KEMBAR78
L7 Notes | PDF | Internet Protocol Suite | Internet
0% found this document useful (0 votes)
10 views24 pages

L7 Notes

Computer short notes for any exam.

Uploaded by

nilotpal ghosh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views24 pages

L7 Notes

Computer short notes for any exam.

Uploaded by

nilotpal ghosh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

COMPUTER KNOWLEDGE

Scope
I. What is INTERNET?
i. TCP/IP & it’s role in working of INTERNET
ii. Network Models (OSI and TCP/IP Model
iii. HARDWARE / SOFTWARE Requirements for INTERNET
iv. DOMAIN NAME
v. Web Browser
vi. IPv4 and IPv6
II. E-Mail – Definition & Structure
III. Hacking / Virus – Definition & Types (Malware, Adware, Spyware Etc.)
What is INTERNET?
➢ INTERNET is a global system of interconnected computer networks that use the standard
Internet Protocol suite (TCP/IP) to serve millions of users worldwide. It is probably the
largest LAN in the world
➢ The Department of Defence of USA created ARPANET in response to SOVIET UNIONs
launching Sputnik in 1957

TCP/IP – Transmission Control Protocol & Internet Protocol

What is the role of TCP/IP?


• TCP divides the data into data packets for the purpose of sending and receiving data. The
rules for reassembling data and damage-free delivery are also specified.
• IP’s role is to put destination on such packet.
• IP Address – XXX.XXX.XXX.XXX – 8 Bits of information in each OCTET
• Total 32 bits of information in an IP Address
Network Models – OSI & TCP/IP
➢ Computer network models are responsible for establishing a connection among the sender and
receiver and transmitting the data in a smooth manner respectively.
➢ There are two computer network models i.e. OSI Model and TCP/IP Model on which the whole
data communication process relies.
Network Models – OSI & TCP/IP
The concept of network layers is a
framework that helps to understand
complex network interactions.

There are two models that are widely


referenced today:

1. OSI - Open Systems Interconnection


2. TCP/IP

The concepts are similar, but the layers


themselves differ between the two
models.
Who GOVERNS the Internet?
Internet has NO Chief Operating Officer & it is governed by a number of authorities

VOLUNTARY AUTHORITIES
❖ ISOC (Internet Society) – Objective to promote global exchange of information
❖ IAB (Internet Architecture Board) – Sets standard and provides internet addresses
❖ IETF (Internet Engineering Task Force) – Discusses the technical and operational problems
HARDWARE for INTERNET
1. MODEM – To convert analog to digital and digital to analog.
2. HUB – Place of convergence where data arrives & is forwarded
3. BRIDGE – It is a network that connects two or more networks
4. ROUTER – Router determines the next network point to which data packet should be
forwarded. Available at low prices these days and enable connection to more devices
5. GATEWAY – Entrance to another network
SOFTWARE for INTERNET
1. HTTP – Hypertext Transfer Protocol
▪ Defines the format for communication between web browsers and web servers
2. IMAP – Internet Message Access Protocol
▪ Defines format for communication between E-mail servers and clients
3. SSL – Secure Sockets Layer
▪ Developed by NETSCAPE for transmitting private documents
4. TCP/IP – Transfer Control Protocol / Internet Protocol
▪ Main protocol used in the INTERNET – It manages all the information that moves across the internet
5. FTP – File Transfer Protocol
▪ Standards that establish the format in which files can be transmitted from one computer to another.
6. TFTP – Trivial File Transfer Protocol
7. SMTP – Simple Mail Transfer Protocol
8. HTML – Hypertext Markup Language
9. SGML – Standard General Markup Language
10. URL – Uniform Resource Locator
IPv4
➢ Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol (IP). It is
one of the core protocols of standards-based internetworking methods in the Internet and
other packet-switched networks. IPv4 was the first version deployed for production
on SATNET in 1982 and on the ARPANET in January 1983. It is still used to route most Internet
traffic today
➢ Purpose: The Internet Protocol is the protocol that defines and enables inter-networking at
the internet layer of the Internet Protocol Suite. In essence it forms the Internet. It uses a
logical addressing system and performs routing, which is the forwarding of packets from a
source host to the next router that is one hop closer to the intended destination host on another
network
➢ IPv4 uses 32-bit addresses which limits the address space to 4294967296 (232) addresses.
IPv4 Internet address range
IPv6
Internet Protocol version 6 (IPv6) is the most recent version of the Internet
Protocol (IP), the communications protocol that provides an identification and location system for
computers on networks and routes traffic across the Internet. IPv6 was developed by the Internet
Engineering Task Force (IETF) to deal with the long-anticipated problem of IPv4 address
exhaustion, and is intended to replace IPv4

Larger address space


The main advantage of IPv6 over IPv4 is its larger address space. The size of an IPv6 address is
128 bits, compared to 32 bits in IPv4. The address space therefore has 2128 =
340,282,366,920,938,463,463,374,607,431,768,211,456 addresses (approximately 3.4×1038).
IPv4 vs IPv6
WEBSITE
• A website is a collection of web pages and related content that is identified by a
common
domain name
• Websites are the most important element of the internet.
• The central page of a website is called a home page.
• Home Page - is usually the first page you see when you call a website up and can
also be called a ‘start page’ or ‘index page’. From here onwards, the user delves
into the site’s subpages.

