You are on page 1of 9

UNIT 3

Internet
The Internet is “the global system of interconnected computer networksto link devices worldwide.” The usual
tasks that we perform like sending an email, looking up train schedules, social networking, paying a utility bill is
possible due to the Internet. The strucure of internat has become quite complex and it cannot be reperented as it is
changing instanteniously. Every now and then some resources are being added while some are being removed.
Internet comprises of various networks that include public, private, government, business, and academic sectors
linked together using different electronic technologies.It interconnects global networks with local and vise-versa.
The resources of Internet range in both information(including digital documents like image, video, text etc.) and
services (including informatio sharing, email, video conferencing) domains.

Though the terms Internet and World Wide Web are used interchangeably in lay man terms they are not the same.
It is common practice to say "going on the Internet" whenever we open any web page on a browser. However, the
World Wide Web or the Web is one of the most popular Internet services available. The Web is a collection of
interconnected documents (web pages) and other web resources, linked by hyperlinks and URLs. It uses HTTP as
an underlying protocol for information transfer which is one of the several other protocols available in networking
theory.

What is the Internet?


The Internet is a global collection of computer networks that are linked together by devices called routers and use
a common set of protocols for data transmission The primary purpose of the Internet is to facilitate the sharing of
information. There are many different tools used on the Internet to make this possible. Some of the more common
tools include email, list servers, newsgroups, telnet, gopher, FTP, and the World Wide Web. Probably the most
popular of all Internet tools is the World Wide Web.

Features of Internet
Accessibility
An Internet is a global service and accessible to all. Today, people located in a remote part of an island or interior
of Africa can also use Internet.

Easy to Use
The software, which is used to access the Internet (web browser), is designed very simple; therefore, it can be
easily learned and used. It is easy to develop.

Interaction with Other Media


Internet service has a high degree of interaction with other media. For example, News and other magazine,
publishing houses have extended their business with the help of Internet services.

Low Cost
The development and maintenance cost of Internet service are comparatively low.

Extension of Existing IT Technology


This facilitates the sharing of IT technology by multiple users in organizations and even facilitates other trading
partners to use.

Flexibility of Communication
Communication through Internet is flexible enough. It facilitates communication through text, voice, and video
too. These services can be availed at both organizational and individual levels.

Security
Last but not the least, Internet facility has to a certain extent helped the security system both at the individual and
national level with components such as CCTV camera, etc.
national level with components such as CCTV camera, etc.

Internet services
To access/exchange a large amount of data such as software, audio clips, video clips, text files, other documents,
etc., we need internet services. You must use an Internet service to connect to the Internet. Data can be sent from
Internet servers to your machine via Internet service. Some of the commonly used internet services are :

Communication Services
Information Retrieval Services
File Transfer
World Wide Web Services
Web Services
Directory Services
Automatic Network Address Configuration
Network Management Services
Time Services
Usenet
NewsGroup
Ecommerce

1. Communication Services: To exchange data/information among individuals or organizations, we need


communication services.

IRC(Internet Relay Chat): Subscribers can communicate in real-time by connecting numerous computers in public
spaces called channels.
VoIP: It stands for Voice over Internet Protocol, which describes how to make and receive phone calls over the
internet. A larger number of people believe VoIP is a viable alternative to traditional landlines. VoIP (Voice over
Internet Protocol) is a technique that helps us make voice calls via the Internet rather than over a traditional (or
analog) phone line.
E-Mail: Used to send electronic mail via the internet. It is a paperless method for sending text, images, documents,
videos, etc from one person to another via the internet.
User Network (USENET): It hosts newsgroups and message boards on certain topics, and it is mostly run by
volunteers.
Telnet: It’s used to connect to a remote computer that’s connected to the internet.
Video Conferencing: Video conferencing systems allow two or more people who are generally in different
locations to connect live and visually. Live video conferencing services are necessary for simulating face-to-face
talks over the internet.
2. Information Retrieval Services: It is the procedure for gaining access to information/data stored on the
Internet. Net surfing or browsing is the process of discovering and obtaining information from the Internet. When
your computer is linked to the Internet, you may begin retrieving data. To get data, we need a piece of software
called a Web browser. A print or computer-based information retrieval system searches for and locates data in a
file, database, or other collection of data. Some sites are:

