Summary Note On Internet and Intranet
Summary Note On Internet and Intranet
Summary Note On Internet and Intranet
CHAPTER 1
Introduction to Internet and Intranet
Introduction - Internet and Intranet
- Intranet is the networking structure in which multiple computers are
connected to each other, generally for organizational purposes.
- The intranet within an organization is only accessible to the members
of that organization.
- Internet is the worldwide network of interconnected computers.
- Each computer connected to the Internet is identified by a unique
address called IP Address.
- Everyone in the globe have access to the Internet.
Similarities
1. Both uses Internet protocol like TCP/IP and FTP.
2. Both can be accessed via a web browser.
Differences
1. Internet is general to computers all over the world while Intranet is
for specific computers only.
2. Internet has a lot of vulnerabilities while Intranet can be safely
privatized as per the need.
3. Internet has public space while Intranet is designed to be a private
space.
4. Visitor’s traffic is unlimited in Internet while traffic allowed is limited
in Intranet.
https://engineeringnotenepal.blogspot.com/
Internet and intranet
Internet Ecosystem
Components of Internet Ecosystem
- Internet ecosystem describes the organizations and communities
that guides the operation and development of technologies and
infrastructure that comprises the global Internet.
- It focuses on the rapid and continued development and adoption of
Internet technologies.
The various components of Internet ecosystem are as follows:
1. Naming and Addressing Component
2. Policy Development Body
https://engineeringnotenepal.blogspot.com/
Internet and intranet
https://engineeringnotenepal.blogspot.com/
Internet and intranet
Policy Development:
1. IP address policy:
- The process by which allocation policy is proposed and agreed is
driven through bottom-up and open consultation.
- It is mainly handled by Number Resource Organization(NRO) and
ICANN Address Supporting Organization.
- Any individual and organization can participate in policy proposal,
which starts at Regional IP address allocation policy development
body.
- The policy that may have global import will be submitted through RIR
policy forum.
- To be declared global, the policy should affect all the five RIR and
IANA.
- Global policy are discussed within each of the RIR and a common
position is sought that can then be forwarded to ASO.
- The ASO then communicates the proposal to the ICANN board and
once it is accepted, it is announced global and published on NRO and
ICANN websites.
2. gTLD Policy:
- gTLD policy discussion is initiated by or within ICANN’s GNSO
following inputs from its stakeholders i.e. CBUC, ISPCP, NCUC, gTLD
Registries, Registrars and Intellectual Property Constituency (IPC).
- Each of the stakeholder has their own policy process to allow
https://engineeringnotenepal.blogspot.com/
Internet and intranet
https://engineeringnotenepal.blogspot.com/
Internet and intranet
Users
- Users the people who makes use of the developed technologies and
Internet following the standard policies and protocols.
https://engineeringnotenepal.blogspot.com/
Internet and intranet
Zealand)
4. Latin America and Caribbean Network Information Center (Latin
America and parts of Caribbean region)
5. Reseaux IP Europeans Network Coordination Center (Europe,
Russia, Middle East, Central Asia)
- National Internet Registrar is an organization under RIR with the task
of coordinating IP address allocations and other Internet resource
management functions at a national level within a country.
- Local Internet Registrar is an organization that has been allocated a
block of IP addresses by RIR, which in turns assigns most parts of this
block to its own customers.
- Generally, LIR includes Internet Service Provider.
- Membership in RIR is required to become a LIR.
https://engineeringnotenepal.blogspot.com/
Internet and intranet
https://engineeringnotenepal.blogspot.com/
Internet and intranet
https://engineeringnotenepal.blogspot.com/
Internet and intranet
https://engineeringnotenepal.blogspot.com/
Internet and intranet
Teleports:
- Teleport is a satellite ground station with multiple parabolic antennas
that functions as a hub connecting a satellite with a terrestrial
telecommunication network.
- It may provide broadcasting services among other
telecommunication functions, such as uploading a computer program
or issuing commands over an uplink to a satellite.
https://engineeringnotenepal.blogspot.com/
Internet and intranet
CHAPTER 2
Internet Protocol Overview
TCP/IP and IP Layer Overview
TCP/IP Architecture
- TCP/IP stands for Transmission Control Protocol and Internet
Protocol.
- It is a four layer conceptual model.
