You are on page 1of 48

What is Internet?

The Internet is a vast network that connects computers all


over the world. Through the Internet, people can share
information and communicate from anywhere with an
Internet connection.
The internet is a widespread interconnected network of
computers and electronics devices(that support internet). It
creates a communication medium to share and get
information online.
If your device is connected to the Internet then only you will
be able to access all the applications, websites, social media
apps, and many more services. Internet nowadays is
considered as the fastest medium for sending and receiving
information.
Uses of the Internet
Online Businesses (E-commerce): Online shopping websites have made our life easier,
e-commerce sites like Amazon, Flipkart, Myntra are providing very spectacular services
with just one click and this is a great use of the Internet.

Cashless transactions: All the merchandising companies are offering services to their
customers to pay the bills of the products online via various digital payment apps like
Paytm, Google pay, etc.

Education: It is the internet facility that provides a whole bunch of educational material
to everyone through any server across the web. Those who are unable to attend physical
classes can choose any course from the internet and can have the point-to-point
knowledge of it just by sitting at home.

Social Networking: The purpose of social networking sites and apps is to connect
people all over the world. With the help of social networking sites, we can talk, share
videos, images with our loved ones when they are far away from us. Also, we can create
groups for discussion or for meetings.

Entertainment: The Internet is also used for entertainment. There are numerous
entertainment options available on the internet like watching movies, playing games,
listening to music, etc. You can also download movies, games, songs, TV Serial, etc.,
easily from the internet.
Advantages of the Internet
Online Banking and Transaction: The Internet allows us to transfer money online by
the net banking system. Money can be credited or Debited from one account to the
other.
Education, online jobs: Through the Internet, we are able to get more jobs via online
platforms like Linkedin and to reach more job providers
Entertainment: There are numerous options of entertainment online we can listen to
music, play games can watch movies, web series, youtube itself is a hub of knowledge as
well as entertainment.
New Job roles: The Internet has given us access to social media, and digital products so
we are having numerous new job opportunities like digital marketing and social media
marketing online businesses are earning huge amounts of money just because the
internet being the medium to help us to do so.
Best Communication Medium: The communication barrier has been removed from the
Internet. You can send messages via email, Whatsapp, and Facebook. Voice chatting and
video conferencing are also available to help you to do important meetings online.
Comfort to humans: Without putting any physical effort you can do so many things like
shopping online it can be anything from stationeries to clothes, books to personal items,
etc. You can books train and plane tickets online.
GPS Tracking and google maps: Yet another advantage of the internet is that you are
able to find any road in any direction, areas with less traffic with the help of GPS in your
mobile.
Disadvantages of the Internet
Time wastage: Wasting too much time on the internet surfing on social media apps and
doing nothing decreases your productivity rather than wasting time on scrolling social
media apps one should utilize that time in doing something skillful and even more
productive.

Bad impacts on health: Spending too much time on the internet causes bad impacts on
your health physical body needs some outdoor games exercise and many more things.
Looking at the screen for a longer duration causes serious impacts on the eyes.

Cyber Crimes: Cyberbullying, spam, viruses, hacking, and stealing data are some of the
crimes which are on the verge these days. Your system which contains all the
confidential data can be easily hacked by cybercriminals.

Effects on children: Small children are heavily addicted to the Internet watching
movies, games all the time is not good for their overall personality as well as social
development.

Bullying and spreading negativity: The Internet has given a free tool in the form of
social media apps to all those people who always try to spread negativity with very
revolting and shameful messages and try to bully each other which is wrong.
What is DNS?
The domain name system (DNS) is a naming database
in which internet domain names are located and
translated into internet protocol(IP) addresses. The
domain name system maps the name people use to
locate a website to the IP address that a computer uses
to locate that website.
For example, if someone types "example.com" into a
web browser, a server behind the scenes maps that
name to the corresponding IP address. An IP address is
similar in structure to 203.0.113.72.
How DNS work
DNS servers convert URLs and domain names into IP addresses that computers can
understand and use. They translate what a user types into a browser into something
the machine can use to find a webpage. This process of translation and lookup is
called DNS resolution
The basic process of a DNS resolution follows these steps:
The user enters a web address or domain name into a browser.
The browser sends a message, called a recursive DNS query, to the network
to find out which IP or network address the domain corresponds to.
The query goes to a recursive DNS server, which is also called a recursive
resolver, and is usually managed by the internet service provider (ISP). If
the recursive resolver has the address, it will return the address to the user,
and the webpage will load.
If the recursive DNS server does not have an answer, it will query a series
of other servers in the following order: DNS root name servers, top-level
domain (TLD) name servers and authoritative name servers.
The three server types work together and continue redirecting until they
retrieve a DNS record that contains the queried IP address. It sends this
information to the recursive DNS server, and the webpage the user is
looking for loads.
The recursive server stores, or caches, the record for the domain name,
which contains the IP address. The next time it receives a request for that
domain name, it can respond directly to the user instead of querying other
servers.
If the query reaches the authoritative server and it cannot find the
information, it returns an error message.
DNS structure
The domain name is usually contained in a URL. A domain
name is made of multiple parts, called labels. The domain
hierarchy is read from right to left with each section denoting
a subdivision.
The TLD appears after the period in the domain name.
Examples of top-level domains include .com, .org and .edu,
but there are many others. Some may denote a country code
or geographic location, such as .us for the United States or .ca
for Canada.
Each label on the left-hand side of the TLD denotes another
subdomain of the domain to the right. For example, in the URL
www.techtarget.com, "techtarget" is a subdomain of .com,
and "www." is a subdomain of techtarget.com.
Web server
Web server is a computer where the web content
is stored. web server is used to host the web sites
but there exists other web servers also such as
gaming, storage, FTP, email etc.
Web Server Working
Web server respond to the client request in either
of the following two ways:
Sending the file to the client associated with the
requested URL.
Generating response by invoking a script and
communicating with database
Web Browser

