Download as pdf or txt
Download as pdf or txt
You are on page 1of 28

MODULE 1

What Is a Domain?

A domain is a unique identifier for a website and the way users across the world can access it. It can
basically be explained as your website’s address. For example, the domain for Google is “google.com”.
When you type this into your web browser, you will be taken to Google’s homepage. Domain names are
different from standard URLs that lead to any one of the pages of the website including the home page
and even the microsite pages.

To understand the domain meaning better, let’s look at how people accessed different websites before
the introduction of domains. Earlier, users had to write complex IP addresses to access a website. So, if
you had to access Google, you had to type 8.8.8.8, which is the IP address. Each website has a unique IP
address provided by the internet service providers. A domain name makes it easier for people to
remember websites and access them through server-destination.

Types

Before we understand the difference between domain and subdomain, let’s look at the different types
of domains.

Root Domain

INTERNET TECHNOLOGY DIPANKAR BASU


It is the main or primary domain of your website and can have one or more subdomains. Subdomains
cannot exist without the root domain, but a root domain can exist independently. It is also known as the
apex domain because it is at the apex and all the subdomains come below it or are dependent on it.

Bare Domain

A bare domain is a domain that doesn’t have “www” at the beginning. For example, “google.com” is a
bare domain, while “www.google.com” is not. People buy this type of domain only for aesthetic value as
they look more pleasing to the eye.

What Is a Subdomain?

Sub domains are unique URLs that operate on the main purchased domain. A sub domain can be used to
identify a certain section or category of a website. Sub domains are second-level domain names that can
be up to 63 characters long. They are indicated by a section to the left of the root URL. For example, on
Google, the “news” section has its own sub domain: “news.google.com”.

Sub domains are completely different from subdirectories. A sub domain is a separate website that has
its own domain name. For example, “news.google.com” is a sub domain of “google.com”. A subdirectory
is a folder on a website that has its own URL. For example, “example.com/blog” is a subdirectory of
“example.com” that takes people to the blog section.

INTERNET TECHNOLOGY DIPANKAR BASU


INTERNET TECHNOLOGY DIPANKAR BASU
INTERNET TECHNOLOGY DIPANKAR BASU
THREE WAY HANDSHAKING

The process of communication between devices over the internet happens according to the current
TCP/IP suite model(stripped out version of OSI reference model). The Application layer is a top pile of a
stack of TCP/IP models from where network referenced applications like web browsers on the client-
side establish a connection with the server. From the application layer, the information is transferred to
the transport layer where our topic comes into the picture. The two important protocols of this layer are
– TCP, UDP(User Datagram Protocol) out of which TCP is prevalent(since it provides reliability for the
connection established). However, you can find an application of UDP in querying the DNS server to get
the binary equivalent of the Domain Name used for the website.

INTERNET TECHNOLOGY DIPANKAR BASU


INTERNET TECHNOLOGY DIPANKAR BASU
MODULE 2

What is HTML?

HTML stands for Hyper Text Markup Language

HTML is the standard markup language for creating Web pages

HTML describes the structure of a Web page

HTML consists of a series of elements

HTML elements tell the browser how to display the content

HTML elements label pieces of content such as "this is a heading", "this is a paragraph", "this is a link",
etc.

EXAMPLE

<!DOCTYPE html>

<html>

<head>

<title>Page Title</title>

</head>

<body>

<h1>My First Heading</h1>

<p>My first paragraph.</p>

</body>

</html>

INTERNET TECHNOLOGY DIPANKAR BASU


What Does HTML Editor Mean?

An HTML editor is a tool for editing or evaluating code in hypertext markup language (HTML).

ELEMENT :

An HTML element is a component of an HTML document that tells a web browser how to structure and
interpret a part of the HTML document. HTML elements can contain formatting instructions, semantic
meaning, and content.

For example, HTML elements are used to denote document parts such as headers, paragraphs, and
footers and to embed content such such as hyperlinks, text, and images. Although HTML can be used to
provide formatting instructions, HTML standards strongly encourage using CSS for this purpose instead.

HTML Attributes

All HTML elements can have attributes

Attributes provide additional information about elements

Attributes are always specified in the start tag

Attributes usually come in name/value pairs like: name="value"

INTERNET TECHNOLOGY DIPANKAR BASU


EXAMPLE :

<a href="https://www.w3schools.com">Visit W3Schools</a>

HTML Headings

HTML headings are defined with the <h1> to <h6> tags.

<h1> defines the most important heading. <h6> defines the least important heading.

Example

<h1>Heading 1</h1>

<h2>Heading 2</h2>

<h3>Heading 3</h3>

<h4>Heading 4</h4>

<h5>Heading 5</h5>

<h6>Heading 6</h6>

HTML Paragraphs

The HTML <p> element defines a paragraph.

