0% found this document useful (0 votes)
9 views

Internet Protocols

internet protocols

Uploaded by

irfanahmed.dba
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Internet Protocols

internet protocols

Uploaded by

irfanahmed.dba
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 15

Internet Protocols:

1. FTP (File transfer protocol)


FTP is an application protocol inn the TCP/IP protocol stack, which is used
to transfer a file from one computer to another.
2. SMTP (Simple – mail transfer protocol)
The TCP /IP protocol stacks supports e-mail on the internet through SMTP.
SMTP is an application protocol in the TCP /IP protocol stack.
3. TELNET (Terminal Network)
Telnet is the login and terminal emulation protocol common for the
internet and UNIX environment. It operators over TCP / IP remote login.
4. SNMP (Simple Network Management Protocol)
SNMP is a popular Network Management Protocol defined by the
Internet community for TCP/IP Network.
5. USENET (Network News)
USENET is a newsgroup service for implementing discussion groups on the
internet and other TCP /IP network. USENET relied on a message exchange
system called UUCP.

INTERNET ADDRESSING

To identity the computer system , internet address is most important. In


TCP /IP network environment 3 kinds of address are available.
a. Physical address:
The physical address is the MAC address (Medium Access Control) that is
hardware into network interface cards. It is used LAN addressing not for
Internet.
b. IP Address :
 It is used to specified connection on the IP internet work . IP address used
fro internet addressing.
 IP address is a 32 bit address.
 IP address are unique , No two device on the internet can have same IP
address.
 IP address is a 32 bit and it has two important pieces of information
1. Network identifier 2. Host identifier
The “Network Identifier” indicates the network group. The “Host identifier”
identically a specific computer on a network.
Subnet Masking:
 The IP address is designed to extract host identifier or network identifier
quickly.
 The rooter identifies the network address from IP address by subnet
masking.
 Subnet addressing divided an IP address into network ID and host ID
where host ID Past in further divided in to a subnet id and a host id
Subnet mask for class and address
C. DNS (Domain Name System)
 It is a hierarchical, distributed method of organizing the name of the Internet.
 DNS is closely related to routing hierarchy and links domain names into IP
address.
 It is very useful to search the internet sites through the names DNS
Structure.

Root

Govt Org Mil Edu com


s

NASA Pda Mlacw mit IBM Inty


A
www.govt.pda www.mlaw.com

Geographical level Domains Top level Domains


1. in - India 1. Com - commercial
2. at - Australia 2. Edu - Education
3. ca - Canada 3 .gov - Government
4. de - Germany 4. org - organization
5. ch - Switzerland 5. net - network
6. pk - Pakistan 6. mil - military
7. fr - France
8. uk - united kingdom
Directory services
 It is just like yellow pages in the telephone system.
 It is very useful to lookup available service in a internet
The different services are
1. Graphical user interface (GUI)
User may see a graphical directory tree of a organization. it contains
department or workgroup .
2. Address book : It holds the list of user and resources.
3. Search method : Used to search different resources.
4. Search agent : looking for resources matches specific search criteria.
5. Meta directory : It contains multiple directory in a single website.

Intranet
It is a corporate LAN or WAN that is secured behind company nad uses
internet technology.
 It is developed using TCP /IP protocol.
 It is used in limited access.

Advantages
 Increase the competitive efficiency of the firms.
 Latest and updated research base.
 Easy access to remote location.
 Easy and quickly access of technical and marketing information.
 Allows employees feel as through they are working in a single location
although they are spread across the global
CHAPTER – 2
INTERNET APPLICATION
Electronic Mail (E-mail)
 It is common application used in internet.
 The internet’s message standard is SMIP (Simple Message Transfer
protocol)
 TCP /IP supports to sending E-mail through internet called SMIP.
 SMIP is a system to sending message through email address
 Sending single message to one or m ore recipients.
Functional Block Diagram of SMTP

User -A User -B

User agent User Agen

Message
MAT Message transfer agent TCP / IP MAT Transfer agent
Internet

1. User agent (UA)


 The user agent (UA) is normally a program used to send and
receiving mail
Sending mail:

 Each mail that to sent has 2 parts


a. an envelop
b. a message
a. envelop : it contains
1. sender adders
2. Receiver address
b. message : each message contains headers and the body of the
emformation.
Receiving mail:
 The user’s agent periodically checks the mail boxes.
 If a user has mail, the UA informs the user by giving a message and it
display the list of email.
 User can select any email and view its contents
2.Message transfer Agent (MTA)
 The actual mail transfer is done through message transfer agent (MTA to
send a mail.
 The SMTP use commands are response to transfer message between MTA
client and MTA server.

