Professional Documents
Culture Documents
4.0 Introduction
The Personal computers offer a wide range of computing power. If more computing
power is needed, one way to get it is to buy a larger computer system. But buying a
larger computer system is not possible for many small businesses or companies.
Another problem arises for those who are geographically dispersed. They may need to
send messages to, receive messages, or share programme at, many different locations.
One solution to this problem is to keep separate data files at each location. But this
approach is very costly and potentially a risky solution. It is very expensive to maintain
these redundant files of data and difficult to ensure the continuing accuracy of data
at any one location. The solution of both, the need for more power and the ability to
receive, and messages and share data, are found in data communication technology.
Medium
Sender Receiver
(Source) (Sink)
Carries the message
Creates Receives
the message the message
Figure 10 : Communication Process
Notes Information contained in any message is measured in bits and bytes and depends in
number of choices that must be made. Greater the total number of possible selections,
large amount of information is covered.
• Analog signals
• Digital Signals
Analog Signals
Analog signals are continuous signals. They are ideal for representing natural
phenomenon like pressure, temperature whose values are mostly in fractions.
Digital Signals
In the digital system of signals, there are only two states of the signal- Present and
Not Present, True or False, or 1 or 0. Any quantity other than these is required to be
represented in terms of these. Digital signals are the basis of the modern computers. Every
thing that is to be stored in the computer is represented in the of binary form. But in real
life, we use the decimal numbers system, in which digits are from 0 to 9. All the quantities
of real life are the combinations of any of these 10 digits (0, 1, 2, 3, 4, 5, 6, 7, 8, 9,).
But, in case of digital signals, there are only two levels which can represent a zero or
a one. Any other number or quantity must be the combination of only a combination of
these binary digits which are more commonly known as bits.
Types of Transmission
There are two type of transmission
1. Analog Transmission
2. Digital Transmission
1. Analog Transmission
Analog signals can travel a long distance without much effort. Most common
example of transmission of analog signals is telephone network. Sometimes the
digital signals are converted to analog signals and transmitted. This conversion is
called modulation. At the receiving end, these converted signals are converted back to
digital signals. This process of conversion is called demodulation. The device for these
conversions is called modem (modulator-demodulator).
Voltage
+V
–V
However, there are some disadvantages of analog transmission. The most common Notes
disadvantage is problem of noise. During transmission, another analog signal merges
with the original analog signal. At the receiving end, noise is also received along with
original signal.
2. Digital Transmission
As compared to the analog signals, transmission of digital signals is less errorprone,
but the digital signals cannot travel a long distance. For that purpose, they require
an additional hardware, called the booster. When a digital signal is transmitted, it is
required to be regenerated at the regular intervals. Thus, at the time of regeneration,
the noise signals are eliminated. Therefore, at the receiving end, the original signal is
received. Hence, digital transmission is preferred to analog transmission. To transmit
the analog signals with the quality of digital transmission, they are converted to
equivalent digital signals.
The advantage of the digital transmission are Low error rate, High transmission rate
and lowcost.
1 1 1 1
0 0 0 0
Simplex Transmission
In simplex transmission, data is sent in just one direction only. Examples of such
transmission are the television broadcasting. Television is the receiver and the
Transmission Centre is the source. Television cannot transmit any signal back to the
transmitting centre.
Notes Similarly, when transmission takes place between two devices, a transmitting
medium is required. These transmitting media are the transmission lines or
communication channels.
Coaxial Cable: These are the groups of specially warped and insulated wire lines
that are able to transmit data at high speeds. They consist of central copper wire
surrounded by a PVC insulation over which a sleeve of copper mesh is placed. An outer
shield of thick PVC material again shields the metal sleeve. The signal is transmitted
by the inner copper wire and is electrically shielded by the outer metal sleeve. These
cables are capable of transmitting digital signals at very high rates of 10 mega bits
per second. They are extensively used in long distance phone lines and as cables for
closed circuit TV. They have much higher noise immunity and offer cleaner and crisper
data transmission without distortion or loss of signal.
An optical fibre consists of an inner cylinder of glass. This inner cylinder is called
the core which is surrounded by another cylindrical sheel of glass or plastic of lower
refractive index. This is known as cladding. Light which is passed through it is red or
infra-red.
The optical fibres are becoming increasingly popular and playing an important role
in communications. This is because these fibres are advantageous than wires. Some of
the advantages are:-
(a) Light travels very fast in glass then electric signals in the metallic wire.
