers.
E GOVERNANCE
• A smart city is a technologically modern urban area that uses different types
of electronic methods, voice activation methods and sensors to collect specific data.
• Information gained from that data is used to manage assets, resources and services efficiently; in return,
that data is used to improve operations across the city.
• This includes data collected from citizens, devices, buildings and assets that is processed and analyzed to
monitor and manage traffic and transportation systems, power plants, utilities, water supply
networks, waste, crime detection, information systems, schools, libraries, hospitals, and other
community services.
• Smart cities are defined as smart both in the ways in which their governments harness technology as
well as in how they monitor, analyze, plan, and govern the city.
SMART CITY FEATURES
• Combining automation, machine learning and the IoT is allowing for the adoption of smart city technologies for a
variety of applications. For example, smart parking can help drivers find a parking space and also allow for digital
payment.
• Another example would be smart traffic management to monitor traffic flows and optimise traffic lights to reduce
congestion, while ride-sharing services can also be managed by a smart city infrastructure.
• Smart city features can also include energy conservation and environmental efficiencies, such as streetlights that
dim when the roads are empty. Such smart grid technologies can improve everything from operations to
maintenance and planning to power supplies.
• Smart city initiatives can also be used to combat climate change and air pollution as well as waste management and
sanitation via internet-enabled rubbish collection, bins and fleet management systems.
• Aside from services, smart cities allow for the provision of safety measures such as monitoring areas of high crime
or using sensors to enable an early warning for incidents like floods, landslides, hurricanes or droughts.
CENSORSHIP AND PRIVACY ISSUE
• The definition of online privacy is the level of privacy protection an individual has while
connected to the Internet.
• It covers the amount of online security available for personal and financial
data, communications, and preferences.
• Internet users often attempt to increase online privacy through anti-virus software, strong
password choices, turning off tracking, reviewing site security, and opting for stricter privacy
settings.
• Risks to online privacy range from phishing scams to malware, while problems with website
security may result in identity theft.
CENSORSHIP AND PRIVACY ISSUE
• The Internet’s origin have their roots in a military project, the Semi-Automatic Ground Environment (SAGE)
program, which networked country-wide radar systems together for the first time. This was created around 1958
as part of an attempt to regain the lead in technology from the Soviet Union which had recently launched Sputnik.
• J.C.R. Licklider was selected to head the committee which controlled the SAGE project. He envisioned universal
networking as a unifying human revolution. Licklider recruited Lawrence Roberts to head a project which
implemented a network. Roberts had worked with the U.S. Air Force on a packet switching system as opposed to
a circuit switching system. On October 29, 1969, Licklider and Roberts interconnected the first two nodes
between UCLA and SRI International at Menlo Park, California. This was the beginning of the Advanced Research
Projects Agency Network (ARPANET) which was one of the key networks which our Internet today was based off
of. Soon after the first international packet-switched network service was created between U.S. and U.K.
DETAILED HISTORY OF INTERNET
• Vint Cerf and Bob Kahn developed the first description of TCP (covered more deeply in the Introduction
to Networking lesson) in 1973. The term “Internet” was first used in 1974 to describe a single global
TCP/IP network detailed in the first full specification of TCP written by Cerf and his colleagues. The first
TCP/IP-wide area network was created on January 1, 1983 when all hosts on the ARPANET were switched
over from the older protocols to TCP/IP.
• In 1984, the National Science Foundation (NSF) commissioned the construction of a 1.5 megabit/second
network which became known as NSFNET. In 1989 the US Federal Networking Council approved the
interconnection of the NSFNET to the commercial MCI Mail system.