PRINCIPLES OF INTERNET PPT
PRINCIPLES OF INTERNET PPT
UNIT I 09 Hrs.
Basics of Networks – Advantages and disadvantages- Types of networks - LAN, WAN, MAN - Topologies
of Networks – Bus Topology, Ring Topology, Star Topology, Mesh Topology, Tree
Topology.
UNIT II 06 Hrs.
Internet Basics – Advantages and disadvantages – Internet Applications – IP Address- Internet Services–
URL- E-mail - E-mail features – Emil Providers.
UNIT IV 09 Hrs.
WWW Overview – Web pages -The Web Servers – Web Browsers– Search Engines Introduction to
Firewalls – Uses of Firewalls – Types of Firewalls.
UNIT V 09 Hrs.
Art of creating a website – Hypertext and HTML – Features – Elements – Attributes- Structure of
HTML– Basic tags in HTML – Formatting tags in HTML – HTML Lists –Types of Lists.
Sandhya M
PRINCIPLES OF INTERNET
UNIT I
BASICS OF NETWORKS
Basics of Networks – Advantages and disadvantages- Types of networks - LAN, WAN, MAN -
Topologies of Networks – Bus Topology, Ring Topology, Star Topology, Mesh Topology,
Topology
NETWORK
A network consists of two or more computers that are linked in order to share resources (such
as printers and CDs), exchange files, or allow electronic communications.
A network is set of interconnected devices (sometime referred as nodes) which are used to
transmit data between them with agreed protocols.
COMMUNICATION
A Communication model is used to exchange data between two parties.
For example: communication between a computer, server and telephone (through modem).
Protocol It is set of rules that govern the data communication in a correct manner.
COMPUTER NETWORK
A computer network is a system in which multiple computers are connected to each other to share
information and resources.
The physical connection between networked computing devices is established using either cable
media or wireless media.
The best-known computer network is the Internet.
BASICS OF NETWORKS
A network is a collection of computers and devices that are connected together to enable
communication and data exchange.
TYPES OF NETWORKS
A computer network is a set of computers sharing resources located on or provided by network
nodes.
The computers use common communication protocols over digital interconnections to communicate
with each other.
Local Area Network (LAN)
It is also called LAN and designed for small physical areas such as an office, group of buildings
or a factory.
LANs are used widely as it is easy to design and to troubleshoot.
Personal computers and workstations are connected to each other through LANs.
We can use different types of topologies through LAN, these are Star, Ring, Bus, Tree etc.
LAN can be a simple network like connecting two computers, to share files and network among
each other while it can also be as complex as interconnecting an entire building.
LAN networks are also widely used to share resources like printers, shared hard-drive etc.
CHARACTERISTICS OF LAN
LAN's are private networks, not subject to tariffs or other regulatory controls.
LAN's operate at relatively high speed when compared to the typical WAN.
There are different types of Media Access Control methods in a LAN, the prominent ones are
Ethernet, Token ring.
It connects computers in a single building, block or campus, i.e. they work in a restricted
geographical area.
Applications of LAN
• One of the computer in a network can become a server serving all the remaining computers called
clients.
• Connecting Locally all the workstations in a building to let them communicate with each other
locally without any internet access.
• Sharing common resources like printers etc are some common applications of LAN.
METROPOLITAN AREA NETWORK (MAN)
It was developed in 1980s. It is basically a bigger version of LAN.
It is also called MAN and uses the similar technology as LAN.
It is designed to extend over the entire city. It can be means to connecting a number of LANs into
a larger network or it can be a single cable.
It is mainly hold and operated by single private company or a public company.
Characteristics of MAN
It generally covers towns and cities (50 km)
Communication medium used for MAN are optical fibers, cables etc.
Data rates adequate for distributed computing applications.
WIDE AREA NETWORK (WAN)
It is also called WAN. WAN can be private or it can be public leased network.
It is used for the network that covers large distance such as cover states of a country.
It is not easy to design and maintain.
