You are on page 1of 5

1.

What are three of the factors that will contribute to greater Internet penetration
in Nepal households?
Ans:
The internet is very important because it is the limitless space where people have access
to pretty much infinite amounts of information. The internet is where a large amount of
knowledge comes from. Internet is gaining popularity worldwide and people in Nepal are
also getting addicted to it. The factors that will contribute to greater internet penetration
in Nepal households are as follows:
a. Price fall of entry level PC: When the price of entry level PC falls, its
affordability will increase and more number of households will possess PC. With PC
ownership numbers high, the logical next step will be internet access to all which will
increase the internet penetration.
b. Enhanced capabilities: Internet can be better penetrated in Nepal households by
providing more functions with the internet facilities. The integration of internet with Internet
Protocol Television (IPTV) has definitely increased the number of internet users. Similarly,
internet can be integrated with the film libraries on a pay per view basis which will draw in
more consumers.
c. Use of wireless web technology: The wireless web refers to use of the worldwide
web through a wireless device.  Wireless Web connection provides anytime/anywhere
connection to e-mail, mobile banking, instant messaging, weather and travel information, and
other services. In general, sites aiming to accommodate wireless users must provide services
in a format displayable on typically small wireless devices. This factor will pull in consumers
to use internet for easier and quicker processes.
d. Competition on Internet Service Provider: As internet is growing its popularity,
more number of internet service providers (ISP) is increasing. With the increased number, the
competition on the ISPs grows and as a result, the bandwidth of the internet is growing in a
decreasing price rate which attracts more number of users to connect to the internet.
Moreover, they publish a lot of commercial advertisements attracting consumers.

2. What are the three main broad impacts the Internet has on marketing?
Ans:
Internet marketing is the most inexpensive way today to reach your target market, regardless
of the size of your business. Internet has affected greatly the marketing techniques today and
the three main broad impacts are given below:
a. Internet as communication: The internet works as a tool of communication. It
spreads information to the consumers about the product or service to be marketed. Consumers
can search for the review or the details about the product or service that they want to
purchase. Moreover, producer and consumer can have two way communications to have a
better deal between them.
b. Increased richness of marketing: Traditional marketing methods used to have a
fixed content and required near about equal amount of cost to add or modify the content.
Internet provides us opportunity to increase the richness of marketing. We can market any
service or product through different websites and more.
c. Internet has greatly expanded the information: This era is said to be information
age and this has been all possible due to internet. People can share their share of information
in the internet to the world and the information accumulated has created an ocean of
information. Now, we can get information about almost anything which has made a great
impact on the marketing field.
3. Explain FTP, Electronic mail, www, Http and HTML.
Ans:
FTP stands for File Transfer Protocol. The File Transfer Protocol (FTP) is a standard network
protocol used for the transfer of computer files between a client and server on a computer
network. FTP is built on a client-server model architecture using separate control and data
connections between the client and the server. FTP users may authenticate themselves with
a clear-text sign-in protocol, normally in the form of a username and password, but can
connect anonymously if the server is configured to allow it. For secure transmission that
protects the username and password, and encrypts the content, FTP is
often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).

E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication.


E-mail messages are usually encoded in ASCII text. However, you can also send non-text
files, such as graphic images and sound files, as attachments sent in binary streams. E-mail
was one of the first uses of the Internet and is still the most popular use. A large percentage of
the total traffic over the Internet is e-mail. E-mail can also be exchanged between online
service provider users and in networks other than the Internet, both public and private. Email
messages are relayed through email servers, which are provided by all Internet service
providers (ISP). Emails are transmitted between two dedicated server folders: sender and
recipient. A sender saves, sends or forwards email messages, whereas a recipient reads or
downloads emails by accessing an email server. Email messages are comprised of three
components, as follows:
 Message envelope: Describes the email’s electronic format
 Message header: Includes sender/recipient information and email subject line
 Message body: Includes text, image and file attachments
The www stands for World Wide Web and is commonly known as the web. It is
an information space where documents and other web resources are identified by Uniform
Resource Locators (URLs), which may be interlinked by hypertext, and are accessible over
the Internet. The resources of the WWW may be accessed by users by a software
application called a web browser.
HTTP means Hyper Text Transfer Protocol. HTTP is the underlying protocol used by
the World Wide Web and this protocol defines how messages are formatted and transmitted,
and what actions Web servers and browsers should take in response to various commands.

HTML stands for Hyper Text Markup Language. HTML is the standard markup language for
creating Web pages. HTML describes the structure of Web pages using markup language.
HTML elements are the building blocks of HTML pages. HTML elements are represented by
tags. HTML tags label pieces of content such as "heading", "paragraph", "table", and so on.
Browsers do not display the HTML tags, but use them to render the content of the page.