- The four layers are application layer, transport layer, Internet layer
and Network layer.
- It provides a flexible architecture in the sense that adding new
machines to the network is easy.
- The network is robust and connectionless.
IP Layer:
- It is responsible for addressing, routing and packaging functions.
- It uses the protocols like IP, ARP, ICMP and IGMP.
- IP is a routable protocol responsible for IP addressing, routing and
fragmentation plus reassembly of the packets.
- This layer helps the packets to travel independently to the
destination.
- The order in which the packets are received in the destination is
different from the order they are sent.
https://engineeringnotenepal.blogspot.com/
Internet and intranet
IPv4 Header:
- The IPv4 header consists of following:
1. Version: Version number of Internet Protocol used.
2. Internet Header Length (IHL): Length of entire IP header.
3. Differentiated Services Code Point (DSCP): It is a type of service.
4. Explicit Congestion Notification (ECN): Carries information about
https://engineeringnotenepal.blogspot.com/
Internet and intranet
https://engineeringnotenepal.blogspot.com/
Internet and intranet
IPv4 Address:
- IPv4 address is a 32 bit address composed of 4 octets, each of 8 bit;
separated by ‘.’
- IPv4 uses hierarchical addressing scheme.
- A single IP address can contain information about the network, its
sub-networks and also the hosts.
- It is hierarchical because a network can have many sub-networks,
which in turns have many hosts.
- The general addressing scheme is shown below:
| Network (8) | Network (8) | Sub-Network (8) | Host (8) |
- Example: 192.168.0.1
IPv4 Fragmentation:
- The process of fragmentation in IPv4 is managed by a 32 bit field of
the IPv4 header present at 4th octet.
- Identification, flag and fragment offset are responsible for
fragmentation.
- A 16 bit identifier allows fragments to share a common value so that
they can be identified as fragments from the same original packet in
the destination.
- A 3 bit flags provides the status. The first bit is unused. The second
bit if set, the packet cannot be fragmented and must be discarded if it
cannot be forwarded. The third bit is More-fragments-bit, which is set
for all the fragments except the last one.
Example: Suppose a router is attempting to pass 1320 octets of IP
packet into a network whose maximum packet size is 532 octets. So,
fragmentation is needed. Here, the original packet is divided into three
fragments. The first fragment with 532 octets (IP payload of 512
octet), second with 532 octet (IP payload of 512 octet) and third one
with 296 octets (IP payload of 376 octet).
The demonstration is shown in given figure:
https://engineeringnotenepal.blogspot.com/
Internet and intranet
https://engineeringnotenepal.blogspot.com/
Internet and intranet
IPv6 Address:
- IPv6 address is made of 128 bits divided into eight 18 bits blocks.
- Each block is separated by colon ‘:’
- Example: 2001:0000:3238: DFE3:0063:0000:0000: AB4F
- Some rules are specified to shorten this length. They are as follows:
1. Discard leading zeros. In block 5, 0063 can be written as 63.
2. If two or more blocks contain consecutive zero, omit them all and
replace with double colon ‘:’. Block 6 and 7 can be replace with ::
3. Consecutive zero blocks can be replaced by: only one. So, if zeros
still prevail, they should be shrunk down to a single zero. In second
https://engineeringnotenepal.blogspot.com/
Internet and intranet
IPv6 Fragmentation:
- Fragmentation is handled by fragment header.
- It consists of only one flag bit (More-fragment bit) and other two bits
are reserved.
- The packet identifier field is of 32 bits.
- IPv6 router is not able to fragment IPv6 packets. So IPv6 sender is
responsible for fragmenting the IPv6 packet at the source.
Internet RFCs
Internet RFC
- RFC stands for Request for Comments.
- RFC documents is the documents that is used by the Internet
community as a way to define new standards and share technical
information.
- It is published by the researchers from universities and corporations
to offer best practices and solicit feedback on Internet technologies.
- RFC is managed by an organization known as Internet Engineering
Task Force (IETF).
- RFC should be in plain text format.
- RFC can also be used as the reference to study the glimpse of the
early days of computer networking.
