Web & Internet Technology Notes
Web & Internet Technology Notes
TCP is one of the most common protocols that ensure end-to-end delivery. It
guarantees the security and integrity of the data being transmitted. It always
establishes a secure connection between the sender and receiver. The transmitter is
the server, and the receiver is known as the client. We can also say that the data
transmission occurs between the server and client. Hence, TCP is used in most of the
high-level protocols, such as FTP (File Transfer Protocol), HTTP (Hyper Text Transfer
Protocol), and SMTP (Simple Mai Transfer Protocol).
TCP termination process with the help of six steps that includes the sent requests and
the waiting states. The steps are as follows:
Step 1: FIN
FIN refers to the termination request sent by the client to the server. The first FIN
termination request is sent by the client to the server. It depicts the start of the
termination process between the client and server.
Step 2: FIN_ACK_WAIT
The client waits for the ACK of the FIN termination request from the server. It is
a waiting state for the client.
Step 3: ACK
The server sends the ACK (Acknowledgement) segment when it receives the FIN
termination request. It depicts that the server is ready to close and terminate the
connection.
Step 4: FIN _WAIT_2
The client waits for the FIN segment from the server. It is a type of approved signal
sent by the server that shows that the server is ready to terminate the connection.
Step 5: FIN
The FIN segment is now sent by the server to the client. It is a confirmation signal that
the server sends to the client. It depicts the successful approval for the termination.
Step 6: ACK
The client now sends the ACK (Acknowledgement) segment to the server that it has
received the FIN signal, which is a signal from the server to terminate the connection.
As soon as the server receives the ACK segment, it terminates the connection.
Difference between OSI Model and TCP/IP Model
Parameters OSI Model TCP/IP Model
Reliability It is less reliable than TCP/IP Model. It is more reliable than OSI Model.
A TCP endpoint is a combination of an IP address and a port number that identifies a specific
process or service running on a computer or other network device. It is used to establish and
manage an end-to-end connection between two applications, typically over the Internet.
The diagram of a successful TCP connection showing the three handshakes is shown below:
In active FTP, client establishes the In passive FTP, both the command
command channel and the server establishes channel and the data channel are
the data channel. established by the client.
Active FTP provides security to the FTP Passive FTP does not provide security to
server. the FTP server.
Active FTP may cause problems because of Passive FTP does not have connection
firewalls. issues from firewalls.
Active mode is not used as a default mode of Passive mode is used as a default mode of
a browser. a browser.
FTP client acknowledges on data channel. FTP server acknowledges on data channel.
TCP UDP
Header size The size of TCP is 20 bytes. The size of the UDP is 8 bytes.
Acknowledgment TCP uses the three-way- UDP does not wait for any
handshake concept. In this acknowledgment; it just sends
concept, if the sender receives the data.
the ACK, then the sender will
send the data. TCP also has the
ability to resend the lost data.
Flow control It follows the flow control This protocol follows no such
mechanism mechanism in which too many mechanism.
packets cannot be sent to the
receiver at the same time.
Error checking TCP performs error checking by It does not perform any error
using a checksum. When the checking, and also does not
data is corrected, then the data resend the lost data packets.
is retransmitted to the receiver.
Telnet
Telnet is a standard TCP/IP protocol for providing virtual terminal services standardized by
ISO. In this protocol, the client-server first sets up a connection link with the remote server
and then keystrokes from the user’s keyboard are transferred directly to the remote computer,
which looks like the keystrokes were passed from the keyboard connected to the machine. The
result is also carried back to the user from the remote machine. The process is considered to
be transparent to the users because it seems like the user is directly attached to the remote
machine. The remote machine is identified by Telnet client software through defining either of
its IP address or domain name.
BASIS FOR
TELNET FTP
COMPARISON
Basic It allows a user to log in to the It allows a user to transfer a file to the
number
concerns.
resources.
than 8 byte.
User data is sprinkled in the band long with telnet control information above the
The user joins the server beside using the TCP protocol, so that means like the
PuTTY and plink: CLI, which is free and provides SSH,rlogin, Telnet, and raw
TCP client for Unix, Linux, and windows.
Line Mode Browser
Van Dyke Softwares SecureCRT
Georgia SoftWorks GSW ConnectBot.
ZOC Terminal
SyncTERM BBS terminal: A program that supports SSHv2, RLogin, Telnet,
Serial, *nix, Windows and Mac OS X platforms and other BBS terminal
emulations
NetRunner BBS telnet client: used mainly for ANSI-BBS. SDL2 oriented
emulation engine is employed to offer largely accurate and transparent
emulation.