4. Briefly Explain TCP/ IP Reference Mode.


Ans:
Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite is the engine for the
Internet and networks worldwide. Its simplicity and power has led to its becoming the single
network protocol of choice in the world today. TCP/IP is a set of protocols developed to
allow cooperating computers to share resources across the network.  
 This model was initially developed & used by ARPANET (Advanced Research
Project Agency Network). ARPANET was a community of researchers sponsored by the
U.S. department of defense. It connects many universities and government installations using
leased telephone lines .Certainly the ARPAnet is the best- known TCP/IP network. 
The most accurate name for the set of protocols is the "Internet protocol suite". TCP and IP
are two of the protocols in this suite. The Internet is a collection of networks. Term "Internet"
applies to this entire set of networks. Like most networking software, TCP/IP is modeled in
layers. This layered representation leads to the term protocol stack, which refers to the stack
of layers in the protocol suite. It can be used for positioning the TCP/IP protocol suite against
others network software like Open System Interconnection (OSI) model.
By dividing the communication software into layers, the protocol stack allows for division of
labor, ease of implementation and code testing, and the ability to develop alternative layer
implementations. Layers communicate with those above and below via concise interfaces. In
this regard, a layer provides a service for the layer directly above it and makes use of services
provided by the layer directly below it. For example, the IP layer provides the ability to
transfer data from one host to another without any guarantee to reliable delivery or duplicate
suppression.

TCP/IP is a family of protocols. A few provide "low- level" functions needed for many
applications. These include IP, TCP, and UDP. Others are protocols for doing specific tasks,
e.g. transferring files between computers, sending mail, or finding out who is logged in on
another computer. Initially TCP/IP was used mostly between minicomputers or
mainframes. These machines had their own disks, and generally were self-contained.

Application Layer 
The application layer is provided by the program that uses TCP/IP for communication. An
application is a user process cooperating with another process usually on a different host
(there is also a benefit to application communication within a single host). Examples of
applications include Telnet and the File Transfer Protocol (FTP).

Transport Layer
The transport layer provides the end-to-end data transfer by delivering data from an
application to its remote peer. Multiple applications can be supported simultaneously. The
most-used transport layer protocol is the Transmission Control Protocol (TCP), which
provides connection-oriented reliable data delivery, duplicate data suppression, congestion
control, and flow control.
Another transport layer protocol is the User Datagram Protocol It provides connectionless,
unreliable, best-effort service. As a result, applications using UDP as the transport protocol
have to provide their own end-to-end integrity, flow control, and congestion control, if
desired. Usually, UDP is used by applications that need a fast transport mechanism and can
tolerate the loss of some data.
Internetwork Layer
The internetwork layer, also called the internet layer or the network layer, provides the
“virtual network” image of an internet this layer shields the higher levels from the physical
network architecture below it. Internet Protocol (IP) is the most important protocol in this
layer. It is a connectionless protocol that does not assume reliability from lower layers. IP
does not provide reliability, flow control, or error recovery.
These functions must be provided at a higher level. IP provides a routing function that
attempts to deliver transmitted messages to their destination. A message unit in an IP network
is called an IP datagram.
This is the basic unit of information transmitted across TCP/IP networks. Other internetwork-
layer protocols are IP, ICMP, IGMP, ARP, and RARP.

Network Interface Layer 


The network interface layer, also called the link layer or the data-link layer or Host to
Network Layer, is the interface to the actual network hardware. This interface may or may
not provide reliable delivery, and may be packet or stream oriented.
In fact, TCP/IP does not specify any protocol here, but can use almost any network interface
available, which illustrates the flexibility of the IP layer. Examples are IEEE 802.2, X.25,
ATM, FDDI, and even SNA.TCP/IP specifications do not describe or standardize any
network-layer protocols, they only standardize ways of accessing those protocols from the
internet work layer.
                                         

5. Explain in detail 5 layer model of e-business infrastructure and how does it


function with an aid of example.
Ans:

The different components of e-business architecture which need to be managed relate to each
other. The different components can be conceived of as different layers with defined
interfaces between each layer. The different layers can best be understood in relation to a
typical task performed by a user of an e-business system.
A five-layer model of e-business infrastructure
I CRM, supply chain management, data mining,
E-business services – applications content management systems
layer
II Web browser and server software and standards,
Systems software layer networking software and database management
systems
III Physical network and transport standards
Transport or network layer (transmission TCP/IP)
IV Permanent magnetic storage on web servers or
Storage/physical layer optical backup or temporary storage in memory
(RAM)
V Web content for intranet, extranet and Internet sites,
Content and data layer customers‘ data, transaction data, clickstream data

For example, an employee who needs to book a holiday will access a specific human
resources application or program that has been created to enable the holiday to be booked
(Level I). This application will enable a holiday request to be entered and will forward the
application to their manager and human resources department for approval.
To access the application, the employee will use a web browser such as Microsoft Internet
Explorer Mozilla Firefox or Google Chrome using an operating system such as Microsoft
Windows XP or Apple OS X (Level II).
This systems software will then request transfer of the information about the holiday request
across a network or transport layer (Level III).
The information will then be stored in computer memory (RAM) or in long-term magnetic
storage on a web server (Level IV).
The information itself which makes up the web pages or content viewed by the employee and
the data about their holiday request are shown as a separate layer (Level V), although it could
be argued that this is the first or second level in e-business architecture.
Kampas (2000) describes an alternative five-level infrastructure model of what he refers to as
the information system function chain‘:
1 Storage/physical.
Memory and disk hardware components (equivalent to Level IV).
2 Processing.
Computation and logic provided by the processor (processing occurs at Levels I and II).
3 Infrastructure.
This refers to the human and external interfaces and also the network, referred to as ‗extra
structure‘. (This is Level III, although the human or external interfaces are not shown there.)
4 Application/content.
This is the data processed by the application into information. (This is Level V)
5 Intelligence.
Additional computer-based logic that transforms information to knowledge.
(This is also part of the application layer I)

You might also like