Internet - Study Notes
Internet - Study Notes
COMPUTER
Copyright © 2014-2020 TestBook Edu Solutions Pvt. Ltd.: All rights reserved
Download Testbook App
Internet
The Internet is a huge collection of networks, a networking infrastructure. It
encapsulates millions of computers together globally, forming a network in which
any computer can communicate with any other computer as long as they are both
connected to the Internet. In other words, it is a worldwide system of cross
connected computer networks, connecting millions of devices through which
exchange of information such as data, news and opinions etc. is possible.
The Internet is available to each and every user across the globe.
Evolution
The methodology of Internet was coined in 1969 and has undergone various
technological & Infrastructural amendments that are discussed below:
The origin of the Internet devised from the concept of Advanced Research Project
Agency Network (ARPANET).
ARPANET was designed by the Department of Defence of The United States.
The primary motive of ARPANET was to facilitate communication among the
different bodies of the government.
At that time, there existed only four nodes, formally named Hosts.
In 1972, the ARPANET spread over the globe with 23 nodes located in different
countries and thus became known as the Internet.
By the time, with invention of new technologies such as TCP/IP protocols, DNS,
WWW, browsers, scripting languages etc., the Internet provided a medium to
publish and access information over the web.
Advantages
The Internet covers almost every aspect of life, one can think of. Here, we will
discuss some of the advantages of Internet:
The Internet allows us to communicate with the people sitting at remote locations.
There are various apps available on the web that use the Internet as a medium for
communication. Users can find different social networking sites. Following are
examples of few Social Networking sites:
Facebook
Twitter
Yahoo
Flickr
Anyone can surf for various kinds of information using the internet. Information
related to different topics such as Technology, Geographical Information, Health &
Science, Social Studies, Information Technology, Products etc can be surfed using a
search engine.
Apart from communication and source of information, the internet also serves a
medium for entertainment. Following are the various modes for entertainment over
the internet.
Online Television
Online Games
Songs
Videos
Social Networking Apps
Internet allows us to use many services like:
Internet Banking
Matrimonial Services
Online Shopping
Online Ticket Booking
Online Bill Payment
Data Sharing
E-mail
The Internet facilitates the concept of electronic commerce, that aids the business
deals to be processed on electronic systems.
Disadvantages
However, Internet is evolved to be a powerful medium of information in almost all
areas, yet there are many associated disadvantages discussed below:
There is always the possibility to lose personal information such as name, address,
credit card number. Therefore, users must be very vigilant while sharing this type of
information. Users must use credit cards only via authenticated websites.
Another disadvantage is the Spamming. Spamming corresponds to the unwanted
emails in bulk. These emails serve no purpose and lead to obstruction of the entire
system.
Virus can easily be spread to the computers connected to the internet. Such virus
attacks may cause the user's system to crash or the user's important data may get
deleted.
There are different websites that do not supply the authenticated information. This
leads to misconception among many people.
Intranet
Intranet is defined as a private network of computers within an organization with its
own server and firewall.
Moreover we can define
Intranet as:
The Internet is a system
in which multiple PCs are
networked to be
connected to each other.
PCs on the intranet are
not available to the world
outside of the intranet.
Normally each company
or organization holds their
own Intranet network and
members/employees of
that company collaborate
via access to the computers in their intranet.
Each computer in Intranet is also identified by an IP Address, which is unique
among the computers in that Intranet.
Benefits
Intranet is considered as a very efficient and reliable network infrastructure for any
organization. It is profitable in every aspect such as cost-effectiveness,
collaboration, security, productivity and much more.
Application
Intranet applications are the same as that of Internet applications. Intranet
applications can be also accessed via a web browser. The only difference is that,
Intranet applications reside on local servers while Internet applications reside on
remote servers. Here, we've discussed some of these applications:
Intranet Internet
Localized Network. Worldwide Network
Doesn't have access to Intranet Have access to the Internet.
More Expensive Less Expensive
More Safe Less Safe
More Reliability Less Reliability
Extranet
Extranet refers to a network
within an organization, using the
internet to connect to the
outsiders in a controlled manner.
It aids to interconnect businesses
with their customers and
suppliers and in turn allows
working in a collaborative
manner.
Implementation
Extranet is implemented as a Virtual Private Networks (VPN) because it uses the
internet to connect to corporate organizations and there is always a threat to
information security. VPN facilitates a secure network in public infrastructure
(Internet).
Key Points
1. The packet is wrapped at the boundary of networks in IPSEC compliant
routers.
2. It utilizes an encryption key to associate packets and IP addresses as well.
3. The packet is decoded only by the IPSEC compliant routers or servers.
4. The digital information is shared over VPN via VPN Tunnel and this process
is called tunneling.
VPN utilizes Internet Protocol Security Architecture (IPSEC) Protocol to facilitate
secure transactions by implementing an additional security layer to TCP/IP protocol.
