The Domain Name System
The Domain Name System
The Domain Name System (DNS) translates human-readable domain names (e.g.,
www.google.com) into machine-readable IP addresses (e.g., 142.250.190.14), enabling
internet communication
It enables computers to locate and communicate with each other on the internet.
Functions as a hierarchical, distributed database.
Queries pass through multiple levels:
Root server
Top-Level Domain (TLD) server
Authoritative server (stores the specific IP address).
Ensures seamless website access using easy-to-remember names instead of numerical IP
addresses.
Root DNS
Server
DNS Record: Domain name, IP address what is the validity? what is the time to live? and all
the information related to that domain name. These records are stored in a tree-like structure.
Namespace: Set of possible names, flat or hierarchical. The naming system maintains a
collection of bindings of names to values – given a name, a resolution mechanism returns the
corresponding value.
Name Server: It is an implementation of the resolution mechanism.
DNS = Name service in Internet – A zone is an administrative unit, and a domain is a
subtree.
Types of Domain
There are various kinds of domains:
Generic Domains: .com(commercial), .edu(educational), .mil(military), .org(nonprofit
organization), .net(similar to commercial) all these are generic domains.
Country Domain: .in (India) .us .uk
Inverse Domain: if we want to know what is the domain name of the website. IP to domain
name mapping. So DNS can provide both the mapping for example to find the IP addresses
of geeksforgeeks.org then we have to type
nslookup www.geeksforgeeks.org
Types of
DNS
Domain Name Server
The client machine sends a request to the local name server, which, if the root does not find
the address in its database, sends a request to the root name server, which in turn, will route
the query to a top-level domain (TLD) or authoritative name server. The root name server
can also contain some hostName to IP address mappings. The Top-level domain (TLD)
server always knows who the authoritative name server is. So finally the IP address is
returned to the local name server which in turn returns the IP address to the host.
Domain
Name Server
DNS Lookup
DNS Lookup, also called DNS Resolution, is the process of translating a human-readable
domain name (like www.example.com) into its corresponding IP address (like 192.0.2.1),
which computers use to locate and communicate with each other on the internet. It allows
users to access websites easily using names instead of remembering numeric IP addresses.
DNS Lookup starts when a user types a domain name into their browser.
The query goes through a series of servers: the DNS resolver, Root server, TLD server, and
authoritative server.
Each server plays a role in finding the correct IP address for the domain.
Once the IP address is found, the browser connects to the website’s server and loads the
page.
DNS Resolver
DNS Resolver is simply called a DNS Client and has the functionality for initiating the
process of DNS Lookup which is also called DNS Resolution. By using the DNS Resolver,
applications can easily access different websites and services present on the Internet by using
domain names that are very much friendly to the user and that also resolves the problem of
remembering IP Address.
Types of DNS Queries
There are basically three types of DNS Queries that occur in DNS Lookup. These are stated
below.
Recursive Query: In this query, if the resolver is unable to find the record, in that case, DNS
client wants the DNS Server will respond to the client in any way like with the requested
source record or an error message.
Iterative Query: Iterative Query is the query in which DNS Client wants the best answer
possible from the DNS Server.
Non-Recursive Query: Non-Recursive Query is the query that occurs when a DNS Resolver
queries a DNS Server for some record that has access to it because of the record that exists in
its cache.
DNS Caching
DNS Caching can be simply termed as the process used by DNS Resolvers for storing the
previously resolved information of DNS that contains domain names, and IP Addresses for
some time. The main principle of DNS Caching is to speed up the process of future DNS
lookup and also help in reducing the overall time of DNS Resolution.
Speeds Up Access: It stores previous website lookups, so your device can quickly load
frequently visited sites without asking the network for the IP address each time.
Reduces Internet Traffic: This storage cuts down on the number of requests sent across the
internet, helping reduce overall network congestion.
Enhances User Experience: With faster loading times for websites and less waiting,
browsing the internet becomes a smoother, more enjoyable experience.
Introduction to TELNET
TELNET stands for Teletype Network. It is a client/server application protocol that provides
access to virtual terminals of remote systems on local area networks or the Internet. The
local computer uses a telnet client program and the remote computers use a telnet server
program. In this article, we will discuss every point about TELNET.
What is Telnet?
TELNET is a type of protocol that enables one computer to connect to the local computer. It
is used as a standard TCP/IP protocol for virtual terminal service which is provided by ISO.
The computer which starts the connection is known as the local computer. The computer
which is being connected to i.e. which accepts the connection known as the remote
computer. During telnet operation, whatever is being performed on the remote computer will
be displayed by the local computer. Telnet operates on a client/server principle.
History of TELNET
The Telnet protocol originated in the late 1960s, it was created to provide remote terminal
access and control over mainframes and minicomputers. Initially, it was designed to be a
simple and secure method of connecting to a remote system. This protocol allowed users to
access remote computers using a terminal or command-line interface. Over time, Telnet’s
use has diminished due to security concerns, and alternatives like SSH are now preferred for
secure remote management
Logging in TELNET
The logging process can be further categorized into two parts:
Local Login
Remote Login
1. Local Login
Whenever a user logs into its local system, it is known as local login.
Local Login
The Procedure of Local Login
Keystrokes are accepted by the terminal driver when the user types at the terminal.
Terminal Driver passes these characters to OS.
Now, OS validates the combination of characters and opens the required application.
2. Remote Login
Remote Login is a process in which users can log in to a remote site i.e. computer and use
services that are available on the remote computer. With the help of remote login, a user is
able to understand the result of transferring the result of processing from the remote
computer to the local computer.
Remote
Login in Logging
The Procedure of Remote Login
When the user types something on the local computer, the local operating system accepts the
character.
The local computer does not interpret the characters, it will send them to the TELNET client.
TELNET client transforms these characters to a universal character set called Network
Virtual Terminal (NVT) characters and it will pass them to the local TCP/IP protocol Stack.
Commands or text which are in the form of NVT, travel through the Internet and it will
arrive at the TCP/IP stack at the remote computer.
Characters are then delivered to the operating system and later on passed to the TELNET
server.
Then TELNET server changes those characters to characters that can be understandable by a
remote computer.
The remote operating system receives characters from a pseudo-terminal driver, which is a
piece of software that pretends that characters are coming from a terminal.
The operating system then passes the character to the appropriate application program.