The web browser is an application software to explore


www (World Wide Web). It provides an interface
between the server and the client and requests to the
server for web documents and services.
It works as a compiler to render HTML which is used to
design a webpage. Whenever we search anything on
the internet, the browser loads a web page written in
HTML, including text, links, images, and other items
such as style sheets and JavaScript functions.
Google Chrome, Microsoft Edge, Mozilla Firefox, Safari
are examples of web browsers.
Web client
A web client is software that accesses a web server by
sending an HTTP request message and processing the
resulting HTTP response.
A web client is an application that communicates with
a web server, using Hypertext Transfer Protocol (HTTP).
Any web client that is designed to directly support user
access to web servers is known as a user agent.
Browser is the most commonly used web client.
The most common interface to the World Wide Web is
a browser, such as Mosaic, Netscape Navigator, or
Internet Explorer.
How the web works?
Internet Protocol (IP)
Internet Protocols are a set of rules that governs the
communication and exchange of data over the internet. Both
the sender and receiver should follow the same protocols in
order to communicate the data. In order to understand it
better, example - language.
Any language has its own set of vocabulary and grammar
which we need to know if we want to communicate in that
language. Similarly, over the internet whenever we access a
website or exchange some data with another device then
these processes are governed by a set of rules called the
internet protocols.
Working of internet protocol:
The internet and many other data networks work
by organizing data into small pieces called packets.
Each large data sent between two network devices
is divided into smaller packets by the underlying
hardware and software.
Each network protocol defines the rules for how its
data packets must be organized in specific ways
according to the protocols the network supports.
Internet Protocol is connectionless and unreliable protocol. It ensures no
guarantee of successfully transmission of data.

In order to make it reliable, it must be paired with reliable protocol such as TCP at
the transport layer. Internet protocol transmits the data in form of a datagram as
shown in the following diagram:
The length of datagram is variable.
The Datagram is divided into two
parts: header and data.
The length of header is 20 to 60 bytes.
The header contains information for routing
and delivery of the packet.
Transmission Control Protocol (TCP)
TCP is a connection oriented protocol and offers end-to-end
packet delivery. It acts as back bone for connection.
It exhibits the following key features:
Transmission Control Protocol (TCP) corresponds to the
Transport Layer of OSI Model.
TCP is a reliable and connection oriented protocol.
TCP offers:
Stream Data Transfer.
Reliability.
Efficient Flow Control
Full-duplex operation.
Multiplexing.
TCP offers connection oriented end-to-end
packet delivery.
TCP ensures reliability by sequencing bytes
with a forwarding acknowledgement number
that indicates to the destination the next byte
the source expect to receive.
It retransmits the bytes not acknowledged
with in specified time period.
TCP Services
TCP offers following services to the processes
at the application layer:
Stream Delivery Service
Sending and Receiving Buffers
Bytes and Segments
Full Duplex Service
Connection Oriented Service
Reliable Service
Stream Deliver Service
TCP protocol is stream oriented because it allows the sending process to
send data as stream of bytes and the receiving process to obtain data as
stream of bytes.

Sending and Receiving Buffers


It may not be possible for sending and receiving process to produce and
obtain data at same speed, therefore, TCP needs buffers for storage at
sending and receiving ends.

Bytes and Segments


The Transmission Control Protocol (TCP), at transport layer groups the
bytes into a packet. This packet is called segment. Before transmission of
these packets, these segments are encapsulated into an IP datagram.
Full Duplex Service
Transmitting the data in duplex mode means flow of data in both
the directions at the same time.

