Professional Documents
Culture Documents
01 Unit1
01 Unit1
01 Unit1
Unit 1
Unit 1
Introduction to Internet
Structure:
1.1
Introduction
Objectives
1.2
What is Internet?
Definition
Internet from practical and technical angle
Who owns and cares for the Internet?
What is TCP/IP?
Introduction to RFC
How Internet Works?
Internet Applications
1.3
Concepts of Server
Client Server Model
Servers
1.4
Getting Connected
Different Types of Connections
Requirements for Connections
1.5
Internet Service Providers
1.6
Address in Internet
The Domain Name System and DNS Servers
IP Addresses
1.6
Resource Addressing
URL (Uniform Resource Locator)
URLs and HOST Names
URLs and Port Numbers
Pathnames
1.7
Email
Email Basics
Mail protocols
How to Access the Mail System
1.8
Summary
1.9
Terminal Questions
1.10 Answers
Page No. 1
Website Design
Unit 1
1.1 Introduction
We have covered the basic concepts of internet and website in the previous
semester. In addition to it we are going to cover few advance concepts in
this unit.
In this unit, we would begin with an introduction to the internet, then discuss
about the client-server model for communication and different types of
connections. We would also discuss about Internet Service Providers and
addressing in the internet. At the end we will explain about the Resource
Addressing and Electronic mail.
Objectives
After studying this unit, you should be able to:
explain the meaning, evolution, working and application of internet
discuss the client server model and various types of internet
describe how to get connected to internet
use IP addressing scheme
explain the concepts of resource addressing
describe the E-mail basics, mail protocol & methods of accessing mail
system
Page No. 2
Website Design
Unit 1
Page No. 3
Website Design
Unit 1
You can compare Internet model with phone companies and the electric
companies. For example, there is phone service in almost every part of the
country. With a phone company, each person who wants telephone service
contacts a local service provider. The service provides a hook-up from the
residence or office to the service network.
The person wanting service actually provides the telephone instrument and
the connections within the residence or office. As long as the calls you want
to place are restricted to your local area, you do not need anything else.
However, if you want to place a call to someone in another area, you need
to purchase services from a long-distance service provider. The local area
provider supplies the connection from the local network into the longdistance network. This model allows you to connect to the telephone almost
anywhere in the world. Moving among networks of computers works much
the same way (which is not surprising since the telephone networks that
is, the physical cables are used to connect the computers).
Who cares for Internet?
Many people care about the internet. All the people who use it, even if only
to send a note to someone on some other network that is connected into the
Internet, care about it. Someone or some enterprise owns each computer
connected. The owner of the connected equipment therefore owns a piece
of the internet. The telephone companies own the pieces that carry the
information packets. The service providers own the packet routing
equipment. So, while no one person or entity owns the internet, all who use
it or supply materials for it play a part in its existence.
Since communication between networks cannot happen without
co-operation, there are committees and groups working hard all the time to
ensure smooth functioning. Some issues related to providing standards and
identification of computers on the NET are to be cared by somebody. Some
groups have thus been formed who look after primarily about the
commonality part of internet. This body is called IAB (Internet Architecture
Board), earlier called Internet Board as named by ARPA. There are two
main wings to this board:
IETF (Internet Engineering Task Force)
IRTF (Internet Research Task Force)
Page No. 4
Website Design
Unit 1
Page No. 5
Website Design
Unit 1
The segments are then sent over the network, where it is the job of the IP to
transport them correctly to the remote host. TCP of the other end receives
the segments and checks for errors. If an error has occurred, TCP can ask
for that particular block to be resent. Once all the segments are received
correctly, TCP will reconstruct the original message using the sequence
number. Therefore, the job of TCP is to manage the flow and ensure the
data is correct, and for IP the job is to route the raw data the packets from
one place to another.
The technical answer of, What is TCP/IP, is: TCP/IP is a large family of
protocols used to organize computers and communication devices into a
network. The two important protocols are TCP and IP. IP transmits the data
from place to place, while TCP makes sure it all works correctly.
1.2.5 Introduction to RFC
The internet is based on a large number of protocols and conventions. Each
such protocol is explained in the technical publication called a request for
comment or RFC. An RFC is usually a detailed technical explanation of how
something is supposed to work, not an invitation for people to send in
comments. Each RFC is given a number and is made available to anyone
who wants to read it. In this manner, the technical information that supports
the internet is distributed around the world in an organized, reliable manner.
Programmers and engineers who want to design products to work with the
internet protocols can download the RFCs and use them as reference
material. This ensures that everyone is using the same specifications and
that all the internet programs are designed to follow the same set of
standards.
