Internet_Programming(IP)_Unit_01
Internet_Programming(IP)_Unit_01
Internet_Programming(IP)_Unit_01
D(CS)] M:9461042842
Following brief contents prepared with help of many resources such as Internet, books, websites, you tube channels etc. and with personal
experience to guide and help the students in their study of Internet Programming subject.
What is INTERNET?
Before understanding of the concept of Internet, let us recall- Network
The word “Internet” is coined from the words Interconnection and Network.
EVOLUTION OF INTERNET
1. In the mid-1960, most of the research organizations used mainframe
computers which were standalone devices. These computers are unable to
communicate with each other.
1974 ( Vin Cerf &B.Kahn gave an idea of connecting dissimilar network with
each other in their research paper)
E-mail
Mail that's electronically transmitted by your computer. As opposed
to snail mail, e-mail sends your messages instantaneously, anywhere
in the world. It has the capability to send messages at any time and to
anyone.
Homepage
The first page that is viewed when the browser starts. It is also the
page of a Web site that provides the introduction or content with links.
TelNet
A terminal emulation protocol (or Internet program) used to connect
a computer to a remote host or server. Telnet is one of the oldest
Internet activities and is primarily used to access online databases
or to read articles stored on university servers.
Uniform Resource Locator (URL)
A URL incorporates the domain name, along with other detailed
information. An addressing scheme that is used on the Internet to
locate resources and/or services on the World Wide Web. Basically the
URL is the address of a computer file that has been put on a computer
server to access the Internet. (https://www.ebc.ac.in) (
https://www.google.com/)
Web Page
A single hypertext file or a page that is part of a Web site.
Website
A collection of interlinked Web pages or files.
Domain
While every computer has its own unique address, every user using the
Internet has a unique address called a domain. A domain recognizes one
or more IP addresses. An example of a domain is weather.com and is part
of the URL such as https://www.weather.com. The standard top-level
domains are:
• com - Commercial business
• edu - Educational institutions
• gov - Government agencies
• mil - Military
• net - Networks organization
• org - Organizations (nonprofit)
There are additional top-level domains that are now recognized on the
Internet. They include:
• aero - Air-transport industry
• biz - Businesses
• coop - Cooperatives
• info - Unrestricted use
• museum - museums
• pro - Accountants, lawyers, physicians, and other professionals
• tv - Television
Some countries use a sub-domain or geographical domain as part of their
address. Fox example, an academic institution such as Oxford University
in the United Kingdom can use ac.uk. An example of a URL with this
domain is http://www.xyzabc.ac.uk/.
Internet Applications
The Internet has many important applications. Of the various services available via the
Internet, the three most important are e-mail, web browsing, and peer-to-peer
services
or participating in the Internet. Internet service providers can be organized in various forms,
such as commercial, community-owned, non-profit, or otherwise privately owned named such
as AT&T, Verizon, Comcast, or BrightHouse that provides Internet access to companies, families, and
even mobile users. ISPs use fiber-optics, satellite, copper wire, and other forms to provide Internet
access to its customers.
ISP Types
ISPs can broadly be classified into six categories as shown in the following diagram:
Access providers
They provide access to internet through telephone lines, cable wi-fi or fiber optics.
Mailbox Provider
Such providers offer mailbox hosting services.
Hosting ISPs
Hosting ISPs offers e-mail, and other web hosting services such as virtual machines, clouds etc.
Virtual ISPs
Such ISPs offer internet access via other ISP services.
Free ISPs
Free ISPs do not charge for internet services.
Connection Types
There exist several ways to connect to the internet. Following are these connection types available:
1. Dial-up Connection
2. ISDN (Integrated Services Digital Network)
3. DSL
4. Cable TV Internet connections
5. Satellite Internet connections
6. Wireless Internet Connections
ISDN
ISDN is acronym of Integrated Services Digital Network. It establishes the connection using the phone lines which carry
digital signals instead of analog signals.
DSL
DSL is acronym of Digital Subscriber Line. It is a form of broadband connection as it provides connection over ordinary
telephone lines.
All of the above mentioned technologies differ in their upload and download speed, bit transfer rate and level of service.
The following diagram shows that how we can connect to internet using DSL technology:
In two way connection, we can download and upload the data by the satellite. It does not require any dialup connection.
The following diagram shows how internet is accessed using satellite internet connection:
• Bluetooth wireless technology makes use of short-wavelength radio waves and helps to create personal area
network (PAN).
