Uploaded by tlwijesingheooo

Fundamentals of internet

advertisement
Internet Fundamentals
1
Outline
In this lesson you will learn:
•
Evolution of Internet
•
How the internet works
•
Internet Protocol
•
Assigning IP addresses
•
Client Server Model
•
Domain Name System
•
Domain Name Extensions
•
URL
• Process of connecting to the
internet
• Internet connection from an ISP
• Modem
• Web browser
• Search engines
• Exchanging information using
internet
• Email
• Intranet/Extranet
• Proxy server
• Viruses
• firewall
2
Network of Networks
Worldwide system of interconnected
Computer networks which uses
a set of protocol
3
WWW
System of interconnected hypertext
document
Access via internet
(Repository of information link together
through pointers)
4
Evolution of Internet…
• The Department of Defense (DOD) and Advanced
Research Projects Agency (ARPA) developed the first
network, ARPANET.
• In the late 1980s, the U.S. National Science Foundation
(NSF) started exploring ways to enable access of their
supercomputer to researchers at various colleges and
universities.
• The NSF developed a network called the National
Science Foundation Network (NSFNET).
• The NSFNET combined together with millions of other
networks to form the network of networks - the Internet.
• The Internet is a vast interconnection of computers that
connects computers across the world.
5
Evolution of Internet…
• With the growing popularity of the Internet, Tim
Berners-Lee created the World Wide Web (WWW) in
1990 to introduce a user interface that would be
consistent across all platforms and could access
various document types.
• The WWW, popularly known as the Web, is a
storehouse of information. It is a collection of
several documents called Web pages, which are
interlinked with each other.
6
How the Internet works
• The Internet is based on a client-server model.
• In the client-server model:
– Each computer is identified by a unique Internet Protocol
(IP) address.
– Both the client and server computers agree on a common
protocol for communication.
• The following are the components for the effective
communication over the Internet:
– Internet Protocols
– Assigning IP Addresses
– The Client-Server Model
7
Internet Protocol
•
•
For effective communication, computers need to follow a set of rules
known as protocols.
Some of the Internet protocols are:
– Transmission Control Protocol (TCP) - Establishes a connection between
computers before the transmission of data. It breaks the data into small packets
and guarantees the transmission of data. TCP is a connection-oriented protocol.
– User Datagram Protocol (UDP) - Enables fast but unreliable connectionless data
transfers between the computers. UDP provides very few services for error recovery
and is used mainly for sending the messages to multiple recipients on a network.
– Internet Protocol (IP) - Routes data packets across the Internet. The process of
determining the correct path for data packets and transmitting them from one
network to another is called routing. IP can route data packets because every
network on the Internet has a unique network address. IP is a connectionless
protocol.
– Internet Control Message Protocol (ICMP) - Handles error and control messages.
– Hyper Text Transfer Protocol (HTTP) - Enables the exchange of information across
8
the Internet.
Internet Protocol…
– Simple Mail Transfer Protocol (SMTP) - Enables sending email messages on the Internet.
– Wireless Application Protocol (WAP) - Provides exchange of
information over wireless devices, such as mobile phones
and Personal Digital Assistants (PDAs).
– Internet Message Access Protocol (IMAP) - Enables access
to the e-mail messages kept on a mail server.
– The Multipurpose Internet Mail Extension (MIME) protocol Allows video, audio, and binary files to be sent along with
email. It is an extension of SMTP.
– Post Office Protocol (POP3) - Enables receiving e-mail
messages on the Internet.
9
Assigning IP addresses
• The Internet uses a unique number for every
computer on the network. This number is known as
the IP address.
• An IP address is a set of four numbers and is
referred to as adoted quad .
– Eg: 41.212.196.197
10
Client-Server Model
• In a Client-Server Model, a client computer requests for
information from another computer known as the server.
• The server accepts requests from the client and sends
the required information back to the client.
• The client software provides an interface that allows the
user to access information from the Web server, which is
known as a Web browser.
• The two technologies commonly followed in the clientserver model are:
– Pull Technology – Based on the traditional request/reply models.
– Push Technology - Set of technologies used to send information
to a client without the client requesting it.
11
Domain Name System
• A domain is a subset of the Internet, which groups
computers with similar IP addresses together.
• The domain names assigned to the computers can:
– Be up to 255 characters long.
– Have alphanumeric characters.
12
Domain Name Extensions
•The domain name extensions are used to specify
the country/region or the type of organization.
•The following table lists some of the domain
name extensions that determine the type of
organization using them:
–com - Used by commercial organizations.
–edu - Used by educational institutions and educational service
organizations.
–Gov - Used by government institutions or agencies.
–Mil - Used by military organizations.
–Net - Used by organizations that support networks on the Internet,
such as ISPs.
–Org - Used by nonprofit organizations.
–Int - Used by international organizations, such as the World Health
Organization (WHO).
13
The Uniform Resource Locator (URL)
• URI (Uniform Resource Identifier)
– A String of characters used to identify a name or resource.
• URL (Street Address)
– A string of characters that constitute a reference to
resource.
