Basic Internet & Protocols
Basic Internet & Protocols
• Cashless transactions: All the merchandising companies are offering services to their
customers to pay the bills of the products online via various digital payment apps like Paytm,
Google pay, etc.
• Education: It is the internet facility that provides a whole bunch of educational material to
everyone through any server across the web. Those who are unable to attend physical classes
can choose any course from the internet and can have the point-to-point knowledge of it just
by sitting at home.
• Social Networking: The purpose of social networking sites and apps is to connect people all
over the world. With the help of social networking sites, we can talk, share videos, images with
our loved ones when they are far away from us. Also, we can create groups for discussion or for
meetings.
• Entertainment: The Internet is also used for entertainment. There are numerous
entertainment options available on the internet like watching movies, playing games, listening
to music, etc. You can also download movies, games, songs, TV Serial, etc., easily from the
internet.
Advantages of the Internet
• Online Banking and Transaction: The Internet allows us to transfer money online by
the net banking system. Money can be credited or Debited from one account to the
other.
• Education, online jobs: Through the Internet, we are able to get more jobs via online
platforms like Linkedin and to reach more job providers
• Entertainment: There are numerous options of entertainment online we can listen to
music, play games can watch movies, web series, youtube itself is a hub of knowledge
as well as entertainment.
• New Job roles: The Internet has given us access to social media, and digital products so
we are having numerous new job opportunities like digital marketing and social media
marketing online businesses are earning huge amounts of money just because the
internet being the medium to help us to do so.
• Best Communication Medium: The communication barrier has been removed from the
Internet. You can send messages via email, Whatsapp, and Facebook. Voice chatting
and video conferencing are also available to help you to do important meetings online.
• Comfort to humans: Without putting any physical effort you can do so many things like
shopping online it can be anything from stationeries to clothes, books to personal
items, etc. You can books train and plane tickets online.
• GPS Tracking and google maps: Yet another advantage of the internet is that you are
able to find any road in any direction, areas with less traffic with the help of GPS in your
mobile.
Disadvantages of the Internet
• Time wastage: Wasting too much time on the internet surfing on social media apps and
doing nothing decreases your productivity rather than wasting time on scrolling social
media apps one should utilize that time in doing something skillful and even more
productive.
• Bad impacts on health: Spending too much time on the internet causes bad impacts on
your health physical body needs some outdoor games exercise and many more things.
Looking at the screen for a longer duration causes serious impacts on the eyes.
• Cyber Crimes: Cyberbullying, spam, viruses, hacking, and stealing data are some of the
crimes which are on the verge these days. Your system which contains all the confidential
data can be easily hacked by cybercriminals.
• Effects on children: Small children are heavily addicted to the Internet watching movies,
games all the time is not good for their overall personality as well as social development.
• Bullying and spreading negativity: The Internet has given a free tool in the form of social
media apps to all those people who always try to spread negativity with very revolting
and shameful messages and try to bully each other which is wrong.
What is DNS?
• The TLD appears after the period in the domain name. Examples
of top-level domains include .com, .org and .edu, but there are
many others. Some may denote a country code or geographic
location, such as .us for the United States or .ca for Canada.
• In order to make it reliable, it must be paired with reliable protocol such as TCP at
the transport layer. Internet protocol transmits the data in form of a datagram as
shown in the following diagram:
• The length of datagram is variable.
• The Datagram is divided into two
parts: header and data.
• The length of header is 20 to 60 bytes.
• The header contains information for routing
and delivery of the packet.
Transmission Control Protocol (TCP)
• Reliable Service
• For sake of reliability, TCP uses acknowledgement mechanism
User Datagram Protocol (UDP)
• UDP provides protocol port used i.e. UDP message contains both source
and destination port number, that makes it possible for UDP software at
the destination to deliver the message to correct application program.
File Transfer Protocol (FTP)
• Trivial File Transfer Protocol is also used to transfer the files but it transfers
the files without authentication. Unlike FTP, TFTP does not separate control
and data information. Since there is no authentication exists, TFTP lacks in
security features therefore it is not recommended to use TFTP.
• Key points
• TFTP makes use of UDP for data transport. Each TFTP message is carried in
separate UDP datagram.
• The first two bytes of a TFTP message specify the type of message.
• The TFTP session is initiated when a TFTP client sends a request to upload
or download a file.