- Some of the early stages of computer networking technologies are
documented in RFC including:
1. Internet domain name concepts (RFC 1034)
2. Address allocation for private intranets (RFC 1918)
3. HTTP (RFC 1945)
4. IPv6 (RFC 2460)
- Comments on RFC are given through the RFC Editor site (rfc-
editor.org)
https://engineeringnotenepal.blogspot.com/
Internet and intranet
RFC Streams:
- There are four streams of RFC. They are as follows:
1. IETF
2. IRTF
3. IAB
4. Independent Submission
- Only IETF can create Best Current Practice (BCP) and RFC on
standard track.
- An independent submission is checked by IESG for conflicts with
IETF work. The quality is assessed by the independent submission
editorial board.
- IRTF and independent submission are supposed to be experiments
for the Internet without any conflicts with IETF.
RFC Status:
- Each RFC is assigned a designation with regard to status within the
Internet standardization process.
- The status may be:
1. Informational
2. Experimental
3. Best Current Practice
4. Standard Track
5. Historic
- Only IETF approves the standard tracks RFC.
- Standard track is again divided into proposed standard, draft
standard and Internet standard.
- Once RFC is approved as Internet standard, it is provided with a
STD number.
- Informational RFC can be anything that provides information about
https://engineeringnotenepal.blogspot.com/
Internet and intranet
the Internet.
- Experimental RFC can be IETF document or individual submission.
A draft is assigned experimental if it is unclear whether the proposal
will work or widely accepted.
- BCP covers technical documents for how to practice Internet
standards.
- Historic RFC are the RFC with the technologies that are no longer
recommended for use.
https://engineeringnotenepal.blogspot.com/
Internet and intranet
CHAPTER 3
Protocols and Client/Server Applications
Standard Protocols
1. Electronic Mail:
- Mail server is the computer system that is responsible to forward
mails towards its intended recipient.
- Every email that is sent passes through a series of mail servers
before reaching recipient.
- Without the series of mail servers, it would be possible to send
emails within same domain only.
- The control message format is documented in RFC22.
- Each control message is embedded in appropriate message
structure.
- It is shown in given figure:
https://engineeringnotenepal.blogspot.com/
Internet and intranet
https://engineeringnotenepal.blogspot.com/
Internet and intranet
2. SMTP:
- SMTP stands for Simple Mail Transfer Protocol.
- It is an email transmit text based protocol which moves the email on
and across networks using a process called ‘store and forward’.
- It works with Main Transfer Agent to send communication to the right
computer.
- It provides a set of codes that simply communicate email messages
between email servers.
- When you send out a message, it is turned into strings of text
separated by code words that identify the purpose of each section.
- It provides those codes to servers.
https://engineeringnotenepal.blogspot.com/
Internet and intranet
3. POP:
- POP stands for Post Office Protocol.
- It is the standard client/server protocol for receiving emails.
- Email is received and held for the user by the Internet server.
- Periodically, the user check their mail box on the server and
download any mail.
- As soon as the user downloaded the mail, POP3 deletes the mail on
https://engineeringnotenepal.blogspot.com/
Internet and intranet
the server.
- It is a kind of ‘store and forward’ service.
4. IMAP:
- IMAP stands for Internet Message Access Protocol.
- It is the standard protocol for receiving emails in which the stored
messages on the mail server can be viewed and manipulated by the
end users as though they are stored locally.
- Users can organize messages into folders on the server.
- It is a kind of remote file server.
- It also supports multiple logins.
5. PGP:
- PGP stands for Pretty Good Privacy.
- It helps to secure e-mails.
- It is a program used to encrypt and decrypt email over the Internet as
well as authenticate messages with digital signatures.
- Each user has encryption key and private key.
- Message is encrypted and send to someone using their encryption
key.
- It uses faster encryption algorithm to encrypt message.
- The receiver private key is used to decrypt to short key; which is the
key used to decrypt the message.
6. HTTP:
- HTTP stands for Hyper Text Transfer Protocol.
- HTTP is an application protocol for distributed, collaborative and
hypermedia information system used for data communication in
WWW.
- It acts as a request-response protocol in client-server computing
model.
https://engineeringnotenepal.blogspot.com/
Internet and intranet
https://engineeringnotenepal.blogspot.com/
Internet and intranet
7. FTP:
- FTP stands for File Transfer Protocol.
- FTP is a standard network protocol used for transfer of files from a
server to a client using client-server architecture on a network.