1.2.6 How Internet Works?
In this section, we are going to cover the concepts of Internet, sending and
receiving messages.
Working of Internet
The primary objective of any network is to exchange information between
different locations. The rules for this exchange are called Protocols. The
protocol on Internet is TCP/IP (Transmission Control Protocol/Internet
Protocol) which is actually a name for a set of many rules framed to connect
computers in a wide area network, a network which is established between
computers across cities or countries.
Sikkim Manipal University
Page No. 6
Website Design
Unit 1
Page No. 7
Website Design
Unit 1
When your phone is off the hook, your line is engaged and you cannot
receive another call. However, your cable operator can beam so many
channels and you can surf them at will. Telephones are circuit switched. In
simple terms, it means that when you dial a number it goes to your nearest
exchange, which routes it to the nearest exchange of the called number,
and the ell rings at the end. The moment the receiver lifts his phone off the
hook, a circuit between you and him is established. This is a dedicated
circuit. The whole mechanism is called circuit switching.
Your cable operator, on the
because each channel has a
bandwidth of the cable, many
road with neatly defined lanes,
light commercial vehicles and
vehicles and you have it!
Page No. 8
Website Design
Unit 1
Page No. 9
Website Design
Unit 1
Page No. 10
Website Design
Unit 1
keeps running till any client login is expected. The size of that network is not
important to the client/server concept it could be a small local area
network or the global Internet. The server is designed to interact with client
programs
Client:
Conversely, many of the computers on the Internet use servers to get
information. For example, when your computer dials into an Internet
account, your e-mail program downloads your incoming messages from
your ISPs mail server.
Programs that servers for services are called clients. Your e-mail program is
more properly called an e-mail client. A client program is designed for a
particular computing platform (for example, UNIX, Macintosh, Windows) to
take advantage of the strengths of the platform. It uses environmental
elements just like the ones used in word processing or a spreadsheet, or
even in playing a computer game.
Using the familiar computer environment, the client may help you locate
servers of interest, send a query, process the query results, and display
them using familiar tools. Popular client/server software include WinGopher,
Mosaic, World Wide Web software, Netscape Navigator and Novell Netware
file server software.
The client/server model has become one of the central ideas of network
computing. Most business applications being written today use the
client/server model.
1.3.2 Servers
Mail Servers
The mail servers handle incoming and outgoing mail. Specifically, Post
Office Protocol (POP) servers (or POP3 servers) store incoming mail, while
Simple Mail Transfer Protocol (SMTP) Servers relay outgoing mail. Mail
clients get incoming message from, and send outgoing message to a mail
server, and enable you to read, write, save and print messages, store web
pages and transmit them in response to requests from web clients, which
are usually called browsers.
Page No. 11
Website Design
Unit 1
FTP Servers
Stores files that you can transfer to or from your computer if you have an
FTP client
News Servers
Stores Usenet newsgroup articles that you can read and send if you have a
news client or newsreader.
IRC servers
Act as a switchboard for Internet based on-line chats. To participate, you
use an IRC client.
Self-assessment questions
3. Many of the host computers on the Internet offer services to other
computers on the Internet. (true/false)
4. SMTP stands for ___________.
Page No. 12
Website Design
Unit 1
Page No. 13
Website Design
Unit 1
PPP and SLIP: The family of Internet protocols is called TCP/IP. The
connection protocol with ISPs server is known as PPP (Point to Point
Protocol), which is used in Indian context, although there are other
connection types such as SLIP or CSLIP which are available from other
Internet Service Providers in the world. But to your satisfaction you can
be sure that PPP is the most recent and advanced connection protocol.
The job of IP is to move the raw data from one place to another. Thus,
the protocol developed to support TCP/IP over a serial cable was called
SERIAL LINE IP or SLIP. SLIP dates back to the early 1980s and was
designed to be a simple, but not very powerful method of connecting two
IP devices over a serial cable. PPP is more powerful , more dependable,
more flexible, and is a lot easier to configure when you need to get it up
and running on a new system.
c) Dial-Up or On-Demand TCP/IP link through your LAN: A dial-up link
from your LAN is the intermediate step between individual dial-up and a
dedicated high speed link. It is therefore somewhat like dial-up and
somewhat like having a direct link. The main difference between this
type of connection and the one to your individual computer is that the
TCP/IP software runs on the LAN server, and your connection is to the
server. A TCP/IP connection through a LAN, either on a dial-up
connection or a direct connection, is the most common type of IP
connection, much more common than a personal dial-up IP connection.