3. File Transfer: The exchange of data files across computer systems is referred to as file transfer. Using the
network or internet connection to transfer or shift a file from one computer to another is known as file transfer.
Gopher: A file retrieval application based on hierarchical, distributed menus that is simple to use.
FTP (File Transfer Protocol): To share, transfer, or send a file or logical data item across several users and/or
machines, both locally and remotely.
Archive: A file and directory information retrieval system that may be linked to FTP

4. Web services: Web services are software that uses defined messaging protocols and are made accessible for
usage by a client or other web-based programs through an application service provider’s web server. Web services
allow information to be exchanged across web-based applications. Using Utility Computing, web services can be
provided.

5. World Wide Web: The internet is a vast network of interconnected computers. Using this network, you can
5. World Wide Web: The internet is a vast network of interconnected computers. Using this network, you can
connect to the world wide web (abbreviated as ‘www’ or ‘web’) is a collection of web pages. The web browser lets
you access the web via the internet.

6. Directory Services: A directory service is a set of software that keeps track of information about your company,
customers, or both. Network resource names are mapped to network addresses by directory services. A directory
service provides users and administrators with full transparent access to printers, servers, and other network
devices. The directory services are :
DNS (Domain Number System): This server provides DNS. The mappings of computer hostnames and other types
of domain names to IP addresses are stored on a DNS server.

7. Automatic Network Address Configuration: Automatic Network Addressing assigns a unique IP address to
every system in a network. A DHCP Server is a network server that is used to assign IP addresses, gateways, and
other network information to client devices. It uses Dynamic Host Configuration Protocol as a common protocol
to reply to broadcast inquiries from clients.

8. Network Management Services: Network management services are another essential internet service that is
beneficial to network administrators. Network management services aid in the prevention, analysis, diagnosis, and
resolution of connection problems.

9. Time Services: Using facilities included in the operating system, you may set your computer clock via the
Internet. Some services are :

10. Usenet: The ‘User’s Network’ is also known as Usenet. It is a network of online discussion groups. It’s one of
the first networks where users may upload files to news servers and others can view them.
11. News Group: It is a lively Online Discussion Forum that is easily accessible via Usenet. Each newsgroup
contains conversations on a certain topic, as indicated by the newsgroup name. Users can use newsreader software
to browse and follow the newsgroup as well as comment on the posts. A newsgroup is a debate about a certain
topic made up of notes posted to a central Internet site and distributed over Usenet, a global network of news
discussion groups.

12. E-commerce: Electronic commerce, also known as e-commerce or e-Commerce, is a business concept that
allows businesses and individuals to buy and sell goods through the internet. Example: Amazon, Flipkart, etc.
websites/apps.

Logical and Physical Address


IP addresses and MAC addresses are essential for data communication. Assume there are two networks. The first
network has three devices: A, B, C and the second network has three devices: X, Y, Z. If a device A from the first
network wishes to send data to a device Y in the second network, it must first determine where Y is located in the
second network, which requires learning the IP address/ logical address, because the connection is subject to
change and is not permanent due to the nature of the Packet Switched Network (Logical). However, in order to
send data to that device, it must pass the data across physical communication links, for which a MAC
Address/Physical address is utilized.

IP Address :
An Internet Protocol address is an IP address. It is a unique address that identifies the device on the network. The
Internet Service Provider (ISP) assigns IP addresses to all devices on its network. IP addresses are not generated at
random. The Internet Assigned Numbers Authority (IANA), a part of the Internet Corporation for Assigned
Names and Numbers (ICANN), generates and assigns them mathematically . IP addresses are used at the network
layer. IP Addresses are routable in nature.

IP Version Types :
There are 2 different versions of IP as follows.