Communication in FTP
- FTP may run in active or passive mode, which determines how data
connection is established.
- In active mode, client starts listening for incoming data connections
from server on port M. It sends FTP command PORT M to inform
server on which port it is listening. The server then initiates data
channel to the client from its port 20.
- In passive mode, the client uses control connection to send PASV
command to the server and receives server IP address and server
port no from the server. The client then uses to open a data
connection from an arbitrary client port to server IP address and
server port no received.
https://engineeringnotenepal.blogspot.com/
Internet and intranet
https://engineeringnotenepal.blogspot.com/
Internet and intranet
backbone itself. They have the highest speed connections and very
reliable networks. Their customers are either lower-tiered ISPs or
large companies that are looking for a very reliable and fast access to
the Internet. A major advantage of purchasing service from a tier 1
ISP is if there is a problem with access, only one company is involved,
so solving the problem is that much easier. Sprint is a tier 1 ISP.
- Tier 2 ISPs purchase their Internet service from a tier 1 ISP. Tier 2
ISPs tend to cover a specific region. They focus on business
customers and have lower quality networks and slower access than
tier 1 ISPs.
- Tier 3 ISPs also purchase their Internet service from tier 1 ISPs. Tier
3 ISPs tend to focus on the retail market, and they also tend to cover a
specific region. Network quality and access speed are relatively low.
Prices are much lower than for tier 2 or tier 1 ISPs.
https://engineeringnotenepal.blogspot.com/
Internet and intranet
Working of Browser:
1. You type a website's URL into your browser's address bar;
"http://www.egnitenotes.com" is an example of a URL.
2. The browser locates and requests that page's information from a
web server.
3. The browser receives a file in a computer code like HTML or
JavaScript, which includes instructions about how to display the
information on that page.
4. The browser interprets that file and displays the page for you to
read and interact with. And it does all of this in just a few seconds,
usually.
Multiprotocol Support
- Multiprotocol support means existence of multiple protocols to be
followed while providing a service.
- For a generic request/reply protocol, there are some basic
requirements to be met.
- But, a single protocol may not have all the requirements.
- So, different protocols are layered on top of other protocol to meet all
the requirements.
https://engineeringnotenepal.blogspot.com/
Internet and intranet
Operation of MPLS:
- MPLS works by prefixing packets with the MPLS header, containing
one or more labels.
- Each label consists of four fields:
1. 20-bit label value
2. 3-bit Traffic class field for QoS priority and ECN.
3. 1-bit bottom of stack flag (When set, represents current label is last
entry in the stack)
4. 8-bit TTL field.
- MPLS router is required that helps MPLS labeled packets to be
switched after a label lookup.
https://engineeringnotenepal.blogspot.com/
Internet and intranet
Path Setup:
- Labeled switched path is established before routing and delivery of
packets.
- QoS parameters are established along the path.
Packet Handling:
- Packet enters into the domain through edge label switching router
(LSR).
- Label Switching Router assigns packet to Forward Equivalence
Class (FEC) and then Label Switched Path (LSP).
- Label is appended to the packet and then it is forwarded.
- Within the domain, the Label Switching Router gets the packet,
remove the incoming label, attach the outgoing label and then
forwarded to next label switching router.
- The final LSR within the domain strips the label, reads the IP and
forwards the packet.
- MPLS packet forwarding is explained in given figure:
https://engineeringnotenepal.blogspot.com/
Internet and intranet
https://engineeringnotenepal.blogspot.com/
Internet and intranet
CHAPTER 4
HTTP and Web Services
HTTP, Web Servers and Web Access
Working of HTTP
- HTTP is a connection less protocol.
- The client initiates the connection by sending a HTTP request to the
server via a URL.
- HTTP uses Uniform Resource Identifier (URI) to locate the resource
and to establish the connection.
The processes involved when a URL is entered in the web browser is
given below:
1. The browser first connects to the domain name server of the
respective domain provided in the URL and retrieves corresponding IP
address of the web server.
2. The web browser connects to the web server and sends a HTTP
request for the desired web page.
3. On receiving the request by the web server, it checks for the
desired web page. If the page is found, it is sent as a response to the
web browser. Otherwise, 404 Page Not Found error is forwarded by
the server to the browser.
4. The web browser receives the web page and then the connection is
broken.