ISDN, ADSL and Leased Line Connections: An alternative to a regular
phone line is ISDN (Integrated Services Digital Network) and Asymmetric
Digital Subscriber Line (ADSL) a type of telephone service. ISDN and
ADSL allow the user to connect to another computer at a speed which is
much faster than even the fastest modem because it is digital. Thus, if you
are using a phone line connect your computer to the Internet, you are better
off with an ISDN or ADSL (not all phone companies offer them) connection
because it is digital and it is a lot faster. These services can be run as fast
as 128 kbps.
ISDN or ADSL services are a boon for corporates that have multiple users
who need simultaneous Internet access. However, it is still a medium that
very few Internet users have tried out in India. Primary reasons for this being
delayed implementation by MTNL (Mahanagar Telephone Nigam Ltd.) and
Sikkim Manipal University
Page No. 14
Website Design
Unit 1
relatively higher costs. Mantraon-line is the first private ISP to offer the
same.
A dedicated link (or leased line) is a permanent connection over a telephone
line between a modem pointer to another modem pointer. A router is a
specialized computer that reads the address of each TCP/IP packet and
sends the packet to its destination. At higher speeds (56 kbps and above),
routers are used. With a dedicated link, your personal computer or LAN is
connected to the Internet at all times (compare it with hotlines, in which you
just pick the phone and start conversation, no dialing, no engage problem,
etc.). This type of connection is the most costly connection because it is
private (nobody else can share) to a persons computer or organization.
Leased lines come in various speeds, including T1 (1.5 Mbps, or enough for
24 voice channels) and 13 (44 Mbps, or enough for 672 voice channels). If
you do not need quite that much speed, you can ask for fractional T1 (half
or a quarter of a T1 line). You also need to connect your ISP for a leased
line account, which costs more than a dial-up account.
ISDN Advantages: To the subscriber, however, the most interesting
advantage perhaps is that via ISDN the entire services can be used with
one phone number only. One line is sufficient for telephone, telescopy,
video conference, or data transmission. A special protocol is responsible for
the fact that each incoming call will be directed to the right terminal. Thanks
to the Multiple Subscriber Number (MSN), it is now even possible to dial
each device by a central or PBX from the outside, without establishing a
connection prior to this.
1.4.2 Requirements for Connections
This section deals with shell account, TCP/IP account, TCP/IP software and
Web Browser.
For Shell Account
If you have a shell account type of access, what you all need is to become a
terminal on the computer of your ISP, thus the minimum possible PC
configuration with a VT-1 00 or equivalent type of terminal emulation
software can server your purpose well. In fact you may have a simple dumb
terminal to access such an account. The terminal emulation software on PC
is also widely available such as PROCOMM, etc. Please choose emulation
software which has KERMIT and ZMODEM file download capability. A
Sikkim Manipal University
Page No. 15
Website Design
Unit 1
modem with error correction capabilities 9.6 kbps or better, and telephone
line with capability to dial service provider Local/STD are also required.
For TCP/IP Account
It is the power of software available for TCP/IP account which has made
Internet so popular these days. It is highly desirable that you have a GUI
operating system such as Windows on your desktop, if you are a TCP/IP
account holder. Typically, you would require a TCP/IP connection
establishing software and a Web-Browser to access this type of account. A
modem which best suits your pocket and is fastest to its class is the right
choice. Typically a 28.8 kbps modem is found to perform best with Indian
ISPs.
TCP/IP Software
Such software is now bundled with new operating systems such as which
are also called TCP/IP sockets. If you do not have it along with your OS you
can have third party socket software such as Trumpet Winsock. It is
important to run this software to get connected to your ISP before you can
do the browsing part.
Web Browser
Web browsers are the Client software (your machine is a client to ISPs
server) which has various graphics capabilities to access the information
from the Internet. Modem Web Browsers are capable of browsing WWW,
Gopher sites, FTP sites and also provide facilities for e-mail. Initially NCSAs
web browser Mosaic hit the market which actually made the browsing
popular. Now web browsers from Netscape and from Microsoft are the
users choice. You can get hold of any such browser and start browsing the
Net.
Self Assessment questions
5) There are three types of dial-up connection are available. (true/false)
6) An alternative to a regular phone is ISDN. (true/false)
Page No. 16
Website Design
Unit 1
rest of the details of connecting you to the Internet. There are many types of
Internet providers. You can, for instance, choose one of big commercial
online service providers. The primary business of an ISP is hooking people
to the Internet by giving an Internet account to subscribers, and providing
them with two different kinds of access: shell access and SLP/PPP access.
