0% found this document useful (0 votes)
44 views48 pages

Basic Internet & Protocols

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views48 pages

Basic Internet & Protocols

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 48

What is Internet?

• The Internet is a vast network that connects computers all over


the world. Through the Internet, people can share information
and communicate from anywhere with an Internet connection.
• The internet is a widespread interconnected network of
computers and electronics devices(that support internet). It
creates a communication medium to share and get information
online.
• If your device is connected to the Internet then only you will be
able to access all the applications, websites, social media apps,
and many more services. Internet nowadays is considered as the
fastest medium for sending and receiving information.
Uses of the Internet
• Online Businesses (E-commerce): Online shopping websites have made our life easier, e-
commerce sites like Amazon, Flipkart, Myntra are providing very spectacular services with just
one click and this is a great use of the Internet.

• Cashless transactions: All the merchandising companies are offering services to their
customers to pay the bills of the products online via various digital payment apps like Paytm,
Google pay, etc.

• Education: It is the internet facility that provides a whole bunch of educational material to
everyone through any server across the web. Those who are unable to attend physical classes
can choose any course from the internet and can have the point-to-point knowledge of it just
by sitting at home.

• Social Networking: The purpose of social networking sites and apps is to connect people all
over the world. With the help of social networking sites, we can talk, share videos, images with
our loved ones when they are far away from us. Also, we can create groups for discussion or for
meetings.

• Entertainment: The Internet is also used for entertainment. There are numerous
entertainment options available on the internet like watching movies, playing games, listening
to music, etc. You can also download movies, games, songs, TV Serial, etc., easily from the
internet.
Advantages of the Internet
• Online Banking and Transaction: The Internet allows us to transfer money online by
the net banking system. Money can be credited or Debited from one account to the
other.
• Education, online jobs: Through the Internet, we are able to get more jobs via online
platforms like Linkedin and to reach more job providers
• Entertainment: There are numerous options of entertainment online we can listen to
music, play games can watch movies, web series, youtube itself is a hub of knowledge
as well as entertainment.
• New Job roles: The Internet has given us access to social media, and digital products so
we are having numerous new job opportunities like digital marketing and social media
marketing online businesses are earning huge amounts of money just because the
internet being the medium to help us to do so.
• Best Communication Medium: The communication barrier has been removed from the
Internet. You can send messages via email, Whatsapp, and Facebook. Voice chatting
and video conferencing are also available to help you to do important meetings online.
• Comfort to humans: Without putting any physical effort you can do so many things like
shopping online it can be anything from stationeries to clothes, books to personal
items, etc. You can books train and plane tickets online.
• GPS Tracking and google maps: Yet another advantage of the internet is that you are
able to find any road in any direction, areas with less traffic with the help of GPS in your
mobile.
Disadvantages of the Internet
• Time wastage: Wasting too much time on the internet surfing on social media apps and
doing nothing decreases your productivity rather than wasting time on scrolling social
media apps one should utilize that time in doing something skillful and even more
productive.

• Bad impacts on health: Spending too much time on the internet causes bad impacts on
your health physical body needs some outdoor games exercise and many more things.
Looking at the screen for a longer duration causes serious impacts on the eyes.

• Cyber Crimes: Cyberbullying, spam, viruses, hacking, and stealing data are some of the
crimes which are on the verge these days. Your system which contains all the confidential
data can be easily hacked by cybercriminals.

• Effects on children: Small children are heavily addicted to the Internet watching movies,
games all the time is not good for their overall personality as well as social development.

• Bullying and spreading negativity: The Internet has given a free tool in the form of social
media apps to all those people who always try to spread negativity with very revolting
and shameful messages and try to bully each other which is wrong.
What is DNS?

