Unit 1
Unit 1
⚫ TCP/IP protocols
⚫
In order for a computer to communicate on the Internet, a set of rules or
protocols computers must follow to exchange messages was developed.
The two most important protocols allowing computers to transmit data on
the Internet are Transmission Control Protocol (TCP) and Internet Protocol
(IP). With these protocols, virtually all computers can communicate with
each other.
⚫ Domain name system
⚫
An Internet address has four fields with numbers that are separated by
periods or dots. This type of address is known as an IP address. Rather than
have the user remember long strings of numbers, the Domain Name System
(DNS) was developed to translate the numerical addresses into words. For
example, the address fcit.usf.edu is really 131.247.120.10.
⚫URLs
Addresses for web sites are called URLs (Uniform Resource
Locators). Most of them begin with http (HyperText
Transfer Protocol), followed by a colon and two slashes.
⚫Top-level domain names include:.
⚫.com Commercial
⚫.edu Educational
⚫.gov US Government
⚫.intOrganization
⚫.mil US Military
⚫.net Networking Providers
⚫.org Non-profit Organization
History of internet
⚫ The concept of Internet was originated in 1969 and has undergone several
technological & Infrastructural changes.
⚫ The origin of Internet devised from the concept of Advanced Research
Project Agency Network (ARPANET).
⚫ ARPANET was developed by United States Department of Defense.
⚫ Basic purpose of ARPANET was to provide communication among the
various bodies of government.
⚫ Initially, there were only four nodes, formally called Hosts.
⚫ In 1972, the ARPANET spread over the globe with 23 nodes located at
different countries and thus became known as Internet.
⚫ By the time, with invention of new technologies such as TCP/IP protocols,
DNS, WWW, browsers, scripting languages etc., Internet provided a
medium to publish and access information over the web.
⚫ The first message was sent over the ARPANET from computer science
professor Leonard Kleinrock’s laboratory at University of California to the
standard research Institute.
⚫The Internet acts as a pipeline to transport electronic
messages from one network to another network. At the
heart of most networks is a server, a fast computer
with large amounts of memory and storage space. The
server controls the communication of information
between the devices attached to a network, such as
computers, printers, or other servers.
How internet works?
⚫ It's important to realize that the Internet is a global network of physical
cables, which can include copper telephone wires, TV cables, and fiber
optic cables.
⚫ Even wireless connections like Wi-Fi and 3G/4G rely on these physical
cables to access the Internet.
⚫ When you visit a website, your computer sends a request over these wires
to a server.
⚫ A server is where websites are stored, and it works a lot like your
computer's hard drive.
⚫ Once the request arrives, the server retrieves the website and sends the
correct data back to your computer.
⚫ What's amazing is that this all happens in just a few seconds!
Specification and establishment details
⚫
1) Computer
⚫ 2) Modem : Modem is a device that you will need to get your computer &
broadband working together.
.
⚫3) Internet Browser : It is a software that you can view
web pages.
⚫ INFORMATION:
⚫ The internet is the source of knowledge. All kinds of information is present in it. it is easily
accessed and can be searched more to get more additional knowledge. Information like
educational related, government laws, market sales, stocks and shares, new creations etc. is
gathered from a single place.
⚫ LEARNING:
⚫ The internet has now become a part of education. Education like home schooling is easily
carried out using internet. Teachers can upload their teaching videos in the internet and is
accessed by people across the world which is helpful for all students. The marks are also
released in the internet since, releasing mark for the whole institution in notice boards will
create chaos.
Advantage of Internet
⚫ ENTERTAINMENT:
⚫ The internet is now the most popular form of entertainment. Movies, songs, videos,
games etc. is available in internet for free. Social networking is also possible using
internet. Hence, there is tons of entertainment that is available in online in the
internet.
⚫ SOCIAL NETWORK:
⚫ The social networking is the sharing of information to people across the world.
Apart from being an entertainment website, it has many uses. Any job vacancy,
emergency news, ideas etc. can be shared in the website and the information gets
passed on quickly to wide area. Also the Social Networking websiter are used to
easy communications. Example: Facebook and twitter.
⚫ E-COMMERCE:
⚫ All business deals can be carried in the internet like transaction of money etc. this
is called E commerce. Online reservations, online ticket booking for movie etc. can
be done easily. It saves us lots of time. Online shopping is now the latest trend in
internet world where products from dresses to household furniture is available at
door step.
Disadvantage
⚫ There are always chances to loose personal information such as name, address,
credit card number. Therefore, one should be very careful while sharing such
information. One should use credit cards only through authenticated sites.
⚫ Another disadvantage is the Spamming. Spamming corresponds to the
unwanted e-mails in bulk. These e-mails serve no purpose and lead to
obstruction of entire system.
⚫ Virus can easily be spread to the computers connected to internet. Such virus
attacks may cause your system to crash or your important data may get
deleted.