5. The browser parses the pages.
6. For each additional element like images, applets and so on, it
follows HTTP connection, request and response steps.
7. When all the content is loaded, the complete page is displayed in
the web browser.
https://engineeringnotenepal.blogspot.com/
Internet and intranet
HTTP Message
- HTTP messages are categorized into two types. They are as follows:
1. HTTP Request message
2. HTTP Response message.
- Both type of messages consists of following parts:
1. Start line
2. Zero or more header fields followed by CRLF
3. An empty line
4. Optional message body
HTTP Request
1. Request Line
- It is a start line used by the HTTP request message.
- It is of given format:
https://engineeringnotenepal.blogspot.com/
Internet and intranet
Example
HTTP Response
1. Status Line or Start Line
- It consists of the protocol version followed by a numeric code and its
associated text phrase.
- The protocol version indicates the version of HTTP supported.
- Status code indicates the status of the response.
2. Response Header Field
- It allows the server to pass some additional information about the
response to the web client.
Example
HTTP/1.1 200 OK
Date: Mon, 21 Aug 2017 12:30:24 GMT
Server: Apache/2.2.14
Content-Length: 88
Content-Type: text/html
Connection: Closed
https://engineeringnotenepal.blogspot.com/
Internet and intranet
HTTP Methods
1. GET
- It is used to retrieve information from the server using a URI.
- It has no effect on the data except data retrieval.
- The server response contains status line, header, empty line and
message body.
2. HEAD
- It is also used to retrieve information from the server using a URI.
- The server response contains status line and header only.
3. POST
- It is used to send some data to the server.
- The data includes form data, file upload and so on.
- The server response contains status line, header, empty line and
message body.
- The message body contains the page that is to be redirected after
the data update.
4. PUT
- It is used to request the server to store the included entity body at a
location specified by the given URI.
5. DELETE
- It is used to request the server to delete a file at a location specified
by the given URI.
- It deletes the specified URL.
6. CONNECT
- It is used by the client to establish a network connection to a web
server over HTTP.
7. TRACE
- It is used to provide the content of the request message to the web
https://engineeringnotenepal.blogspot.com/
Internet and intranet
client.
- It is used as a debugging tool.
8. OPTIONS
- It is used to find out the HTTP Methods and other options supported
by the web server.
HTML
- HTML stands for Hypertext Markup Language.
- It is the standard language that is used to create the web pages.
- It is the core of web page development.
- Just as the skeleton of human shapes the human body, HTML helps
https://engineeringnotenepal.blogspot.com/
Internet and intranet
p = paragraph
br = line break
h1 = heading 1
DHTML
- A proper user interface is the way to lure the customers to use the
web pages. For this, static web pages provided by pure HTML is not
enough.
- In other to make the web pages dynamic, the concept of DHTML
emerges.
- DHTML stands for Dynamic HTML.
- It is the concept of making the web pages more interactive to the
users through the combined effect of HTML, client side scripting
language (Java Script), style definition language (CSS), and
Document Object Model (DOM).
- DHTML is purely request/reload based dynamic web page
development concept. It means that no any interaction between client
and server takes place once the page is loaded. The dynamic property
is solely the action of client-side scripting language. All the dynamic
processing is done by the client, not the server.
- DOM API leads to the foundation of the DHTML. DOM provides the
https://engineeringnotenepal.blogspot.com/
Internet and intranet
WML
- WML stands for Wireless Markup Language.
- It is a markup language that is intended for the devices that uses
Wireless Application Protocol (WAP) specifications like mobiles.
- It provides navigational support, data inputs, hyperlinks, image and
so on similar to HTML.
- A WML document is called deck.
- Deck is arranged into one or more cards.
- Each card represents single interaction with the user.
Example:
XML
- XML stands for extensible Markup Language.
- It is the hardware and software independent tool to store and
communicate data.
- It is designed in such a way that it is readable by both human and
machine easily.
- XML is just the information wrapped up within the tags.
- XML tags are not predefined.
- In web development, XML is used to separate data from
https://engineeringnotenepal.blogspot.com/
Internet and intranet
Dreamweaver
NVU
https://engineeringnotenepal.blogspot.com/
Internet and intranet
Working of AJAX
https://engineeringnotenepal.blogspot.com/
Internet and intranet
Web Hosting
- Web hosting is the service that allows organizations or individuals to
host a web site or web pages over the Internet.
