You are on page 1of 46

Communication Network 119

Notes

Unit 3: Communication Network

Structure:
3.1 Introduction
3.2 Network Topologies
3.3 Network Architectures-the OSI Model
3.4 Internet
3.5 Intranet
3.6 Extranets
3.7 World Wide Web
3.8 HTML
3.9 Creating web pages
3.10 Telecommunication Networks
3.11 Wireless Communication
3.12 WAP Protocol
3.13 Summary
3.14 Check Your Progress
3.15 Questions and Exercises
3.16 Key Terms
3.17 Check Your Progress: Answers
3.18 Case Study
3.19 Further Readings
3.20 Bibliography

Objectives

After studying this unit, you should be able to understand:


z Computer Network
z Elements of Networking
z Various Network Topologies
z Network Architectures
z Concepts of Internet
z Benefits of Intranet
z Extranets and World Wide Web
z HTML
z Telecommunication Networks
z Wireless Communication
z WAP Protocol

Amity Directorate of Distance and Online Education


120 IT for Managers

Notes 3.1 Introduction


Computers have the ability to communicate with each other. Communication of
messages electronically over a long distance is known as telecommunication. Infact the
telecommunication has made computers popular among the people at home and business
houses today. When a computer is used to transmit electronically textual, numeric, audio
or video data to a distant location, then the process is called data communication.
People use computers to shop from home, send messages to users around the world,
explore the books available in the libraries around the country, obtain software packages
etc. All these applications involve computers connected to communication networks
popularly known as computer networks. One major benefit of computer networks is that
the user can share resources such as data, programs and computer peripherals as well
as expertise of people working on a project at different locations.
Computer Network
A network is any collection of independent computers that communicate with one
another over a shared network medium. A computer network is a collection of two or more
connected computers. When these computers are joined in a network, people can share
files and peripherals such as modems, printers, tape backup drives or CD-ROM drives.
When networks at multiple locations are connected, people can send e-mail, share links
to the global Internet or conduct video conferences in real time with other remote users.
As companies rely on applications like electronic mail and database management for core
business operations, computer networking becomes increasingly more important.
Computer networks mean an interconnected collection of computers. Two computers
are said to be interconnected if they are able to exchange information. The connection
need not be via a copper wire, fiber optics, microwaves and communication satellites can
also be used.

Needs for Networking

Basically networks are used for the following reasons:


(a) Resource Sharing: The goal is to make all programs, equipment and data
available to anyone on the network without regard to the physical location of
the resources and the user.
(b) High Reliability: The goal is to provide alternative sources of supply. For
example, all files could be replicated on two or three machines, so if one of
them is unavailable due to hardware failure, the other copies could be used.
(c) Communication Medium: It is easy for two or more people who live far apart
to write a report together. When one worker makes a change to an on-line
document, the other can see the change immediately, instead of waiting several
days for a letter.

Elements of Networking

Every network includes:


(i) At least two computers Server or Client workstation.
(ii) Networking Interface Card’s (NIC).
(iii) A connection medium, usually a wire or cable, although wireless communication
between networked computers and peripherals are also possible.

Amity Directorate of Distance and Online Education


Communication Network 121

(iv) Network Operating system software, such as Microsoft Windows NT or 2000, Notes
Novell NetWare, Unix and Linux.

Advantages of Network
(i) Speed: Sharing and transferring files within networks are very rapid. Thus saving
time, while maintaining the integrity of the file.
(ii) Cost: Individually licensed copies of many popular software programs can be
costly. Networkable versions are available at considerable savings. Shared
programs, on a network allows for easier upgrading of the program on one single
file server, instead of upgrading individual workstations.
(iii) Security: Sensitive files and programs on a network are passwords protected
(established for specific directories to restrict access to authorized users) or
designated as "copy inhibit," so that you do not have to worry about illegal
copying of programs.
(iv) Centralized Software Management: Software can be loaded on one computer
(the file server) eliminating that need to spend time and energy installing updates
and tracking files on independent computers throughout the building.
(v) Resource Sharing: Resources such as, printers, fax machines and modems
can be shared.
(vi) Electronic Mail: e-mail aids in personal and professional communication.
Electronic mail on a LAN can enable staff to communicate within the building
having to leave their desk.
(vii) Flexible Access: Access their files from computers throughout the firm.
(viii) Workgroup Computing: Workgroup software (such as Microsoft BackOffice)
allows many users to work on a document or project concurrently.

Disadvantages of Network
(i) Server faults stop applications being available.
(ii) Network faults can cause loss of data.
(iii) Network fault could lead to loss of resources.
(iv) User work dependent upon network.
(v) System open to hackers.
(vi) Decisions tend to become centralised.
(vii) Could become inefficient.
(viii) Could degrade in performance.
(ix) Resources could be located too far from users.

3.2 Network Topologies


The way in which the elements of a network are mapped or arranged is known as
a network topology. In simple words, the physical layout of a network is referred to as
its topology. A topology describes the physical and the logical interconnection between
the different nodes of a network. Network topologies are classified as physical, logical
and signal topologies. A Physical Topology describes the mapping of the network nodes
and the physical layout of the devices connected to the network, including the location
and cable installation. The Logical Topology refers to the way it actually operates or
transfers the data to its layout. Signal Topology describes the paths, which the signals

Amity Directorate of Distance and Online Education


122 IT for Managers

Notes take while they pass over the network. There are various kinds of physical topologies,
each with distinct advantages and disadvantages. The most commonly used topologies
include –
(i) Bus Network
(ii) Ring Network
(iii) Star Network
(iv) Mesh Network
(v) Star-bus Network

(i) Bus Network/Linear Bus Topology

A linear bus topology consists of a main run of cable with a terminator at each end.
All nodes such as file server, workstations, and peripherals are connected to the linear
cable.

Fig: Linear Bus Topology


In this type of network topology, all the nodes of a network are connected to a
common transmission medium having two endpoints. All the data that travels over the
network is transmitted through a common transmission medium known as the bus or the
backbone of the network. When the transmission medium has exactly two endpoints, the
network topology is known by the name, ‘linear bus topology’. In case the transmission
medium, also called as the network backbone, has more than two endpoints, the network
is said to have a distributed bus topology.
Advantages:
(i) Easy to connect a computer or peripheral to a linear bus.
(ii) Requires less cable length than a star topology.
(iii) It is easy to handle and implement.
(iv) It is best suited for small networks.
Disadvantages:
(i) Entire network shuts down if there is a break in the main cable.
(ii) The cable length is limited. This limits the number of stations that can be
connected.
(iii) Terminators are required at both ends of the backbone cable.
(iv) Difficult to identify the problem if the entire network shuts down.
(v) Not meant to be used as a stand-alone solution in a large building.