Connection Oriented Service


TCP offers connection oriented service in the following manner:
TCP of process-1 informs TCP of process – 2 and gets its approval.
TCP of process – 1 and TCP of process – 2 and exchange data in both
the two directions.
After completing the data exchange, when buffers on both sides are
empty, the two TCP’s destroy their buffers.

Reliable Service
For sake of reliability, TCP uses acknowledgement mechanism
User Datagram Protocol (UDP)
UDP is connectionless and unreliable protocol. It doesn’t require
making a connection with the host to exchange data. Since UDP is
unreliable protocol, there is no mechanism for ensuring that data
sent is received.

UDP transmits the data in form of a datagram.

UDP is used by the application that typically transmit small amount


of data at one time.

UDP provides protocol port used i.e. UDP message contains both
source and destination port number, that makes it possible for UDP
software at the destination to deliver the message to correct
application program.
File Transfer Protocol (FTP)
This protocol is used for transferring files from
one system to the other. This works on a
client-server model.
When a machine requests for file transfer
from another machine, sets up a connection
between the two and authenticates each
other using their ID and Password.
And, the desired file transfer takes place
between the machines
FTP is used to copy files from one host to another. FTP offers
the mechanism for the same in following manner:
FTP creates two processes such as Control Process and Data
Transfer Process at both ends i.e. at client as well as at server.
FTP establishes two different connections: one is for data
transfer and other is for control information.
Control connection is made between control
processes while Data Connection is made between data
transfer process
FTP uses port 21 for the control connection and Port 20 for
the data connection.
Trivial File Transfer Protocol (TFTP)
Trivial File Transfer Protocol is also used to transfer the files but it
transfers the files without authentication. Unlike FTP, TFTP does not
separate control and data information. Since there is no
authentication exists, TFTP lacks in security features therefore it is
not recommended to use TFTP.

Key points
TFTP makes use of UDP for data transport. Each TFTP message is
carried in separate UDP datagram.
The first two bytes of a TFTP message specify the type of message.
The TFTP session is initiated when a TFTP client sends a request to
upload or download a file.
The request is sent from an ephemeral UDP port to the UDP port
69 of an TFTP server.
Difference between FTP and TFTP
Telnet
TELNET is a standard TCP/IP protocol used for virtual terminal service given
by ISO. This enables one local machine to connect with another. The
computer which is being connected is called a remote computer and which
is connecting is called the local computer.

TELNET operation lets us display anything being performed on the remote


computer in the local computer. This operates on the client/server
principle. The local computer uses the telnet client program whereas the
remote computer uses the telnet server program

Telnet is a protocol used to log in to remote computer on the internet.


There are a number of Telnet clients having user friendly user interface.
The following diagram shows a person is logged in to computer A, and from
there, he remote logged into computer B.
Hyper Text Transfer Protocol (HTTP)
This protocol is used to transfer hypertexts over the internet and it is
defined by the www(world wide web) for information transfer. This
protocol defines how the information needs to be formatted and
transmitted.

And, it also defines the various actions the web browsers should take in
response to the calls made to access a particular web page. Whenever a
user opens their web browser, the user will indirectly use HTTP as this is
the protocol that is being used to share text, images, and other multimedia
files on the World Wide Web.

HTTP is a communication protocol. It defines mechanism for


communication between browser and the web server. It is also called
request and response protocol because the communication between
browser and server takes place in request and response pairs.
HTTP Request
HTTP request comprises of lines which contains:
Request line
Header Fields
Message body
Key Points
The first line i.e. the Request line specifies the request method
i.e. Get or Post.
The second line specifies the header which indicates the domain name of
the server from where index.htm is retrieved

HTTP Response
HTTP response contains:
Status line
Headers
Message body
HTTPS (HyperText Transfer Protocol
Secure)
HTTPS is an extension of the Hypertext Transfer Protocol (HTTP). It is
used for secure communication over a computer network with the
SSL/TLS protocol for encryption and authentication.

So, generally, a website has an HTTP protocol but if the website is


such that it receives some sensitive information such as credit card
details, debit card details, OTP, etc then it requires an SSL certificate
installed to make the website more secure.

So, before entering any sensitive information on a website, we


should check if the link is HTTPS or not. If it is not HTTPS then it may
not be secure enough to enter sensitive information
E-mail Protocols are set of rules that help the client to properly transmit
the information to or from the mail server

SMTP
SMTP stands for Simple Mail Transfer Protocol. It was first proposed in
1982. It is a standard protocol used for sending e-mail efficiently and
reliably over the internet.

These protocols are important for sending and distributing outgoing


emails. This protocol uses the header of the mail to get the email id of the
receiver and enters the mail into the queue of outgoing mails.