- Web sites are hosted or stored on a computer, known as web server.
- For a web page to be available over the Internet, one must deploy
that web page on a web hosting.
- This service is provided by the web hosting service provider.
- For hosting a web site, one must have a domain name to be
associated with that resources.
https://engineeringnotenepal.blogspot.com/
Internet and intranet
- The performance of the web site is affected by other web sites who
share the server and its resources.
2. Dedicated Web Hosting
- In dedicated web hosting, the web site owner have a single web
server rented for a single site.
- The owner have full control over the server.
- It is very expensive to rent a dedicated server.
- It provides high performance of the web site to the web traffics.
3. Virtual Web Hosting
- Virtual web hosting is the bridge between shared and dedicated web
hosting.
- In virtual hosting, multiple web sites share the resources of a single
web server.
- But, each web site is partitioned off as if it is hosted in the dedicated
web server.
- The web site owner will have more control over sub domains and
other features.
- It is cheaper than dedicated hosting but expensive than shared
hosting.
- It is perfect for the web sites with fair amount of web traffics.
https://engineeringnotenepal.blogspot.com/
Internet and intranet
CHAPTER 5
Internet and Intranet System
Development
Introduction to Intranet
- Intranet is a private network that is designed within an enterprise.
- The staffs of the enterprise only have access to the network.
- It is a medium through which the services of the organization are
provided to the staffs for fluent organizational operations, which
cannot be accessed by other people over Internet.
Intranet:
---------------
1. Intranet is a private network designed for a large or
ganization to share resources within that organization.
2. It makes use of Internet technologies but is isolated
from the global Internet.
3. It provides easy, economical and fast way of communic
ation within an organization.
4. It restricts the use of resources for the people outs
ide the network, which provides higher security to the a
vailable shared resources within an organization.
5. If proper security measures like firewalls or gateway
are not applied, there is risk of loss of privacy or alt
https://engineeringnotenepal.blogspot.com/
Internet and intranet
Internet
-------------
1. Internet is a public network that is accessible by al
l the people in the world with Internet access.
2. It uses Internet protocols to link resources across t
he globe.
3. It enables the user to access information from anywhe
re in the world without any need of geographical constra
ints.
4. It also helps in online shopping, messaging, easy sha
ring and communication.
5. The drawbacks of Internet are spams, malwares, leakag
e of private information, addiction and non-relevant con
tents exposure.
Extranet
-------------
1. Extranet is the Intranet that is accessible to some a
uthorized personnel outside the network.
2. It is a network that is shared by two or more organiz
ations.
3. It helps the organization by effectively collaboratin
g with the clients and customers.
4. The major problem of an extranet is the security.
5. It decreases physical communication with the customer
s.
https://engineeringnotenepal.blogspot.com/
Internet and intranet
Content Filtering
- Content filtering is the process of controlling what content is
permitted to the user.
- It is generally used to restrict the material delivered over the Internet
via web or mail.
- It determines what content to make available and what content to
block.
Methods of Content Filtering
Refer to http://www.egnitenotes.com/note/information-system/control-
audit-and-security-of-information-system/#Content Control / Content
Filtering for more information on methods of content filtering.
https://engineeringnotenepal.blogspot.com/
Internet and intranet
https://engineeringnotenepal.blogspot.com/
Internet and intranet
DRUPAL
- Drupal is a free and open source content management system that
helps to organize, manage and publish the web contents.
https://engineeringnotenepal.blogspot.com/
Internet and intranet
VPN
- Virtual Private Network is a technology that creates an encrypted
connection over a less secure network like Internet.
- It allows remote users and branch offices to securely access
corporate applications and other resources securely.
- A secure tunnel is used to transmit data.
- The user must use authentication method via passwords or other
tokens to gain access to VPN.
- It ensures appropriate level of security to the connected components.
- The performance of VPN is affected by the Internet connection of
client, protocol used by ISP and encryption type used by VPN.
