Internet
Internet
Internet
● The Internet is a huge collection of networks, a networking infrastructure.
It encapsulates millions of computers together globally, forming a network
in which any computer can communicate with any other computer as long
as they are both connected to the Internet. In other words, it is a
worldwide system of cross connected computer networks, connecting
millions of devices through which exchange of information such as data,
news and opinions etc. is possible.
◊ The Internet is available to each and every user across the globe.
Evolution
● The Internet covers almost every aspect of life, one can think of. Here, we
will discuss some of the advantages of Internet:
Disadvantages
Intranet
Benefits
Application
Intranet Internet
Localized Network. Worldwide Network
Doesn't have access to Have access to the
Intranet Internet.
More Expensive Less Expensive
More Safe Less Safe
More Reliability Less Reliability
Extranet
● Key Points
1. The packet is wrapped at the boundary of networks in IPSEC
compliant routers.
2. It utilizes an encryption key to associate packets and IP addresses
as well.
3. The packet is decoded only by the IPSEC compliant routers or
servers.
4. The digital information is shared over VPN via VPN Tunnel and this
process is called tunneling.
● VPN utilizes Internet Protocol Security Architecture (IPSEC) Protocol to
facilitate secure transactions by implementing an additional security layer
to TCP/IP protocol. This layer is implemented by encapsulating the IP
packet to a new IP packet as described in the following diagram:
Benefits
● Apart from advantages there are also some issues associated with
extranet. These issues are discussed below:
Hosting
● Where the extranet pages will be held i.e. who will host the extranet pages.
In this
context there are two choices:
1. May host it on the user's own server.
2. May host it along with an Internet Service Provider (ISP) in the
similar way as web pages.
● But hosting extranet pages on a user's own server requires high bandwidth
internet connection which is comparatively very costly.
Security
● Additional firewall security is required if the user hosts extranet pages on
the user's own server which result in a complex security mechanism and
increased workload.
Accessing Issues
● Information cannot be accessed in absence of internet connection.
However, information may be accessed within Intranet with no internet
connection.
Decreased Interaction
● It reduces the face to face interaction in the business which results in lack
of
communication among customers, business partners and suppliers.
Internet Services
Communication Services
Web Services
Video Conferencing
Point - to - Point
● This mode of conferencing connects two locations only.
Multi Point
● Such mode of conferencing established connection between more than two
locations via Multipoint Control Unit (MCU).
Internet Protocols
TCP Security
● TCP facilitates the following services to the processes at the application
layer:
◊ Stream Delivery Service
◊ Sending and Receiving Buffers
◊ Bytes and Segments
◊ Full Duplex Service
◊ Connection Oriented Service
◊ Reliable Service
1. Stream Deliver Service: TCP protocol is stream oriented as it permits the
sending process to send data as stream of bytes and the receiving process
to retrieve data as stream of bytes.
2. Sending and Receiving Buffers: It may not be possible for the sending and
receiving process to produce and obtain data at same speed, therefore,
TCP needs buffers for storage at sending and receiving ends.
◊ TCP of the first process informs TCP of the second process and gets
its approval.
◊ TCP of the first process and TCP of the second process and exchange
data
in both the two directions.
◊ After completion of the exchange of data, when buffers on both of
the sides are empty, the two TCP’s destroy their buffers.
● Points to remember:
1. The length of the datagram is variable.
2. The Datagram can be segmented into two parts: header and data.
3. The associated length of its header is around 20 to 60 bytes.
4. The header contains information for routing and delivery of the
packet.
● Points to remember:
1. UDP is utilized by the application that typically transmits a small
quantity of data at one time.
2. UDP provides protocol port utilized i.e. UDP message consists of both
source and destination port number, that makes it easier for UDP
software at the destination to divert the message to the right
application program.
FTP facilitates copying of files from one host to another. FTP facilitates the
mechanism for the same in given sequence:
1. FTP defines 2 processes, namely, Control Process and Data Transfer
Process at both ends, i.e., at client as well as at server.
2. FTP creates two different types of connections: one is for the purpose
of data transfer and another is for controlling the information.
3. Control connection is established between control processes while
Data Connection is established between <="" b="">
4. FTP utilizes port 21 for the purpose of control connection and Port 20
for the
purpose of data connection.
Trivial File Transfer Protocols (TFTP)
● Trivial File Transfer Protocol is also utilized for the transfer of the files but it
transfers the files with no authentication. Opposite to the FTP, TFTP does
not differentiate control and data information. As no authentication exists,
TFTP has no security features therefore it is not recommended to opt for
TFTP.
● Key points
1. TFTP utilizes UDP for data transport. Every TFTP message is
transmitted in a separate UDP datagram.
2. The first 2 bytes of a TFTP message defines the type of message.
3. The TFTP session is started when a TFTP client requests to upload or
download a file.
4. The request is transferred from an ephemeral UDP port to the UDP
port 69 of the TFTP server.
● Difference between FTP and TFTP
Telnet
HTTP Request
● HTTP request comprises of lines which contains:
1. Request line
2. Header Fields
3. Message body
● Key Points
1. The first line i.e. the Request line specifies the request method i.e. Get or
Post.
2. The second line defines the header which reflects the domain name of the
server from where index.htm is retrieved.