⚫ There are various websites that do not provide the authenticated information.
This leads to misconception among many people.
Disadvantage of Internet
⚫ INFORMATION LOSS:
⚫ The information crucial to us or any important files can be easily taken by the
hackers. There is no exact proof for the security for the details we store like
account number, passwords etc. hence, sensitive information must be carefully
stored by the people.
⚫ SPAM:
⚫ The unnecessary emails, advertisements etc. sometimes are said to be spam
because they have the ability to slow down the system and makes the users to
face lots of problems. Spam makes the people get more confused since important
emails are also stored along with spam.
⚫ VIRUS ATTACKS:
⚫ The malware or virus threats are so deadly that affects the system to a greater
extend. It immediately deletes all important files and finally the system ends up
being crashed. The virus attack is possible in three ways. One it attacks selected
files. Two, it harms the executable boot files and most dangerous of all is the
macro virus which has the ability to replicate and expand to all parts of files.
Intranets and Extranets
What is intranet?
⚫ Intranet is a restricted version of the internet, that typically does not
allow access to anyone outside of its network.
⚫ An intranet is typically a local only network.
⚫ Intranet is defined as private network of computers within an organization
with its own server and firewall.
⚫ Intranets may be used for organizations or networks that do not want their
information to be able to be accessed by outside sources, and is especially
important for organizations that require a high amount of secrecy - such as a
server that holds military secrets or a database for the CIA. (Central
Intelligence Agency)
⚫ Intranets are basically mini versions of the internet that connect just a few
servers, instead of the countless number of servers that the internet holds and
connects with one another.
⚫ It is mostly used by company, school, government or organization.
Advantages
Communication : Intranet offers easy and cheap communication within an
organization. Employees can communicate using chat, e-mail or blogs.
Cost Effective : Employees can see the data and other documents using
browser rather than printing them and distributing duplicate copies among
the employees, which certainly decreases the cost.
Security : Since information shared on intranet can only be accessed within an
organization, therefore there is almost no chance of being theft.
Immediate Updates : Any changes made to information are reflected
immediately to all the users.
Time Saving : Information on Intranet is shared in real time.
Collaboration : Information is distributed among the employees as according
to requirement and it can be accessed by the authorized users, resulting in
enhanced teamwork.
Disadvantage
What is Extranet?
⚫ An extranet is like an intranet, but also provides controlled access to
authorized customers, vendors, partners, or others outside the company.
⚫ The important thing to bear in mind is that extranets exist to create a path
of communication between your internal staff and external
organizations, whether they be customers, suppliers, or business partners.
⚫ An extranet provides a place for your business and third parties to work
together and share information in a secure environment, which sits outside
of your intranet – meaning that external partners will not have access to
confidential internal matters.
⚫ An Extranet is actually an Intranet that is partially accessible to
authorized outsiders.
⚫ The level of access can be set to different levels for individuals or groups of
outside users. The access can be based on a username and password or an
IP address.
⚫ Extranet is used for specific use cases including B-2-B.
⚫ An extranet is an extended intranet. In addition to allowing access to
members of an organization, an extranet uses firewalls, access profiles, and
privacy protocols to allow access to users from outside the organization.
Advantage of extranet
Disadvantage
Hosting : Where the extranet pages will be held i.e. who will host the extranet
pages. In this context there are two choices:
⚫ Host it on your own server.
⚫ Host it with an Internet Service Provider (ISP) in the same way as web pages.
⚫ But hosting extranet pages on your own server requires high bandwidth internet
connection which is very costly.
Security : Additional firewall security is required if you host extranet pages on
your own server which result in a complex security mechanism and increase
work load.
Accessing Issues : Information can not be accessed without internet
connection. However, information can be accessed in Intranet without
internet connection.
Decreased Interaction : It decreases the face to face interaction in the business
which results in lack of communication among customers, business partners
and suppliers.
More about intranet and extranet
⚫http://www.brighthub.com/computing/ent
erprise-security/articles/63387.aspx
⚫http://www.hcidata.info/inet.htm
⚫https://www.claromentis.com/blog/whats-
the-difference-between-intranets-and-extr
anets/
⚫http://www.differencebetween.info/differ
ence-between-intranet-and-extranet
INTERNET
APPLICATIONS
⚫Email
⚫Telnet
⚫FTP
Email: Electronic Mail
Email :
⚫ E-mail, also known as electronic mail, is the most widely used and
successful of Internet applications.
⚫ First the sender types the message or attach the file and sends it to the mail server
or email service provider, the mail server forwards it to the next server through
internet and satellite. Then the message is finally received by a receiver.