NCSA Telnet
TeraTerm
Rtelnet: It is a SOCKS version of telnet, given the comparable functionality of
telnet for its hosts falling behind a firewall.
Terminal emulator RUMBA
Inetutils: It over again comprises a telnet client and server.
exe: another CLI utility included in a default installation of Microsoft Windows
OS.
Advantages of Telnet
Disadvantages of Telnet
The Telnet client enables a TCP/IP user to sign on and use applications on a remote system by
using a Telnet server application. Telnet allows you to log on to the remote computer and use it
1. Malware
2. Emotet
3. Denial of Service
5. Phishing
6. SQL Injection
7. Password Attacks
What is an Intranet?
A part of the network, but controlled and used by a private organisation, Intranet has
restrictions and can support only fewer users. Hence, only limited data can be shared
over it. Intranet is usually operated on a client/server platform. This enables the
organisations to share files, data, organise information, manage and share calendars,
files, etc.
INTERNET INTRANET
Can be widely accessed and used Company or organisation employees or admin with
access to login details can only use this
More data or information can be accessed or Data or information accessible over intranet will be
availed limited and specific to the company records or details
o Dial-up connection
o ISDN
o Leased Line or TI/T3 connections
o DSL
o Cable TV Internet connections
o Satellite Internet Connections
o Wireless Internet Connections
Client
A client is a program that runs on the local machine requesting service from the
server. A client program is a finite program means that the service started by the user
and terminates when the service is completed.
Server
A server is a program that runs on the remote machine providing services to the
clients. When the client requests for a service, then the server opens the door for the
incoming requests, but it never initiates the service.
A server program is an infinite program means that when it starts, it runs infinitely
unless the problem arises. The server waits for the incoming requests from the
clients. When the request arrives at the server, then it responds to the request.
o Centralized: Centralized back-up is possible in client-server networks, i.e., all the data
is stored in a server.
o Security: These networks are more secure as all the shared resources are centrally
administered.
o Performance: The use of the dedicated server increases the speed of sharing
resources. This increases the performance of the overall system.
o Scalability: We can increase the number of clients and servers separately, i.e., the
new element can be added, or we can add a new node in a network at any time.
What is TCP?
Transmission Control Protocol (TCP) is a communications standard that enables
application programs and computing devices to exchange messages over a network. It
is designed to send packets across the internet and ensure the successful delivery of
data and messages over networks.
TCP is one of the basic standards that define the rules of the internet and is included
within the standards defined by the Internet Engineering Task Force (IETF). It is one of
the most commonly used protocols within digital network communications and ensures
end-to-end data delivery.
TCP organizes data so that it can be transmitted between a server and a client. It
guarantees the integrity of the data being communicated over a network. Before it
transmits data, TCP establishes a connection between a source and its destination,
which it ensures remains live until communication begins. It then breaks large amounts
of data into smaller packets, while ensuring data integrity is in place throughout the
process.
What is IP?
The Internet Protocol (IP) is the method for sending data from one device to another
across the internet. Every device has an IP address that uniquely identifies it and
enables it to communicate with and exchange data with other devices connected to the
internet. Today, it’s considered the standard for fast and secure communication directly
between mobile devices.
IP is responsible for defining how applications and devices exchange packets of data
with each other. It is the principal communications protocol responsible for the formats
and rules for exchanging data and messages between computers on a single network or
several internet-connected networks. It does this through the Internet Protocol Suite
(TCP/IP), a group of communications protocols that are split into four abstraction layers.
IP is the main protocol within the internet layer of the TCP/IP. Its main purpose is to
deliver data packets between the source application or device and the destination using
methods and structures that place tags, such as address information, within data
packets.
1. Datalink layer: The datalink layer defines how data should be sent, handles the
physical act of sending and receiving data, and is responsible for transmitting
data between applications or devices on a network. This includes defining how
data should be signaled by hardware and other transmission devices on a
network, such as a computer’s device driver, an Ethernet cable, a network
interface card (NIC), or a wireless network. It is also referred to as the link layer,
network access layer, network interface layer, or physical layer and is the
combination of the physical and data link layers of the Open Systems
Interconnection (OSI) model, which standardizes communications functions on
computing and telecommunications systems.
2. Internet layer: The internet layer is responsible for sending packets from a
network and controlling their movement across a network to ensure they reach
their destination. It provides the functions and procedures for transferring data
sequences between applications and devices across networks.