(b) Optical fibres have got high band width which is of order of GHz. This capacity
is 100 time faster and 1000 million times more information carrying than the
telephone line.
Twisted pairs
One of the most common communication media is the twister wire, also known as
wire pairs. They are four pairs of insulated copper conductors twisted and bounded
by single insulated sheath with or without conductor shield termed as STP and UTP
respectively. These are inexpensive and used very often. Example is the telephone wire.
Microwave transmission
Another popular wireless medium is microwave transmission. It uses a line of sight
transmission of data signals through the atmosphere. These signals cannot bend
around the curvatures of the earth.
As satellites are very far from the transmission or receiving point, the signals have
to travel a long distance which weakens the signals at the satellite as well as on earth
when received. This happens because much signal is lost to space. Partial loss occurs
due to the absorption by water vapour. So it becomes necessary to strengthen such
weak signals.
Also, at the satellite there should be some mechanism to differentiate between the
incoming and outgoing signals. For this, the frequency of incoming signal is changed.
This task of amplification and changing the frequency is done by a device, referred too
as responder, which is on-board the satellite.
4.5 Networks
Network means interconnection of two or more devices. These devices may be
computers, telephones or other communicating device. In case of computers, it is
the connection between two or more autonomous computers. These computers are
connected with each other for information interchange. For connecting two computers,
different media are available like copper wires, microwaves, optical fibre and satellite.
These interconnected computers could spread either over a single geographic site,
such as a single or multi-storey building, or a complex or within several geographical
sites which themselves could be located in different towns, cities or even countries. So
network can spread over a area which could be as small as a room or as wide as the
whole world. Depending on the span of computer network, any network can be placed
in either of the following two categories.
1. LAN
2. WAN
LAN, i.e., Local Area Network is that network which covers the distances varying Notes
from 1m. to 1 km. This means that computers within one building or one premises are
said to be connected through Local Area Network. A network covering the physical
distance of more than 10 kms. is termed Wide Area Network. WAN could spread over a
town, a city or a country or even the entire globe.
This had been the most common classification of networks for many years but
recently one more class of networks have been defined. It is MAN which is an acronym
for Metropolitan Area Network. MAN spans across the city and can be privately or
publicly owned.
• Point-to-point strategy
• Multi-point strategy
Mesh Topology
In this topology each computer is connected to all the other computers on the
network. High speed as any computer can talk to any other computer at any point of
time basically a point to point type of connectivity. Mesh topology is employed for long-
distance transmission of data between nodes.
This topology is used in the networks using electronic PABX. Very often in the
educational institution, we see that distribution of terminals from a computer connected
with, in which each terminal is connected to the central computer using dedicated cable.
Generally the terminals are dumb terminals and intelligence is available at centre point
only, i.e., the computer.
Ring Topology
Individual computers, each attached to a repeating element, are connected together
in the form of a closed loop or ring with the direction of data flow being unidirectional. It
means this is a structure in which each node will have only two adjacent nodes. Being
connected in the form of a ring, there is no node having only one adjacent node.
Any station which wishes to transmit waits for its turn and on its turn sends the
data out onto a ring in the form of packet. This packet contains source and destination
addresses along with data. Signals are passed typically from one device to another in
only one direction. That is data is accepted from one of the adjacent nodes and passed
to another immediate adjacent node. So data moves in one direction along the ring.
The advantage of bus topology is simple wiring and the facility to extend the network
to cover large distances. New stations may be added to existing network without
configuring the network. Because all devices share a common communication medium,
only one pair of devices on a bus or tree can communicate at a time. Transmission is
done in the form of packets containing the source and destination addresses. In bus or
tree, the most commonly used transmission media is twisted pair.
• Client server
• Peer-to-peer
Client Server
In client/server arrangement, we have a server, which is the computer that controls
the function of the entire network and a few clients attached to the server which are
served by the server. The server has a hard disk to hold the shared files, software and a
high quality printer, which could be accessed by all nodes.
All other computers in that network are called clients. Under client-server
arrangement, processing can be done at both the clients as well as the server ends.
In case the server is not up, then the processing can be done at the client end and the
clients behave as the independent computer systems which cannot share the resources
of other computers of the network.
Peer-to-peer
All computers in peer-to-peer arrangement has equal status and no one is server.