IPv4 (IP version 4) –


IPv4 employs a 32-bit address. It is composed of four numbers separated by a ‘dot’ i.e., periods called an octet
(byte). Each number in the octet can range from 0 to 255.
Example – 172.166.3.28
Example – 172.166.3.28
IPv6 (IP version 6) –
IPv6 is the next generation of Internet Protocol addresses. In comparison to IPV4, IPv6 has a larger address space.
IPv6 has a length of 128 bits and is written in hexadecimal. It is composed of eight fields, each of which contains
two octets. As a result, IPv6 has 16 octets in total.
Example – 3221:1cd7:74b6:6da7:0000:0000:7349:6472

MAC Address :
A MAC address is a one-of-a-kind identification assigned to a NIC (Network Interface Controller/Card). The full
form of MAC address is Media Access Control address. MAC addresses are 48 bits long and these addresses could
not be routed between networks. MAC Address is a 12 digit hexadecimal numeral which is most typically
expressed with a colon or hyphen separating every two digits (an octet), making reading easier. MAC Addresses
are used at the Data Link Layer.

Example –
A MAC address of 2c549188c9e3 is represented as 2C:54:91:88:C9:E3 or 2c-54-91-88-c9-e3.

Reason for IP address called a “logical” address, and the MAC address is called a “physical” address :

● An IP address is also known as a logical address and it can change over time as well as from one
network to another. The Internet Service Provider will be in charge of assigning it. When a device
connects to a different network, it receives a different IP address as a result of a change in Internet Service
Provider.
● With the help of Dynamic Host Configuration Protocol (DHCP), even in the same network, when a
device wants to connect to the internet, it will acquire different addresses from the pool. There is no
assurance that the device always has the same IP address. The IP address is not directly linked to any
devices. As a result, it is referred to as a logical address.
● However, there is a MAC address provided by the hardware interface vendor. It never changes when a
device is attached to any network. As a result, it is referred to as a physical address.
● IP address is, for example, like school register no, university register no and corporate employee id.
When a person transfers from school to college and then to the workplace, he or she is assigned a new
Identification Number, which is used to uniquely identify the individual inside that organization. At
different periods, the same individual was recognized with a different identification number. Similarly,
when one machine connects to a different network, it receives a new IP address each time. Thus it is called
a logical address.
● However, that address is unique inside that network. But MAC address is like an Aadhaar number, it
never changes to any business. It’s like an original identity.
● In the same way, the MAC address will be the same for the device’s (NIC), for any network on which
the device is associated. Thus it is called a physical address. A MAC address is also a unique address.
There won’t be the same address for two devices.

Domain Name Server


DNS is a hostname for IP address translation service. DNS is a distributed database implemented in a hierarchy of
name servers. It is an application layer protocol for message exchange between clients and servers.

The client machine sends a request to the local name server, which , if root does not find the address in its
database, sends a request to the root name server , which in turn, will route the query to an top-level domain (TLD)
or authoritative name server. The root name server can also contain some hostName to IP address mappings. The
Top-level domain (TLD) server always knows who the authoritative name server is. So finally the IP address is
returned to the local name server which in turn returns the IP address to the host.

URL (Uniform Resource Locator):

URL (Uniform Resource Locator) is often defined as a string of characters that is directed to an address. It is a
very commonly used way to locate resources on the web. It provides a way to retrieve the presentation of the
physical location by describing its network location or primary access mechanism.
The protocol is described within the URL which is employed to retrieve the resource and resource name. The URL
contains http/https at the start if the resource may be a web type resource. Similarly, it begins with ftp if the
resource may be a file and mailto if the resource is an email address. The syntax of an URL is shown below where
the primary part is employed for protocol and the remainder of the part is employed for the resource which
consists of a website name or program name.

https://www.helloworld.org/minimum-cost-graph
Here, the domain name describes the server (web service) and program name (path to the directory and file on the
server).

URI (Uniform Resource Identifier):

Similar to URL, URI (Uniform Resource Identifier) is also a string of characters that identifies a resource on the
web either by using location, name or both. It allows uniform identification of the resources. A URI is additionally
grouped as a locator, a name or both which suggests it can describe a URL, URN or both. The term identifier
within the URI refers to the prominence of the resources, despite the technique used.

HTTPS is HTTP with encryption and verification. The only difference between the two protocols is that HTTPS
uses TLS (SSL) to encrypt normal HTTP requests and responses, and to digitally sign those requests and
responses. As a result, HTTPS is far more secure than HTTP. A website that uses HTTP has http:// in its URL,
while a website that uses HTTPS has https://.

DataBase Management System


A database is an organized collection of data that can be modified, retrieved, or updated. Data, DBMS, and
applications associated with them together form the database concept. The data, stored in the atabase, is in the row
and column format, which is called a table.

Database Management System


Database Management System (DBMS) is a software application that is used to create, access, maintain, and
manage databases. We can install it like any other application and use SQL for all the operations that we intend to
perform on databases. DBMS accepts the incoming data either from an application or from a user who is manually
entering it.

It does not matter if it is a large or small DBMS, with its help, we can store and retrieve data and make changes
whenever we want to. Some commands are predefined in DBMS, and these commands can be used to manipulate
the database. These commands are also the interface between the database and end-users to establish
communication.

Advantages of DBMS
Advantages of DBMS
● Various formats of data can be stored, and data can be retrieved by a range of methods in the Structured
Query Language.
● As most databases are usually centralized in nature, they can be accessed quickly and managed easily.
● We can set up authorized users who can view, share, and access data. This ensures security for data.
● DBMS facilitates the smooth incorporation of programming languages, such as C++, Python, and PHP,
to allow users to establish a connection with a web application or third-party applications.
● To prevent data from being inaccessible when there is an overload, a recovery system with automated
backups is provided by almost every DBMS software.
● With minimum data duplicity and redundancy, DBMS provides data protection and integrity.

Disadvantages of DBMS
● In some cases, DBMSs are highly complicated systems to set up and maintain.
● The cost of DBMS hardware and applications is comparatively high, exhausting an organization’s
budget.
● In certain organizations, all information is integrated into a common database, which may get destroyed
due to electrical issues or it may get corrupted in storage media. Having backups is preferred in such
situations but that increases the cost.
● Certain DBMS systems cannot run complex queries as they slow down the other processes that are
running.

Basis DBMS Approach File System Approach

Meaning DBMS is a collection of data. In DBMS, the The file system is a collection of data. In this
user is not required to write the procedures. system, the user has to write the procedures for
managing the database.

Sharing of data Due to the centralized approach, data sharing is Data is distributed in many files, and it may be
easy. of different formats, so it isn't easy to share
data.

Data Abstraction DBMS gives an abstract view of data that hides The file system provides the detail of the data
the details. representation and storage of data.

Security and Protection DBMS provides a good protection mechanism. It isn't easy to protect a file under the file
system.

Recovery Mechanism DBMS provides a crash recovery mechanism, The file system doesn't have a crash
i.e., DBMS protects the user from system mechanism, i.e., if the system crashes while
failure. entering some data, then the content of the file
will be lost.

Manipulation Techniques DBMS contains a wide variety of sophisticated The file system can't efficiently store and
techniques to store and retrieve the data. retrieve the data.

Concurrency Problems DBMS takes care of Concurrent access of data In the File system, concurrent access has many
using some form of locking. problems like redirecting the file while
deleting some information or updating some
information.

Where to use Database approach used in large systems which File system approach used in large systems
Where to use Database approach used in large systems which File system approach used in large systems
interrelate many files. which interrelate many files.

Cost The database system is expensive to design. The file system approach is cheaper to design.

Data Redundancy and Due to the centralization of the database, the In this, the files and application programs are
Inconsistency problems of data redundancy and inconsistency created by different programmers so that there
are controlled. exists a lot of duplication of data which may
lead to inconsistency.

Structure The database structure is complex to design. The file system approach has a simple
structure.

Flexibility Changes are often a necessity to the content of The flexibility of the system is less as
the data stored in any system, and these changes compared to the DBMS approach.
are more easily with a database approach.

Examples Oracle, SQL Server, Sybase etc. Cobol, C++ etc.