3. Transport layer: The transport layer is responsible for providing a solid and
reliable data connection between the original application or device and its
intended destination. This is the level where data is divided into packets and
numbered to create a sequence. The transport layer then determines how much
data must be sent, where it should be sent to, and at what rate. It ensures that
data packets are sent without errors and in sequence and obtains the
acknowledgment that the destination device has received the data packets.
4. Application layer: The application layer refers to programs that need TCP/IP to
help them communicate with each other. This is the level that users typically
interact with, such as email systems and messaging platforms. It combines the
session, presentation, and application layers of the OSI model.
Introduction to TELNET
TELNET stands for Teletype Network. It is a type of protocol that enables one
computer to connect to the local computer. It is used as a standard TCP/IP
protocol for virtual terminal service which is provided by ISO. The computer which
starts the connection is known as the local computer.
The computer which is being connected to i.e. which accepts the connection known
as the remote computer.
During telnet operation, whatever is being performed on the remote computer will be
displayed by the local computer. Telnet operates on a client/server principle. The
local computer uses a telnet client program and the remote computers use a telnet
server program
Daemon Meaning
A daemon is a program that runs continuously in the background of a multitasking
operating system, meaning that daemons are not under the user’s direct control. A
specific action or event activates daemons. Most daemon file names end with the
letter d.
While scripts like init or systemd start most daemons when a system boots up, some
start manually. Examples of manually triggered daemons are:
Daemon vs Process
As explained above, a daemon is a non-interactive program. It runs all the time, and
it’s not connected to the terminal. Even when you close the terminal, the operating
system will not stop the daemon as it will run in the background.
On the other hand, a process will stop when the terminal closes because it is
an executing program instance.
Terminal Emulator
Terminal Emulator is any hardware and/or software that allows a PC to operate as a terminal
and connect to a back-end mainframe or terminal server. Terminal emulators can be
designed to emulate specific terminal modes such as ANSI, VT52, VT100, VT220, TN3270,
or TN5250.
What is a Browser?
A browser is a software program that is used to explore, retrieve, and display the
information available on the World Wide Web. This information may be in the form
of pictures, web pages, videos, and other files that all are connected via hyperlinks
and categorized with the help of URLs (Uniform Resource Identifiers). For example,
you are viewing this page by using a browser.
o The WorldWideWeb was the first web browser. It was created by W3C Director Tim
Berners-Lee in 1990. Later, it was renamed Nexus to avoid confusion caused by the
actual World Wide Web.
o The Lynx browser was a text-based browser, which was invented in 1992. It was not
able to display the graphical content.
o Although, the first graphical user interface browser was NCSA Mosaic. It was the first
most popular browser in the world, which was introduced in 1993.
o In 1994, there were some improvements occurred in Mosaic and came to Netscape
Navigator.
o In 1995, Microsoft introduced the Internet Explorer It was the first web browser
developed by Microsoft.
o A research project started on Opera in 1994. Later, it was publicly introduced in 1996.
o Apple's Safari browser was introduced in 2003. It was specifically released for
Macintosh computers.
o In 2004, Mozilla introduced Firefox as Netscape Navigator.
o In 2007, a browser Mobile Safari was released as Apple mobile web browser.
o The popular browser Google Chrome was launched in 2008.
o The fast-growing mobile-based browser Opera Mini was released in 2011.
o The Microsoft Edge browser was launched in 2015.
1. Refresh button: Refresh button allows the website to reload the contents of the web
pages. Most of the web browsers store local copies of visited pages to enhance the
performance by using a caching mechanism. Sometimes, it stops you from seeing the
updated information; in this case, by clicking on the refresh button, you can see the
updated information.
2. Stop button: It is used to cancel the communication of the web browser with the
server and stops loading the page content. For example, if any malicious site enters
the browser accidentally, it helps to save from it by clicking on the stop button.
3. Home button: It provides users the option to bring up the predefined home page of
the website.
4. Web address bar: It allows the users to enter a web address in the address bar and
visit the website.
5. Tabbed browsing: It provides users the option to open multiple websites on a single
window. It helps users to read different websites at the same time. For example, when
you search for anything on the browser, it provides you a list of search results for your
query. You can open all the results by right-clicking on each link, staying on the same
page.
6. Bookmarks: It allows the users to select particular website to save it for the later
retrieval of information, which is predefined by the users.
For example:
http://www.unc.edu/home.html
Websites Publishing
Previous Page
Next Page
Website publishing is the process of uploading content on the internet. It includes:
uploading files
updating web pages
posting blogs
Website is published by uploading files on the remote server which is provided by the hosting
company.