All files and data are distributed over the network and the computers can share the
resources of each other. The main disadvantage of peer-to-peer is slow sped because
of heavy use. Example of peer-to-peer arrangement is two systems having Windows 98
connected together by a single cable. Both the systems are at equal status in this local
intranet and both of them can share the resources of each other.
Both the consumers of information and the telecommunications industry are rushing
towards the common goal of connectivity. Each group sees a future where bandwidth
will be cheap so that people can stay in touch no matter where they are, and the variety
of available information will be virtually unlimited.
Security Protection of resources from damage, and or, data from accidents or
unknown person.
Privacy rights are for individuals for themselves how and what extent of information
about them is transmitted to others.
Privacy is closely related to security. Privacy is the issue which goes far beyond
computer centres and networking. To a large extent, it is a problem of society. To
preserve the privacy of data about individuals, the solutions are needed beyond
technical solutions. That is the reason that today new legal and social controls have
been introduced by the international law, so that the degree of privacy of personal
information that is cherished today could be maintained tomorrow also.
Technical security includes the security provided by some programmes and software
like password.
4.11 Summary
• Data communication is the process of transferring messages electronically from
one point to another with sender, medium, receiver as the elements.
• There are two forms in which data can be transmitted like Analog Data transmission
in a continuous wave form and Digital Data Transmission with on and off electrical
states.
• Data transmission may occur in one of the three modes:-simplex mode, half-duplex
mode, full-duplex mode.
• Transmission Media cable types are:- Optical Fiber, Twisted Wire pair, Coaxial
Cable an wireless links are maintained by, Microwave system and Satellite
communication.
Notes • Three basic types of computer network are LAN, MAN, WAN.
• The different network models available are Mesh topology, Star topology, Ring
topology and Bus topology.
• The most important benefit of having networking in any organisation is to make the
back-up process easier, allowing simultaneous access to critical programs and data
and last, but not the least, streamlining personal communication with e-mail.
Further Reading
1. Networks and Systems, Pragarti Prakashan.
5.0 Introduction
The Internet, also known as the Net, means different things to different people.
Well, it is not something you can go and buy in a shop or even see in a picture. When
computer professionals represent the Internet in a diagramme, they just draw a cloud of
connecting computers- the closest they can get to an accurate picture.
The work ‘Internet’ is derived form the words interconnection + networks = Internet.
Networks in different areas can be interconnected to allow computers from one area
to interact with computers in another area, This is called Wide Area Network or WAN.
The Internet is simply a grand extension of this idea, to produce the biggest network of
all – the computer equivalent of the worldwide telephone system.
The Internet didn’t exactly come by chance, neither there was any master plan
laid to start with not big organisations were working towards it The US Department
of Defence laid the foundation of the Internet roughly 30 years ago with a network
called ARPANET. But the general public didn’t use the Internet much until after the
development of the World Wide Web in the early 1990s. As recently as June 1993,
there were only 130 Web sites. Now there are millions.
Notes most diversified sources of information hosted by individuals and various organisations
world wide on a vast network of servers. Presently, the internet gives on to World
Wide Web or just web which interconnects thousands of servers created by various
organisations, commercial establishments, industrial units, academic establishments,
common or particular interest groups or even private individuals. The web pages
loaded on their servers provide various types of information, e.g., plain text, picture, and
animation, multimedia either free of cost or for a modest fee.
Besides, the web pages internet offer services like e-mail, conferencing, electronic
publications and other commercial facilities. It is a new mode to trade text or information
from one point on the globe to another fairly quickly, cheaply and easily. Though it is not
interactive by itself, but the amount of control the users have is due to the computers
themselves, which enable the users to send and receive information to the network.
In the early days of its evolution, the Internet was primarily used for research
purposes with global access due to its faster exchange of information, cost effective
and availability in digitised mode enabling information to be easily convered for other
use. Now researchers around the world are seeking the opportunities of communication
provided by the service to work together, exchange ideas and results, even perhaps
carry out joint experiments or simulations without needing to be in the same place.
The World Wide Web allows users to locate and view over the Internet multimedia-
based documents (i.e., documents with text, graphics, animations, audios, and/or
videos) on almost any subject. Even though the Internet was developed more than three
decades ago, the introduction of the World Wide Web was a relatively recent event.
The World Wide Web came into being into 1991. It was developed by Tim Berners-
Lee and others at the European Laboratory for Particles Physics, also known as CERN.
The CERN Team created the protocol based on hypertext that makes it possible
to connect content on the Web with hyperlinks. Berners-Lee now directs the World
Wide Web Consortium (W3C), a group of industry and university representatives that
oversees the standards of Web technology.
be misused. Speaking of its possible pitfalls, there are certain things that immediately Notes
strike ones mind. Mentioned below are some of its drawbacks:
• Information is Material: Nothing can be kept confidential on the Internet. Once the
information is placed, it can be accessed by anyone, and from anywhere.
• Inappropriate Material: When a powerful tool such as the Internet falls in the
hands of people having wrong intentions, they can use it for anti-social purposes
such as spreading hatred messages between religious communities or writings
things that are disrespectful towards a certain section of society.
• Junk Mails: Junk mails are becoming a great problem on the Internet. These are
the unwanted mails that crowd your mailbox. These mails may contain viruses that
can cause damage to your computer.
• Credit Card Fraud: Individual gains access to your password and uses this
information to get at your credit information and then use the numbers to make
purchases. They find out the victim’s password to their online account. This is
usually done by hacking others password.
• Accessing Wrong Sites: Now a days, kids/teens are involved in watching porn sites,
which is bad for their mental health and can lead them to sexual conversation/acts.
This is done by TCP/IP. For sending a large block of text/data to another machine,
TCP divides the data into little data packets. The role of IP here is not put destination
– address information on such packets. It is not necessary that all the packets follow
the same path from source to destination when sent on internet. They could be sent via
different paths to load balance various paths that exist on the network. This handled by
a special machine called “router”.
Word Address
A typical word address of person understandable address on the Internet is of
format username@host.subdomain.domain
Host are, in general, machines at a particular location. These are the machines
whose resources are normally shared and can be utilised by many users on the
Internet. A user is given an account by the system administrator, which allows him to
use the resources of that machine. This machine is also known as the server.
The username is the name of your Internet account for logging into the host
machine. Logging in is the process of gaining access to your account on the server,
which is shared by several users. Hosts and local networks are clubbed together into
domains, which are, in turn, grouped into one or more larger domains. For an analogy,
domain can be considered as a apartment complex, a town, or even c country, a host
computer can be considered as an apartment building in a complex and your account is
just an apartment in it.
Geographic Domains
Country Domain Name
Australia .au
China .cn
India .in
Non-Geographic Domains
.com Commercial Organisations
.gob Parts of governments
.edu organisations of higher education
www cs cs www
www
IP Address Notes
IP Addresses are machine understandable addresses. The IP address of any host
computer is termed as host address. Significance of IP addresses of computers are
same as significance of telephone numbers to us.
An IP Address consists of four sets of numbers that are separated by dots. These
addresses are organised from left to right .The server of www. Go4i.com/classifiedads
has an IP address 167, 216. 192.97. A portion of number separated by the dot is known
as an Octet that is 8 bits of information. Just like our telephones number which includes
country code, city code exchange code and the user code, each octet has significance
in IP addresses. They consist of sequence of domain code and sub-domain code from
left to right.
Gopher
Gopher displays the set of resources on the Internet in the form of menus or lists of
items. You select the item of interest to see its content on the screen.
It is based on the concept of client and servers. Here the programmes that request
information for a user are the clients and servers are the programmes that provide the
information to clients. Gopher servers are scattered all over the Internet. These servers
wait for requests from Gopher client programmes. One can use the Gopher services to
create the menus. Each of these menu item can point to material on that Gopher server
or on any other Gopher servers.
All these Gopher servers with their respective information resources and all the
Internet resources we can access are collectively referred to as Gopher space.
Usenet
The Usenet can be considered as a global network of computers and people, which
has been intertwined with the Internet. But it does not operate like the Internet, Usenet
machines store the messages sent by users. Unlike mail form mailing lists, the news
articles do not automatically fill your electronic mailbox. To access the information on
Usenet, one needs a special type of programme called a newsreader.
The newsgroups are specially meant for Interaction of people who share some
common interests. People can post their own questions as well as the answers to the
questions of others, on the Usenet. While interacting with people on Internet, certain
mannerism should be adopted. These rules are called netiquette.
E-mail
E-mail is defined as ‘message transmitted electronically’. It has redefined the
ways of communication and helped in reaching to the people in an inexpensive and
speedy way. Many people in business, government and education now use e-mail more
frequently than telephone to communicate with their colleagues. It is the process of
sending messages electronically using your computer. E-mails can be sent anywhere in
the world using your computer and a modem.