This layer is implemented by encapsulating the IP packet to a new IP packet as
described in the following diagram:
Benefits
Extranet has proven to be a successful model for various kinds of businesses even
if they are small or big. following are few of the advantages of extranet for business
partners, employees, suppliers, and customers:
Issues
Apart from advantages there are also some issues associated with extranet. These
issues are discussed below:
Hosting
Where the extranet pages will be held i.e. who will host the extranet pages. In this
context there are two choices:
1. May host it on the user's own server.
2. May host it along with an Internet Service Provider (ISP) in the similar way as
web pages.
But hosting extranet pages on a user's own server requires high bandwidth internet
connection which is comparatively very costly.
Security
Additional firewall security is required if the user hosts extranet pages on the user's
own server which result in a complex security mechanism and increased workload.
Accessing Issues
Information cannot be accessed in absence of internet connection. However,
information may be accessed within Intranet with no internet connection.
Decreased Interaction
It reduces the face to face interaction in the business which results in lack of
communication among customers, business partners and suppliers.
Extranet Intranet
Internal network that can be accessed externally. Internal network that cannot be
accessed externally.
Extranet is an extension of the company's Intranet. Only limited users of a company.
For controlled external communication between Only for communication within a
customers, suppliers and business partners. company.
Internet Services
Internet Services allow us to access a huge amount of information such as text,
graphics, sound and software over the internet. The diagram given below shows the
four different categories of Internet Services.
Communication Services
There are different communication Services available that facilitate exchange of
information among individuals or groups. The following table provides a brief
introduction to such services:
Archie: It's an updated database of public FTP sites and their content. It helps
2
to find a file by using its name.
Gopher: It is utilized to retrieve, search, and display documents on remote
3
sites.
VERONICA (Very Easy Rodent Oriented Net wide Index to Computer
4 Achieved): VERONICA is a resource based on gopher. It facilitates access to
the information resource saved on gopher’s servers.
Web Services
Web services facilitate exchange of information among applications on the web.
Through web services, applications can simply interact with each other.
The web services are offered using the concept of Utility Computing.
Video Conferencing
Video conferencing or Video teleconferencing is a way of communicating by two-
way video and audio transmission with help of telecommunication technologies.
Multi Point
Such mode of conferencing established connection between more than two
locations via Multipoint Control Unit (MCU).
Internet Protocols
Transmission Control Protocols (TCP)
TCP is basically a connection oriented protocol and offers end-to-end packet delivery. It
acts as a back bone for connection. It exhibits the following key features:
Transmission Control Protocol (TCP) works at the Transport Layer of OSI Model.
TCP is a reliable and connection oriented protocol.
TCP offers:
Stream Data Transfer.
Reliability.
Efficient Flow Control
Full-duplex operation.
Multiplexing.
TCP offers connection oriented end-to-end packet delivery.
TCP ensures reliability by sequencing bytes with a forwarding acknowledgement
number that indicates to the destination the next byte the source expects to receive.
It retransmits the bytes not acknowledged within a specified time period.
TCP Security
TCP facilitates the following services to the processes at the application layer:
Stream Delivery Service
Sending and Receiving Buffers
Bytes and Segments
Full Duplex Service
Connection Oriented Service
Reliable Service
Sending and Receiving Buffers: It may not be possible for the sending and
receiving process to produce and obtain data at same speed, therefore, TCP needs
buffers for storage at sending and receiving ends.
Full Duplex Service: Transmission of the data in duplex mode simply defi nes
the flow of data in both the directions at the same time.
TCP of the first process informs TCP of the second process and gets its
approval.
TCP of the first process and TCP of the second process and exchange data
in both the two directions.
After completion of the exchange of data, when buffers on both of the sides
are empty, the two TCP’s destroy their buffers.
Points to remember:
1. The length of the datagram is variable.
2. The Datagram can be segmented into two parts: header and data.
3. The associated length of its header is around 20 to 60 bytes.
4. The header contains information for routing and delivery of the packet.
Points to remember:
1. UDP is utilized by the application that typically transmits a small quantity of
data at one time.
2. UDP provides protocol port utilized i.e. UDP message consists of both source
and destination port number, that makes it easier for UDP software at the
destination to divert the message to the right application program.
Telnet
Telnet is a protocol used to log in to remote computers on the internet. There are a
number of Telnet clients having user friendly interfaces. The following diagram
elaborates that a person is logged into the computer named A, and from there, he
remotely logged into computer named B:
HTTP Request
HTTP request comprises of lines which contains:
1. Request line
2. Header Fields
3. Message body
Key Points
1. The first line i.e. the Request line specifies the request method i.e. Get or Post.
2. The second line defines the header which reflects the domain name of the server
from where index.htm is retrieved.
HTTP Response
Like HTTP requests, HTTP response also has a certain structure. HTTP response
contains:
1. Status line
2. Headers
3. Message body
While every computer has its own unique address, every user using the Internet has a
unique address called a domain. A domain recognizes one or more IP addresses. An
example of a domain is weather.com and is part of the URL such as https://
www.weather.com. The standard top-level domains are:
mil - Military
There are additional top-level domains that are now recognized on the Internet. They
include:
biz - Businesses
coop - Cooperatives
museum - museums
tv - Television
Browser
A piece of software such as Mozilla Firefox and Internet Explorer that allows a computer
to access and display documents, view pictures, hear sound, and view video clips from
the World Wide Web.
