0% found this document useful (0 votes)
5 views

CHAPTER 2

The document discusses the internet as a global network of interconnected computers, detailing its history, working principles, and various applications. It outlines the evolution of internet protocols, the World Wide Web, and different types of internet access methods, including dial-up, cable modem, and DSL connections. Additionally, it highlights the features of the internet such as high-speed communication, universal access, and its rapid growth rate.

Uploaded by

asf7008777037
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

CHAPTER 2

The document discusses the internet as a global network of interconnected computers, detailing its history, working principles, and various applications. It outlines the evolution of internet protocols, the World Wide Web, and different types of internet access methods, including dial-up, cable modem, and DSL connections. Additionally, it highlights the features of the internet such as high-speed communication, universal access, and its rapid growth rate.

Uploaded by

asf7008777037
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

1

CHAPTER 2
INTERNET AND ITS APPLICATION

A global collection of individual networks, connected to each other by help of different networking devices
and works as a single large network is called an internet. Internet is a network of networks that connects
computers all over the world. it is a network of network in which users at any one computer can get
information from any other computer provided if they have permission.

Presently several lacs of computers are interconnected with each other to share and exchange information
or data by following certain rules. These are pre-defined sets of rules, which are called protocols. By the
help of internet we can share information, surfing website, send E-Mail, and do on-line chatting.

HISTORY:
• Internet was first proposed by J C R Licklider of MIT in 1962. The main intention was to share Military
and scientific information between different organizations in United State.
• Leonard Kleinrock of University of California, Los Angeles developed the theory of Packet switching.
These Packet switching formed the backbone of today’s internet data transmission.
• First network computer was installed in National Research Laboratory, England in 1968.
• ARPANET was introduced around late 1960s by Advanced Research Projects Agency (ARPA) of US
Department of Defense. By 1972, ARPAnet had 23 nodes, connecting different institutions of United
State. The first ever international nodes of ARPAnet were set up in 1973 in England and Norway.
• In 1972 Raymond Samuel Tomlinson of United State incorporated (included) the first E-mail program
and picked @ symbol to link the user’s name and the address.
• Bob Kahn and Vint Cerf introduced Network Transfer Protocol, which was standardised as TCP/IP for
ARPAnet in 1983. It assigns a number to each computer of a network, and called IP address.
• 1984 DNS (Domain Name System) was introduced because numeric addresses of different computers
are difficult to remember. DNS converts these names to corresponding IP addresses.
• In 1990 ARPAnet exist. But it function were continued.
• In 1991 WAIS(wide Area Information Server) and Gopher(Protocol) were released, today’s modern
internet system based on this.
• In 1992 WWW was introduced by Tim Berners Lee at CERN(European Organization for Nuclear
Research). He wrote first WWW client and server and defined the standards like URL, HTML, HTTP.
• In 1993 first internet browser Mosaic was introduced by Marc Andreessen.

Working of the Internet: Computers, which are connected with internet can communicate because of
protocol. There are two types of protocols for working with the internet.
1. IP (INTERNET PROTOCOL):
• Every computer system has an internet address to connect with internet.
• These computers are linked with a centralized storage medium, which is called server. This server
stores all software program and data.
• The linked computers with this server are called client.
2. TCP (TRANSMISSION CONTROL PROTOCOL):
• When the client sends the message over internet, this message broken into small pieces using the
TCP protocol. These small pieces are called packets.
• Each packets contains address of the receiver(destination) and sender. This address called IP
address.
• These data packets are sent to the destination by the fastest way using the help of network devices
which is called as Router.
• After reach the data packets to the destination TCP assembles all the packets to form complete
message.
WWW(World Wide Web):
• World Wide Web also known as Web, it is an information space, the main objective of WWW is to
provide access to large number of documents.
2

• It is a collection of websites or web pages stored in web server.


• It is a series of servers, which is interconnected through Hypertext.
Hypertext: It is a mode of presenting information in which certain portion of text is highlighted or underline
on a page. To click these highlighted or underline text it will connect to or refer to other page and display
information.
Hyperlink: In the Hypertext highlighted text items for making links with other pages are called Hyperlinks.
Through these Hyperlinks the users can make access from one document to another. The hyperlink
contains the URL (uniform resources locator) of the webpages.
Hypermedia: It is an advance version of Hypertext. It can link audio file, video file, and image file etc.

INTERNET BACKBONE & ITS FEATURES:


• An internet backbone refers to one of the principal data routes between large interconnected
networks and main routers on the internet.
• It is very high-speed data transmission line.
• A backbone is a large transmission line that carries data gathered from smaller line that
interconnected with it.
• The first backbone was named NSFNET.
• It was funded by the U.S. government and introduced by the NSF(National Science Foundation) in
1987.
• Around the world each country has at least one backbone network that operates at high speed.
• Internet backbone is provided by telephone company or ISP(Internet Service Provider);e.g.
BSNL,JIO,AIRTEL, etc.
• They required high speed bandwidth connection and high-performance servers and routers.
• Today these backbones are constructed of fiber optic cable.
• A backbone which is constructed by fiber optical cable is called as Optical carrier(OC).
• On the internet or other WANs, a backbone is a set of paths that local or regional network connect
to, for long distance interconnection. That connection points are known as network node or data
switching exchanges(DSEs).
• Different network technologies can be connected to create an internet network. Like
1. ETHERNET:
• Ethernet is a network technology used for connecting a number of computer system to create a Local
Area Network. It is most widely installed Local Area network technology.
• It uses CSMA/CD(Carrier Sense Multiple Access/Collision Detection) protocol to control the passing
of information and to avoid more than one transmission at a time.
• Ethernet is an IEEE 802.3 standard(guideline).
• Ethernet is also used in wireless LANs.
• Ethernet was developed by Xerox.
• An Ethernet LAN typically uses Co-axial or twisted pair cable.
• The most commonly installed Ethernet systems are called 10 BASE-T and provide transmission
speed up to 10Mbps.
2. TOKEN RING:
• It is a Local Area network technology in which all computers are connected in a Ring or Star topology.
• In this technology a bit or token revolves around the network of computer. It is used in order to
prevent the collision of data between two or more computers that want to send message at the same
time.
• A computer that gives the request first can get the token to transmit data through the channel and
all other computers request for the token are on the queue
• After sending data it leaves the token and assigns it to the first computer the queue.
• If a computer that holds token neither sends data nor leave the token then the computers in the
queue enter in to starvation.
• Token Ring is an IEEE 802.5 standard.
3

