0% found this document useful (0 votes)
18 views96 pages

010.2 Networking 2020-21 Part 2

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views96 pages

010.2 Networking 2020-21 Part 2

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 96

NETWORK SECURITY CONCEPTS

INTRODUCTION TO WEB
SERVICES
E-COMMERCE
⦿ Modem
⦿ RJ-45 connector
⦿ Ethernet C a rd (NIC)
⦿ Router
⦿ Switch
⦿ Gateway
⦿ Wi-Fi C a rd
⦿ Modem is short for "Modulator-Demodulator.“
⦿ It is a hardware component that allows a computer or
another device, such as a router or switch, to connect to
the Internet.
⦿ As we know phone lines work on analog signal while
computer works on digital signal, So the role of
Modem is to convert Digital signal to Analog so that it
can be carried by telephone lines and other side it
again convert analog signal to digital form
⦿ The "RJ" in RJ45 stands for "registered jack,“
⦿ Registered Jack 45 (RJ45) is a standard type of
physical connector for network cables.
⦿ RJ45 connectors are most commonly seen
Ethernet cables and networks. Modern Ethernet with cables
feature small plastic plugs on each end that are
inserted into the RJ45 jacks of Ethernet devices
⦿ It is also known as NIC (Network Interface Card)
⦿ Is a device that is attached to each of the workstations
and the server and helps the workstations establish all
– important connection with the network.
⦿ It contain RJ-45 slot to connect Ethernet cable with RJ-
45 connector.
⦿ Each NIC attached to workstation has a unique number
identifying it, known as M AC Address.
⦿ Also known as Network Interface Unit.
⦿ A device that works like a
bridge but can handle different protocols
router iscan link
knownEthernet andas mainframe.
router. It is
For example
responsible for forwarding data from one network to
different network.
⦿ The main purpose of router is to sorting and
distribution of the data packets to their destination
based on their IP Address.
⦿ Router uses Logical Address whereas Bridge uses
Physical Address
⦿ is an electronic device that connect several nodes to
form a network and redirect the received information to
all the connected nodes in a broadcast mode.
⦿ Hub is basically used in network to increase the
number computer allows them to communicate with
each other.
⦿ It is a dumb device i.e. it forward the message to every
node connected and create huge network traffic.
⦿ Hubs can be either Passive or Active
• Active Hub : they amplify the signals as it moves
from one connected device to another like
Repeaters.
• Passive Hub: allows signals to pass from one device
to another without any change.
⦿ Itis known as Intelligent HUB
⦿ Is an intelligent device that connect several nodes to
form a network and redirect the received information
only to the intended node(s)
⦿ Switch stores M AC table, and when any node transmit
the data to any node, Switch filters the desired M AC
Address of that node and send the data to that node
only.
⦿ isa device used to connect different type of networks
and perform the necessary translation so
that networks
connected the can communicate properly.
Gateway helps to connect different type of network i.e.
following different protocols.
BRIDGE

A bridge in a computer network is a device used to


connect multiple LANs together with a larger Local
Area Network (LAN).