Most ISPs offer both kinds of access, some offer both with a single account
and others require that you choose one or the other. Once you register, your
provider will give you a user name (called a user id password, and a phone
number to dial). To establish the Internet connection, you have your
communications program dial the number. You then log in using your
particular user ID and password. At present it is VSNL (Videsh Sanchar
Nigam Limited) which is dominating the Internet scene in India through its
GIAS (Gateway Internet Access Service). The other service provides in
India are MTNL (Mahanagar Telephone Nigam Limited), Mantraon-line and
Satyam on-lie. Due to the new options in BSNL where the user need to
register from the telephone number and no separate account, the number of
users has increased. In this case what ever the usage of the person the
individual has to pay.
Choosing an ISP
The privatization of Internet Service Providers (ISPs) is set to give a further
fillip to the Internet boom. Central to the success of any service is the price
criterion. You will be amazed to find out how a service offered at a premium
could in effect be cheaper, considering the add-on facilities that are offered
along with the core service. Do not forget that apart from the Internet
connection, the ISP gives you an international contact address, that is, your
e-mail address. It is because of this e-mail address that you must be
discerning while choosing your ISP. The e-mail address provided by the ISP
would be all over your business and it will not be easy for you to change
your service provider if you wish to change your address. You will have to
live with the ISP as well as the e-mail address.
User ID Telephone Ratio: The first thing you must keep in mind while
zeroing in on your ISP is the user-to-line ratio it commands. That is, how
many users are using or are expected to use one single telephone line.
Ascertaining this, however, is not easy as the numbers of subscribers are
growing every day. Nevertheless, even the current user-to-line ratio will give
you an idea about the standards the ISP has set for itself. This factor is very
Sikkim Manipal University
Page No. 17
Website Design
Unit 1
critical because it determines the ease of usage whether you would be able
to connect to your ISP or not. Another way of finding this is to check out with
some of the existing users as to how much time it normally takes to dial into
a given ISP. If it takes more than 10 minutes to get through, that particular
ISP should be avoided.
Interface Simplicity: Very few organizations take into account the simplicity
of the interface while opting for an ISP. This occurs to them only when they
begin to use the Internet service across their organizations. The right kind of
interface can lead to tremendous savings in cost. There are other problems
too. How many users in an organization know about dial-up networking
under Windows? How many can remember and use passwords correctly?
To how many people would you like to give the password? Does terms like
TCP/IP sound friendly to them? Questions like these determine the success
of the Internet enabled organizations. There are some ISPs to whom these
questions do not apply. They provide an easy-to-use interface that once
installed works by simply pressing a button.
Roaming Facility: The roaming facility is particularly relevant for those who
travel a lot. Though most ISPs advertise this particular facility, there are not
many who pay heed to it. Its benefits are realized only when one reaches
another city and wants to access an urgent e-mail or the Internet. How does
one connect to the Internet when one is not an ISP subscriber in that
particular city? To overcome this problem, either you will have to use a
facility like Hotmail to access your mail from round the world or use the
roaming facility provided by your ISP. The roaming facility allows you to dialin into the local node of your ISP or of the regional ISP that your service
provider has a tie-up with. Then all you have to do is to plug in your
computer to a telephone line, find out the numbers for dial-up access, and
then using your password, access your original Internet account. A crucial
point here is the number of cities that your ISP has presence in or has tieups for the same.
Multiple Login Facility: Very few users know about this facility, mainly
because it is hardly advertised. However, it can prove to be a life-saver and
a great help for small and medium business houses. If n organization has
only one Internet connection, but more than one employee wants to access
the net simultaneously then this would be possible only if the ISP offers to
the organization the multiple login facility. In fact, this facility can even be
Sikkim Manipal University
Page No. 18
Website Design
Unit 1
availed of while being away from the Organization. For instance, one user
may be in New Delhi and the other user in Mumbai. But, with the e-mail it
would be possible for the man away in Mumbai to simultaneously access
the Internet. Some ISPs offer multiple e-mail IDs that allow you to segregate
e-mail individually. But you have to pay extra for this.
Special Packages: The private ISPs are putting out some unique usage
packages. It has launched a special package for night users. For those who
access the Net at night, some ISPs offer a dial-up account which costs
almost half compared to the regular connection. This account cannot be
used during day time. This is only the beginning as far as special packages
are concerned. Soon you will find ISPs (especially the regional ones)
coming out with packages that will fit your needs better than your cotton
trousers. So do not forget to check out each and every player before
deciding on your Internet provider.
Support: This is very crucial topic and an area of service where most of the
players have been found wanting. Try getting any help from the service
provider and the beautifully programmed EPABX system will take you
around each and every option, only to disconnect your call at the end saying
Sorry, the person handling your call is busy at the moment. In case, you
happen to be using pulse-dialing equipment, you can forget using the
telephone, and may as well go to their office and clear out the matter there
and then.