3. FDDI:
• FDDI stands for Fiber Distributed Data Interface. It is also a LAN technology.
• A FDDI network technology contains two token rings that is primary token and Secondary token.
• It uses secondary token for possible backup in case of the primary ring fails.
• It uses a time token protocol.
• In this protocol, a token is assigned to a computer for a fixed time period within which it either sends
the data or leaves the token. So that starvation can be avoided.
• It is an IEEE 802.4 standard. The data transmission up to 200 km & speed is about 200Mbps.

FEATURES OF INTERNET:
GEOGRAPHIC DISTRIBUTION:
• Internet is globally distributed in a single large network.
• It spreads around the world and even beyond the world.
• A key attribute of the internet is that once we have connected to any part of it, we can communicate
with all of it.
ROBUST ARCHITECTURE:
• Internet consists of large number of network computers and other devices.
• It has robust architecture.
• If any individual computer or network is damage or lost then it will not affect the other part of
internet.
HIGH SPEED COMMUNICATION:
• Internet is high speed communication technique.
• The speed of the internet is 3/2 of the speed of the light i.e. 2*10 8m/s.
• Internet routers are getting faster and faster with switching speeds nearing instantaneous while fiber
optics and wireless technology are enabling networks to send much larger numbers of bits at once.
UNIVERSAL ACCESS:
• It is a universal access network.
• It is accessible to anyone from any location at anytime.
• In the universal access it makes all of the internet technologies equally available to anyone all over
the globe, connected to internet.
GROWTH RATE:
• Internet has been growing at a rapid rate since its conception on a curve geometric and sometimes
exponential.
• The growth rate measured by user and bandwidth.
• Today, the internet is growing in three different directions. (1):Size, (2):Processing power,
(3):Functionality.
Size:
• There is expansional rate of growth in the number of people that use the internet. It is expected that
of half the world’s population will have access to the internet near future.
• More and more people are online every year. The speed with which the world is changing is extremely
fast.
• By the year 2000 almost half of the population in the US was accessing information through the
internet.
• In 2016, 76% of people in US were online, in Spain and Singapore 81%, in Japan 93% were online.
Processing power:
computer processors and storage continue to double in power and capacity about every 18 months,
providing steadily more powerful computers for use by increasing sophisticated software.
Functionality:
Software applications from routing programs to browser applications continually build on previous
technology to become more sophisticated with every release, continuously evolving to incorporate new
features and capabilities.
4

INTERNET ACCESS:
Internet access can also be termed as internet connection.
It is a process that enables(allows) individual users or organizations to connect to internet using
computers, mobiles, etc.
Once connected to the internet, users can access internet services, such as Email and the World Wide
web.
Internet Service providers(ISPs) offer internet access through various technologies.
Technology is developing rapidly and methods for connecting to the internet change almost daily.
TYPES OF INTERNET ACCESS/ INTERNET CONNECTION:
• Gateway internet access/ connection
• Dial-Up Connection
• VSAT
• Cable modem Connection
• DSL Connection
• Direct/Leased connection
• Wireless Connection
Gateway internet access/ connection:
• Gateway internet access/ connection is also known as level one connection.
• It is the connection to the internet from a network, which is not on the internet.
• The gateway allows the two different types of networks to talk(communicate) to each other.
• But the users of the gateway internet have limited access to the internet. They might not be able to use
all the tools available on internet.
• .The local internet service provider normally defines the limitation.
• Good example of network with level one connectivity within India is that of VSNL(Videsh Sanchar
Nigam Limited).
• All access/connection to the internet from India is through VSNL gateway.
Advantages:
• It uses a full duplex mode of communication.
• It has better security than any other connecting devices on the network.
• It is an intelligent device.
• It can control collisions.
• It has the fastest data transmission speed amongst all network connecting devices.
Disadvantages:
• A gateway is complex to design and implement.
• The implementation cost is very high.
Dial-Up Connection:
• It is also known as Level-two connection.
• This provides connection to internet through a dial-up terminal connection.
• A dial-up connection is an Internet connection that uses telephone lines.
• Using phone lines we dial into an ISP to connect to line of ISP.
• This connection allows only one computer at a time, per line, to be connected.
• When the phone line is connected to the internet, voice communication will not be available over it.
• The data transmission speed which is about 56 kbps.
• This type of connection is also known as remote modem access connection.
• This type of connection can further be divided into 3 types:
a. Shell connection
b. TCP/IP connection
c. ISDN connection
5