Internet Connection
Internet connection is required to connect to a remotely located web server.
Web Server
Web server is the actual location where your website resides on. A web server may host
single or multiple sites depending on what hosting service you have paid for.
websites Hosting
Previous Page
Next Page
Overview
Web hosting is a service of providing online space for storage of web pages. These web
pages are made available via World Wide Web. The companies which offer website hosting
are known as Web hosts.
The servers on which web site is hosted remain switched on 24 x7. These servers are run by
web hosting companies. Each server has its own IP address. Since IP addresses are difficult
to remember therefore, webmaster points their domain name to the IP address of the server
their website is stored on.
It is not possible to host your website on your local computer, to do so you would have to
leave your computer on 24 hours a day. This is not practical and cheaper as well. This is
where web hosting companies comes in.
Types of Hosting
The following table describes different types of hosting that can be availed as per the need:
1. Shared Hosting
In shared hosting, the hosting company puts thousand of website on the same physical server.
Each customer has their own allocation of physical web space and a set of bandwidth limit. As all
websites share same physical memory, MYSQL server and Apache server, one website on the
server experiencing high traffic load will affect performance of all websites on the server.
3. Dedicated Server
In this kind of hosting, single dedicated server is setup for just one customer. It is commonly used
by the businesses that need the power, control and security that a dedicated server offers.
4. Reseller Hosting
A reseller acts as a middle man and sells hosting space of someone else’s server.
5. Grid Hosting
Instead of utilizing one server, Grid Hosting spreads resources over a large number of servers. It is
quite stable and flexible. The servers can be added or taken away from the grid without crashing
the system.
1. Blue Host
2. Go Daddy
3. Host Gator
4. just Host
5. Laughing Squid
6. Hivelocity
7. liquid Web
8. Media TempleServInt
9. Wired Tree
11. Wix
12. WIPL
1. Security updates
Plugins and themes help to extend the functionality of your website. But like any
software, they need to be kept up-to-date to ensure compatibility with the latest web
browsers and security patches.
3. Content updates
Your website's content should be kept up-to-date to ensure that it is relevant and
accurate. This includes adding new blog posts, updating product descriptions, and
removing outdated content. Outdated content can make your site look
unprofessional and can turn away potential customers.
Having a recent backup of your website is important in case something goes wrong.
Disaster recovery planning helps ensure that you can quickly get your website back
up and running in the event of a major problem. A backup helps to prevent data loss
and ensures that you can restore your site if it's ever hacked or corrupted.
Monitoring your website's performance can help you identify potential problems and
take steps to keep your site running smoothly. Optimizing your website's
performance can help improve your site's speed and responsiveness. It entails the
tasks of improving web page loading times, optimizing image sizes, and minifying
code.
6. Security scanning
Security scanning is important in web maintenance to ensure that the site is secure
from any potential threats. Regularly scanning the website can identify and fix
security vulnerabilities before they cause any damage. This helps to protect both the
website and its users from potential harm.
Scanning the website also helps to improve the user experience. By identifying and
fixing potential security vulnerabilities, users can be assured that their personal
information is safe when using the website.
Introduction
Search Engine refers to a huge database of internet resources such as web pages,
newsgroups, programs, images etc. It helps to locate information on World Wide Web.
User can search for any information by passing query in form of keywords or phrase. It then
searches for relevant information in its database and return to the user.
Web crawler
It is also known as spider or bots. It is a software component that traverses the web to gather
information.
Database
All the information on the web is stored in database. It consists of huge web resources.
Search Interfaces
This component is an interface between user and the database. It helps the user to search
through the database.
Examples
Following are the several search engines available today:
Search Description
Engine
Google It was originally called BackRub. It is the most popular search engine globally.
Bing It was launched in 2009 by Microsoft. It is the latest web-based search engine that also
delivers Yahoo’s results.
Ask It was launched in 1996 and was originally known as Ask Jeeves. It includes support for
match, dictionary, and conversation question.
AltaVista It was launched by Digital Equipment Corporation in 1995. Since 2003, it is powered
by Yahoo technology.
LYCOS It is top 5 internet portal and 13th largest online property according to Media Matrix.
Alexa It is subsidiary of Amazon and used for providing website traffic information.
Internet Security
Previous Page
Next Page
Introduction
Internet security refers to securing communication over the internet. It includes specific
security protocols such as:
Internet Security Protocol (IPSec)
Secure Socket Layer (SSL)
Internet Security Protocol (IPSec)
It consists of a set of protocols designed by Internet Engineering Task Force (IETF). It
provides security at network level and helps to create authenticated and confidential packets
for IP layer.
