You are on page 1of 35

ICT-2

Internet Fundamentals and Web Tools

Unit-1(Fundamentals of Internet)

Networking Concepts:
1. DEFINITION OF A COMPUTER NETWORK:
A computer network is defined as the interconnection of two or more
computers. It is done to enable the computers to communicate and share
available resources.
2. APPLICATIONS:
i. Sharing of resources such as printers

ii. Sharing of expensive software's and database

iii. Communication from one computer to another computer

iv. Exchange of data and information among users via network

v. Sharing of information over geographically wide areas.


3. COMPONENTS OF COMPUTER NETWORK
 Two or more computers

 Cables as links between the computers

 A network interfacing card(NIC) on each computer

 Switches

 Software called operating system(OS)


4. NETWORK BENEFITS
 The network provided to the users can be divided into two categories:

 Sharing
 Connectivity
5. SHARING RESOURCES:

TYPES OF RESOURCES ARE:

HARDWARE:
A network allows users to share many hardware devices such as printers,
modems, fax machines, CD ROM, players, etc.
SOFTWARE:
Sharing software resources reduces the cost of software installation, saves
space on hard disk.
6. ADVANTAGES OF COMPUTER NETWORK:
 Increased speed
 Reduced cost
 Improved security
 Centralized software managements
 Electronic mail
 Flexible access

7. Disadvantages of Networks:
 High cost of installation
 Requires time for administration
 Failure of server
 Cable faults

Data Communication:
Data communication refers to the exchange of data between a source and a
receiver. Data communication is said to be local if communicating devices are
in the same building or a similarly restricted geographical area.
The meanings of source and receiver are very simple. The device that transmits
the data is known as source and the device that receives the transmitted data is
known as receiver.
Data can exist in a variety of forms such as numbers, text, bits and bytes. The
Figure is an illustration of a simple data communication system.

A data communication system may collect data from remote locations through
data transmission circuits, and then outputs processed results to remote
locations.
A data communication system has five components:
· Message: The message is the information to be communicated. A popular
form of information includes text, numbers, pictures, audio and video.
· Sender: The sender is the device that sends the data message. It can be a
computer, workstation, telephone handset, video camera, and so on.
· Receiver: The receiver is the device that receives the message. It can be a
computer, workstation, telephone handset, television, and so on.
· Transmission Medium: The transmission medium is the physical path by
which a message travels from sender to receiver. Some examples of
transmission media include twisted-pair wire, coaxial cable, fibre-optic cable,
and radio waves.
· Protocol: A protocol is a set of rules that governs data communications. It
represents an agreement between the communication devices. Without a
protocol, two devices may be connected but not communicating.
Types of Networking:
Classification of Area by Their Geography:

NETWORK

PAN LAN WAN MAN CAN


LOCAL AREA NETWORK (LAN):
 LAN is a network which is designed to operate over a small physical area
such as an office, factory or a group of buildings.
 LAN’s are easy to design and troubleshoot
 Exchange of information and sharing of resources becomes easy because
of LAN.
 In LAN all machines are connected to a single cable.
 Different types of topologies such as star, tree, bus, ring, etc Can be used
 It is usually a privately owned network.

WIDE AREA NETWORK (WAN):


 When network spans over a large distance or when the computers to be
connected to each other are at widely separated locations a local area
network cannot be used. A wide area network(WAN) is installed.
 The communication between different users of WAN is established using
leased telephone lines, satellite links and similar channels.
 It is cheaper and more efficient to use the phone network for the link.
 Most WAN networks are used to transfer large blocks of data between its
users.

PERSONAL AREA NETWORK (PAN):


 A personal area network is a computer network organized around an
individual person.
 It generally consists of a mobile computer, a cell phone or personal
digital assistant. PAN enables the communication among these devices.
 It can also be used for communication among personal devices
themselves for connecting to a digital level network and internet.
 The PANs can be constructed using wireless or cables.

CAMPUS AREA NETWORK (CAN):


 The campus area network is made up of an interconnection of LAN with
limited geographical area.
 Network equipment’s such as switches, routers and the transmission
media i.e. optical fibre etc. are almost entirely owned by the campus
owner.
METROPOLITAN AREA NETWORK (MAN):

 It is in between LAN & WAN technology that covers the entire city.
 It uses similar technology as LAN.
 It can be a single network such as cable TV network, or a measure of
connecting a number of LAN’s o a large network so that resources can be
shared LAN to LAN as well as device to device.

Internet and its Services:


The Internet is a global system of interconnected computer networks that
use the standard Internet Protocol Suite (TCP/IP) to serve billions of users
worldwide. It is a network of networks that consists of millions of private,
public, academic, business, and government networks, of local to global scope,
that are linked by a broad array of electronic and optical networking
technologies. The Internet carries a vast range of information resources and
services, such as the inter-linked hypertext documents of the World Wide Web
(WWW) and the infrastructure to support electronic mail.

The Internet uses the TCP/IP (Transmission Control Protocol" (TCP) and
the "Internet Protocol" (IP)) developed in 1982 which are set of specifications
and protocols originates from work done at the US-Department of Defence in
the late 1960s. This allows the integration of a large number of different
computers into one single network with highly efficient communication
between them. This way, the user can access information on all kinds of host
computers from a desktop PC, Macintosh, or whatever he/she have available.

The first version of the Internet was built by the DoD in 1969 and
consisted of just 4 computers (Davidson, 1988, p. 2).

The most fundamental function of the Internet is to pass electronic


information from one computer to another. Every computer on the network is
identified by a 32 bit Internet Address or IP-Number. This number is commonly
represented as four numbers joined by periods. The Internet uses these numbers
to guide information through the network ("routing"). For human users,
however, such numbers are usually difficult to keep in mind. Therefore,
computers are also identified by Domain Names, which are to some extent
similar to mailing addresses. Special programs, called "Name Servers", translate
Domain Names into IP-Addresses.
Major Internet Services
Internet services can be divided into two groups

1.Communication services

In the first group the Internet mediates in the communication


between two or more individuals. It can roughly be compared to a telephone
call.

Ex: Electronic mail (e-mail)

2. Information services.

In information services the user turns to the Internet-service in search for


some particular information. It can roughly be compared to a dictionary.