a. Shell connection:
• In this types of Internet connection, the user will get only textual matter of web page.
• This does not support Graphics display.
b. TCP/IP connection:
• Today’s graphical World Wide Web browsers provide easier access with multimedia sound and
pictures.
• The major difference between Shall and TCP/IP account is that, Shall account can only display text
and does not support graphics display, whereas TCP/IP can display both.
c. ISDN connection:
• ISDN (Integrated Service Digital Network) offers Internet connection at speeds of up to 128 Kbps
through the use of phone lines.
• ISDN is a dial-up service that has been provided by telephone companies for many years.
• It is also a broadband internet connection that uses analog telephone line to transmit data digitally.
• It also provides both voice transmission and data transmission at a time.
• It is also used to connect one computer per line or multiple computer per line.
• To access any of these dial-up connection we need the followings:-
a. Computer
b. Modem
c. Telephone connection
d. Shell or TCP/IP or ISDN account from the ISP
e. Internet client software such as Internet browser.
Advantages:
• Dial-up connection is available to landline phone subscribers.
• It is easy to setup.
• It is low cost.
• It can connect to a pc using modem.
Disadvantages:
• Slow internet speed.
• Phone line requirement is compulsory.
Cable Modem Connection:
• A cable modem is a type of network bridge and modem that provides bidirectional data
communication through radio frequency channels on a HFC(Hybrid Fiber Coax) and RFoG(Radio
Frequency Over Glass) infrastructure.
• Cable modems are primarily used to deliver broadband internet access in the form of cable.
• Cable connections provide high speed data transfer downstream(download)(from internet to
computer), but are slower when sending the data from computer to internet(upstream).
• Transfer rates are affected by the number of subscribers online simultaneously.
• All connections originate on one line per street, so signals degrade as more subscribers come online.
• Cable connection can be used by individual subscribers to connect one computer to one line or can
be used to connect multiple computers to one line to the internet.
• Some of the features of cable internet connection are:- or Advantages:
a) Always connected: A cable modem connection is always connected to the internet. You do not
need to log on to the internet again and again.
b) Bandwidth: cable modem have the potential to receive data from their cable provider at speeds
greater than 30Mbps.
c) File transfer capability: downloads may be faster, but uploads are typically slower. Since the
same lines are used to transmit data to and from the modem, priority is often given to data
travelling in one direction.
d) Signal integrity: The quality of the internet signal is better.
6

e) Routing: cable routers allow multiple computers to be hooked up to one cable modem, allowing
several devices to be directly connected through the single modem.
Disadvantages:
• Always connected features is the main disadvantages of cable modem connection because A
hackers have more time to gain access to your computer.
• Sharing bandwidth is also another disadvantages because of sharing bandwidth internet connectivity
may slow down.
Direct/Leased connection:
• Direct internet connection is also known as Leased line connection.
• It is also known as Level-three connection.
• Taking internet connection directly from an ISP as a leased line is called as direct connection.
• In direct connection data can be send or received directly to and from internet.
• Using leased line connection computer is directly connected to the internet using high speed
transmission line.
• It is a secure and expensive internet connection.
• Direct access can be provided in one of the following two ways:
A. Dial-Up IP direct access:
• It uses a modem and a telephone line to connect to internet.
• It is also uses a special software to access internet.
• It uses PPP(Point-to-Point Protocol) and SLIP(Serial Line Internet Protocol).
B. The second way is when a computer is connected to a LAN that has internet connectivity is
called as LAN direct connection. It is uses Universities, Corporations, etc.
Advantages:
• It is a high-speed internet connection.
• Direct internet connection provides high security.
• Direct connection is very Reliable.
Disadvantages:
• It is very expensive.
• Installation cost is very high.
DSL Connection:
• It stands for Digital Subscriber Line.
• It is a broadband connection that transmits data over analog telephone lines.
• It provides both voice data and internet data transmission at a time using single telephone line.
• It divides the telephone line into 2 parts: one part is used for voice data transmission and other part is
used for internet data transmission.
• The data transmission speed is about 256kbps to 40Mbps downstream.
• It is used to connect one computer per line or multiple computers per line.
Advantages:
• The speed is faster than normal modem connection.
• We can use the internet and the telephone at same time.
• It is cheaper than cable connection.
• High bandwidth.
Disadvantages:
• Availability is an issue in remote area.
• DSL connection works better when the connected computer is nearer to the service provider’s office.
VSAT Connection:
• VSAT stands for Very Small Aperture Terminal.
• It is a small sized earth station used in the transmit/receive of data, voice and video signals over a
satellite communication network.
• It is a two-way, low-cost, advanced satellite communication technology that transfers data from one
station to another station on the Earth by accessing the satellite.
7

• VSAT satellite is a dual-way ground station with a small antenna to transmit and receive data to and
from the satellite orbiting the Earth.
• It is used by home users and big and small private companies.
VSAT Working Principle:
• A VSAT user needs a box that interfaces between the user’s system, i.e., computer, TV, or any other
device, and an outside antenna with a transceiver.
• The transceiver receives or sends signals to a transponder placed on the satellite in orbit.
• The satellite then sends and receives these signals from an earth station called the HUB station of the
VSAT system.
• All the end users are interconnected through the HUB station via the satellite.
• The end users can communicate with each other only through the HUB station.
• Every transmission first goes to the HUB station, which transmits via the satellite to the desired end
user.
Advantages:
• It is easy to understand, install and navigate.
• Central hub facilitates the easy addition of the new devices.
• VSAT terminals are reasonable in price.
• VSAT provides same quality of service and speed at all the locations across the entire VSAT network.
• VSAT terminals and other hardware can be installed on a truck or van and can even in mobility
condition.
Disadvantages:
• VSAT services get affected in bad weather conditions due to disruption or disturbance of signal.
• It requires clear line of sight between VSAT dish and satellite in the spaces.
• The malfunctioning of satellite and HUB station will lead to disruption of VSAT service.
Wireless Internet Connection:
• A connection that does not use any cable or wire to transmit internet data through electromagnetic
weave is called as wireless connection.
• It uses radio wave, micro wave, satellite wave etc. for internet connectivity.
• If it is used to connect a building or a campus, then it is called WLAN.
• The main advantages of wireless connection is that we don’t need any Ethernet or network cable to
connect with Modem.
Wi-Fi:
• Wi-Fi stands for Wireless Fidelity. It is a way of getting broadband internet without wires.
• Wi-Fi allows us to connect several computers at once. It is widely installed in cafes, airports and many
other public places.
• Wi-Fi uses radio wave to provide internet connection.
Advantages:
• Wi-Fi gives you mobility.
• Wi-Fi is cost effective.
• Easy expandability for increasing number of connections.
Disadvantages:
• Security concerns. Most of the open Wi-Fi are unsafe.
• Range of Wi-Fi signals are limited. Usual range is 100-150 feet.
• Slower as compared to LAN.
WLAN:
• A Wireless Local Area Network (WLAN) is a type of network that allows devices to connect to each
other and share information wirelessly within a defined area.
• WLAN utilizes radio waves to transmit and receive data between devices.
• We can compare Transmitter as a mini radio station, broadcasting signal sent from the internet. The
audience for these transmissions is the computer which receive the radio signal via something called
a wireless adapter.
8

