Professional Documents
Culture Documents
Internet
The Internet is “the global system of interconnected computer networksto link devices worldwide.” The usual
tasks that we perform like sending an email, looking up train schedules, social networking, paying a utility bill is
possible due to the Internet. The strucure of internat has become quite complex and it cannot be reperented as it is
changing instanteniously. Every now and then some resources are being added while some are being removed.
Internet comprises of various networks that include public, private, government, business, and academic sectors
linked together using different electronic technologies.It interconnects global networks with local and vise-versa.
The resources of Internet range in both information(including digital documents like image, video, text etc.) and
services (including informatio sharing, email, video conferencing) domains.
Though the terms Internet and World Wide Web are used interchangeably in lay man terms they are not the same.
It is common practice to say "going on the Internet" whenever we open any web page on a browser. However, the
World Wide Web or the Web is one of the most popular Internet services available. The Web is a collection of
interconnected documents (web pages) and other web resources, linked by hyperlinks and URLs. It uses HTTP as
an underlying protocol for information transfer which is one of the several other protocols available in networking
theory.
Features of Internet
Accessibility
An Internet is a global service and accessible to all. Today, people located in a remote part of an island or interior
of Africa can also use Internet.
Easy to Use
The software, which is used to access the Internet (web browser), is designed very simple; therefore, it can be
easily learned and used. It is easy to develop.
Low Cost
The development and maintenance cost of Internet service are comparatively low.
Flexibility of Communication
Communication through Internet is flexible enough. It facilitates communication through text, voice, and video
too. These services can be availed at both organizational and individual levels.
Security
Last but not the least, Internet facility has to a certain extent helped the security system both at the individual and
national level with components such as CCTV camera, etc.
national level with components such as CCTV camera, etc.
Internet services
To access/exchange a large amount of data such as software, audio clips, video clips, text files, other documents,
etc., we need internet services. You must use an Internet service to connect to the Internet. Data can be sent from
Internet servers to your machine via Internet service. Some of the commonly used internet services are :
Communication Services
Information Retrieval Services
File Transfer
World Wide Web Services
Web Services
Directory Services
Automatic Network Address Configuration
Network Management Services
Time Services
Usenet
NewsGroup
Ecommerce
IRC(Internet Relay Chat): Subscribers can communicate in real-time by connecting numerous computers in public
spaces called channels.
VoIP: It stands for Voice over Internet Protocol, which describes how to make and receive phone calls over the
internet. A larger number of people believe VoIP is a viable alternative to traditional landlines. VoIP (Voice over
Internet Protocol) is a technique that helps us make voice calls via the Internet rather than over a traditional (or
analog) phone line.
E-Mail: Used to send electronic mail via the internet. It is a paperless method for sending text, images, documents,
videos, etc from one person to another via the internet.
User Network (USENET): It hosts newsgroups and message boards on certain topics, and it is mostly run by
volunteers.
Telnet: It’s used to connect to a remote computer that’s connected to the internet.
Video Conferencing: Video conferencing systems allow two or more people who are generally in different
locations to connect live and visually. Live video conferencing services are necessary for simulating face-to-face
talks over the internet.
2. Information Retrieval Services: It is the procedure for gaining access to information/data stored on the
Internet. Net surfing or browsing is the process of discovering and obtaining information from the Internet. When
your computer is linked to the Internet, you may begin retrieving data. To get data, we need a piece of software
called a Web browser. A print or computer-based information retrieval system searches for and locates data in a
file, database, or other collection of data. Some sites are:
3. File Transfer: The exchange of data files across computer systems is referred to as file transfer. Using the
network or internet connection to transfer or shift a file from one computer to another is known as file transfer.
Gopher: A file retrieval application based on hierarchical, distributed menus that is simple to use.
FTP (File Transfer Protocol): To share, transfer, or send a file or logical data item across several users and/or
machines, both locally and remotely.
Archive: A file and directory information retrieval system that may be linked to FTP
4. Web services: Web services are software that uses defined messaging protocols and are made accessible for
usage by a client or other web-based programs through an application service provider’s web server. Web services
allow information to be exchanged across web-based applications. Using Utility Computing, web services can be
provided.
5. World Wide Web: The internet is a vast network of interconnected computers. Using this network, you can
5. World Wide Web: The internet is a vast network of interconnected computers. Using this network, you can
connect to the world wide web (abbreviated as ‘www’ or ‘web’) is a collection of web pages. The web browser lets
you access the web via the internet.
6. Directory Services: A directory service is a set of software that keeps track of information about your company,
customers, or both. Network resource names are mapped to network addresses by directory services. A directory
service provides users and administrators with full transparent access to printers, servers, and other network
devices. The directory services are :
DNS (Domain Number System): This server provides DNS. The mappings of computer hostnames and other types
of domain names to IP addresses are stored on a DNS server.
7. Automatic Network Address Configuration: Automatic Network Addressing assigns a unique IP address to
every system in a network. A DHCP Server is a network server that is used to assign IP addresses, gateways, and
other network information to client devices. It uses Dynamic Host Configuration Protocol as a common protocol
to reply to broadcast inquiries from clients.
8. Network Management Services: Network management services are another essential internet service that is
beneficial to network administrators. Network management services aid in the prevention, analysis, diagnosis, and
resolution of connection problems.
9. Time Services: Using facilities included in the operating system, you may set your computer clock via the
Internet. Some services are :
10. Usenet: The ‘User’s Network’ is also known as Usenet. It is a network of online discussion groups. It’s one of
the first networks where users may upload files to news servers and others can view them.
11. News Group: It is a lively Online Discussion Forum that is easily accessible via Usenet. Each newsgroup
contains conversations on a certain topic, as indicated by the newsgroup name. Users can use newsreader software
to browse and follow the newsgroup as well as comment on the posts. A newsgroup is a debate about a certain
topic made up of notes posted to a central Internet site and distributed over Usenet, a global network of news
discussion groups.
12. E-commerce: Electronic commerce, also known as e-commerce or e-Commerce, is a business concept that
allows businesses and individuals to buy and sell goods through the internet. Example: Amazon, Flipkart, etc.
websites/apps.
IP Address :
An Internet Protocol address is an IP address. It is a unique address that identifies the device on the network. The
Internet Service Provider (ISP) assigns IP addresses to all devices on its network. IP addresses are not generated at
random. The Internet Assigned Numbers Authority (IANA), a part of the Internet Corporation for Assigned
Names and Numbers (ICANN), generates and assigns them mathematically . IP addresses are used at the network
layer. IP Addresses are routable in nature.
IP Version Types :
There are 2 different versions of IP as follows.
MAC Address :
A MAC address is a one-of-a-kind identification assigned to a NIC (Network Interface Controller/Card). The full
form of MAC address is Media Access Control address. MAC addresses are 48 bits long and these addresses could
not be routed between networks. MAC Address is a 12 digit hexadecimal numeral which is most typically
expressed with a colon or hyphen separating every two digits (an octet), making reading easier. MAC Addresses
are used at the Data Link Layer.
Example –
A MAC address of 2c549188c9e3 is represented as 2C:54:91:88:C9:E3 or 2c-54-91-88-c9-e3.
Reason for IP address called a “logical” address, and the MAC address is called a “physical” address :
● An IP address is also known as a logical address and it can change over time as well as from one
network to another. The Internet Service Provider will be in charge of assigning it. When a device
connects to a different network, it receives a different IP address as a result of a change in Internet Service
Provider.
● With the help of Dynamic Host Configuration Protocol (DHCP), even in the same network, when a
device wants to connect to the internet, it will acquire different addresses from the pool. There is no
assurance that the device always has the same IP address. The IP address is not directly linked to any
devices. As a result, it is referred to as a logical address.
● However, there is a MAC address provided by the hardware interface vendor. It never changes when a
device is attached to any network. As a result, it is referred to as a physical address.
● IP address is, for example, like school register no, university register no and corporate employee id.