Amity Directorate of Distance and Online Education


Communication Network 123

(ii) Ring Network Notes


A ring network is a network topology in which each node connects to exactly two
other nodes, forming a single continuous pathway for signals through each node – a ring.
Data travels from node to node, with each node along the way handling every packet.
The ring topology does not require a central server to manage connectivity between the
nodes.
Unlike the physical Bus Topology, a ring type of topology has no beginning or end
that needs to be terminated. Data is transmitted in a way that is very different from the
logical bus topology.

Fig: Ring Topology


In one implementation, a “token” travels around the ring, stopping at each device.
If a device wants to transmit data, it adds that data and the destination address to the
token. The token then continues around the ring until it finds the destination device, which
takes the data out of the token. There are two types of ring topology: single-ring and dual-
ring. The advantage of using this type of method is that there are no collisions of data
packets.
Advantages:
(i) Relatively easy to install and reconfigure.
(ii) There are no collisions of data packets.
(iii) Performs better than a star topology under heavy network load .
(iv) Easy to add new node as only two connections need changes.
(v) The data being transmitted between two nodes passes through all the
intermediate nodes. A central server is not required for the management of this
topology.
Disadvantages:
(i) The failure of a single node of the network can cause the entire network to fail.
(ii) The movement or changes made to network nodes affects the performance of
the entire network.

Amity Directorate of Distance and Online Education


124 IT for Managers

Notes (iii)A fault in the ring can disable the entire network.
(iv) It is only really used with Token Ring networks.
(v) This is very bulky and is not really suitable for running voice.
(vi) Moves and additions of node mean rewiring and re-routing cables.

(iii) Star Network

A star topology is designed with each node such as file server, workstations, and
peripherals connected directly to a central network hub, switch or concentrator.

Fig: Star Topology


Data on a star network passes through the hub, switch, or concentrator before
continuing to its destination. The hub, switch, or concentrator manages and controls all
functions of the network. It also acts as a repeater for the data flow. This configuration
is common with twisted pair cable; however, it can also be used with coaxial cable or
fiber optic cable.
Advantages:
(i) Easy to install and wire.
(ii) Due to its centralized nature, these offers simplicity of operation.
(iii) It also achieves an isolation of each device in the network.
(iv) No disruptions to the network when connecting or removing devices.
(v) Easy to detect faults and to remove parts.
Disadvantages:
(i) Requires more cable length than a linear topology.
(ii) If the hub, switch, or concentrator fails, nodes attached are disabled.
(iii) More expensive than linear bus topologies because of the cost of the hubs etc.

(iv) Mesh Network

A Mesh topology consists of a network where every device on the network is


physically connected to every other device on the network. This provides a great deal of

Amity Directorate of Distance and Online Education


Communication Network 125

performance and reliability, however the complexity and difficulty of creating one increases Notes
geometrically as the number of nodes on the network increases. For example, a three
or four node mesh network is relatively easy to create, whereas it is impractical to set
up a mesh network of 100 nodes - the number of interconnections would be so ungainly
and expensive that it would not be worth the effort.

Fig: Mesh Topology


Mesh networks are not used much in local area networks (LANs) but are used in
Wide Area Networks (WANs) where reliability is important and the number of sites being
connected together is small. These are applicable to wireless networks, wired networks,
and software interaction. Mesh networking is a way to route data, voice and instructions
between nodes.
In a full mesh network, each network node is connected to every other node in the
network. Due to this arrangement of nodes, it becomes possible for a simultaneous
transmission of signals from one node to several other nodes. In a partially connected
mesh network, only some of the network nodes are connected to more than one node.
This is beneficial over a fully connected mesh in terms of redundancy caused by the point-
to-point links between all the nodes. The nodes of a mesh network require possessing
some kind of routing logic so that the signals and the data traveling over the network take
the shortest path during each of the transmissions.
Advantages:
(i) The arrangement of the network nodes is such that it is possible to transmit data
from one node to many other nodes at the same time.
(ii) Eliminates traffic problems.
(iii)It’s a robust network.
(iv) It has a very high privacy and security.
Disadvantages:
(i) Huge amount of cable and I/O ports are required.
(ii) Installation is difficult.
(iii)Hardware required are very costly.

(v) Tree or hierarchical Network

A tree topology combines characteristics of linear bus and star topologies. It consists
of groups of star-configured workstations connected to a linear bus backbone cable. Tree
topologies allow for the expansion of an existing network, and enable schools to configure
a network to meet their needs.

Amity Directorate of Distance and Online Education


126 IT for Managers

Notes

Fig: Tree Topology


Advantages:
(i) Point-to-point wiring for individual segments.
(ii) Supported by several hardware and software vendors.
Disadvantages:
(i) Overall length of each segment is limited by the type of cabling used.
(ii) If the backbone line breaks, the entire segment goes down.
(iii) More difficult to configure and wire than other topologies.

3.3 Network Architectures-the OSI Model


Computer networks may be classified according to the functional relationships which
exist among the elements of the network. They are:
(i) Active Networking
(ii) Client–server Networking / Broadcasting
(iii) Peer-to-peer (workgroup) / Point-to-Point Architecture
(i) Active Networking
In active network, the nodes are programmed to perform custom operations on the
messages that pass through the node. Active networks allow individual user or groups
of users, to inject customized programs into the nodes of the network. Active network
approaches are expected to be especially important in networks of mobile users.
For example, a node could be programmed or customized to handle packets on an
individual user basis or to handle multicast packets differently than other packets. “Smart
packets” use a special self-describing language that allows new kinds of information to
be carried within a packet and operated on by a node.

Amity Directorate of Distance and Online Education


Communication Network 127

Notes

Fig: Active Network Model


(ii) Client-Server Networking
The term client/server refers to the concept of sharing the work involved in processing
data between the client computer and the most powerful server computer.
The client/server network is the most efficient way to provide:
o Databases and management of applications such as Spreadsheets, Accounting,
Communications and Document Management.
o Network management.
o Centralized file storage.

Fig: Client-Server Network Model


The client/server model is basically an implementation of distributed or cooperative
processing. At the heart of the model is the concept of splitting application functions
between a client and a server processor. The division of labor between the different
processors enables the application designer to place an application function on the
processor that is most appropriate for that function. This lets the software designer

Amity Directorate of Distance and Online Education


128 IT for Managers

Notes optimize the use of processors providing the greatest possible return on investment for
the hardware.
Client-Server application design also lets the application provider mask the actual
location of application function. The user often does not know where a specific operation
is executing. The entire function may execute in either the PC or server, or the function
may be split between them.
Advantages:
(i) Centralized: Resources and data security are controlled through the server.
(ii) Scalability: Any or all elements can be replaced individually as needs increase.
(iii) Flexibility: New technology can be easily integrated into system.
(iv) Interoperability: All components (client/network/server) work together.
(v) Accessibility: Server can be accessed remotely and across multiple platforms.
Disadvantages:
(i) Expense: Requires initial investment in dedicated server.
(ii) Maintenance: Large networks will require a staff to ensure efficient operation.
(iii) Dependence: When server goes down, operations will cease across the
network.

