IT3401-WE Unit 1
IT3401-WE Unit 1
Advantages
Internet covers almost every aspect of life, one can think of. Here, we will discuss
some of the advantages of Internet:
By the time, with invention of new technologies such as TCP/IP protocols, DNS,
WWW, browsers, scripting languages etc.,Internet provided a medium to
publish and access information over the web.
• Internet allows us to communicate with the people sitting at remote locations.
There are various apps available on the wed that uses Internet as a medium for
communication. One can find various social networking sites such as:
o Facebo
ok
o Twitter
o
Yahoo
o
Google
+
o Flickr o
Orkut
• One can surf for any kind of information over the internet. Information regarding
various topics such as Technology, Health & Science, Social Studies,
Geographical Information, Information Technology, Products etc can be surfed
with help of a search engine.
• Apart from communication and source of information, internet also serves a
medium for entertainment. Following are the various modes for entertainment
over internet.
o Online Television
o Online Games o
Songs o Videos
o
Social Networking Apps
Internet allows us to use many services like:
o Internet Banking
o Matrimonial Services
o Online Shopping
o Online Ticket Booking
o Online Bill Payment
o Data Sharing
o E-mail
Internet provides concept of electronic commerce, that allows the business
deals to be conducted on electronic systems
Disadvantages
However, Internet has prooved to be a powerful source of information in almost
every field, yet there exists many disadvanatges discussed below:
• There are always chances to loose personal information such as name,
address, credit card number. Therefore, one should be very careful while
sharing such information. One should use credit cards only through
authenticated sites.
• Another disadvantage is the Spamming.Spamming corresponds to the
unwanted e-mails in bulk. These e-mails serve no purpose and lead to
obstruction of entire system.
• Virus can easily be spread to the computers connected to internet. Such virus
attacks may cause your system to crash or your important data may get deleted.
• Also a biggest threat on internet is pornography. There are many pornographic
sites that can be found, letting your children to use internet which indirectly
affects the children healthy mental life.
• There are various websites that do not provide the authenticated information.
This leads to misconception among many people.
This tutorial will discover the definition of computer networking, its types, computer
networks work, networking concepts, commonly used terms, networking and internet,
how it works, and network topologies.
Computer Network
"A Computer Network is defined as a set of two or more computers that are linked
together?either via wired cables or wireless networks i.e., WiFi?with the purpose of
communicating, exchanging, sharing or distributing data, files and resources."
Though one can also define the computer networks based on their geographic
location, a LAN (local area network) connects computers in a definite physical
dimension, such as home or within an office.
One can also describe the concept of computer networking by its communicating
protocols, the physical arrangement of its networking elements, how it manages
network traffic, and it's functioning.
All the other technologies, including the internet, Google search, instant messaging
apps, online video streaming, social media, email, cloud kitchen, cloud data
storage, etc., all exist because of computer networks.
LAN or Local Area Network is a group of devices connecting the computers and
other devices such as switches, servers, printers, etc., over a short distance such as
office, home. The commonly used LAN is Ethernet LAN. This network is used as it
allows the user to transfer or share data, files, and resources.
2. MAN
3.WAN
WAN or Wide Area Network is the most significant network type connecting
computers over a wide geographical area, such as a country, continent. WAN
includes several LANs, MANs, and CANs. An example of WAN
the Internet, which connects billions of computers globally.
Some of the most commonly used terms in day-to-day networking life are as discussed
below:
1. IP address
An IP address or Internet Protocol is a unique number that represents the address
where you live on the Internet. Every device that is connected to the network has a
string of numbers or IP addresses unlike house addresses.
You won't find two devices connected to a network with an identical IP address. When
your computer sends data to another different, the sent data contains a 'header' that
further contains the devices' IP address, i.e., the source computer and the destination
device.
2. Nodes
A node refers to a networking connection point where a connection occurs inside
a network that further helps in receiving, transmitting, creating, or storing files
or data.
Multiple devices could be connected to the Internet or network using wired or wireless
nodes. To form a network connection, one requires two or more nodes where each
node carries its unique identification to obtain access, such as an IP address. Some
examples of nodes are computers, printers, modems, switches, etc.
3. Routers
A router is a physical networking device, which forwards data packets between
networks. Routers do the data analysis, perform the traffic directing functions on the
network, and define the top route for the data packets to reach their destination node.
A data packet may have to surpass multiple routers present within the network until
it reaches its destination.
4. Switches
In a computer network, a switch is a device that connects other devices and helps in
node-to-node communication by deciding the best way of transmitting data
within a network (usually if there are multiple routes in a more extensive
network).
Though a router also transmits information, it forwards the information only between
networks, whereas a switches forwards data between nodes present in a single
network.
o Circuit Switching
o Packet Switching o Message Switching
o Circuit Switching: In this switching type, a secure communication path is
established between nodes (or the sender and receiver) in a network. It
establishes a dedicated connection path before transferring the data, and this
path assures a good transmission bandwidth and prevents any other traffic from
traveling on that path. For example, the Telephone network.
o Packet Switching: With this technique, a message is broken into independent
components known as packets. Because of their small size, each packet is sent
individually. The packets traveling through the network will have their source
and destination IP address.
o Message Switching: This switching technique uses the store and forward
mechanism. It sends the complete unit of the message from the source node,
passing from multiple switches until it reaches its intermediary node. It is not
suitable for real-time applications.