When a person transfers from school to college and then to the workplace, he or she is assigned a new
Identification Number, which is used to uniquely identify the individual inside that organization. At
different periods, the same individual was recognized with a different identification number. Similarly,
when one machine connects to a different network, it receives a new IP address each time. Thus it is called
a logical address.
● However, that address is unique inside that network. But MAC address is like an Aadhaar number, it
never changes to any business. It’s like an original identity.
● In the same way, the MAC address will be the same for the device’s (NIC), for any network on which
the device is associated. Thus it is called a physical address. A MAC address is also a unique address.
There won’t be the same address for two devices.
The client machine sends a request to the local name server, which , if root does not find the address in its
database, sends a request to the root name server , which in turn, will route the query to an top-level domain (TLD)
or authoritative name server. The root name server can also contain some hostName to IP address mappings. The
Top-level domain (TLD) server always knows who the authoritative name server is. So finally the IP address is
returned to the local name server which in turn returns the IP address to the host.
URL (Uniform Resource Locator) is often defined as a string of characters that is directed to an address. It is a
very commonly used way to locate resources on the web. It provides a way to retrieve the presentation of the
physical location by describing its network location or primary access mechanism.
The protocol is described within the URL which is employed to retrieve the resource and resource name. The URL
contains http/https at the start if the resource may be a web type resource. Similarly, it begins with ftp if the
resource may be a file and mailto if the resource is an email address. The syntax of an URL is shown below where
the primary part is employed for protocol and the remainder of the part is employed for the resource which
consists of a website name or program name.
https://www.helloworld.org/minimum-cost-graph
Here, the domain name describes the server (web service) and program name (path to the directory and file on the
server).
Similar to URL, URI (Uniform Resource Identifier) is also a string of characters that identifies a resource on the
web either by using location, name or both. It allows uniform identification of the resources. A URI is additionally
grouped as a locator, a name or both which suggests it can describe a URL, URN or both. The term identifier
within the URI refers to the prominence of the resources, despite the technique used.
HTTPS is HTTP with encryption and verification. The only difference between the two protocols is that HTTPS
uses TLS (SSL) to encrypt normal HTTP requests and responses, and to digitally sign those requests and
responses. As a result, HTTPS is far more secure than HTTP. A website that uses HTTP has http:// in its URL,
while a website that uses HTTPS has https://.
It does not matter if it is a large or small DBMS, with its help, we can store and retrieve data and make changes
whenever we want to. Some commands are predefined in DBMS, and these commands can be used to manipulate
the database. These commands are also the interface between the database and end-users to establish
communication.
Advantages of DBMS
Advantages of DBMS
● Various formats of data can be stored, and data can be retrieved by a range of methods in the Structured
Query Language.
● As most databases are usually centralized in nature, they can be accessed quickly and managed easily.
● We can set up authorized users who can view, share, and access data. This ensures security for data.
● DBMS facilitates the smooth incorporation of programming languages, such as C++, Python, and PHP,
to allow users to establish a connection with a web application or third-party applications.
● To prevent data from being inaccessible when there is an overload, a recovery system with automated
backups is provided by almost every DBMS software.
● With minimum data duplicity and redundancy, DBMS provides data protection and integrity.
Disadvantages of DBMS
● In some cases, DBMSs are highly complicated systems to set up and maintain.
● The cost of DBMS hardware and applications is comparatively high, exhausting an organization’s
budget.
● In certain organizations, all information is integrated into a common database, which may get destroyed
due to electrical issues or it may get corrupted in storage media. Having backups is preferred in such
situations but that increases the cost.
● Certain DBMS systems cannot run complex queries as they slow down the other processes that are
running.
Meaning DBMS is a collection of data. In DBMS, the The file system is a collection of data. In this
user is not required to write the procedures. system, the user has to write the procedures for
managing the database.
Sharing of data Due to the centralized approach, data sharing is Data is distributed in many files, and it may be
easy. of different formats, so it isn't easy to share
data.
Data Abstraction DBMS gives an abstract view of data that hides The file system provides the detail of the data
the details. representation and storage of data.