- The security protocols used by VPN are as follows:
1. IPsec
2. SSL
3. Point-to-Point Tunneling Protocol
4. Layer 2 Tunneling Protocol
https://engineeringnotenepal.blogspot.com/
Internet and intranet
CHAPTER 6
Designing Internet Systems and Servers
Server Concepts: WEB, Proxy, RADIUS, MAIL
Proxy Server
- Proxy server is the server that acts as an intermediate between
requests from clients seeking resources from other servers.
- A client connects to the proxy server to request for a service.
- The proxy server evaluates the request and simplify its complexity.
- An open proxy server is the one that is accessible by any Internet
users. It is generally used for anonymity of the user.
- A reverse proxy server is the one that is installed near the web
servers that appears to the client to be an ordinary server. It is used
for providing encryption, load balancing, compression and security.
RADIUS
- RADIUS stands for Remote Authentication Dial-In User Service.
- It is a networking protocol providing the centralization of
Authentication, Authorization and Accounting for remote access.
- It is a client-server protocol that works in application layer of OSI
reference model.
1. Authentication and Authorization
- The user sends the Network Access Server to access a particular
resource using its identification.
- The NAS forwards the identification credentials to the RADIUS
server in the form of Radius Access Request message. This request
consists of credential information along with the user information such
as network address, account status and so on.
- The server then verifies whether the credentials are true or not using
authentication schemes.
- The server then returns one of the following responses to NAS:
https://engineeringnotenepal.blogspot.com/
Internet and intranet
DHCP Server
- DHCP stands for Dynamic Host Configuration Protocol.
- It is a network protocol that enables the server to automatically
assigns an IP address to a host from a defined range configured for a
network.
Working of DHCP
https://engineeringnotenepal.blogspot.com/
Internet and intranet
https://engineeringnotenepal.blogspot.com/
Internet and intranet
https://engineeringnotenepal.blogspot.com/
Internet and intranet
Example 1:
NITC building had 4 research labs each having 24 computers. All the
labs are located at the first floor. Each computer is to be connected in
the network from NCR located at 2nd floor. Prepare a bill of quality
(BoQ) with the necessary network resources required for complete
networking.
Additional Assumptions
1. An NCR room located at second floor consists of 3 ser
vers (DHCP server, FTP server and Mail server). It also
https://engineeringnotenepal.blogspot.com/
Internet and intranet
Resources Required
1. Router
2. Switch
3. PC
4. Server
5. Printer
6. IP Phone
7. Cat 6 cable
8. RS 232 cable
Specification Sheet
https://engineeringnotenepal.blogspot.com/
Internet and intranet
6 IP Phone 1
pcs
7 CAT 6 UTP Cable 100
pcs
8 RS 232 cable 1
pcs
no of network bits = 8 - 5 = 3
https://engineeringnotenepal.blogspot.com/
Internet and intranet
no of network bits = 8 - 3 = 5
https://engineeringnotenepal.blogspot.com/
Internet and intranet
https://engineeringnotenepal.blogspot.com/
Internet and intranet
CHAPTER 7
Internet and Intranet Applications
General Applications: Email, WWW, Gopher,
Online Systems
Gopher
- Gopher is a TCP/IP application layer protocol used to distribute,
search and retrieve documents over the Internet.
- It is the ultimate predecessor of World Wide Web before the
existence of HTTP.
- It was released in mid-1991.
- Gopher appears like a mountable read only global network file
system.
- The operation that can be performed on the CD-ROM can be
performed on Gopher.
- The TCP port 70 was assigned to the Gopher protocol.
https://engineeringnotenepal.blogspot.com/
Internet and intranet
https://engineeringnotenepal.blogspot.com/
Internet and intranet
3. HDSL
4. SDSL
https://engineeringnotenepal.blogspot.com/
Internet and intranet
https://engineeringnotenepal.blogspot.com/
Internet and intranet
(mostly Internet).
- It reduces the cost of data transmission.
- The fax information are transferred in the form of IP packets via the
Internet.
- It allows faster data transmission due to the use of Broadband
channels.
Transmission methods in FoIP
1. Store-and-forward approach:
- The fax information is transferred from a fax server to a fax server as
an e-mail attachment.
- It uses lower level Internet protocols like SMTP.
- The information exchange is not in real time.
- The sender does not receive instant confirmation that the receiver
received each page.
2. Real time IP faxing:
- The fax information is transferred from a fax server to a fax server as
IP data packets.
- It uses higher level Internet protocols like TCP.