Basically, a bridge in computer networks is used to


divide network connections into sections, now each
section has separate bandwidth and a separate
collision domain. Here bridge is used to improve
network performance.
BRIDGE
⦿ Similar to Ethernet card, but it allows our computer to
connect with other device without wire i.e. for wireless
connectivity.
⦿ It may be internal or external with built-in wireless
radio and antenna. The most common Wi-Fi card used
in desktop computer are PCI-Express Wi-Fi card made
it fit the PCI-Express card slots on the motherboard.
⦿ It allow to connect our device to hotspot available.
⦿ Advantage is that it allows computer to become part of
network without being physically connected through
wire and can be placed anywhere.
⦿ Refers to SET OF RULES
⦿ In Network there are variety of computer connected to
each other and data in many ways.
⦿ For interaction among these, some rules are applied
like how and when a device can send and receive data,
how to send the data packet and how to receive etc.
There are many protocols used like:
• TCP/IP
• FTP
• PPP
• HTTP
• SMTP
• POP3
⦿ Stands for Transmission Control Protocol and Internet
Protocol
⦿ TCP is connection oriented protocol i.e. first the
connection between sender and receiver is established
through process called handshake (RTS,CTS, ACK etc.)
⦿ TCP divides the large packets to transmit into smaller
data packets called datagrams.
⦿ At the receiving end it also reassemble the packet for
form original message.
⦿ IP (INTERNET PROTOCOL) : responsible for
providing address of each computer and performing
routing. Each packet is assigned with destination IP
address.
⦿ Stands for File Transfer Protocol
⦿ It allows transferring of files from one system to
another like uploading of file from local machine to
web server using FTP Client like FileZilla etc.
⦿ FTP offers these advantages:
• Useful to transfer files from one network to another
• It is an effective way to get geographically dispersed
group to co-operate on a project.
• It is popular way to update web sites.
⦿
⦿ Stands for Point-to-Point Protocol
⦿ Point - to - Point Protocol (PPP) is a communication
protocol of the data link layer that is used to transmit
multiprotocol data between two directly connected
(point-to-point) computers.
⦿ It is a byte - oriented protocol that is widely used in
broadband communications having heavy loads and
high speeds.
⦿ Stands for Hypertext Transfer Protocol
⦿ Used to transfer all files and other data(resources) from
one computer to another on the world wide web.
⦿ Client(Browser) send request to Web Server using
HTTP protocol and Server respond back to Client using
HTTP i.e. Client and server over web communicate
using HTTP protocol.
⦿ HTTP is stateless protocol, various technique applied to
make HTTP as State full like Cookies.
⦿ See the format of URL:
• http://www.google.com
HTTPS
⦿ Stands for Hypertext Transfer Protocol secure
⦿ Used to transfer all files and other data(resources) from
one computer to another on the world wide web with
security
⦿ ⦿ See the format of URL: https://www.google.com
⦿ Stands for Simple Mail Transfer Protocol
⦿ SMTP is a set of communication guidelines that allow
software to transmit an electronic mail over the internet
is called Simple Mail Transfer Protocol.
⦿ It is a program used for sending
messages to other computer users based
on e-mail addresses
⦿ Port 25 (non-encrypted, unsecure)
⦿ Port 465 (encrypted, secure)
⦿ Stands for Post Office Protocol (Version-3.0)
⦿ POP3 is a client/serverprotocol in
which e-mail is received and held for you by your
Internet server.
⦿ Periodically, you (or your client e-mail receiver) check
your mail-box on the server and download any mail,
probably using POP3.
⦿ It also allows to download the received messages on
local machine using tool like Outlook so that user can
read them even when they are not connected to the
Internet.
⦿ Port 110, default POP3 used for unsecured email
communication
⦿ Port 995 – the encrypted port used for
secured communication using POP3
⦿ Remote login is a network application that permits a
user sitting at a different location to work on a specific
program on another program.
⦿ The user need ID of that computer generated by
remote login application.
⦿ It is done only when both P C are connected to Internet.
⦿ Mainly used by customer support system to
do some installation, setting on client computer.
⦿ The main programs are:
• Telnet
• AnyDesk
• Team Viewer
⦿ Telnet is one of the earliest remote login protocols on
the Internet.
⦿ Telnet is a user command and an
underlying TCP/IP protocol
for accessing
computers. remote
⦿ Through Telnet, an administrator or another user
can access someone else's computer remotely. On the
Web, HTTP and FTP protocols allow you to request
specific files from remote computers, but not to actually
be logged on as a user of that computer.
⦿ With Telnet, you log on as a regular user with whatever
privileges you may have been granted to the
specific application and data on that computer.
⦿Mobile
protocols use multiplexing to
communication
send
information. Multiplexing is a
method to combine multiple
digital or analog signals into
one signal over the data
channel.
⦿ This ensures optimum
utilization of expensive
resource and time. At the
destination these signals are
de-multiplexed to recover
individual signals.
⦿
GSM• (Global System for Mobile Communication)
⦿ CDMA
• C o d e Division Multiple Access
⦿ WLL
• Wireless Local Loop
⦿ It is oneof the most
widely used
digital wireless
telephony system.
⦿ Now it is an international standard in Europe, Australia,
⦿ It was developed in
Asia and Africa.
⦿ Europe in 1980s
Any GSM handset with a SIM card can be used in any
country that uses this standard. Every SIM card ha a
unique identification number.
⦿ GSM uses TDMA (Time Division Multiple Access) to
support upto eight calls simultaneously. It also uses
encryption to make the data more secure.
⦿
⦿
It stands for General
It is a packet based wireless communication
Packet
technologyRadio Services.
that charges users based on the volume of
data the send rather than the time duration for which
they are using the service.
⦿ GPRS is the mobile communication protocol used by
second (2G) and third generation(3G) of mobile
telephony). Its speed upto 56kbps to 114kbps, however
the actual speed may vary depending on network
traffic.
⦿ Itis wireless local
telephone service
that can be provided
⦿ in subscribers
The homes or offices.
connect to their local exchange
instead of the central exchange wirelessly.
⦿ A data is transferred over very short range, it is more
secure than wired network.
⦿ WLL system consists of user handset and a base station.
The base station is connected to the central exchange
as well as antenna.
⦿ The antenna transmits to and receives call from users
through microwave links
It was first used by the
⦿