• The domain name system (DNS) is a naming


database in which internet domain names are
located and translated into internet protocol(IP)
addresses. The domain name system maps the
name people use to locate a website to the IP
address that a computer uses to locate that website.
• For example, if someone types "example.com" into a
web browser, a server behind the scenes maps that
name to the corresponding IP address. An IP address
is similar in structure to 203.0.113.72.
How DNS work
DNS servers convert URLs and domain names into IP addresses that computers can
understand and use. They translate what a user types into a browser into something
the machine can use to find a webpage. This process of translation and lookup is
called DNS resolution
• The basic process of a DNS resolution follows these steps:
• The user enters a web address or domain name into a browser.
• The browser sends a message, called a recursive DNS query, to the network to
find out which IP or network address the domain corresponds to.
• The query goes to a recursive DNS server, which is also called a recursive
resolver, and is usually managed by the internet service provider (ISP). If the
recursive resolver has the address, it will return the address to the user, and
the webpage will load.
• If the recursive DNS server does not have an answer, it will query a series of
other servers in the following order: DNS root name servers, top-level domain
(TLD) name servers and authoritative name servers.
• The three server types work together and continue redirecting until they
retrieve a DNS record that contains the queried IP address. It sends this
information to the recursive DNS server, and the webpage the user is looking
for loads.
• The recursive server stores, or caches, the record for the domain name, which
contains the IP address. The next time it receives a request for that domain
name, it can respond directly to the user instead of querying other servers.
• If the query reaches the authoritative server and it cannot find the
information, it returns an error message.
DNS structure
• The domain name is usually contained in a URL. A domain name
is made of multiple parts, called labels. The domain hierarchy is
read from right to left with each section denoting a subdivision.

• The TLD appears after the period in the domain name. Examples
of top-level domains include .com, .org and .edu, but there are
many others. Some may denote a country code or geographic
location, such as .us for the United States or .ca for Canada.

• Each label on the left-hand side of the TLD denotes another


subdomain of the domain to the right. For example, in the URL
www.techtarget.com, "techtarget" is a subdomain of .com, and
"www." is a subdomain of techtarget.com.
Web server
• Web server is a computer where the web content is
stored. web server is used to host the web sites but
there exists other web servers also such as gaming,
storage, FTP, email etc.
• Web Server Working
• Web server respond to the client request in either of
the following two ways:
– Sending the file to the client associated with the requested
URL.
– Generating response by invoking a script and communicating
with database
Web Browser

• The web browser is an application software to explore www


(World Wide Web). It provides an interface between the server
and the client and requests to the server for web documents
and services.
• It works as a compiler to render HTML which is used to design
a webpage. Whenever we search anything on the internet, the
browser loads a web page written in HTML, including text,
links, images, and other items such as style sheets and
JavaScript functions.
• Google Chrome, Microsoft Edge, Mozilla Firefox, Safari are
examples of web browsers.
Web client
• A web client is software that accesses a web server by
sending an HTTP request message and processing the
resulting HTTP response.
• A web client is an application that communicates with a
web server, using Hypertext Transfer Protocol (HTTP).
Any web client that is designed to directly support user
access to web servers is known as a user agent. Browser
is the most commonly used web client.
• The most common interface to the World Wide Web is a
browser, such as Mosaic, Netscape Navigator, or Internet
Explorer.
How the web works?
Internet Protocol (IP)

• Internet Protocols are a set of rules that governs the


communication and exchange of data over the internet. Both
the sender and receiver should follow the same protocols in
order to communicate the data. In order to understand it
better, example - language.

• Any language has its own set of vocabulary and grammar


which we need to know if we want to communicate in that
language. Similarly, over the internet whenever we access a
website or exchange some data with another device then
these processes are governed by a set of rules called the
internet protocols.
Working of internet protocol:
• The internet and many other data networks work
by organizing data into small pieces called packets.
• Each large data sent between two network devices
is divided into smaller packets by the underlying
hardware and software.
• Each network protocol defines the rules for how its
data packets must be organized in specific ways
according to the protocols the network supports.
• Internet Protocol is connectionless and unreliable protocol. It ensures no
guarantee of successfully transmission of data.