Basic E - mail operation

 Sender side the mail is created by a user agent program.


 Each created message consists of a header and its control information.
Header information are
1. Date : 15 Dec 2008
2. From : [email protected]
3. Subject : Hello Students
4. To : [email protected]
5. cc : [email protected]
6. Bcc : [email protected]
cc  carbon copy of message sent to specified address
Bccblind carbon copy of message sent to specified address
 SMTP sender sent the message to outgoing mails boxes.
 SMTP protocols are used to transfer message from the sender to SMTP
receiver.

UUCP (Unix to Unix copy program)


 UUCP is a UNIX based networking facilities consists of a family of
programs within the UUCP family.
 All UNIX systems come with a built in network system called UUCP.
 The job of UUCP is to connect Unix computer.
 UUCP is cheaply runs compare to TCP / IP but it is slower and it connects
only UNIX system.
Bang paths:
To sending mail from “SRI” (user id) to computer B ,C & D the UUCP
format like this
Mail B! C! D! SRI
! is the symbol to separate the computer name
!=> is called as bang
This the UUCP address that specifies multiple names in also called a bang path.

FTP ( File transfer protocol)


 File transfer protocol is an application protocol which is used to transfer a
complete file from one ( host) to another.
 FTP is used to copy file between different host running on different
operating system.
 FTP requires 2 TCP connections
1. control connection
2. Data connection
1. Control connection .
 It helps to build the connection between 2 systems
 User protocol interpreter (UPI) seas FTP command to server for the
connection.
 Server protocol interpreter (SPI) sending replies to the user.
2. Data connection.
 Data connection used to transfer files between the server and the client.
 After the control connection has been established
 Next FTP client sends the number to newly opened post for data transfer
to the FTP servers.

 FTP server then connects to the particular clients post no ( 5001) using its
post no 20 . this is called data connection
TELNET:
 It is used to allow users to log into remote host systems.
 It is the login and terminal protocol common on the internet and in UNIX
environment.
 It is uses only TCP connection.
Login:
 Login is user enters to network using password. The system performs
password verification to prevent unauthorized access.
 There are 2 steps of login
1. local login
2. Remote login
1. Local login:
 When a user logs into a local time sharing system it is called local
login.
 The operating system identifies user name and password. If the user
is authorized it invokes the derived application for the user.
2. Remote login:
When user wants to access an application program on a remote machine
we should perform remote login.
CHAPTER-3
World Wide Web (WWW)
1. HTML (Hyper text Markup Language)
 It is used to create web pages.
 HTML documents have the filename extension .html or .htm
 These files are stored in web servers
 It is able to display images , sounds and the multimedia objects.
 HTML lets us use only ASCII characters for both the main text and
formatting instructions.

Uniform Resources Locater (ULR)


In the internal, each web page is assigned a uniform resources locators (URL) each URL has 3
parts.
Server Name (DNS /
Protocol Name: // File name
HOST name)
For ex: http://www.kalpataru.com / results.html
This URL consists of 3 parts
1. The protocol name (http)
2. The DNS name of the host (www.kalpataru.com)
3. The file name ( Result/html)
Some common URL is
1. Http => hypertext resource: HTTP server is connected.
2. FTP => file access using FTP => file transfer.
3. Telnet => Remote login => access local file.
4. Gopher => used in list of menus and the user has to click the menu item.
5. News => news articles.
6. Mail to => use in E-mail sending.

HTTP: Hyper text transfer protocol


 It is a protocol used to transfer a data from a web server.
 Web server delivers data through an HTTP protocol when client makes a
request
 HTTP is generic , stateless object oriented protocols which can be used
for many purposes.
 HTTP protocols is applications level protocol
 HTTP transaction consists of a connection , a response and a closer using
different protocols.