(iii) Peer-to-peer (workgroup) Networking

In peer-to-peer networking there are no dedicated servers or hierarchy among the


computers. All of the computers are equal and therefore known as peers. Normally each
computer serves as Client/Server and there is no one assigned to be an administrator
responsible for the entire network.

Fig: Peer-to-peer Network Model


Peer-to-peer networks are good choices for needs of small organizations where the
users are allocated in the same general area, security is not an issue and the organization
and the network will have limited growth within the foreseeable future.
Advantages:
(i) Less initial expense: No need for a dedicated server.
(ii) Setup: An operating system (such as Windows XP) already in place may only
need to be reconfigured for peer-to-peer operations.

Amity Directorate of Distance and Online Education


Communication Network 129

Disadvantages: Notes
(i) Decentralized: No central repository for files and applications.
(ii) Security: Does not provide the security available on a client/server network.

Base on Scale of Networking

Depending on their scale, scope and purpose networks are often classified as:
(i) Local Area Network (LAN)
(ii) Wide Area Network (WAN)
(iii) Metropolitan Area Network (MAN)
(iv) Personal Area Network (PAN)
(v) Campus Area Network (CAN)
(vi) Home area Network (HAN)
(vii) Enterprise Private Network (EPN)
(viii) Virtual Private Network (VPN)
(ix) Storage Area Network (SAN)
(x) Global area Network (GAN)
(i) Local Area Network (LAN)
These are private owned networks within a single building or campus up to a few
kilometres in size. They are widely used to connect personal computers and workstations
in company offices and factories to share resources such as printers and exchange
information. LANs are restricted in size. LANs uses a transmission technology consisting
of a single cable by which all the machines are attached. Only bus and ring topologies
are possible for LANs.

Fig: Local Area Network (LAN) Model


LAN configuration consist of:
(i) A File Server: A File Server Stores all of the software that controls the network,
as well as the software that can be shared by the computers attached to the
network.
(ii) A Workstation: Computers connected to the file server. These are less powerful
than the file server
(iii) Cables: Cables are used to connect the network interface cards in each
computer.
Amity Directorate of Distance and Online Education
130 IT for Managers

Notes (ii) Wide Area Network (WAN)


A network that connects two or more LANs spread across a large geographical area
is called a wide area network. For instance, a company may use a LAN at its headquarters
in one city, another LAN at its manufacturing site and the third LAN in the marketing office
located in another city. Each location needs resources, data and programs locally but
it also requires to use data available in other locations. In such situation all the three
LANs may be connected to form a WAN. LANs may be connected together by dedicated
telephone lines or fibre optic cables or by satellite links.

Fig: Wide Area Network (WAN) Model


(iii) Metropolitan Area Network (MAN)
MANs are the network that are in between LANs and WANs. These networks provide
city wide services in large cities and thus the name ‘metropolitan’. MANs fill the need
of extending LAN capabilities to larger geographical areas. They are also used to connect
LANs across different offices in a city to WANs.

Fig: Metropolitan Area Network (MAN) Model


(iv) Personal area Network (PAN)
A personal area network (PAN) is a computer network used for communication among
computer and different information technological devices close to one person.
Some examples of devices that are used in a PAN are personal computers, printers,
fax machines, telephones, PDAs, scanners, and even video game consoles.

Amity Directorate of Distance and Online Education


Communication Network 131

Notes

Fig: Personal Area Network (PAN) Model


A PAN may include wired and wireless connections between devices. The reach of
a PAN typically extends to 10 metres. Wired PAN network is usually constructed with
USB and Firewire while wireless with Bluetooth and Infrared.
(v) Campus area Network
A campus network is a computer network made up of an interconnection of local
area networks (LANs) within a limited geographical area. The networking equipments
(switches, routers) and trasmission media (optical fiber, copper plant, Cat5 cabling etc.)
are almost entirely owned (by the campus tenant/owner: an enterprise, university,
government etc.).

Fig: Campus Area Network (CAN) Model


An interconnection of local-area networks within a limited geographical space, such
as a school campus or a military base. In the case of a university campus-based campus
network, the network is likely to link a variety of campus buildings including; academic
departments, the university library and student residence halls.
(vi) Home area Network (HAN)
A home area network is a residential LAN which is used for communication between
digital devices typically deployed in the home, usually a small number of personal
computers and other accessories.

Amity Directorate of Distance and Online Education


132 IT for Managers

Notes

Fig: Home Area Network (HAN) Model


HAN is a network contained within a user’s home that connects a person’s digital
devices, from multiple computers and their peripheral devices to telephones, VCRs,
televisions, video games, home security systems, “smart” appliances, fax machines and
other digital devices that are wired into the network.
(vii) Enterprise Private Network (EPN)

Fig: Enterprise Private Network (EPN) Model


A Enterprise Private Network is a network built by an enterprise to interconnect the
various company sites (production sites, headoffices, remote offices, shops etc.) in order
to share computer resources over the network.
(viii) Virtual Private Network (VPN)
VPN uses a technique known as tunneling to transfer data securely on the Internet
to a remote access server on your workplace network. Using a VPN helps you save money
by using the public Internet instead of making long–distance phone calls to connect
securely with your private network.
There are two ways to create a VPN connection, by dialing an Internet Service
Provider (ISP) or connecting directly to Internet. Generally, a VPN has a topology more
complex than point-to-point.

Amity Directorate of Distance and Online Education


Communication Network 133

Notes

Fig: Virtual Private Network (VPN) Model


(x) Storage Area Network (SAN)
A storage area network (SAN) is a high-speed special-purpose network (or
subnetwork) that interconnects different kinds of data storage devices with associated data
servers on behalf of a larger network of users. Typically, a storage area network is part
of the overall network of computing resources for an enterprise.
A SAN is a dedicated network that is separate from LANs and WANs. It is generally
used to connect all the storage resources connected to various servers. It consists of
a collection of SAN Hardware and SAN Software; the hardware typically has high inter-
connection rates between the various storage devices and the software manages, monitors
and configures the SAN.

Fig: Storage Area Network (SAN) Model

Amity Directorate of Distance and Online Education


134 IT for Managers

Notes A SAN is made up of a number of fabric switches connected in a network. These


are traditionally connected over Fibre Channel networks. SAN architectures are alternatives
to storing data on disks directly attached to servers or storing data on Network Attached
Storage (NAS) devices which are connected through general purpose networks. SANs
support disk mirroring, backup and restore, archival and retrieval of archived data, data
migration from one storage device to another, and the sharing of data among different
servers in a network.
(ix) Global area Network (GAN)

Fig: Gobal Area Network (GAN) Model


A Global Area Network (GAN) is a network used for supporting mobile
communications across an arbitrary number of wireless LANs, satellite coverage areas
etc.

3.4 Internet
The Internet can be defined as a large network that connects other networks of
computers all around the world. An example of a single network of computers might be
all the computers connected within an entire school district. The Internet is tens of
thousands of these networks communicating with one another. Using different applications,
such as e-mail, telnet and gopher. A user is allowed to interact with information found
on the other computers connected to the Internet.
The WWW is not the Internet; the WWW (World Wide Web) is only a portion of
the Internet. The WWW presents information to the user via a graphical browser like
Netscape in the form of text, pictures, video and even sound. Consisting of connected
hypertext “pages” of information, the W.W.W. allows the user to easily move to other
hypertext documents by clicking on links provided by the document’s author. The ease
of navigation and the integration of many Internet protocols for receiving information has
led to a global increase of over a billions pages from 1997 to present.
Definitions of Internet
There is no single, generally agreed-upon answer to this question, because the
Internet is different for each of us:
Amity Directorate of Distance and Online Education
Communication Network 135

· It is a set of computers talking over fiber optics, phone lines, satellite links, Notes
and other media.
· It is a place where you can talk to your friends and family around the world.
· It is a place to get cool game demos.
· It is an ocean or resources waiting to be mined.
· It is a place to do research for your thesis or a business presentation.
· It is a place where “crackers” and other shady characters lurk, waiting to
wreak havoc.
· It is unlimited commercial opportunity.
· It is world-wide support group of any problem needed.
· It is a gold mine of professionals in all fields sharing information about their
work.
· It is hundreds of libraries and archives that will open to your fingertips.
· It is the ultimate time-waster.
· It is the technology of the future that will help make our lives and those of
our children, brighter.
All of these answers are right; none of them is complete.

Internet and internet

As a result of the dynamic growth of the Internet, new terminology is emerging almost
daily. One source of confusion is the use of the terms ‘Internet’ (capitalized) and ‘internet’
(noncapitalized). By convention, “Internet” is generally considered to be the global Internet.
In other words, this is the Internet that connects the world. The Internet is often depicted
as a cloud, because the connections that make up the Internet are numerous and vary
depending on the access point of the user.

Fig: Internet
The term “internet” refers to an inter-network without reference to the scope of the
connection. This term is often used to distinguish two or more networks internet-worked
using internet technology and protocols, without being connected to the global Internet
as illustrated in the sample “internet” diagram.

Fig: internet

Amity Directorate of Distance and Online Education


136 IT for Managers

Notes How the Internet Works?

The internet is a network that connects thousands of individual computer networks.


Each computer on the internet has a unique address. These address can be referred to
as ‘a number’, which is called ‘IP Address’ or ‘a name’, is called ‘Domain Name’. For
example, IP Address: 192.65.245.76 and Domain Name: oregano.mwc.edu.
Everything that is sent across the internet is a ‘packet’ of data. Your e-mail, your
live chats, your web searches and FTP sessions are all packets of data. The reason
computers of vastly different manufacture can exchange data is due to a set of standards
called ‘Protocol’. Protocol is like rules that govern the exchange of information.
These protocols make it possible for one computer to translate its data into a form
readable to all computers and send the data out on its way. The data arrives at its
destination and the protocol steps in to translate the data from the general format of the
internet into the format acceptable to this computer.
The two primary protocols of the internet are – Transmission Control Protocol (TCP)
and Internet Protocol (IP).
TCP breaks your data up into small IP packets (which are numbered so receipt can
be verified and the data put back in correct order) which are passed along from one network
to another until they reach their destination. At the destination the TCP protocol
reassembles the packets into the message. If packets are lost or damaged along the
way a request is sent back to the source for replacements.
The internet is a ‘packet-switch’ network. The emphasis is on exchanging packets
of data rather than connecting computer systems together. When telnet is used, for
example, it looks as though there is a direct connection between two computers. But
it’s a “virtual connection”; the two systems aren’t really directly connected to each other.
In reality packets are being passed from one system to another. The networks on the
internet uses a hardware device called a ‘Router’. The router on a network accepts packets
addressed to it and passes on packets addressed to other networks. Each computer
system with a direct connection to the internet must have the hardware/software to allow
it to work with packets.
Many internet services and tools operate on a scheme called ‘Client/Server’. A person
on one computer starts a program that contacts another (remote) computer. The ‘Client’
is the program the person is running on the first computer and the server is running on
the remote computer. The person gives commands to his client software, which then
passes the commands on to the server at the remote computer and the ‘Server’ sends
back the reply to the command. Usually a server can deal with several clients. Gopher
works this way, and IRC and the World Wide Web (WWW).

Who Owns and Governs the Internet

The internet has no president, chief operating official or owner. The constituent
networks may have owners and presidents but there’s no single authority figure for the
internet as a whole. The Internet is a working example of anarchy.
The closest thing to authority on the internet is the Internet Society (ISOC), a
voluntary membership organization whose purpose is to promote global information
exchange through internet technology.
The ISOC appoints a kind of council of elders, which has responsibility for the
technical management and direction of the internet. This council of elders is groups of

Amity Directorate of Distance and Online Education


Communication Network 137

invited volunteers called the Internet Architecture Board (IAB). The IAB meets to approve Notes
“standards” and to allocate unique resources such as IP addresses. The standards, or
protocols, are what allow computers of different manufacture and operating systems to
communicate with each other. The IAB also keeps track of the various numbers ( and
other things) that must be unique, such as the IP address assigned to each computer
on the internet.
The way standards/protocols are developed is through the Internet Engineering Task
Force (IETF), another volunteer organization. IETF sets up a “working group” to further
investigate requests for new standards (when there are enough people to volunteer for the
working group it’s established). Anyone can attend IETF meetings and be on working
groups. These working groups have many different functions, from producing documentation
to deciding how networks should cooperate when problems do arise. A working group
usually produces a report. The report might be documentation available to anyone who
wants it, or it might be sent to the IAB to be declared a standard.

Who Pays

No one pays for the internet. There is no “Internet, Inc.” that collects fees from the
individual networks. Instead everyone pays their part. The NSF pays for the NSFnet,
colleges and corporations pays for their connection to a regional network (NCREN), which
in turn pays a national provider for its access.
There is a myth that the internet is free. It’s not; someone pays for every connection.
Many times these fees are not passed onto the end user (students, employees) and this
feeds the illusion of “free access”.

IP Address and Domain Name

Each machine on the Internet is assigned a unique address called an IP address.