Communication medium used by WAN are PSTN or Satellite links.
WAN operates on low data rates.
CHARACTERISTICS OF WAN
It generally covers large distances (states, countries, continents).
Communication medium used are satellite, public telephone networks which are connected by
routers.
TOPOLOGY
Topology refer to geometrical arrangement of components/ devices.
NETWORK TOPOLOGY
A network topology is the physical and logical arrangement of nodes and connections in a
network.
Nodes usually include devices such as switches, routers and software with switch and router
features.
Network topologies are often represented as a graph.
BUS TOPOLOGY
Bus topology is a network type in which every computer and network device is connected to single
cable.
When it has exactly two endpoints, then it is called Linear Bus topology.
RING TOPOLOGY
It is called ring topology because it forms a ring as each computer is connected to another computer,
with the last one connected to the first.
Exactly two neighbors for each device.
STAR TOPOLOGY
In this type of topology all the computers are connected to a single hub through a cable.
This hub is the central node and all others nodes are connected to the central node.
FEATURES OF STAR TOPOLOGY
1. Every node has its own dedicated connection to the hub.
2. Hub acts as a repeater for data flow.
3. Can be used with twisted pair, Optical Fibre or coaxial cable.
MESH TOPOLOGY
It is a point-to-point connection to other nodes or devices.
All the network nodes are connected to each other. Mesh has n(n-1)/2 physical channels to link n
devices.
There are two techniques to transmit data over the Mesh topology, they are:
1. Routing
2. Flooding
3. MESH Topology: Routing
In routing, the nodes have a routing logic, as per the network requirements. Like routing logic to
direct the data to reach the destination using the shortest distance. Or, routing logic which has information
about the broken links, and it avoids those node etc. We can even have routing logic, to re-configure the
failed nodes.
2. MESH Topology: Flooding
In flooding, the same data is transmitted to all the network nodes, hence no routing logic is
required. The network is robust, and the its very unlikely to lose the data. But it leads to unwanted load
over the network.
Types of Mesh Topology
1. Partial Mesh Topology : In this topology some of the systems are connected in the same fashion
as mesh topology but some devices are only connected to two or three devices.
2. Full Mesh Topology : Each and every nodes or devices are connected to each other.
TREE TOPOLOGY
It has a root node and all other nodes are connected to it forming a hierarchy. It is also called
hierarchical topology.
It should at least have three levels to the hierarchy.
HYBRID TOPOLOGY
It is two different types of topologies which is a mixture of two or more topologies.
For example if in an office in one department ring topology is used and in another star topology
is used, connecting these topologies will result in Hybrid Topology (ring topology and star
topology).
Advantages Disadvantages
1. Reliable as Error detecting and troubleshooting is easy 1. Complex in design.
2. Effective. 2. Costly.
3. Scalable as size can be increased easily.
4. Flexible.
PRINCIPLES OF INTERNET
PRINCIPLES OF INTERNET
UNIT II
INTERNET BASICS
Internet Basics – Advantages and disadvantages – Internet Applications – IP Address- Internet Serv
URL- E-mail - E-mail features – Emil Providers.
INTERNET
The Internet is a global network of computers that allows people to share information and
communicate with each other.
It is a vast network of networks that consists of private, public, academic, business, and government
networks of local to global scope, linked by a broad array of electronic, wireless, and optical
networking technologies. ( The Internet is a vast network that connects computers all over the
world.)
The Internet was originally developed by the United States Department of Defense in the 1960s as
a way to connect computers at different universities and research institutions.
It was not until the 1990s that the Internet became widely available to the public.
Internet is a powerful tool that can be used for good or bad.
INTERNET BASICS
1. Internet Protocol (IP): The Internet Protocol (IP) is a set of rules that govern how data is
transmitted over the Internet. IP addresses are used to uniquely identify devices on the Internet.
2. Domain Name System (DNS): The Domain Name System (DNS) is a system that translates
domain names into IP addresses. This allows us to use human-readable names, such as
www.google.com, to access websites.
