0% found this document useful (0 votes)
30 views41 pages

PRINCIPLES OF INTERNET PPT

FULL NOTES AND PPT

Uploaded by

rupasandhyam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views41 pages

PRINCIPLES OF INTERNET PPT

FULL NOTES AND PPT

Uploaded by

rupasandhyam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 41

UNITED INTERNATIONAL BUSINESS SCHOOL PRINCIPLES OF INTERNET

Course Title: PRINCIPLES OF INTERNET


Formative Assessment marks: 40 marks
Summative Assessment Marks: 60 marks

UNIT I 09 Hrs.
Basics of Networks – Advantages and disadvantages- Types of networks - LAN, WAN, MAN - Topologies
of Networks – Bus Topology, Ring Topology, Star Topology, Mesh Topology, Tree
Topology.

UNIT II 06 Hrs.
Internet Basics – Advantages and disadvantages – Internet Applications – IP Address- Internet Services–
URL- E-mail - E-mail features – Emil Providers.

UNIT III 09 Hrs.


Introduction to Internet Protocol –TCP –UDP-FTP – The Telnet –The Usenet – Internet Chat.

UNIT IV 09 Hrs.
WWW Overview – Web pages -The Web Servers – Web Browsers– Search Engines Introduction to
Firewalls – Uses of Firewalls – Types of Firewalls.

UNIT V 09 Hrs.
Art of creating a website – Hypertext and HTML – Features – Elements – Attributes- Structure of
HTML– Basic tags in HTML – Formatting tags in HTML – HTML Lists –Types of Lists.

Sandhya M
PRINCIPLES OF INTERNET

UNIT I
BASICS OF NETWORKS
Basics of Networks – Advantages and disadvantages- Types of networks - LAN, WAN, MAN -
Topologies of Networks – Bus Topology, Ring Topology, Star Topology, Mesh Topology,
Topology

NETWORK
 A network consists of two or more computers that are linked in order to share resources (such
as printers and CDs), exchange files, or allow electronic communications.
 A network is set of interconnected devices (sometime referred as nodes) which are used to
transmit data between them with agreed protocols.

COMMUNICATION
 A Communication model is used to exchange data between two parties.
For example: communication between a computer, server and telephone (through modem).

BASIC COMPONENTS OF COMMUNICATION

It is the primary part of the communication system.


Data/Message The information is communicated between the source and destination is
data/message.
Source The source is a device which generates and sends the data to the destination.

Destination It is a device that receives the data.


It acts as carrier to carry the data from the source to the destination.
Medium The carrier provides the path through wire or wireless.

Protocol It is set of rules that govern the data communication in a correct manner.
COMPUTER NETWORK
 A computer network is a system in which multiple computers are connected to each other to share
information and resources.
 The physical connection between networked computing devices is established using either cable
media or wireless media.
 The best-known computer network is the Internet.

BASICS OF NETWORKS
 A network is a collection of computers and devices that are connected together to enable
communication and data exchange.

The four basic components of a network are:


 Computers: The devices that are connected to the network.
 Transmission medium: The physical medium that carries the data between the devices. This can
be wired or wireless.
 Protocols: The rules and standards that govern how data is transmitted over the network.
 Network software: The software that runs on the computers and devices to control the network
and manage the flow of data.

NETWORKS HAVE MANY ADVANTAGES


1. Resource sharing: Networks allow users to share resources, such as printers, files, and data. This
can save money and improve productivity.
2. Communication: Networks allow users to communicate with each other in real time, using tools
such as email, instant messaging, and video conferencing. This can improve collaboration and
productivity.
3. Access to information: Networks allow users to access information from anywhere in the world.
This can improve research and decision-making.
4. Entertainment: Networks can be used to access streaming media, such as movies and TV shows.
This can provide entertainment and education.
5. Increased productivity: Networks can help to improve productivity by allowing users to access
information and resources more easily. They can also help to improve collaboration by making it
easier for users to communicate with each other.
6. Reduced costs: Networks can help to reduce costs by allowing users to share resources, such as
printers and servers. They can also help to reduce travel costs by allowing users to work remotely.
7. Improved security: Networks can help to improve security by providing a central location for
storing data and by making it easier to track user activity.

NETWORKS ALSO HAVE SOME DISADVANTAGES


1. Security risks: Networks are vulnerable to security risks, such as viruses, malware, and hacking.
This can lead to data breaches and financial losses.
2. Dependence on technology: Networks rely on technology, so they can be disrupted by power
outages, hardware failures, and software errors.
3. Complexity: Networks can be complex to manage and troubleshoot. This can require specialized
skills and knowledge.
4. Security risks: Networks are vulnerable to security risks, such as viruses, malware, and hacking.
This can lead to data breaches and financial losses.
5. Complexity: Networks can be complex to manage and troubleshoot. This can require specialized
skills and knowledge.
6. Downtime: Networks can experience downtime due to hardware failures, software errors, or power
outages. This can disrupt business operations.

TYPES OF NETWORKS
 A computer network is a set of computers sharing resources located on or provided by network
nodes.
 The computers use common communication protocols over digital interconnections to communicate
with each other.
Local Area Network (LAN)
 It is also called LAN and designed for small physical areas such as an office, group of buildings
or a factory.
 LANs are used widely as it is easy to design and to troubleshoot.
 Personal computers and workstations are connected to each other through LANs.
 We can use different types of topologies through LAN, these are Star, Ring, Bus, Tree etc.
 LAN can be a simple network like connecting two computers, to share files and network among
each other while it can also be as complex as interconnecting an entire building.
 LAN networks are also widely used to share resources like printers, shared hard-drive etc.

CHARACTERISTICS OF LAN
 LAN's are private networks, not subject to tariffs or other regulatory controls.
 LAN's operate at relatively high speed when compared to the typical WAN.
 There are different types of Media Access Control methods in a LAN, the prominent ones are
Ethernet, Token ring.
 It connects computers in a single building, block or campus, i.e. they work in a restricted
geographical area.
Applications of LAN
• One of the computer in a network can become a server serving all the remaining computers called
clients.
• Connecting Locally all the workstations in a building to let them communicate with each other
locally without any internet access.
• Sharing common resources like printers etc are some common applications of LAN.
METROPOLITAN AREA NETWORK (MAN)
 It was developed in 1980s. It is basically a bigger version of LAN.
 It is also called MAN and uses the similar technology as LAN.
 It is designed to extend over the entire city. It can be means to connecting a number of LANs into
a larger network or it can be a single cable.
 It is mainly hold and operated by single private company or a public company.