Working of E-mail
An electronic mailing system works in much the same manner as the postal service.
In postal services the elements of operation are mail boxes, post offices and letters in
envelopes with addresses on them, trucks, letter boxes and lots of people. With e-mail,
you complete the same sort of operation sitting at your computer.
You will compose the message on your computer using your e-mail package you
will address your message by using simple commands from your e-mail screen. At the
receiving end, your message will be received by a mail server which is a computer set
aside for this function.
The mail server acts like a post office for the person receiving the mail, the message
is held there ready for delivery. But instead of the postman taking it to the house or
business location of that person, he or she will collect it the next time they turn on the
computer and look at their mailbox to see if there are any new messages.
• It is very cheap to use, costing only a few seconds of phone time and possibly
online charges, whether you are sending it overseas or down the road. Notes
• You can send copies to a group of people at the same time and as easily as
you can send to a single person.
• Pictures, documents and other files can be attached to messages and easily
downloaded and viewed at the other end.
• E-mail does not always get through. The slightest error in the address is
enough to prevent a delivery and even when you do everything right, there
is always the chance of a failure in one of the links between you and your
recipient.
• Not everyone checks e-mail regularly, while an envelope on the mat by the front
door will get read.
Structure of an E-mail
An mail message consists of a header, which contains information from whom the
message was sent, the recipient(s) and the route. This is followed by the body of the
message which contains whatever the sender wishes to convey. If the mail message
is a formal one, it is customary although not obligatory to finish with your name, return
address and other useful information as a signature.
• Header
• Body
• Signature
E-mail Header
The header is the electronic or the ‘front of the envelope’. To someone seeing it for
the first time, it can just like a bunch of letters, numbers and symbols. Basically, the
header exists for the computers not of the users.
The headers are prices of information that tell you and the e-mail system several
important things about a piece of e-mail. Each header has specific name and specific
purpose.
E-mail Address
As in normal mail, with e-mail too you need to know someone’s address before you
can send a message, Everyone on the net has a unique e-mail address, which is given
by the access provider at the time of opening an e-mail account. In order to receive or
send an e-mail, you need to have an e-mail address and you need to know the address
of the person to whom you wish to send a message.
• The domain name of the computer receiving your mail, e.g. hcl for Hindustan
Computer Ltd.
E-mail Body
The body is of course the substance or main part of the e-mail – what you send and
what you receive. This what you have to say. Here are few tips and tricks to make your
e-mails enjoyable to read and easy to understand.
• Get in the habit of pressing the Return key twice to insert a blank line between
paragraphs.
• Also hard to read is page after page of unbroken text in capital letters. DON’T
USE ALL CAPS.
E-mail Signature
The signature, which is optional, isn’t a signed name but a sequence of lines, usually
giving some information about the person who sent the e-mail. It is made up of anything
the user wants to include. Usually a signature has the full name of the sender and some
information about how to contract the person by e-mail, phone or fax.
especially for the WWW at CERN. AS HTTP is an Internet protocol for a specific Notes
application , it rides at the top of the stack of protocols that make up the Internet. When
HTTP link is traversed, the browser will connect to the appropriate machine, retrieve the
document and close the connection.
HTTP provides a way for Web clients and servers to communicate with one another,
primarily through the exchange of messages from clients and servers. The message
type for HTTP are classified in four parts:
Request: This is where the client asks for the web resource he looking for. This
includes the protocol to be used, the name of the object to be provided and information
about how the server should respond to the client.
Response: If the server can deliver the requested object, it responds in the manner
requested by the client to deliver the necessary data. If it can’t deliver, it sends an error
message explaining the reason for not delivering the message.
Close: After the information has been transferred in response to the request, the
connection between client and server will be closed.
For example, if a Web page contains objects such as movies, sound, or graphics, a
client makes a request for each objective. A web page containing a background sound
and three graphics thus requires five separate server request messages to retrieve the
four objects-the background sound and three graphics and the page in which these
objects are referenced. Due to the enormous growth of the number of HTTP users,
HTTP has had a tremendous impact on the Internet.
A web browser receives information from web servers and presents that information
to the end-user. To request information form the server, the browser uses a special
addressing scheme known as a Universal Resource Locator. URLs are used globally to
name and access all web resources.
Syntax:
protocol/data source:// domain name: port number/ <directory path>/ <object
name>#<spot>
Example
http:/www.yahoo.com/education/FIIThome.htm
5.6 Browsers
Web browser, or simply browser is a software application that resides on a
computer and is used to locate and display web pages. Browsers allow you to click on
hyperlinks to retrieve information via the web and offer additional features for navigating
and managing the web.
Notes A browser contains the basic software you need in order to find, retrieve, view and
send information over the Internet. This includes software that allows you to:
• Send and receive electronic mail (or e-mail) messages worldwide nearly
instantaneously.
• Browse the World Wide Web (or Web), where you can find a rich variety of text,
graphics and interactive information.
The best-known and most frequently used browsers are Netscape (now owned by
AOL) and Internet Explorer owned by Microsoft. Both are graphical browsers, which
means that they can display graphics, as well as text, and can be used to view and
interact with many multimedia formats, including sound, video and other programmes.
Internet Explorer makes it easier to get the most from the World Wide Web, whether
you are searching for new information or browsing your favourite Web sites. The
built-in IntelliSense technology can save your time, complete routine Web tasks, such
as automatically completing Web addresses and forms for you and automatically
detecting your network and connection status.
Netscape Navigator
Netscape Navigator is a Web browser for Windows, Macintosh and X Windows
form Netscape. Soon after its introduction in 1994 Navigator or simply Netscape, as it
is commonly called, quickly became the leading Web browser and pioneered the World
Wide Web in all its glory.
Opera
Opera is a Web browser for Windows, Linux, etc. Developed at Telenor (Norwegian
Telecom) in 1994 and commercialised by Opera in 1995, it is noted for its unique
features, including its fast rendering of web pages, built-in-zoom and ability to print just
a highlighted section of the page. Opera can display multiple windows with only one
instance of the programme running.
• Should be empowered with easy Web navigation tools such as history, search,
home bookmark.
5.7 Cookies
Cookie is a message given to a Web browser by a Web Server. The browser stores
the message in a text file called cookies text. The message is then sent back to the
server each time the browser requests a page from the server. Cookies are a very
useful tool in maintaining state variables on the Web.
Cookies can store database information, custom page settings, or just about
anything that would make a site individual and customisable. Cookies are beneficial
things as they store information for you. For example, when you log on to certain sites,
you must have noticed that when you return to that site again, you do not have to sign
on. That’s because your information like ID, password, login or registration information,
online ’shopping cart’ information, or user preferences are stored on your machine in a
cookie.
Cookies are usually set to expire after a pre-determined time and are usually saved
in memory until the browser software is closed down, at which time they may be saved
to disk if their ‘ expire time’ has not been reached.
Use of Cookies
An example of the use of cookies is when a browser stores your personal
information like user name and password. Common cookies which companies use to
find information are listed below:
Authentication
Cookies can be deployed to aid user authentication. For example, if a user visits,
a website and properly authenticates, a cookie can appear in the user’s hard drive, so
that he need not have to enter password again the next time he/she logs on.
Site Personalisation
This is one of the most beneficial uses. Suppose a person comes to the MSNBC
site but doesn’t want to see any sports news. Cookies allow people to selects this as an
option, from then onwards (until the cookie expires) they wouldn’t see sports news. This
is also useful for start pages.
In order to do this properly, remember to close your browser first. This is because all
your cookies are held in memory until you close your browser. So, if you delete the file
with your browser open, it will make a new file when you close it, and your cookies will
be back.
Archie: In the early days of the Internet, people commonly used to transfer files
between computers or make documents and programmes available via FTP (File
Transfer Protocol) servers. These used a command language, unlike the graphical
format of Web browsers we are familiar with today.
One of the early problems we had was how to find programmes and information. At
that time, websites like yahoo and excite did not exist, and in fact, the WWW did not
exist either. So people used to index the files available with them and send the location
of those files to a common server that would index them. This was commonly done
overnight, so that new files would appear in this index the following morning. Only the
files names were indexed-not their contents. If you did not know the name of the file, it
was very difficult to find where on the Internet it might be located.
As people wrote programmes and made them available, Archie was quick way to
determine where the programme was available so you could download the programme
and use it. In the early days of the Internet, traffic costs were high, so people used
Archie to find the nearest location to them from where they could download the file, thus
avoiding costly traffic charges.
This index was called Archie. Today, the large search engines like yahoo and excite
hence replaced Archie, making it much easier to locate documents and programmes.
Gopher: It was not long before people using the Internet realised that finding
information on the Internet was a hard task. Gopher consisted of two parts, a Gopher
sever and a Gopher client.
A Gopher server was means of providing documents and programmes (in fact any
type of file) to users. Whereas Archie and FTP were purely command type interfaces
(where users had to type commands and the responses were given back as text).
Gopher implemented as means of displaying the information graphically for the client.
This made navigation of the documents available on Gopher servers much easier
Another advantage was the ability of Gopher servers to link to other Gopher servers.
If you could not find the information you were looking for on one Gopher server, you
could try the next one and so on till you located the desired information.
Gopher client is a programme that you run on your computer, or on your computer
account that controls the transfer of information from the Gopher server. With a
Gopher client you can retrieve a copy of the information available on a Gopher server.
Amity Directorate of Distance & Online Education
Computers in Management 57
Gopher is seldom used today, with the WWW and Web browsers offering much more Notes
functionality.
Whois: This is a service that provides information on Internet users, domain names
and organisations. Using it, you can find e-mail addresses, hot computer names and
domain names. Organisations and users register their names, host computers and
organisation domain names in a large registry database.
There were four basic elements to WAIS, a client programme to perform searching,
the WAIS server, the indexed database, and a tool for indexing the documents in
the database. Internet search engines such as yahoo and excite have replaced the
functionality of WAIS.
Around the World Wide Web, people have amassed collections of websites to help
steer you in the right direction for your needs. Some of the Popular search engines are
goggle, altavista, excite, lycos, askjeeves, etc.
News Search Engines: News search engines are designed to search for the latest
news stores from hundreds of sources on the Web. This service provide exceptionally
good results for current event searching, because they scroll only news sites and revisit
these sites several times ADAY. Thus, the results are usually focused and timely. For
example, http:news.yahoo.com/, is a yahoo news search engine.
Kids Search Engine: These search engines are designed primarily to serve the
needs of children, either in focus, or filtering out sites that some parents and teachers
might find inappropriate for kids. These usually include sites that deal with violence,
hate speech, gambling and drug use. For example, Yaholigans is a unique service
designed for kids of ages 7 to 12. Sites are hand picked to be appropriate for children.
Multimedia Search Engines: Multimedia search engines will help you locate
sound, image or video files. For example, Alta Vista Photo Finder is an impressive
service that lets you find photos, images audio and video clips from all over the web
and search results feature thumbnails of images found.
Legal Search Engines: Legal search engines are designed to help you find legal
information and law-related Web sites. For example, Law Crawler is a Google-powered
search engine that returns information only from sites that have been identified as
dealing with legal issues.
Password Cracking
Password cracking is just another method used to illegally access someone’s
computer without his her consent. To prevent password cracking, users should create
and use passwords of eight or more characters that combine alphanumeric elements,
apart frosm changing it frequently.
E-mail Spoofing
Spoofing result when a user receives e-mail that appears to have originated form
one person but is actually sent by another person. The objective of spoofing is to trick
the user into divulging information and replying with information that is confidential.
Electronic signature also known as digital signature helps to prevent spoofing. Notes
It ensures that messages have not been altered during transmission and that the
messages are from the person listed as the sender.
Virus Intrusion
People generally use the word Virus to refer to anything undesirable that can
happen to a computer, but this is not accurate. Viruses are short programmes that
are not engineered by accident. Someone somewhere has purposely designed them,
usually with a malicious intent. Virus exposure results from receiving e-mail, sending
documents over the network and even from installing software or copying files from
another hard disk.
Hacker Attacks
Hackers use a variety of tools to attack servers around the world. Most of these
are preventable by implementing sound security policies and appropriate software and
hardware. One of the most common tools used by hackers is the ‘Ping’ command. It
used very effectively to exploit the target computer. There are several hacking tools
available to the hackers that allow them to send their oversized or continuous packets
to the target computer. This results in a system interruption or even a system crash.
Firewall
To prevent unauthorised access to the computer network from outside one needs
a firewall between one’s network and the outside world. A firewall is a barrier to keep
destructive forces away from your computer. Its job is similar to a physical firewall that
keeps a fire from spreading from one area to the next.
Advantage of Using a Firewall: The level of security you establish will determine
how many of the security threats can be stopped by your firewall. The highest level
of security would be to simply block everything. Obviously that defeats the purpose of
having an Internet connection. But a common rule of thumb is to block everything, then
deciding what types of traffic you will allow.
One of the best things about a firewall from a security point of view is that it stops
any outsider from login onto a computer in your private network. While this is a big deal
for business, most home networks will probably not be threatened in this manner. Still,
putting a firewall in place provides some sort of security.