3. Web browser: A web browser is a software application that allows us to view websites. The most
popular web browsers are Google Chrome, Mozilla Firefox, and Microsoft Edge.
4. Hypertext Transfer Protocol (HTTP): The Hypertext Transfer Protocol (HTTP) is a set of rules
that govern how data is transferred between web browsers and web servers. HTTP is used to transfer
web pages, images, and other files over the Internet.
5. World Wide Web (WWW): The World Wide Web (WWW) is a system of interlinked hypertext
documents that are accessed via the Internet. The WWW is the most popular way to access
information on the Internet.
To connect to the Internet, you need a computer, an Internet service provider (ISP), and a modem. A modem
is a device that converts digital signals from your computer into analog signals that can be transmitted over
the Internet.
PRINCIPLES OF INTERNET
ADVANTAGES
1. Communication:
The internet allows us to communicate with people all over the world, regardless of their
location.
We can use email, instant messaging, social media, and video conferencing to stay in touch
with friends and family, collaborate on projects, and conduct business.
2. Access to information:
The internet is a vast resource of information.
We can use it to research anything from history to current events to science to hobbies.
We can also use it to access educational materials, government documents, and medical
information.
3. Entertainment:
The internet offers a wide variety of entertainment options, including movies, TV shows,
music, games, and books.
We can also use the internet to listen to radio stations, watch live streaming events, and
participate in online communities.
4. Business:
The internet has revolutionized the way businesses operate.
Businesses can use the internet to reach a global audience, sell products and services online,
and collaborate with partners.
The internet has also created new opportunities for businesses, such as e-commerce and
cloud computing.
DISADVANTAGES
1. Cyberbullying:
Cyberbullying is the use of electronic communication to bully a person, typically by sending
messages of an intimidating or threatening nature.
Cyberbullying can have a serious impact on the victim's mental health and well-being.
2. Online scams:
Online scams are fraudulent schemes that are carried out over the internet.
Online scams can take many different forms, such as phishing emails, fake websites, and
phone calls.
Online scams can result in financial losses and identity theft.
3. Identity theft:
Identity theft is the crime of stealing someone's personal information, such as their name,
Social Security number, and credit card number.
Identity thieves can use this information to commit fraud and financial crimes.
4. Addiction:
The internet can be addictive.
PRINCIPLES OF INTERNET
People who are addicted to the internet may spend excessive amounts of time online,
neglecting their work, school, relationships, and health.
5. Lack of privacy:
The internet is not a private place.
When you use the internet, your activities can be tracked by websites, advertisers, and
government agencies.
This lack of privacy can be a concern for some people.
The internet has many advantages, but it also has some disadvantages. It is important to be aware of both
the benefits and risks of using the internet so that you can use it safely and responsibly.
APPLICATIONS
The internet has many applications, but some of the most common include:
1. Communication:
The internet allows us to communicate with people all over the world, regardless of their
location.
We can use email, instant messaging, social media, and video conferencing to stay in touch
with friends and family, collaborate on projects, and conduct business.
2. Access to information:
The internet is a vast resource of information.
We can use it to research anything from history to current events to science to hobbies.
We can also use it to access educational materials, government documents, and medical
information.
3. Entertainment:
The internet offers a wide variety of entertainment options, including movies, TV shows,
music, games, and books.
We can also use the internet to listen to radio stations, watch live streaming events, and
participate in online communities.
4. Business:
The internet has revolutionized the way businesses operate.
Businesses can use the internet to reach a global audience, sell products and services online,
and collaborate with partners.
The internet has also created new opportunities for businesses, such as e-commerce and
cloud computing.
5. Education:
The internet can be a powerful tool for education.
Students can use the internet to access educational materials, collaborate with other students,
and take online courses.
The internet can also be used to provide professional development for teachers and other
educators.
PRINCIPLES OF INTERNET
6. Government:
The internet can be used to provide government services to citizens.