• In order to make it reliable, it must be paired with reliable protocol such as TCP at
the transport layer. Internet protocol transmits the data in form of a datagram as
shown in the following diagram:
• The length of datagram is variable.
• The Datagram is divided into two
parts: header and data.
• The length of header is 20 to 60 bytes.
• The header contains information for routing
and delivery of the packet.
Transmission Control Protocol (TCP)

• TCP is a connection oriented protocol and offers end-to-end


packet delivery. It acts as back bone for connection.
• It exhibits the following key features:
• Transmission Control Protocol (TCP) corresponds to the
Transport Layer of OSI Model.
• TCP is a reliable and connection oriented protocol.
• TCP offers:
– Stream Data Transfer.
– Reliability.
– Efficient Flow Control
– Full-duplex operation.
– Multiplexing.
• TCP offers connection oriented end-to-end
packet delivery.
• TCP ensures reliability by sequencing bytes
with a forwarding acknowledgement number
that indicates to the destination the next byte
the source expect to receive.
• It retransmits the bytes not acknowledged
with in specified time period.
TCP Services

• TCP offers following services to the processes


at the application layer:
– Stream Delivery Service
– Sending and Receiving Buffers
– Bytes and Segments
– Full Duplex Service
– Connection Oriented Service
– Reliable Service
• Stream Deliver Service
• TCP protocol is stream oriented because it allows the sending process to
send data as stream of bytes and the receiving process to obtain data as
stream of bytes.

• Sending and Receiving Buffers


• It may not be possible for sending and receiving process to produce and
obtain data at same speed, therefore, TCP needs buffers for storage at
sending and receiving ends.

• Bytes and Segments


• The Transmission Control Protocol (TCP), at transport layer groups the bytes
into a packet. This packet is called segment. Before transmission of these
packets, these segments are encapsulated into an IP datagram.
• Full Duplex Service
• Transmitting the data in duplex mode means flow of data in both the
directions at the same time.

• Connection Oriented Service


• TCP offers connection oriented service in the following manner:
• TCP of process-1 informs TCP of process – 2 and gets its approval.
• TCP of process – 1 and TCP of process – 2 and exchange data in both the two
directions.
• After completing the data exchange, when buffers on both sides are empty,
the two TCP’s destroy their buffers.

• Reliable Service
• For sake of reliability, TCP uses acknowledgement mechanism
User Datagram Protocol (UDP)

• UDP is connectionless and unreliable protocol. It doesn’t require making


a connection with the host to exchange data. Since UDP is unreliable
protocol, there is no mechanism for ensuring that data sent is received.

• UDP transmits the data in form of a datagram.

• UDP is used by the application that typically transmit small amount of


data at one time.

• UDP provides protocol port used i.e. UDP message contains both source
and destination port number, that makes it possible for UDP software at
the destination to deliver the message to correct application program.
File Transfer Protocol (FTP)

• This protocol is used for transferring files from


one system to the other. This works on a
client-server model.
• When a machine requests for file transfer
from another machine, sets up a connection
between the two and authenticates each
other using their ID and Password.
• And, the desired file transfer takes place
between the machines
• FTP is used to copy files from one host to another. FTP offers
the mechanism for the same in following manner:
• FTP creates two processes such as Control Process and Data
Transfer Process at both ends i.e. at client as well as at server.
• FTP establishes two different connections: one is for data
transfer and other is for control information.
• Control connection is made between control
processes while Data Connection is made between data
transfer process
• FTP uses port 21 for the control connection and Port 20 for
the data connection.
Trivial File Transfer Protocol (TFTP)

• Trivial File Transfer Protocol is also used to transfer the files but it transfers
the files without authentication. Unlike FTP, TFTP does not separate control
and data information. Since there is no authentication exists, TFTP lacks in
security features therefore it is not recommended to use TFTP.