5. Ports
A port allows the user to access multiple applications by identifying a connection
between network devices. Each port is allocated a set of string numbers. If you relate
the IP address to a hotel's address, you can refer to ports as the hotel room number.
Network devices use port numbers to decide which application, service, or method is
used to forward the detailed information or the data.
Internet is a giant hub of information, but this information is not sent to every
computer connected to the Internet. The protocols and infrastructure are responsible
for managing to share the precise information the user has requested.
Network Topology
"Network topology is defined as the arrangement of computers or nodes of a
computer network to establish communication among all."
A node refers to a device that can transmit, receive, create, or store information. The
nodes are connected via a network link that could be either wired (cables, Ethernet) or
wireless (Bluetooth, Wi-Fi).
To help build a successful network in different situations, topologies are further classified
into several types. Though there are several topologies but in
this tutorial, we will discuss the commonly used ones, which are as
follows:
1. Bus Topology
2. Ring Topology
o A Ring topology is a modified version of bus topology where every node is
connected in a closed-loop forming peer-to-peer LAN topology.
o Every node in a ring topology has precisely two connections. The Adjacent node
pairs are connected directly, whereas the non-adjacent nodes are indirectly
connected via various nodes.
o Ring topology supports a unidirectional communication pattern where sending
and receiving of data occurs via TOKEN.
3. Star Topology
The hub or switch performs the entire centralized administration. Each node
sends its data to the hub, and later hub shares the received information to the
destination device.
o Two or more-star topologies can be connected to each other with the help of a
repeater.
4. Mesh Topology
, there are vast numbers of users' communicating with different devices in different
languages. That also includes many ways in which they transmit data along with the
different software they implement. So, communicating worldwide will not be
possible if there were no fixed 'standards' that will govern the way user
communicates for data as well as the way our devices treat those data. Here we will
be discussing these standard set of rules.
Yes, we're talking about "protocols" which are set of rules that help in governing the
way a particular technology will function for communication. In other words, it can
be said that the protocols are digital languages implemented in the form of
networking algorithms. There are different networks and network protocols, user's
use while surfing.
Types of Protocols
There are various types of protocols that support a major and compassionate role in
communicating with different devices across the network. These are:
Web Essentials:
Server:
The software that distributes the information and the machine where the
information and software reside is called the server.
The software that resides on the remote machine, communicates with the
server, fetches the information, processes it, and then displays it on the remote
machine is called the client.
Web server:
Software that delivers Web pages and other documents to browsers using the
Website:
A collection of pages on the World Wide Web that are accessible from the
same URL and typically residing on the same server.
URL
Uniform Resource Locator, the unique address which identifies a resource on the
Internet for routing purposes.
Client-server paradigm:
The primary idea of a client/server system is that you have a central repository
of information—some kind of data, often in a database—that you want to distribute
on demand to some set of people or machines. The Internet:
•Medium for communication and interaction in inter connected network.
• Makes information constantly and instantly available to anyone with a
connection.
Web Browsers
Web
domain)
Protocol:
Internet Protocol:
There are many protocols used by the Internet and the WWW:
o TCP/IP
o HTTP
o FTP
The Internet uses two main protocols (developed by Vincent Cerf and Robert Kahn)
Transmission control protocol (TCP):Controls disassembly of message into packets
at the origin reassembles at the destination
Internet protocol (IP):Specifies the addressing details for each packet Each
packet is labelled with its origin and destination.
o Send mail to the user’s computer and do not delete it from the
server o Ask whether new mail has arrived.
o e.g. can send specific messages to the client rather than all the
messages. A user can view email message headers and the
sender’s name before
The disadvantage of POP: You can only access messages from one PC.
The disadvantage of IMAP :Since email is stored on the email server, there is a
need for more and more expensive (high speed) storage space.
World Wide Web: comprises software (Web server and browser) and data
(Web sites).
HTTP:
Hypertext Transfer Protocol (HTTP) is the communication protocol
used by the Internet to transfer hypertext documents.
other text that the reader can immediately follow, usually by a mouse HTTP is behind
every request for a web document or graph, every click of a hypertext link, and every
submission of a form.
HTTP specifies how clients request data, and how servers respond to
these requests.
The client makes a request for a given page and the server is responsible
for finding it and returning it to the client.
The browser connects and requests a page from the server.
The server reads the page from the file system and sends it to the client and
then terminates the connection
HTTP Transactions
HTTP Message:
HTTP message is the information transaction between the client and server.
1.Requests
a.Client to server
2.Responses
a.Server to client
Fields
· Request line or Response line
· General header
· Request header or Response header
· Entity header
· Entity body
Request Message:
Request Line:
o GET is the most common HTTP method; it says "give me this resource".