Anti-Virus
Anti Virus is a software utility which can search the hard disk for viruses and
remove, those are found. Most Anti Virus programmes include an auto-update feature
that enables the programme to download profiles of new viruses so that it can check for
the new viruses as soon as they are discovered.
Viruses checking programmes or Anti Viruses have normally in-built scanners, which
scan all files on your computer’s hard disk. These looks for changes and activity in
computers that are typical in case of virus attack. The most popular Anti Virus software
programmes available are Norton and McAfee Anti Virus Programmes.
5.10 Copyright
Copyright is a form of protection provided by the law to the authors of ‘original
works of authorship’, including literary, dramatic, musical, artistic and certain other
intellectual works, This protection is available to both published and unpublished works.
Copyright Act generally gives the owner of copyright the exclusive right to do and to
authorize others to do the following:
• Distribute copies of the work to the public by sale or other transfer of ownership
or by rental, lease or lending.
• Perform the work publicly, in the case of literary, musical, dramatic and
choreographic works, pantomimes and motion pictures and other audiovisual Notes
works.
• Display the copyrighted work publicly, in the case of literary, musical, dramatic
and choreographic works, pantomimes and pictorial, graphic, or sculptural
works, including the individual images of a motion picture of other audiovisual
work.
It is illegal for anyone to violate any of the rights provided by the copyright law to the
owner of copyright. These rights, however, are not unlimited in scope; Copyright Act
establishes limitations on these rights. In some cases, these limitations are specified
exemptions from copyright liability. One major limitation is the doctrine of ‘fair use’. In
other instances, the limitation takes the form of a ‘compulsory license’ under which
certain limited uses of copyrighted works are permitted upon payment of specified
royalties and in compliance with the conditions laid down by the author of the copyright
work.
Browser: It is a client programme (software that enables you to surf the web and
access information on the Internet though the World Wide Web. Some examples of
browser are Netscape Navigator, Internet Explorer, etc.
Chat: The online version of having a conversation, only you can chat with many
others from all over the world at the same time.
DNS (Domain Name System): This System, which identifies each computer as
a network node on the Internet using an Internet protocol, is an address system to
translate from domain names to IP number and vice-versa.
Domain Name: Either in an e-mail address or a URL, this refers to the name of the
computer where the mail account or files is located.
HTML (Hyper Text Markup Language): This is a primary language used to design
Web pages. It is a system of marking up or tagging, a document so that it can be
published in the World Wide Web.
HTTP (Hyper Text Transmission Protocol): It is a protocol that a web server and a
web browser use to communicate with each other.
Amity Directorate of Distance & Online Education
62 Computers in Management
Notes Hypermedia: Documents which combine hypertext links and multimedia elements
(such as images, videos and audio) on a Web page that links the user to another Web
page by clicking on the media.
Internet: The name given to the collective electronic network of computers and
computer networks which are interconnected throughout the worlds –started with the
ARPANET at the U.S Department of Defense.
Link: This is an action that leads you to go to the other page, when you click any
text or graphics on a webpage.
Multimedia: These are the documents, which contain text, sound, graphics and
video elements that are all capable of being displayed to the user.
Packets: These are the small units of data that travel on the Internet containing
address information to facilitate information exchange between source and destination
(s) though the network.
Protocol: These are the set of defined rules, which determine the way information
exchange takes place between the two computers on the network.
Server: It is a computer that provides services and resources to the other computers
on the network.
WWW (World Wide Web): It is an interlinked collection of hypertext and hypermedia Notes
documents residing on the Web Server. Web documents are marked for formatting and
linking with HTML and Web server uses HTTP to deliver the Web page.
5.14 Summary
• The Internet can be thought of as a huge repository of information on almost every
topic imaginable.
• Internet services can be done in two ways – Direct access, dial up.
• Domain name server gives each computer on the Internet an Internet address or
Domain name using letters and words instead of numbers.
• Telnet is a software tool that allows an Internet host computer to become a terminal
for another host on the Internet.
• Search engines are programmes which accept string as input and will output all the
web pages whose pages contain related information the string.
• A firewall allows only specific kinds of messages from the Internet to flow in and out
of the Internet Network.
• Copyright protects original work of authorship that are fixed in a tangible form of
expression.
a. Encryption b. Cryptography
Further Reading
1. Internet and Web Design : Macmillan India Ltd.