Citizens can use the internet to pay their taxes, apply for permits, and access government
information.
The internet can also be used to facilitate communication between government agencies and
citizens.
7. Healthcare:
The internet can be used to provide healthcare services to patients.
Patients can use the internet to access medical information, schedule appointments, and
communicate with their doctors.
The internet can also be used to provide telemedicine services, which allow patients to see
doctors remotely.
8. Transportation:
The internet can be used to book flights, hotels, and rental cars.
The internet can also be used to track the status of flights and to get real-time traffic
information.
9. Finance:
The internet can be used to bank online, invest in stocks and bonds, and shop for financial
products.
The internet can also be used to get real-time financial information, such as stock quotes
and currency exchange rates.
ARPANET
ARPANET was the first wide-area packet-switched network with distributed control.
It was developed by the United States Department of Defense's Advanced Research Projects
Agency (ARPA) in the late 1960s.
The goal of ARPANET was to create a resilient network that could survive a nuclear attack.
ARPANET was based on the idea of packet switching, which breaks data into small chunks called
packets.
IP ADDRESS
An IP address is a unique address that identifies a device on the internet or a local network.
IP stands for "Internet Protocol," which is the set of rules governing the format of data sent via the
internet or local network.
IP addresses provide a way of doing so and form an essential part of how the internet works
IP USAGE
Used to connect to another computer
Allow to transfer of file and email
PRINCIPLES OF INTERNET
IP structure
IP addresses consist of four sections
Each section is 8 bits long
Each section can range from 0 to 255
Written example, 128.35.0.72
IP versions
IPv4: 32-bit* number: Written in Dotted Decimal Notation
205.150.58.7 (4 billion different host addresses)
IPv6: 128-bit* number: Written in Hex Decimal Notation
2001:0503:0C27:0000:0000:0000:0000:0000 (16 billion network addresses)
Types of IP address
Static IP address
Manually input by network administrator
Manageable for small networks
Requires careful checks to avoid duplication
Dynamic IP address
Examples - BOOTP, DHCP
Assigned by server when host boots
Derived automatically from a range of addresses
Duration of 'lease' negotiated, then address released back to server
INTERNET SERVICES
Internet services are the services that are provided to users over the internet.
They can be divided into two main categories:
1. Communication services: These services allow users to communicate with each other.
They include email, instant messaging, voice over IP (VoIP), and social media.
PRINCIPLES OF INTERNET
2. Content services: These services allow users to access and use content.
They include web browsing, file sharing, streaming media, and online gaming.
The most popular internet services:
1. Email:
Email is a service that allows users to send and receive electronic messages. It is one of
the most popular internet services, and it is used by billions of people around the world.
2. Instant messaging:
Instant messaging is a service that allows users to communicate with each other in real time.
It is a popular way to stay in touch with friends and family, and it is also used by businesses
for communication with customers and employees.
4. Social media:
Social media is a service that allows users to connect with friends and family, and to
share content. It is one of the most popular internet services, and it is used by billions
of people around the world.
5. Web browsing:
Web browsing is a service that allows users to access and view websites. It is the
most popular internet service, and it is used by billions of people around the world to
access information, shop, and entertain themselves.
6. File sharing:
File sharing is a service that allows users to share files with each other. It is a popular
way to share music, movies, and other content.
PRINCIPLES OF INTERNET
7. Streaming media:
Streaming media is a service that allows users to watch or listen to audio or video
content without having to download it first. It is a popular way to watch movies, TV
shows, and music videos.
8. Online gaming:
Online gaming is a service that allows users to play games with each other over the
internet. It is a popular way to socialize and compete with others.
URL
Every time you click a link on a website or type a web address into your browser, it’s a URL.
URL stands for Uniform Resource Locator.
Think of it like a street address, with each portion of the URL as different parts of the address, and each
giving you different information.
Let’s examine each component of a URL and what we can learn from it.