Internet Addressing:
Because the Internet is a global network of computers each computer connected
to the Internet must have a unique address. Internet addresses are in the form
nnn.nnn.nnn.nnn where nnn must be a number from 0 - 255. This address is
known as an IP address. (IP stands for Internet Protocol)
The picture below illustrates two computers connected to the Internet; your
computer with IP address 1.2.3.4 and another computer with IP address 5.6.7.8.
If you connect to the Internet through an Internet Service Provider (ISP), you
are usually assigned a temporary IP address for the duration of your dial-in
session. If you connect to the Internet from a local area network (LAN) your
computer might have a permanent IP address or it might obtain a temporary one
from a DHCP (Dynamic Host Configuration Protocol) server. In any case, if
you are connected to the Internet, your computer has a unique IP address.
Protocol Stacks and Packets
So your computer is connected to the Internet and has a unique address. How
does it 'talk' to other computers connected to the Internet? An example should
serve here: Let's say your IP address is 1.2.3.4 and you want to send a message
to the computer 5.6.7.8. The message you want to send is "Hello computer
5.6.7.8!". Obviously, the message must be transmitted over whatever kind of
wire connects your computer to the Internet. Let's say you've dialed into your
ISP from home and the message must be transmitted over the phone line.
Therefore the message must be translated from alphabetic text into electronic
signals, transmitted over the Internet, and then translated back into alphabetic
text. How is this accomplished? Through the use of a protocol stack. Every
computer needs one to communicate on the Internet and it is usually built into
the computer's operating system (i.e. Windows, UNIX, etc.).
The protocol stack used on the Internet is referred to as the TCP/IP protocol
stack because of the two major communication protocols used. The TCP/IP
stack looks like this:
Protocol Layer Comments
Application Protocols Layer Protocols specific to applications such
as WWW, e-mail, FTP,
etc.
Transmission Control Protocol TCP directs packets to a specific
Layer application on a computer
using a port number.
Internet Protocol Layer IP directs packets to a specific
computer using an IP address.
Hardware Layer Converts binary packet data to
network signals and back.
(E.g. ethernet network card, modem
for phone lines, etc.)

If we were to follow the path that the message "Hello computer 5.6.7.8!" took
from our computer to the computer with IP address 5.6.7.8, it would happen
something like this:
· The message would start at the top of the protocol stack on your computer and
work it's way downward.
· If the message to be sent is long, each stack layer that the message passes
through may break the message up into smaller chunks of data. This is because
data sent over the Internet (and most computer networks) are sent in
manageable chunks. On the Internet, these chunks of data are known as packets.
· The packets would go through the Application Layer and continue to the TCP
layer. Each packet is assigned a port number. We need to know which program
on the destination computer needs to receive the message because it will be
listening on a specific port.
· After going through the TCP layer, the packets proceed to the IP layer. This is
where each packet receives its destination address, 5.6.7.8.
· Now that our message packets have a port number and an IP address, they are
ready to be sent over the Internet. The hardware layer takes care of turning our
packets containing the alphabetic text of our message into electronic signals and
transmitting them over the phone line.
· On the other end of the phone line your ISP has a direct connection to the
Internet. The ISPs router examines the destination address in each packet and
determines where to send it. Often, the packet's next stop is another router.
· Eventually, the packets reach computer 5.6.7.8. Here, the packets start at the
bottom of the destination computer's TCP/IP stack and work upwards.
· As the packets go upwards through the stack, all routing data that the sending
computer's stack added (such as IP address and port number) is stripped from
the packets.
· When the data reaches the top of the stack, the packets have been re-assembled
into their original form, "Hello computer 5.6.7.8!"
Internet Applications:
1. Search engine:
It can be used to search anything and everything. Most popular
search engines are Google and Yahoo searches.

2. Shopping:Shopping has become easier with the advent of internet. You can
buy or sell online.
3. Communication:This is a major role of the internet. It helps people to
communicate either with the use of social networking websites or through e
mails. Even chatting is a major use of the internet.

4. Job search:
Nowadays, many people search for their jobs online as it is quicker
and there is a larger variety of job vacancies present.

5. Hobbies:
Those who are having certain hobbies can try to improve on it by
reading up on many aspects of their hobby.

6. Research:Research papers are present online which helps in the researcher


doing a literature review.

7. Studying:
Now right from kinder garden children are exposed to internet and
computers. They find many useful things to learn on the internet (though with
supervision). Upto doctorate level education, people rely on internet for their
education. Online educational books have even reduced the need for a library.

These are only some of the uses of the internet. There are so many more that
will can be listed forever. There are also negative aspects of the internet. But the
onus is on the user to make use of the internet for its benefits and leave all the
negative aspects.
Computer Viruses and its types:
It is a program designed to replicate itself into other files or programs stored on
your device. Viruses can cause programs to operate incorrectly or corrupt a
computer's memory.

There are six broad categories that viruses fall under:


1. Boot Sector Virus - targets the boot sector of a hard drive and crucially effects the
boot process.

2. File Infection Virus


- coded viruses that attach themselves to .exe files;
compressed files such as zip or drive files.

3. Multipartite Virus - cross between a file virus and a boot sector virus.

4. Network Virus- uniquely created to quickly spread throughout the local area
network and generally across the Internet as well. Typically moves within
shared resources like drives and folders.

5. Macro Virus
- infects program files that use macros in the program itself, such as
word processors.

6. E-mail Virus
- generally this is a macro virus which multiplies by sending itself to
other contacts in your address book, in hopes they'll activate the virus as well.
Browser and its types:
Web Browsers are software installed on your PC. To access the Web, you need
a web browser, such as Netscape Navigator, Microsoft Internet Explorer or
Mozilla Firefox.

On the Web, when you navigate through pages of information, this is


commonly known as web browsing or web surfing.

There are four leading web browsers − Explorer, Firefox, Netscape, and Safari,
but there are many others browsers available. You might be interested in
knowing Complete Browser Statistics. Now we will see these browsers in bit
more detail.

While developing a site, we should try to make it compatible to as many


browsers as possible. Especially sites should be compatible to major browsers
like Explorer, Firefox, Chrome, Netscape, Opera, and Safari.

