M.Raj shree
M.SC(IT)
Nadar saraswathi college of arts&science
Internet Protocol
 The Internet Protocol (IP) is the method or
protocol by which data is sent from one computer to
another on the internet. Each computer on the
Internet has at least one ip address that uniquely
identifies it from all other computers on the
Internet.
 The Internet Protocol (IP) is a protocol, or set of
rules, for routing and addressing packets of data so
that they can travel across networks and arrive at the
correct destination.
 When you send or receive data (for example, an e-
mail note or a Web page), the message gets divided
into little chunks called packets. Each of these
packets contains both the sender's Internet
address and the receiver's address. Any packet is
sent first to a gateway computer that understands a
small part of the Internet
 IP is a connectionless protocol, which means that
there is no continuing connection between the end
points that are communicating
 IP has the task of delivering packets from the
source host to the destination host solely based on
the IP address in the packet headers
 The Internet Protocol is the principal
communications protocol in the Internet protocol
suite for relaying datagrams across network
boundaries. Its routing function enables
internetworking, and essentially establishes the
Internet
 Internet Protocol is very crucial because the
entire web keeps running over it.
Types of internet protocol
 Several protocols are used on the Internet,
including Electronic Mail (e-mail), File
Transfer Protocol (FTP), HTTP (World
Wide Web), News (or Usenet), Gopher and
Telnet. Each of these has its own standard
and usage.
File Transfer Protocol
 File Transfer Protocol, or FTP, is a means of
transferring a file from one computer to another. FTP
is commonly used for uploading a web page to a web
server so that it may be seen on the World Wide Web.
A special program, called a client, is usually needed to
use FTP.
 The File Transfer Protocol (FTP) is a standard
network protocol used for the transfer of computer
files between a client and server on a computer
network. FTP is built on a client-server model
architecture using separate control and data
connections between the client and the server
FTP Clients
 FTP client is a program that implements a file transfer
protocol which allows you to transfer files between two
hosts on the internet.
 It allows a user to connect to a remote host and upload
or download the files.
 It has a set of commands that we can use to connect to
a host, transfer the files between you and your host
and close the connection.
 The FTP program is also available as a built-in
component in a Web browser. This GUI based FTP
client makes the file transfer very easy and also does
not require to remember the FTP commands.
HTTP
 HTTPS stands for Hyper Text Transfer Protocol
Secure. It is a protocol for securing the
communication between two systems e.g. the
browser and the web server.
 Hypertext transfer protocol secure (HTTPS) is the
secure version of http, which is the primary
protocol used to send data between a web browser
and a website. HTTPS is encrypted in order to
increase security of data transfer.
 "https://example.com"
Secure Socket Layer (SSL)
 SSL is the standard security technology for
establishing an encrypted link between the two
systems. These can be browser to server, server to
server or client to server. Basically, SSL ensures
that the data transfer between the two systems
remains encrypted and private.
 The https is essentially http over SSL. SSL
establishes an encrypted link using an SSL
certificate which is also known as a digital
certificate.
 Secure Communication: https makes a secure
connection by establishing an encrypted link
between the browser and the server or any two
systems.
 Data Integrity: https provides data integrity by
encrypting the data and so, even if hackers
manage to trap the data, they cannot read or
modify it.
 Privacy and Security: https protects the privacy
and security of website users by preventing
hackers to passively listen to communication
between the browser and the server.
Advantage of http
 Faster Performance: https increases the
speed of data transfer compared to http by
encrypting and reducing the size of the
data.
 SEO: Use of https increases SEO ranking. In
Google Chrome, Google shows the Not
Secure label in the browser if users' data is
collected over http.
 Future: https represents the future of the
web by making internet safe for users and
website owners.
Telnet
 Telnet lets you log in to a remote computer just as
you would if you were there. So any commands
that you would be able to run from the remote
computer if you were sitting in front of it, you
would be able to run from the computer you
logged in from.
 Telnet provides a connection to the remote
computer in such a way that a local terminal
appears to be at the remote side
Local Login
 When a user logs into a local computer, then it is
known as local login.
 When the workstation running terminal emulator, the
keystrokes entered by the user are accepted by the
terminal driver. The terminal driver then passes these
characters to the operating system which in turn,
invokes the desired application program
Remote login
 When the user wants to access an application program
on a remote computer, then the user must perform
remote login.
Gopher
 Another tool of the Internet is Gopher, a
menu-based program that enables you to
browse for information without knowing
where the material is located. It lets you
search a list of resources and then sends the
material to you.