– Protocol://Host:Port/Path
• URN (Name of the person)
– A URI which uses theurn Scheme
– urn:issn:0167-6423
• The URN for the Science of Computer Programming (scientific
journal), identified by its serial number.
14
The process of connecting to the
Internet
• The two types of components required to connect to the Internet
are:
– Hardware components
– Software components
• The hardware components required are as follows:
– A computer
– Telephone connection or cable connection or An external or internal modem
• The software components required are follows:
–
–
–
–
An Internet connection
An operating system, such as Windows
TCP/IP-protocol
Web browser
• The prerequisites to connect to the Internet are:
– Internet connection from an Internet Service Provider (ISP)
– Modem
– Web browser and URL
15
Internet connection from an ISP
• An ISP is a company that provides Internet
connections.
• An ISP is connected in the following two ways:
– Dial-up connection – Using public switched telephone
network to establish a connection
– Direct connection – Connect two computers with a single
cable
16
Modem
• A modem is a hardware device known as ModulatorDemodulator.
• A modem:
– Converts the digital signals from the computer to analog
signals.
– Reconverts the analog signals from the telephone cables
to digital signals and passes the signals to the computer at
the destination end.
17
Web Browser
• A Web browser is a program that allows to view and
search for information on the WWW.
• The Web browser provides a GUI through which the
user interacts with the Web server.
• Types of Web Browsers are:
– Text Browsers
– Graphic browsers
• The popular Web browsers are:
– Mosaic
– Internet Explorer
– Netscape Navigator
– Mozilla
– Opera
18
Exchanging Information Using Internet
• The Internet enables people around the world to
share all types of information.
• The following methods are used to exchange
information on the Internet:
– FTP
– Newsgroups
– Telnet
– E-mail
19
Exchanging Information Using Internet
•
FTP
– FTP is a communication protocol used to send to or receive files from a
remote computer.
– In FTP, the transfer of files takes place between two computers, an FTP
client and an FTP server.
– Using FTP, both text and binary files can be transferred on the Internet.
•
Newsgroups
– A newsgroup is a collective term for a group that is involved in
conversation on a particular subject on the Internet.
– Some of the newsgroup categories are: biz, comp, news, rec, sci, soc, talk,
humanities, Misc
•
Telnet
– Terminal Network (Telnet) is a general-purpose client-server program.
– Telnet allows the user to access any application program on the server
computer.
– Telnet allows the user log on to the server computer to gather information.
20
, Return the result back to the client computer.
E-Mail
• Method of exchanging data or information from a sender
to one or more recipients.
• E-mail systems are based on store and forward model.
• E-mail was one of the first services provided by the
Internet.
• The following are the preconditions to send and receive emails:
– The e-mail address of the user
– The name of your outgoing (SMTP) mail server
– The e-mail address of the message recipient
– The incoming (POP3) mail server of the user
– The POP3 account name of the user
– The POP3 account password of the user
21
Search Engines
• How web search engine works?
– Web crawling with Crawler(Spider, Ant, Automatic indexer,
bot)
• Browse the WWW in a methodical, automated manner or in a orderly
fashion
• Analyze the content of the page
• Determine how it can be indexed
– Indexing
• Data are stored in index databases
– Ranking
• Provide the pieces of content that will best answer a searcher's
query, which means that results are ordered by most relevant to
least relevant.
Additional Reading
https://moz.com/beginners-guide-to-seo/how-search-engines-operate
22
Intranet
• Intranet is a private network that use TCP/IP
Protocol to share information, operating system,
all such resources within an organization.
• Benefits
–
–
–
–
–
Workforce productivity
Communication
Web publishing
Cost-Effective
Immediate updates
23
Extranet
• Extranet can be concerned as an extension for
the intranet, providing control access for the
outsiders.
• Benefits
– Can exchange large volume of data
– Share details and services
– Collaborations on joint development efforts
• Drawbacks
– Expensive
24
Proxy Server
• Proxy servers are software programs.
• Proxy servers act as an intermediary link between the
client, and the Web server.
• Proxy servers enable sharing of the same Internet
connection among multiple clients.
• The proxy servers mainly perform the following tasks:
– They hide the hosts on a network behind one computer.
– They have added the functions to filter URLs.
– They verify the contents of the data packets being transferred.
Additional Reading
https://www.varonis.com/blog/what-is-a-proxy-server/
25
Firewall
• A firewall is a security mechanism to protect the
data in a networked computer from the other
networks with which it interacts, such as the
Internet.
• A firewall can be:
– Hardware-based
– Software-based
Additional Reading
https://www.cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html
26
Viruses
• A virus is a destructive computer program.
• A virus infects computers by replicating itself and
spreading across the network.
• Viruses can easily hide within a computer by
attaching themselves to other files or programs
because they are small.
• Viruses normally either destroy data or affect the
functions of the software applications on a
computer.
• Anti-virus programs are used to monitor computers
for viruses.
• Anti-virus programs are software that can detect
and delete viruses from computers.
27
Download