Internet Explorer
Internet Explorer (IE) is a product from software giant Microsoft. This is the
most commonly used browser in the universe. This was introduced in 1995
along with Windows 95 launch and it has passed Netscape popularity in 1998.

Google Chrome
This web browser is developed by Google and its beta version was first
released on September 2, 2008 for Microsoft Windows. Today, chrome is
known to be one of the most popular web browser with its global share of more
than 50%.

Mozilla Firefox
Firefox is a new browser derived from Mozilla. It was released in 2004 and has
grown to be the second most popular browser on the Internet.

Safari
Safari is a web browser developed by Apple Inc. and included in Mac OS X. It
was first released as a public beta in January 2003. Safari has very good
support for latest technologies like XHTML, CSS2 etc.

Opera
Opera is smaller and faster than most other browsers, yet it is full- featured.
Fast, user-friendly, with keyboard interface, multiple windows, zoom
functions, and more. Java and non Java-enabled versions available. Ideal for
newcomers to the Internet, school children, handicap and as a front-end for
CD-Rom and kiosks.

UNIT-2
Understanding URL's

URL - definition URL stands for Uniform Resource Locator. It is the Web
Address of a web page, or some other kind of document, that is available on the
Internet. It is the instruction to your browser regarding the exact location on the
Internet of the page you want to visit.
 Some are very short.
o For example; http://www.cnn.com
 Some are long and somewhat complicated.
o For example;
http://www.mcsk12.net/admin/tlapages/entry_level_pc_index.htm
The address of an index that contained a link to the page like the one you are
reading now is: http:// www.mcsk12.net/ admin/ tlapages/
entry_level_pc_index.htm

 http:// - The way that information is transferred by way of the browser.


That is known as the protocol. In this case the browser is to use Hyper
Text Transfer Protocol. The language of web pages is known as HTML,
Hypertext Mark up Language. Another common protocol is known as
File Transfer Protocol, or ftp://
 www.mcsk12.net/ - The domain name, or location of the computer on the
World Wide Web which hosts the page. Once a domain is registered the
information provided by that domain must have a host computer where
the files are stored. That computer is called a server. Some places are
huge collections of servers known as " server farms."
 admin/ - Servers which host huge collections of data must organize that
data in directories or file folders. Anything following the domain name
which is also followed by a slash is the name of a directory.
 tlapages/ - Very large collections of data may require sub-directories,
or folders within folders. Your clue that this is a sub directory is the slash
following the name.
 entry_level_pc_index.htm - This is the name of the file, or page, that
you are looking at right now. Each file in the directory must have a
unique name. Some get very complicated. Spaces should not be in file
names, and in this case have been indicated by the underscore character.
Navigating with Internet Explorer Buttons

Using the Standard Button toolbar

Back - Gently click one time with the left side of your mouse button to go
back to the page that you were looking at before you followed the link to take
you to the current page.
Back history - Gently click one time with the left side of your mouse button
on the down arrow just to the right of the Back button. That brings up a list of
the sites you have visited using this browser window. To avoid clicking the
Back button three times to get back to " Entry Level Computer Skills for
Windows ," slide the mouse pointer down to that entry and click one time with
the button on the left side of your mouse. These entries are in chronological
order with the most recently visited site at the top of the list.

Forward - This button will not be available unless you have used the Back
button at least once. If you have used the back button, and the forward button is
not grayed out, clicking one time on the Forward button will take you to the
page you just left when you clicked on the Back button.
Forward history - Gently click one time with the left side of your mouse button
on the down arrow just to the right of the Forward button. That brings up a list
of the sites you have visited and then used the Back button to return from using
this browser window. To avoid clicking the Forward button three times to get
back to " A tutorial on saving for new users ," slide the mouse pointer down to
that entry and click one time with the button on the left side of your mouse.
These entries are in chronological order with the most recently visited site at the
top of the list.
Stop - Select this button to stop the current download. If you tried to follow a
link and the IE logo in the top right corner of your window is still spinning, the
browser is still trying to complete your request. If too many seconds pass and
you do not get to the page, put the tip of your mouse pointer on the Stop button
and click one time with the left side of your mouse. Try the link again. Often
this allows you to see the page quicker than if you just waited for your first click
on the link to finish.
Refresh - Place the tip of your mouse pointer on the Refresh button and click
one time with the left side of your mouse. This asks for the most recent version
of the page that you are on. There are several reasons for using this button

 If you used the stop button before all of the page downloaded, use Refresh to
get a complete page
 If you know the page has changed since the last time you visited it, use
Refresh to see the newest version of the page.
 If you are on a page which updates frequently (like CNN), use Refresh to see
the most recent information
Home - The page that is displayed when you first launch Internet Explorer is
known as the Home page. No matter how many pages you have visited in your
Internet session, you can instantly get back to that first page by placing the tip
of your mouse pointer on the Home button and clicking one time with the left
side of your mouse.

Favourites - This toolbar button opens a pane of sites on the left side of your
browser window. Placing the tip of your mouse pointer on a listing in the
favourite sites and clicking one time with the left side of your mouse will take
you to that Internet page. An entire page will be devoted to instructions
regarding this feature of Internet Explorer. If you want to get rid of the pane and
see Internet pages full size, click one time on the X in the top right of the
Favourites pane with the left side of your mouse. That closes the Favourites
pane.

Introduction to Social Networking:

Online social networks facilitate connections between people based on shared


interests, values, membership in particular groups (i.e., friends, professional
colleagues), etc. They make it easier for people to find and communicate with
individuals who are in their networks using the Web as the interface.

There are several different online social networks, but for our purposes, we’ll
focus on the three that tend to be used the most by learning professionals–
Facebook, LinkedIn and Twitter. Each of these networks has its own unique
style, functionality and patterns of usage. You will also find that different
people are active in these different networks.
Blog:

A blog is a frequently updated online personal journal or diary. It is a place to


express yourself to the world. A place to share your thoughts and your passions.
Really, it’s anything you want it to be. For our purposes we’ll say that a blog is
your own website that you are going to update on an on-going basis. Blog is a
short form for the word weblog and the two words are used interchangeably.

Microblogging is a combination of blogging and instant messaging that allows


users to create short messages to be posted and shared with an audience online.