Network Virtual Terminal(NVT)
NVT (Network Virtual Terminal) is a virtual terminal in TELNET that has a fundamental
structure that is shared by many different types of real terminals. NVT (Network Virtual
Terminal) was created to make communication viable between different types of terminals
with different operating systems.
Network
Virtual Terminal(NVT) in Telnet
How TELNET Works?
Client-Server Interaction
The Telnet client initiates the connection by sending requests to the Telnet server.
Once the connection is established, the client can send commands to the server.
The server processes these commands and responds accordingly.
Character Flow
When the user types on the local computer, the local operating system accepts the characters.
The Telnet client transforms these characters into a universal character set called Network
Virtual Terminal (NVT) characters.
These NVT characters travel through the Internet to the remote computer via the local
TCP/IP protocol stack.
The remote Telnet server converts these characters into a format understandable by the
remote computer.
The remote operating system receives the characters from a pseudo-terminal driver and
passes them to the appropriate application program3.
Network Virtual Terminal (NVT)
NVT is a virtual terminal in Telnet that provides a common structure shared by different
types of real terminals.
It ensures communication compatibility between various terminals with different operating
systems.
TELNET Commands
Commands of Telnet are identified by a prefix character, Interpret As Command (IAC) with
code 255. IAC is followed by command and option codes. The basic format of the command
is as shown in the following figure :
Decimal
Character Binary Meaning
1. Offering to enable.
WILL 251 11111011 2. Accepting a request to enable.
It will echo the data that is received on one side to the other
1 Echo
side.
Suppress go
3 It will suppress go ahead signal after data.
ahead
Uses of TELNET
Remote Administration and Management
Network Diagnostics
Understanding Command-Line Interfaces
Accessing Bulletin Board Systems (BBS)
Automation and Scripting
Advantages of TELNET
It provides remote access to someone's computer system.
Telnet allows the user for more access with fewer problems in data transmission.
Telnet saves a lot of time.
The oldest system can be connected to a newer system with telnet having different operating
systems.
Disadvantages of TELNET
As it is somehow complex, it becomes difficult to beginners in understanding.
Data is sent here in form of plain text, that's why it is not so secured.
Some capabilities are disabled because of not proper interlinking of the remote and local
devices.
Modes of Operation
Default Mode: If no other modes are invoked then this mode is used. Echoing is performed
in this mode by the client. In this mode, the user types a character and the client echoes the
character on the screen but it does not send it until the whole line is completed.
Character Mode: Each character typed in this mode is sent by the client to the server. A
server in this type of mode normally echoes characters back to be displayed on the client's
screen.
Line Mode: Line editing like echoing, character erasing, etc. is done from the client side.
The client will send the whole line to the server.
Introduction to Electronic Mail
Introduction:
Electronic mail, commonly known as email, is a method of exchanging messages over the
internet. Here are the basics of email:
An email address: This is a unique identifier for each user, typically in the format of
[email protected].
An email client: This is a software program used to send, receive and manage emails, such as
Gmail, Outlook, or Apple Mail.
An email server: This is a computer system responsible for storing and forwarding emails to
their intended recipients.
To send an email:
Compose a new message in your email client.
Enter the recipient's email address in the "To" field.
Add a subject line to summarize the content of the message.
Write the body of the message.
Attach any relevant files if needed.
Click "Send" to deliver the message to the recipient's email server.
Emails can also include features such as cc (carbon copy) and bcc (blind carbon copy) to
send copies of the message to multiple recipients, and reply, reply all, and forward options to
manage the conversation.
Electronic Mail (e-mail) is one of most widely used services of Internet. This service allows
an Internet user to send a message in formatted manner (mail) to the other Internet user in
any part of world. Message in mail not only contain text, but it also contains images, audio
and videos data. The person who is sending mail is called sender and person who receives
mail is called recipient. It is just like postal mail service. Components of E-Mail
System : The basic components of an email system are : User Agent (UA), Message Transfer
Agent (MTA), Mail Box, and Spool file. These are explained as following below.
User Agent (UA) : The UA is normally a program which is used to send and receive mail.
Sometimes, it is called as mail reader. It accepts variety of commands for composing,
receiving and replying to messages as well as for manipulation of the mailboxes.
Message Transfer Agent (MTA) : MTA is actually responsible for transfer of mail from one
system to another. To send a mail, a system must have client MTA and system MTA. It
transfer mail to mailboxes of recipients if they are connected in the same machine. It delivers
mail to peer MTA if destination mailbox is in another machine. The delivery from one MTA
to another MTA is done by Simple Mail Transfer Protocol.
Mailbox : It is a file on local hard drive to collect mails. Delivered mails are present in this
file. The user can read it delete it according to his/her requirement. To use e-mail system
each user must have a mailbox . Access to mailbox is only to owner of mailbox.
Spool file : This file contains mails that are to be sent. User agent appends outgoing mails in
this file using SMTP. MTA extracts pending mail from spool file for their delivery. E-mail
allows one name, an alias, to represent several different e-mail addresses. It is known
as mailing list, Whenever user have to sent a message, system checks recipient's name
against alias database. If mailing list is present for defined alias, separate messages, one for
each entry in the list, must be prepared and handed to MTA. If for defined alias, there is no
such mailing list is present, name itself becomes naming address and a single message is
delivered to mail transfer entity.
Services provided by E-mail system :
Composition - The composition refer to process that creates messages and answers. For
composition any kind of text editor can be used.
Transfer - Transfer means sending procedure of mail i.e. from the sender to recipient.
Reporting - Reporting refers to confirmation for delivery of mail. It help user to check
whether their mail is delivered, lost or rejected.
Displaying - It refers to present mail in form that is understand by the user.
Disposition - This step concern with recipient that what will recipient do after receiving mail
i.e save mail, delete before reading or delete after reading.
Advantages Or Disadvantages:
Advantages of email:
Convenient and fast communication with individuals or groups globally.
Easy to store and search for past messages.
Ability to send and receive attachments such as documents, images, and videos.
Cost-effective compared to traditional mail and fax.
Available 24/7.
Disadvantages of email:
Risk of spam and phishing attacks.
Overwhelming amount of emails can lead to information overload.
Can lead to decreased face-to-face communication and loss of personal touch.
Potential for miscommunication due to lack of tone and body language in written messages.
Technical issues, such as server outages, can disrupt email service.
It is important to use email responsibly and effectively, for example, by keeping the subject
line clear and concise, using proper etiquette, and protecting against security threats.
