NEWS & UPDATES >> BCA BCSP064 Synopsis & Project Work Started for DEC 2017, IGNOU MCA MCSP060 Synopsis Work Started for DEC 2017, CONTACT 4 IGNOU Mini Project

WHAT IS INTERNET AND ITS SOFTWARE COMPONENTS, TCP/IP Stack & WHAT IS INTERNET ADDRESSES

WHAT IS INTERNET AND ITS SOFTWARE COMPONENTS.?
After through some of the basic networking concepts, let us now look into some more concepts relating to one of the major application of networks the Internet. You have been introduced to internet in section 1.2.2. Let us once again sketch some of the basic points on Internet.
 Internet is a global connection of networks. But, how are these computer connected? The Internet is basically built up of multiple smaller networks called the subnets. Each computer systems on a subnet must have a unique address. All these subnets are connected together with network devices called routers, and each subnet may also contain its own subnets.
Figure is a top level view of the structure of the Internet as a cloud of many routers that are connected to each other. You may be able to connect to any of the search engines that allows you to locate information on Internet or any of the web servers like IGNOU web server through many alternative routes. A client may be a part of LAN, WAN or wireless network, it does not matter. Everything is almost in the Internet cloud -why? Because all these networks use one common protocol for reliable data transfer, so they speak common language and communicate irrespective of physical differences. This basic communication protocol on Internet is the Transmission Control Protocol/ Internet Protocol (TCP/IP). This protocol ensures reliable delivery of information from one source identified by a unique IP address to a destination also identified by a unique IP address. Please note that the source and destination computer may either be local or remote computer, depending on the destination location. But what are these IP addresses?
                                                                                      
To connect to a physical network, all devices irrespective of being wired or wireless uses an interface card. An     interface card may have its own unique physical address. However, you cannot locate a device just by its unique physical address, as these addresses do not provide any indication about the location of the device. Thus, you require a protocol that  uniquely identifies a device on the Internet and Internet protocol version 6 (IPV6) which is beyond the scope of this unit.
TCP and IP (TCP/IP) are the two core protocols of the Internet Protocol suite. The TCP primarily provides the reliable delivery of stream of bytes from a computer or a program to another computer or a program. It breaks the data stream into packets at the source and makes sure that all the packets are assembled orderly at the destination. The IP protocol on the other hand identifies the location of source and the destination. Any computer on Internet is identified by its unique IP address. Currently two standard versions of IP are available viz. Internet Protocol Version 4 (IPv4) which is currently being used on most of the Internet. An IPv4 address is a 32 bit address. IPv6 has not been discussed in this Uni
 Using the TCP/IP as the basic protocol Internet offers many services and application to it users like work wide web, Email, Chat, Social networking, collaboration etc
WWW is one of the major applications of Internet and is based on the concept of Hypertext that is hot links to a document that may reside on any website. It is a global infrastructure of connected documents.
Following are some of the major Software Components required to access Internet:
The first software for internet access is the Operating system. An operating system must be installed properly on your system (so that it can handle the driver requirements of the hardware components).
Internet Browser: Browser is software that allows the user to access and read information on the World Wide Web. Internet Explorer, Mozilla, Netscape are the best-known browsers. SpaceTime 3D is new three-dimensional browser. Only browser is sufficient for working with the Internet viz., the browser software that should be loaded on all the clients. In fact, the browser is one of the very intelligent software that contributed to the growth of World Wide Web. A browser converts the standard Hyper Text Markup Language (HTML) web pages to a very sophisticated display with colours and pictures.
Firewall: Internet has many security problems like hacking, Trojan Horse, Virus, etc. There are various tools to provide protection against unwanted access of your computer by anyone else, but the most popular among all security measures is the firewall. Firewall is software that works on some set of rules and instructions given by you. A firewall helps to keep your computer more secure. It restricts information that comes to your computer from other computers, giving you more control over the data on your computer and providing a line of defense against people or programs (including viruses and worms) that try to connect to your computer without invitation.
                                                                                                                     
  TCP/IP protocol: This is the group of protocols that define the Internet and communication method used by it. Let us discuss it in more details :
 TCP/IP Stack
TCP/IP was originally designed for the UNIX operating system; however, TCP/IP software is now available for every major operating system. In order to be compatible to the Internet, the computer must have TCP/IP compatible software. The major advantage of Internet is information sharing. Since in computers, bits and bytes are basic building blocks of information. Thus, one of the key aspects in network of many computers is to move bits between two specific computers. For such a communication, we require the address of the destination and a safe mean of moving data in the form of electronic signals. As far as safe movement of data is concerned, there exists a set of rules, which governs the sending, and receiving of data on the Internet.
A stack of protocols called TCP/IP (Transmission Control Protocol/Internet Protocol) implements these rules. Its name reflects names of only two protocols called TCP and IP. For sending large block of text/data to another machine, TCP divides the data into little data packets. It also adds special information e.g., the packet position, error correction code etc. to make sure that packets at the destination can be reassembled correctly and without any damage to data. The role of IP here is to put destination-addressing information on such packets. On Internet, it is not necessary that all the packets will follow the same path from source to destination. A router tries to load balance various paths that exist on networks. Other gateways allow different electronic networks to talk to Internet that uses TCP/IP. The Internet layer is an important layer in the protocol suite. At this layer, TCP/IP supports Internet Protocol (IP). This layer is responsible for the format of datagram or a packet as defined by IP and routing and forwarding a datagram or packet to the next hop (hop is a term that can be used to represent any computing device on Internet like; router, gateway, computer etc. A hop is the trip from one device to the next.) The primary goal of the Internet is to provide an abstract view of the complexities involved in it. Internet must appear as single network of computers. At the same time network administrators or users must be free to choose hardware or various internetworking technologies like Ethernet, Token ring etc. Different networking technologies have different physical addressing mechanisms. Therefore, identifying a computer on Internet is a challenge. To have uniform addressing for computers over the Internet, IP defines an IP address, which is a logical address. IP address is a 32 bits number, can be represented in decimal e.g., 192.168.32.10. Now, when a computer wants to communicate with another computer on the Internet, it can use logical address and is not bothered with the physical address of the destination and hence the format and size of data packet. IP address is a basic address used by the lower architecture of Internet. It is important for you to know that, any address you type as web address or email address actually gets converted into the equivalent IP address of a machine or computer where the server or resource is available. Web address or email addresses are used for ease and convenience of human beings otherwise; it is just a burden for network.
TCP/IP Model
Just like the OSI model, the TCP/IP model has many layers which are described below:
Host to Host Network:
In fact TCP/IP model does not specify this layer. But it basically combines functionally of physical and data link layers. Starting at the bottom, the Physical layer is what deals with hardware (wires, cables, satellite links, NICs, etc.). Utilizing the existing Physical layer, TCP/IP does not define its own, thus letting the layer be compatible with all network suites. This layer also encodes and transmits data over network communications media in the form of bits which are received by the Physical layer of the destination device. Often combined with this layer is the Data link layer which is responsible for moving packets from the network layer onto different hosts. Depending on the connection type, IP packets are transmitted using various methods. Dial-up modems transmit IP packets using PPP while broadband users transmit using PPoE.
                                                                                               
Internet Layer:-
This layer routes and delivers data across similar networks or completely different networks. The Network layer is responsible for end to end packet delivery while maintaining routing, flow control, and error control functions. An example of this layer is the Internet Protocol (IP) or the Internet Protocol Security (IPSec).
Transport Layer:-
The Network layer can be thought of the actual vehicle which transports information. This layer categorizes end to end message transmissions or connecting applications as either Transmission Control Protocol (TCP) or User Datagram Protocol (UDP). TCP is a connection-oriented protocol which is considered to provide a reliable byte stream. Some characteristics of TCP are traffic congestion control, data arrives in order, data has minimal error, and duplicate data is discarded. The top layer of the TCP/IP model is the Application layer which is used for network communication. Ports are used by programs to transfer data through this layer. For example, the File Transfer Protocol uses port 21 by default while the Hypertext Transfer Protocol uses port 80. TCP/IP has many benefits. TCP/IP enables cross-platform networking which is useful in this day-in-age. This suite also has superior failure recovery and the ability to add networks without interrupting existing services. The reliability of TCP/IP is also a huge benefit to using this protocol. The fact that if one part of the network goes down, other parts are still able to function is what has set TCP/IP above other networking protocols. TCP/IP is also easily expandable which allows for the unprecedented rate of growth which the Internet possesses.
WHAT IS INTERNET ADDRESSES.?
We can classify the computers connected with Internet in two categories, servers and clients. A server is a computer with the capacity to provide connectivity and sharing to multiple personal computers or clients (any computing device you use to access the Internet), which is specifically set up to serve its files to client computers. The files that a server makes available to your computer can be web pages, videos, sounds, images, etc. A web server normally has:
A high end computer with web server software. The three most popular web server software are:
Apache HTTP Server, available in public domain
Microsoft Internet Information Services (IIS)
Sun Java System Web Server
A very good Internet connection speed, so that it can support multiple simultaneous users.
Its own URL and IP address. (What is a URL? URL - Uniform Resource Locator. URL is theglobal address of a document or resource on the WWW).
For your home computer to be able to receive files or any data from a server, your computer must request this information. This happens when you enter an URL in your browser or when you receive e-mail. When we work on Internet we come across different types of addresses used for different purposes, like; web address, IP address, email address. Each one has a special syntax, and meaning. It is important for you to know about these addresses, before you start working on Internet.
IP Addresses
Figure shows an IPv4 address:
IP address: 192.168.1.97 in various forms:
                                   
IPv4 address is a series of four numbers separated by dots (.). The four numbers ranges between 0 and 255. So IPv4 address takes only 4-bytes (or 32-bits) of computer memory. Not all the IPv4 addresses may be used to identify a computer. Some addresses of IPv4 are not used at all due to certain restrictions. In addition, some addresses are reserved, for example; the IP address 255.255.255.255 is used for broadcasts. Every device, computer, printer or peripheral connected to a TCP/IP network must have its own IP address. Each 32 bit IP address consists of two components:
Network Identifier (Net ID) – which identifies one of the Networks that is a part of Internet.
Device Identifier (Device ID) – which identifies a specific device within the identified Net-ID.
A Net ID may be of 8 to 24 bits long. By using a subnet mask in combination with their own IP address, you can determine the destination address of the devices is remote or local. For example, consider the IP address 192.168.1.35, having 24 bits Net ID. The remaining 8 bits of this address specifies the device ID. The subnet mask for this network should be 255.255.255.0. This subnet mask is used to identify the IP address of the network. Now, consider a situation in your office, you want to create a small network, but your network service provider has given you only one IP address? Fortunately, there are IP addresses that have been kept for private network. These addresses are not globally allotted to any organisation but are addresses with in your private network. To connect your private network to the Internet, you are required either to use a network address translator gateway, or a proxy server. Please refer to further readings for more details on these networks. The IP range that is allocated for such non-routable addresses are:
                                                                            
The subnet mask is similar to an IP address - it is also a 4-byte (or 32-bits) field and can be represented using dot notation. In binary, it always comprise a series of ones, followed by sequence of zeros. The total number of bits is 32, but the number of ones and zeros determines the nature of the mask. By comparing any IP address with a given mask, you can split addresses into two parts, a network ID and a device ID. The following example explains this concept in more details. Suppose your computer has an IP address of 193.168.1.35 and you want to access a location 193.168.1.56, as your subnet mask is 255.255.255.0, it will give you following answers:
                                                                    Host (you):                    193.168.1.35
                                                                    Subnet Mask                 255.255.255.0
                                                                    Result:                          193.168.1.0
                                                                    Accessed Location        193.168.1.56
                                                                    Subnet Mask                 255.255.255.0
                                                                    Result:                          193.168.1.0
Since, the Result of both the operation points to same Net ID, therefore, you can conclude that the referred destination IP address is local.
Now, suppose your computer has an IP address of 191.168.1.35 and your NetID is 16 bit long. Suppose you want o access a location 190.168.1.35. Since, you have 16 bit NetID, therefore, your network subnet mask will be 255.255.0.0, it will give you following answers: 
                                                                                        
​                                                                                       Host (you):                  191.168.1.35
                                                                                      Subnet Mask               255.255.0.0
                                                                                      Result:                        191.168.0.0
                                                                                      Accessed Location      190.168.1.35
                                                                                      Subnet Mask              255.255.0.0
                                                                                     Result:                       190.168.0.0
Since, the Result of both the operation points to different Net ID, therefore, you can conclude that the referred destination IP address is remote. By comparing the source network ID with the IP address of the source and the network ID of the destination IP address, you can easily determine if the destination is within the same subnet. A web page request, thus, can be identified as local page or a page from remote server. But, how do you find the location of the remote server? The answer to this question is beyond the scope of this unit. However, you should know that routers may be responsible in finding the final path to the remote server.
As the numbers of users are increasing, the IPv4 addresses will run short. Therefore, a 128 bit Internet Protocol Version 6 (IPv6) was designed which is at present actively being deployed on the Internet. This series can provide up to 3.4 X 1038 addresses. For more details on IPv6, please refer to Further Readings.

-----------------------------------------------------------------------------------------
Enroll for Coaching or Home Class | IGNOU BCA MCA Solved Assignment 2016 2017  Join IGNOU BCA MCA Coaching Class |  Synopsis & Project Support 
Powered by IGNOUFriend | www.ignoufriend.co.in |
ignou bca mca synopsis, ignou class, ignou bca mca project, solved ignou assignment,BCA Coaching Institute in Delhi, MCA Coaching Institute in Delhi, BCA MCA Coaching Institute in Delhi, BCA MCA, Tuation Class in delhi, IGNOU BCA MCA Class, IGNOU BCA MCA Tution,IGNOU Solved Assignment, IGNOU BCA Synopsis , IGNOU MCA Synopsis, ignou bca project, ignou mca project, ignou best coaching in delhi, ignou best coaching in new delhi, ignou best coaching in south delhi, ignou best coaching in north delhi, ignou best coaching in east delhi, ignou best coaching in west delhi
ignou, bca, mca, coaching institute, tution class, bcsp064, mcsp060, cs76, mcs044,bcs011, bcs012, mcs011, mcs012, mcs013, mcs015, bcsl021, bcsl022, mcs014, bcs040, mcs021, mcs023, bcs031, bcsl032, bcsl033, bcsl 034, bcs041, bcs042, mcsl016, bcsl043, bcsl044, bcsl045, bcs051, bcs052, bcs053, bcs054, bcs055, bcsl056, bcsl057, bcsl058, bcs062, mcs022, bcsl063, project
mcsp060, mcse011, mcse004, mcse003, mcsl054, mcs053, mcs052, mcs051, mcsl045, mcs044, mcs043, mcs042, mcs041, mcsl036, mcs035, mcs034, mcs033, mcs032, mcs031, mcsl025, mcs024, mcs023, mcs022, mcs021, mcsl017, mcsl016, mcs015, mcs014, mcs013, mcs012, mcs011
nips institute, nipsar, ignoufriend.in, ignoufriend.co.in, ignouhelp, best coaching institute

No comments:

Post a Comment