The-Internet
The-Internet
Web programming
Web programming refers to the writing, markup and coding involved in Web
development, which includes Web content, Web client and server scripting and
network security
Intranet
Intranet is a local or restricted communications network, especially a private
network created using World Wide Web software.
Extranet
an intranet that can be partially accessed by authorized outside users, enabling businesses to
exchange information over the internet in a secure way.
The first version of the Internet was In the beginning WWW was known
9 known as ARPANET. as NSFNET.
Following are the important differences between Web Browser and Web
Server.
Process A web browser sends request to Web server sees and approves those
2 server for web based documents requests made by web browsers and
and services. sends the document in response.
Process Web browser sends an HTTP Web server receives HTTP Request
3 Request and gets a HTTP and sends a HTTP Response.
Response.
Processing Web browser has no processing Web server follows three major
4 Model model. processing models: process based,
thread based or hybrid.
Data Web browsers stores user data in Web server provide an area to store
5
Storage cookies in local machine. the website.
Telnet
Telnet is a computer protocol that provides two-way interactive communication
compatibility for computers on the internet and local area networks.
Advantage of telnet
➨It can be used to send/receive information.
➨It helps in administration of the network elements.
➨It supports user authentication.
➨All the telnet clients and servers implement a network virtual terminal (NVT).
➨Automation test facilities are used by remote computers on shared basis. This
saves cost by limiting costly test equipments/facilities at selected locations for all
the users across the world
Http
The Hypertext Transfer Protocol (HTTP) is application-level protocol for
collaborative, distributed, hypermedia information systems.
Feature of http
TCP
TCP stands for Transmission Control Protocol is a communications standard that
enables application programs and computing devices to exchange messages over a
network.
Adressing
Tow way
1.IP address
2.Url
Difference between ip and url
Parameters
of URL IP Address
Comparison
A URL is a uniform resource
An IP address is representative
Definition locator that represents a web
of a unique system.
server or a website.
Web server
Web server is a computer where the web content is stored. Basically web server is
used to host the web sites but there exists other web servers also such as gaming,
storage, FTP, email etc.
Features of Web Server:
1) Web Server can support to enlarge data storage, so it makes it capable to make
multiple websites.
2) Easy to configure log file set up which enables to hold all log files. Log files
helps to analyze web traffic.
3) It helps to control bandwidth that regulates network traffic, due to which it can
avoid the down time while flowing high volume web traffic.
4) Easy to make FTP websites which helps to move enlarged files from one site to
other site.
6) Easy to make virtual directories, and helps to map them along with physical
directories.
Sudden spikes in site traffic. When too many people attempt to visit your
web site at the same time, it can cause your server to become overload. An
example of this is when concert tickets go on sale, and the web site crashes
soon after. Spikes in traffic can be short-term, but the effects on your
attacks are attacks launched by hackers for the purpose of making a server
unavailable for its intended users. By flooding the network with false
requests, hackers crash the server and cause it to deny the real requests.
firewall
A firewall is a network security device that monitors incoming and outgoing
network traffic and decides whether to allow or block specific traffic based on a
defined set of security rules.
bastion host
A bastion host is a server whose purpose is to provide access to a private network
from an external network, such as the Internet. Because of its exposure to potential
attack, a bastion host must minimize the chances of penetration.
Packet filtering
Proxy service
Stateful inspection
Traffic from the Internet can only reach the bastion host; they
cannot reach the internal network.
Traffic having the IP address of the bastion host can only go to
the Internet. No traffic from the internal network can go to the
Internet.
Appropriate Uses
1.Few connections are coming from the Internet (in particular, it is not an
appropriate architecture if the screened host is a public web server).
2.The network being protected has a relatively high level of host security.
Dual-Homed Host Architecture:
Characteristics of Dual-Homed Host Architecture:
Appropriate uses
A dual-homed host is an appropriate firewall for a situation where:
1.Traffic to the Internet is small.
2.Traffic to the Internet is not business-critical.
3.No services are being provided to Internet-based users.
4.The network being protected does not contain extremely valuable data.
Screened Subnet Firewall:
Characteristics of Screened Subnet Firewall:
Appropriate Uses
Key: A secret like a password used to encrypt and decrypt information. There are a
few different types of keys used in cryptography.
Types of Encryption
There are two types of encryptions schemes as listed below:
Symmetric Key encryption
Public Key encryption
What is Symmetric Encryption?
Asymmetric encryption
Symmetric key
Resource requires high
encryption works on low
Utilization consumption of
usage of resources.
resources.
It is a modern encryption
Techniques It is an old technique.
technique.
Asymmetric encryption
Symmetric encryption is
Speed is slower in terms of
fast technique
speed.
What is CGI?
The Common Gateway Interface, or CGI, is a set of standards that define how
information is exchanged between the web server and a custom script.
What is URL?
URL stands for Uniform Resource Locator is the global address of
documents and other resources on the World Wide Web. Its main
purpose is to identify the location of a document and other resources
available on the internet, and specify the mechanism for accessing it
through a web browser.
For instance, if you look at the address bar of your browser you will
see:
https://www.tutorialrepublic.com/html-tutorial/html-url.php
— This is the URL of the web page you are viewing right now.
FTP
o FTP stands for File transfer protocol.
o FTP is a standard internet protocol provided by TCP/IP used for transmitting
the files from one host to another.
o It is mainly used for transferring the web page files from their creator to the
computer that acts as a server for other computers on the internet.
o It is also used for downloading the files to computer from other servers.
Why FTP?
Although transferring files from one system to another is very simple and
straightforward, but sometimes it can cause problems. For example, two
systems may have different file conventions. Two systems may have
different ways to represent text and data. Two systems may have different
directory structures. FTP protocol overcomes these problems by establishing
two connections between hosts. One connection is used for data transfer,
and another connection is used for the control connection.