Other methods include POST and HEAD. Method names are always
uppercase
o The path is the part of the URL after the host name, also called the
request URI o The HTTP version always takes the form
"HTTP/x.x", uppercase.
Request Header:
Response Message:
Response Line:
HTTP Method:
• HTTP method is supplied in the request line and specifies the operation
that
the client has requested.
Two methods that are mostly used are the GET and
POST: o GET for queries that can be safely
repeated
o POST for operations that may have side effects
(e.g. ordering a book from an online store).
• GET requests is that they can only supply data in the form
of parameters encoded in the URI (known as a Query String) –
[downside]
Cannot be unused for uploading files or other operations that require large amounts
of data to be sent to the server.
•Used for operations that have side effects and cannot be safely repeated.
• For example, transferring money from one bank account to
another has side effects and should not be repeated without explicit
approval by the user.
If you try to refresh a page in Internet Explorer that resulted from a POST, it displays
the following message to warn you that there may be side effects:
• The IIS server returns two status codes in its response for a POST request
o The first is 100 Continue to indicate that it has successfully
received the POST
request
o The second is 200 OK after the request has been processed.
•Informational (1xx)
•Successful (2xx)
•Redirection (3xx) o 301: moved
permanently
• Client error (4xx)
o 403 : forbidden o
404: Not
found
• Server error (5xx) o 503: Service
unavailable o 505: HTTP version
not supported
5. Describe client side scripting?
Client side scripting is a process in which the code along with HTML web
page is sent to the client by the server. Here, the code refers to the script.
In other simple words, client side scripting is a process in which scripts are
executed by browsers without connecting the server.
The code executes on the browser of client’s computer either during the
loading of web page or after the web page has been loaded.
Client side scripting is mainly used for dynamic user interface elements,
such as pull-down menus, navigation tools, animation buttons, data
validation purpose, etc.
Today, it is rapidly growing and evolving day by day. As a result, writing
client side web programming is now easier and faster, thereby, reducing
load on the server.
JavaScript and jQuery are by far the most important client-side scripting
languages or web scripting languages and widely used to create a
dynamic and responsive webpage and websites.
The browser (temporarily) downloads the code in the local computer and
starts processing it without the server. Therefore, the client side scripting is
browser dependent.
Client side scripts may also have some instructions for the web browser to
follow in response to certain user actions, such as pressing a page button.
They can often be looked if client want to view the source code of web
page.
at the below figure to understand better.
Popular Client side Scripting Language
A language in which a client side script or program is written using syntax is
called client side scripting language or client side programming. The
most popular client side scripting languages is as follows:
1. JavaScript: It is the most widely client side scripting or programming
language. It is based on ECMAScript standard language.
JavaScript is an object based oriented, dynamically typed (or also called
weakly typed) scripting language. It runs directly on the browser with the
help of an inbuilt interpreter.
Here, weakly typed means the variables are easily converted implicitly from
one data type to another.
2. VBScript: This scripting language is developed by Microsoft, based on
the Visual Basic. It is basically used to enhance the features of web pages in
Internet Explorer. VBScript is interpreted by Internet Explorer web browser.
3. jQuery: jQuery is a fast, small, lightweight JavaScript library. It is used to
facilitate a lot of JavaScript code into simple-to-use-functionality. Most of
the biggest companies such as Google, Microsoft, IBM, Netflix, etc. on the
Web are using jQuery language.
<html>
<head>
<title>List of cities</title>
{
var cities = ["New York", "Dhanbad", "Paris", "London", "Mumbai"];
listItem.appendChild(document.createTextNode(cities[city]));
</script>
</head>
<ul id = "cityList"></ul>
</body>
</html>
Look at the below diagram that shows the flow of data between server and
browser.
Application of Client side Scripting
Client side scripting is used to make web pages or website more interactive.
It is primarily used at the frontend, where the user can see using the
browser. Some important applications of client side scripting are listed, as
below:
• To retrieve data from web browser or user’s screen.
• Used in the field of online games.
• To customize the web page without reloading the page.
• Client side scripting is used for validation purpose. If the user enters
incorrect credentials on the login page, the web page displays an
error message on the client machine without submitting it to the web
server.
• To create ad banners that interact with the user, rather than simply
displaying graphics.
• To create animated images that change when we move the mouse
over them.
• Client side script can be used to detect installed plug-ins and notify
the user if a plugin is required.
<script>Malicious code</script>
If JavaScript is enabled on the victim client’s browser, the browser will run
this code unexpectedly.
3. An attacker can send a file to a client and encourage him to post it to
the server. The file may contain malicious code that can hack the website.
4. When a client visits a website, a small text file called a cookie is often
placed in the client’s computer. At the next visiting, the web server scans
that cookie. If it found on the computer, the attacker can use the cookie
data to trigger the download of malicious code.
5. Tags like <FORM> can trouble if they are inserted at the wrong place.
These HTML tags can change the appearance of the web page.
6. Browsers interpret the information according to the character set
chosen by the client. If the client does not specify the character set, the
web browser uses the default setting, that can display the garbled
appearing or unintended meanings.