There are four types of Data Languages


1. Data Definition Language (DDL)
2. Data Manipulation Language(DML)
3. Data Control Language(DCL)
4. Transactional Control Language(TCL)

DDL is the short name for Data Definition Language, which deals with database schemas and descriptions, of
how the data should reside in the database.
CREATE: to create a database and its objects like (table, index, views, store procedure, function, and triggers)
ALTER: alters the structure of the existing database
DROP: delete objects from the database
TRUNCATE: remove all records from a table, including all spaces allocated for the records are removed
COMMENT: add comments to the data dictionary
RENAME: rename an object

DML is the short name for Data Manipulation Language which deals with data manipulation and includes
most common SQL statements such SELECT, INSERT, UPDATE, DELETE, etc., and it is used to store, modify,
retrieve, delete and update data in a database.

SELECT: retrieve data from a database


INSERT: insert data into a table
UPDATE: updates existing data within a table
DELETE: Delete all records from a database table
MERGE: UPSERT operation (insert or update)
CALL: call a PL/SQL or Java subprogram
EXPLAIN PLAN: interpretation of the data access path
LOCK TABLE: concurrency Control

DCL is short for Data Control Language which acts as an access specifier to the database.(basically to grant and
revoke permissions to users in the database
GRANT: grant permissions to the user for running DML(SELECT, INSERT, DELETE,…) commands on the table
REVOKE: revoke permissions to the user for running DML(SELECT, INSERT, DELETE,…) command on the
specified table

TCL is short for Transactional Control Language which acts as an manager for all types of transactional data
and all transactions.Some of the command of TCL are
and all transactions.Some of the command of TCL are
Role Back: Used to cancel or Undo changes made in the database
Commit: It is used to apply or save changes in the database
Save Point: It is used to save the data on the temporary basis in the database

Applications of DBMS
There are different fields where a database management system is utilized. Following are a few applications which
utilize the information base administration framework –

Railway Reservation System –


In the rail route reservation framework, the information base is needed to store the record or information of ticket
appointments, status about train’s appearance, and flight. Additionally, if trains get late, individuals become
acquainted with it through the information base update.

Library Management System –


There are lots of books in the library so; it is difficult to store the record of the relative multitude of books in a
register or duplicate. Along these lines, the data set administration framework (DBMS) is utilized to keep up all
the data identified with the name of the book, issue date, accessibility of the book, and its writer.

Banking –
Database the executive’s framework is utilized to store the exchange data of the client in the information base.

Education Sector –
Presently, assessments are led online by numerous schools and colleges. They deal with all assessment information
through the data set administration framework (DBMS). In spite of that understudy’s enlistments subtleties,
grades, courses, expense, participation, results, and so forth all the data is put away in the information base.

Credit card exchanges –


The database Management framework is utilized for buying on charge cards and age of month to month
proclamations.

Social Media Sites –


We all utilization of online media sites to associate with companions and to impart our perspectives to the world.
Every day, many people group pursue these online media accounts like Pinterest, Facebook, Twitter, and Google in
addition to. By the utilization of the data set administration framework, all the data of clients are put away in the
information base and, we become ready to interface with others.

Broadcast communications –
Without DBMS any media transmission organization can’t think. The Database the executive’s framework is
fundamental for these organizations to store the call subtleties and month to month postpaid bills in the
information base.

Account –
The information base administration framework is utilized for putting away data about deals, holding and
acquisition of monetary instruments, for example, stocks and bonds in a data set.

Online Shopping –
These days, web-based shopping has become a major pattern. Nobody needs to visit the shop and burn through
their time. Everybody needs to shop through web based shopping sites, (for example, Amazon, Flipkart, Snapdeal)
from home. So all the items are sold and added uniquely with the assistance of the information base administration
framework (DBMS). Receipt charges, installments, buy data these are finished with the assistance of DBMS.

Human Resource Management –


Big firms or organizations have numerous specialists or representatives working under them. They store data about
worker’s compensation, assessment, and work with the assistance of an information base administration
framework (DBMS).

Manufacturing –
Manufacturing organizations make various kinds of items and deal them consistently. To keep the data about their
items like bills, acquisition of the item, amount, inventory network the executives, information base administration
items like bills, acquisition of the item, amount, inventory network the executives, information base administration
framework (DBMS) is utilized.

Airline Reservation System –


This framework is equivalent to the railroad reservation framework. This framework additionally utilizes an
information base administration framework to store the records of flight takeoff, appearance, and defer status.

You might also like