Mail that's electronically transmitted by your computer. As opposed to snail mail, e-mail
sends your messages instantaneously, anywhere in the world. It has the capability to
send messages at any time and to anyone.
The standard method for downloading and uploading files over the Internet. With FTP,
you can login to a server and transfer files (meaning you can "send" or "receive" files).
Homepage
The first page that is viewed when the browser starts. It is also the page of a Web site
that provides the introduction or content with links.
The abbreviation for Hypertext Transfer Protocol. It is the set of rules by which Web
pages are transferred across the Internet.
The Internet is composed of local, regional, national, and worldwide computer networks.
Each computer on the Internet can be identified by a set of unique numbers that is
called an internet protocol (IP) address. The IP address is composed of four different
numbers separated by periods such as 205.134.120.60.
An underlined word(s), phrase(s), or graphics on a Web page that transports the reader
to additional or related information on the Internet.
TelNet
An addressing scheme that is used on the Internet to locate resources and/or services
on the World Wide Web. Basically the URL is the address of a computer file that has
been put on a computer server to access the Internet.
Web Page
Website
Address
Cyberspace
Navigate
The act of moving from page to page and website to website online.
Piracy
Website :
A collection of “pages” or files linked together and available on the world Wide Web.
Attachment:
Chat:
Cyber bullying
Sending or posting harmful or cruel text or images using the internet or other digital
communication devices.
Icons:
Post
Query
A request for information about certain topic. It is what you put in the box when you
type something into the search engine.
Usually defines as a personal or noncommercial web site that uses a dated log format.
Emoticons
Outbox
This is where all of the messages that you send are kept.
Server
Surf
Bookmark:
Hacker:
A popular term for someone who accesses computer information either legally or
illegally.
Spamming
The coded format language used for creating documents on the world wide web and
controlling how web pages appear.
Cookie :
Also known as an HTTP cookie, web cookie, or browser cookie.A small file downloaded
by some web sites to store a packet of information on your browser.
History:
A list of websites the people are using a particular computer have visited.
Netiquette
Plug-in
Softcopy
Domain Name
A name given to the numerical or internet protocol (IP) address of a web site.
Firewall
This is a system that creates a special “wall” used by network servers to separate their
intranet from internet
The standard method computers use to communicate via the world wide web.
Pharming
Phishing
An online scam that uses e-mail to “fish” for users’ private information by imitating
legitimate companies.
Streaming (media)
The exchange of video clips, sounds or other types of media over the internet.
The protocol or conventions that computers use to communicate over the internet.
Zip File
Large files that have been compressed to make them easier to send over the internet
Google Chrome
Microsoft Edge
Apple Safari
Opera
Brave
Vivaldi
DuckDuckgo
Chromium
Epic
2. Bing : Bing is Microsoft’s answer to Google and it was launched in 2009. Bing is the
default search engine in Microsoft’s web browser. At Bing, they are always striving to
make it a better search engine but it’s got a long way to go to give Google competition.
Microsoft’s search engine provides different services including image, web and video
search along with maps. Bing introduced Places (Google’s equivalent is Google My
Business), this is a great platform for business to submit their details to optimise their
search results.
3. Yahoo : Yahoo & Bing compete more with each other than with Google. A
recent report on netmarketshare.com tells us that Yahoo have a market share of 7.68
percent. Although a leader as a free email provider, this is declining significantly though
with their recent acknowledgement that User Details & Passwords where hacked last
year.
4. Baidu : Baidu is the most used search engine in China and was founded in Jan,
2000 by Chinese Entrepreneur, Eric Xu. This web search is made to deliver results for
website, audio files and images. It provides some other services including maps, news,
cloud storage and much more.
5. AOL : Aol.com is also among the top search engines. These are the guys that used
to send out CD’s which you’d load onto your PC to install their browser and modem
software. Once the pre-eminent player they now have a market share of 0.59 percent.
Verizon Communication bought AOL for $4.4 billion. It was started back in 1983 as
Control Video Corporation. It was named America Online in 1991 and in 2009 as AOL
Inc. AOL is a global mass media company which is based in New York. The company
also provides advertising services as AOL Advertising, AOL mail and AOL Platform.
7. Excite : Excite is not widely known but is one that still gets into the top 10.
Excite is an online service portal that provides internet services like email, search
engine, news, instant messaging and weather updates. This also provides us with the
latest trends, topics and search for phrases such as: What can President Trump
actually do?
10. Yandex : Launched in 1997, Yandex is most used search engine in Russia.
Yandex also has a great presence in Ukraine, Kazakhstan, Belarus and Turkey. It
provides services like Yandex Maps, Yandex Music, online translator, Yandex Money
and many other services.
11. Lycos : Lycos has a good reputation in search engine industry. Its key areas
served are email, web hosting, social networking, and entertainment websites.
QZone
Tumblr
Baidu Tieba
Skype
Viber
Sina Weibo
LINE
Snapchat
Telegram
Myspace
Ali Baba.
eBay.
Jingdong.
Zappos.
Rakuten.
Home Depot.
Flipkart.
Snapdeal
Ali Baba
Snanpdeal
Myntra