SCHEME
Every URL begins with the scheme. This tells
your browser what type of address it is so the
browser connects to it correctly.
There are many types of schemes, but for typical
web browsing you will mostly see http and https.
The scheme is still always part of the URL; it just
isn’t being displayed.
DOMAIN NAME
The domain name is the most
prominent part of a web address.
Typically, different pages on the same
site will continue to use the
same domain name.
PRINCIPLES OF INTERNET
FILE PATH
The file path—often just called the path—
tells your browser to load a specific page.
If you don’t specify a path and only
enter a domain name, your browser is
still loading a specific page; it’s just
loading a default page, which usually
will help you navigate to other pages.
PARAMETERS
Some URLs include a string of characters after
the path—beginning with a question mark—
called the parameter string.
You have probably noticed this part of
a URL appear in your address bar after
performing a search on Google or YouTube.
The parameter string can be clear or confusing to a human user, but it is critical information for the server.
Anchor
Also appearing after the path,
the anchor tells your browser to
scroll to or load a specific part of
the page. Usually
the anchor begins with a
hashtag and is used to direct your
browser to a specific part of a
very long page.
A whole URL
When combined, these elements make up a URL, although not all URLs will have all five parts.
PRINCIPLES OF INTERNET
Keep in mind that these are the most common components of a URL. There are many other parts, but these
are the five you will see most often and that can usually give you the most information.
E-mail
Electronic mail, commonly shortened to email or e-mail, is a method of exchanging digital messages
over a computer network.
Email, short for electronic mail, is a widely used method of sending and receiving digital messages
over the internet.
E-MAIL FEATURES
1. Composing and Sending:
Email platforms allow users to compose new messages, specifying recipients, subject lines,
and the main body of the email.
Users can send the message once it's ready.
2. Attachments:
Emails support attaching files such as documents, images, or videos to the message.
Attachments can be included to share additional information or collaborate on projects.
3. Forwarding and Replying:
Users can forward received emails to other recipients, allowing them to share the content
easily.
Reply options include replying directly to the sender or replying to all recipients of the
original email.
4. Inbox Organization:
Email platforms offer features to manage and organize incoming messages.
Users can create folders or labels to categorize emails, making it easier to find and reference
specific messages later.
PRINCIPLES OF INTERNET
5. Search Functionality:
With an extensive search feature, users can find specific emails by searching for keywords,
sender names, subject lines, or other criteria.
This is particularly useful when dealing with a large volume of emails.
6. Spam Filtering:
Email services incorporate spam filters to automatically detect and divert unwanted or
unsolicited messages into a separate spam folder.
This helps keep the inbox clean and reduces the chances of falling for phishing or scam
attempts.
7. Autoresponders:
Autoresponders allow users to set up automatic replies when they are away or unable to
respond to emails immediately.
This feature is commonly used to inform senders about one's unavailability and provide
alternative contact information if necessary.
8. Read Receipts:
Some email clients offer read receipts, which notify the sender when their email has been
opened or read by the recipient.
This feature can be helpful for tracking important or time-sensitive messages.
9. Signature:
Users can create an email signature containing their name, contact information, job title, or
any other relevant details.
Signatures are usually appended automatically to outgoing emails, providing a professional
touch.
EMAIL PROVIDERS
There are numerous email service providers available, each offering its own set of features and
functionality
The most popular email providers:
1. Gmail: Gmail is a free email service offered by Google. It is one of the most
popular email providers in the world, with over 1.5 billion active users.
Gmail offers a wide range of features, including spam filtering, phishing
protection, and a large storage capacity.
UNIT III
INTRODUCTION TO INTERNET PROTOCOL
Introduction to Internet Protocol –TCP –UDP-FTP – The Telnet –The Usenet – Internet Chat.
Features of TCP
TCP keeps track of the segments being transmitted or received by assigning numbers to every single
one of them.
Flow control limits the rate at which a sender transfers data. This is done to ensure reliable delivery.
TCP implements an error control mechanism for reliable data transfer.