Characteristics of MAN
 It generally covers towns and cities (50 km)
 Communication medium used for MAN are optical fibers, cables etc.
 Data rates adequate for distributed computing applications.
WIDE AREA NETWORK (WAN)
 It is also called WAN. WAN can be private or it can be public leased network.
 It is used for the network that covers large distance such as cover states of a country.
 It is not easy to design and maintain.
 Communication medium used by WAN are PSTN or Satellite links.
 WAN operates on low data rates.

CHARACTERISTICS OF WAN
 It generally covers large distances (states, countries, continents).
 Communication medium used are satellite, public telephone networks which are connected by
routers.
TOPOLOGY
 Topology refer to geometrical arrangement of components/ devices.
NETWORK TOPOLOGY
 A network topology is the physical and logical arrangement of nodes and connections in a
network.
 Nodes usually include devices such as switches, routers and software with switch and router
features.
 Network topologies are often represented as a graph.

TYPES OF NETWORK TOPOLOGY


 Network Topology is the schematic description of a network arrangement, connecting various
nodes (sender and receiver) through lines of connection.
1. BUS Topology
2. RING Topology
3. STAR Topology
4. MESH Topology
5. TREE Topology
6. HYBRID Topology

BUS TOPOLOGY
 Bus topology is a network type in which every computer and network device is connected to single
cable.
 When it has exactly two endpoints, then it is called Linear Bus topology.

FEATURES OF BUS TOPOLOGY


1. It transmits data only in one direction.
2. Every device is connected to a single cable
Advantages of Bus Topology Disadvantages of Bus Topology
1. It is cost effective. 1. Cables fails then whole network fails.
2. Cable required is least compared to other 2. If network traffic is heavy or nodes are more the
network topology.Used in small networks. performance of the network decreases.
3. It is easy to understand. 3. Cable has a limited length.
4. Easy to expand joining two cables together. 4. It is slower than the ring topology.
PRINCIPLES OF INTERNET

RING TOPOLOGY
 It is called ring topology because it forms a ring as each computer is connected to another computer,
with the last one connected to the first.
 Exactly two neighbors for each device.

FEATURES OF RING TOPOLOGY


1. A number of repeaters are used for Ring topology with large number of nodes, because if someone
wants to send some data to the last node in the ring topology with 100 nodes, then the data will
have to pass through 99 nodes to reach the 100th node. Hence to prevent data loss repeaters are
used in the network.
2. The transmission is unidirectional, but it can be made bidirectional by having 2 connections
between each Network Node, it is called Dual Ring Topology.
3. In Dual Ring Topology, two ring networks are formed, and data flow is in opposite direction in
them. Also, if one ring fails, the second ring can act as a backup, to keep the network up.
4. Data is transferred in a sequential manner that is bit by bit. Data transmitted, has to pass through
each node of the network, till the destination node.

Advantages of Ring Topology Disadvantages of Ring Topology


1. Transmitting network is not affected by1. Troubleshooting is difficult in ring topology.
traffic or by adding more nodes, as on 2. Adding or deleting the computers disturbs the ne
nodes having tokens can transmit data. activity.
2. Cheap to install and expand 3. Failure of one computer disturbs the whole networ

STAR TOPOLOGY
 In this type of topology all the computers are connected to a single hub through a cable.
 This hub is the central node and all others nodes are connected to the central node.
FEATURES OF STAR TOPOLOGY
1. Every node has its own dedicated connection to the hub.
2. Hub acts as a repeater for data flow.
3. Can be used with twisted pair, Optical Fibre or coaxial cable.

Advantages of Star Topology Disadvantages of Star Topology


1. Fast performance with few nodes and low ne 1. Cost of installation is high.
traffic. 2. Expensive to use.
2. Hub can be upgraded easily. 3. If the hub fails then the whole network is st
3. Easy to troubleshoot. because all the nodes depend on the hub.
4. Easy to setup and modify. 4. Performance is based on the hub that is it de
5. Only that node is affected which has failed, on its capacity
the nodes can work smoothly.

MESH TOPOLOGY
 It is a point-to-point connection to other nodes or devices.
 All the network nodes are connected to each other. Mesh has n(n-1)/2 physical channels to link n
devices.
There are two techniques to transmit data over the Mesh topology, they are:
1. Routing
2. Flooding
3. MESH Topology: Routing
In routing, the nodes have a routing logic, as per the network requirements. Like routing logic to
direct the data to reach the destination using the shortest distance. Or, routing logic which has information
about the broken links, and it avoids those node etc. We can even have routing logic, to re-configure the
failed nodes.
2. MESH Topology: Flooding
In flooding, the same data is transmitted to all the network nodes, hence no routing logic is
required. The network is robust, and the its very unlikely to lose the data. But it leads to unwanted load
over the network.
Types of Mesh Topology
1. Partial Mesh Topology : In this topology some of the systems are connected in the same fashion
as mesh topology but some devices are only connected to two or three devices.
2. Full Mesh Topology : Each and every nodes or devices are connected to each other.

FEATURES OF MESH TOPOLOGY


1. Fully connected.
2. Robust.
3. Not flexible.

Advantages of Mesh Topology Disadvantages of Mesh Topology


1. Each connection can carry its own data load. 1. Installation and configuration is difficult.
2. It is robust. 2. Cabling cost is more.
3. Fault is diagnosed easily. 3. Bulk wiring is required.
4. Provides security and privacy.

TREE TOPOLOGY
 It has a root node and all other nodes are connected to it forming a hierarchy. It is also called
hierarchical topology.
 It should at least have three levels to the hierarchy.