FTP or File Transfer Protocol is said to be one of the earliest and also the most common
forms of transferring files on the internet. Located in the application layer of the OSI model,
FTP is a basic system that helps in transferring files between a client and a server. It is what
makes the FTP unique that the system provides a reliable and efficient means of transferring
files from one system to another even if they have different file structures and operating
systems. Contrary to other protocols such as http that cover hypertexts and web resources in
general, ftp is dedicated to the management and the transfer of text, binary, or image files.
What is File Transfer Protocol?
FTP is a standard communication protocol. There are various other protocols like HTTP
which are used to transfer files between computers, but they lack clarity and focus as
compared to FTP. Moreover, the systems involved in connection are heterogeneous, i.e. they
differ in operating systems, directories, structures, character sets, etc the FTP shields the user
from these differences and transfers data efficiently and reliably. FTP can transfer ASCII,
EBCDIC, or image files. The ASCII is the default file share format, in this, each character is
encoded by NVT ASCII. In ASCII or EBCDIC the destination must be ready to accept files
in this mode. The image file format is the default format for transforming binary files.
File
Transfer Protocol
The File Transfer Protocol (FTP) is widely used in the application layer of networking. It
works at the application layer, ensuring that files are sent and received securely.
Types of FTP
There are different ways through which a server and a client do a file transfer using FTP.
Some of them are mentioned below:
Anonymous FTP: Anonymous FTP is enabled on some sites whose files are available for
public access. A user can access these files without having any username or password.
Instead, the username is set to anonymous, and the password is to the guest by default. Here,
user access is very limited. For example, the user can be allowed to copy the files but not to
navigate through directories.
Password Protected FTP: This type of FTP is similar to the previous one, but the change in it
is the use of username and password.
FTP Secure (FTPS): It is also called as FTP Secure Sockets Layer (FTP SSL). It is a more
secure version of FTP data transfer. Whenever FTP connection is established, Transport
Layer Security (TLS) is enabled.
FTP over Explicit SSL/TLS (FTPES): FTPES helps by upgrading FTP Connection from port
21 to an encrypted connection.
Secure FTP (SFTP): SFTP is not a FTP Protocol, but it is a subset of Secure Shell Protocol,
as it works on port 22.
What is FTP Useful For?
FTP is especially useful for:
Transferring Large Files: FTP can transfer large files in one shot; thus applicable when
hosting websites, backing up servers, or sharing files in large quantities.
Remote File Management: Files on a remote server can be uploaded, downloaded, deleted,
renamed, and copied according to the users’ choices.
Automating File Transfers: FTP is a great protocol for the execution of file transfers on
predefined scripts and employments.
Accessing Public Files: Anonymous FTP means that everybody irrespective of the identity is
allowed to download some files with no permissions needed.
How to Use FTP?
To use FTP, follow these steps:
Connect to the FTP Server: One can connect to the server using the address, username and
password through an FTP client or a command line interface. Anonymous Information may
not need a username and password.
Navigate Directories: Some commands include ls that is used to list directories and cd that is
used to change directories.
Transfer Files: File transfer may be done by using the commands such as get for
downloading files, and put for uploading files.
Manage Files: Make operations like deletion (Delete), renaming (Rename) as well as
copying (Copy) of files.
Close the Connection: Once file transfer has been accomplished, terminate the connection by
giving the bye or quit command.
How Does FTP Work?
FTP is a client server protocol that has two communication channel, command channel for
conversation control and data channel for file content.
Here are steps mentioned in which FTP works:
A user has to log in to FTP Server first, there may be some servers where you can access to
content without login, known as anonymous FTP.
Client can start a conversation with server, upon requesting to download a file.
The user can start different functions like upload, delete, rename, copy files, etc. on server.
FTP can work on different modes like Active and Passive modes. For more, you can refer
to Difference between Active and Passive FTP.
FTP SFTP
It stands for File Transfer Protocol. It stands for Secure File Transfer Protocol.
It does not encrypt the data before sending It encrypted data before sending.
WWW stands for World Wide Web and is commonly known as the Web. It was invented in
1989 by Tim Berners-Lee at CERN and has since transformed the way we live, learn, and
interact. Today, it connects over 63% of the world’s population, making it one of the most
powerful tools for communication and information sharing. The World Wide Web is a
massive online space full of websites containing text, images, videos, and more.
World Wide Web
The Web works through hyperlinks—clickable links that let you jump from one page to
another with ease. Whether you're watching a video, reading an article, or chatting with
friends, chances are you're using the Web. For students especially, it opens up a world of
knowledge and endless learning opportunities.
➣ Here is a fun example of a hyperlink- [This is a Clickable link!]
What is the World Wide Web?
Imagine a massive network of pages filled with information, games, videos, and more, all
linked together so you can move between them easily. That’s the World Wide Web! It was
created by a scientist named Tim Berners-Lee to help researchers share information. The
Web uses something called hypertext, which is text with clickable links (hyperlinks) that
take you to other pages. These pages are written in a language called HTML (Hypertext
Markup Language) and are accessed using HTTP (Hypertext Transfer Protocol), which is
like the rulebook for how computers talk to each other on the Web.
The Web is part of the Internet, but they’re not the same thing. The Internet is like the roads
and wires that connect computers all over the world, while the Web is the information you
find and explore on those roads using a web browser like Google Chrome, Firefox, or Safari.
History of the WWW
The World Wide Web (WWW), commonly referred to as the Web, was invented by Tim
Berners-Lee in 1989 while he was working at CERN, the European Organization for Nuclear
Research. Berners-Lee proposed the Web as a tool to enable researchers at CERN to
collaborate and share information efficiently across geographically dispersed institutions.
In 1994, Berners-Lee founded the World Wide Web Consortium (W3C), an international
organization dedicated to developing open standards and ensuring the long-term growth and
accessibility of the Web. He continues to play a leading role in the W3C and is widely
recognized as the "father of the Web."
Web Evolution
The rise of the web from the 1980s to the 2030s, moving from simple desktop computing
(PC Era) to the intelligent, interconnected web of the future. Web 1.0 (1990–2000)
introduced static websites, while Web 2.0 (2000–2010) brought interactive and social
platforms. Web 3.0 (2010–2020) focused on the semantic web, enabling machines to
understand data and offer personalized experiences. Web 2.5 represents the current real-
world transition phase combining Web 2.0’s interactivity with Web 3.0’s intelligence.