• The whole process works in reverse the computer sending information to the wireless transmitter, it
then covert them and sends them via your broadband connection.
Broadband Connection:
• Broadband access means “an internet access that is always on and faster than the traditional dial-up
connection.”
• Broadband technology widely used in DSL and Cable modem internet access.
• There is no dial-in process required in broadband technology.
• Broadband provides improved access to internet service such as:
I. Faster web browsing.
II. Faster downloading and uploading.
III. Video conferencing, etc.
ISP:
• It stands for Internet Service Provider.
• It is an organization or telephone company that provides network service to the users by taking some
fee from the user.
• “The World” was the first commercial ISP in 1989.
• “Telerama” was founded to be the world’s 3rd ISP in 1991.
• An ISP buys upstream data from other upstream ISPs and provides data to the end users by taking some
fee.
• It is also called as IAP(Internet Access Provider).
• Examples of some ISP are BSNL(Bharat Sanchar Nigam Limited), VSNL(Videsh Sanchar Nigam
limited), MTNL(Mahanagar Telephone Nigam Limited),Jio,Airtel, etc.
• ISP works as an interface between user and internet.
• ISP uses a range of technologies to enable users to connect to their network.
• For home users the most popular options include Dial-up, DSL(typically ADSL), broadband wireless
access, cable modem and ISDN.
Extra: DSL types:
• SDSL (Symmetric Digital Subscriber Line)
• ADSL (Asymmetric Digital Subscriber Line)
• HDSL (High-data rate Digital Subscriber Line)
• VDSL (Very-High-data rate Digital Subscriber Line)
• The most commonly used DSL connection is ADSL connection, because it is less expensive
as compare to other DSL connection.
• In ADSL the connection provide high speed data transfer downstream(from internet to
computer), but is slower when sending the data from computer to internet. That is why it is
called as Asymmetric.
• In SDSL the downstream and upstream data rates are equal.
INTERNET PROTOCOLS:
• Protocol is asset of rules that governs(controls) network communication.
• Several rules are used in internet during exchange of data and information between devices of network
is called as Internet Protocol.
• Protocol generally defines rules of how and when a device can send and receive the data.
• Several types of Internet Protocol used in the Internet are:-
1. TCP/IP
2. FTP
3. HTTP
4. USENET
5. EMAIL
6. TELNET
7. GOPHER
8. WAIS
9

TCP/IP:
• It stands for Transmission Control Protocol/Internet Protocol.
• Both the protocols are combinedly used for data transmission over the network.
• IP works at network layer of OSI model and TCP works at transport layer of OSI model.
• TCP divides a message into smaller bits called packets.
• Each packet with a sequence number and address of source and destination is send independently or
separately.
• IP is responsible for system to system delivery of packets.
• TCP is responsible for process to process delivery of data.
• TCP retransmits the failed packets.
• TCP makes the sequence of the packet and reconstruct the data into its original form.
FTP:
• It stands for file Transfer Protocol.
• This is used for transferring a file from one computer to another through internet.
• FTP commonly used for uploading a webpage to a web server so that it may be seen on the
WWW(World Wide Web).
• A server computer that stores all the files is called as FTP server.
• An FTP client is a computer that takes service from the FTP server.
• FTP works on client-server principle.
• It is an application layer protocol.
HTTP:
• It stands for Hypertext Transfer Protocol.
• The protocol that is used to transfer web pages or HTML(Hyper Text Markup Language ) pages from one
computer to another computer using Internet is called HTTP.
• It is an application layer protocol.
• It is the protocol used by web server to allow web pages to be shown in a web browser.
• The address bar of the web browser has the prefix http:// in front of the address.
• It works on client-server principle.
• A webserver which stores all the web documents(web pages or HTML pages) is called as HTTP server.
• An HTTP client sends a request to HTTP server for transferring web pages called as HTTP client request.
• The HTTP server processed the client request and gives response to the requested client called as HTTP
server response.
USENET:
• It uses NNTP(Network News Transfer Protocol).
• It is a news protocol.
• NNTP is used for serving Usenet posts.
• Usenet is similar to the forums that many websites have.
• Forum means a place or meeting where people can exchange and discuss ideas.
• Usenet is divided into several areas.
• Some of the forum that are included in USENET are:- “comp.” for discussion of computer related
topics, “sci.” for discussion of scientific subjects etc.
EMAIL:
• It stands for Electronic mail.
• It uses three different protocols:-
A. SMTP (Simple Mail Transfer Protocol):used for sending mail
B. IMAP (Internet Mail Access Protocol): used for receiving mail
C. POP3 (Post Office Protocol3): used for receiving mail
TELNET:
• It stands for Teletype Network.
• It is a protocol used for remote login to a distance computer.
• By using telnet the user can access remote information stored in a remote computer.
10