 A Gopher system consists of a series of
hierarchical hyperlinkable menus. The
choice of menu items and titles is controlled
by the administrator of the server

internet protocol

  • 1.
  • 2.
    Internet Protocol  TheInternet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the internet. Each computer on the Internet has at least one ip address that uniquely identifies it from all other computers on the Internet.  The Internet Protocol (IP) is a protocol, or set of rules, for routing and addressing packets of data so that they can travel across networks and arrive at the correct destination.
  • 3.
     When yousend or receive data (for example, an e- mail note or a Web page), the message gets divided into little chunks called packets. Each of these packets contains both the sender's Internet address and the receiver's address. Any packet is sent first to a gateway computer that understands a small part of the Internet  IP is a connectionless protocol, which means that there is no continuing connection between the end points that are communicating
  • 4.
     IP hasthe task of delivering packets from the source host to the destination host solely based on the IP address in the packet headers  The Internet Protocol is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet  Internet Protocol is very crucial because the entire web keeps running over it.
  • 6.
    Types of internetprotocol  Several protocols are used on the Internet, including Electronic Mail (e-mail), File Transfer Protocol (FTP), HTTP (World Wide Web), News (or Usenet), Gopher and Telnet. Each of these has its own standard and usage.
  • 7.
    File Transfer Protocol File Transfer Protocol, or FTP, is a means of transferring a file from one computer to another. FTP is commonly used for uploading a web page to a web server so that it may be seen on the World Wide Web. A special program, called a client, is usually needed to use FTP.  The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network. FTP is built on a client-server model architecture using separate control and data connections between the client and the server
  • 8.
    FTP Clients  FTPclient is a program that implements a file transfer protocol which allows you to transfer files between two hosts on the internet.  It allows a user to connect to a remote host and upload or download the files.  It has a set of commands that we can use to connect to a host, transfer the files between you and your host and close the connection.  The FTP program is also available as a built-in component in a Web browser. This GUI based FTP client makes the file transfer very easy and also does not require to remember the FTP commands.
  • 9.
    HTTP  HTTPS standsfor Hyper Text Transfer Protocol Secure. It is a protocol for securing the communication between two systems e.g. the browser and the web server.  Hypertext transfer protocol secure (HTTPS) is the secure version of http, which is the primary protocol used to send data between a web browser and a website. HTTPS is encrypted in order to increase security of data transfer.  "https://example.com"
  • 10.
    Secure Socket Layer(SSL)  SSL is the standard security technology for establishing an encrypted link between the two systems. These can be browser to server, server to server or client to server. Basically, SSL ensures that the data transfer between the two systems remains encrypted and private.  The https is essentially http over SSL. SSL establishes an encrypted link using an SSL certificate which is also known as a digital certificate.
  • 11.
     Secure Communication:https makes a secure connection by establishing an encrypted link between the browser and the server or any two systems.  Data Integrity: https provides data integrity by encrypting the data and so, even if hackers manage to trap the data, they cannot read or modify it.  Privacy and Security: https protects the privacy and security of website users by preventing hackers to passively listen to communication between the browser and the server. Advantage of http
  • 12.
     Faster Performance:https increases the speed of data transfer compared to http by encrypting and reducing the size of the data.  SEO: Use of https increases SEO ranking. In Google Chrome, Google shows the Not Secure label in the browser if users' data is collected over http.  Future: https represents the future of the web by making internet safe for users and website owners.
  • 14.
    Telnet  Telnet letsyou log in to a remote computer just as you would if you were there. So any commands that you would be able to run from the remote computer if you were sitting in front of it, you would be able to run from the computer you logged in from.  Telnet provides a connection to the remote computer in such a way that a local terminal appears to be at the remote side
  • 15.
    Local Login  Whena user logs into a local computer, then it is known as local login.  When the workstation running terminal emulator, the keystrokes entered by the user are accepted by the terminal driver. The terminal driver then passes these characters to the operating system which in turn, invokes the desired application program Remote login  When the user wants to access an application program on a remote computer, then the user must perform remote login.
  • 16.
    Gopher  Another toolof the Internet is Gopher, a menu-based program that enables you to browse for information without knowing where the material is located. It lets you search a list of resources and then sends the material to you.  A Gopher system consists of a series of hierarchical hyperlinkable menus. The choice of menu items and titles is controlled by the administrator of the server