Features of Tree Topology


1. Ideal if workstations are located in groups.
2. Used in Wide Area Network.

Advantages of Tree Topology Disadvantages of Tree Topology


1. Extension of bus and star topologies. 1. Heavily cabled.
2. Expansion of nodes is possible and easy. 2. Costly.
3. Easily managed and maintained. 3. If more nodes are added maintenance is difficu
4. Error detection is easily done. 4. Central hub fails, network fails.
PRINCIPES OF INTERNET

HYBRID TOPOLOGY
 It is two different types of topologies which is a mixture of two or more topologies.
 For example if in an office in one department ring topology is used and in another star topology
is used, connecting these topologies will result in Hybrid Topology (ring topology and star
topology).

Features of Hybrid Topology


1. It is a combination of two or topologies
2. Inherits the advantages and disadvantages of the topologies included

Advantages Disadvantages
1. Reliable as Error detecting and troubleshooting is easy 1. Complex in design.
2. Effective. 2. Costly.
3. Scalable as size can be increased easily.
4. Flexible.
PRINCIPLES OF INTERNET
PRINCIPLES OF INTERNET

UNIT II
INTERNET BASICS
Internet Basics – Advantages and disadvantages – Internet Applications – IP Address- Internet Serv
URL- E-mail - E-mail features – Emil Providers.

INTERNET
 The Internet is a global network of computers that allows people to share information and
communicate with each other.
 It is a vast network of networks that consists of private, public, academic, business, and government
networks of local to global scope, linked by a broad array of electronic, wireless, and optical
networking technologies. ( The Internet is a vast network that connects computers all over the
world.)
 The Internet was originally developed by the United States Department of Defense in the 1960s as
a way to connect computers at different universities and research institutions.
 It was not until the 1990s that the Internet became widely available to the public.
 Internet is a powerful tool that can be used for good or bad.

INTERNET BASICS
1. Internet Protocol (IP): The Internet Protocol (IP) is a set of rules that govern how data is
transmitted over the Internet. IP addresses are used to uniquely identify devices on the Internet.
2. Domain Name System (DNS): The Domain Name System (DNS) is a system that translates
domain names into IP addresses. This allows us to use human-readable names, such as
www.google.com, to access websites.
3. Web browser: A web browser is a software application that allows us to view websites. The most
popular web browsers are Google Chrome, Mozilla Firefox, and Microsoft Edge.
4. Hypertext Transfer Protocol (HTTP): The Hypertext Transfer Protocol (HTTP) is a set of rules
that govern how data is transferred between web browsers and web servers. HTTP is used to transfer
web pages, images, and other files over the Internet.
5. World Wide Web (WWW): The World Wide Web (WWW) is a system of interlinked hypertext
documents that are accessed via the Internet. The WWW is the most popular way to access
information on the Internet.
To connect to the Internet, you need a computer, an Internet service provider (ISP), and a modem. A modem
is a device that converts digital signals from your computer into analog signals that can be transmitted over
the Internet.
PRINCIPLES OF INTERNET

ADVANTAGES
1. Communication:
 The internet allows us to communicate with people all over the world, regardless of their
location.
 We can use email, instant messaging, social media, and video conferencing to stay in touch
with friends and family, collaborate on projects, and conduct business.
2. Access to information:
 The internet is a vast resource of information.
 We can use it to research anything from history to current events to science to hobbies.
 We can also use it to access educational materials, government documents, and medical
information.
3. Entertainment:
 The internet offers a wide variety of entertainment options, including movies, TV shows,
music, games, and books.
 We can also use the internet to listen to radio stations, watch live streaming events, and
participate in online communities.
4. Business:
 The internet has revolutionized the way businesses operate.
 Businesses can use the internet to reach a global audience, sell products and services online,
and collaborate with partners.
 The internet has also created new opportunities for businesses, such as e-commerce and
cloud computing.

DISADVANTAGES
1. Cyberbullying:
 Cyberbullying is the use of electronic communication to bully a person, typically by sending
messages of an intimidating or threatening nature.
 Cyberbullying can have a serious impact on the victim's mental health and well-being.
2. Online scams:
 Online scams are fraudulent schemes that are carried out over the internet.
 Online scams can take many different forms, such as phishing emails, fake websites, and
phone calls.
 Online scams can result in financial losses and identity theft.
3. Identity theft:
 Identity theft is the crime of stealing someone's personal information, such as their name,
Social Security number, and credit card number.
 Identity thieves can use this information to commit fraud and financial crimes.
4. Addiction:
 The internet can be addictive.
PRINCIPLES OF INTERNET

 People who are addicted to the internet may spend excessive amounts of time online,
neglecting their work, school, relationships, and health.
5. Lack of privacy:
 The internet is not a private place.
 When you use the internet, your activities can be tracked by websites, advertisers, and
government agencies.
 This lack of privacy can be a concern for some people.
The internet has many advantages, but it also has some disadvantages. It is important to be aware of both
the benefits and risks of using the internet so that you can use it safely and responsibly.

APPLICATIONS
The internet has many applications, but some of the most common include:
1. Communication:
 The internet allows us to communicate with people all over the world, regardless of their
location.
 We can use email, instant messaging, social media, and video conferencing to stay in touch
with friends and family, collaborate on projects, and conduct business.
2. Access to information:
 The internet is a vast resource of information.
 We can use it to research anything from history to current events to science to hobbies.
 We can also use it to access educational materials, government documents, and medical
information.
3. Entertainment:
 The internet offers a wide variety of entertainment options, including movies, TV shows,
music, games, and books.
 We can also use the internet to listen to radio stations, watch live streaming events, and
participate in online communities.
4. Business:
 The internet has revolutionized the way businesses operate.
 Businesses can use the internet to reach a global audience, sell products and services online,
and collaborate with partners.
 The internet has also created new opportunities for businesses, such as e-commerce and
cloud computing.
5. Education:
 The internet can be a powerful tool for education.
 Students can use the internet to access educational materials, collaborate with other students,
and take online courses.
 The internet can also be used to provide professional development for teachers and other
educators.
PRINCIPLES OF INTERNET

6. Government:
 The internet can be used to provide government services to citizens.
 Citizens can use the internet to pay their taxes, apply for permits, and access government
information.
 The internet can also be used to facilitate communication between government agencies and
citizens.
7. Healthcare:
 The internet can be used to provide healthcare services to patients.
 Patients can use the internet to access medical information, schedule appointments, and
communicate with their doctors.
 The internet can also be used to provide telemedicine services, which allow patients to see
doctors remotely.
8. Transportation:
 The internet can be used to book flights, hotels, and rental cars.
 The internet can also be used to track the status of flights and to get real-time traffic
information.
9. Finance:
 The internet can be used to bank online, invest in stocks and bonds, and shop for financial
products.
 The internet can also be used to get real-time financial information, such as stock quotes
and currency exchange rates.