WWW has the following features


 A distributed information system.
 A unified common interface to multiple protocols
 Hyper media support.
 Extensibility ( support to different data format)

HTTP has been designed to support the above features and it has 6 key
attributes.
1. Client / server module.
2. Simplicity
3. connectionless
4. stateless
5. Meta – information.

Basic operation of HTTP:


1. Open a connection:
When an HTTP server is running , client request for connection . through
post no 80 and wait for connection to occur.
2. Make a request:
Client can make a request by sending the request data string to the
server post number 80
3. Server responds:
After processing the client server send the data string to client.
4. Close connection:
When either client or the server closes the connection.

Common Gateway Interface (CGI)


 Common gateway Interface is a server extension that extends the
capabilities of web server.
 It helps to create and dandles dynamic documents.
 In the first step the web client connection to the web server and sends the
program to the web server.
 In the second step the web server runs a CGI program in the server side.
 In the 3rd step the web server sends that particular dynamic web
document as a response to the web client.
 As a fresh document is created for each request the contents of a
dynamic document can vary from one request to another.
 CGI only defines the set of rules and terms that the programmer should
follow.
Multipurpose Internet Mail Extension (MIME)
 It is the extension of SMTP protocol .
 This protocol that allows non – ASCII data to be sent through SMTP.
MIME is a new internet mail standard approved in June 1922.
It allows mail message to contain
 Multiple objects in a single message.
 Text with unlimited line length of overall length
 Character sets other than ASCII , allowing non – English language
messages.
 Multi- font messages.
 Binary or application specific files.
 Image, Audio, Video & multi- media messages.
The functional block diagram MIME is,

Web browsers and web servers


World Wide Web:
 The www is of facially described as a wide area hyper media information
retrieval.
 It consists of an architectural frame work for accessing linked
documents , spread out over thousand of machine all over the internet
 The www is a distributed, multiple media hypertext system.
 Www is the combination of web browser and web servers in a network.
 The www server usually runs a powerful computer system. The server
retrieves the file that has been requested and delivers it to the client.

Web browser:
 Most browsers have numerous buttons and features to make it easier to
navigate the web.
 Pages are viewed with a program called a browser.
 The browser fetch the page requested. Interprets the text and formatting
commands.

Browser Architectures:
A web browser usually consists of 3 parts
 A controller .
 Client programs
 Interpreters

 The controller receiver input from the key board or the mouse and uses
the client programs to access the document.
 After the document has been accessed the controller uses one of the
interpreters to display the document onto the screen.
 The client programs can be one of the methods such as HTTP, FTP &
Telnet.
The interpreter can be HTML or JAVA depending upon the type of the
document.
Web servers
 It is used to bringing the web pages onto the user’s browser and into his
computer screen.
 User’s visits a web site by either clicking on a hyper link that brings them
to that site or keying in the site’s URL directly into the address bar of a
browser.
Steps to display the pages:
1. The browser determines the URL.
2. The browser asks ONS for the IP address of www. W3.org.
3. DNS replies with 18.23.0.23
4. The browser makes a TCP connections to post 80 on 18.23.0.23
5. It then sends a GET / project .html command.
6. www.w3.org server sends the file project .html
7. The TCP connection is released.
8. The browser first displays all the text in project html
9. Next the browser fetches and displays all images in project.html.
Block diagram of web server

There are three types of documents in the web server.


1. Static document : It’s a fixed content document
2. Dynamic document : It crates fresh document dynamically.
3. Active document : are programs that are run at the client site.

When a browser request a copy an active document. The server sends a copy of
the document in the from of byte code.
Search engines:
The term search engines are used generically to describe both crawler –
based search engines and Human powered directories.

1. Crawler based search engine:


 Such as google, create their listing automatically they crawl or spider the
web then people search through what they have found.
 If user changes that web pages this search engines eventually , find these
changes and that can effect , page titles , body copy and other element
all play a role

2. Human powered directories:


As the open directories depends on human for its listings. The submits a
short description to the directory for the entries site.
 A search looks for matches only in the description submitted.

3. Hybrid search engine


 Early days web surfing , searching , search engine either represented
crawler or human powered listing.
 Today it is extremely common for both types results to be presented.
 Usually a hybrid search engine will favors one type of listing over
another .

You might also like