Ideally, new users should subscribe to an ISP where they can be hand-held
through the initial process, as Bill Gates Windows operating system does
try its best to support you in the exercise. An installation guide, the help
desks phone number, Windows 95 installation CD are part of the necessary
survival kit that a new user must have while undergoing this procedure.
Discounts on Renewal: Last but no the least, you must find out whether
your ISP will renew your account at the same rate or whether there are any
discounts to retain its old customers? This is a factor that can upset those
lining for their first-buy. VSNL has been very successful in playing this card.
It offers slashed rates to those subscribers ho renew their accounts.
Brochure-speak: If you can have more than a hundred different versions of
the holy Ramayana, just think what the crafty marketing people can do to
simple terms of the Internet. Hence, one must see through the exotic looking
Sikkim Manipal University
Page No. 19
Website Design
Unit 1
tariff cards of most ISPs. You must have the ability to judge beyond the
gloss and the glitter. To summarize, here is what you want from an Internet
Service Provider:
Access via a local phone call
A flat monthly fee
An ISDN or fast (28.8 kbps) connection
A PPP account
A shell account at no extra charge
The ability to use whichever Internet clients you want
Full Internet access to all resources
The capability of having your own web home page
Software support, through which you can use to connect to and use the
Internet
Technical support should be open 24 hours a day, 7 days a week
Self Aassessment Questions
7. ___________ are the examples of ISP.
8. The private ISPs are putting out some unique usage packages.
(true/false)
Page No. 20
Website Design
Unit 1
the IP address associated with a name) will first check the hosts file (if
present) on the machine making the query, to see whether the name can be
resolved.
Within the Internet, each separate computer is called a host. For example,
you might tell someone he can find the information he wants by connecting
to a host in Switzerland. If your computer is connected to the Internet, then it
too is a host, even though you may not be sharing any resources with the
rest of the world. If you connect to an log into a host and then use its rest of
the world. If you connect to and log into a host and then use its functions to
reach out onto the Internet, you are using your computer as a terminal to
reach another computer. Host connections are designed to use very simple
text based interactions.
Being connected to the Internet means your computer system or network is
actual a node on the Internet. It has an individually assigned Internet
address and client program to in running on the computer system that can
take full advantage of the computers capabilities. Your workstation is a peer
of every other computer on the Net. So, a node is any addressable device
attached to a computer network.
But with the number of hosts on the Internet increasing rapidly to an
unmanageable level, that soon became impossible. The way out was the
DNS: the Domain Name Server. The DNS is a distributed, scalable
database of IP addresses and their associated names. It is distributed in the
sense that unlike the hosts file, no single computer contains all the DNS
information in the world. The DNS data is distributed across many name
servers. It is scalable you can increase the volume of total DNS data and
requests from machines for the same data, without significantly increasing
the querying time. Otherwise the World Wide Web would really become the
World Wide Wait.
To understand the DNS and the way it is used, we need to understand the
Internet naming structure. Let us take, for example, the address:
http://www.trg.hclsso.hclinfosystems.com/
www: Indicates that the machine is part of the world
com: Indicates the top-level domain (TLD) that the machine is part of. Top
Level Domain include .com, .edu, .gov, .in etc
Sikkim Manipal University
Page No. 21
Website Design
Unit 1
Indicates
Commercial Organizations
Educational Institutions
A (US) military setup
A (US) government setup
Other organizations
Other networks
An international organization
Example
hclinfosystems.com
Stanford.edu
Nic.mil
Nasa.gov
www.bjp.org
Ns.stph.net
Tpc.int
Page No. 22
Website Design
Unit 1
Geographic Domains
The geographically based top-level domains use two-letter country
designations.
Domain
Au
Ca
Dk
Fr
Gr
In
Jp
Us
Meaning
Australia
Canada
Denmark
France
Greece
India
Japan
United States
In a complete (fully qualified) domain name, the part furthest to the right is
the top level domain, representing either a type of organization or a country.
As you read in from the right, the name gets more specific until you reach
the name of the individual host computer. For instance: rubens.anu.edu.au
is the name of a computer. It is in Australia (au), in the educational area
(edu), at the Australian National University (anu) and the host computer is
named rubens.