Server Authentication :
To access an e-mail server, you will need to provide “authentication” – usually user id (or
username) and passwords. This identifies you to the server and confirms that you have
permission to check e-mail on that account. Although some servers use your e-mail address
itself for the authentication user id
Email Address
BOD
Y
CC and BCC
⚫CC stands for Carbon Copy. When you CC people on an
email, the CC list is visible to all other recipients. For
example,
CC [email protected] and [email protected] on an
email, Bob and Jake will both know that the other received
the email, as well.
⚫BCC stands for “blind carbon copy.
⚫ no one but the sender can see the list of BCC recipients. For
example, if you
have [email protected] and [email protected] in the
BCC list, neither Bob nor Jake will know that the other
received the email.
⚫The To and CC fields work similarly. Whether you put
four email addresses in the To field or put one email
address in the To field and three in the CC field, the
four people will all receive the same email. They’ll
also be able to see the email address of every other
recipients in the To and CC fields.
⚫ E-mail is one of the protocols included with the Transport Control
Protocol/Internet Protocol (TCP/IP) suite of protocols.
⚫ IMAP Protocol:
For Example, a person has a computer in his office at new Delhi. He visit
Mumbai on a family trip. But when he is free at Mumbai, he can log in his
system Delhi from Mumbai and use all the databases and files and work on
the system.
The user’s computer, which initiate the connection, is referred as the local
computer and the machine which is accepted the connection is referred to
as the remote or host computer
⚫ Some remote machines may require a user to have an account on machine,
and may promote users for a username and password.
⚫ The remote or host computer uses a telnet server program to accept the
connection and send responses to requests for information back to the local
computer.
HOW TELNET WORKS?
⚫ Tim Berners-Lee, a British scientist at CERN, invented the World Wide Web
(WWW) in 1989.
⚫ The web was originally conceived and developed to meet the demand for
automatic information-sharing between scientists in universities and institutes
around the world.
⚫ On 30 April 1993 CERN put the World Wide Web software in the public
domain.
⚫ The World Wide Web (WWW) is a network of online content that is formatted in HTML
and accessed via HTTP.
⚫ HTTP protocol is the method used to transfer web pages to your computer.
⚫ The World Wide Web (WWW or Web for short) is the part of the Internet
that you can access using a web browser such as Internet Explorer or Firefox,
etc.
⚫ With a web browser, one can view web pages that may contain text, images,
videos and navigate between them via hyperlinks.
• The World Wide Web consists of all the public Web sites connected to the
Internet worldwide, including the client devices (such as computers and cell
phones) that access Web content.
• The internet Is the actual network of networks where all information resides.
• Things like Telnet, ftp and email are part of the internet but not part of www.
• HTTP protocol is the method used to transfer web pages to your computer.
The World Web is based on these technologies:
1) HTML - Hypertext Markup Language
2) HTTP - Hypertext Transfer Protocol
3) Web servers and Web browsers
⚫ WWW Components :
1) Structural component
-client
-servers
-caches
-Internet
2) Semantic Components
-Hyper Text Transfer Protocol
-Hyper Text Markup Language
3) Extensible Markup Language(XML)
-Uniform Resource Identifiers(URLs)
Web Page :
⚫ A web page, or webpage, is a document that is suitable for the World
Wide Web and web browsers.
⚫ 1)Client-Side Scripting
⚫
⚫ 2)Server-Side Scripting
Client-side scripting refers to the programs that are executed on client-side.
Client-side scripts contains the instruction for the browser to be executed in
response to certain user’s action.
⚫ It is processed using client side scripting such as JavaScript. And then passed
in to Document Object Model (DOM).
⚫ In these cases, the user's web browser would download the web page content
from the server, process the code that's embedded in the web page, and then
display the updated content to the user.
server side scripting, the software runs on the server and
processing is completed in the server then plain pages are sent
to the user.
⚫ For example, login pages, forums, submission forms, and
shopping carts, all use server-side scripting since those web
pages change according to what is submitted to it.
⚫ Scripting languages such as PHP, ASP, ASP.NET, JSP,
ColdFusion and Perl allow a web page to respond to
submission events.
For more please visit:
⚫https://www.javatpoint.com/website-static-vs-dynamic
⚫https://www.doteasy.com/web-hosting-articles/what-is-a-d
ynamic-web-page.cfm
⚫http://smallbusiness.chron.com/difference-between-dynam
ic-static-pages-69951.html
⚫https://www.tutorialspoint.com/internet_technologies/web
_pages.htm
⚫https://www.computerhope.com/jargon/w/webpage.htm
HTTP (Hyper Text Transfer Protocol)
http://www.microsoft.com
http://www.ibm.com
http://www.netscape.com
Resources
URL Registration
⚫ URL is the abbreviation of Uniform Resource Locator.
⚫ It is the global address of documents and other resources on the World
Wide Web. For example, www.facebook.com, www.google.com.
⚫ A URL is one type of Uniform Resource Identifier (URI).
⚫ URL strings consist of three parts