IP addresses are 32-bit numbers, normally expressed as four “octets” in a “dotted decimal
number.” A typical IP address looks like this: 216.27.61.137.
Because it is hard to remember the string of numbers that make up an IP address
and because IP addresses sometimes need to change, all servers on the Internet also
have human-readable names, called Domain Name.
For example, edmiston@cs.unca.edu
davidson@uncavx.unca.edu
The Domain Name System (DNS) is a method of administering names by giving
different groups responsibility for subsets of names. These are separated by periods.

Analysis of Domain Name

Let’s take a few examples of domain names for five different web sites.
www.vision.edu
www.dssbl.org
maps.yahoo.com
www.bd.online
These examples will provide an easy way of describing the different parts of a typical
domain name. Using the ‘vision’ web site address, we will break up the address into the
individual parts of a domain name.
Amity Directorate of Distance and Online Education
138 IT for Managers

Notes · General domain


· Organization name
· Server name
In www.dssbl.org’s case, there is a different classification in its domain, it is
considered in the organizational domain.
For maps.yahoo.com, the word maps indicates that this address references the
portion of Yahoo domain designated for working with maps. Also, the .com means Yahoo
is considered a commercial site.
All organizations in the government (excluding military sites) fall under the .gov
domain. A partial list of common domain abbreviations is:
.edu Education
.com Commercial
.gov Government entities
.mil Military organizations
.net Networking institutions
.org Non-profit organizations
Last but not least, the food for our future web site, a site about the possible impact
of biotechnology on our future food supplies, is another non-profit organization (evidenced
by the .org domain name) that has one interesting addition to its domain name. The
interesting site can be presumed to be in the India since it has a geographical domain
name of .in.
All address outside of the U.S. have such a domain name that varies with the country
it resides. The following is a small list of es:common geographical domain name
abbreviations:
aus: Australia
ca: Canada
es: Spain
de: Germany
fr: France
mx: Mexico
jp: Japan
uk: United Kingdom
in: India
In addition to having a complicated domain name, the complete address (URL) might
also have a path to a particular part of the computer found at the domain name. For
example, the address http://www.vision.edu/accounts/main.html leads a browser to main
page is found in the section of monon’s site dealing with educational organizations. By
recognizing that computer folders are surrounded by ‘/’s and a file has only a ‘/’ at the
beginning of its name, a user can determine if a URL leads to a specific file or general
folder. Also, a web document should end with one of the three following extension; .html,
.htm or .shtml.

Amity Directorate of Distance and Online Education


Communication Network 139

Advantages of Internet Notes


They are many advantages to using the Internet such as:
(i) E-mail: E-mail is now an essential communication tools in business. It is also
excellent for keeping in touch with family and friends. The advantage to e-mail
is that it is free (no charge per use) when compared to telephone, fax and postal
services.
(ii) Information: There is a huge amount of information available on the internet
for just about every subject known to man, ranging from government law and
services, trade fairs and conferences, market information, new ideas and
technical support.
(iii) Services: Many services are now provided on the Internet such as on-line
banking, job seeking and applications, and hotel reservations. Often these
services are not available off-line or cost more.
(iv) E-Commerce: E-commerce is the concept used for any type of commercial
maneuvering or business deals that involves the transfer of information across
the globe via Internet. It has become a phenomenon associated with any kind
of shopping, almost anything. You name it and e-commerce with its giant
tentacles engulfing every single product and service will make you available at
your door-steps. It has got a real amazing and wide range of products from
household needs, technology to entertainment.
(v) Communities: Communities of all types have sprung up on the Internet. It’s
a great way to meet up with people of similar interest and discuss common
issues.

Drawbacks of Internet
(i) Theft of Personal Information: If you use the Internet, you may be facing
grave danger as your personal information such as name, address, credit card
number etc., can be accessed by other culprits to make your problems worse.
(ii) Spamming: Spamming refers to sending unwanted e-mails in bulk, which
provide no purpose and needlessly obstruct the entire system. Such illegal
activities can be very frustrating for you, and so instead of just ignoring it, you
should make an effort to try and stop these activities so that using the Internet
can become that much safer.
(iii) Virus Threat: Virus is nothing but a program, which disrupts the normal
functioning of your computer systems. Computers attached to Internet are more
prone to virus attacks and they can end up into crashing your whole hard disk,
causing you considerable headache.
(iv) Pornography: This is perhaps the biggest threat related to your children’s
healthy mental life. This is a very serious issue concerning the Internet. There
are thousands of pornographic sites on the Internet that can be easily found
and can be a detrimental factor to letting children use the Internet.

3.5 Intranet
An intranet is a private computer network that uses Internet Protocol technologies
to securely share any part of an organization’s information or operational systems within
that organization. The term is used in contrast to internet, a network between organizations
and instead refers to a network within an organization. Sometimes the term refers only

Amity Directorate of Distance and Online Education


140 IT for Managers

Notes to the organization’s internal website but may be a more extensive part of the organization’s
information technology infrastructure. It may host multiple private websites and constitute
an important component and focal point of internal communication and collaboration. The
Intranet Server Diagram illustrates the concept of an intranet, which is given below:

Fig: Intranet Server


Benefits:
(i) Workforce productivity: Intranets can also help users to locate and view
information faster and use applications relevant to their roles and responsibilities.
(ii) Time: Intranets allow organizations to distribute information to employees on
an as-needed basis.
(iii) Communication: Intranets can serve as powerful tools for communication
within an organization. They are useful to communicate strategic initiatives that
have a global reach throughout the organization.
(iv) Web publishing allows cumbersome corporate knowledge to be maintained
and easily accessed throughout the company and Web technologies.
(v) Business operations and management: Intranets are also being used as a
platform for developing and deploying applications to support business
operations and decisions across the internet worked enterprise.
(vi) Cost-effective: Users can view information and data via web-browser rather than
maintaining physical documents.
(vii) Promote common corporate culture: Every user is viewing the same
information within the Intranet.

3.6 Extranets
An extranet is a private network that uses Internet protocols, network connectivity.
An extranet can be viewed as part of a company’s intranet that is extended to users outside
the company, usually via the Internet. It has also been described as a “state of mind”
in which the Internet is perceived as a way to do business with a selected set of other
companies (business-to-business, B2B), in isolation from all other Internet users.
For example, a manufacturing company might work closely with a parts supplier for
a specific product. The parts supplier might be allowed to log on to the extranet server
to review part inventories. The Extranet Diagram illustrates this point.