1.6.2 IP Addresses
Each host computer on the Internet has a unique number, called its IP
address. IP addresses identify the host computers, so that packets of
information reach the correct computer. You may have to type IP addresses
when you configure your computer for connection to the Internet. An IP
address is a 32-bit number that uniquely identifies a network interface. The
IP address is assigned to a network interface card and not a computer. So if
you have two Network Interface Cards, then each card is assigned an IP
address. The 32 bit IP addresses are normally expressed in dotted-decimal
format, with four numbers separated by periods, such as 151.202.123.132
These numbers can be the ranges of 0 to 255. The four constituent numbers
together represent the network that the computer is on and the computer
interface itself. IP addresses are organized from left to right, with the lefthand octet describing the largest network organization and the rightmost
octet describing the actual network connection. Each octet has value of 8
bits within the computer. When the four octets of the address are added
Sikkim Manipal University
Page No. 23
Website Design
Unit 1
together, the total address has a value of 32 bits. Using the various
combinations of these octets, several million unique identifiers can be
assigned.
Classes of Networks
Just as with our phone numbers, we can look at the leftmost octet and
determine something about the network. Network addresses are divided into
classes, which are assigned depending on the size of the physical network.
The value of the first octet tells us what class the network is in, and how
large the physical network that underlines the number is. The first octet is
sometimes called the network address or net number.
Class A: Over 16 million served
These are very big networks with up to 224 (16 million) nodes. Class A
networks have their network addresses from 1.0.0.0 to 126.0.0.0. The zeros
are replaced with the node addresses. NEARNET, Sprint, ANSnet, Merit
and AT&T are examples of organizations with class A network numbers.
Class B: Larger nets
Class B networks are smaller than Class A networks. They can have up to a
maximum of 65000 nodes. Network addresses range from 128.0.0.0 to
191.0.0.0. In this case only the last two zeros are replaced with the node
addresses. Class B addresses go to organizations with larger nets, such as
universities or large businesses. The first two octets in a Class B address
describe the network itself, and the second two identify the host.
Class C: Addresses
Class C networks are smaller than Class B networks. They can have up to
254 nodes. Network addresses range from 192.0.0.0 to 223.0.0.0. In this
case only the last zero are replaced with the node addresses. The first three
octets are used for the network numbers and the last octet is the host
number. This class is where most networks will be assigned. Originally,
Class C addresses were intended for small company networks, K-12
schools and single machines that were not connected to other, larger nets.
Other Classes
There are other classes of networks, Class D and Class E. They are
primarily used for experimental purposes. For a given network address, the
last node address is the broadcast address. For example, for Class C
Sikkim Manipal University
Page No. 24
Website Design
Unit 1
Page No. 25
Website Design
Unit 1
Meaning
File accessed via file transfer protocol
Gopher resource
Hypertext resource
Mail
Usenet newsgroup
Interactive telnet session
Access a Wais database
Each type of Internet service has its own specific port number. Within a URL
you only have to specify a port number if it is not the default for that type of
service. For example, the default port number for telnet is 23. The following
two URLs are equivalent:
telnet://locis.loc.gov/
telnet://locis.loc.gov:23/
The http service, by default, uses port 80. Similarly, the gopher service uses
port 70. For instance, the following two URLs are equivalent. They both
Page No. 26
Website Design
Unit 1
point to the same hypertext resources, using port 80, on the computer
named www.wendy.com:
http://www.wendy.com/~wendy
http://www.wendy.com:80/~wendy
1.7.4 Pathnames
Here is a typical hypertext URL:
http://www.cathouse.org/cathouse/humor/tech/data
We can divide such URLs into three parts, the scheme, the host name and
the pathname. To analyze such a URL look at each of the parts:
The scheme (http) identifies this resource as being hypertext
The hostname (www.cathouse.org/) is the name of the computer
The pathname (cathouse/humor/tech/data) shows where on the host the
hypertext resource is stored
Self-assessment questions
11. URL stands for ______________.
12. ______________ is a domain name assigned to a host computer.
1.8 Email
This section covers the email concepts, definition, e-mail services and email networks.
1.8.1 Email Basics
The Internet is a valuable tool for accessing information, but it also opens a
whole new world of communications to its users. Using electronic mail
(email) a person can engage in conversations with people all over the world.
Yet, because of its convenience, it is also a powerful tool for even local
communication. With typical telephone communications you may be either
interrupted by a call, or may return a call only to find that the other person is
not available, an occurrence referred to as "telephone tag." Electronic mail
though, sits on the server computer until you are ready to read it, and when
you respond it will then wait patiently on the other person's computer until
they have time to read it. This is especially valuable for busy teachers, who
because of their duties and general working isolation in a classroom with
just their students, usually aren't able to communicate with peers on as
regular a basis as they would like.