A paragraph always starts on a new line, and browsers automatically add some white space (a margin)
before and after a paragraph.

Example

<p>This is a paragraph.</p>

<p>This is another paragraph.</p>

HTML Formatting Elements

Formatting elements were designed to display special types of text:

<b> - Bold text

<strong> - Important text

<i> - Italic text

INTERNET TECHNOLOGY DIPANKAR BASU


<em> - Emphasized text

<mark> - Marked text

<small> - Smaller text

<del> - Deleted text

<ins> - Inserted text

<sub> - Subscript text

<sup> - Superscript text

HTML <link> Tag

Example

Link to an external style sheet:

<head>

<link rel="stylesheet" href="styles.css">

</head>

Definition and Usage

The <link> tag defines the relationship between the current document and an external resource.

The <link> tag is most often used to link to external style sheets or to add a favicon to your website.

The <link> element is an empty element, it contains attributes only.

Block-level Elements

A block-level element always starts on a new line, and the browsers automatically add some space (a
margin) before and after the element.

A block-level element always takes up the full width available (stretches out to the left and right as far as
it can).

Two commonly used block elements are: <p> and <div>.

INTERNET TECHNOLOGY DIPANKAR BASU


The <p> element defines a paragraph in an HTML document.

The <div> element defines a division or a section in an HTML document.

The <p> element is a block-level element.

The <div> element is a block-level element.

Example

<p>Hello World</p>

<div>Hello World</div>

HTML Layouts

HTML layouts provide a way to arrange web pages in well-mannered, well-structured, and in responsive
form or we can say that HTML layout specifies a way in which the web pages can be arranged. Web-page
layout works with arrangement of visual elements of an HTML document.

Web page layout is the most important part to keep in mind while creating a website so that our
website can appear professional with the great look. You can also use CSS and JAVASCRIPT based
frameworks for creating layouts for responsive and dynamic website designing.

INTERNET TECHNOLOGY DIPANKAR BASU


MODULE 3

INTERNET TECHNOLOGY DIPANKAR BASU


INTERNET TECHNOLOGY DIPANKAR BASU
INTERNET TECHNOLOGY DIPANKAR BASU
INTERNET TECHNOLOGY DIPANKAR BASU
INTERNET TECHNOLOGY DIPANKAR BASU
INTERNET TECHNOLOGY DIPANKAR BASU
INTERNET TECHNOLOGY DIPANKAR BASU
MODULE 4

Network Security is vital in protecting client data and information, keeping shared data secure and
ensuring reliable access and network performance as well as protection from cyber threats. A well
designed network security solution reduces overhead expenses and safeguards organizations from
costly losses that occur from a data breach or other security incident. Ensuring legitimate access to
systems, applications and data enables business operations and delivery of services and products to
customers.

Types of Network Security Protections

Firewall

Firewalls control incoming and outgoing traffic on networks, with predetermined security rules.
Firewalls keep out unfriendly traffic and is a necessary part of daily computing. Network Security relies
heavily on Firewalls, and especially Next Generation Firewalls, which focus on blocking malware and
application-layer attacks.

INTERNET TECHNOLOGY DIPANKAR BASU


Network Segmentation

Network segmentation defines boundaries between network segments where assets within the group
have a common function, risk or role within an organization. For instance, the perimeter gateway
segments a company network from the Internet. Potential threats outside the network are prevented,
ensuring that an organization’s sensitive data remains inside. Organizations can go further by defining
additional internal boundaries within their network, which can provide improved security and access
control.

Common password authentication methods

A diverse range of authentication methods have been developed in recent years, including two-factor
authentication, biometrics, CAPTCHAs, and many more. Here is a list of the most common password
authentication methods, with a brief explanation of how each one can work for your customers.

1. STANDARD PASSWORD AUTHENTICATION

This is the most basic form of authentication that everyone will be familiar with. Standard password
authentication involves a user entering their username, accompanied by a secret code or passphrase
that allows them to gain access to a network, account, or application. In theory, if a password is kept
private and secure, unauthorized access will be prevented. In practice, however, even securely stored
passwords are vulnerable to hacking. Cybercriminals use programs that try thousands of potential
passwords, allowing them to gain access when the correct password is attempted.

To reduce the risk of a password being compromised, users should choose passwords with a
combination of both letters (uppercase and lowercase), numbers, and symbols. A strong password
should not use words found in the dictionary and should be at least eight characters in length. Users
should have a unique password for each of their accounts—but this can often make remembering all
their passwords a challenge. A secure password manager or password management software can help
with this, storing your passwords under a single master password for optimal security.