British military during


world war II.
⦿ After the war its use

spread to civilian areas


⦿ As each user gets the entire spectrum all the time,
duequality
voice to high service
is very high.
⦿ CDMA phones were not using the SIM card, it comes
quality.
with built in technology.
⦿ In India CDMA technology was used by Tata Docomo
and Reliance, but now its services are stopped and only
GSM network is working.
⦿The network nowadays is Mobile phone
Network. It is cellular based network whichg ave
popular
mobile phone name “cell Popular mobile
phone ” . technologies:
⦿ 1G
⦿ 2G
⦿ 3G
⦿ 4G
⦿ 5G
⦿ Used for voice calls
⦿as analog
Technology used signal
as AMPS (Advanced Mobile Phone
System)
⦿ No data was
⦿ An AMP was a voice-only network operating on
transmitted
800MHz.
⦿ Speed upto 2.4 kbps
⦿ Poor voice quality
⦿ Large phone with limited battery life
⦿ No data security
⦿ In this
messaging were added.
generation, few
⦿features likemessaging,simple
New services such as text packet data(for
MMS and internet access), called ID and also
text
introduced SIM (Subscriber Identify Module) card.
⦿ Data transfer rate upto 64kbps
⦿ Disadvantage was low network range, slow data rates.
⦿ To overcome these two problems two new network –
CDMA and EDGE (Enhanced Data Rate for GSM
evolution) were introduced.
⦿In this generation
Web browsing, email,
video
conferencing, video downloading, picture sharing and
other smartphone technologies were introduced.
⦿ Devices are called smartphones
⦿ Fast communication, data speed between
144kbps to 2Mbps
⦿ High quality voice transmission
⦿ Supported multimedia(playing music, viewing
videos, video calls etc)
⦿ Mobile TC, Mobile internet
⦿ The speed of this generation is
from 100 Mbps to
⦿ Voice as VoIP (Voice over Internet Protocol (VoLTE)
1Gbps
⦿ Better Video calling than 3G, Video conferencing etc.
⦿ Based on LTE-Advanced (Long