Types of Website:
1. Static – Having fixed and display the same content for every user, usually written
exclusively in HTML.
2. Dynamic – They can display different content and provide user interaction, by
making use of advanced programming and databases in addition to HTML.
DOMAIN NAME
➢A domain name is your website name.
➢A domain name is the address where Internet users can access your website.
➢A domain name is used for finding and identifying computers on the Internet.

Categories :
1. .com – Commercial Institutions or organization
2. .edu – Educational Institutions
3. .gov – Government sites
4. .mil – Military Sites
5. .net – Gateways and administrative hosts
6. .org – Private Organizations
WEB BROWSER
A web browser is a software application for accessing information on the
World Wide Web.
E-MAIL
An email address is a unique address, which identifies a location to send and
receive email. It contains username, followed by an “@” symbol and then
domain name

EMAIL ID - jsmith@example.com

Structure of EMAIL :-
1) From – Contains Email ID and name of the sender optionally
2) To – To another email ID and optionally name of the receiver
3) Subject – Brief summary of the contents of the message
4) Date – Local time when the message was sent
5) CC – Carbon Copy
6) BCC – Blind Carbon Copy
E-COMMERCE / E-PAYMENTS
Ecommerce, also known as electronic commerce or internet
commerce, refers to the buying and selling of goods or
services using the internet, and the transfer of money and
data to execute these transactions.
Ecommerce is often used to refer to the sale of physical
products online, but it can also describe any kind of
commercial transaction that is facilitated through the
internet.

E- PAYMENTS
BHIM – Bharat Interface for Money –
Initiative to enable fast, secure, reliable cashless payments through
your mobile phone

UPI – Unified Payments Interface – Instant real-time payment system


developed by National Payments Corporation of India facilitating inter-
bank transactions
COMPUTER HACKING / VIRUS
HACKING – Is an attempt to exploit a computer system or a private network
inside a computer. It is the unauthorized access to control over computer
network security systems for some illicit purposes.
Viruses, Trojan Horse, Password Cracking are all types of Computer Hacking!

VIRUS - A virus is a parasitic program that infects another legitimate program,


which is sometimes called the host. To infect the host program, the virus
modifies the host so that it contains a copy of the virus.
COMPUTER HACKING / VIRUS
Types of virus –
1. Malware - is short for malicious software. Malware is designed to cause damage to a stand alone
computer or a networked pc. So wherever a malware term is used it means a program which is designed
to damage your computer.
2. Adware - Generically adware is a software application in which advertising banners are displayed while
any program is running. Adware can automatically get downloaded to your system while browsing any
website and can be viewed through pop-up windows or through a bar that appears on a computer screen
automatically. Adware's are used by companies for marketing purpose.
3. Spyware - Spyware is a type of program that is installed with or without your permission on your personal
computers to collect information about users, their computer or browsing habits tracks each and
everything that you do without your knowledge and send it to remote user. It also can download other
malicious programs from internet and install it on the computer.
4. Worms - A worm is a program whose purpose is to duplicate itself.
5. Trojan Horses - A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate
but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general inflict
some other harmful action on your data or network.
COMPUTER HACKING / VIRUS
6. Phishing - It is a cyber crime in which targets are contacted by email, telephone or
text message by someone posing as a legitimate institution to lure individuals into
providing sensitive data such as banking passwords, credit card details etc.
7. Denial of service - DDOS - It is a type of cyber attack in which the attacker seeks to
make a machine of network resource unavailable to its users. Example - Can be done
by putting too much load on the server. Overload the server. Used to hamper work of
bigger organizations.
8. Man in the middle - When the attacker positions himself in a conversation between
a user and an application - either to eavesdrop or to impersonate one of the parties
making it appear as if a normal exchange of information is underway.
9. Crypto Jacking - It is an emerging online threat that hides on a computer or mobile
device and uses the machine’s resources to mine forms of online money known as
cryptocurrencies.
10. SQL Injection - This is one of the most common web hacking techniques. The attacker
can interfere with the queries when a person is filling up a form or
username/password.
PRACTICE QUESTIONS
1. The process of transferring files from a computer on the Internet to your computer is called
A. Uploading B. Forwarding
C. FTP D. Downloading

2. Which one of these is not a Search Engine?


A. Bing B. Google
C. Yahoo D. Windows

3. A computer on internet are identified by :


A. E-Mail Address B. Street Address
C. IP Address D. None of the Above
PRACTICE QUESTIONS
4. Which of the following is a type of program that either pretends to have, or is described as having,
a set of useful or desirable features but actually contains damaging code.
A. Trojans B. Viruses
C. Worm D. Adware

5. Which of the following is the type of software that has self-replicating software that causes
damage to files and system?
A. Viruses B. Trojan Horse
C. Bots D. Worms

6. What is the software called which when get downloaded on computer scans your hard drive for
personal information and your internet browsing habits?
A. Key-Logger B. Malware
C. Antiware D. Spyware
PRACTICE QUESTIONS
7. Which of the following is a correct format of an EMAIL Address?
A. name@website@info B. name@website.info
C. www.nameofwebsite.com D. name.website.com

8. Which of the following TCP/IP protocol is used for transferring electronic mail messages from one
machine to another
A. FTP B. SNMP
C. SMTP D. RPC

9. SMTP Stands for


A. Simple Mail Transfer Protocol B. Standard Mail Transfer Protocol
C. Simple Mail Transfer Procedure D. None of these

You might also like