• With DSL dropping out of the picture, there's room for a new technology and it's
already here in some areas: it's called fiber, or fiber optical, broadband. Supposedly,
fiber is hundreds times FASTER than cable or DSL. That's especially exciting
news (if it's true and available) to companies, and gamers and households with a lot of
simultaneous wireless usage going on.
• Google launched Google Fiber in 2013, which offers incredibly ultra-fast Internet speed.
• Other companies (and communities) are teaming up to bring the next generation of broadband to
us.
E-mail
E-mail, short for “electronic mail” is one of most widely used forms of
digital communication. It can be used from nearly any device and unlike
paper mail it is delivered nearly instantly.
Basics of E-mail
Fact: More than 200 billion emails are sent every single day.
Every e-mail address has an inbox, where new messages are deposited.
An e-mail message has a status called “unread” which disappears after the e-
mail has been opened.
A typical e-mail inbox will also have a ‘Sent’ folder for viewing messages that
you have sent in the past.
It also will have an ‘Outgoing’ folder, where messages stay until they have
been fully transmitted.
It is also common to have a ‘Drafts’ folder for messages that were started but
never sent, and a ‘Spam’ folder, where unwanted marketing messages will
usually be directed. You can of course setup your own folders and sort your e-
mails however you like.
An E-mail message has a Sender, and it can have multiple recipients. Using
either the To line, the Carbon Copy (CC) or Blind Carbon Copy (BCC) – e-
mails are delivered to the addresses listed in those fields. The e-mail has a
subject line, a message body, and it can have file attachments.
Origin of E-mail
The origins of e-mail date back as far as the 1960’s, when the Massachussets
Institute of Technology (MIT) invented something called the “MAILBOX”
for sending text between computer terminals on a single mainframe.
The late 1980’s saw the rise of the personal computer (PC), and local-area
network (LAN) ‘electronic mail’ became common within corporate networks.
In the early 1990’s, e-mail was a well established concept and came bundled
in most internet service packages. So e-mail has existed for as long as the
internet has, and perhaps is very reason the internet exists in the first place!
E-mail works in a fashion similar to traditional paper mail. When you put a
letter in your mailbox, it does not get taken directly to the recipient. First it gets
brought to your local post office, where the post office employees figure out
where your mail is going to be sent. They decide which destination post office
has the mail route to deliver the message to the recipient. So the trail of the
message goes from your mailbox to your post office, and then to another post
office, and finally to the recipient. The letter might even
travel across multiple post offices before being sent on the final delivery
route.
This same process approximately happens in e-mail. A mail client sends the
message to your mail server (which is owned by the website listed after the @
symbol) and that gets sent by a “mail transfer agent” to a mail exchanger
(MX), then to a mail delivery agent (MDA), and finally to the recipient’s
inbox.
While this sounds complicated, this all happens behind the scenes. An
interesting fact is that the modern global postal system uses machine vision
and coded numbers for routing mail and packages, and might be considered
more complicated than e-mail.
Don’t worry too much about how e-mail infrastructure works. The import
concept to understand is that your e-mail inbox relies on a mail server, which
is run by the website listed after the @ character. So if you have a business e-
mail address, the company owns and operates a mail server to handle your
messages. Or if you use the e-mail provided to you by your internet service
provider, then they are the ones who own and operate your mail server. Or
you could perhaps setup your own website, and pay for a web host to run a mail
server for you.
Protocols Used:
If you are setting up your own e-mail, you might be asked whether you are using POP(Post
Office Protocol ), IMAP(Internet Message Access Protocol), or Exchange.
These are just different e-mail encoding methods, you will need to ask your e-mail provider
which one is used, and what Simple Mail Transfer Protocol (SMTP) address to use. Every e-
mail server will have an SMTP incoming address and outgoing address, as well as a “port
number.”
IMAP and POP are the two most commonly used Internet mail protocols for retrieving emails.
Both protocols are supported by all modern email clients and web servers. While the POP
protocol assumes that your email is being accessed only from one application, IMAP allows
simultaneous access by multiple clients.
• Send a message anytime, anywhere and the recipient can read it at his or
her convenience.
• Send the same message to multiple recipients.
• Forward information without retyping it.
• Send messages fast, usually taking no more than a few seconds to be
received.
• Attach digital files to your messages, including electronic documents,
video clips, music and photos.
• Send messages around the world as easily as to someone down the
block.