• For that there is a need a special program called as telnet client program.
• Using telnet client program a client login into a remote server through a user id and password.
• Example: TeamViewer application, Anydesk application, etc.
GOPHER:
• It is an application layer protocol that provides the ability to extract and view web documents stored
on remote web servers.
• It is used as a search protocol.
• Gopher was designed to access a web server through the Internet.
• This protocol is used to search documents or information from different websites.
• Gopher server is used to store all the documents in the server which can be served to Gopher client.
• It is based on client server principle.
WAIS:
• It stands for Wide Area Information Server.
• It is a protocol used to search document on internet from many websites at a time
• It makes an index of the searched document of the database.
• A WAIS database index created by a person.
• It provides or assigns ranking to each information accessed by the user that helps the user to choose
the most popular items.
• A WAIS client program is used to access information from WAIS database through WWW.
• It can work with other protocols like gopher, telnet, etc.
WEB ADDRESSING SYSTEM:
• A web addressing identifies the location of a specific web page on the internet.
• Every computer which is connected to the internet has its unique web address.
• The IETF(Internet Engineering Task Force) has designed a system to provide a unique address to each
computer in the form of number and character.
IP ADDRESS:
• It is a unique number assigned to every machine connected to a network for its identification.
• Ip address is also called as Internet address.
• It is a logical address of 32 bits or 4 bytes or 4 octets.(small size data represent in bit,8bit= 1byte so
32bits= 4 bytes)
• An IP address has two parts, such as:-
A. Net ID:- it is used to identify networks
B. Host ID:- it is used to identify a machine connected to a network.
• The 4 octets of an IP address are separated by dots(.).
• EX:- 122.16.5.7
• Each octet contains 1 byte or 8bits with 28 =256(ranking from 0 to 255) unique values.
• The first octet represent total number of networks that is 256 networks.
• As per IPV4(IP VERSION4), IP addresses have the sizes of 32bits or 4bytes.
• As per IPV6, IP addresses have the sizes of 128 bits or 16 bytes.
• There are 232 number of unique IP addresses can be created in IPV4.
• The IP address 0.0.0.0 is called as default network IP address.
• The IP address 255.255.255.255 is called as broadcast IP address.
• The IP address 127.0.0.1 is called as loopback(loopback means to find our ip address work properly or
not) IP address.
• IPV4 address represented in dotted-decimal notation
11

192 . 168 . 1 . 5

11000000 10101000 00000001 00000101

8bits 8bits 8bits 8bits

32bits(4bytes)

• Google IP4 Address:216.58.216.164


• Google IP6 Address 2607:f8b0:4005:805::200e
• There are five classes of IP address are used. Such as:-
1. CLASS A IP address
2. CLASS B IP address
3. CLASS C IP address
4. CLASS D IP address
5. CLASS E IP address
CLASS A IP address:
• The class A IP address contains 126 networks from 1 to 126. (0 and 127 not provide any one. Because
127 is loopback address)
• It is used for large size organization like Google.
• It contains approximately half of the total Ip address.
• In class A IP address the first octet is used for net ID and the last three octets are used for host ID.
• The first bit of the first octet of class A IP address is always zero.
• Example: 2.134.213.2
CLASS B IP address:
• The class B IP address contains 64 networks ranking from 128 to 191(1 to 126 is class A IP address)
• It is used for medium size organization.
• It contains 1/4th of the total IP address.(1/4th of 256 is 64)
• In class B IP address the first two octets are used for net ID and last two octets are used for host ID.
• The first two bits of first octets of class B IP address are 1 and 0 respectively.
• Example:135.58.22.17
CLASS C IP address:
• The class B IP address contains 32 networks ranking from 192 to 223.
• It contains 1/8th of the total IP address. (1/8th of 256 is 32)
• it is used for medium size organization.
• In class C IP address the first three octets are used for net ID and last one octets are used for host ID.
• The first three bits of the first octets of class C IP address are 1,1 and 0 respectively.
• Example:192.168.175.1
MAC ADDRESS:
• It stands for Media Access Control.
• Each NIC has unique address assigned by its manufacturer.
• This address is known as MAC address of the card.
• It is used to uniquely identify an NIC by its MAC address.
• MAC address of an NIC is permanent and never changes.
• This address is a 12-digit hexadecimal or 48-bits number.
• MAC address are usually written in one of the following formats:
MM:MM:MM:SS:SS:SS
MM-MM-MM-SS-SS-SS
12

• The first half(MM:MM:MM) of a MAC address contains manufacturer ID number and second
half(SS:SS:SS) of a MAC address represents the serial number assigned to the NIC by its manufacturer.
• Example: 00:0A:C9:14:C8:35
• Where 00:0A:C9 is the manufacturer ID and 14:C8:35 is the serial number.