ARPANET
 ARPANET was the first wide-area packet-switched network with distributed control.
 It was developed by the United States Department of Defense's Advanced Research Projects
Agency (ARPA) in the late 1960s.
 The goal of ARPANET was to create a resilient network that could survive a nuclear attack.
 ARPANET was based on the idea of packet switching, which breaks data into small chunks called
packets.

IP ADDRESS
 An IP address is a unique address that identifies a device on the internet or a local network.
 IP stands for "Internet Protocol," which is the set of rules governing the format of data sent via the
internet or local network.
 IP addresses provide a way of doing so and form an essential part of how the internet works
IP USAGE
 Used to connect to another computer
 Allow to transfer of file and email
PRINCIPLES OF INTERNET

IP structure
 IP addresses consist of four sections
 Each section is 8 bits long
 Each section can range from 0 to 255
 Written example, 128.35.0.72
IP versions
 IPv4: 32-bit* number: Written in Dotted Decimal Notation
205.150.58.7 (4 billion different host addresses)
 IPv6: 128-bit* number: Written in Hex Decimal Notation
2001:0503:0C27:0000:0000:0000:0000:0000 (16 billion network addresses)

Types of IP address
 Static IP address
 Manually input by network administrator
 Manageable for small networks
 Requires careful checks to avoid duplication
 Dynamic IP address
 Examples - BOOTP, DHCP
 Assigned by server when host boots
 Derived automatically from a range of addresses
 Duration of 'lease' negotiated, then address released back to server

INTERNET SERVICES
 Internet services are the services that are provided to users over the internet.
They can be divided into two main categories:
1. Communication services: These services allow users to communicate with each other.
They include email, instant messaging, voice over IP (VoIP), and social media.
PRINCIPLES OF INTERNET

2. Content services: These services allow users to access and use content.
They include web browsing, file sharing, streaming media, and online gaming.
The most popular internet services:
1. Email:
Email is a service that allows users to send and receive electronic messages. It is one of
the most popular internet services, and it is used by billions of people around the world.

2. Instant messaging:
Instant messaging is a service that allows users to communicate with each other in real time.
It is a popular way to stay in touch with friends and family, and it is also used by businesses
for communication with customers and employees.

3. Voice over IP (VoIP):


VoIP is a service that allows users to make and receive phone calls over the internet. It
is a more affordable alternative to traditional landlines, and it is also more convenient,
as users can make calls from anywhere with an internet connection.

4. Social media:
Social media is a service that allows users to connect with friends and family, and to
share content. It is one of the most popular internet services, and it is used by billions
of people around the world.

5. Web browsing:
Web browsing is a service that allows users to access and view websites. It is the
most popular internet service, and it is used by billions of people around the world to
access information, shop, and entertain themselves.

6. File sharing:
File sharing is a service that allows users to share files with each other. It is a popular
way to share music, movies, and other content.
PRINCIPLES OF INTERNET

7. Streaming media:
Streaming media is a service that allows users to watch or listen to audio or video
content without having to download it first. It is a popular way to watch movies, TV
shows, and music videos.

8. Online gaming:
Online gaming is a service that allows users to play games with each other over the
internet. It is a popular way to socialize and compete with others.

URL
 Every time you click a link on a website or type a web address into your browser, it’s a URL.
 URL stands for Uniform Resource Locator.
 Think of it like a street address, with each portion of the URL as different parts of the address, and each
giving you different information.
Let’s examine each component of a URL and what we can learn from it.

SCHEME
Every URL begins with the scheme. This tells
your browser what type of address it is so the
browser connects to it correctly.
There are many types of schemes, but for typical
web browsing you will mostly see http and https.
The scheme is still always part of the URL; it just
isn’t being displayed.

DOMAIN NAME
The domain name is the most
prominent part of a web address.
Typically, different pages on the same
site will continue to use the
same domain name.
PRINCIPLES OF INTERNET

For example, all pages on this site share the


GCFLearnFree.org domain name.
Each segment of the domain name separated by
a period is called a domain.
The domain on the right is called a top-level
domain, with the domain to the left of it called
the second-level domain, then third-level
domain, and so on.

FILE PATH
The file path—often just called the path—
tells your browser to load a specific page.
If you don’t specify a path and only
enter a domain name, your browser is
still loading a specific page; it’s just
loading a default page, which usually
will help you navigate to other pages.

PARAMETERS
Some URLs include a string of characters after
the path—beginning with a question mark—
called the parameter string.
You have probably noticed this part of
a URL appear in your address bar after
performing a search on Google or YouTube.
The parameter string can be clear or confusing to a human user, but it is critical information for the server.

Anchor
Also appearing after the path,
the anchor tells your browser to
scroll to or load a specific part of
the page. Usually
the anchor begins with a
hashtag and is used to direct your
browser to a specific part of a
very long page.

A whole URL
When combined, these elements make up a URL, although not all URLs will have all five parts.
PRINCIPLES OF INTERNET

Keep in mind that these are the most common components of a URL. There are many other parts, but these
are the five you will see most often and that can usually give you the most information.

E-mail
 Electronic mail, commonly shortened to email or e-mail, is a method of exchanging digital messages
over a computer network.
 Email, short for electronic mail, is a widely used method of sending and receiving digital messages
over the internet.

Components: An email message consists of three parts:


1. The header: The header contains information about the sender, recipient, subject, and
other metadata.
2. The body: The body contains the actual message content.
3. The attachment: An attachment is a file that is sent along with the message.