Amity Directorate of Distance and Online Education


Communication Network 141

Notes

Fig: Extranet Server


Advantages:
(i) Exchange large volumes of data using Electronic Data Interchange (EDI).
(ii) Share product catalogs exclusively with trade partners.
(iii) Collaborate with other companies on joint development efforts.
(iv) Jointly develop and use training programs with other companies.
(v) Provide or access services provided by one company to a group of other
companies, such as an online banking application managed by one company
on behalf of affiliated banks.
Disadvantages:
(i) Extranets can be expensive to implement and maintain within an organization
(e.g., hardware, software, employee training costs), if hosted internally rather
than by an application service provider.
(ii) Security of extranets can be a concern when hosting valuable or proprietary
information.

3.7 World Wide Web


The Web or World Wide Web, is basically a system of Internet servers that support
specially formatted documents. The documents are formatted in a markup language called
HTML (HyperText Markup Language) that supports links to other documents, as well as
graphics, audio and video files. Users can jump from one document to another simply
by clicking on hot spots. User never need to know where the information is located or
to learn any obscure commands to access it. A WWW hypertext document is usually
called a web page. Operations on the WWW is based on a client/server model.
The Language of the Web
There are three main components to this language to communicate in the Web.
1. Uniform Resource Locators (URLs): URLs provide the hypertext links between
one document and another. These links can access a variety of protocols (e.g.,
ftp, gopher or http) on different machines or your own machine.
2. Hypertext Markup Language (HTML): Hypertext Markup Language, a
standardized system for tagging text files to achieve font, colour, graphic and
hyperlink effects on World Wide Web pages.
3. Common Gateway Interfaces (CGI): CGIs provide a gateway between the
HTTP server software and the host machine.

Amity Directorate of Distance and Online Education


142 IT for Managers

Notes 3.8 HTML


HTML means Hyper Text Markup Language. HTML is the language of Internet. It
is used to create Web pages of web sites of the internet. It has a set of tags (commands).
Tags are used to create the HTML document. HTML file display images, text, different
font etc. It has same features of a basic word processing program and it is capable of
using graphics. HTML file is a text file containing small markup tags (markup means good
standard files). The markup tells the web browser how to display the page. An HTML file
must have an htm or html file extension. The basic function of the HTML is describe to
browser how should display text and multimedia elements such as graphics, animations
etc. HTML performs its functions with the help of limited number of HTML command tags.
It means that HTML uses a small number of tags to create web pages. Any web server
can publish these web pages. These web pages can also be viewed or displayed by any
web browser. HTML tags helps to control the page structure and style of pages
presentation. HTML makes professional quality web pages.
HTML is used to design various homepages and hypertext documents of Web pages.
HTML document allows information to be presented in a multimedia format with hyperlinks.
We can design carefully the web pages by using HTML language.
To create an HTML document, a text editor is required. After creating an HTML
document, it is required to be viewed in a browser to see how it look and appear. There
are several browsers available for viewing HTML documents. They are Netscape Navigator,
NCSA Mosaic, Microsoft Internet Explorer, Web Explorer, etc. But most popular among
them are Microsoft Internet Explorer and Netscape Navigator. To use the Internet, a web
browser is essential. Browser allows the user to view the information available on the World
Wide Web.
Hyperlink is used to link between pages. A well-designed web page should have
proper and meaningful links to other documents or web pages.
Meaning of HTML
Hyper Text Markup Language is the predominant markup language for web pages.
It provides a means to create structured documents by denoting structural semantics for
text such as headings, paragraphs, lists etc. as well as for links, quotes, and other items.
It can include scripts in languages such as JavaScript which affect the behavior of
HTML processors like Web browsers; and Cascading Style Sheets (CSS) to define the
appearance and layout of text and other material.
HTML documents are composed entirely of HTML elements that, in their most general
form have three components: a pair of element tags with a “start tag” and “end tag”; some
element attributes given to the element within the tags. An HTML element is everything
between and including the tags.

Document Structure of HTML

HTML files are just normal text files. They usually have the extension of .htm, .html,
or .shtml. HTML documents have two parts, the head and the body. It is not a case
sensitive language.
The body is the larger part of the document, as the body of a letter you would write
to a friend would be.
The head of the document contains the document’s title and similar information and
the body contains most everything else.

Amity Directorate of Distance and Online Education


Communication Network 143

Example of basic HTML document Structure... Notes


<html>
<head>
<title>Title goes here</title>
</head>
<body>
Body goes here
</body>
</html>
Note: Extra spaces and line breaks (blank lines) will be ignored when HTML is
interpreted.

HTML Command Tags (Basic HTML Tags)

HTML tags are used to create HTML documents. Tags are always enclosed in angle
brackets (< >).
The basic structure of tag is:
<tag_name> some text </tag_name>
For example: The tag is used to make text bold:
<b> this is bold </b>
The above tag displayed as this is bold.
HTML tags are written within the less than (<) and greater than (>) signs. These
are explaining the opening and closing of the commands. The commands for opening and
closing are the same. But closing command has a / attached to it.
Example: General format of HTML program
<html>
<head>
<title> Title of page</title>
</head>
<body>
This is my first homepages. <b> This text is bold</b>
</body>
</html>
Explanation of above Commands:
The first tag is <html>. This tag tells your browser that this is the start of an HTML
document. The last tag is </html>. This tag tells your browser that this is the end of the
HTML document.
The text between the <head> tag and </head> tag is header information. Header
information is not displayed in the browser window.

Amity Directorate of Distance and Online Education


144 IT for Managers

Notes The text between the <title> tags is the title of your document. The title is displayed
in your browser’s caption.
The text between the <body> tags is the text that will be displayed in your browser.
The text between the <b> and </b> tags will be displayed in a bold font.
The output of the Program is:
This is my first homepages. This text is bold
Web pages are made from two sections. They are head and body. The head section
describes the page content. And a body section defines the actual contents of web pages.
The standard web page structure in HTML is:
<html>
<head>
<title> Title of the page is given here </title>
</head>
<body>
Web page contents displayed here
</body>
</html>

HTML Command Tags

1. <html>:
Syntax: <html>…………………..
……………….</html>
This tag is used in the beginning and end of the document. This tag tells a web
browser where the HTML document begins and ends. The HTML document starts with
a tag called <html> and ends with a tag </html>.
<html>
<body>
</body)
</html>
The first tag <html> indicates the beginning of the HTML document and the last tag
</html> indicates the end of the document. Within these two body of the document
contained.
2. <head>:
Syntax: <head>…………………..
……………….</head>
The second tag in the HTML document is <head>. This tag contained all header
information about the document. They are document title, author name etc. It end with
</head>
<html>
Amity Directorate of Distance and Online Education
Communication Network 145

<head> Notes
</head>
</html>
3. <title>:
Syntax: <title>…………………..
……………….</title>
This appears within the head tag structure. This is the title of web page. It will appear
at the top of the browser’s title bar and also in the history list. The title of document should
be logically related to the content of the web page. And it must be short but informative.
According to norms, there should be one title bar per document.
<title> Title of the page is given here </title>
4. <body>:
Syntax: <body>…………………..
……………….</body>
The actual work lies in the body of the document. This appears after the Head tags.
Between the body tags, all the material gets displayed in the browser window like all of
the text, graphics and links.
<body>
Web page contents displayed here
</body>
5. <headings>:
Syntax: <h1>…………………..
……………….</h1>
The entire HTML document information appears in different parts or section title. There
are six levels of headings, from Heading 1 through Heading 6. They are marked as H1
for heading one and H6 for heading six. Heading 1 (H1) is most important and heading
6 (H6) is least important in the HTML document.
The structure of all six headings tags:
<H1> Heading 1</H1>
<H2> Heading 2</H2>
<H3> Heading 3</H3>
<H4> Heading 4</H4>
<H5> Heading 5</H5>
<H6> Heading 6</H6>
A heading in an HTML document always begins at the margin of a line. It also makes
a line break at the end of heading. It means there cannot be two headings on the same
line.
6. Paragraphs: <P>:
Syntax: <p>…………………

Amity Directorate of Distance and Online Education


146 IT for Managers

Notes Paragraphs are treated as the most basic structures in HTML. Presenting information
in paragraphs is quite common in web pages. Paragraphs tags are <P> for beginning of
the paragraph and </P> for the end.
The beginning of a paragraph is marked by <P> and the end by </P>.
Note that this tag is special in that it does not require its corresponding end tag
</p>.
7. <br> Tag:
Syntax: <br>…………………..
The tag <br> used to break the text and create new paragraph without blank line
space. It does not require its corresponding end tag </br>.
8. <hr> tag:
Syntax: <hr>…………………..
This tag stands for horizontal rule. This inserts a straight line to separate the sections
of the document. It does not require its corresponding end tag </hr>.
Lists:
Lists are the index of items to be appeared in web pages in a specified format. There
are three types of lists, they are: Unordered, Ordered and Definition lists. Unordered and
Ordered list are widely used.
9. Unordered lists: <UL>
The Unordered List is the first of the three types of lists. This is probably the most
common list you will use.
The <ul> tag is the opening Unordered List Tag. Between these two tags you place
LIST ITEMS, each one having an individual <li> opening tag. (If you want, you can use
an optional </li> closing tag, but it is not needed.) There is no limit to the number of
List Items you may have in a single list.
Syntax: <UL>…………………..
……………….</UL>
In HTML bulleted list is termed as unordered list. Listed item is preceded by a bullet
( a small black circle) is called unordered list. Unordered list starts with a tag <UL> and
ends with a tags </UL>. Now all the items to be listed start with an HTML tag <LI> which
means “Listed Item”. <LI> has a corresponding with closing tag </LI>. But this closing
tag is not compulsory. There is no to the number of list of items.
Example 1: For unordered lists of items:
<UL>
<LI> Food expenses
<LI> Cloth expenses
<LI> Rent expenses
<LI> Education Expenses
<LI> Medical Expenses
<LI> Entertainment Expenses

Amity Directorate of Distance and Online Education


Communication Network 147

</UL> Notes
Output or result of the above:
1. Food expenses
2. Cloth expenses
3. Rent expenses
4. Education Expenses
5. Medical Expenses
6. Entertainment Expenses
Example 2: To make a dotted list of: red, orange, green, blue, purple, black
and brown, type:
<UL>
<LI> red
<LI> orange
<LI> green
<LI> blue
<LI> purple
<LI> black
<LI> brown
</UL>
Output or result of the above:
• red
• orange
• green
• blue
• purple
• black
• brown
10. Ordered lists: <OL>
The Ordered List, also known as the Numbered List, is very similar in structure to
the unordered list, except each list item has a number in front of it, instead of a bullet.
Also, the opening tag for the list is <ol> instead of <ul>, and the closing tag is </ol>
instead of </ul>. List Items within the list still use the same tags.
Syntax: <OL>…………………..
……………….</OL>
Ordered list is contained within the tags <OL> and </OL>. And the lists of items
are preceded by numbers such as 1, 2, 3 and so on instead of a bullet. When an ordered
list is displayed in a web browser, it uses an automatically generated sequence of items.

Amity Directorate of Distance and Online Education


148 IT for Managers

Notes Example 1: For ordered list of items:


<OL>
<LI> Food expenses
<LI> Cloth expenses
<LI> Rent expenses
<LI> Education Expenses
<LI> Medical Expenses
<LI> Entertainment Expenses
</OL>
The output or result of the above:
1. Food expenses
2. Cloth expenses
3. Rent expenses
4. Education Expenses
5. Medical Expenses
6. Entertainment Expenses
Example 3: For unordered and ordered list
<UL>
<LI>Saha
<LI> Togaleri
<LI> Manjunath
<LI> Kumara Gowda
<LI>Narayan
<LI> Prakash
<OL>
<LI>35 yrs
<LI>55 yrs
<LI>47 yrs
<LI> 56 yrs
<LI> 52 yrs
<LI> 56 yrs
</OL>
</UL>
The output or result of the above:
• Saha
• Togaleri
Amity Directorate of Distance and Online Education
Communication Network 149

• Manjunath Notes
• Kumara Gowda
• Narayan
• Prakash
1. 35 yrs
2. 55 yrs
3. 47 yrs
4. 56 yrs
5. 52 yrs
6. 56 yrs
11. Boldface: <B>
Syntax: <B>…………………..
……………….</B>
It is character style tag and it is used to make character bold or boldface. And
everything between <B> and </B> is boldface.
Example:
<B> This is Davangere University Davangere </B>
The output or result of the above is: This is Davangere University Davangere
12. Italics: <I>
Syntax: <I>…………………..
……………….</I>
HTML tags <I> and </I> are used to put the character in Italics. Everything between
<I> and </I> is italic style.
Example:
<I> She is Deeksha </I>
The output is: She is Deeksha
13. Underline: <U>
Syntax: <U>…………………..
……………….</U>
The underline tags<U> and </U> are used to put character in underlined format. That
means everything between <U> and </U> should be underlined.
Example:
<U> Malleshwaram Road Bangalore </U>
The output is: Malleshwaram Road Bangalore
14. Links :<A> </A>
Syntax: <A HREF= “the address of the file”>
……………….</A>