And as soon as, it delivers the mail to the receiving email id, it removes the
email from the outgoing list. The message or the electronic mail may
consider of text, video, image etc. It helps in setting up of some
communication server rules.
SMTP is application level protocol.
SMTP is connection oriented protocol.
SMTP is text based protocol.
It handles exchange of messages between e-mail servers over TCP/IP
network.
Apart from transferring e-mail, SMTP also provides notification
regarding incoming mail.
When you send e-mail, your e-mail client sends it to your e-mail
server which further contacts the recipient mail server using SMTP
client.
These SMTP commands specify the sender’s and receiver’s e-mail
address, along with the message to be send.
The exchange of commands between servers is carried out without
intervention of any user.
In case, message cannot be delivered, an error report is sent to the
sender which makes SMTP a reliable protocol.
SMTP Commands
IMAP
IMAP stands for Internet Message Access Protocol. It was first
proposed in 1986. There exist five versions of IMAP as follows:
Original IMAP
IMAP2
IMAP3
IMAP2bis
IMAP4

IMAP allows the client program to manipulate the e-mail message


on the server without downloading them on the local computer.
The e-mail is hold and maintained by the remote server.
It enables us to take any action such as downloading, delete the
mail without reading the mail. It enables us to create, manipulate
and delete remote message folders called mail boxes.
IMAP enables the users to search the e-mails.
It allows concurrent access to multiple mailboxes on multiple mail
servers.
IMAP Commands
POP
POP stands for Post Office Protocol. It is generally used to support a
single client. There are several versions of POP but the POP 3 is the
current standard.

POP3 stands for Post Office Protocol version 3. It has two Message
Access Agents (MAAs) where one is client MAA (Message Access
Agent) and another is server MAA(Message Access Agent) for
accessing the messages from the mailbox.

This protocol helps us to retrieve and manage emails from the


mailbox on the receiver mail server to the receiver’s computer. This
is implied between the receiver and receiver mail server. It can also
be called as one way client server protocol.

The POP3 Works on the 2 PORTS I.E. PORT 110 AND PORT 995.
POP is an application layer internet standard protocol.
Since POP supports offline access to the messages,
thus requires less internet usage time.
POP does not allow search facility.
In order to access the messaged, it is necessary to
download them.
It allows only one mailbox to be created on server.
It is not suitable for accessing non mail data.
POP commands are generally abbreviated into codes of
three or four letters. Eg. STAT.
POP Commands
Comparison between POP and IMAP
MIME (Multipurpose Internet Mail
Extensions)
It is widely used internet standard for coding binary files to send
them as e-mail attachments over the internet. MIME allows an E-
mail message to contain a non-ASCII file such as a video image or a
sound and it provides a mechanism to transfer a non text characters
to text characters.

MIME was invented to overcome the following limitations of


SMTP:
1. SMTP cannot transfer executable files and binary objects.2.
SMTP cannot transmit text data of other language, e.g. French,
Japanese, Chinese etc, as these are represented in 8-bit codes.3.
SMTP services may reject mails having size greater than a certain
size.4. SMTP cannot handle non-textual data such as pictures,
images, and video/audio content.
The MIME specification includes the following elements:
1. Message header fields. Five message header fields are defined. These fields
provide information about the body of the message.2. Content formats. A
number of content formats are defined, thus standardizing representations that
support multimedia electronic mail.3. Transfer encoding. Transfer encoding are
defined that enable the conversion of any content format into a form that is
protected from alteration by the mail system.
The MIME extensions are implemented as fields in the e-mail message header.
These fields are the following: Content type, Content transfer encoding method,
MME version number Content ID (optional), Content description (optional).
MIME Header

The five header fields defined in MIME are as follows:


1. MIME-version. It indicates the MIME version being used. The
current version is 1.1. It is represented as : MIME-version: 1.1.
2. Content-type. It describes the type and subtype of the data in the
body of the message. The content type and content subtype are
separated by slash. This field describes how the object in the body is
to be interpreted. The default value is plaintext in US ASCII. Content
type field is represented as:
Context-type: <type/subtype; parameters>
There are seven different types and fourteen sub-types of content.
The various content type are listed in the table below:
3. Content-transfer encoding. It describes how the object
within the body has been encoded to US ASCII to make it
acceptable for mail transfer. Thus it specifies the method used
to encode the message into 0s and 1s for transport.
The content transfer encoding field is represented as :
Content-transfer-encoding : <type>
The various encoding methods used are given in the table
below:
4. Content-Id. It is used to uniquely identify the MIME
entities in multiple contexts i.e. it uniquely identifies the
whole message in a multiple message environment. This field
is represented as:
Content-id : id = <content-id>
5. Content-description. It is a plaintext description of the
object within the body; It specifies whether the body is image,
audio or video. This field is represented as:
Content-description: <description>
The various fields in the MIME header are

You might also like