E-MAIL FEATURES
1. Composing and Sending:
 Email platforms allow users to compose new messages, specifying recipients, subject lines,
and the main body of the email.
 Users can send the message once it's ready.
2. Attachments:
 Emails support attaching files such as documents, images, or videos to the message.
Attachments can be included to share additional information or collaborate on projects.
3. Forwarding and Replying:
 Users can forward received emails to other recipients, allowing them to share the content
easily.
 Reply options include replying directly to the sender or replying to all recipients of the
original email.
4. Inbox Organization:
 Email platforms offer features to manage and organize incoming messages.
 Users can create folders or labels to categorize emails, making it easier to find and reference
specific messages later.
PRINCIPLES OF INTERNET

5. Search Functionality:
 With an extensive search feature, users can find specific emails by searching for keywords,
sender names, subject lines, or other criteria.
 This is particularly useful when dealing with a large volume of emails.
6. Spam Filtering:
 Email services incorporate spam filters to automatically detect and divert unwanted or
unsolicited messages into a separate spam folder.
 This helps keep the inbox clean and reduces the chances of falling for phishing or scam
attempts.
7. Autoresponders:
 Autoresponders allow users to set up automatic replies when they are away or unable to
respond to emails immediately.
 This feature is commonly used to inform senders about one's unavailability and provide
alternative contact information if necessary.
8. Read Receipts:
 Some email clients offer read receipts, which notify the sender when their email has been
opened or read by the recipient.
 This feature can be helpful for tracking important or time-sensitive messages.
9. Signature:
 Users can create an email signature containing their name, contact information, job title, or
any other relevant details.
 Signatures are usually appended automatically to outgoing emails, providing a professional
touch.

EMAIL PROVIDERS
 There are numerous email service providers available, each offering its own set of features and
functionality
 The most popular email providers:
1. Gmail: Gmail is a free email service offered by Google. It is one of the most
popular email providers in the world, with over 1.5 billion active users.
Gmail offers a wide range of features, including spam filtering, phishing
protection, and a large storage capacity.

2. Yahoo Mail: Yahoo Mail is a free email service offered by Yahoo. It is


another popular email provider, with over 500 million active users. Yahoo
Mail offers a similar range of features to Gmail, including spam filtering,
phishing protection, and a large storage capacity.
PRINCIPLES OF INTERNET

3. Outlook: Outlook is a free email service offered by Microsoft. It is a


popular email provider for users of Microsoft Windows and Microsoft
Office. Outlook offers a range of features, including spam filtering,
phishing protection, and a large storage capacity.

4. AOL Mail: AOL Mail is a free email service offered by AOL. It is a


popular email provider for users of AOL's dial-up internet service. AOL
Mail offers a range of features, including spam filtering, phishing
protection, and a large storage capacity.

5. ProtonMail: ProtonMail is a secure email service that is based in


Switzerland. It offers a range of features, including end-to-end
encryption, anonymous registration, and a large storage capacity.
PRINCIPLES OF INTERNET

UNIT III
INTRODUCTION TO INTERNET PROTOCOL
Introduction to Internet Protocol –TCP –UDP-FTP – The Telnet –The Usenet – Internet Chat.

INTRODUCTION TO INTERNET PROTOCOL


 The Internet Protocol (IP) is a set of rules that govern how data is sent and received over a network.
 It is the foundation of the internet, and it is used by all devices that are connected to the internet
 The Internet Protocol (IP) is a fundamental protocol that forms the foundation of the Internet and
enables communication between devices over a network.
 It provides a set of rules and guidelines for transmitting data packets across interconnected
networks.
1. Packet Switching:
 IP is based on the concept of packet switching, where data is divided into small units called
packets.
 Each packet contains a portion of the data being transmitted along with addressing
information.
2. Unique IP Addresses:
 IP uses a unique addressing system to identify devices connected to a network.
 Every device, such as a computer or a smartphone, connected to the Internet is assigned an
IP address, which serves as its unique identifier.
3. IPv4 and IPv6:
 There are two main versions of IP in use today: Internet Protocol version 4 (IPv4) and
Internet Protocol version 6 (IPv6). IPv4, the most widely deployed version, uses 32-bit
addresses and provides approximately 4.3 billion unique IP addresses.
 On the other hand, IPv6 uses 128-bit addresses, allowing for an enormous number of unique
IP addresses.
1. Addressing and Routing:
 IP addresses are used for both source and destination identification.
 When a device sends data, it attaches its own IP address as the source address and includes
the recipient's IP address as the destination address.
 Routers in the network use these addresses to route packets from the source device to the
destination device across multiple networks.
2. Packet Header:
 Each IP packet consists of a header and a payload.
 The header contains important information such as the version of IP being used, source and
destination IP addresses, packet length, time-to-live (TTL) value, and other control
information.
PRINCIPLES OF INTERNET

6. Best Effort Delivery:


 IP operates on a best-effort delivery model, meaning it does not guarantee reliable delivery
or provide mechanisms for error correction or flow control.
 It assumes that higher-level protocols, such as the Transmission Control Protocol (TCP),
will handle reliable data transmission if needed.
7. Network Address Translation (NAT):
 NAT is a technique used to conserve IPv4 address space by allowing multiple devices on
a local network to share a single public IP address.
 NAT translates private IP addresses to the public IP address when communicating with
devices outside the local network.
TCP
 TCP (Transmission Control Protocol) is one of the main protocols of the Internet protocol suite.
 It lies between the Application and Network Layers which are used in providing reliable delivery
services.
 It is a connection-oriented protocol for communications that helps in the exchange of messages
between different devices over a network.
 The Internet Protocol (IP), which establishes the technique for sending data packets between
computers, works with TCP.

Features of TCP
 TCP keeps track of the segments being transmitted or received by assigning numbers to every single
one of them.
 Flow control limits the rate at which a sender transfers data. This is done to ensure reliable delivery.
 TCP implements an error control mechanism for reliable data transfer.
 TCP takes into account the level of congestion in the network.

