Unit 3 CN
Unit 3 CN
Internet
• Basics of Internet Architecture
Internet architecture is a meta-network, which refers to a
congregation of thousands of distinct networks interacting with a
common protocol. In simple terms, it is referred as an internetwork
that is connected using protocols. Protocol used is TCP/IP. This
protocol connects any two networks that differ in hardware, software
and design.
• Process
TCP/IP provides end to end transmission, i.e., each and every node
on one network has the ability to communicate with any other node
on the network.
• Layers of Internet Architecture
Internet architecture consists of three layers –
Internet architecture
➢ IP
In order to communicate, we need our data to be encapsulated as
Internet Protocol (IP) packets. These IP packets travel across number
of hosts in a network through routing to reach the destination.
However IP does not support error detection and error recovery, and
is incapable of detecting loss of packets.
➢ TCP
TCP stands for "Transmission Control Protocol". It provides end to
end transmission of data, i.e., from source to destination. It is a very
complex protocol as it supports recovery of lost packets.
➢ Application Protocol
Third layer in internet architecture is the application layer which has
different protocols on which the internet services are built. Some of
the examples of internet services include email (SMTP facilitates
email feature), file transfer (FTP facilitates file transfer feature), etc.
Types of IP Addresses:
Static IP Addresses:
Dynamic IP Addresses:
Types of Domains:
▪ Generic domains (e.g., .com, .edu, .org) serve various
purposes.
▪ Country domains (e.g., .in, .us, .uk) are specific to countries.
▪ Inverse domain mapping helps find a domain name from an IP
address.
Organization of Domain:
▪ DNS databases are organized to efficiently map domain
names to IP addresses.
▪ The root DNS server, top-level domain (TLD) server, and
authoritative name servers work together to resolve domain
names to IP addresses.
How DNS Works:
➢ DNS starts by converting a hostname into an IP address.
➢ It uses a distributed database to store hostnames and their
corresponding IP addresses.
➢ DNS resolvers send requests to DNS servers to fetch IP
addresses.
➢ If a server doesn't have the IP address, it forwards the request
until it's resolved.
➢ Once the IP address is found, it's returned to the resolver,
which completes the request using Internet Protocol.
❖ URL
URL stands for Uniform Resource Locator. It is a reference or address
used to access resources on the internet. A URL is the web address
you type into a web browser's address bar to visit a specific webpage
or resource. URLs are an essential component of the World Wide
Web and are used to locate and retrieve information stored on web
servers. A typical URL consists of several components:
```
https://www.example.com:8080/path/page.html?name=John&age=2
5#section2
```
- Scheme: "https://"
- Host: "www.example.com"
- Port: ":8080" (optional)
- Path: "/path/page.html"
- Query Parameters: "?name=John&age=25"
- Fragment Identifier: "#section2"
Intranet and extranet are two types of private networks that facilitate
communication and collaboration within and between organizations.
They are based on the same underlying technologies as the internet
but are restricted in accessibility to a specific group of users.
❖ Intranet
❖ Extranet
Characteristics:
❖ Characteristics:
➢ TCP/IP Layer
Working of TCP
To make sure that each message reaches its target location intact, the
TCP/IP model breaks down the data into small bundles and afterward
reassembles the bundles into the original message on the opposite
end. Sending the information in little bundles of information makes it
simpler to maintain efficiency as opposed to sending everything in
one go.
After a particular message is broken down into bundles, these bundles
may travel along multiple routes if one route is jammed but the
destination remains the same.
We can see that the message is being broken down, then reassembled
from a different order at the destination
Now, the TCP breaks the data into small packets and forwards it
toward the Internet Protocol (IP) layer. The packets are then sent to
the destination through different routes.
The TCP layer in the user’s system waits for the transmission to get
finished and acknowledges once all packets have been received.
➢ Features of TCP/IP
Some of the most prominent features of Transmission control protocol
are
❖ HTTP Methods:
HTTP defines various methods, also known as verbs, that specify the
action to be performed on a resource:
GET: Retrieves data from the specified resource
POST: Submits data to be processed to the specified resource
PUT: Updates the specified resource with the provided data
DELETE: Removes the specified resource
HEAD: Obtains header information about the specified resource
without fetching the entire resource
OPTIONS: Determines the allowed HTTP methods for the specified
resource
❖ HTTP Status Codes:
HTTP status codes provide information about the outcome of an
HTTP request:
200 Series: Successful responses, indicating the request was
processed successfully
300 Series: Redirection responses, indicating the requested resource
is available at a different location
400 Series: Client error responses, indicating an error occurred on the
client side
500 Series: Server error responses, indicating an error occurred on the
server side
❖ HTTP Headers:
HTTP headers provide additional information about the request and
response, such as:
Content-Type: Specifies the type of data being transmitted (e.g.,
HTML, text, image)
Content-Length: Indicates the size of the data being transferred
Authorization: Provides credentials for accessing protected resources
Accept: Informs the server about the types of data the client can
handle
Referer: Indicates the URL of the resource that linked to the current
resource
❖ HTTP in Web Browsing:
When you enter a website URL into a web browser, the browser
initiates an HTTP GET request to the web server hosting the website.
The server responds with an HTTP response containing the HTML
code for the requested webpage. The browser then parses the HTML
code and renders the webpage for you to view.
HTTP plays a crucial role in enabling seamless data communication
and interaction between web browsers and web servers, forming the
backbone of the World Wide Web.
Features of HTTP:
o Connectionless protocol: HTTP is a connectionless protocol.
HTTP client initiates a request and waits for a response from the
server. When the server receives the request, the server processes
the request and sends back the response to the HTTP client after
which the client disconnects the connection. The connection
between client and server exist only during the current request
and response time only.
o Media independent: HTTP protocol is a media independent as
data can be sent as long as both the client and server know how
to handle the data content. It is required for both the client and
server to specify the content type in MIME-type header.
o Stateless: HTTP is a stateless protocol as both the client and
server know each other only during the current request. Due to
this nature of the protocol, both the client and server do not retain
the information between various requests of the web pages.
Dynamic Host Configuration Protocol (DHCP)
− Dynamic Host Configuration Protocol (DHCP) is a network
protocol that automatically assigns IP addresses and other
network configuration information to devices on a network.
− It operates at the application layer of the TCP/IP protocol stack
and is essential for assigning IP addresses to devices that do not
have static IP addresses configured manually.
Benefits of DHCP
DHCP offers several advantages in managing network configurations:
1. Automatic IP Address Assignment: DHCP eliminates the need
to manually configure IP addresses for each device, saving time
and effort.
2. Centralized Management: A DHCP server can manage a pool of
IP addresses and assign them to devices as needed, simplifying
network administration.
3. Reduced Errors: DHCP reduces the likelihood of IP address
conflicts and ensures that devices have valid network
configurations.
4. Scalability: DHCP can handle a large number of devices on a
network, making it suitable for enterprise environments.
DHCP in Practice