Professional Documents
Culture Documents
Cashless transactions: All the merchandising companies are offering services to their
customers to pay the bills of the products online via various digital payment apps like
Paytm, Google pay, etc.
Education: It is the internet facility that provides a whole bunch of educational material
to everyone through any server across the web. Those who are unable to attend physical
classes can choose any course from the internet and can have the point-to-point
knowledge of it just by sitting at home.
Social Networking: The purpose of social networking sites and apps is to connect
people all over the world. With the help of social networking sites, we can talk, share
videos, images with our loved ones when they are far away from us. Also, we can create
groups for discussion or for meetings.
Entertainment: The Internet is also used for entertainment. There are numerous
entertainment options available on the internet like watching movies, playing games,
listening to music, etc. You can also download movies, games, songs, TV Serial, etc.,
easily from the internet.
Advantages of the Internet
Online Banking and Transaction: The Internet allows us to transfer money online by
the net banking system. Money can be credited or Debited from one account to the
other.
Education, online jobs: Through the Internet, we are able to get more jobs via online
platforms like Linkedin and to reach more job providers
Entertainment: There are numerous options of entertainment online we can listen to
music, play games can watch movies, web series, youtube itself is a hub of knowledge as
well as entertainment.
New Job roles: The Internet has given us access to social media, and digital products so
we are having numerous new job opportunities like digital marketing and social media
marketing online businesses are earning huge amounts of money just because the
internet being the medium to help us to do so.
Best Communication Medium: The communication barrier has been removed from the
Internet. You can send messages via email, Whatsapp, and Facebook. Voice chatting and
video conferencing are also available to help you to do important meetings online.
Comfort to humans: Without putting any physical effort you can do so many things like
shopping online it can be anything from stationeries to clothes, books to personal items,
etc. You can books train and plane tickets online.
GPS Tracking and google maps: Yet another advantage of the internet is that you are
able to find any road in any direction, areas with less traffic with the help of GPS in your
mobile.
Disadvantages of the Internet
Time wastage: Wasting too much time on the internet surfing on social media apps and
doing nothing decreases your productivity rather than wasting time on scrolling social
media apps one should utilize that time in doing something skillful and even more
productive.
Bad impacts on health: Spending too much time on the internet causes bad impacts on
your health physical body needs some outdoor games exercise and many more things.
Looking at the screen for a longer duration causes serious impacts on the eyes.
Cyber Crimes: Cyberbullying, spam, viruses, hacking, and stealing data are some of the
crimes which are on the verge these days. Your system which contains all the
confidential data can be easily hacked by cybercriminals.
Effects on children: Small children are heavily addicted to the Internet watching
movies, games all the time is not good for their overall personality as well as social
development.
Bullying and spreading negativity: The Internet has given a free tool in the form of
social media apps to all those people who always try to spread negativity with very
revolting and shameful messages and try to bully each other which is wrong.
What is DNS?
The domain name system (DNS) is a naming database
in which internet domain names are located and
translated into internet protocol(IP) addresses. The
domain name system maps the name people use to
locate a website to the IP address that a computer uses
to locate that website.
For example, if someone types "example.com" into a
web browser, a server behind the scenes maps that
name to the corresponding IP address. An IP address is
similar in structure to 203.0.113.72.
How DNS work
DNS servers convert URLs and domain names into IP addresses that computers can
understand and use. They translate what a user types into a browser into something
the machine can use to find a webpage. This process of translation and lookup is
called DNS resolution
The basic process of a DNS resolution follows these steps:
The user enters a web address or domain name into a browser.
The browser sends a message, called a recursive DNS query, to the network
to find out which IP or network address the domain corresponds to.
The query goes to a recursive DNS server, which is also called a recursive
resolver, and is usually managed by the internet service provider (ISP). If
the recursive resolver has the address, it will return the address to the user,
and the webpage will load.
If the recursive DNS server does not have an answer, it will query a series
of other servers in the following order: DNS root name servers, top-level
domain (TLD) name servers and authoritative name servers.
The three server types work together and continue redirecting until they
retrieve a DNS record that contains the queried IP address. It sends this
information to the recursive DNS server, and the webpage the user is
looking for loads.
The recursive server stores, or caches, the record for the domain name,
which contains the IP address. The next time it receives a request for that
domain name, it can respond directly to the user instead of querying other
servers.
If the query reaches the authoritative server and it cannot find the
information, it returns an error message.
DNS structure
The domain name is usually contained in a URL. A domain
name is made of multiple parts, called labels. The domain
hierarchy is read from right to left with each section denoting
a subdivision.
The TLD appears after the period in the domain name.
Examples of top-level domains include .com, .org and .edu,
but there are many others. Some may denote a country code
or geographic location, such as .us for the United States or .ca
for Canada.
Each label on the left-hand side of the TLD denotes another
subdomain of the domain to the right. For example, in the URL
www.techtarget.com, "techtarget" is a subdomain of .com,
and "www." is a subdomain of techtarget.com.
Web server
Web server is a computer where the web content
is stored. web server is used to host the web sites
but there exists other web servers also such as
gaming, storage, FTP, email etc.
Web Server Working
Web server respond to the client request in either
of the following two ways:
Sending the file to the client associated with the
requested URL.
Generating response by invoking a script and
communicating with database
Web Browser
In order to make it reliable, it must be paired with reliable protocol such as TCP at
the transport layer. Internet protocol transmits the data in form of a datagram as
shown in the following diagram:
The length of datagram is variable.
The Datagram is divided into two
parts: header and data.
The length of header is 20 to 60 bytes.
The header contains information for routing
and delivery of the packet.
