Internet Protocols
Internet Protocols
INTERNET ADDRESSING
Root
Intranet
It is a corporate LAN or WAN that is secured behind company nad uses
internet technology.
It is developed using TCP /IP protocol.
It is used in limited access.
Advantages
Increase the competitive efficiency of the firms.
Latest and updated research base.
Easy access to remote location.
Easy and quickly access of technical and marketing information.
Allows employees feel as through they are working in a single location
although they are spread across the global
CHAPTER – 2
INTERNET APPLICATION
Electronic Mail (E-mail)
It is common application used in internet.
The internet’s message standard is SMIP (Simple Message Transfer
protocol)
TCP /IP supports to sending E-mail through internet called SMIP.
SMIP is a system to sending message through email address
Sending single message to one or m ore recipients.
Functional Block Diagram of SMTP
User -A User -B
Message
MAT Message transfer agent TCP / IP MAT Transfer agent
Internet
FTP server then connects to the particular clients post no ( 5001) using its
post no 20 . this is called data connection
TELNET:
It is used to allow users to log into remote host systems.
It is the login and terminal protocol common on the internet and in UNIX
environment.
It is uses only TCP connection.
Login:
Login is user enters to network using password. The system performs
password verification to prevent unauthorized access.
There are 2 steps of login
1. local login
2. Remote login
1. Local login:
When a user logs into a local time sharing system it is called local
login.
The operating system identifies user name and password. If the user
is authorized it invokes the derived application for the user.
2. Remote login:
When user wants to access an application program on a remote machine
we should perform remote login.
CHAPTER-3
World Wide Web (WWW)
1. HTML (Hyper text Markup Language)
It is used to create web pages.
HTML documents have the filename extension .html or .htm
These files are stored in web servers
It is able to display images , sounds and the multimedia objects.
HTML lets us use only ASCII characters for both the main text and
formatting instructions.
HTTP has been designed to support the above features and it has 6 key
attributes.
1. Client / server module.
2. Simplicity
3. connectionless
4. stateless
5. Meta – information.
Web browser:
Most browsers have numerous buttons and features to make it easier to
navigate the web.
Pages are viewed with a program called a browser.
The browser fetch the page requested. Interprets the text and formatting
commands.
Browser Architectures:
A web browser usually consists of 3 parts
A controller .
Client programs
Interpreters
The controller receiver input from the key board or the mouse and uses
the client programs to access the document.
After the document has been accessed the controller uses one of the
interpreters to display the document onto the screen.
The client programs can be one of the methods such as HTTP, FTP &
Telnet.
The interpreter can be HTML or JAVA depending upon the type of the
document.
Web servers
It is used to bringing the web pages onto the user’s browser and into his
computer screen.
User’s visits a web site by either clicking on a hyper link that brings them
to that site or keying in the site’s URL directly into the address bar of a
browser.
Steps to display the pages:
1. The browser determines the URL.
2. The browser asks ONS for the IP address of www. W3.org.
3. DNS replies with 18.23.0.23
4. The browser makes a TCP connections to post 80 on 18.23.0.23
5. It then sends a GET / project .html command.
6. www.w3.org server sends the file project .html
7. The TCP connection is released.
8. The browser first displays all the text in project html
9. Next the browser fetches and displays all images in project.html.
Block diagram of web server
When a browser request a copy an active document. The server sends a copy of
the document in the from of byte code.
Search engines:
The term search engines are used generically to describe both crawler –
based search engines and Human powered directories.