Looking ahead, Web 4.0 (2020–2030) is expected to be a fully intelligent web ecosystem
powered by AI and integrated web operating systems.
System Architecture
From the user's point of view, the web consists of a vast, worldwide connection of
documents or web pages. Each page may contain links to other pages anywhere in the world.
The pages can be retrieved and viewed by using browsers, of which Internet Explorer,
Netscape Navigator, Google Chrome, etc are the popular ones. The browser fetches the page
requested, interprets the text and formatting commands on it, and displays the page, properly
formatted, on the screen.
The basic model of how the web works is shown in the figure below. Here, the browser is
displaying a web page on the client machine. When the user clicks on a line of text that is
linked to a page on the abd.com server, the browser follows the hyperlink by sending a
message to the abd.com server asking it for the page.
Here the browser displays a web page on the client machine when the user clicks on a line of
text that is linked to a page on abd.com, the browser follows the hyperlink by sending a
message to the abd.com server asking for the page.
How Does the Web Work?
A Web browser is used to access web pages. Web browsers can be defined as programs
which display text, data, pictures, animation and video on the Internet. Hyperlinked
resources on the World Wide Web can be accessed using software interfaces provided by
Web browsers. Initially, Web browsers were used only for surfing the Web but now they
have become more universal.
The below diagram indicates how the Web operates just like client-server architecture of the
internet. When users request web pages or other information, then the web browser of your
system request to the server for the information and then the web server provide requested
services to web browser back and finally the requested service is utilized by the user who
made the request.
How You Through browsers like Chrome or Through any connected device for
Use It Firefox. email, apps, etc.
Note: In short, the Web is just one part of the Internet, like a library is one part of a city.
How Web Browsers Evolved
Browsers are the tools you use to explore the Web, and they’ve changed a lot over time. In
1990, Tim Berners-Lee made the first browser, but it was basic and only showed text. In
1993, the Mosaic browser made the Web exciting by adding pictures and a simple design.
Then came Netscape Navigator in 1994, which was super popular. Internet Explorer took
over in 1995 and stayed on top for years. In 2004, Mozilla Firefox brought new features, and
in 2008, Google Chrome became a favorite because it was fast and easy to use.
Today, Microsoft Edge and Safari are also popular. Each browser keeps getting better to
make your Web experience awesome.
Challenges of the Web
The Web is amazing, but it has some problems students should know about:
Privacy: Some websites collect information about you, like what you search for, and might
share it without asking.
Safety: Hackers can try to steal your information or send viruses through fake links or ads.
False Information: Not everything on the Web is true, so you need to check if a website is
trustworthy.
Bullying: Some people use the Web to be mean or bully others, which can hurt feelings.
Too Much Screen Time: Spending too much time online can make it hard to focus on school
or sleep well.
Access Issues: Not everyone has fast Internet, especially in some countries, which makes it
harder to use the Web.
Fun Facts About the Web
The first website ever is still online! You can visit it at http://info.cern.ch.
There are over 1.5 billion websites in the world, and that number grows every day.
Google Chrome is used by more than 60% of people browsing the Web.
The Web is available in over 150 languages, so you can explore in your language or learn a
new one!
Conclusion
The World Wide Web is like a magical doorway to a world of knowledge, fun, and
creativity. Since Tim Berners-Lee created it in 1989, it’s grown into something we use every
day for school, games, and staying connected. By understanding how the Web works and
using it safely, you can make the most of this incredible tool. So, grab your browser, explore,
and have fun learning something new today!
WWW stands for World Wide Web and is commonly known as the Web. It
was invented in 1989 by Tim Berners-Lee at CERN and has since
transformed the way we live, learn, and interact. Today, it connects
over 63% of the world’s population, making it one of the most powerful
tools for communication and information sharing. The World Wide Web is a
massive online space full of websites containing text, images, videos, and
more.
The Web works through hyperlinks—clickable links that let you jump from
one page to another with ease. Whether you're watching a video, reading
an article, or chatting with friends, chances are you're using the Web. For
students especially, it opens up a world of knowledge and endless learning
opportunities.
➣ Here is a fun example of a hyperlink- [This is a Clickable link !]
What is the World Wide Web?
Imagine a massive network of pages filled with information, games, videos,
and more, all linked together so you can move between them easily. That’s
the World Wide Web! It was created by a scientist named Tim Berners-Lee
to help researchers share information. The Web uses something
called hypertext, which is text with clickable links (hyperlinks) that take
you to other pages. These pages are written in a language
called HTML (Hypertext Markup Language ) and are accessed
using HTTP (Hypertext Transfer Protocol) , which is like the rulebook for
how computers talk to each other on the Web.
The Web is part of the Internet, but they’re not the same thing.
The Internet is like the roads and wires that connect computers all over
the world, while the Web is the information you find and explore on those
roads using a web browser like Google Chrome, Firefox, or Safari.
History of the WWW
The World Wide Web (WWW), commonly referred to as the Web, was
invented by Tim Berners-Lee in 1989 while he was working at CERN, the
European Organization for Nuclear Research. Berners-Lee proposed the
Web as a tool to enable researchers at CERN to collaborate and share
information efficiently across geographically dispersed institutions.
In 1994, Berners-Lee founded the World Wide Web Consortium (W3C) ,
an international organization dedicated to developing open standards and
ensuring the long-term growth and accessibility of the Web. He continues
to play a leading role in the W3C and is widely recognized as the "father
of the Web."
Web Evolution
The rise of the web from the 1980s to the 2030s, moving from simple
desktop computing (PC Era) to the intelligent, interconnected web of the
future. Web 1.0 (1990–2000) introduced static websites, while Web 2.0
(2000–2010) brought interactive and social platforms. Web 3.0 (2010–
2020) focused on the semantic web, enabling machines to understand data
and offer personalized experiences. Web 2.5 represents the current real-
world transition phase combining Web 2.0’s interactivity with Web 3.0’s
intelligence. Looking ahead, Web 4.0 (2020–2030) is expected to be a fully
intelligent web ecosystem powered by AI and integrated web operating
systems.
System Architecture
From the user's point of view, the web consists of a vast, worldwide
connection of documents or web pages. Each page may contain links to
other pages anywhere in the world. The pages can be retrieved and viewed
by using browsers, of which Internet Explorer, Netscape Navigator, Google
Chrome, etc are the popular ones. The browser fetches the page requested,
interprets the text and formatting commands on it, and displays the page,
properly formatted, on the screen.
The basic model of how the web works is shown in the figure below. Here,
the browser is displaying a web page on the client machine. When the user
clicks on a line of text that is linked to a page on the abd.com server, the
browser follows the hyperlink by sending a message to the abd.com server
asking it for the page.
Here the browser displays a web page on the client machine when the user
clicks on a line of text that is linked to a page on abd.com, the browser
follows the hyperlink by sending a message to the abd.com server asking
for the page.
How Does the Web Work?
A Web browser is used to access web pages. Web browsers can be defined
as programs which display text, data, pictures, animation and video on the
Internet. Hyperlinked resources on the World Wide Web can be accessed
using software interfaces provided by Web browsers. Initially, Web
browsers were used only for surfing the Web but now they have become
more universal.
The below diagram indicates how the Web operates just like client-server
architecture of the internet. When users request web pages or other
information, then the web browser of your system request to the server for
the information and then the web server provide requested services to
web browser back and finally the requested service is utilized by the user
who made the request.
World
Wide Web
Sending an email or
Visiting a website like Wikipedia.
Example streaming a video.
Note: In short, the Web is just one part of the Internet, like a library is
one part of a city.
How Web Browsers Evolved
Browsers are the tools you use to explore the Web, and they’ve changed a
lot over time. In 1990, Tim Berners-Lee made the first browser, but it was
basic and only showed text. In 1993, the Mosaic browser made the Web
exciting by adding pictures and a simple design. Then came Netscape
Navigator in 1994, which was super popular. Internet Explorer took over
in 1995 and stayed on top for years. In 2004, Mozilla Firefox brought new
features, and in 2008, Google Chrome became a favorite because it was
fast and easy to use. Today, Microsoft Edge and Safari are also popular.
Each browser keeps getting better to make your Web experience awesome.
Challenges of the Web
The Web is amazing, but it has some problems students should know
about:
Privacy: Some websites collect information about you, like what
you search for, and might share it without asking.
Safety: Hackers can try to steal your information or send viruses
through fake links or ads.
False Information: Not everything on the Web is true, so you
need to check if a website is trustworthy.
Bullying: Some people use the Web to be mean or bully others,
which can hurt feelings.
Too Much Screen Time: Spending too much time online can make
it hard to focus on school or sleep well.
Access Issues: Not everyone has fast Internet, especially in some
countries, which makes it harder to use the Web.
Fun Facts About the Web
The first website ever is still online! You can visit it at
http://info.cern.ch.
There are over 1.5 billion websites in the world, and that number
grows every day.
Google Chrome is used by more than 60% of people browsing the
Web.
The Web is available in over 150 languages, so you can explore in
your language or learn a new one!
Conclusion
The World Wide Web is like a magical doorway to a world of knowledge,
fun, and creativity. Since Tim Berners-Lee created it in 1989, it’s grown into
something we use every day for school, games, and staying connected. By
understanding how the Web works and using it safely, you can make the
most of this incredible tool. So, grab your browser, explore, and have fun
learning something new today!
HTTP Full Form - Hypertext Transfer Protocol
HTTP is the primary method through which web browsers and servers communicate to share
information on the internet. It was invented by Tim Berners-Lee. Hypertext refers to text that
is specially coded using a standard coding language called Hypertext Markup Language
(HTML). HTTP/2 is the updated version of HTTP, while HTTP/3 is the latest version, which
was published in 2022.
What is the Full Form of HTTP?
HTTP stands for "Hypertext Transfer Protocol." It is a set of rules for sharing data on
the World Wide Web (WWW). When you visit a website, HTTP helps your browser request
and receive the data needed to display the web pages you see. It is a fundamental part of how
the internet works, making it possible for us to browse and interact with websites.
Basic Structure: HTTP forms the foundation of the web, enabling data communication and
file sharing.
Web Browsing: Most websites use HTTP, so when you click on a link or download a file,
HTTP is at work.
Client-Server Model: HTTP works on a request-response system. Your browser (client) asks
for information, and the website's server responds with the data.
Application Layer Protocol: HTTP operates within the Internet Protocol Suite, managing
how data is transmitted and received.
What is HyperText?
The protocol used to transfer hypertext between two computers is known as HyperText
Transfer Protocol. HTTP provides a standard between a web browser and a web server to
establish communication. It is a set of rules for transferring data from one computer to
another. Data such as text, images, and other multimedia files are shared on the World Wide
Web. Whenever a web user opens their web browser, the user indirectly uses HTTP. It is an
application protocol that is used for distributed, collaborative, hypermedia information
systems.
Working of HTTP [HyperText Transfer Protocol]
First of all, whenever we want to open any website, we first open a web browser. after that
we will type the URL of that website (e.g., www.facebook.com ). This URL is now sent to
the Domain Name Server (DNS) . Then DNS first checks records for this URL in their
database, and then DNS will return the IP address to the web browser corresponding to this
URL. Now, the browser can send requests to the actual server.
After the server sends data to the client, the connection will be closed. If we want something
else from the server, we should have to re-establish the connection between the client and the
server.
Simple Network Management Protocol (SNMP) is a widely used protocol for network
management that provides a standardized framework for monitoring and managing network
devices such as routers, switches, servers, printers,firewalls, and load balancer. It operates
within the application layer of the Internet protocol suite and allows network administrators
to manage network performance, find and solve network problems, and plan for network
growth.In this article we will see SNMP protocol in detail.
What is Simple Network Management Protocol (SNMP)?
Simple Network Management Protocol (SNMP) is an Internet Standard protocol used for
managing and monitoring network-connected devices in IP networks. SNMP is
an application layer protocol that uses UDP port number 161/162. SNMP is used to monitor
the network, detect network faults, and sometimes even to configure remote devices.
Architecture of SNMP
There are mainly three main components in SNMP architecture:
SNMP Manager: It is a centralized system used to monitor the network. It is also known as a
Network Management Station (NMS). A router that runs the SNMP server program is called
an agent, while a host that runs the SNMP client program is called a manager.
SNMP agent: It is a software management software module installed on a managed
device. The manager accesses the values stored in the database, whereas the agent maintains
the information in the database. To ascertain if the router is congested or not, for instance, a
manager can examine the relevant variables that a router stores, such as the quantity of
packets received and transmitted.
Management Information Base:MIB consists of information on resources that are to be
managed. This information is organized hierarchically. It consists of objects instances which
are essentially variables. A MIB, or collection of all the objects under management by the
manager, is unique to each agent. System, interface, address translation, IP, UDP , and
EGP , ICMP , TCP are the eight categories that make up MIB. The MIB object is home to
these groups.
SNMP Messages
GetRequest : It is simply used to retrieve data from SNMP agents. In response to this, the
SNMP agent responds with the requested value through a response message.
GetNextRequest : To get the value of a variable, the manager sends the agent the
GetNextRequest message. The values of the entries in a table are retrieved using this kind of
communication. The manager won't be able to access the values if it doesn't know the entries'
indices. The GetNextRequest message is used to define an object in certain circumstances.
SetRequest : It is used by the SNMP manager to set the value of an object instance on the
SNMP agent.
Response : When sent in response to the Set message, it will contain the newly set value as
confirmation that the value has been set.
Trap : These are the message sent by the agent without being requested by the manager. It is
sent when a fault has occurred.
InformRequest : It was added to SNMPv2c and is used to determine if the manager has
received the trap message or not. It is the same as a trap but adds an acknowledgement that
the trap doesn't provide.
SNMP Security Levels
noAuthNoPriv: This (no authentication, no privacy) security level uses a community string
for authentication and no encryption for privacy.
authNopriv: This security level ( authentication , no privacy) uses HMAC with Md5 for
authentication and no encryption is used for privacy.
authPriv: This security level (authentication, privacy) uses HMAC with MD5 or SHA for
authentication and encryption uses the DES-56 algorithm.
Versions of SNMP
SNMPv1: It uses community strings for authentication and uses UDP only. SNMPv1 is the
first version of the protocol. It is described in RFCs 1155 and 1157 and is simple to set up.
SNMPv2c: It uses community strings for authentication. It uses UDP but can be configured
to use TCP. Improved MIB structure elements, transport mappings, and protocol packet
types are all included in this updated version. However, it also makes use of the current
"community-based" SNMPv1 administrative structure, which is why the version is called
SNMPv2c. RFC 1901, RFC 1905, and RFC 1906 all describe it.
SNMPv3: It uses Hash-based MAC with MD5 or SHA for authentication and DES-56 for
privacy. This version uses TCP. Therefore, the conclusion is the higher the version of
SNMP, the more secure it will be. NMPv3 provides the remote configuration of SNMP
entities. This is the most secure version to date because it also includes authentication and
encryption, which may be used alone or in combination. RFC 1905, RFC 1906, RFC 2571,
RFC 2572, RFC 2574, and RFC 2575.6 are the RFCs for SNMPv3.
Characteristics of SNMP
SNMP is used to monitor network.
It detects any network faults.
It can also be used to configure remote devices.
It allows a standardized way of collecting information about all kinds of devices from
various manufacturers among the networking industry.
Advantages of SNMP
It is easy to implement.
Agents are widely implemented.
Agent level overhead is minimal.
It is robust and extensible.
Polling approach is good forLAN based managed object.
It offers the best direct manager agent interface.
Limitation of SNMP
It does not scale well.
There is no object orietned data view.
It has no standard control definition.
It has many implementation specific (private MIB) extensions.
It has high communication overhead due to polling
Conclusion
The Simple Network Management Protocol (SNMP) is an important protocol for managing
and monitoring network-connected devices in IP networks. It enables administrators to
effectively monitor network performance, discover and address errors, and configure remote
devices. While SNMP's simplicity and popularity provide significant advantages, it also has
drawbacks, such as scalability concerns and high communication costs. Despite its
drawbacks, SNMP remains an important in network management.
What is Bluetooth?
Bluetooth is used for short-range wireless voice and data communication. It is a Wireless
Personal Area Network (WPAN) technology and is used for data communications over
smaller distances. This generation changed into being invented via Ericson in 1994. It
operates within the unlicensed, business, scientific, and clinical (ISM) bands from 2.4 GHz
to 2.485 GHz.
Bluetooth stages up to 10 meters. Depending upon the version, it presents information up to
at least 1 Mbps or 3 Mbps. The spreading method that it uses is FHSS (Frequency-hopping
unfold spectrum). A Bluetooth network is called a piconet and a group of interconnected
piconets is called a scatter net.
Bluetooth
Bluetooth is a wireless technology that lets devices like phones, tablets, and headphones
connect to each other and share information without needing cables. Bluetooth simply
follows the principle of transmitting and receiving data using radio waves. It can be paired
with the other device which has also Bluetooth but it should be within the estimated
communication range to connect. When two devices start to share data, they form a network
called piconet which can further accommodate more than five devices.
Key Features of Bluetooth
The transmission capacity of Bluetooth is 720 kbps.
Bluetooth is a wireless technology.
Bluetooth is a Low-cost and short-distance radio communications standard.
Bluetooth is robust and flexible.
The basic architecture unit of Bluetooth is a piconet.
Architecture of Bluetooth
The architecture of Bluetooth defines two types of networks:
Piconet
Piconet is a type of Bluetooth network that contains one primary node called the master node
and seven active secondary nodes called slave nodes. Thus, we can say that there is a total of
8 active nodes which are present at a distance of 10 meters. The communication between the
primary and secondary nodes can be one-to-one or one-to-many. Possible communication is
only between the master and slave; Slave-slave communication is not possible. It also has
255 parked nodes, these are secondary nodes and cannot take participation in communication
unless it gets converted to the active state.
Scatternet
It is formed by using various piconets. A slave that is present in one piconet can act as
master or we can say primary in another piconet. This kind of node can receive a message
from a master in one piconet and deliver the message to its slave in the other piconet where it
is acting as a master. This type of node is referred to as a bridge node. A station cannot be
mastered in two piconets.
Bluetooth Protocol Stack
Radio (RF) Layer: It specifies the details of the air interface, including frequency, the use of
frequency hopping and transmit power. It performs modulation/demodulation of the data
into RF signals. It defines the physical characteristics of Bluetooth transceivers. It defines
two types of physical links: connection-less and connection-oriented.
Baseband Link Layer: The baseband is the digital engine of a Bluetooth system and is
equivalent to the MAC sublayer in LANs. It performs the connection establishment within a
piconet, addressing, packet format, timing and power control.
Link Manager Protocol Layer: It performs the management of the already established links
which includes authentication and encryption processes. It is responsible for creating the
links, monitoring their health, and terminating them gracefully upon command or failure.
Logical Link Control and Adaption (L2CAP) Protocol Layer: It is also known as the heart of
the Bluetooth protocol stack. It allows the communication between upper and lower layers of
the Bluetooth protocol stack. It packages the data packets received from upper layers into the
form expected by lower layers. It also performs segmentation and multiplexing.
Service Discovery Protocol (SDP) Layer: It is short for Service Discovery Protocol. It allows
discovering the services available on another Bluetooth-enabled device.
RF Comm Layer: It is a cabal replacement protocol. It is short for Radio Frontend
Component. It provides a serial interface with WAP and OBEX. It also provides emulation
of serial ports over the logical link control and adaption protocol(L2CAP). The protocol is
based on the ETSI standard TS 07.10.
OBEX: It is short for Object Exchange. It is a communication protocol to exchange objects
between 2 devices.
WAP: It is short for Wireless Access Protocol. It is used for internet access.
TCS: It is short for Telephony Control Protocol. It provides telephony service. The basic
function of this layer is call control (setup & release) and group management for the gateway
serving multiple devices.
Application Layer: It enables the user to interact with the application.
Bluetooth Protocol Stack
Types of Bluetooth
Various types of Bluetooth are available in the market nowadays. Let us look at them.
In-Car Headset: One can make calls from the car speaker system without the use of mobile
phones.
Stereo Headset: To listen to music in car or in music players at home.
Webcam: One can link the camera with the help of Bluetooth with their laptop or phone.
Bluetooth-Equipped Printer: The printer can be used when connected via Bluetooth with
mobile phone or laptop.
Bluetooth Global Positioning System (GPS): To use Global Positioning System (GPS) in
cars, one can connect their phone with car system via Bluetooth to fetch the directions of the
address.
Applications of Bluetooth
It can be used in wireless headsets, wireless PANs, and LANs.
It can connect a digital camera wireless to a mobile phone.
It can transfer data in terms of videos, songs, photographs, or files from one cell phone to
another cell phone or computer.
It is used in the sectors of Medical healthcare, sports and fitness, Military.
Advantages
It is a low-cost and easy-to-use device.
It can also penetrate through walls.
It creates an Ad-hoc connection immediately without any wires.
It is used for voice and data transfer.
Disadvantages
It can be hacked and hence, less secure.
It has a slow data transfer rate of 3 Mbps.
Bluetooth communication does not support routing.
Conclusion
In summary, Bluetooth is a wireless technology that allows devices to connect and
communicate with each other over short distances. It is commonly used for things like
connecting headphones, keyboards, and transferring files between devices.
A firewall is a network security device either hardware or software-based which monitors all
incoming and outgoing traffic and based on a defined set of security rules it accepts, rejects,
or drops that specific traffic. It acts like a security guard that helps keep your digital world
safe from unwanted visitors and potential threats.
Accept: allow the traffic
Reject: block the traffic but reply with an “unreachable error”
Drop: block the traffic with no reply
A firewall is a type of network security device that filters incoming and outgoing network
traffic with security policies that have previously been set up inside an organization. A
firewall is essentially the wall that separates a private internal network from the open
Internet at its very basic level.
7. Hardware Firewall
They also go by the name "firewalls based on physical appliances." It guarantees that the
malicious data is halted before it reaches the network endpoint that is in danger.
8. Cloud Firewall
These are software-based, cloud-deployed network devices. This cloud-based firewall
protects a private network from any unwanted access. Unlike traditional firewalls, a cloud
firewall filters data at the cloud level.
Importance of Firewalls
So, what does a firewall do and why is it important? Without protection, networks are
vulnerable to any traffic trying to access your systems, whether it's harmful or not. That's
why it's crucial to check all network traffic.
When you connect personal computers to other IT systems or the internet, it opens up many
benefits like collaboration, resource sharing, and creativity. But it also exposes your network
and devices to risks like hacking, identity theft, malware, and online fraud.
Once a malicious person finds your network, they can easily access and threaten it,
especially with constant internet connections.
Using a firewall is essential for proactive protection against these risks. It helps users shield
their networks from the worst dangers.
What Does Firewall Security Do?
A firewall serves as a security barrier for a network, narrowing the attack surface to a single
point of contact. Instead of every device on a network being exposed to the internet, all
traffic must first go through the firewall. This way, the firewall can filter and block non-
permitted traffic, whether it's coming in or going out. Additionally, firewalls help create a
record of attempted connections, improving security awareness.
What Can Firewalls Protect Against?
Infiltration by Malicious Actors: Firewalls can block suspicious connections, preventing
eavesdropping and advanced persistent threats (APTs).
Parental Controls: Parents can use firewalls to block their children from accessing explicit
web content.
Workplace Web Browsing Restrictions: Employers can restrict employees from using the
company network to access certain services and websites, like social media.
Nationally Controlled Intranet: Governments can block access to certain web content and
services that conflict with national policies or values.
By allowing network owners to set specific rules, firewalls offer customizable protection for
various scenarios, enhancing overall network security.
Advantages of Using Firewall
Protection From Unauthorized Access: Firewalls can be set up to restrict incoming traffic
from particular IP addresses or networks, preventing hackers or other malicious actors from
easily accessing a network or system. Protection from unwanted access.
Prevention of Malware and Other Threats: Malware and other threat prevention: Firewalls
can be set up to block traffic linked to known malware or other security concerns, assisting
in the defense against these kinds of attacks.
Control of Network Access: By limiting access to specified individuals or groups for
particular servers or applications, firewalls can be used to restrict access to particular
network resources or services.
Monitoring of Network Activity: Firewalls can be set up to record and keep track of all
network activity.
Regulation Compliance: Many industries are bound by rules that demand the usage of
firewalls or other security measures.
Network Segmentation: By using firewalls to split up a bigger network into smaller subnets,
the attack surface is reduced and the security level is raised.
Disadvantages of Using Firewall
Complexity: Setting up and keeping up a firewall can be time-consuming and difficult,
especially for bigger networks or companies with a wide variety of users and devices.
Limited Visibility: Firewalls may not be able to identify or stop security risks that operate at
other levels, such as the application or endpoint level, because they can only observe and
manage traffic at the network level.
False Sense of Security: Some businesses may place an excessive amount of reliance on their
firewall and disregard other crucial security measures like endpoint security or intrusion
detection systems.
Limited adaptability: Because firewalls are frequently rule-based, they might not be able to
respond to fresh security threats.
Performance Impact: Network performance can be significantly impacted by firewalls,
particularly if they are set up to analyze or manage a lot of traffic.
Limited Scalability: Because firewalls are only able to secure one network, businesses that
have several networks must deploy many firewalls, which can be expensive.
Limited VPN support: Some firewalls might not allow complex VPN features like split
tunneling, which could restrict the experience of a remote worker.
Cost: Purchasing many devices or add-on features for a firewall system can be expensive,
especially for businesses.
Features Of Cryptography
The features of cryptography that makes it a popular choice in various applications could be
listed down as:
Confidentiality: Information can only be accessed by the person for whom it is intended and
no other person except him can access it.
Integrity: Information cannot be modified in storage or transition between sender and
intended receiver without any addition to information being detected.
Non-repudiation: The creator/sender of information cannot deny his intention to send
information at a later stage.
Authentication: The identities of the sender and receiver are confirmed. As well
destination/origin of the information is confirmed.
Interoperability: Cryptography allows for secure communication between different systems
and platforms.
Adaptability: Cryptography continuously evolves to stay ahead of security threats and
technological advancements.
How Does a Cryptographic Key Work?
As we all know that cryptography technique is use to convert plain text into ciphertext. This
technique is done by cryptographic key. Basically cryptographic key is a string of characters
which is used to encrypts the data and decrypt the data.
"Geeks for Geeks" + ⚿ = "HYMeAS90#"
For example- "Geeks for Geeks" is a plaintext and convert into ciphertext "HYMeAS90#"
with the help of cryptographic key.
Types Of Cryptography
There are three types of cryptography, namely Symmetric Key Cryptography, Asymmetric
Key Cryptography and Hash functions, here's a detailed explanation below:
Applications of Cryptography
Cryptography has wide area of applications in the modern world, where the technology is
rapidly evolving. From authentication measures to cryptocurrencies, cryptography is here to
stay, these are some of the most common applications of cryptography listed below:
Computer passwords: Cryptography is widely utilized in computer security, particularly
when creating and maintaining passwords. When a user logs in, their password is hashed and
compared to the hash that was previously stored. Passwords are hashed and encrypted before
being stored. In this technique, the passwords are encrypted so that even if a hacker gains
access to the password database, they cannot read the passwords.
Digital Currencies: To protect transactions and prevent fraud, digital currencies like Bitcoin
also use cryptography. Complex algorithms and cryptographic keys are used to safeguard
transactions, making it nearly hard to tamper with or forge the transactions.
Secure web browsing: Online browsing security is provided by the use of cryptography,
which shields users from eavesdropping and man-in-the-middle assaults. Public key
cryptography is used by the Secure Sockets Layer (SSL) and Transport Layer Security
(TLS) protocols to encrypt data sent between the web server and the client, establishing a
secure channel for communication.
Electronic Signatures: Electronic signatures serve as the digital equivalent of a handwritten
signature and are used to sign documents. Digital signatures are created using cryptography
and can be validated using public key cryptography. In many nations, electronic signatures
are enforceable by law, and their use is expanding quickly.
Authentication: Cryptography is used for authentication in many different situations, such as
when accessing a bank account, logging into a computer, or using a secure network.
Cryptographic methods are employed by authentication protocols to confirm the user's
identity and confirm that they have the required access rights to the resource.
Cryptocurrencies: Cryptography is heavily used by cryptocurrencies like Bitcoin and
Ethereum to protect transactions, thwart fraud, and maintain the network's integrity.
Complex algorithms and cryptographic keys are used to safeguard transactions, making it
nearly hard to tamper with or forge the transactions.
End-to-end Internet Encryption: End-to-end encryption is used to protect two-way
communications like video conversations, instant messages, and email. Even if the message
is encrypted, it assures that only the intended receivers can read the message. End-to-end
encryption is widely used in communication apps like WhatsApp and Signal, and it provides
a high level of security and privacy for users.
Types of Cryptography Algorithm
Cryptography Algorithms can be classified into several categories based on the way they
utilize and manage their keys, their efficiency and workflow, here are the most common
algorithms
Advanced Encryption Standard (AES): AES (Advanced Encryption Standard) is a popular
encryption algorithm which uses the same key for encryption and decryption It is a
symmetric block cipher algorithm with block size of 128 bits, 192 bits or 256 bits. AES
algorithm is widely regarded as the replacement of DES (Data encryption standard)
algorithm.
Data Encryption Standard (DES): DES (Data encryption standard) is an older encryption
algorithm that is used to convert 64-bit plaintext data into 48-bit encrypted ciphertext. It uses
symmetric keys (which means same key for encryption and decryption). It is kind of old by
today’s standard but can be used as a basic building block for learning newer encryption
algorithms.
RSA: RSA is an basic asymmetric cryptographic algorithm which uses two different keys for
encryption. The RSA algorithm works on a block cipher concept that converts plain text into
cipher text and vice versa.
Secure Hash Algorithm (SHA): SHA is used to generate unique fixed-length digital
fingerprints of input data known as hashes. SHA variations such as SHA-2 and SHA-3 are
commonly used to ensure data integrity and authenticity. The tiniest change in input data
drastically modifies the hash output, indicating a loss of integrity. Hashing is the process of
storing key value pairs with the help of a hash function into a hash table.
Advantages of Cryptography
Cryptography has some remarkable features that makes it widely adapted all over the world
in different technologies, here are few points that makes it stand out:
Cryptography can be used for access control to ensure that only parties with the proper
permissions have access to a resource.
For secure online communication, it offers secure mechanisms for transmitting private
information like passwords, bank account numbers, and other sensitive data over the
Internet.
It helps in the defense against various types of assaults including replay and man-in-the-
middle attacks.
Cryptography can help firms in meeting a variety of legal requirements including data
protection and privacy legislation.
Conclusion
Cryptography is used to secure information and communications by converting data into
coded formats, ensuring confidentiality, integrity, and authentication. It is essential for a
wide range of applications, including securing online transactions, web browsing, passwords,
digital currencies, and authentication.
Cryptography continuously evolves to stay ahead of security threats, offering solutions such
as symmetric key encryption (AES), asymmetric key encryption (RSA), and hash functions
(SHA) to ensure data privacy and integrity.
With its widespread applications in fields like secure web browsing, cryptocurrencies,
electronic signatures, and end-to-end encryption, cryptography plays a vital role in protecting
sensitive data from malicious actors. As digital threats continue to rise, cryptography ensures
that only authorized parties can access, modify, or transmit critical information securely.