Transmission Control Protocol (TCP)
TCP is a connection oriented protocol and offers end-to-end
packet delivery. It acts as back bone for connection.
It exhibits the following key features:
Transmission Control Protocol (TCP) corresponds to the
Transport Layer of OSI Model.
TCP is a reliable and connection oriented protocol.
TCP offers:
Stream Data Transfer.
Reliability.
Efficient Flow Control
Full-duplex operation.
Multiplexing.
TCP offers connection oriented end-to-end
packet delivery.
TCP ensures reliability by sequencing bytes
with a forwarding acknowledgement number
that indicates to the destination the next byte
the source expect to receive.
It retransmits the bytes not acknowledged
with in specified time period.
TCP Services
TCP offers following services to the processes
at the application layer:
Stream Delivery Service
Sending and Receiving Buffers
Bytes and Segments
Full Duplex Service
Connection Oriented Service
Reliable Service
Stream Deliver Service
TCP protocol is stream oriented because it allows the sending process to
send data as stream of bytes and the receiving process to obtain data as
stream of bytes.
Reliable Service
For sake of reliability, TCP uses acknowledgement mechanism
User Datagram Protocol (UDP)
UDP is connectionless and unreliable protocol. It doesn’t require
making a connection with the host to exchange data. Since UDP is
unreliable protocol, there is no mechanism for ensuring that data
sent is received.
UDP provides protocol port used i.e. UDP message contains both
source and destination port number, that makes it possible for UDP
software at the destination to deliver the message to correct
application program.
File Transfer Protocol (FTP)
This protocol is used for transferring files from
one system to the other. This works on a
client-server model.
When a machine requests for file transfer
from another machine, sets up a connection
between the two and authenticates each
other using their ID and Password.
And, the desired file transfer takes place
between the machines
FTP is used to copy files from one host to another. FTP offers
the mechanism for the same in following manner:
FTP creates two processes such as Control Process and Data
Transfer Process at both ends i.e. at client as well as at server.
FTP establishes two different connections: one is for data
transfer and other is for control information.
Control connection is made between control
processes while Data Connection is made between data
transfer process
FTP uses port 21 for the control connection and Port 20 for
the data connection.
Trivial File Transfer Protocol (TFTP)
Trivial File Transfer Protocol is also used to transfer the files but it
transfers the files without authentication. Unlike FTP, TFTP does not
separate control and data information. Since there is no
authentication exists, TFTP lacks in security features therefore it is
not recommended to use TFTP.
Key points
TFTP makes use of UDP for data transport. Each TFTP message is
carried in separate UDP datagram.
The first two bytes of a TFTP message specify the type of message.
The TFTP session is initiated when a TFTP client sends a request to
upload or download a file.
The request is sent from an ephemeral UDP port to the UDP port
69 of an TFTP server.
Difference between FTP and TFTP
Telnet
TELNET is a standard TCP/IP protocol used for virtual terminal service given
by ISO. This enables one local machine to connect with another. The
computer which is being connected is called a remote computer and which
is connecting is called the local computer.
And, it also defines the various actions the web browsers should take in
response to the calls made to access a particular web page. Whenever a
user opens their web browser, the user will indirectly use HTTP as this is
the protocol that is being used to share text, images, and other multimedia
files on the World Wide Web.
HTTP Response
HTTP response contains:
Status line
Headers
Message body
HTTPS (HyperText Transfer Protocol
Secure)
HTTPS is an extension of the Hypertext Transfer Protocol (HTTP). It is
used for secure communication over a computer network with the
SSL/TLS protocol for encryption and authentication.
SMTP
SMTP stands for Simple Mail Transfer Protocol. It was first proposed in
1982. It is a standard protocol used for sending e-mail efficiently and
reliably over the internet.
And as soon as, it delivers the mail to the receiving email id, it removes the
email from the outgoing list. The message or the electronic mail may
consider of text, video, image etc. It helps in setting up of some
communication server rules.
SMTP is application level protocol.
SMTP is connection oriented protocol.
SMTP is text based protocol.
It handles exchange of messages between e-mail servers over TCP/IP
network.
Apart from transferring e-mail, SMTP also provides notification
regarding incoming mail.
When you send e-mail, your e-mail client sends it to your e-mail
server which further contacts the recipient mail server using SMTP
client.
These SMTP commands specify the sender’s and receiver’s e-mail
address, along with the message to be send.
The exchange of commands between servers is carried out without
intervention of any user.
In case, message cannot be delivered, an error report is sent to the
sender which makes SMTP a reliable protocol.
SMTP Commands
IMAP
IMAP stands for Internet Message Access Protocol. It was first
proposed in 1986. There exist five versions of IMAP as follows:
Original IMAP
IMAP2
IMAP3
IMAP2bis
IMAP4
POP3 stands for Post Office Protocol version 3. It has two Message
Access Agents (MAAs) where one is client MAA (Message Access
Agent) and another is server MAA(Message Access Agent) for
accessing the messages from the mailbox.
The POP3 Works on the 2 PORTS I.E. PORT 110 AND PORT 995.
POP is an application layer internet standard protocol.
Since POP supports offline access to the messages,
thus requires less internet usage time.
POP does not allow search facility.
In order to access the messaged, it is necessary to
download them.
It allows only one mailbox to be created on server.
It is not suitable for accessing non mail data.
POP commands are generally abbreviated into codes of
three or four letters. Eg. STAT.
POP Commands
Comparison between POP and IMAP
MIME (Multipurpose Internet Mail
Extensions)
It is widely used internet standard for coding binary files to send
them as e-mail attachments over the internet. MIME allows an E-
mail message to contain a non-ASCII file such as a video image or a
sound and it provides a mechanism to transfer a non text characters
to text characters.