Difference Between IP address & MAC address:


IP ADDRESS MAC ADDRESS
IP Address stands for Internet Protocol MAC Address stands for Media Access Control
Address. Address.
IP Address is either a four-byte (IPv4) or a MAC Address is a six-byte hexadecimal
sixteen-byte (IPv6) address. address.
Internet Service Provider provides IP Address. NIC Card’s Manufacturer provides the MAC
Address.
IP Address is the logical address of the MAC Address is used to ensure the physical
computer. address of a computer.
IP Address operates in the network layer. MAC Address operates in the data link layer.
IP Address identifies the connection of the MAC Address helps in simply identifying the
device on the network. device.
IP Address modifies with the time and MAC Address of computer cannot be changed
environment. with time and environment.
DNS(DOMAIN NAME SYSTEM):
• Every computer on the Internet has an address which is unique in nature. It is a string of numbers
and is referred to as IP address. To communicate with each other, computers identify another
computer via its IP address.
• But it is difficult for humans to remember this IP address. Thus, to find the location on the Internet
easily, DNS was invented.
• DNS stands for Domain Name System. It implements a distributed database which translates IP
address into a unique alphanumeric address which is referred to as Domain Names.
• Basically, a domain name is the sequence of letters and or numbers separated by one or more period
(“.”).
• As an analogy one can consider Domain name as address and DNS as address book of the
Internet.
• Example: dheodisha.gov.in
youtube.com
domainindia.org
• Domain names are used to identify particular web server.
• Each domain names are assigned by the organization name ICANN(Internet Corporation For
Assigned Names and Numbers).
• A domain name usually has more than one part:- Top level domain name and Sub-domain name.
• http://india.gov.in in this url .in is the top level domain name, .gov is the sub-domain of .in and
india is the sub-domain of.gov.
• There are only a limited number of Top level domains and these are divided into two types : -
1. Generic top level domain
2. Country code top level domain

Sub-domain Top Level Domain (TLD)

http://www.google.com
hyper text transfer protocol Domain name
13

Generic top level domain:


• A domain name with three letter extension is called as generic top level domain.
• These domain names represent international level.
1. .com - commercial business
2. .edu -educational institutions
3. .gov - government agencies
4. .mil - military
5. .biz - business
Country code top level domain:
• A domain name with two letter extension is called as country code top level domain.
• These domain names represent country level.
1. .in - India
2. .au – Australia
3. .ca – Canada
4. .jp – Japan
Alternative domain names:
• ICANN approved several new extensions of domain name which are not specific to any counter are
called as alternative domain name.
• Example: .info, .coop, .aero, etc.
URL(Uniform Resource Locator):
• A URL or Uniform Resource Locator is a Unique identifier that is contained by all the resources
available on the internet.
• It can help to locate a particular resource due to its uniqueness. It is also known as the web address.
• A URL consists of different parts like protocol, domain name, etc.
• A URL consists of multiple parts that can helps you to visit a particular page on the internet. Every
part of a URL has its own importance.
• Format of URL: protocol://host//path//filename
PARTS
Authority

https://www.google.com:80/array-data-structure?ref=home-articlecards#array

protocol Domain name Port Path file Query Parameter Fragment


Protocol:

• URL starts with a protocol that is used to access the resource on the internet.
• The resource is accessed through the DNS.
• There are multiple protocols available to use like HTTP, HTTPS, FTP etc.
• The protocol used in the above URL is https.
Domain name:
• It is the name of the page that someone going to access on the internet.
• In this case, the domain name is: www.google.com.
Port:
• It is defined just after the domain name by using the colons between itself and the domain name. it
is not visible in the URL.
• The domain name and the port name combinedly can be known as Authority.
• The default port for web services is port80 (:80).
14

Path file:
• It refers to the path of a particular file or page stored on the web server to access the content of it.
The path used here is: array-data-structure.

Query:
• A query mainly found in the dynamic pages. It consists of a question mark(?) followed by the
parameters. In above URL query is: ?.
Parameter:
• These are the pieces of information inside a query string of URL.
• Multiple parameters can be passed to a URL by using the ampersand(&) symbol to separate them.
• The query parameter in above URL is: ref=home-articlecards.
Fragment:
• The fragments appear at the end of a URL starts with a Hashtag(#) symbol.
• These are the internal page references that refers to a specific section within the page. The fragment
in the above URL is: #what-is-array.

Internet Application:
There are various application on internet.
Web page:
• A webpage is a web document display in a web browser.
• A webpage is a page on internet written in HTML.
• Web means resource of information on internet.
• An extension of HTML page is .html or .htm.
• Webpage may contain text, image, audio, video document.
• A webpage can be displayed by using a web browser.
• Web pages are two types: static web page and dynamic web page.
Website:
• Website is a collection of web pages that are hyperlinked with each other.
• The first page of the website is called as home page.
• All the web pages in a website are hyperlinked with each other so that by click on a hyperlink a new
page will be open.
• An address that is used to locate a particular website on internet is called website address.
• Example: www.google.com, www.facebook.com.
• According to use, following types of websites are available:- Commercial website, educational
website, News sites, Government website etc.
Web server:
• A web server is a computer that hosting one or more websites:
• “Hosting” means that all the web pages and their supporting files of the websites are available on that
computer.
• The web server will send any web page from the website to any user’s browser as per the request.
• When the website is not responding, it actually means that the web server is not responding therefore
the website is not available.
• When we say server is not responding it means that no websites on that web server are available.
• A web sever is the collection of one or more than one website.
Search engine:
• A search engine is also a program that can search for the entered keyboard text and bring the matches
document and web page.
• Google, yahoo, Bing etc are the most popular search engine.
• The first search engine was “yandex”.
• The most popular search engine is Google.
• A search engine operates on following steps:-
15