Secure Socket Layer (SSL)
It is a security protocol developed by Netscape Communications Corporation. ). It provides
security at transport layer. It addresses the following security issues:
Privacy
Integrity
Authentication
Threats
Internet security threats impact the network, data security and other internet connected
systems. Cyber criminals have evolved several techniques to threat privacy and integrity of
bank accounts, businesses, and organizations.
Following are some of the internet security threats:
Mobile worms
Malware
PC and Mobile ransomware
Large scale attacks like Stuxnet that attempts to destroy infrastructure.
Hacking as a Service
Spam
Phishing
Email Phishing
Email phishing is an activity of sending emails to a user claiming to be a legitimate
enterprise. Its main purpose is to steal sensitive information such as usernames, passwords,
and credit card details.
Such emails contains link to websites that are infected with malware and direct the user to
enter details at a fake website whose look and feels are same to legitimate one.
Firewall Security
Previous Page
Next Page
Firewall is a barrier between Local Area Network (LAN) and the Internet. It allows keeping
private resources confidential and minimizes the security risks. It controls network traffic, in
both directions.
The following diagram depicts a sample firewall between LAN and the internet. The
connection between the two is the point of vulnerability. Both hardware and the software can
be used at this point to filter network traffic.
There are two types of Firewall system: One works by using filters at the network layer and the
other works by using proxy servers at the user, application, or network layer.
Key Points
Firewall management must be addressed by both system managers and the
network managers.
The amount of filtering a firewall varies. For the same firewall, the amount of
filtering may be different in different directions.
1) What is the role of TCP ? How packet/data is transferred from end-to-
end user ? Explain.
TCP organizes data so that it can be transmitted between
a server and a client. It guarantees the integrity of the data
being communicated over a network.
TCP 3-Way Handshake Process read for end to end user
2) What is crawling ?
Crawling refers to following the links on a page to new pages, and continuing
to find and follow links on new pages to other new pages
5) Discuss terminal Emula(on. Also write down the port number of FTP.
A terminal emulator, or terminal application, is a computer
program that emulates a video terminal within some other display architecture. Though
typically synonymous with a shell or text terminal, the term terminal covers all remote
terminals, including graphical interfaces
FTP uses ports 20 and 21 to transfer files between a client and a server.
1) Class A address
2) Class B address
3) Class C address
4) Class D address
5) Class E address
Class A Address
The first bit of the first octet is always set to zero. So that the first octet ranges from
1 – 127. The class A address only include IP starting from 1.x.x.x to 126.x.x.x. The IP
range 127.x.x.x is reserved for loop back IP addresses. The default subnet mask for
class A IP address is 255.0.0.0. This means it can have 126 networks (27-2) and
16777214 hosts (224-2). Class A IP address format is
thus: 0NNNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH.
Class B Address
Here the first two bits in the first two bits is set to zero. Class B IP Addresses range
from 128.0.x.x to 191.255.x.x. The default subnet mask for Class B is 255.255.x.x.
Class B has 16384 (214) Network addresses and 65534 (216-2) Host addresses. Class
B IP address format is: 10NNNNNN.NNNNNNNN.HHHHHHHH.HHHHHHHH
Class C Address
The first octet of this class has its first 3 bits set to 110. Class C IP addresses range
from 192.0.0.x to 223.255.255.x. The default subnet mask for Class C is
255.255.255.x. Class C gives 2097152 (221) Network addresses and 254 (28-2) Host
addresses. Class C IP address format
is: 110NNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH
Class D Address
The first four bits of the first octet in class D IP address are set to 1110. Class D has
IP address rage from 224.0.0.0 to 239.255.255.255. Class D is reserved for
Multicasting. In multicasting data is not intended for a particular host, but multiple
ones. That is why there is no need to extract host address from the class D IP
addresses. The Class D does not have any subnet mask.
Class E Address
The class E IP addresses are reserved for experimental purpose only for R&D or
study. IP addresses in the class E ranges from 240.0.0.0 to 255.255.255.254. This
class too is not equipped with any subnet mask.
7) IPv6 follows the key design principles of IPv4 and so that the transition from IPv4
to IPv6 is smoother.
SMTP Protocol :
SMTP stands for Simple Mail Transfer Protocol. SMTP is the principal email protocol that
is responsible for the transfer of emails between email clients and email servers