Term Evolution)
⦿ It is yet to be implemented in
India which promises superfast
data transfer rate upto 20Gbps
along with energy saving.
⦿ Brain of Smartphone
⦿ Mobile processor
receives commands,
makes instant
calculations, plays
⦿ Mobile processor has majorly two sub-processor:
audio/video,
• Communication Processing Unit stores
• Application Processing Unit
information
⦿ Popular Mobile processors and are: sends
signals throughout
• Qualcomm Snapdragon 865
• Apple A13 Bionic
the
device.
• Samsung Exynos 990 etc.
⦿ It is responsible for making and
receiving
• RF Transceiver phone calls on a
• Audio Subsystem
mobile handset. It works with 2
⦿ RF Transceiver : responsible for connecting SIM card
subunits:-
to base station through radio signals. Its uses networks
like 3G/4G/LTE etc.
⦿ Audio subsystem : responsible for converting the
voice signals(analog) to digital signals. The audio
subsystem receives voice input through in-built mic
and can produce audio output and send it to in-built
speaker.
⦿ It is responsible for performing
operations like making
calculations, playing music,
internet surfing, playing videos,
connecting to other device,
chat, screenshot, making
videos, saving data etc.
⦿ Popular Chat protocols
are: • IRC
• XMPP
⦿ IRC ( Internet Relay Chat ) : IRC (Instant Relay Chat) is a chat
protocol that has been around since 1988. It is a simple
protocol and is quick to parse on the server side, requiring
little resources. IRC does not require any user
authentication, only that the connecting username must be
unique in a channel.
⦿ XMPP (Extensible Messaging and Presence Protocol): it is
based on XML. It requires each user must have registered
unique IDs. WhatsApp, Facebook, Google Talk chat is using
this protocol. Its features are User Identity, Multiple logins,
Persistent message, Popularity, Personal Message
⦿ The H.323 protocol is
deployed protocols in video conferencing.
one
⦿ Video of the is most
conferencing widely
a technology by means of
which two or more parties situated in different
geographical locations can watch and converse with
each other by means of two-way transmission of video
and audio data in near real-time.
⦿ WIRELESS FIDELITY : protocols allows devices to
connect to the internet without a direct line from your
Device to ISP (Internet Service provider). Its maximum
coverage area is 100 meters. Transmission speed upto
54 mbps. It is mostly used in LAN Application. It uses
Radio wave spectrum
⦿ Wi-Fi HOTSPOT : a hotspot is a venue that offers Wi-
Fi access. We can share out internet through Wi-Fi
hotspot. We can set Hotspot with or without password.
With mobile we can connect upto 10 devices with
hotspot (However it depends upto type of device)
⦿ Stands
for wireless inter-operability for
Microwave access.
⦿ Wi-Max is used in MAN Applications
⦿ Wi-Max network range to max 90kms
⦿ Wi-Max transmission speed can be upto
70mbps
⦿ Network security is any activity
designed to protect the

usability and
⦿ Effective network integrity
security of
manages access your
to
the network. It targets a variety of threats and
network
stops them from
network.
and data.
entering or spreading on your

⦿ It
 includes
⦿ Threats both hardware and
to Network Security:
 Virus
software
 Worms technologies.
 Trojan Horse
 Spams
⦿ Are the malicious
code/programs that
cause damage to data
and files on a system.
⦿ Virus attach itself to
program or file so that it
can spread from one
computer to another
leaving
⦿ Some infection
Virus cause as like
only annoying effects it changing
travels.
desktop icons, etc. while others can damage your
hardware, software or files.
⦿ Almost all Virus are attached to an executable file, it
means Virus cannot infect your computer unless you
run or open the program/file.
⦿ It means Computer Virus cannot spread without a
human action.
⦿ DAMAGE OR DELETE
FILES : some virus may
delete or damage
random documents or
specific file that are
crucial
⦿ INVADE YOUR EMAILto POperating
RO G R A M : some forms of
viruses may wreak even more havoc by spreading
System and system will
themselves to the contact in your address book
not be able to boot.
⦿ It may slow down your
computer
⦿ Use Anti-Virus Software: scan all
your computer for virus,
disconnect infected PC
⦿ Don’t download or open email from unknown sender
from
network,
⦿ Don’t notify
click on link anti-type thevirus
in email rather link in
address
vendor bar to update its database.
⦿ Disconnect the internet if you are away
Regularly
⦿ Disable
⦿ update your Anti-Virus
cookie if possible
⦿A worm is a self-replication
entire disk space or memory. A Worm keeps on
programs which
creating its copies until all eats
the diskup
spacethe
or memory is
filled.
⦿ Worms harm to a computer or a computer network by
consuming bandwidth and slow down the network
speed. After the worm has infected a system, it can
propagate to other systems via internet or while
copying files from one system to another without user
interaction
⦿
DAMAG E entire disk space or memory
• It eats up
• Consumes network bandwidth and slows down
the network speed.
⦿ PREVENTION
• Use Total Security software and scan the PC
using the option BOOT TIME SCAN.
• Update regularly
• Avoid inserting infected pen drives
⦿ Is a program that
appears harmless (such
as text editor or a utility
program) but actually
performs malicious
functions
• Data theft such as
deleting or damaging
• Installation of unwanted softwares
• Keystroke logging
files.
• Downloading or uploading of files. And many
⦿ With
more… help of Trojan, harm
that could be done by
hacker on target
⦿ Use Total
Security
 ⦿ Never download any software of file from

software

untrusted website
⦿ While using public computer, check for any
⦿ Update
addition device connected to it or b e alert of
keylogger software, so for financial transaction
regularly
prefer to use VIRTUAL KEYBOARD rather than
keyboard typing
 ⦿ Logout from your account and remove history if
you are working on public computer
⦿ Means sending of bulk-mail by an
identified or unidentified source. In non-
malicious form, bulk advertising mail is
sent to many accounts. In malicious
form (email bombarding) the attackers
keeps on sending bulk mail until the
mail-server runs out of disk space.
Damages are:
⦿ Spam reduces productivity: billions of spam messages
circulating across the Internet can disrupt email delivery,
degrade system performance and reduce overall
productivity
⦿ Spam eats up your time: deleting spam emails like the
simple solutions, but it eats a significant amount of
productivity
⦿ Spam can lead to worse things: spam messages may
contain offensive, fraudulent material and can even be used
to spread viruses.
⦿ Also known as web cookie or browser cookie, is a small
piece of data sent from a website and stored in a user’s
web browser while a user is browsing a website. Some
cookies disappear after user closes his browser while
others, known as tracking cookies, remain saved and
load the next time user visits the same website.
⦿ Cookie help website to store information about visitors
like username, password and other details.
⦿ Although cookie help track
user’s browsing sessions and
load information faster, but
• Session Data: When we visit any website on regular
create some
basis, we may not havesecurity
to enter usernameand and
privacy
password toconcerns as well.
get in. That’s because These
the information is
being pulled from tracking cookie. These cookie
security and in privacy
stores information concerns
encrypted form but if
are:
somebody gets the encryption key he could discover
your password
• Tracking Information: you visit certain
websites
when with advertisements, those ads create
cookies that store and track your online pattern. You
may have noticed that if you go to a clothing store’s
website, for example you’ll see ads for that store
when you click away to other website. That’s because
tracking cookies have relayed this information back
to advertisers, who use it to target their ads.
• Public Computers: the same general threats exists
for traffic cookies saved on public computer. So it is
advised when you finish using public computer or
shared computer, delete the cookies to ensures that
the next people who use the same computer can’t
access the information
⦿ A firewall is a technique used in
a secured computer system or
network to block unauthorized
access and allow only the
authorized user.
⦿ Firewalls can be implemented in

either hardware or software, or


a combination of both. It is a
device or set of devices or
Software firewall Hardware Firewall
Firewall softwares are frequently It is physical piece of equipment
used toprevent designed to perform firewall duties.
unauthorized Internet users from
accessing private networks It may be actually be another
connected to the Internet, computer or dedicated piece of
especially intranets. equipment which serve as firewall.

All messages entering or leaving Firewall keep out malevolent


the intranet pass through the hackers and people who intended to
firewall, which examines each do damage and take over other
message and blocks those that peoples’ servers.
do not meet the specified
security criteria.

It could also provide protection


against the most common Trojan
or Worms
⦿ (Hypertext Transfer Protocol Secure) is an
HTTP communication protocol that protects the
S integrity
 and confidentiality of data between the
user's computer and the site.

inter
⦿ Users expect a secure and private online
experience when using a website.
net
⦿ We encourage you to adopt HTTPS in order to
protect your users' connections to your website,
regardless of the content on the site.
⦿ Data sent using HTTPS is
secured via Transport Layer
Security protocol (TLS), which
provides three key layers of
protection:
⦿ ENCRYPTION : encrypting the
exchanged
their data
conversations, track to
their keep
activities it
secure
across fromor steal
multiple pages, eavesdroppers.
their information.
ThatINTEGRITY
⦿ DATA means that : while
data thecannot
user
is browsing
be a website,
modified nobody
or corrupted
can
during "listen"
transfer,to intentionally or
⦿AUTHENTICATION
otherwise, : proves that your users
without
communicate
being detected.
with the intended website.
Closed Lock Pad (Secure Connection)
⦿The IT Act, 2000 is an Act of the
21 of 2000) notified on 17 October, 2000. It is the
Indian parliament
primary law (No.
in India dealing with cybercrime and
electronic commerce.
⦿ The original Act contained 94 sections, divided into 13
chapters and 4 schedules. The law apply to the whole
of India.
⦿ Persons of other nationalities can also be indicted
under the law if the crime involves a computer or
network located in India.
⦿ A major amendment was made
to the IT Act in 2008.
⦿ It also introduced section 69, which gave authorities the
⦿ It introduced section 66A
power of “interception or monitoring or decryption of
which
any penalized
information sending
through any computer resource”of
⦿ The Act was passed in December 2008 and came into
offensive message.
force in October 2009.
⦿ Cyber law is the part of the overall legal system that
deals with the Internet, cyberspace, and their
respective legal issues.
⦿ Cyber law covers a fairly broad area, encompassing
several subtopics including freedom of expression,
access to and usage of the Internet, and online
⦿ Generically,
privacy. cyber law is referred to as the Law of the
Internet.
⦿ Cy b er Law also called IT Law is the law
reg arding Information-technology including
computers and internet.
⦿ Importance of Cyber Law:
⦿ It covers all transaction over internet.
⦿ keeps eyes
It touches on action
every all activities over reaction
and every internet.in cyberspace.
⦿
⦿ Fraud
⦿
Copyright
⦿ Defamation
⦿ Harassment and Stalking
⦿ Freedom of Speech
⦿ Trade Secrets
⦿ Contracts and Employment Law
⦿Is any criminal offense that is
use of electronic communications of information
facilitated by,
system including any or involves
electronic device, computer or
the Internet.
⦿ It involves the terms like : Phishing, Credit Card Frauds,
illegal downloading, industrial espionage, child
pornography, cyber bullying, cyber stalking, cyber
terrorism, creation and /or distribution of viruses, spam
and so on
⦿ C Y B E R TROLLS AND BULLY I N G : It refers to a person
who purposely post opposing, sarcastic, demeaning or insulting-
comments about something or someone with an aim of targeting a
person online. The provocative messages posted this way are also
called trolls. It is a cyber crime and is a form of cyber bullying.
⦿ CYBER BULLYING: Harassing, demeaning, embarrassing,
defaming, or intimidating someone using modern technologies
like internet, cell phones, instant messengers, social networks etc.
is called Cyber Bullying.
⦿ C Y B E R STALKING: It is a kind of online harassment wherein the
victim is subjected to barrage of online messages and emails.
Typically these stalkers know their victims instead of resorting to
offline stalking, they use the internet to stalk, etc.
⦿ If any cyber crime
happens, one must
report it firstly to
parents, school
• The local police stations can be approached for
filing complaintsand
authorities just as
thenthe cybercrime
to cells
specially designation with the jurisdiction to register
police.
complaint
• In addition, provisions have now been made for
filing of E-FIR in most of the states
• In addition, the ministry of Home Affairs is also
launching a website for registering crimes against
women and children online including cybercrimes
⦿ It refers to Intellectual Property Rights.
⦿ It refers to something owner has legal
This term became popular in context of computer ethics.
⦿rights.
⦿ Intellectual Property refers to creations of the intellect,
inventions, literacy and artistic work, symbols, names,
image and design used in commerce are part of it.
⦿ It is divided into 2 categories:
⦿ INDUSTRIAL PROPERTY: it includes inventions, trademark,
design, commercial names, etc.
⦿ COPYRIGHT: it includes literacy and artistic works such as
novel, poems, film, story, drawing, painting, photograph. It is
legal concept, enacted by most governments, giving the
creator or original work exclusive rights to it, usually for a
limited period.
⦿ The gaining of unauthorized
access to data in a system or
computer.
⦿ Hacking is access
algorithm to gain identifying
to a system. weakness
⦿ Hacking is classified according to their intent:
in computer
• Ethical Hacking
systems or
networks
• Cracking to exploit its
weaknesses to gain access.
Example of Hacking: Using
password cracking
⦿Process to gain access to
identified weakness. They may also perform
systems withand
penetration testing a vulnerability
view to assessments.
fix the

⦿ Refers to gain unauthorized access to computer


systems for personal gain. The intent is usually to steal
corporate data, violate privacy rights, transfer funds
from bank accounts etc.
⦿ Stands for World Wide Web also known as Web.
⦿ It is a collection of website or web pag es stored in web
server and connected to devices through the Internet.
⦿ These website may contain text, images, audio, sound,
animation etc.
⦿ The WWW, with Internet allows retrieval and display of
website to your device.
⦿ WWW was invented by Tim Berners Lee in 1989. Internet and
Hypertext as available at that time. but no one thought how to
use the internet to link or share one document to another. Tim
focused on three main technologies that could make
computers understand each other, HTML, URL, and HTTP. So,
the objective behind the invention of WWW was to combine
recent computer technologies, data networks, and hypertext
into a user-friendly and effective global information system.
⦿ Stands for Hypertext Markup Language
⦿ Hypertext Markup Language is the standard markup
language for documents designed to be displayed in a
web browser.
⦿ It is generally assisted by other technologies like CSS,
JavaScript, AJAX etc.
⦿ It is tag based code, where tags are predefined. Tags
are the instruction how web page will appear on
browsers.
⦿ It is not case sensitive.
⦿ HTML files are stored with extension .HTM or .HTML
⦿ Few tags are: <HTML>, <TITLE>,< A>,< IMG> etc
⦿ Stands for extensible markup language
⦿ Extensible Markup Language is a markup language
that defines a set of rules for encoding documents in a
format that is both human-readable and machine-
readable.
⦿ It allows us to exchange data between heterogeneous
system.
⦿ XML stores information in a plain text format so it is not
blocked by any firewall.
⦿ Tags are not predefined i.e. we can create our own tag
⦿ It is case sensitive.
HTML XML
It focuses on presentation of data i.e. It focuses on structure of data i.e. how
how the data will appear on web data is stored. XML data can be
page. presented on web page by using
XSLT (XML Style sheet Language
Transformation)
TAGs are fixed i.e. we cannot create TAGs are not fixed, we can create our
our own tag own tag
Case Insensitive Case Sensitive
Ordering of TAG is immaterial Ordering of TAG i.e. nesting of TAG
must be in correct order
⦿ Stands for Hypertext Transfer Protocol
⦿ Used to transfer all files and other data(resources) from
one computer to another on the world wide web.
⦿ Client(Browser) send request to Web Server using
HTTP protocol and Server respond back to Client using
HTTP i.e. Client and server over web communicate
using HTTP protocol.
⦿ HTTP is stateless protocol, various technique applied to
make HTTP as State full like Cookies.
⦿ See the format of URL:
• http://www.google.com
 Communicating with computer on internet using IP address
is practically impossible as it is very difficult to remember IP
address of every computer or website.
 System has been developed to assign names to IP Address
and maintains a database of these names corresponding to
IP address.
 These names are referred as Domain Name.
 Example – cbse.nic.in, gmail.com
 It is used in URL(uniform resource locator) to identify
particular web servers.
 Domain name has more than one parts –
Top Level Domain Name or Primary Domain Name
Sub Domain names
 For example in cbse.nic.in in is the primary domain, nic is
sub domain of in and cbse is sub-domain of nic.
Generic Domain Names:-
 .com – commercial business
 .edu – educational institutes
 .gov – government agencies
 .net network organizations
 .org Organizations(nonprofit)