Twitter:
Twitter is known as the real-time, public
microblogging network where news breaks
first. Most users loved it for its iconic 140-
character limit and unfiltered feed that
showed them absolutely everything.
Twitter has changed dramatically over the
years, and today it's criticized a lot for
going the way of looking and functioning
almost exactly like Facebook. Besides
Twitter Card integration, which now
makes it easy to share all sorts of
multimedia content in tweets, you can
expect to see algorithmic timelines coming
to Twitter soon as well.

liking posts is a popular way to interact. If


you post great content, you could end up
with thousands of reblogs and likes
depending on how far it gets pushed out
into the Tumblr community.

Tumblr is an extremely popular social


blogging platform that's heavily used by
teens and young adults. Like Pinterest, it's
best known for sharing visual content.
Users can customize their blog theme,
create blog posts in all sorts of different
types of content formats, follow other
users to see content in their dashboard feed
and be followed back. Reblogging and
Linked In is primarily a professional network, designed to facilitate linkages
between people who are wanting to connect for work-related purposes. It is
more ―buttoned-down‖ than Facebook with a more formal culture of
relationships and connections. It is also the network of choice for most
professionals.

Because Linked In is designed for professional networking, there’s a greater


emphasis on building a reputation and connecting to employment and business
opportunities. Linked In Questions and Answers is a way for people to ask
questions and receive expert advice. Answers can be rated and people who do
this well can improve their Linked In reputation. There are also employment
listings and an ability to receive recommendations from your connections that
then become part of your profile. You can also create and join groups.

Facebook: was originally developed for college students to connect, so it has a


more informal, social air than you find on Linked In. Now open to anyone, you
will still find that Facebook is the preferred network for Millennial who see the
encroachment of Boomers and, to a lesser extent, Gen X into the network as
cause for some alarm.

Facebook combines the personal and the professional. Members can play
games, join groups, share photos, and send each other virtual ―gifts.‖ This is the
network where you’re most likely to see both pictures of someone’s weekend
activities, as well as a link to their online portfolio or professional website.
Many companies are using Facebook as a recruitment tool for Gen Y, while
college and university professors are exploring it’s use for their classes.

Flickr:

Flickr is Yahoo's popular photo-sharing network, which existed long before


other popular competing networks like Pinterest and Instagram entered the
social photo sharing game. It's still one of the best places to upload photos,
create albums and show off your photography skills to your friends. Yahoo has
also worked hard at regularly updating its mobile apps with lots of great
features and functions so that it's easy and enjoyable to use from a mobile
device. Users can upload 1,000 GB worth of photos for free to Flickr and use
the powerful app to organize and edit them however they like.

Skype is for doing things together, whenever you’re apart. Skype’s text, voice
and video make it simple to share experiences with the people that matter to
you, wherever they are.

With Skype, you can share a story, celebrate a birthday, learn a language, hold a
meeting, work with colleagues – just about anything you need to do together
every day. You can use Skype on whatever works best for you - on your phone
or computer or a TV with Skype on it. It is free to start using Skype - to speak,
see and instant message other people on Skype for example. You can even try
out group video, with the latest version of Skype.

If you pay a little, you can do more things, in more ways, with more people –
like call phones, access WiFi or send texts. You can pay as you go or buy a
subscription, whatever works for you. And in the workplace, this means you can
bring your entire ecosystem of workers, partners and customers together to get
things done. Try Skype out today and start adding your friends, family and
colleagues. They won’t be hard to find; hundreds of millions of people are
already using Skype to do all sorts of things together.

Yelp:
One of the more popular social networking sites that focus on reviewing
businesses and sharing information about them is Yelp.com. Founded in 2004 in
San Francisco, Calif., the Web site is like a large online bulletin board featuring
user-generated content, all geared toward personal reviews based on
experiences at local businesses. Yelp takes a Web 2.0 approach to their sites,
where members run the show as far as sharing, reviewing and communicating is
concerned. Although the company is based out of San Francisco, its set up
online communities in every major city in the United States and can be found in
several other countries, too. Yelp has recently expanded its reach to Canada,
Ireland and the United Kingdom.

When you go to a new restaurant and have a good experience, it's likely that you
won't keep the place a secret. After all, when people enjoy a great meal,
exceptional service or a pleasant atmosphere, they typically make an effort to
tell other people about it. Many of us, particularly city dwellers, are naturally
curious about what's new, popular or just plain good around town, and sharing
with others is one of the easier and more reliable ways of establishing the best
locations. The same goes for many other types of businesses or services --
drivers often recommend a good mechanic to people looking for affordable,
honest work on a car, while someone in need of a new doctor might ask around
for recommendations.

Vimeo:

Vimeo is a video-sharing website that allows members to view, upload and


share videos.

Members can choose between Vimeo's free service and a number of paid
services aimed at helping organizations control how their videos appear on the
Internet. Vimeo's free services allow members to employ a number of creative
tools in order to enhance videos, add music tracks and pull from Creative
Commons-licensed videos. Vimeo also provides users with a video school to
improve their own video production for long-term personal or financial gain.

Paid services from Vimeo.com include Vimeo Plus, Vimeo PRO and Vimeo for
Business. Vimeo for Business gives users better search engine visibility,
removes third-party advertisements and allows for Drop box integration.

Google+ :

Making its debut in the early summer of 2011, Google+ became the fastest
growing social network the web has ever seen. After failing a couple times
already with Google Buzz and Google Wave, the search giant finally succeeded
at creating something that stuck... kind of. Nobody really needed another
Facebook clone, so Google+ had always been widely criticized for being a
social network that nobody really used. In late 2015, a brand new Google+ was
rolled out to put more emphasis on its Communities and Collections features to
help differentiate the platform a bit more and give existing users more of what
they wanted.

YouTube:

Where does everyone go to watch or share video content online? It's


obviously YouTube. After Google, YouTube is the second largest search
engine. Despite being owned by Google, YouTube can still be recognized as a
separate social network all on its own as the premiere place online to go to
watch videos on every topic under the sun and upload your own as well. From
music videos and movies, to personal vlogs and independent films, YouTube
has it all. YouTube recently launched a premium subscription option, called
YouTube Red, which removes all advertisements from videos.

WhatsApp:

Currently the most popular instant messaging provider worldwide, WhatsApp is


a cross-platform app that uses your internet connection or data plan to send and
receive messages. Users can send messages to individuals or groups using text,
photos, videos and even voice messages. Unlike Kik and other popular
messaging apps, WhatsApp uses your phone number rather than usernames or
pins (despite being an alternative to SMS). Users can allow WhatsApp to
connect to their phone's address book so that their contacts can be seamlessly
transferred to the app. The app also offers a few customizable features like
profiles, wallpapers and notification sounds.

Common Features of Social Networks

The ability to create a Profile page–this is your main ―home‖ on the network.
Different networks offer varying abilities to personalize your page in terms of
look and feel. They may also differ in terms of the types of information you
would include, such as name, location, education, etc. Facebook, for example,
asks for your relationship status (because it’s more ―social‖), while on
LinkedIn, which is primarily for professional use, does not.

A way to find and link to ―friends‖ or connections–The purpose of a network is


connections, so facilitating a members’ ability to find and connect to other
people is important. Each network offers different types of search capabilities
and once you’ve located a potential friend, you must send an ―invitation‖ to
invite them into your personal network.

Privacy Controls–In most networks, your ability to access more detailed


information about a person is based on their status as one of your connections;
―friends‖ can see much more information than those who are not your ―friends.‖
You can control who is actually in your personal network by effectively
managing who you invite into your network and whose invitations you accept.

The ability to send public and private messages–In Ning and Facebook, you can
communicate with your connections either by sending a private message or
―writing on their wall.‖ On LinkedIn, you communicate via person-to-person
messages. Ning also provides Forums where members can interact with one
another on specific topics (you’re reading this in one of the Ning forums).

Ability to share various digital objects and information–Both Ning and


Facebook allow members to share various online items, including photos,
videos and RSS feeds. LinkedIn offers some ability to share links, although it’s
multimedia capacities are nothing like what you find on Facebook or Ning.

Advantages of Social Networking:

Social media sites like Facebook have become an inevitable part of modern
life. It helps you to connect with your friends instantly and in real time. Users
can interact, reconnect and socialize.
Social media like LinkedIn has become a major resource of employment.
More than 89% recruitments take place by using Linkedin and company
websites.
140 word tweet contains a world of information. It keeps you informed
about the world and your interest.

DRAWBACKS OF SOCIAL MEDIA NETWORK

Many users’ use social media for time pass but excessive and uncontrolled use
can lead to severe addiction. This is because of the stimulation of pleasure
centre in our brain with social media activity. Though the centre and the
production of dopamine is triggered by other activities as well but its secretion
goes to entirely different level, in online communication and interaction.
Excessive use of Internet can lead to the deterioration in concentration. While
working on social media you constantly keep switching form one task to
another. Your ability to concentrate on one task gets impaired. Such an activity
also tires your brain. Information abundance leads to brain fatigue and stress.

You must have noticed that whenever you start your work or do something over
Internet, the first thing you do is checking your personal profiles especially
Facebook. It actually wastes lots of productive time.

Social media has opened up the possibility of identity theft, data theft, cyber
fraud, hacking and virus attacks. You are left with no privacy if you have
updated your address, phone number, work place, information about your
family on any of the social media sites. We generally add our pictures of day to
day life on Facebook. One has to be very cautious while doing so as the pictures
and other information can be misused the bad elements of the society.

One has to be very careful while using social media because it may put you in
danger and odd situation. Two girls in Mumbai were arrested for putting a
question on Facebook regarding the shutdown in the city for Shiv Sena patriarch
Bal Thackeray's funeral. The girls were sent to 14-day judicial custody but
granted bail after furnishing personal bonds.

Air India cabin crew members Mayank Mohan Sharma and KVJ Rao were
arrested for sharing rude jokes about politicians, making derogatory comments
against I and disrespecting national flag in comments.

Not only in India but such examples are available all across the world. Jake
Newsome was jailed for six weeks for Facebook comments he made about
murdered school teacher in West Yorkshire.
UNIT-3
E-Mail:
Short for electronic mail, e-mail or email is information stored on a computer
that is exchanged between two users. More plainly, e-mail is a message that
may contain text, files, images or other attachments sent through a network to a
specified individual or group of individuals. Email was born in 1971 when a
computer engineer began using the @ symbol to designate which computer a
message should go to. At its core, an email is simply a text message from one
user to another. Advancing technology has added extra features along the way
of course like image and file attachments, links and embedded maps. E-mail can
be distributed to lists of people as well as to individuals. When you send and
receive email, you use an email client which allows you to create and interact
with emails from other computer users. Your email client can be web-based,
meaning you check it through your web browser (examples include Hotmail,
Gmail, or Yahoo Mail) or it can be an application on your computer (like
Outlook, Thunderbird or Mail).
HOW DOES EMAIL WORK?
To send or receive email you have to access what is formally called an "email
client." You may know some well-known email clients by their more familiar
name such as Outlook, Gmail or AOL Mail.

Step 1: User composes a message using their favourite email client.

Step 2: User presses send and the message along with any attachments are
uploaded to what is called a "Mail Server" (POP3, SMTP) where it gets in line
as outgoing mail.

Step 3: The mail server then communicates with a Domain Name Server
(DNS) which serves as a virtual directory to find which mail server your
recipient is using. Once the mail server is located, the text and attachments of
your message are transferred to the recipient's mail server.
Step 4: The next time the recipient accesses his email client, it will download
your message from the mail server and be viewable.
Email is based around the use of electronic mailboxes. When an email is sent,
the message is routed from server to server, all the way to the recipient's email
server. More precisely, the message is sent to the mail server tasked with
transporting emails, called the MTA (Mail Transport Agent) to the recipient's
MTA. On the Internet, MTAs communicate with one another using the protocol
SMTP, and so are logically called SMTP servers (or sometimes outgoing mail
servers).
The recipient's MTA then delivers the email to the incoming mail server (called
the MDA (Mail Delivery Agent), which stores the email as it waits for the user
to accept it. There are two main protocols used for retrieving email on an MDA:
 POP3 (Post Office Protocol), the older of the two, which is used for
retrieving email and, in certain cases, leaving a copy of it on the
server.
 IMAP (Internet Message Access Protocol), which is used for
coordinating the status of emails (read, deleted, moved) across multiple
email clients. With IMAP, a copy of every message is saved on the
server, so that this synchronization task can be completed.
ADVANTAGES OF E-MAIL:
(i) Emails are easy to use. You can organize your daily correspondence, send
and receive electronic messages and save them on computers.
(ii) Emails are fast. They are delivered at once around the world. No other
form of written communication is as fast as an email.
(iii) The language used in emails is simple and informal.
(iv) When you reply to an email you can attach the original message so
that when you answer the recipient knows what you are talking about.
This is important if you get hundreds of emails a day.
(v) It is possible to send automated emails with a certain text. In such a way
it is possible to tell the sender that you are on vacation. These emails are
called auto responders.
(vi) Emails do not use paper. They are environment friendly and save a
lot of trees from being cut down.
(vii) Emails can also have pictures in them. You can send birthday cards
or newsletters as emails.
(viii) Products can be advertised with emails. Companies can reach A lot
of people and inform them in a short time.

DISADVANTAGES OF E-MAILS:
(i) Emails may carry viruses. These are small programs that harm your
computer system. They can read out your email address book and send
themselves to a number of people around the world.
(ii) Many people send unwanted emails to others. These are called spam
mails. It takes a lot of time to filter out the unwanted emails from those that
are really important.
(iii)Emails cannot really be used for official business documents. They may
be lost and you cannot sign them.
(iv)Your mailbox may get flooded with emails after a certain time so you
have to empty it from time to time.

EMAIL ADDRESSES, USERIDS AND PASSWORDS


Every user on the Internet has a unique e-mail address. The term e-
address is commonly used as an abbreviation for e-mail address. E-mail is
generally of the form username@domainname. For example, abc@xyz.com.
An address consists of three parts. The first portion all e-mail
addresses, the part before the @ symbol, contains the alias, user, group, or
department of a company. Next, the @ (at sign) is used as a divider in the e-
mail address; it is required for all SMTP email addresses since the first message
was sent by Ray Tomlinson. Finally, left one is the domain name to which the
user belongs.

VALID E-MAIL ADDRESS

There are several rules that an e-mail address must follow to be valid:
1. As mentioned earlier, an e-mail must have a username followed by an
@ (at sign) which is followed by the domain name with a domain suffix.
2. The username cannot be longer than 64 characters long and the domain
name cannot be longer than 254 characters.
3. There should be only one @ sign in an e-mail address.
4. The space and special characters: ( ), : ; < > \ [ ] are allowed.
Occasionally, a space, backslash and quotation mark work but must be
preceded with a forward slash. Although valid, some e-mail providers
do not allow these characters.
5. The username and e-mail addresses as a whole cannot begin or end with
a period. The e-mail must not have two or more consecutive periods.
User ID is something that user put in order to get in that certain site. Email
is something like an address, that somebody can send an email. In most part,
when user log-in to user email, user email address serves as user's User ID and
password together. In other word, the user id will allow user to enter to email.
In the digital world, a username identifies who you are, while your email
address shows both who (your username) and where you are (the rest of your
email address or domain name).

DOMAIN NAMES
Domain names are used to identify one or more IP addresses. Domain
names are used in URLs to identify particular Web pages. For example, in the
URL http://www.pcwebopedia.com/index.html, the domain name is
pcwebopedia.com.
Every domain name has a suffix that indicates which top level domain
(TLD) it belongs to. There are only a limited number of such domains. For
example:
gov - Government agencies
edu - Educational institutions
org - organisations(non profit)
mil - Military
com - commemial business
net - Network organizations
ca - Canada
th - Thailand

Because the Internet is based on IP addresses, not domain names, every


Web server requires a Domain Name System (DNS) server to translate
domain names into IP addresses.

DOMAIN NAME SYSTEM


The system designed to assign and organize addresses is called the
Domain Name System (DNS). The DNS, devised in the early 1970s, is still
in use today. The DNS was designed to be user friendlier than IP numbers.
Often times, an IP address has an equivalent domain name. In these cases, a
server on the Internet can be specified using its IP number or domain name.
Domain names are much easier to remember than IP addresses.
Domain names were created so that URLs could be user friendly and
people would not have to enter the difficult-to-remember IP address. An
example of an IP address is 209.0.85.150. This is the IP address that maps to
www.comptia.org. When user enter a domain name, a special domain name
server (a dedicated computer at your ISP) looks up the domain name from a
special file (called a routing table) and directs the message to the appropriate
IP address on the Internet.
E-MAIL SYSTEM
E-mail system comprises of the following three components:
 Mailer: It is also called mail program, mail application or mail client. It
allows us to manage, read and compose e-mail.
 Mail Server: The function of mail server is to receive, store and deliver
the email. It is must for mail servers to be sunning all the time because
if it crashes or is down, email can be lost.
 Mailboxes: Mailbox is generally a folder that contains emails and
information about them.
MAILER
Anemail client, a software program for writing, checking and sending
email, is generally made up of a number of windows. The main windows of
this software are:
 Incoming, In, Inbox: This represents the main mailbox for receiving
email,
 Sent, Outbox, Out: These are copies of messages that you have sent.
 Deleted, Trash: The trash bin containing deleted emails. When emails
are shown in the trash, you can still retrieve them. To permanently
delete them, you will need empty the trash bin.
 Folders: Most clients can be used to file emails in folders, much like
folders on a hard drive.

E-MAIL MESSAGE COMPONENTS


E-mail message comprises of different components: E-mail Header,
Greeting, Text, and Signature. These components are described in the following
diagram.
Headers
The message headers contain information concerning the sender and
recipients. The exact content of mail headers can vary depending on the email
system that generated the message. The first five lines of an E-mail message is
called E-mail header. The header part comprises of following fields:
 From (Sender): The sender box contains the sender's e-mail address. This
will give the recipient the idea whom the message is from.
 Date: The date and time the message was received.
Subject: Subject is a description of the topic of the message and displays in
most email systems that list email messages individually.
 To (Recipient): The recipient box shows the e-mail address of the
person who intends to receive and read the e-mail.
 Reply-to: This is the Internet email address that will become the
recipient of your reply if you click the Reply button.
 Recipient email address: The Internet mail address of the recipient, or
where the message was actually sent.
 Cc: The Cc field allows you to send the same message to multiple
recipients. When you send a Cc: message, all recipients are aware of
who received copies of the message. Cc: stands for carbon copy and is
a holdover from the days when letters were typed with carbon paper
between the pages to create identical letters for multiple recipients.
 Bcc: The Bcc field allows you to send an identical message to
multiple recipients. however, those recipients whose addresses appear
in the BCC: field cannot be seen by the other recipients.
 Attachments: The attachments field is where you can add images and
other document files such as word, excel, presentations, or even pdf
files. This includes separate files from your computer that you want
the recipient to see.
Body
The body contains the actual content of the message that you want to
impart to the recipient. It is important that you deliver your thoughts well
into your message in order to have a clear and good communication to your
reader.
Signatures
Lastly the message body can also include signatures or automatically
generated text that is inserted by the sender's email system. Sender's
signature could be a sum of information like the sender's name, company
profile, contact number, and address; or it could be simply the sender's name
along with its address only since the header already contains much
information.
MESSAGE COMPOSITION
When writing an e-mail message, several fields are required which are
explain
 The To field is where you type the e-mail address of the person who
is the recipie of your message.
 The From field should contain your e-mail address.
 If you are replying to a message, the To and from fields are
automatically out; if it's a new message, you'll need to enter them
manually.
 The CC or Carbon Copy field allows you to send a copy of the
message to another email address, but is not mandatory.

 The Subject Line, although not required, should consist of a few


words describing the e-mail's contents.
 Finally, the Message Body is the location you type your main
message. It often contains your signature at the bottom; similar to
a hand-written letter.
MAIL MANAGEMENT

Email management is a systematic approach to maximizing the efficiency of


email practices. And minimizing the negative effects that email handling can
have on an individual's productivity and job satisfaction. A core function of all
registries concerned with the regulating incoming and outgoing official
communication. It involves:
 Organizing mail stations
 Selection of appropriate transmission services
 Opening and sorting incoming mail where appropriate
 Date stamping
 Dispatching outgoing mail
 Routing and messenger services.

An efficient run mail-management program is essential for rapid distribution


and economic of information from one department to another within the
organization and to and from others outside the organization. Such a program
ensures that incoming mail is delivered quickly so that work is accomplished
without delay.
Email management devolves into simply removing emails from a server and
saving them to a repository. The effective email management includes
following:

 Limiting the number of times you process mail in a day


 Limiting the amount of time dedicate to processing email in a given
session
 Only keeping your email program open while you are actively dealing
with it.
 Checking email only when you are going to process it
 Deleting as many messages as possible immediately
 Responding immediately to messages that can be answered very
briefly
 Responding to only mails that require responses.
 Moving messages to be dealt with later to a separate folder.
 Limiting recipients to as few individuals as possible
 KeePing responses brief
 Deleting all messages that are not archived after a specific amount of
time.

E-MAIL INNER WORKNGS

Email working follows the client server approach. Here, client is the
mailer i.e. the mail application or mail program and server is a device that
manages emails. Following the basic steps involved in inner workings of email
system:
 Suppose person A wants to send an email message to person B.
 Person A composes the messages using a mailer program i.e. mail client
and then select Send option.
 The message is routed to Simple Mail Transfer Protocol to person B's
mail server.
 The mail server stores the email message on disk in an area ,designated
for person B
 The disk space area on mail server is called mail spool.
 Now, suppose person B is running a POP client and knows how to
communicate with B's mail server.
 It will periodically poll the POP server to check if any new email has
arrived for B. As in this case, person B has sent an email for person B, so
email is forwarded over the network to B's PC. This is message is now
stored on person B's PC.
The following diagram gives pictorial representation of the steps
discussed above:

UNIT-IV
WWW

WORD WIDE WEB (W.W.W.)

The Web or World Wide Web is basically a system of Internet servers that
support specially formatted documents. The documents are formatted in a
markup language called HTML (Hyper Text Markup Language) that supports
links to other documents, as well as graphics, audio and video files. Users can
jump from one document to another simply by clicking on hot spots. User never
needs to know where the information is located or to learn any obscure
commands to access it. A WWW hypertext document is usually called a web
page. An operation on the WWW is based on a client/server model.

The Language of the Web


There are three main components to this language to communicate in the Web.
 Uniform. Resource Locators (URLs): URLs provide the hypertext
links between one document and another. These links can access a
variety of protocols (e.g., ftp, gopher or http) on different machines or
your own machine.
 Hypertext Markup Language (IITML): Hypertext Markup
Language, a standardized system for tagging text files to achieve font,
colour, graphic and hyperlink effects on World Wide Web pages.
 Common Gateway Interfaces (CGI): CGIs provide a gateway
between the HTTP server software and the host machine.

WEB APPLICATIONS
In computing, a web application or web app is a client—server software
application which the client (or user interface) runs in a web browser. These
applications use web documents written in a standard format such as HTML and
JavaScript, which are supported by a variety of web browsers. Web applications
are computer programs allowing website visitors to submit and retrieve data
to/from .a database over the Internet using their preferred web browser. The
data is then presented to the user within their browser as information is
generated dynamically (in a specific format, e.g. in HTML using CSS) by the
web application through a web server.
Web applications can be considered as a specific variant of client—server
software where the client software is downloaded to the client machine when
visiting the relevant web page, using standard procedures such as HTTP.
Client web software updates may happen each time the web page is visited.
During the session, the web browser interprets and displays the pages, and acts
as the universal client for any web application. Common web applications
include webmail, online retail sales, online auctions, wikis, instant messaging
services etc.

WEB TERMINOLOGIES
Internet
A world-wide grid of inter-linked (networked) computers.
Intranet
A closed network of inter-linked computers. Often using the same technologies
as the Internet. Used by organisations for sharing internal information.

Domain
A group of computers and devices on a network.

Domain name

A name that identifies one or more computers on the network. Domain


names are also used in web addresses (see URL). For example,
blackbaud.com is the domain name of Blackbaud's web server located at
www.blackbaud.com.
FTP (File Transfer Protocol)
File Transfer Protocol, the protocol used on the Internet for sending files
from one computer to another.
HTML (Hypertext Markup Language)
An acronym that stands for Hypertext Markup Language. This is the
programming language that web pages are written in. Files written in HTML
have an extension of either .htm or .html.
HTTP (Hypertext Transfer Protocol)
Hypertext Transfer Protocol, a set of standards that allows web browsers
and web servers to exchange data. The "http" part of a web address lets the
browser know that the content to follow is HTTP-compatible.
IE (Internet Explorer)
Internet Explorer, Microsoft's web browser you use to view web pages. TE
is a "graphical browser," which means it can display graphics as well as text. It
can also present multimedia information, including sound and video. Other
examples of graphical browsers are Mozilla Firefox and Google Chrome.
IIS (Internet Information Services)
Internet Information Services, Microsoft's software that turns regular
Windows servers into web servers. IIS 6.0 is bundled with Windows Server
2003. Because IIS is tightly integrated with the operating system, it is
relatively easy to administer.
IP address
An identifier for a computer or device on a TCP/IP network. Networks
using the TCP/IP protocol route messages based on the IP address of the
destination. The format of an IP address is a 32-bit numeric address written as
four numbers separated by periods. Each number can be zero to 255. An
example of an IP address is 172.20.0.0.
ISP. (Internet Service Provider)
Internet Service Provider, a company that provides access to the Internet.
For a monthly fee, the service provider gives you a software package,
username, password and access phone number. Equipped with a modem, you
can then log on to the Internet and browse the World Wide Web and USENET,
and send and receive e-mail. In addition to serving individuals, ISPs also serve
large companies, providing a direct connection from the company's networks
to the Internet. ISPs themselves are connected to one another through Network
Access Points (NAPs). ISPs are also called IAPs (Internet Access Providers).
Search Engines
The search engine will then return a result with prioritized rankings based
on the structure of the page and the nature of the search
URL
Uniform Resource Locator, the global address of documents and other
resources on the World Wide Web. For example, the URL of Blackbaud's
website is https:// www.blackbaud.com.
User name
A name used to gain access to a computer system. User names, and often
passwords, are required in multi-user systems. In most such systems, users can
select their own user names and passwords.
Web browser
A software application used to locate and display web pages. For example,
Microsoft's Internet Explorer and Mozilla's Firefox are web browsers.
Web server
A computer that delivers (serves up) web pages. Every web server has an
IP address and possibly a domain name. Any computer can be turned into a
web server if you install web server software and connect the computer to the
Internet.
Web Page
A file written in HTML that allows information in various formats to be
viewed on the Internet.
Website
A collection of web pages that contain similar content and share an Internet
address. For example, all of the web pages on http://www.lcc.edu comprise the
LCC website.

WWW
World Wide Web or simply Web. A subset of the Internet, which uses a
combination of text, graphics, audio and video (multimedia) to provide
information on most every subject imaginable.
WEB BROWSERS
A web browser is a computer application that allows you to view 'pages
of information -available on the WWW. These pages can be linked together
allowing you to follow ideas or routes in a non-linear way.
A browser is used for displaying HTML files. These files were designed
for use on the Internet but can be stored 'locally' on your computer's hard disk
or on a floppy disk. The two most popular browsers are Netscape navigator
and Microsoft's Internet Explorer.
Web pages (often grouped together as Web Sites) each have their own
address. These addresses are published in all sorts of places such as adverts,
articles in the media and on the letterheads of people or organizations that
write to you. You can find Web pages by using Search engines, which are
introduced later.

UNIFORM RESOURCE LOCATOR (URL)


URL is the global address of documents and other resources on the
World Wide Web. The term "Web address" is a synonym for a URL that
uses the HTTP or HTTPS protocol. The Uniform Resource Locator (URL)
was developed by Tim Berners-Lee in 1994. Uniform Resource Locator or
URL is web location of a file on world wide web displayed with a web
address.
The first part of the URL is called a protocol identifier and it indicates
what protocol to use and the second part is called a resource name and it
specifies the IP address or the domain name where the resource is located.
The protocol identifier and the resource name are separated by a colon and
two forward slashes. For example, the two URLs below point to two
different files at the domain webopedia.com. The first specifies an
executable file that should be fetched using the FTP protocol; the second
specifies a Web page that should be fetched using the HTTP protocol.

A scheme or Protocol: The scheme identifies the protocol to be used to access


the resource on the Internet. It is the method of transferring or downloading
information into a browser such as HTTP (for Web pages), FTP (for files) or
NNTP (for USENET news). For examples: HTTP, FTP, GOPHER, MAILTO.
Here is a list of major transfer protocols.
(ii) A host: The host name identifies the host that holds the resource. A
server provides services in the name of the host, which is called domain
name. The domain name specifies the address of a specific Web server to
which the browser is connecting. Host names can also be followed by a
port number.
(iii) A path: The path identifies the specific resource in the host that the web
client wants to access. For example, /software/htp/cics/index.html.

(iv) A filename: The filename is the name of the Web page being requested
by the browser.
The scheme and host components of a URL are not defined as case-
sensitive, but the path and query string are case-sensitive. Typically, the whole
URL is specified in lowercase. The components of the URL are combined and
delimited as follows:
scheme://host:port/path?query
 The scheme is followed by a colon and two forward slashes.
 If a port number is specified, that number follows the host name, separated
by a colon.
 The path name begins with a single forward slash.
 If a query string is specified, it is preceded by a question mark.
SEARCHING WWW
Search engines allow people to access online information on the Web. As
such. search engines provide great benefits to individuals, organizations, and
society. There are two reasons why most people log on to the internet. One is
for communication and the secondly it is to search for information on relevant
products and services offered by various businesses. The popular search engines
include Yahoo and Google. The information that is updated into the websites is
beneficial to both the site owner and the visitors. Visitors need to log on a
certain keyword in the search engines like Yahoo. Google or Bing and an entire
list of relevant websites pertaining to that keyword will appear. The site owner
on the other hand has an opportunity to provide useful information to the
visitors. The most important part being that they get to promote their products
and services online.
search engines are
Google
Bing
Yahoo

You might also like