HTTP Response
● Like HTTP requests, HTTP response also has a certain structure. HTTP
response contains:
1. Status line
2. Headers
3. Message body
Domain
While every computer has its own unique address, every user using the
Internet has a unique address called a domain. A domain recognizes one or
more IP addresses. An example of a domain is weather.com and is part of the
URL such as https:// www.weather.com. The standard top-level domains are:
● mil - Military
There are additional top-level domains that are now recognized on the
Internet. They include:
● biz - Businesses
● coop - Cooperatives
● museum - museums
● pro - Accountants, lawyers, physicians, and other professionals
● tv - Television
Browser
A piece of software such as Mozilla Firefox and Internet Explorer that allows a
computer to access and display documents, view pictures, hear sound, and
view video clips from the World Wide Web.
The standard method for downloading and uploading files over the Internet.
With FTP, you can login to a server and transfer files (meaning you can "send"
or "receive" files).
Homepage
The first page that is viewed when the browser starts. It is also the page of a
Web site that provides the introduction or content with links.
The abbreviation for Hypertext Transfer Protocol. It is the set of rules by which
Web pages are transferred across the Internet.
TelNet
Web Page
Website
Address
Cyberspace
Navigate
The act of moving from page to page and website to website online.
Piracy
Website :
A collection of “pages” or files linked together and available on the world Wide
Web.
Attachment:
Chat:
Cyber bullying
Sending or posting harmful or cruel text or images using the internet or other
digital communication devices.
Icons:
Post
Query
A request for information about certain topic. It is what you put in the box
when you type something into the search engine.
Emoticons
Outbox
This is where all of the messages that you send are kept.
Server
Surf
Bookmark:
Hacker:
A popular term for someone who accesses computer information either legally
or illegally.
Spamming
The coded format language used for creating documents on the world wide
web and controlling how web pages appear.
Cookie :
Also known as an HTTP cookie, web cookie, or browser cookie.A small file
downloaded
by some web sites to store a packet of information on your browser.
History:
A list of websites the people are using a particular computer have visited.
Netiquette
Plug-in
Softcopy
Domain Name
A name given to the numerical or internet protocol (IP) address of a web site.
Firewall
The standard method computers use to communicate via the world wide web.
Pharming
Phishing
An online scam that uses e-mail to “fish” for users’ private information by
imitating legitimate companies.
Streaming (media)
The exchange of video clips, sounds or other types of media over the internet.
Large files that have been compressed to make them easier to send over the
internet
● Firefox
● Google Chrome
● Microsoft Edge
● Apple Safari
● Opera
● Brave
● Vivaldi
● DuckDuckgo
● Chromium
● Epic
1. Google : Google Search Engine is the best search engine in the world
and it is also one of most popular products from Google. Almost 70 percent of
the Search Engine market has been acquired by Google. The tech giant is
always evolving and looking to improve the search engine algorithm to
provide best results to the end-user. Although Google appears to be the
biggest search engine, as of 2015 YouTube is now more popular than Google
(on desktop computers).
2. Bing : Bing is Microsoft’s answer to Google and it was launched in 2009.
Bing is the default search engine in Microsoft’s web browser. At Bing, they are
always striving to make it a better search engine but it’s got a long way to go
to give Google competition. Microsoft’s search engine provides different
services including image, web and video search along with maps. Bing
introduced Places (Google’s equivalent is Google My Business), this is a great
platform for business to submit their details to optimise their search results.
3. Yahoo : Yahoo & Bing compete more with each other than with Google.
A recent report on netmarketshare.com tells us that Yahoo have a market
share of 7.68 percent. Although a leader as a free email provider, this is
declining significantly though with their recent acknowledgement that User
Details & Passwords where hacked last year.
4.Baidu : Baidu is the most used search engine in China and was founded in
Jan, 2000 by Chinese Entrepreneur, Eric Xu. This web search is made to deliver
results for website, audio files and images. It provides some other services
including maps, news, cloud storage and much more.
5.AOL : Aol.com is also among the top search engines. These are the guys that
used to send out CD’s which you’d load onto your PC to install their browser
and modem software. Once the pre-eminent player they now have a market
share of 0.59 percent. Verizon Communication bought AOL for $4.4 billion. It
was started back in 1983 as Control Video Corporation. It was named America
Online in 1991 and in 2009 as AOL Inc. AOL is a global mass media company
which is based in New York. The company also provides advertising services
as AOL Advertising, AOL mail and AOL Platform.
7.Excite : Excite is not widely known but is one that still gets into the top 10.
Excite is an online service portal that provides internet services like email,
search engine, news, instant messaging and weather updates. This also
provides us with the latest trends, topics and search for phrases such as: What
can President Trump actually do?
1. Yandex : Launched in 1997, Yandex is most used search engine in Russia.
Yandex also has a great presence in Ukraine, Kazakhstan, Belarus and Turkey.
It provides services like Yandex Maps, Yandex Music, online translator, Yandex
Money and many other services.
2. Lycos : Lycos has a good reputation in search engine industry. Its key
areas served are email, web hosting, social networking, and entertainment
websites.
● QZone
● Tumblr
● Baidu Tieba
● Skype
● Viber
● Sina Weibo
● LINE
● Snapchat
● Telegram
● Myspace
Top E-Commerce Site
● Amazon.
● Ali Baba.
● eBay.
● Jingdong.
● Zappos.
● Rakuten.
● Home Depot.
● Flipkart.
● Snapdeal
● Ali Baba
● Snanpdeal
● Myntra