1. Web crawling: The process of retrieving information stored on different databases or websites by a
web crawler or spider is called as web crawling.
2. Indexing: It is a process of arranging information retrieved by the web crawler. The information
arranged in index database according to their rank or use or view.
3. Searching: It is a process to search required information from the index.
Web browser:
• A web browser is a software program installed on computer, mobile phone by using which we can easily
access internet.
• Google chrome, Mozilla Firefox, Opera mini, Safari, etc are the name of popular web browsers.
• As a client/server model, the browser is the client run on a computer that contacts the web server and
requests information. The web server send the information back to the web browser.
• A person requires a web browser to open a search engine.
• Web browser is used to access web pages and web sites.
• Many browsers offer plug-in which help the ability of the software so that it can display multimedia
information(sound and video)
• The first web browser was “Mosaic”.
Types of Web browser:
Name of the Developed by Year of Written in OS capabilities
browser released
Internet Microsoft Inc. 1995 Visual basic MS Windows
Explorer
Opera Opera software ASA, 1997 Cross Plateform
Norway
Safari Apple Inc. 2003 MAC OS,
Windows, iphone
OS
Mozilla Fire Fox Mozilla Coportation 2004 Java script, C++, Cross Plateform
XUL
Chrome Google Inc. 2008 Java script MS Windows

Now a days internet is the most powerful tool. It uses different areas like:
1. Communication: Communication application of the internet has advanced to many forms. There are
various forms of communication over internet like:
A. Email:
• It stans for Electronic mail.
• It is an electronic technology that is used to send or receive the document electronically.
• It is a high speed transmission mode.
• It can transfer text, audio, video, image etc.
• Each user of an E-mail is assigned by a unique name for his/her E-mail account. This is known as E-
mail address.
• Email address form:user_name@domain_name.
• Example: [email protected].
• Here debayan.chand: username and gmail.com: domain name. User name and domain name
separated by “@” special character.
• E-mail address can be written in uppercase, lowercase or proper case.
• Spaces are not allowed in E-mail address.
• It uses different protocols like SMTP, IMAP, POP etc.
Advantages:
• It is faster medium communication.
• It is less expensive.
• It is a reliable medium of communication because there is no need of any stamp.
• It is a user friendly data transmission mode.
16

• It can send or receive e-document as an attachment and also which can printable.
• The receiver does not need to be online to receive an eE-mail.
Disadvantages:
• The receiver does not aware whether an E-mail comes to its inbox while he is online.
• E-mail does not prevent from fraud.
• There may be a chance of sending unintended recipient due to wrong E-mail id.
• It is fully dependent on internet.
• Junk or spam are the undesirable E-mails may be received by the receiver.
E-mail Protocols:
SMTP:
• It stands for simple mail transfer protocol.
• It was first described in 1982.
• It is used for sending E-mail efficiently over the internet from client to mail server or between the mail
servers.

IMAP:
• It stands for internet mail access protocol.
• It was first described in 1986.
• There are exist 5 versions of IMAP as: IMAP, IMAP2, IMAP3, IMAP2bis, IMAP4.
• It is a standard protocol that is used to receiver mail from the mail server.
• It is a standard e-mail protocol that stores e-mail messages on a mail server but allows the end user to
changes the messages and make changes on the mail server whenever end user make any changes on
its mail.

POP:
• It stands for post office protocol.
• Currently we are using POP3 version.
• It is a standard e-mail protocol that has the same rule as IMAP, but it is generally used to
support a single client.
17

Components of an e-mail message:


E-mail messages contains different components like: E-mail header, greeting, text, and signature.
E-mail header:
• From: This field indicates the sender’s address that is who send the e-mail.
• Data: This fields indicates the date when the e-mail sent.
• To: It indicates the receiver’s address that is to whom the e-mail is send.
• Subjects: This fields indicates the purpose of e-mail.
• CC: It stands for Carbon Copy. It includes those receivers addresses whom we want to keep informed
but not exactly the intended receiver.
• BCC: It stands for Black/Blind Carbon Copy. It is used when we do not want one or more of the receivers
to know that some one else was copied on the message.
B. Voice mail:
• It is a communication service used to transfer voice message from one device to another device
through internet.
• It uses VoIP(Voice over Internet Protocol).
• It can be used for both private communication as well as group communication.
C. Chatting:
• On the internet, chatting is talking to other people who are using the internet at the same time as we
are using.
• Usually, this “talking” means the exchange of type messages between individual users or group of
users.
• It is used for real time interaction between two or more online user through a chat messenger.
• It is an instant messaging system.
• Various types of web chat programs are gTalk, whatsapp, facebook messenger, etc.
• Through chatting user can transfer audio, video, text, image.
D. IRC:
• It stands for internet Relay Chat.
• It is a multiuser, multichannel and mass chatting system. IRC is a chatting protocol.
• It consists of more than one server and more than one client.
• It can create communication between multiple users and multiple servers.
• When the client of a server not directly connected to another client of another server then a server can
be used as a mediator between these two servers.
• It is a global, distributed, real time chat system that operates over the internet.
• IRC provides group communication as well as personal communication.
• It also provides data transfer and file sharing facilities.
• The most common IRC networks are IRCnet, Efnet.
• Popular ongoing IRC channels are #hottub, #riskybus.
C3
SERVER2
C1 C4

C5
SERVER1 SERVER3
C6

C2 C7
SERVER4
C8
(IRC NETWORK)
18

E. Video Conferencing:
• Video conferencing means to conduct a conference between two or more participants at different sites
by using computer networks to transmit audio and video data.
• This is also known as ITS(Internet Telephony System).
• It uses VoIP(Voice over internet protocol), which converts into digital signal at sender sites and digital
signal into voice signal at receiver sites.
• Each participant has a video camera, microphone and speaker mounted on his/her computer for video
conferencing.
• Two participants can connected with each other through internet by using a video chat application or
software like WhatsApp, messenger, etc.
• It consists following components:- End device, Proxy/ gate keeper, Gateway.
2. Job search: Internet offers a wide platform for opportunities for job. On the one click of mouse job
seekers can search for job in their own city or any other city. There are many sites available on the
internet where job seeker can upload their CV and get a interview call within a day.
3. Online shopping: The internet has also facilitated the introduction of a new market concept consisting
of virtual shops. They provide information about products or services for sale through www servers.
4. Travel: One can use internet the user can find the information about various tourist places in India or
all over the world. On the internet booking of tour packages can be done, train, flight bus tickets can
be booked.
5. Research: Internet is a sea of knowledge. Numerous research papers are available on the internet.
Mobile Communication:
• Wireless mobile communication is a fastest communication technique having millions of users around
the world.
• Cellular phones are becoming the essential part of our everyday life and business.
• Cellular system provides bidirectional voice and data communication around the world.
• Cellular system design provides the reusability of frequency spectrum.

G
F B
A
E C
REUSE FREQUENCY
D
G
D B F
C E A
A C E
B F D
G

• A particular frequency can be used over a specific location called as cell and the coverage area is
divided into non-overlapping cells.
• In 1st generation of cellular system analog communication system are used, but from 2 nd generation
digital communication system are used.
• Various types of the evolution of mobile communication techniques:
1. First generation(1G)
2. Second generation(2G)
3. Third generation(3G)
4. Fourth generation(4G)
5. Fifth generation(5G)
19

First generation(1G):
• 1G mobile network uses analog signal to transmit voice calls between sender and receiver by using
frequency modulation technique for radio transmission.
• It uses FDMA(Frequency Division Multiple access) technique with channel capacity of 30kHz.
• The data transmission speed of 1G is up to 2.9kbps.
• 1g mobile network cannot convert voice signal of analog signal to digital mode.
• There is no facility for transmission of image, video, etc.
• 1G mobile does not provide global roaming service.
Second generation(2G):
• The second generation of wireless mobile communication started around 1990.
• 2G mobile communication was based on low band digital data signalling.
• This generation offers additional service like SMS (Short Message Service), picture message service,
etc.
• In this generation two types of digital modulation schemes are used: TDMA(Time division Multiple
Access) and CDMA(code Division Multiple Access).
• The frequency band 2G mobile communication technique is 850 to 1900MHz.
• The most popular 2G wireless technology is known as GSM(Global system for mobile communication).
• The data transmission speed of 2G is up to 171.2kbps.
• 2G communication technique is used for both voice, data signal transmission.
• CDMA technology is used in 2G for providing clearer voice quality.
• Based upon the CDMA a new telephone technology was introduced called as WLL(Wireless in Local
Loop).
Third generation(3G):
• 3G represent third generation of mobile communication.
• It uses various wireless techniques like CDMA 2000, EDGE, HSDPA, etc.
• 3G mobile communication system provides multimedia service through mobile phone.
• IMT-2000(International Mobile Telecommunication-2000) is the official name for 3G specified by
ITU(International Telecommunication Union) to provide wireless access to global telecommunication
system.
• Data bandwidth in 3G is 2Mbps to 21Mbps.
• Peak upload rate in 3G is 5Mbps.
• Peak download rate in 3G is 21Mbps.
• 3G provides the facility like web browsing, E-mail, video conferencing, etc.
Fourth generation(4G):
• The fourth generation mobile communication system is introduced in the year 2010.
• 4G connections will be faster than the 3G connections.
• It uses various wireless technologies like LTE(Long-Term Evolution),Wi-Max(Worldwide Interoperability
for Microwave Access), Wi-Fi, etc.
• Data bandwidth in 4G is 2Mbps to 1Gbps.
• Peak upload rate in 4G is 100Mbps.
• Peak download rate in 4G is 1Gbps.
• 4G provides high quality service with anytime and anywhere facility.
Fifth generation(5G):
• 5G mobile communication system uses IPV6 network.
• It is also called as WWWW(Wireless World wide web).
• It is the future generation of mobile communication.
• It uses advances LTE technique.
• Peak upload rate in 5G is 512Mbps.
• Peak download rate in 5G is 1Gbps.
20

FDMA:
• FDMA stand for frequency division multiple access.
• It is used in 1st generation mobile communication.
• By using this scheme, each frequency band allocated for wireless cellular telephone communication
is divided in to 30 channels.
• Each channel can be used to carry a voice signal at a time, so by using FDMA scheme we can carry
multiple voice signal over a single frequency band at a time.
• By the use of FDMA each channel can be assigned to only one user at a time.
TDMA:
• TDMA stands for time division multiple access.
• It is a scheme used in the most popular GSM technology.
• It is mainly used in 2nd generation of mobile communication.
• In GSM technology each frequency is divided using TDMA scheme into eight time slots and allow eight
simultaneous calls on the same frequency.
• The protocol used by this scheme allows large number of users to access one radio frequency by
allocating time slot to multiple voice or data calls.
GSM:
• GSM stands for Global System for Mobile communication.
• It is the popular 2G wireless technology
• It uses the TDMA scheme.
CDMA:
• It stands for Code Division Multiple Access.
• It is used in 2nd generation and 3rd generation wireless communication.
• CDMA uses spread spectrum technology to break up speech into small, digitized segments and
encode them to identify each call.
• CDMA technology are used for providing clearer voice quality with less background noise.
• CDMA differentiate between multiple transmission carried simultaneously on a single wireless signal.
• Based upon the CDMA a new telephone technology was introduced which is called as WLL(Wireless
in Local Loop).
• Using CDMA each phone was given a code to send or receive voice and data signal.
WLL:
• It stands for Wireless in Local Loop.
• It is anew telephone technology which was introduced based upon the CDMA.
• This technology is used in the 2nd generation of mobile communication.
• In this technology the voice is transmitted through radio signals within a range of 30 to 35 km.

You might also like