2. TWO-FACTOR AUTHENTICATION (2FA)

Two-factor authentication, or a form of multi-factor authentication, builds on top of passwords to create


a more robust security solution. Two-factor authentication requires you to authenticate yourself via

INTERNET TECHNOLOGY DIPANKAR BASU


something you know and something you have. A password serves as “something you know,” and the
possession of a specific physical object such as a smartphone serves as “something you have.” ATMs
were an early system to use two-factor authentication because they require both the insertion of a debit
card and a PIN.

In computer security, two-factor authentication usually requires the user to enter their username, a
password, and a one-time code that has been sent to a physical device. The device might be sent to your
cell phone via text message or might be generated using a mobile application. Two-factor authentication
is a great option for MSPs and other businesses because it adds an additional layer of security that is
very difficult for hackers to crack. Even if a hacker were able to guess your password, it would be
unlikely that they could also simultaneously gain access to the one-time code sent to your device.

3. TOKEN AUTHENTICATION

If you prefer not to rely on mobile phones, you might instead use a token authentication system. Token
systems use a purpose-built physical device to deliver two-factor authentication. This could be a dongle
that is inserted into your device’s USB port, or perhaps a smart card with radio frequency identification
or near-field communication chip.

To keep a token system secure, it is crucial that you ensure that your physical authentication device (i.e.,
dongle or smart card) does not fall into the wrong hands. Token-based systems are generally more
expensive than other password authentication methods because they require you to purchase purpose-
built hardware for each of your users. They are, however, very secure, and more cost-effective options
are entering the market as time goes on.

4. BIOMETRIC AUTHENTICATION

Biometric authentication has become increasingly popular—and you’re likely already familiar with it, as
it’s commonly featured on smartphone devices as well as some laptops. Biometrics rely on a user’s
physical characteristics to identify them. For example, biometric authentication might make use of
fingerprints, retinal or iris scans, or facial and voice recognition. This is a highly secure form of
authentication because no two individuals will have the same physical characteristics. Biometric
authentication is an effective way of knowing precisely who is logging into the system.

INTERNET TECHNOLOGY DIPANKAR BASU


Another advantage of biometric authentication is that it doesn’t require users to have a card, dongle, or
cell phone to hand. They don’t even necessarily need to remember their password. However, it is worth
noting that biometric systems are more secure when paired with a password.

Unfortunately, there are some downsides to biometrics systems. Firstly, they are very expensive to
install and require specialized equipment like retinal scanners or fingerprint readers. There are also
concerns regarding the privacy of biometric systems. Some users balk at the prospect of sharing their
biometric information with a company. As such, biometric authentication systems are most common in
environments that require the highest level of security, like the intelligence and defense sectors.

5. COMPUTER RECOGNITION AUTHENTICATION

Computer recognition is a password authentication method that verifies a user’s legitimacy by checking
that they are on a particular device. These systems install a small software plug-in on the user’s device
the first time they successfully login. This plug-in contains a cryptographic device marker. When the user
next logs in, the marker is checked to make sure they are on the same, trusted device.

This system is invisible to the user and doesn’t require any additional authentication actions from them.
They simply enter their username and password as usual, and verification happens automatically. The
disadvantage of this authentication method is that it can be cumbersome when users switch devices. To
maintain a high level of security, computer recognition authentication systems must enable logins from
new devices using other forms of verification (i.e., two-factor authentication with a code delivered via
SMS).

6. CAPTCHAS

CAPTCHAs do not focus on verifying a particular user, as the other methods listed in this article do.
Instead, CAPTCHAs aim to determine whether a user is human, to prevent computer-driven attempts to
break into accounts such as brute force attacks. The CAPTCHA system displays a distorted image of
letters and numbers, or pictures, and asks the user to type in what they see. Because computers and
bots struggle to identify these distortions correctly, CAPTCHAs enhance security by creating an
additional barrier to automated hacking systems.

VPN :

VPN stands for "Virtual Private Network" and describes the opportunity to establish a protected
network connection when using public networks. VPNs encrypt your internet traffic and disguise your

INTERNET TECHNOLOGY DIPANKAR BASU


online identity. This makes it more difficult for third parties to track your activities online and steal data.
The encryption takes place in real time.

IP SECURITY (IPSEC)

The IP security (IPSec) is an Internet Engineering Task Force (IETF) standard suite of protocols between 2
communication points across the IP network that provide data authentication, integrity, and
confidentiality. It also defines the encrypted, decrypted and authenticated packets. The protocols
needed for secure key exchange and key management are defined in it.

Uses of IP Security –

IPsec can be used to do the following things:

To encrypt application layer data.

To provide security for routers sending routing data across the public internet.

To provide authentication without encryption, like to authenticate that the data originates from a
known sender.

To protect network data by setting up circuits using IPsec tunneling in which all data is being sent
between the two endpoints is encrypted, as with a Virtual Private Network(VPN) connection.