Advantages of TCP Disadvantages of TCP


 It is reliable for maintaining a connection between  It is slower than UDP and it takes more
Sender and Receiver. bandwidth.
 It is responsible for sending data in a particular  Slower upon starting of transfer of a file.
sequence.  Not suitable for LAN and PAN Networks.
 Its operations are not dependent on OS.  It does not have a multicast or broadcast category.
 It allows and supports many routing protocols.  It does not load the whole page if a single data of
 It can reduce the speed of data based on the speed the page is missing.
of the receiver.
PRINCIPLES OF INTERNET

USER DATAGRAM PROTOCOL (UDP)


 User Datagram Protocol (UDP) is a Transport Layer protocol.
 UDP is a part of the Internet Protocol suite, referred to as the UDP/IP suite.
 Unlike TCP, it is an unreliable and connectionless protocol. So, there is no need to establish a
connection before data transfer.
 The UDP helps to establish low-latency and loss-tolerating connections establish over the network.
 The UDP enables process-to-process communication.

Features of UDP
 Used for simple request-response communication when the size of data is less and hence there is
lesser concern about flow and error control.
 It is a suitable protocol for multicasting as UDP supports packet switching.
 UDP is used for some routing update protocols like RIP(Routing Information Protocol).
 Normally used for real-time applications which can not tolerate uneven delays between sections of
a received message.

Advantages of UDP Disadvantages of UDP


 It does not require any connection for sending or  We can not have any way to acknowledge the
receiving data. successful transfer of data.
 Broadcast and Multicast are available in UDP.  UDP cannot have the mechanism to track the
 UDP can operate on a large range of networks. sequence of data.
 UDP has live and real-time data.  UDP is connectionless, and due to this, it is
 UDP can deliver data if all the components of the unreliable to transfer data.
data are not complete.  In case of a Collision, UDP packets are dropped by
Routers in comparison to TCP.
 UDP can drop packets in case of detection of errors

FILE TRANSFER PROTOCOL (FTP)


 File Transfer Protocol (FTP) is a standard network protocol used to transfer files between two
computers.
 It is a reliable protocol that guarantees that all files will be transferred correctly.
PRINCIPLES OF INTERNET

Components:
FTP consists of two main components:
 The control connection: The control connection is used to establish a connection between the two
computers and to exchange control information.
 The data connection: The data connection is used to transfer the actual files.
Popular FTP clients:
 There are many FTP clients available, including FileZilla, WinSCP, and Cyberduck.
Benefits of FTP:
 FTP is a reliable protocol that guarantees that all files will be transferred correctly.
 FTP is also a versatile protocol that can be used to transfer files between any two computers that
are connected to a network.
Drawbacks of FTP:
 FTP is not a secure protocol, as passwords and other sensitive information can be intercepted.
 FTP can also be a source of spam and phishing attacks.

TELNET
 Telnet (short for "teletype network") is a network protocol that allows users to connect to a remote
computer and interact with it as if they were sitting at the keyboard.

 History: Telnet was developed in the 1960s and was originally used to connect to mainframe
computers. It is still in use today, but it is not as common as it once was.
PRINCIPLES OF INTERNET

 Purpose: The purpose of Telnet is to provide a way for users to interact with a remote computer.
This can be useful for troubleshooting problems, accessing files, or running programs on a remote
computer.
 How it works: When a user connects to a remote computer using Telnet, they are essentially
creating a virtual terminal on their own computer. This virtual terminal allows the user to type
commands and interact with the remote computer as if they were sitting at the keyboard.
 Security: Telnet is not a secure protocol, as passwords and other sensitive information can be
intercepted. For this reason, Telnet is not recommended for use over an unsecured network.
 Alternatives: There are a number of alternatives to Telnet, including SSH (Secure Shell) and
Rlogin. SSH is a more secure protocol than Telnet, and it is the preferred method for connecting to
remote computers over an unsecured network. Rlogin is a similar protocol to Telnet, but it is not as
widely used.

USENET
 Usenet is a worldwide distributed discussion system that consists of a set of newsgroups that are
organized by topic.
 UseNet is the contraction of the User Network.
 It resembles just a Bulletin Board System where users can post articles or posts on various topics.
 The Usenet of newsgroups is hierarchical and, similar to the Domain Name System (DNS)

 Purpose: The purpose of Usenet is to provide a way for users to discuss topics of interest with other
users. This can be done by posting messages to newsgroups, which are like online forums.
 How it works: Usenet is a distributed system, which means that there is no central server. Instead,
newsgroups are stored on a network of servers called news servers. When a user posts a message
to a newsgroup, it is copied to all of the news servers that carry that newsgroup.
 Benefits of Usenet: Usenet is a free service that allows users to discuss topics of interest with other
users. It is also a relatively anonymous service, which can be appealing to some users.
 Drawbacks of Usenet: Usenet can be a noisy place, as there is a lot of spam and low-quality
content. It can also be difficult to find the information that you are looking for, as there are so many
newsgroups.
PRINCIPLES OF INTERNET

INTERNET CHAT
Internet chat is a real-time communication between two or more people using computers.
It is a form of online communication that allows users to exchange text messages in real time.

 Purpose: The purpose of internet chat is to provide a way for users to communicate with each other
in real time. This can be used for a variety of purposes, such as: Socializing etc
 How it works: Internet chat works by sending text messages between two or more computers. The
messages are sent over the internet and are delivered to the recipient's computer in real time.

 Types of internet chat: There are two main types of internet chat:
 Instant messaging: Instant messaging (IM) is a type of chat that allows users to communicate
with each other in real time. IM is typically used one-on-one, but it can also be used in group
chats.
 Web chat: Web chat is a type of chat that allows users to communicate with each other through
a website. Web chat is typically used in chat rooms, which are online forums where users can
chat with each other.
 Drawbacks of internet chat: Internet chat also has some drawbacks, including:
 Security: Chat can be insecure, as messages can be intercepted by unauthorized people.
 Spam: Chat can be a source of spam.
 Addiction: Chat can be addictive.
PRINCIPLES OF INTERNET

UNIT IV
WWW OVERVIEW
WWW Overview – Web pages -The Web Servers – Web Browsers– Search Engines
Introduction to Firewalls – Uses of Firewalls – Types of Firewalls.

WORLD WIDE WEB OVERVIEW


 The World Wide Web (WWW), commonly known as the Web, is an information space where
documents and other web resources are identified by Uniform Resource Locators (URLs),
interlinked by hypertext links, and accessible through the Internet.
 English scientist Tim Berners-Lee invented the World Wide Web in 1989 while employed at CERN,
the European Organization for Nuclear Research.
 The Web has changed the way people access and share information.
 It has also revolutionized the way businesses operate and communicate with their customers.
 The World Wide Web is a vast and ever-growing collection of information. It is a powerful tool for
communication, collaboration, and education.