TCP takes into account the level of congestion in the network.
Features of UDP
Used for simple request-response communication when the size of data is less and hence there is
lesser concern about flow and error control.
It is a suitable protocol for multicasting as UDP supports packet switching.
UDP is used for some routing update protocols like RIP(Routing Information Protocol).
Normally used for real-time applications which can not tolerate uneven delays between sections of
a received message.
Components:
FTP consists of two main components:
The control connection: The control connection is used to establish a connection between the two
computers and to exchange control information.
The data connection: The data connection is used to transfer the actual files.
Popular FTP clients:
There are many FTP clients available, including FileZilla, WinSCP, and Cyberduck.
Benefits of FTP:
FTP is a reliable protocol that guarantees that all files will be transferred correctly.
FTP is also a versatile protocol that can be used to transfer files between any two computers that
are connected to a network.
Drawbacks of FTP:
FTP is not a secure protocol, as passwords and other sensitive information can be intercepted.
FTP can also be a source of spam and phishing attacks.
TELNET
Telnet (short for "teletype network") is a network protocol that allows users to connect to a remote
computer and interact with it as if they were sitting at the keyboard.
History: Telnet was developed in the 1960s and was originally used to connect to mainframe
computers. It is still in use today, but it is not as common as it once was.
PRINCIPLES OF INTERNET
Purpose: The purpose of Telnet is to provide a way for users to interact with a remote computer.
This can be useful for troubleshooting problems, accessing files, or running programs on a remote
computer.
How it works: When a user connects to a remote computer using Telnet, they are essentially
creating a virtual terminal on their own computer. This virtual terminal allows the user to type
commands and interact with the remote computer as if they were sitting at the keyboard.
Security: Telnet is not a secure protocol, as passwords and other sensitive information can be
intercepted. For this reason, Telnet is not recommended for use over an unsecured network.
Alternatives: There are a number of alternatives to Telnet, including SSH (Secure Shell) and
Rlogin. SSH is a more secure protocol than Telnet, and it is the preferred method for connecting to
remote computers over an unsecured network. Rlogin is a similar protocol to Telnet, but it is not as
widely used.
USENET
Usenet is a worldwide distributed discussion system that consists of a set of newsgroups that are
organized by topic.
UseNet is the contraction of the User Network.
It resembles just a Bulletin Board System where users can post articles or posts on various topics.
The Usenet of newsgroups is hierarchical and, similar to the Domain Name System (DNS)
Purpose: The purpose of Usenet is to provide a way for users to discuss topics of interest with other
users. This can be done by posting messages to newsgroups, which are like online forums.
How it works: Usenet is a distributed system, which means that there is no central server. Instead,
newsgroups are stored on a network of servers called news servers. When a user posts a message
to a newsgroup, it is copied to all of the news servers that carry that newsgroup.
Benefits of Usenet: Usenet is a free service that allows users to discuss topics of interest with other
users. It is also a relatively anonymous service, which can be appealing to some users.
Drawbacks of Usenet: Usenet can be a noisy place, as there is a lot of spam and low-quality
content. It can also be difficult to find the information that you are looking for, as there are so many
newsgroups.
PRINCIPLES OF INTERNET
INTERNET CHAT
Internet chat is a real-time communication between two or more people using computers.
It is a form of online communication that allows users to exchange text messages in real time.
Purpose: The purpose of internet chat is to provide a way for users to communicate with each other
in real time. This can be used for a variety of purposes, such as: Socializing etc
How it works: Internet chat works by sending text messages between two or more computers. The
messages are sent over the internet and are delivered to the recipient's computer in real time.
Types of internet chat: There are two main types of internet chat:
Instant messaging: Instant messaging (IM) is a type of chat that allows users to communicate
with each other in real time. IM is typically used one-on-one, but it can also be used in group
chats.
Web chat: Web chat is a type of chat that allows users to communicate with each other through
a website. Web chat is typically used in chat rooms, which are online forums where users can
chat with each other.