Country Specific Domain Names:-


.in – india
.au – australia
.ca – canada
.ch – china
.nz – new zealand
.pk – pakistan
.jp – japan
.us – united states of America
⦿ Standsfor Uniform Resource Locator.
⦿ Each web site has a unique address called URL,
for e.g. http://www.cbse.nic.in
⦿ The basic format of URL is :
type://address/path
⦿ A website is a collection of web pages and related
content that is identified by a common domain name
and published on at least one web server.
⦿ For example: g oogle.com, youtube.com
⦿ All publicly accessible websites collectively constitute
the world wide web.
⦿ Website is broadly of two types:
⦿ STATIC WEB SITE : static web site is used to display
information without any interaction with user or
web server.
⦿ DY NA M I C WEB SITE: allows user interaction with
web site and can communicate with web server
again and again.
⦿ A web browser is a software application for accessing
information on the World Wide Web.
⦿ Web Browser act as a client to send request to server,
once web server process the request and returns the
response the same will be displayed on web browser.
⦿ There are many popular web browsers available like :
Google Chrome, Firefox, U C Browser, Opera.
⦿ Most of the Web Browser supports Graphical support,
Lynx is the text based web browser
⦿A web server is a computer that runs websites
⦿ It's a computer program that distributes web pages as
they are requisitioned.
⦿ The basic objective of the web server
is to store, process and deliver web
pages to the users.
⦿ Web server and client communicate with the help of
HTTP protocol.
⦿ Web server returns the requested page to client with
response code like 404 ( if requested page not found),
200 ( if requested page found) etc.
⦿ Is a service which allows individual or organization to
make their web site accessible through world wide
web.
⦿ Web site is hosted on special computer called Web
servers. If the site is hosted users can access the
website from website from anywhere in the world.
⦿ To Host a website, we require DOMAIN NAME, WEB
SPACE.
⦿ Web Hosting provides various services like – FTP
upload, Email account, web site building tool,
databases etc.
⦿ Without adding web scripting a web site is static.
⦿ Is a programming language for adding dynamic
capabilities to world wide web.
⦿ Web scripting can be used for simple action like
changing the button color when mouse is over on it or
to complex thing like interactive online games.
⦿ Dynamic content can be added to website using
scripting. For e.g. if user fills a registration form, it is
good practice to validate the entries.
⦿ Web Scripting if of 2 type:
⦿ CLIENT SIDE
⦿ SERVER
SIDE
⦿ Client side script executes on the web browser i.e. not
interaction with the web server.
⦿ It is generally used for performing action which do not
require interaction with the server like: checking text
field is empty, password is of certain length, password
contains pattern of text, CAPTCHA validation, new
password and confirm password is same or not.
⦿ Client side scripting languages are :
Java Script,VB Script, Action Script
⦿ This type of scripting execute on the web server i.e.
when user clicks on any button or interactive object the
request goes to server and executes on server and
response comes to web browser.
⦿ Server side scripting is used for the action like
validating the username and password, availability of
user id, submitting the information to store it in
database etc.
⦿ Popular server side scripting language are: ASP(Active
Server page), PHP (PHP Hypertext preprocessor),
JSP(Java Server Pages)
⦿ Web 2.0 is the name used to the describe the second
generation of the world wide web, where it moved
static HTML pages to a more interactive and dynamic
web experience.
⦿ Web 2.0 is focused on the ability for people to
collaborate and share information online via
social
media, blogging and Web-based communities.
⦿ Web 2.0 is pronounced web-two-point-o.
⦿ Facebook, Wikipedia, Google Adsense, Twitter,etc
are example of Web 2.0
⦿ Popular technologies are: AJAX, JQuery,
Silverlight, Flash etc.
⦿ When you purchase g oods and services online,
you pay for them using an electronic medium. This
mode of payment, without using cash or cheque, is
called an e-commerce payment system and is also
known as online or electronic payment systems.
⦿ Different types of e-commerce payment:
⦿ Credit Card
⦿ Debit Card
⦿ Smart Card
⦿ Net Banking
⦿ E-Wallet
⦿ Mobile Banking
⦿ User pay by providing Card Number, Expiry date,
Name of Card and C V N (Card verification Number).
OTP is received on registered number for double
verification i.e. for security reason

⦿ User pay by providing Card Number, Expiry date,


Name of Card and C V V (Card verification Value). OTP
is received on registered number for double
verification i.e. for security reason
⦿ It is simple method of paying online from customer’s
bank account.
⦿ User must logged in by providing username, password
⦿ High security password or OTP is received for security
reason and once entered and validated, payment is
done.

⦿ In this customer has to download software provided by


bank and linked it with the account. M-PIN is used for
mobile banking.
⦿ Customer can link Debit/Credit card with this software
and make the payment.
⦿ Stands for Unified Payment Interface
⦿ Developed by National payments corporation of India
(NPCI) under the guidelines of RBI
⦿ It allows to send and receive money between accounts
linked with mobile number.
⦿ The BHIM UPI app enables the users to link the app
with the accounts where they have already linked the
same mobile number. The sending and receiving of
money are done on a real-time basis and it does not
require the IFSC code. Instead of IFSC Code, both the
sender and receiver need a VPA or Virtual Payment
Address. The VPA is something like
this yourname@sbi or yourname@icici etc.
⦿ You can create several VPA using BHIM- UPI official
android app or using any of the Indian Banks UPI apps
and linked more than one Bank Account, only you have
to link the same mobile number or SIM which you are
using in your smartphone with your Bank Account.
Because before creating VPA, the UPI payments app
will verify your SIM by sending an SMS, to authenticate
the linked Bank Account.
⦿ Popular payment apps(with wallet) are:
⦿ PayTM
⦿ PhonePay
⦿ Amazon Pay
⦿ Google Pay etc.

You might also like