WEB PAGE
 A document which can be displayed in a web browser such as Firefox, Google Chrome, Opera,
Microsoft Internet Explorer or Edge, or Apple's Safari.
 These are also often called just "pages."
 A web page is a resource of information that is suitable for the World Wide Web and can be accessed
through a web browser..
 This information is usually in HTML or XHTML format and may provide navigation to other web
pages via hypertext links.
 Web Pages may be retrieved from a local computer or from a remote web server.
 The web server may restrict access only to a private network, e.g. a corporate intranet or it may
publish pages on the World Wide Web.

WEB SERVERS
 A web server is a computer program that accepts and responds to requests from clients.
 These requests are typically made using the Hypertext Transfer Protocol (HTTP), which is the
standard protocol for exchanging data on the World Wide Web.
 Web servers are an essential part of the World Wide Web.
PRINCIPLES OF INTERNET

 They allow us to access and view web pages from all over the world.
 Web servers are also used for a variety of other purposes, such as hosting email servers and file
sharing services.

Web servers available


Each with its own strengths and weaknesses.
 Apache: Apache is the most popular web server in the world. It is open source and free to use.
 Nginx: Nginx is a popular alternative to Apache. It is known for its high performance and
scalability.
 Microsoft IIS: IIS is the web server that is included with Microsoft Windows operating systems.
 LiteSpeed: LiteSpeed is a high-performance web server that is known for its low resource usage.
Note: The choice of web server depends on a number of factors, such as the size and complexity of
the website, the amount of traffic that the website is expected to receive, and the budget.

Functions of a web server:


 Storing web pages
 Processing requests
 Delivering web pages
 Securing web pages
 Optimizing performance

WEB BROWSERS
 They are called browsers because they allow the user to browse the resources available on servers.
 Mosaic was the first browser with a graphical user interface.
 A browser is a client on the Web because it initiates the communication with a server, which waits
for a request from the client before doing anything.
 In the simplest case, a browser requests a static document from a server.
 Sometimes a browser directly requests the execution of a program
stored on the server.
 The output of the program is then returned to the browser.
Examples: Internet Explorer, Mozilla Firefox, Netscape Navigator, Google
Chrome, Opera etc.,
PRINCIPLES OF INTERNET

SEARCH ENGINE
 A search engine is software accessed on the Internet that searches a database of information
according to the user's query.
 Search engines are normally accessed through a web browser (e.g. you can perform search engine
searches directly in the address bar of Firefox, Chrome, etc.) or through a web page

Factors to consider when choosing a search engine


 Relevance: The search engine should be able to find relevant results for your queries.
 Accuracy: The search engine should return accurate results.
 Privacy: The search engine should not track you or collect personal data.
 Features: The search engine should offer the features that you need, such as advanced search
options, filters, and saved searches.
 Interface: The search engine should have a user-friendly interface.

There are many different search engines you can use, but some of the
most popular include Google, Yahoo!, and Bing. To perform a
search, you'll need to navigate to a search engine in your web browser,
type one or more keywords—also known as search terms—then
press Enter on your keyboard. In this example, we'll search
for recipes.

After you run a search, you'll see a list


of relevant websites that match your search terms. These are
commonly known as search results. If you see a site that looks
interesting, you can click a link to open it. If the site doesn't
have what you need, you can simply return to the results page
to look for more options.

Most browsers also allow you to perform a web


search directly from your address bar,
although some have a separate search bar next
to the address bar. Simply type your search
terms and press Enter to run the search.
PRINCIPLES OF INTERNET

Search suggestions
If you don't find what you're looking for on the
first try, don't worry! Search engines are good at
finding things online, but they're not perfect.
You'll often need to try different search
terms to find what you're looking for.

Refining your search


If you're still having trouble finding exactly what you
need, you can use some special characters to help refine
your search. For example, if you want to exclude a
word from a search, you can type a hyphen (-) at the
beginning of a word. So if you wanted to find cookie
recipes that don't include chocolate, you could search
for recipes cookies -chocolate.

You can also search for exact words or phrases to


narrow down your results even more. All you need to do
is place quotation marks (" ") around the desired search
terms. For example, if you search for recipes "sugar
cookies", your search results will only include recipes for
sugar cookies, instead of any cookies that happen to use
sugar as an ingredient.

You can use the extra search tools to narrow down your results even more. These tools will
change based on the type of content you're looking for, but in this example we can filter our
images by size, color, image type, and more. So if you wanted to find cookies with pink frosting,
you could search for images that are mostly pink.
PRINCIPLES OF INTERNET

Content-specific searches
There may be times when you're
looking for something more specific,
like a news article, picture, or video.
Most search engines have links at the
top of the page that allow you to
perform these unique searches.

INTRODUCTION TO FIREWALLS
 A firewall is a network security device that monitors and controls incoming and outgoing
network traffic.
 Firewalls are used to protect networks from unauthorized access, malicious traffic, and other
threats.
 Firewalls work by filtering network traffic based on a set of rules.
 These rules can be configured to allow or block traffic based on the source and destination IP
addresses, ports, protocols, and other criteria.
Firewalls can be implemented as hardware devices, software applications, or a combination of both.
 Hardware firewalls are typically more expensive than software firewalls, but they offer better
performance and security.
 Software firewalls are typically easier to configure and manage than hardware firewalls, but
they may not offer the same level of performance and security.