- It provides real time connections between the fax machines.
Working of FoIP
- It works with T.38 protocol.
- So, the system needs T.38 capable gateway.
- The phases of fax session are as follows:
1. Establishing the connection
2. Exchanging control signals
3. Sending the data
4. Confirmation for successful reception of data
5. Sending and confirming multi page alerts
6. Terminating the session
https://engineeringnotenepal.blogspot.com/
Internet and intranet
VoIP
- VoIP stands for Voice over Internet Protocol.
- It is the process of transmitting voice communications and
multimedia sessions over IP network.
- The transmission is done in the form of IP packets via a packet
switched network over Internet.
- It does not ensure the transmission of all data packets and
sequential order of delivery of data packets.
Methods for VoIP setup
1. ATA (Analog Telephone Adapter)
2. IP Phones
3. Computer-to-Computer
Working of VoIP
1. A signal is sent to ATA.
2. ATA revives a signal and sends a dial tone confirming Internet
connection.
3. Phone number is dialed. ATA converts tones into digital data.
4. The data is sent to VoIP service provider.
5. The call processor maps the receiver by converting phone number
into IP address.
6. A signal is sent to receiver ATA.
7. When the receiver picks the phone, session is established.
8. The system implements two channels, for two directions.
9. During the conversation, transmission of packets take place.
10. When receiver is put down, the session is closed.
https://engineeringnotenepal.blogspot.com/
Internet and intranet
organization.
- Data center is the critical system of the network.
- It is classified as follows:
1. Internet-facing data center
2. Internal data center
Elements of data center
1. Facility (location or space)
2. Support Infrastructure (Sustain security and reliability - biometrics
for security, UPS)
3. IT Equipment (Actual equipment for IT operation and data storage)
4. Operation Staff (Monitor IT operation and maintain infrastructure)
https://engineeringnotenepal.blogspot.com/
Internet and intranet
Features of UMS:
1. Single platform for all messaging services
2. Easy interface
3. Management of non-real time messaging
Fundamentals of e-Commerce
What is e-Commerce?
- E-Commerce is the process of buying and selling goods or services
online through the use of electronic network such as Internet.
- It allows the customer to deal with the producer remotely and more
efficiently.
Benefits of e-Commerce
1. Available at all time
2. Speed of access
3. Availability of goods and services for the customer
4. Easy Access
5. Reach from any geographic location
Types of e-Commerce
1. Business to business
2. Business to consumer
3. Consumer to consumer
4. Consumer to business
Components of e-Commerce
https://engineeringnotenepal.blogspot.com/
Internet and intranet
Merchant Bank
Merchant banks are financial institutions. Whenever a person clicks on
the checkout
page and puts in the credit card payment details, the merchant bank
processes and
verifies the credit card details and gives instant notification to the
customer as well as to
the merchant.
This component is inbuilt within the Payment Gateway. Merchants
need to open a
Merchant Account to avail this service.
Thorough knowledge of Merchant Bank and Merchant Account is thus
https://engineeringnotenepal.blogspot.com/
Internet and intranet
needed to
make your ecommerce a success.
Merchant Account
In the simplest of terms, a merchant account is a specialized account
provided by
a bank or other financial institution to enable real time e-commerce
transactions. It allows
businesses to accept payment online through credit/debit card and e-
check. The account
is set up under a contractual agreement between business/merchant
and the bank.
Broadly, under this agreement the bank agrees to pay the merchant
for all valid
online business transactions, including credit card, debit card and e-
check and processes
the payment made.
Payment Gateway
Payment Gateway is the connector between the buyers and the
financial network.
It helps to process the online payments and credit card processing
made by the customer,
with utmost speed and accuracy. A third party like Verisign or PayPal
often provide this
service.
The correct choice of payment gateway that suits your ecommerce
needs is crucial
and this is where the role of an authentic ecommerce service provider
comes in.
https://engineeringnotenepal.blogspot.com/
Internet and intranet
SSL
Secure Socket Layer provides the security factor in payment
transaction. With the
help of a private key for data encryption, SSL transmits confidential
user data, like credit
card information, over the Internet.
Use of SSL in your site assures the customer that their credit card and
other
personal information is NOT being made public or being misused by
the merchant.
https://engineeringnotenepal.blogspot.com/