Security and Protection DBMS provides a good protection mechanism. It isn't easy to protect a file under the file
system.
Recovery Mechanism DBMS provides a crash recovery mechanism, The file system doesn't have a crash
i.e., DBMS protects the user from system mechanism, i.e., if the system crashes while
failure. entering some data, then the content of the file
will be lost.
Manipulation Techniques DBMS contains a wide variety of sophisticated The file system can't efficiently store and
techniques to store and retrieve the data. retrieve the data.
Concurrency Problems DBMS takes care of Concurrent access of data In the File system, concurrent access has many
using some form of locking. problems like redirecting the file while
deleting some information or updating some
information.
Where to use Database approach used in large systems which File system approach used in large systems
Where to use Database approach used in large systems which File system approach used in large systems
interrelate many files. which interrelate many files.
Cost The database system is expensive to design. The file system approach is cheaper to design.
Data Redundancy and Due to the centralization of the database, the In this, the files and application programs are
Inconsistency problems of data redundancy and inconsistency created by different programmers so that there
are controlled. exists a lot of duplication of data which may
lead to inconsistency.
Structure The database structure is complex to design. The file system approach has a simple
structure.
Flexibility Changes are often a necessity to the content of The flexibility of the system is less as
the data stored in any system, and these changes compared to the DBMS approach.
are more easily with a database approach.
DDL is the short name for Data Definition Language, which deals with database schemas and descriptions, of
how the data should reside in the database.
CREATE: to create a database and its objects like (table, index, views, store procedure, function, and triggers)
ALTER: alters the structure of the existing database
DROP: delete objects from the database
TRUNCATE: remove all records from a table, including all spaces allocated for the records are removed
COMMENT: add comments to the data dictionary
RENAME: rename an object
DML is the short name for Data Manipulation Language which deals with data manipulation and includes
most common SQL statements such SELECT, INSERT, UPDATE, DELETE, etc., and it is used to store, modify,
retrieve, delete and update data in a database.
DCL is short for Data Control Language which acts as an access specifier to the database.(basically to grant and
revoke permissions to users in the database
GRANT: grant permissions to the user for running DML(SELECT, INSERT, DELETE,…) commands on the table
REVOKE: revoke permissions to the user for running DML(SELECT, INSERT, DELETE,…) command on the
specified table
TCL is short for Transactional Control Language which acts as an manager for all types of transactional data
and all transactions.Some of the command of TCL are
and all transactions.Some of the command of TCL are
Role Back: Used to cancel or Undo changes made in the database
Commit: It is used to apply or save changes in the database
Save Point: It is used to save the data on the temporary basis in the database
Applications of DBMS
There are different fields where a database management system is utilized. Following are a few applications which
utilize the information base administration framework –
Banking –
Database the executive’s framework is utilized to store the exchange data of the client in the information base.
Education Sector –
Presently, assessments are led online by numerous schools and colleges. They deal with all assessment information
through the data set administration framework (DBMS). In spite of that understudy’s enlistments subtleties,
grades, courses, expense, participation, results, and so forth all the data is put away in the information base.
Broadcast communications –
Without DBMS any media transmission organization can’t think. The Database the executive’s framework is
fundamental for these organizations to store the call subtleties and month to month postpaid bills in the
information base.
Account –
The information base administration framework is utilized for putting away data about deals, holding and
acquisition of monetary instruments, for example, stocks and bonds in a data set.
Online Shopping –
These days, web-based shopping has become a major pattern. Nobody needs to visit the shop and burn through
their time. Everybody needs to shop through web based shopping sites, (for example, Amazon, Flipkart, Snapdeal)
from home. So all the items are sold and added uniquely with the assistance of the information base administration
framework (DBMS). Receipt charges, installments, buy data these are finished with the assistance of DBMS.
Manufacturing –
Manufacturing organizations make various kinds of items and deal them consistently. To keep the data about their
items like bills, acquisition of the item, amount, inventory network the executives, information base administration
items like bills, acquisition of the item, amount, inventory network the executives, information base administration
framework (DBMS) is utilized.