INTERNET TECHNOLOGY DIPANKAR BASU


FIREWALL :

A firewall is a network security device that monitors incoming and outgoing network traffic and decides
whether to allow or block specific traffic based on a defined set of security rules.

Firewalls have been a first line of defense in network security for over 25 years. They establish a barrier
between secured and controlled internal networks that can be trusted and un trusted outside networks,
such as the Internet.

A firewall can be hardware, software, or both

INTERNET TECHNOLOGY DIPANKAR BASU


MODULE 5

VOIP

Voice over Internet Protocol (VoIP), is a technology that allows you to make voice calls using a
broadband Internet connection instead of a regular (or analog) phone line. Some VoIP services may only
allow you to call other people using the same service, but others may allow you to call anyone who has a
telephone number - including local, long distance, mobile, and international numbers. Also, while some
VoIP services only work over your computer or a special VoIP phone, other services allow you to use a
traditional phone connected to a VoIP adapter.

How VoIP / Internet Voice Works

VoIP services convert your voice into a digital signal that travels over the Internet. If you are calling a
regular phone number, the signal is converted to a regular telephone signal before it reaches the
destination. VoIP can allow you to make a call directly from a computer, a special VoIP phone, or a
traditional phone connected to a special adapter. In addition, wireless "hot spots" in locations such as
airports, parks, and cafes allow you to connect to the Internet and may enable you to use VoIP service
wirelessly.

INTERNET TECHNOLOGY DIPANKAR BASU


RSVP

RSVP is a transport layer protocol that is used to reserve resources in a computer network to get
different quality of services (QoS) while accessing Internet applications. It operates over Internet
protocol (IP) and initiates resource reservations from the receiver’s end.

Features

RSVP is a receiver oriented signalling protocol. The receiver initiates and maintains resource reservation.

It is used both for unicasting (sending data from one source to one destination) and multicasting
(sending data simultaneously to a group of destination computers).

RSVP supports dynamic automatic adaptation to changes in network.

It provides a number of reservation styles. It also provides support for addition of future styles.

RSVP Messages

There are two types of RSVP messages −

Path Messages (path): A path message is sent by the sender to all receivers by multicasting storing the
path state at each node in its path. It stores the necessary information so that the receivers can make
the reservation.

Reservation messages (resv): The resv message is sent by the receiver to the sender along the reverse
path of the path message. It identifies the resources that is requires by the data flow.

RTP

A protocol is designed to handle real-time traffic (like audio and video) of the Internet, is known as Real
Time Transport Protocol (RTP). RTP must be used with UDP. It does not have any delivery mechanism
like multicasting or port numbers. RTP supports different formats of files like MPEG and MJPEG. It is very
sensitive to packet delays and less sensitive to packet loss.

History of RTP :

This protocol is developed by Internet Engineering Task Force (IETF) of four members:

S. Casner (Packet Design)

V. Jacobson (Packet Design)

H. Schulzrinne (Columbia University)

R. Frederick (Blue Coat Systems Inc.)

INTERNET TECHNOLOGY DIPANKAR BASU


RTCP

Real-Time Transport Control Protocol (RTCP) is a protocol that works with Real-Time
Protocol (RTP) to monitor data delivery on large multicast networks. The purpose of
monitoring delivery is to determine whether RTP is providing the necessary Quality of
Service (QoS) and to compensate for delays, if needed. RTCP is used in voice over IP
(VoIP) and Internet Protocol Television (IPTV), streaming media and video
conferencing.RTCP carries statistical and control data, while RTP delivers the data. RTCP
statistics typically include the number of bytes sent, packets sent, lost packets and round
trip delay between endpoints. RTCP also carries the canomical name (CNAME), which is a
unique identifier for a participant during a session.RTCP can use five different packet types
to carry statistical and control data. The packets are RR (receiver report), SR (sender
report), SDES (source description items), BYE (indicates end of participation) and APP
(application specific functions)

RTSP

The Real-Time Streaming Protocol (RTSP) is a tried-and-true video technology. It’s used to
control audio/video transmission between two endpoints and facilitate the transportation of
low-latency streaming content across the internet.Along with the Real-Time Messaging
Protocol (RTMP), RTSP once dominated the streaming landscape. That’s no longer the
case today. Yet, RTSP remains standard in many surveillance and closed-circuit television
(CCTV) architectures. The reason for this is simple: it’s still the protocol of choice for IP
cameras.

SEO

SEO stands for “search engine optimization.” In simple terms, it means the process of
improving your site to increase its visibility when people search for products or services
related to your business in Google, Bing, and other search engines. The better visibility your
pages have in search results, the more likely you are to garner attention and attract
prospective and existing customers to your business.

INTERNET TECHNOLOGY DIPANKAR BASU


INTERNET TECHNOLOGY DIPANKAR BASU

You might also like