Drawbacks of internet chat: Internet chat also has some drawbacks, including:
Security: Chat can be insecure, as messages can be intercepted by unauthorized people.
Spam: Chat can be a source of spam.
Addiction: Chat can be addictive.
PRINCIPLES OF INTERNET
UNIT IV
WWW OVERVIEW
WWW Overview – Web pages -The Web Servers – Web Browsers– Search Engines
Introduction to Firewalls – Uses of Firewalls – Types of Firewalls.
WEB PAGE
A document which can be displayed in a web browser such as Firefox, Google Chrome, Opera,
Microsoft Internet Explorer or Edge, or Apple's Safari.
These are also often called just "pages."
A web page is a resource of information that is suitable for the World Wide Web and can be accessed
through a web browser..
This information is usually in HTML or XHTML format and may provide navigation to other web
pages via hypertext links.
Web Pages may be retrieved from a local computer or from a remote web server.
The web server may restrict access only to a private network, e.g. a corporate intranet or it may
publish pages on the World Wide Web.
WEB SERVERS
A web server is a computer program that accepts and responds to requests from clients.
These requests are typically made using the Hypertext Transfer Protocol (HTTP), which is the
standard protocol for exchanging data on the World Wide Web.
Web servers are an essential part of the World Wide Web.
PRINCIPLES OF INTERNET
They allow us to access and view web pages from all over the world.
Web servers are also used for a variety of other purposes, such as hosting email servers and file
sharing services.
WEB BROWSERS
They are called browsers because they allow the user to browse the resources available on servers.
Mosaic was the first browser with a graphical user interface.
A browser is a client on the Web because it initiates the communication with a server, which waits
for a request from the client before doing anything.
In the simplest case, a browser requests a static document from a server.
Sometimes a browser directly requests the execution of a program
stored on the server.
The output of the program is then returned to the browser.
Examples: Internet Explorer, Mozilla Firefox, Netscape Navigator, Google
Chrome, Opera etc.,
PRINCIPLES OF INTERNET
SEARCH ENGINE
A search engine is software accessed on the Internet that searches a database of information
according to the user's query.
Search engines are normally accessed through a web browser (e.g. you can perform search engine
searches directly in the address bar of Firefox, Chrome, etc.) or through a web page
There are many different search engines you can use, but some of the
most popular include Google, Yahoo!, and Bing. To perform a
search, you'll need to navigate to a search engine in your web browser,
type one or more keywords—also known as search terms—then
press Enter on your keyboard. In this example, we'll search
for recipes.
Search suggestions
If you don't find what you're looking for on the
first try, don't worry! Search engines are good at
finding things online, but they're not perfect.
You'll often need to try different search
terms to find what you're looking for.
You can use the extra search tools to narrow down your results even more. These tools will
change based on the type of content you're looking for, but in this example we can filter our
images by size, color, image type, and more. So if you wanted to find cookies with pink frosting,
you could search for images that are mostly pink.
PRINCIPLES OF INTERNET
Content-specific searches
There may be times when you're
looking for something more specific,
like a news article, picture, or video.
Most search engines have links at the
top of the page that allow you to
perform these unique searches.
INTRODUCTION TO FIREWALLS
A firewall is a network security device that monitors and controls incoming and outgoing
network traffic.
Firewalls are used to protect networks from unauthorized access, malicious traffic, and other
threats.
Firewalls work by filtering network traffic based on a set of rules.
These rules can be configured to allow or block traffic based on the source and destination IP
addresses, ports, protocols, and other criteria.
Firewalls can be implemented as hardware devices, software applications, or a combination of both.
Hardware firewalls are typically more expensive than software firewalls, but they offer better
performance and security.
Software firewalls are typically easier to configure and manage than hardware firewalls, but
they may not offer the same level of performance and security.