• Communicate from any device: computer, tablet, smartphone, even
some watches.
E-mail has revolutionized the way people communicate. Whereas once it took
days to send a letter across the country, now you can send a note to someone
across the world in a matter of seconds. That means correspondences can now
happen in near-real time, businesses can collaborate from any location, and
families can keep in touch from around the world.
Standard Fields
• To: contains the e-mail address of the recipient, and tells your mail
Optional Fields
• CC:, short for Carbon Copy, contains the e-mail addresses of people
other than the primary recipients.
• BCC:, short for Blind Carbon Copy, contains the e-mail addresses of
other recipients who receive copies, but their names and addresses are
hidden from all other recipients.
• Attachments contain the names of files that you may be sending, for
example, a Word document or a photo.
• From: This field will contain your own e-mail address. You should not
have to touch it unless you have more than one e-mail account set up and
need to switch between them.
E-mail Protocols
E-mail Protocols are set of rules & regulations that help the client to properly transmit the information to or from
the mail server. E-mails protocols are SMTP,POP, and IMAP.
• SMTP stands for Simple Mail Transfer Protocol. It was first proposed in 1982. It is a standard protocol used for
sending e-mail efficiently and reliably over the internet.
• Apart from transferring e-mail, SMPT also provides notification regarding incoming mail.
• SMTP commands specify the sender’s and receiver’s e-mail address, along with the message to be send.
• The exchange of commands between servers is carried out without intervention of any user.
• In case, message cannot be delivered, an error report is sent to the sender which makes SMTP a reliable
protocol.
SMTP Commands
The following table describes some of the SMTP commands:
1 HELLO
This command initiates the SMTP conversation.
2 EHELLO
This is an alternative command to initiate the conversation. ESMTP indicates that the sender server wants to use
extended SMTP protocol.
3 MAIL FROM
This indicates the sender’s address.
4 RCPT TO
It identifies the recipient of the mail. In order to deliver similar message to multiple users this command can be
repeated multiple times.
5 SIZE
This command let the server know the size of attached message in bytes.
6 DATA
The DATA command signifies that a stream of data will follow. Here stream of data refers to the body of the
message.
7 QUIT
This commands is used to terminate the SMTP connection.
8 VERFY
This command is used by the receiving server in order to verify whether the given username is valid or not.
9 EXPN
It is same as VRFY, except it will list all the users name when it used with a distribution list.
IMAP
IMAP stands for Internet Message Access Protocol. It was first proposed in 1986. There exist five versions of IMAP as
follows:
1. Original IMAP
2. IMAP2
3. IMAP3
4. IMAP2bis
5. IMAP4
• IMAP allows the client program to manipulate the e-mail message on the server without downloading them on
the local computer.
• It enables us to take any action such as downloading, delete the mail without reading the mail.It enables us to
create, manipulate and delete remote message folders called mail boxes.
IMAP Commands
The following table describes some of the IMAP commands:
1 IMAP_LOGIN
This command opens the connection.
2 CAPABILITY
This command requests for listing the capabilities that the server supports.
3 NOOP
This command is used as a periodic poll for new messages or message status
updates during a period of inactivity.
4 SELECT
This command helps to select a mailbox to access the messages.
5 EXAMINE
It is same as SELECT command except no change to the mailbox is permitted.
6 CREATE
It is used to create mailbox with a specified name.
7 DELETE
It is used to permanently delete a mailbox with a given name.
8 RENAME
It is used to change the name of a mailbox.
9 LOGOUT
This command informs the server that client is done with the session. The server
must send BYE untagged response before the OK response and then close the
network connection.
POP
POP stands for Post Office Protocol. It is generally used to support a single client. There are several versions of POP but
the POP 3 is the current standard.
• Since POP supports offline access to the messages, thus requires less internet usage time.
• POP commands are generally abbreviated into codes of three or four letters. Eg. STAT.
POP Commands
The following table describes some of the POP commands:
1 LOGIN
This command opens the connection.
2 STAT
It is used to display number of messages currently in the mailbox.
3 LIST
It is used to get the summary of messages where each message summary is shown.
4 RETR
This command helps to select a mailbox to access the messages.
5 DELE
It is used to delete a message.
6 RSET
It is used to reset the session to its initial state.
7 QUIT
It is used to log off the session.
3 POP does not allow search facility. It offers ability to search emails.
5 Only one mailbox can be created on the Multiple mailboxes can be created on
server. the server.