• Key points
• TFTP makes use of UDP for data transport. Each TFTP message is carried in
separate UDP datagram.
• The first two bytes of a TFTP message specify the type of message.
• The TFTP session is initiated when a TFTP client sends a request to upload
or download a file.
• The request is sent from an ephemeral UDP port to the UDP port 69 of an
TFTP server.
Difference between FTP and TFTP
Telnet
• TELNET is a standard TCP/IP protocol used for virtual terminal service given
by ISO. This enables one local machine to connect with another. The
computer which is being connected is called a remote computer and which
is connecting is called the local computer.

• TELNET operation lets us display anything being performed on the remote


computer in the local computer. This operates on the client/server
principle. The local computer uses the telnet client program whereas the
remote computer uses the telnet server program

• Telnet is a protocol used to log in to remote computer on the internet.


There are a number of Telnet clients having user friendly user interface.
The following diagram shows a person is logged in to computer A, and from
there, he remote logged into computer B.
Hyper Text Transfer Protocol (HTTP)

• This protocol is used to transfer hypertexts over the internet and it is


defined by the www(world wide web) for information transfer. This protocol
defines how the information needs to be formatted and transmitted.

• And, it also defines the various actions the web browsers should take in
response to the calls made to access a particular web page. Whenever a
user opens their web browser, the user will indirectly use HTTP as this is the
protocol that is being used to share text, images, and other multimedia files
on the World Wide Web.

• HTTP is a communication protocol. It defines mechanism for


communication between browser and the web server. It is also called
request and response protocol because the communication between
browser and server takes place in request and response pairs.
• HTTP Request
• HTTP request comprises of lines which contains:
– Request line
– Header Fields
– Message body
• Key Points
• The first line i.e. the Request line specifies the request method
i.e. Get or Post.
• The second line specifies the header which indicates the domain name of
the server from where index.htm is retrieved

• HTTP Response
• HTTP response contains:
– Status line
– Headers
– Message body
HTTPS (HyperText Transfer Protocol Secure)

• HTTPS is an extension of the Hypertext Transfer Protocol (HTTP).


It is used for secure communication over a computer network
with the SSL/TLS protocol for encryption and authentication.

• So, generally, a website has an HTTP protocol but if the website


is such that it receives some sensitive information such as credit
card details, debit card details, OTP, etc then it requires an SSL
certificate installed to make the website more secure.

• So, before entering any sensitive information on a website, we


should check if the link is HTTPS or not. If it is not HTTPS then it
may not be secure enough to enter sensitive information
• E-mail Protocols are set of rules that help the client to properly transmit the
information to or from the mail server

• SMTP
• SMTP stands for Simple Mail Transfer Protocol. It was first proposed in 1982. It
is a standard protocol used for sending e-mail efficiently and reliably over the
internet.

• These protocols are important for sending and distributing outgoing emails. This
protocol uses the header of the mail to get the email id of the receiver and
enters the mail into the queue of outgoing mails.

• And as soon as, it delivers the mail to the receiving email id, it removes the
email from the outgoing list. The message or the electronic mail may consider of
text, video, image etc. It helps in setting up of some communication server rules.
• SMTP is application level protocol.
• SMTP is connection oriented protocol.
• SMTP is text based protocol.
• It handles exchange of messages between e-mail servers over TCP/IP
network.
• Apart from transferring e-mail, SMTP also provides notification regarding
incoming mail.
• When you send e-mail, your e-mail client sends it to your e-mail server
which further contacts the recipient mail server using SMTP client.
• These SMTP commands specify the sender’s and receiver’s e-mail
address, along with the message to be send.
• The exchange of commands between servers is carried out without
intervention of any user.
• In case, message cannot be delivered, an error report is sent to the
sender which makes SMTP a reliable protocol.
SMTP Commands
IMAP
• IMAP stands for Internet Message Access Protocol. It was first proposed
in 1986. There exist five versions of IMAP as follows:
– Original IMAP
– IMAP2
– IMAP3
– IMAP2bis
– IMAP4

• IMAP allows the client program to manipulate the e-mail message on the
server without downloading them on the local computer.
• The e-mail is hold and maintained by the remote server.
• It enables us to take any action such as downloading, delete the mail
without reading the mail. It enables us to create, manipulate and delete
remote message folders called mail boxes.
• IMAP enables the users to search the e-mails.
• It allows concurrent access to multiple mailboxes on multiple mail
servers.
IMAP Commands
POP

• POP stands for Post Office Protocol. It is generally used to support a single
client. There are several versions of POP but the POP 3 is the current standard.