Uses of Firewalls
Firewalls are used to protect networks from a variety of threats, including:
Unauthorized access: Firewalls can be used to prevent unauthorized users from accessing a
network. This can be done by blocking traffic from unauthorized IP addresses or by requiring
users to authenticate before they are allowed to access the network.
Malicious traffic: Firewalls can be used to block malicious traffic, such as viruses, worms, and
Trojan horses. This can be done by filtering traffic based on the contents of packets or by using
signature-based detection.
Other threats: Firewalls can also be used to protect networks from other threats, such as denial-
of-service attacks and distributed denial-of-service attacks.
PRINCIPLES OF INTERNET
Types of Firewalls
There are two main types of firewalls: packet-filtering firewalls and stateful inspection firewalls.
Packet-filtering firewalls are the most basic type of firewall. They work by inspecting the
headers of network packets and filtering traffic based on the source and destination IP addresses,
ports, and protocols.
Stateful inspection firewalls are more advanced than packet-filtering firewalls. They track the
state of network connections and filter traffic based on the state of the connection. This makes
stateful inspection firewalls more effective at blocking malicious traffic.
Application-level firewalls filter traffic based on the application layer of the OSI model. This
makes application-level firewalls more effective at blocking malicious traffic that is specifically
designed to exploit vulnerabilities in specific applications.
PRINCIPLES OF INTERNET
UNIT V
ART OF CREATING A WEBSITE
Art of creating a website – Hypertext and HTML – Features – Elements – Attributes- Structure of
HTML– Basic tags in HTML – Formatting tags in HTML – HTML Lists –Types of Lists.
The process of creating a website can be broken down into the following steps:
1. Plan your website
2. Design your website
3. Develop your website
4. Market your website
5. Track your website analytics
Features
It is easy to learn and easy to use.
It is platform-independent.
Images, videos, and audio can be added to a web page.
Hypertext can be added to the text.
It is a markup language.
Elements
Elements are the basic units of structure in HTML.
They are used to define the content and layout of a web page.
Elements are made up of a start tag, an end tag, and the content between the tags.
Attributes
Attributes are additional pieces of information that can be added to an element.
They are specified in the start tag of an element, and they provide additional information
about the element.
For example, the href attribute of the <a> element specifies the URL of the link.
HTML Tags
HTML markup tags are usually called HTML tags.
These tags are keywords (tag name) surrounded by angle braces like <Tag Name>.
The first pair of tags is the start tag and the second tag is the end tag.
End tag contains a forward slash before the tag name.
Start tag and end tag are also called opening tags and closing tags.
Except few tags, most of the tags have their corresponding closing tags.
For example <html> has its closing tag </html> and <body> tag has its closing tag </body> tag.
Tags Description
<!DOCTYPE The <!DOCTYPE html> declaration defines that this document is an HTML5
html> document
This tag encloses the complete HTML document and mainly comprises
of document header which is represented by <head>...</head> and
<html>
document body which is represented by <body>...</body> tags.
This tag represents the document's header which can keep other HTML
<head> tags like <title>, <link> etc.
The <title> tag is used inside the <head> tag to mention the document
<title> title.
This tag represents the document's body which keeps other HTML tags
<body> like <h1>, <div>, <p>
Here is an example of an HTML document that uses all three types of lists:
<!DOCTYPE html>
<html>
<head>
<title>My First HTML Document</title>
</head>
<body>
<h1>My First HTML Document</h1>
<ol>
<li>This is the first item in the ordered list.</li>
<li>This is the second item in the ordered list.</li>
<li>This is the third item in the ordered list.</li>
</ol>
<ul>
<li>This is the first item in the unordered list.</li>
<li>This is the second item in the unordered list.</li>
<li>This is the third item in the unordered list.</li>
</ul>
<dl>
<dt>Term 1</dt>
<dd>This is the definition of term 1.</dd>
<dt>Term 2</dt>
<dd>This is the definition of term 2.</dd>
<dt>Term 3</dt>
<dd>This is the definition of term 3.</dd>
</dl>
</body>
</html>