• The request is sent from an ephemeral UDP port to the UDP port 69 of an
TFTP server.
Difference between FTP and TFTP
Telnet
• TELNET is a standard TCP/IP protocol used for virtual terminal service given
by ISO. This enables one local machine to connect with another. The
computer which is being connected is called a remote computer and which
is connecting is called the local computer.
• And, it also defines the various actions the web browsers should take in
response to the calls made to access a particular web page. Whenever a
user opens their web browser, the user will indirectly use HTTP as this is the
protocol that is being used to share text, images, and other multimedia files
on the World Wide Web.
• HTTP Response
• HTTP response contains:
– Status line
– Headers
– Message body
HTTPS (HyperText Transfer Protocol Secure)
• SMTP
• SMTP stands for Simple Mail Transfer Protocol. It was first proposed in 1982. It
is a standard protocol used for sending e-mail efficiently and reliably over the
internet.
• These protocols are important for sending and distributing outgoing emails. This
protocol uses the header of the mail to get the email id of the receiver and
enters the mail into the queue of outgoing mails.
• And as soon as, it delivers the mail to the receiving email id, it removes the
email from the outgoing list. The message or the electronic mail may consider of
text, video, image etc. It helps in setting up of some communication server rules.
• SMTP is application level protocol.
• SMTP is connection oriented protocol.
• SMTP is text based protocol.
• It handles exchange of messages between e-mail servers over TCP/IP
network.
• Apart from transferring e-mail, SMTP also provides notification regarding
incoming mail.
• When you send e-mail, your e-mail client sends it to your e-mail server
which further contacts the recipient mail server using SMTP client.
• These SMTP commands specify the sender’s and receiver’s e-mail
address, along with the message to be send.
• The exchange of commands between servers is carried out without
intervention of any user.
• In case, message cannot be delivered, an error report is sent to the
sender which makes SMTP a reliable protocol.
SMTP Commands
IMAP
• IMAP stands for Internet Message Access Protocol. It was first proposed
in 1986. There exist five versions of IMAP as follows:
– Original IMAP
– IMAP2
– IMAP3
– IMAP2bis
– IMAP4
• IMAP allows the client program to manipulate the e-mail message on the
server without downloading them on the local computer.
• The e-mail is hold and maintained by the remote server.
• It enables us to take any action such as downloading, delete the mail
without reading the mail. It enables us to create, manipulate and delete
remote message folders called mail boxes.
• IMAP enables the users to search the e-mails.
• It allows concurrent access to multiple mailboxes on multiple mail
servers.
IMAP Commands
POP
• POP stands for Post Office Protocol. It is generally used to support a single
client. There are several versions of POP but the POP 3 is the current standard.
• POP3 stands for Post Office Protocol version 3. It has two Message Access
Agents (MAAs) where one is client MAA (Message Access Agent) and another
is server MAA(Message Access Agent) for accessing the messages from the
mailbox.
• This protocol helps us to retrieve and manage emails from the mailbox on the
receiver mail server to the receiver’s computer. This is implied between the
receiver and receiver mail server. It can also be called as one way client server
protocol.
• The POP3 Works on the 2 PORTS I.E. PORT 110 AND PORT 995.
• POP is an application layer internet standard protocol.
• Since POP supports offline access to the messages, thus
requires less internet usage time.
• POP does not allow search facility.
• In order to access the messaged, it is necessary to
download them.
• It allows only one mailbox to be created on server.
• It is not suitable for accessing non mail data.
• POP commands are generally abbreviated into codes of
three or four letters. Eg. STAT.
POP Commands
Comparison between POP and IMAP
MIME (Multipurpose Internet Mail
Extensions)
• It is widely used internet standard for coding binary files to send them
as e-mail attachments over the internet. MIME allows an E-mail
message to contain a non-ASCII file such as a video image or a sound
and it provides a mechanism to transfer a non text characters to text
characters.
1. Message header fields. Five message header fields are defined. These fields
provide information about the body of the message.
2. Content formats. A number of content formats are defined, thus standardizing
representations that support multimedia electronic mail.
3. Transfer encoding. Transfer encoding are defined that enable the conversion of
any content format into a form that is protected from alteration by the mail
system.
The MIME extensions are implemented as fields in the e-mail message header.
These fields are the following: Content type, Content transfer encoding method,
MME version number Content ID (optional), Content description (optional).
• MIME Header