6 Not suitable for accessing non-mail data. Suitable for accessing non-mail data
i.e. attachment.
10 The e-mails are not downloaded Users can view the headings and
automatically. sender of e-mails and then decide to
download.
10 POP requires less internet usage time. IMAP requires more internet usage
time.
E-mail System
• Mailer
• Mail Server
• Mailbox
Mailer
It is also called mail program, mail application or mail client. It allows us to manage, read and compose e-mail.
Mailboxes
Mailbox is generally a folder that contains emails and information about them.
Working of E-mail
Email working follows the client server approach. In this client is the mailer i.e. the mail application or mail program and server is a
device that manages emails.
Following example will take you through the basic steps involved in sending and receiving emails and will give you a better
understanding of working of email system:
• Person A composes the messages using a mailer program i.e. mail client and then select Send option.
• The message is routed to Simple Mail Transfer Protocol to person B’s mail server.
• The mail server stores the email message on disk in an area designated for person B.
• Now, suppose person B is running a POP client and knows how to communicate with B’s mail server.
• It will periodically poll the POP server to check if any new email has arrived for B.As in this case, person B has sent an
email for person B, so email is forwarded over the network to B’s PC. This is message is now stored on person B’s PC.
The following diagram gives pictorial representation of the steps discussed above:
MIME Types
MIME is acronym of Multipurpose Internet Mail Extensions. MIME compliant mailer allows us to send files other than simple text
i.e. It allows us to send audio, video, images, document, and pdf files as an attachment to an email.
Suppose if you want to send a word processor document that has a group of tabular columns with complex formatting. If we
transfer the file as text, all the formatting may be lost. MIME compliant mailer takes care of messy details and the message arrives
as desired.
E-mail Hacking
• Spam
• Virus
• Phishing
Spam
E-mail spamming is an act of sending Unsolicited Bulk E-mails (UBI) which one has not asked for. Email spams are the junk
mails sent by commercial companies as an advertisement of their products and services.
Virus
Some emails may incorporate with files containing malicious script which when run on your computer may lead to destroy your
important data.
Phishing
Email phishing is an activity of sending emails to a user claiming to be a legitimate enterprise. Its main purpose is to steal sensitive
information such as usernames, passwords, and credit card details.
Such emails contains link to websites that are infected with malware and direct the user to enter details at a fake website whose
look and feels are same to legitimate one.
Email spamming is an act of sending Unsolicited Bulk E-mails (UBI) which one has not asked for. Email spams are the junk mails
sent by commercial companies as an advertisement of their products and services.
• It floods your e-mail account with unwanted e-mails, which may result in loss of important e-mails if inbox is full.
• Time and energy is wasted in reviewing and deleting junk emails or spams.
• Some unsolicited email may contain virus that can cause harm to your computer.
Blocking Spams
Following ways will help you to reduce spams:
• While posting letters to newsgroups or mailing list, use a separate e-mail address than the one you used for your
personal e-mails.
• Don’t give your email address on the websites as it can easily be spammed.
• Avoid replying to emails which you have received from unknown persons.
In order to have light weighted Inbox, it’s good to archive your inbox from time to time. Here I will discuss the steps to clean up and
archive your Outlook inbox.
• Select Archive this folder and all subfolders option and then click on the folder that you want to archive. Select the
date from the Archive item
Mailing List
• Internet offers people all around the world to communicate with each other via E-mail.
• The use of e-Mail can be extended by grouping people who are interested in discussing
a particular topic of interest. This facility is provided by an internet service Known as
the mailing list or the internet Group or simply the list.
• Mailing list provides a way for group of Internet users to have public discussion on a
specific topic through the use of e-Mail.
• If you want to take part in the discussion in mailing list then you have to first subscribe
to a mailing list. Once subscribed then your name and e-mail address is automatically
added to the mailing list and you will start receiving mails about the subject with
automatically by the mailing list management software. You can also send a response
to the mail.
Announcements
These lists are created for sending out coupons, new product announcements and other offers to
the customers.
Discussion List
This list is created for sharing views on a specific topic such as computer, environment , healt,
education etc.
• After sending the email, you will receive a confirmation email for your subscription.
This email will include list of commands that will help you to perform various operations
such as unsubscribing, receiving acknowledgement, and find out what list you are
subscribed to.
• There are many list servers available, each having its own commands for subscribing to
the list. Some of them are described in the following table: