Unit 1
Unit 1
TCP/IP protocols
In order for a computer to communicate on the Internet, a set of
rules or protocols computers must follow to exchange messages
was developed. The two most important protocols allowing
computers to transmit data on the Internet are Transmission
Control Protocol (TCP) and Internet Protocol (IP). With these
protocols, virtually all computers can communicate with each
other.
Domain name system
An Internet address has four fields with numbers that are
separated by periods or dots. This type of address is known as
an IP address. Rather than have the user remember long strings
of numbers, the Domain Name System (DNS) was developed to
translate the numerical addresses into words. For example, the
address fcit.usf.edu is really 131.247.120.10.
URLs
Addresses for web sites are called URLs
(Uniform Resource Locators). Most of them
begin with http (HyperText Transfer Protocol),
followed by a colon and two slashes.
Top-level domain names include:.
.com Commercial
.edu Educational
.gov US Government
.int Organization
.mil US Military
.net Networking Providers
.org Non-profit Organization
History of internet
The concept of Internet was originated in 1969 and has
undergone several technological & Infrastructural changes.
The origin of Internet devised from the concept of Advanced
Research Project Agency Network (ARPANET).
ARPANET was developed by United States Department of
Defense.
Basic purpose of ARPANET was to provide communication among
the various bodies of government.
Initially, there were only four nodes, formally called Hosts.
In 1972, the ARPANET spread over the globe with 23 nodes
located at different countries and thus became known
as Internet.
By the time, with invention of new technologies such as TCP/IP
protocols, DNS, WWW, browsers, scripting languages etc.,
Internet provided a medium to publish and access information
over the web.
The first message was sent over the ARPANET from computer
science professor Leonard Kleinrock’s laboratory at University of
California to the standard research Institute.
The Internet acts as a pipeline to transport
electronic messages from one network to
another network. At the heart of most
networks is a server, a fast computer with
large amounts of memory and storage
space. The server controls the
communication of information between the
devices attached to a network, such as
computers, printers, or other servers.
How internet works?
It's important to realize that the Internet is a global network
of physical cables, which can include copper telephone
wires, TV cables, and fiber optic cables.
Even wireless connections like Wi-Fi and 3G/4G rely on these
physical cables to access the Internet.
When you visit a website, your computer sends a request
over these wires to a server.
A server is where websites are stored, and it works a lot like
your computer's hard drive.
Once the request arrives, the server retrieves the website
and sends the correct data back to your computer.
What's amazing is that this all happens in just a few
seconds!
Specification and establishment details
1) Computer
INFORMATION:
The internet is the source of knowledge. All kinds of information is present in
it. it is easily accessed and can be searched more to get more additional
knowledge. Information like educational related, government laws, market
sales, stocks and shares, new creations etc. is gathered from a single place.
LEARNING:
The internet has now become a part of education. Education like home
schooling is easily carried out using internet. Teachers can upload their
teaching videos in the internet and is accessed by people across the world
which is helpful for all students. The marks are also released in the internet
since, releasing mark for the whole institution in notice boards will create
chaos.
Advantage of Internet
ENTERTAINMENT:
The internet is now the most popular form of entertainment. Movies,
songs, videos, games etc. is available in internet for free. Social
networking is also possible using internet. Hence, there is tons of
entertainment that is available in online in the internet.
SOCIAL NETWORK:
The social networking is the sharing of information to people across
the world. Apart from being an entertainment website, it has many
uses. Any job vacancy, emergency news, ideas etc. can be shared in
the website and the information gets passed on quickly to wide
area. Also the Social Networking websiter are used to easy
communications. Example: Facebook and twitter.
E-COMMERCE:
All business deals can be carried in the internet like transaction of
money etc. this is called E commerce. Online reservations, online
ticket booking for movie etc. can be done easily. It saves us lots of
time. Online shopping is now the latest trend in internet world where
products from dresses to household furniture is available at door step.
Disadvantage
There are always chances to loose personal information such
as name, address, credit card number. Therefore, one should
be very careful while sharing such information. One should use
credit cards only through authenticated sites.
Another disadvantage is the Spamming. Spamming
corresponds to the unwanted e-mails in bulk. These e-mails
serve no purpose and lead to obstruction of entire system.
Virus can easily be spread to the computers connected to
internet. Such virus attacks may cause your system to crash or
your important data may get deleted.
There are various websites that do not provide the
authenticated information. This leads to misconception among
many people.
Disadvantage of Internet
INFORMATION LOSS:
The information crucial to us or any important files can be easily
taken by the hackers. There is no exact proof for the security for the
details we store like account number, passwords etc. hence, sensitive
information must be carefully stored by the people.
SPAM:
The unnecessary emails, advertisements etc. sometimes are said to
be spam because they have the ability to slow down the system and
makes the users to face lots of problems. Spam makes the people get
more confused since important emails are also stored along with
spam.
VIRUS ATTACKS:
The malware or virus threats are so deadly that affects the system to
a greater extend. It immediately deletes all important files and finally
the system ends up being crashed. The virus attack is possible in
three ways. One it attacks selected files. Two, it harms the executable
boot files and most dangerous of all is the macro virus which has the
ability to replicate and expand to all parts of files.
Intranets and Extranets
What is intranet?
Intranet is a restricted version of the internet, that
typically does not allow access to anyone outside of its
network.
An intranet is typically a local only network.
Intranet is defined as private network of computers within
an organization with its own server and firewall.
Intranets may be used for organizations or networks that do
not want their information to be able to be accessed by
outside sources, and is especially important for organizations
that require a high amount of secrecy - such as a server that
holds military secrets or a database for the CIA. (Central
Intelligence Agency)
Intranets are basically mini versions of the internet that
connect just a few servers, instead of the countless number of
servers that the internet holds and connects with one another.
It is mostly used by company, school, government or
organization.
Advantages
Communication : Intranet offers easy and cheap
communication within an organization. Employees can
communicate using chat, e-mail or blogs.
Cost Effective : Employees can see the data and other
documents using browser rather than printing them and
distributing duplicate copies among the employees, which
certainly decreases the cost.
Security : Since information shared on intranet can only be
accessed within an organization, therefore there is almost
no chance of being theft.
Immediate Updates : Any changes made to information are
reflected immediately to all the users.
Time Saving : Information on Intranet is shared in real time.
Collaboration : Information is distributed among the
employees as according to requirement and it can be
accessed by the authorized users, resulting in enhanced
teamwork.
Disadvantage
What is Extranet?
An extranet is like an intranet, but also provides
controlled access to authorized customers, vendors,
partners, or others outside the company.
The important thing to bear in mind is that extranets exist
to create a path of communication between your
internal staff and external organizations, whether they
be customers, suppliers, or business partners.
An extranet provides a place for your business and third
parties to work together and share information in a secure
environment, which sits outside of your intranet – meaning
that external partners will not have access to confidential
internal matters.
An Extranet is actually an Intranet that is partially
accessible to authorized outsiders.
The level of access can be set to different levels for
individuals or groups of outside users. The access can be
based on a username and password or an IP address.
Extranet is used for specific use cases including B-2-B.
An extranet is an extended intranet. In addition to
allowing access to members of an organization, an extranet
uses firewalls, access profiles, and privacy protocols to allow
access to users from outside the organization.
Advantage of extranet
Disadvantage
Hosting : Where the extranet pages will be held i.e. who will
host the extranet pages. In this context there are two choices:
Host it on your own server.
Host it with an Internet Service Provider (ISP) in the same way as
web pages.
But hosting extranet pages on your own server requires high
bandwidth internet connection which is very costly.
Security : Additional firewall security is required if you host
extranet pages on your own server which result in a complex
security mechanism and increase work load.
Accessing Issues : Information can not be accessed
without internet connection. However, information can be
accessed in Intranet without internet connection.
Decreased Interaction : It decreases the face to face
interaction in the business which results in lack of
communication among customers, business partners and
suppliers.
More about intranet and extranet
http://www.brighthub.com/comp
uting/enterprise-security/articles/
63387.aspx
http://www.hcidata.info/inet.htm
https://www.claromentis.com/blo
g/whats-the-difference-between-i
ntranets-and-extranets/
http://www.differencebetween.inf
o/difference-between-intranet-an
d-extranet
INTERNET APPLICATIONS
Email
Telnet
FTP
Email: Electronic Mail
Email :
E-mail, also known as electronic mail, is the most
widely used and successful of Internet applications.
First the sender types the message or attach the file and sends it
to the mail server or email service provider, the mail server
forwards it to the next server through internet and satellite. Then
the message is finally received by a receiver.
Server Authentication :
BODY
CC and BCC
CC stands for Carbon Copy. When you CC
people on an email, the CC list is visible to all
other recipients. For example,
CC [email protected] and [email protected]
m on an email, Bob and Jake will both know
that the other received the email, as well.
BCC stands for “blind carbon copy.
no one but the sender can see the list of BCC
recipients. For example, if you
have [email protected] and [email protected]
om in the BCC list, neither Bob nor Jake will
know that the other received the email.
The To and CC fields work similarly.
Whether you put four email addresses in
the To field or put one email address in the
To field and three in the CC field, the four
people will all receive the same email.
They’ll also be able to see the email
address of every other recipients in the To
and CC fields.
E-mail is one of the protocols included with the Transport
Control Protocol/Internet Protocol (TCP/IP) suite of protocols.
IMAP Protocol:
On 30 April 1993 CERN put the World Wide Web software in the
public domain.
With a web browser, one can view web pages that may contain text,
images, videos and navigate between them via hyperlinks.
• The World Wide Web consists of all the public Web sites connected to
the Internet worldwide, including the client devices (such as
computers and cell phones) that access Web content.
• Things like Telnet, ftp and email are part of the internet but not part
of www.
WWW Components :
1) Structural component
-client
-servers
-caches
-Internet
2) Semantic Components
-Hyper Text Transfer Protocol
-Hyper Text Markup Language
3) Extensible Markup Language(XML)
-Uniform Resource Identifiers(URLs)
Web Page :
A web page, or webpage, is a document that is suitable for the
World Wide Web and web browsers.
(1) Static
(2) Dynamic
Static web page :
1)Client-Side Scripting
2)Server-Side Scripting
Client-side scripting refers to the programs that are
executed on client-side.
Client-side scripts contains the instruction for the browser to be
executed in response to certain user’s action.
http://www.microsoft.com
http://www.ibm.com
http://www.netscape.com
Resources
URL Registration
URL is the abbreviation of Uniform Resource Locator.
It is the global address of documents and
other resources on the World Wide Web. For example,
www.facebook.com, www.google.com.
A URL is one type of Uniform Resource Identifier (URI).
URL strings consist of three parts