• POP3 stands for Post Office Protocol version 3. It has two Message Access
Agents (MAAs) where one is client MAA (Message Access Agent) and another
is server MAA(Message Access Agent) for accessing the messages from the
mailbox.

• This protocol helps us to retrieve and manage emails from the mailbox on the
receiver mail server to the receiver’s computer. This is implied between the
receiver and receiver mail server. It can also be called as one way client server
protocol.

• The POP3 Works on the 2 PORTS I.E. PORT 110 AND PORT 995.
• POP is an application layer internet standard protocol.
• Since POP supports offline access to the messages, thus
requires less internet usage time.
• POP does not allow search facility.
• In order to access the messaged, it is necessary to
download them.
• It allows only one mailbox to be created on server.
• It is not suitable for accessing non mail data.
• POP commands are generally abbreviated into codes of
three or four letters. Eg. STAT.
POP Commands
Comparison between POP and IMAP
MIME (Multipurpose Internet Mail
Extensions)
• It is widely used internet standard for coding binary files to send them
as e-mail attachments over the internet. MIME allows an E-mail
message to contain a non-ASCII file such as a video image or a sound
and it provides a mechanism to transfer a non text characters to text
characters.

• MIME was invented to overcome the following limitations of SMTP:


1. SMTP cannot transfer executable files and binary objects.
2. SMTP cannot transmit text data of other language, e.g. French,
Japanese, Chinese etc, as these are represented in 8-bit codes.
3. SMTP services may reject mails having size greater than a certain
size.
4. SMTP cannot handle non-textual data such as pictures, images, and
video/audio content.
The MIME specification includes the following elements:

1. Message header fields. Five message header fields are defined. These fields
provide information about the body of the message.
2. Content formats. A number of content formats are defined, thus standardizing
representations that support multimedia electronic mail.
3. Transfer encoding. Transfer encoding are defined that enable the conversion of
any content format into a form that is protected from alteration by the mail
system.

The MIME extensions are implemented as fields in the e-mail message header.
These fields are the following: Content type, Content transfer encoding method,
MME version number Content ID (optional), Content description (optional).
• MIME Header

• The five header fields defined in MIME are as follows:


• 1. MIME-version. It indicates the MIME version being used. The
current version is 1.1. It is represented as : MIME-version: 1.1.
• 2. Content-type. It describes the type and subtype of the data in the
body of the message. The content type and content subtype are
separated by slash. This field describes how the object in the body is
to be interpreted. The default value is plaintext in US ASCII. Content
type field is represented as:
• Context-type: <type/subtype; parameters>
• There are seven different types and fourteen sub-types of content.
The various content type are listed in the table below:
• 3. Content-transfer encoding. It describes how the object within
the body has been encoded to US ASCII to make it acceptable for
mail transfer. Thus it specifies the method used to encode the
message into 0s and 1s for transport.
• The content transfer encoding field is represented as :
• Content-transfer-encoding : <type>
• The various encoding methods used are given in the table below:
• 4. Content-Id. It is used to uniquely identify the MIME entities in
multiple contexts i.e. it uniquely identifies the whole message in a
multiple message environment. This field is represented as:
• Content-id : id = <content-id>
• 5. Content-description. It is a plaintext description of the object
within the body; It specifies whether the body is image, audio or
video. This field is represented as:
Content-description: <description>
The various fields in the MIME header are

You might also like