Sikkim Manipal University
Page No. 27
Website Design
Unit 1
Page No. 28
Website Design
Unit 1
Page No. 29
Website Design
Unit 1
Page No. 30
Website Design
Unit 1
Page No. 31
Website Design
Unit 1
to your mailbox. While POP is used; for simply retrieving and deleting the
messages, using IMAP, we can organize our mails and read them on the
server itself. For a user getting connected over a slow dial up lines, IMAP
provides ways to download only the Header or the Body of the message that
contains a large attachment. In addition, IMAP allows one user to access
multiple mail serves and multiple users to share a single mailbox. IMAP can
work on any of the three basic models of communication, On-line, Off-line or
Disconnected Operation. In the On-line mode, the mail is processed in an
interactive fashion, that is, the client can ask the server for only the
message headers and then request only specified messages, or can even
retrieve parts of certain messages.
MIME and S/MIME
SMTP can handle only messages containing the 7 bit ASCII text and it
cannot handle other types of data such as 8-bit binary data and other
multimedia formats that nowadays we are sending both within the body of
Email messages and as attachments. However, as a solution to this
limitation, the ETF developed the Multipurpose Internet Mail Extensions
(MIME) protocol, which packs multimedia data into a format that SMTP can
handle. Stands for Secure/Multipurpose Internet Mail Extensions and was
designed to add security to Email messages in MIME format. The security
services offered are authentication (using digital signatures) and privacy
(using encryption). S/MIME is not specific to the Internet and can be used in
any electronic mail environment.
UUCP
As an Internet user, you may want to exchange mails with different types of
networks and then you should know what type of addresses they use. Same
popular networks to send mails are CompuServe, MCI Mail, America Online,
UNIX-based UUCP network, and so on.
All UNIX systems come with a built in networking system called UUCP.
Although the job of UUCP is to connect UNIX computers, it is not as
powerful as TCP/IP. For example, UUCP does not provide a remote login
facility; mail facility is slower and awkward than the TCP/IP based Internet
system. However, UUCP does have an important advantage. It is a
standard part of UNIX and it runs cheaply and reliably over dial-up or
hardwired connections.
Sikkim Manipal University
Page No. 32
Website Design
Unit 1
Page No. 33
Website Design
Unit 1
account on the host computer is given his own mailbox file. In this way the
host computer always keep everyones mail in an organized manner and at
the same time it assures you that no one can read your messages.
Ways of Accessing Email
There are many ways to access your Email. You may use a mail client, such
as Eudora, Outlook or anyone of the popular packages that download your
incoming messages from the POP server to your computer and upload your
outgoing messages to the SMTP server. This may occur through a Local
Area Network (LAN) or through a dial-up connection.
You may use a Web based Email service
You may use a commercial provider, such as CompuServe or America
On-line which have their own Email programs
You may get your Email through a LAN, a common system at large
organization, if your organization has some sort of Internet connection,
Email arrives in the companys POP server. You then read your Email
either on the server using an Email application or on your own computer,
by downloading your Email from the server through the LAN by using an
Email application. Your company may use a POP server or some kind of
proprietary protocol.
You may have a UNIX shell account and use a UNIX Email program that
reads your POP mailbox directly.
How does Email Work?
Let us review how Email works, using an example. In this example, you are
using a PC with Windows OS, which connects to the Internet using TCP/IP.
Let us suppose you want to send a mail to two of your friends: Surya in
Washington and Rishaba in Germany. Surya uses a Macintosh and also
connects to the Net using PPP. Rishaba uses a shell account by connecting
UNIX host computer. The following steps illustrate the example.
1. First using a Windows mail client, you compose the message on your
own computer.
2. After you compose the message, address it to both Surya and
Rishaba.
3. Once the message is finished, you tell your program to send it on its
way.
Page No. 34
Website Design
Unit 1
4. Now your client program contacts the mail server on your Internet host
and using the POP protocol, sends your message to the server.
5. In the next step, the server passes your message to the transport
agent.
6. Now, it is the job of transport agent to look at the addresses in your
message and connect to the appropriate computers over the Net.
7. First, the transport agent connects it on the host computer in
Washington that receives mail for Surya.
8. Once the connection is made, the two transport agents use the SMTP
to relay the message.
9. After the message is sent, your transport agent terminates the
connection and forms a new connection with the transport agent on
the appropriate computer in Germany.
10. Again, the two transport agents use SMTP to relay the message.
11. Once the message is sent, your transport agent terminates the
connection, its job is finished.
12. In Washington, Surya turns on his computer to check the mail. He tells
his Macintosh mail client to see if any new mail has arrived. Now it is
the turn of his mail client to connect to the mail server on Suryas host
computer and using the POP protocol, asks the server to check
Suryas mailbox. Since server finds your message, so using POP, it
sends the message to the client and places the message in his local
mailbox (a file on the Mac) and tells him that new mail has arrived.