Uses of Firewalls
Firewalls are used to protect networks from a variety of threats, including:
 Unauthorized access: Firewalls can be used to prevent unauthorized users from accessing a
network. This can be done by blocking traffic from unauthorized IP addresses or by requiring
users to authenticate before they are allowed to access the network.
 Malicious traffic: Firewalls can be used to block malicious traffic, such as viruses, worms, and
Trojan horses. This can be done by filtering traffic based on the contents of packets or by using
signature-based detection.
 Other threats: Firewalls can also be used to protect networks from other threats, such as denial-
of-service attacks and distributed denial-of-service attacks.
PRINCIPLES OF INTERNET

Types of Firewalls
There are two main types of firewalls: packet-filtering firewalls and stateful inspection firewalls.
 Packet-filtering firewalls are the most basic type of firewall. They work by inspecting the
headers of network packets and filtering traffic based on the source and destination IP addresses,
ports, and protocols.
 Stateful inspection firewalls are more advanced than packet-filtering firewalls. They track the
state of network connections and filter traffic based on the state of the connection. This makes
stateful inspection firewalls more effective at blocking malicious traffic.
 Application-level firewalls filter traffic based on the application layer of the OSI model. This
makes application-level firewalls more effective at blocking malicious traffic that is specifically
designed to exploit vulnerabilities in specific applications.
PRINCIPLES OF INTERNET

UNIT V
ART OF CREATING A WEBSITE
Art of creating a website – Hypertext and HTML – Features – Elements – Attributes- Structure of
HTML– Basic tags in HTML – Formatting tags in HTML – HTML Lists –Types of Lists.

Art of creating a website


 The art of creating a website is a complex and ever-evolving process.
 It requires a deep understanding of web design, development, and marketing.

To create a website, you will need:


 domain name
 content management system (CMS)
 web design and development framework
 web analytics tool

The process of creating a website can be broken down into the following steps:
1. Plan your website
2. Design your website
3. Develop your website
4. Market your website
5. Track your website analytics

Hypertext and HTML


Hypertext and HTML are two essential concepts in web development.
1. Hypertext
 Hypertext is text that contains links to other texts.
 When you click on a hyperlink, you are taken to the linked text.
 Hypertext is what makes the World Wide Web (WWW) so powerful.
 It allows you to navigate between different web pages quickly and easily.
2. HTML
 (HyperText Markup Language) is the language used to create web pages.
 HTML documents are made up of elements, which are instructions that tell the browser
how to display the text and other content on the page.
 The <p> element tells the browser to display the text within the element as a paragraph.
 HTML is a simple language that can be learned by anyone.
PRINCIPLES OF INTERNET

Features
 It is easy to learn and easy to use.
 It is platform-independent.
 Images, videos, and audio can be added to a web page.
 Hypertext can be added to the text.
 It is a markup language.

Elements
 Elements are the basic units of structure in HTML.
 They are used to define the content and layout of a web page.
 Elements are made up of a start tag, an end tag, and the content between the tags.

Attributes
 Attributes are additional pieces of information that can be added to an element.
 They are specified in the start tag of an element, and they provide additional information
about the element.
 For example, the href attribute of the <a> element specifies the URL of the link.

Example: HTML element with an attribute:


<a href="https://google.com">Google</a>

Element Attribute Description

<a> href Specifies the URL of the link.


<img> src Specifies the path to the image file.

<h1> id Specifies a unique identifier for the element.


<p> class Specifies a class name for the element.

Basic Structure/Basic HTML Tags


A typical HTML document will have following structure: Document declaration tag
PRINCIPLES OF INTERNET

HTML Tags
 HTML markup tags are usually called HTML tags.
 These tags are keywords (tag name) surrounded by angle braces like <Tag Name>.
 The first pair of tags is the start tag and the second tag is the end tag.
 End tag contains a forward slash before the tag name.
 Start tag and end tag are also called opening tags and closing tags.
 Except few tags, most of the tags have their corresponding closing tags.

For example <html> has its closing tag </html> and <body> tag has its closing tag </body> tag.
Tags Description
<!DOCTYPE The <!DOCTYPE html> declaration defines that this document is an HTML5
html> document
This tag encloses the complete HTML document and mainly comprises
of document header which is represented by <head>...</head> and
<html>
document body which is represented by <body>...</body> tags.

This tag represents the document's header which can keep other HTML
<head> tags like <title>, <link> etc.
The <title> tag is used inside the <head> tag to mention the document
<title> title.
This tag represents the document's body which keeps other HTML tags
<body> like <h1>, <div>, <p>

Formatting tags in HTML


 HTML formatting tags are used to change the appearance of text on a web page.
 They can be used to change the font, size, color, and other properties of the text.

Here are some of the most common HTML formatting tags:


1. <b>: The <b> tag makes the text bold.
2. <i>: The <i> tag makes the text italic.
3. <u>: The <u> tag underlines the text.
4. <s>: The <s> tag strikes through the text.
5. <font>: The <font> tag specifies the font family, size, and color of the text.
6. <span>: The <span> tag is a generic container tag that can be used to apply formatting to text.
<!DOCTYPE html>
<html>
<head> <title>My First HTML Document</title></head>
<body>
<h1>My First HTML Document</h1>
<p>This is my first HTML document.</p>
<p><b>This text is bold.</b></p>
<p><i>This text is italic.</i></p>
</body> </html>
PRINCIPLES OF INTERNET

HTML Lists –Types of Lists.


There are three types of lists in HTML: ordered lists, unordered lists, and definition lists.
1. Ordered lists are lists that are arranged in a specific order. They are created using the <ol> tag.
Each item in an ordered list is preceded by a number or letter, which is incremented for each item.
2. Unordered lists are lists that are not arranged in any particular order. They are created using the
<ul> tag. Each item in an unordered list is preceded by a bullet point.
3. Definition lists are lists that define terms and their associated descriptions. They are created using
the <dl> tag. Each term is enclosed in a <dt> tag, and its description is enclosed in a <dd> tag.

Here is an example of an HTML document that uses all three types of lists:
<!DOCTYPE html>
<html>
<head>
<title>My First HTML Document</title>
</head>
<body>
<h1>My First HTML Document</h1>
<ol>
<li>This is the first item in the ordered list.</li>
<li>This is the second item in the ordered list.</li>
<li>This is the third item in the ordered list.</li>
</ol>
<ul>
<li>This is the first item in the unordered list.</li>
<li>This is the second item in the unordered list.</li>
<li>This is the third item in the unordered list.</li>
</ul>
<dl>
<dt>Term 1</dt>
<dd>This is the definition of term 1.</dd>
<dt>Term 2</dt>
<dd>This is the definition of term 2.</dd>
<dt>Term 3</dt>
<dd>This is the definition of term 3.</dd>
</dl>
</body>
</html>

You might also like