Advantages of FTP:
o Speed: One of the biggest advantages of FTP is speed. The FTP is one of the
fastest way to transfer the files from one computer to another computer.
o Efficient: It is more efficient as we do not need to complete all the
operations to get the entire file.
o Security: To access the FTP server, we need to login with the username and
password. Therefore, we can say that FTP is more secure.
o Back & forth movement: FTP allows us to transfer the files back and forth.
Suppose you are a manager of the company, you send some information to
all the employees, and they all send information back on the same server
Uses of FTP
1. FTP websites
Websites can be hosted using a variety of communication protocols, and hypertext transmission
protocol secure (HTTPS) is probably the most common one.
Several online download services rely on file transfer protocol, as it is a simple and efficient way
to host files. FTP supports a basic level of security by using a username and password. This
allows file sharers to build gate domains, where only those with the proper credentials can access
a file. Keep in mind that the file transfer protocol is limited to 2GB on web browsers, making it
unsuitable for sharing large files above this threshold.
Users can install FTP software applications like Cyberduck that enable file transfers via the FTP
communication protocol.
4. Single file-sharing or download
FTP is generally faster than other protocols when downloading a single file. It consumes fewer
resources and has a higher maximum bit rate than HTTP
A major use case for FTP is for sharing publicly available resources. This is because a plaintext
sign-in process authenticates FTP transactions. The user name, password, and other control
information are sent to the server in an unencrypted form. This makes it unsuitable for
confidential data like emails but perfect for publicly available resources. It prioritizes
convenience over security, suitable for downloading open-source software, non-copyrighted
media, etc.
6. FTP automation
File transfer protocol allows users to automate file transfer tasks, such as uploading files during
low traffic hours. Users can make their websites and file-sharing applications more efficient by
scheduling transfers beforehand, using one of the many automatic FTP uploaders available.
Files.com, WinSCP, and Core FTP are some of the most popular options. Also, the inherent
architecture of FTP makes it ideal for automated processes. For instance, Microsoft has many
pre-configured Power Automate workflows to handle FTP tasks.
TCP/IP protocols
The protocols in the TCP/IP family correspond, in many cases, to the layers of the Open Systems
Interconnection (OSI) model. Table 1 shows HTTP and the underlying layers of the TCP/IP
family in terms of the OSI model. The Systems Network Architecture (SNA) layers, which
approximately match the OSI layers, are also shown.
LayerOSI SNA TCP/IP
7 Application Application HTTP
Presentatio
6 Presentation (empty)
n
5 Session Data flow (empty)
4 Transport TransmissionTCP
3 Network Path control IP
2 Data link Data link Subnetwork
1 Physical Physical Subnetwork
Table 1. The layers of the TCP/IP protocol family
What is a router?
A router is a device that connects two or more packet-switched networks or
subnetworks.
A routing table mainly defines the default path used by the router. So, it may
fail to find the best way to forward the data for a given packet. For example,
the office router along a single default path instructs all networks to its
internet services provider.
There are two types of tables in the router that are static and dynamic.
The static routing tables are configured manually, and the dynamic routing
tables are updated automatically by dynamic routers based on network
activity.
Features of Router
o A router works on the 3rd layer (Network Layer) of the OSI model, and
it is able to communicate with its adjacent devices with the help of IP
addresses and subnet.
o A router provides high-speed internet connectivity with the different
types of ports like gigabit, fast-Ethernet, and STM link port.
o It allows the users to configure the port as per their requirements in
the network.
o Routers' main components are central processing unit (CPU), flash
memory, RAM, Non-Volatile RAM, console, network, and interface card.
o Routers are capable of routing the traffic in a large networking system
by considering the sub-network as an intact network.
o Routers filter out the unwanted interference, as well as carry out the
data encapsulation and decapsulation process.
o Routers provide the redundancy as it always works in master and slave
mode.
o It allows the users to connect several LAN and WAN.
o Furthermore, a router creates various paths to forward the data
The scheme tells web servers which protocol to use when it accesses a page on
your website.
o Nowadays, HTTPS — which stands for Hypertext Transfer Protocol Secure — is
the most common scheme. It tells your web browser to encrypt any information
you enter onto the page, like your passwords or credit card information, so
cybercriminals can’t access it. This security protocol protects your website
visitors and implementing it will help your site rank better on Google. That's why
implementing SSL is a must-do on any technical SEO guide.
o Other schemes you might see are mailto://, which can open your computer’s
default email service provider to help you draft an email to the email address you
entered in the URL, and ftp://, which is a standard protocol for transferring
computer files between a client and server on a computer network.
o Subdomain
o
If your website is like a house, your subdomains are like specific rooms
in that house. A subdomain in a URL indicates which particular page of
your website the web browser should serve up. For instance,
subdomains like “blog” or “offers” will provide your website’s blog page
or offers page.
o Subdomains also bucket your website into its main content categories and shows
Google and your visitors that there's more information on your site than just a
homepage.
o Second-level Domain
o
o For example, “.com” is intended for commercial entities in the United States, so a
lot of American businesses register with a top-level domain of “.com”. Similarly
“.edu” is intended for academic institutions in the United States, so a lot of
American colleges and universities register with a top-level domain of “.edu”.
o Subdirectory
o
o For instance, if you own an online store that sells t-shirts, hats, and mugs, one of
your website’s URLs could look like “https://shop.yourstore.com/hats”. Notice that
the subdomain is “shop” and the subdirectory is “hats." That means this URL
would serve up the “Hats” page, which is a subfolder of the “Shop” page. T-shirts
and mugs would be other subfolders of this page