2. Internet Protocol
The Internet Protocol (IP) is the method or
protocol by which data is sent from one computer to
another on the internet. Each computer on the
Internet has at least one ip address that uniquely
identifies it from all other computers on the
Internet.
The Internet Protocol (IP) is a protocol, or set of
rules, for routing and addressing packets of data so
that they can travel across networks and arrive at the
correct destination.
3. When you send or receive data (for example, an e-
mail note or a Web page), the message gets divided
into little chunks called packets. Each of these
packets contains both the sender's Internet
address and the receiver's address. Any packet is
sent first to a gateway computer that understands a
small part of the Internet
IP is a connectionless protocol, which means that
there is no continuing connection between the end
points that are communicating
4. IP has the task of delivering packets from the
source host to the destination host solely based on
the IP address in the packet headers
The Internet Protocol is the principal
communications protocol in the Internet protocol
suite for relaying datagrams across network
boundaries. Its routing function enables
internetworking, and essentially establishes the
Internet
Internet Protocol is very crucial because the
entire web keeps running over it.
5.
6. Types of internet protocol
Several protocols are used on the Internet,
including Electronic Mail (e-mail), File
Transfer Protocol (FTP), HTTP (World
Wide Web), News (or Usenet), Gopher and
Telnet. Each of these has its own standard
and usage.
7. File Transfer Protocol
File Transfer Protocol, or FTP, is a means of
transferring a file from one computer to another. FTP
is commonly used for uploading a web page to a web
server so that it may be seen on the World Wide Web.
A special program, called a client, is usually needed to
use FTP.
The File Transfer Protocol (FTP) is a standard
network protocol used for the transfer of computer
files between a client and server on a computer
network. FTP is built on a client-server model
architecture using separate control and data
connections between the client and the server
8. FTP Clients
FTP client is a program that implements a file transfer
protocol which allows you to transfer files between two
hosts on the internet.
It allows a user to connect to a remote host and upload
or download the files.
It has a set of commands that we can use to connect to
a host, transfer the files between you and your host
and close the connection.
The FTP program is also available as a built-in
component in a Web browser. This GUI based FTP
client makes the file transfer very easy and also does
not require to remember the FTP commands.
9. HTTP
HTTPS stands for Hyper Text Transfer Protocol
Secure. It is a protocol for securing the
communication between two systems e.g. the
browser and the web server.
Hypertext transfer protocol secure (HTTPS) is the
secure version of http, which is the primary
protocol used to send data between a web browser
and a website. HTTPS is encrypted in order to
increase security of data transfer.
"https://example.com"
10. Secure Socket Layer (SSL)
SSL is the standard security technology for
establishing an encrypted link between the two
systems. These can be browser to server, server to
server or client to server. Basically, SSL ensures
that the data transfer between the two systems
remains encrypted and private.
The https is essentially http over SSL. SSL
establishes an encrypted link using an SSL
certificate which is also known as a digital
certificate.
11. Secure Communication: https makes a secure
connection by establishing an encrypted link
between the browser and the server or any two
systems.
Data Integrity: https provides data integrity by
encrypting the data and so, even if hackers
manage to trap the data, they cannot read or
modify it.
Privacy and Security: https protects the privacy
and security of website users by preventing
hackers to passively listen to communication
between the browser and the server.
Advantage of http
12. Faster Performance: https increases the
speed of data transfer compared to http by
encrypting and reducing the size of the
data.
SEO: Use of https increases SEO ranking. In
Google Chrome, Google shows the Not
Secure label in the browser if users' data is
collected over http.
Future: https represents the future of the
web by making internet safe for users and
website owners.
13.
14. Telnet
Telnet lets you log in to a remote computer just as
you would if you were there. So any commands
that you would be able to run from the remote
computer if you were sitting in front of it, you
would be able to run from the computer you
logged in from.
Telnet provides a connection to the remote
computer in such a way that a local terminal
appears to be at the remote side
15. Local Login
When a user logs into a local computer, then it is
known as local login.
When the workstation running terminal emulator, the
keystrokes entered by the user are accepted by the
terminal driver. The terminal driver then passes these
characters to the operating system which in turn,
invokes the desired application program
Remote login
When the user wants to access an application program
on a remote computer, then the user must perform
remote login.
16. Gopher
Another tool of the Internet is Gopher, a
menu-based program that enables you to
browse for information without knowing
where the material is located. It lets you
search a list of resources and then sends the
material to you.
A Gopher system consists of a series of
hierarchical hyperlinkable menus. The
choice of menu items and titles is controlled
by the administrator of the server