Now, with the help of mail program, Surya displays the message.
13. Similarly, in Germany, Rishaba has logged into his shell account on a
UNIX host. He runs his UNIX mail program which checks his mailbox
and tells him new mail has arrived. Using appropriate command,
Rishaba tells the mail program to show him your message.
The important thing in this example is that, even though they use different
computers and different programs, the mail moves smoothly and quickly,
just because of the Internet and SMTP.
Understanding the Internet Email Addresses
In this section, we will talk a little more about how to specify addresses
when you send mail as you have now become aware that whenever we talk
Sikkim Manipal University
Page No. 35
Website Design
Unit 1
about the word mail, it always means electronic ail and the word address
always refers to an Internet address. Thus, if someone on the Net asks
What is your address? tell him or her, your electronic address.
An Email address defines the location of an individuals mailbox on the
Internet. An address consists of two parts: username and domain name,
separated by the @ symbol. Here is an example:
Username in the preceding example is Leenu. Usernames are usually pretty
straightforward; often, companies give employees usernames that use one
initial and one full name. However, usernames can also contain characters
other than letters they can contain numbers, underscores, periods and
some other special characters. They cannot contain commas, spaces or
parenthesis.
The host name provides the Internet location of the mailbox, usually the
name of a computer owned by a company or Internet service which has
been discussed in Unit 2. If the recipient is within your local network, you
can often leave out part of the address. For example, say your address is
Kapil@great.vsnl.in and you are mailing to a friend whose computer is on
the same network. Your friends address is Sachin@more.vsnl.in. So you
can leave off the part of the address you both have in common. That is, in
this case, you use sachin@more. The mail program easily recognizes it as a
local address and delivers the message properly. If you have a problem, you
may have to use the full address. it is also possible to leave out the
computer name entirely and just use the user ID if the person you are
sending mail to is surya@uptec.vsnl.in and you want to send mail to
rishaba@uptec.vsnl.in, you can use: rishaba. When you do not know
someones Email address, and you have an ides of his login name and the
name of the Internet site he uses you should be able to send Email to the
postmaster at any Internet site. That is the address to use if you have
questions about an Email to or from a specific host or site, or general
questions about a site. However, you may not get a quick response, since
the person designated as postmaster usually has lots of other duties. For
example, you have trouble finding out the address of someone who uses a
computer named great.vsnl.in; you can send a message asking for the
persons mail address to: postmaster@great.vsnl.in.
Page No. 36
Website Design
Unit 1
Self-assessment questions
13. Three versions of POP are ____________.
14. _____________ allows hierarchical storage of mail and a message
retrieval system that allows selective access to your mailbox.
1.9 Summary
The Internet links are computer networks all over the world so that users
can share resources and communicate with each other.
Internet is a vast collection of globally available information which can be
accessed electronically information which is of practical use for
business, research, study and technical purposes.
No one owns the Internet. Any single person, corporation, university or
government does not fund it. Internet has been described as the
cooperative anarchy.
Protocols are the rules that all networks use to understand each other.
For example, there is a protocol describing exactly what format should
be used for sending mail message.
The internet is based on a large number of protocols and conventions.
Each such protocol is explained in the technical publication called a
request for comment or RFC.
The primary objective of any network is to exchange information
between different locations.
Many of the host computers on the Internet offer services to other
computers on the Internet.
Conversely, many of the computers on the Internet use servers to get
information.
The mail servers handle incoming and outgoing mail.
A protocol dialup account lets your computer behave like it is connected
directly to another computer on the Internet.
The family of Internet protocols is called TCP/IP.
A dedicated link (or leased line) is a permanent connection over a
telephone line between a modem pointer to another modem pointer.
Each host computer on the Internet has a unique number, called its IP
address.
Page No. 37
Website Design
Unit 1
Page No. 38
Website Design
Unit 1
Terminal Questions
1. Internet is a vast collection of globally available information which can be
accessed electronically information which is of practical use for
business, research, study and technical purposes. (Refer Section 1.2.2)
2. There are essentially three different types of connections for accessing
the services and resources of the Internet. (Refer Section 1.4.1)
3. On a TCP/IP network, computers know each other by their IP
addresses. (Refer Section 1.6.1)
4. Network addresses are divided into classes, which are assigned
depending on the size of the physical network. (Refer Section 1.6.2)
5. It produces the immediate results in terms of increased productivity from
reduced turnaround time, and reduced costs. (Refer Section 1.8.2)
Page No. 39