Amity Directorate of Distance and Online Education


150 IT for Managers

Notes A well designed web page will have links to other pages and even to the outside
world. The links in HTML document starts with a tag <A> and ends with </A>. But <A>
tags are not used alone. It contains additional HREF. HREF means Hypertext Reference.
It indicates the location of the file to be linked to current page.
The links are in the form of <A HREF= “the address of the file”>. The address of
the file is the location of the resources to which the file to be linked.
Example: The National Open School web server is at http://www.nos.edu/.
<A HREF= http://www.nos.edu/>National Open School web server</A>
Here is how it will look like National Open School web server.
15. Image:<IMG>
Image is also plays an important role in web page creation. Images are inserted in
web documents using the IMG tag <IMG> and this tag has no closing tag such as </
IMG>. The <IMG> tag requires the location of the images file to be placed in the document.
HTML file and graphics files are separate files.
But <IMG> tags alone do not help place images in the HTML document. It requires
another attributes ‘SRC’ to execute <IMG> tag. ‘SRC’ means source or source of graphics.
It point out the location of the graphics file. The source may be URL (Uniform Resource
Location). Just as the address of a house or office is known as its postal address, the
address on the Internet is known as URL. The URL locate a particular web page, among
all the computer connected the Internet.
When this attribute is used along with <IMG> tags:
Syntax:
<IMG> SRC= “URL/path of graphic file”>
16. <tr> </tr>: Table Row
Syntax: <tr>…………………..
……………….</tr>
17. <td> </td>: Table data
Syntax: <td>…………………..
……………….</td>
18. <Center>: This tag is used to make center of text and it rquires </center> at
the end.
Syntax: <center>…………………..
……………….</center>
19. <Font>: It is used to set font size. It supported by </font>
Syntax: <Font>…………………..
……………….</Font>
20) <Marquee> = (It means supported by, attached to, covering, enclosing). This
tag is used to moving of text or message in the web pages. And it
requires </Marquee>
Syntax: <Marquee>…………………..
……………….</Marquee>
Amity Directorate of Distance and Online Education
Communication Network 151

21. <form> </form>: Notes


A form is used in Web technology to get feedback. Busi ness firms used form to
get purchase order or feed back from their customer. It is usually in the form of buttons
or options to choose response. It is included with checkbox, radio button, text box etc.
Syntax: <form>…………………..
……………….</form>
22. Radio Buttons:
It another type of form element. It is used in form to collect user input. Radio button
can be grouped so that the user can select only one button of the group.
If you ever want to ask a question with one answer, you can use radio buttons.
Example:
If you wanted to ask “What WWW browser are you using right now?” And you wanted
to have the choices Netscape Navigator 4.x, Netscape Navigator 3.x, Netscape
Communicator, Mosaic, and Microsoft Explorer.
Code:
What WWW browser are you using right now?
<Input type=”radio” name=”browser” Value=”Navigator 4.x”>Netscape Navigator
4.x<P>
<Input type=”radio” name=”browser” Value=”Navigator 3.x”>Netscape Navigator
3.x<P>
<Input type=”radio” name=”browser” Value=”Communicator”>Netscape
Communicator<P>
<Input type=”radio” name=”browser” Value=”Mosaic”>Mosaic<P>
<Input type=”radio” name=”browser” Value=”Internetex”>Internet Explorer<P>
23. Check Boxes:
It is also one of the parts of form. Check box collects user input. Check boxes are
very similar to radio button. Instead of rounded hollow buttons, they are square boxes.
Let’s say that you wanted to ask a question like “What are some things that you
like to do?” You could have a list of things with checkboxes. If you wanted the list to
be: Watch TV, play on the Internet, read a book, play sports, and study, you would type:
Code:
What are some things that you like to do?
<Input type=”checkbox” NAME=”like” Value=”TV”>Watch TV<P>
<Input type=”checkbox” NAME=”like” Value=”internet”>Play on the Internet<P>
<Input type=”checkbox” NAME=”like” Value=”read”>Read a book<P>
<Input type=”checkbox” NAME=”like” Value=”sports”>Play sports<P>
<Input type=”checkbox” NAME=”like” Value=”study”>Study<P>
24. Text Boxes:
It is one of the essential parts of form. The customer can write text data in the form
through text boxes.
Amity Directorate of Distance and Online Education
152 IT for Managers

Notes 25. <Table> </table>: Table used to present data systematically.


Syntax: <table>…………………..
……………….</table>
26. Submit Button:
It is one of the option and part of the form. At the end of form, customer can click
on submit button to send it to business firm.
27. BGCOLOR:
We can set the background color by using the tag called bgcolor.
Syntax: <body bgcolor = “yellow”>
28. Using big and small:
We can use big and small size to make the text big or small size. These are used
to formatting of text and document.
29. Superscripts and Subscripts:
Superscript is used raise the character to a height. Subscript is used to lower the
character. These are used to formatting of documents.
Syntax: <sup>…………………..
……………….</sup>
Syntax: <sub>…………………..
……………….</sub>
30. Pull-Down Lists
Another way to ask a question with only one answer is to use a pull-down menu.
You can use the SELECTED command to have an option besides the first be selected.
Example:
If you wanted to ask “What is your favorite color?”, and you wanted the list to be
of red, yellow, orange, green, blue, purple, black, and brown, with black selected.
Code:
What is your favorite color?
<Select name=”color”>
<option>Red
<option>Yellow
<option>Orange
<option>Green
<option>Blue
<option>Purple
<option>Brown
</Select><P>

Amity Directorate of Distance and Online Education


Communication Network 153

31. Scroll-Down Lists Notes


With this, you can decide whether or not you want people to be able to select more
than one item. If you do have it with more than one items, the user has to hold down
the command or shift key. Below are two lists of the same things.
(i) In the first one, you can only select one item, and it is showing three lines. For
example,
The question is “What is your favorite video game system?” The answers are:
Nintendo 64, Sony Playstation, Sega Dreamcast, or arcade video games. The text that
you type for each list is above the actual list.
What is your favorite video game system?
<Select name=”video game” SIZE=3>
<Option Value=”nintendo64">Nintendo 64
<Option Value=”playstation”>Sony Playstation
<Option Value=”dreamcast”>Sega Dreamcast
<Option Value=”arcade”>Arcade Games
</Select><P>
(ii) In the second one, you can select one or more items by holding down command
or shift. The second list is showing four lines. For same example,
What is your favorite video game system? (Hold shift to select more than one)
<Select name=”video game” MULTIPLE SIZE=4>
<Option Value=”nintendo64">Nintendo 64
<Option Value=”playstation”>Sony Playstation
<Option Value=”dreamcast”>Sega Dreamcast
<Option Value=”arcade”>Arcade Games
</Select><P>
32. Reset Form
On most page that have fill-out forms, there is a reset button at the bottom of the
form, next to the “submit” or “send” button. To have a reset button, just type:
<Input type=”reset” Value=”Reset”>
33. Submit Entry
When you are all finished with everything, you need to make a button so that people
can submit their entry. To do this, type:
<Input type=”submit” Value=”Submit”>
Note: At the very end of your form, you must type </FORM> or your forms won’t
work.
34. Clean Code
Clean code means that your HTML coding follows all specifications.
(i) Don’t type special characters into your code, instead type their escape code:
Many characters should NEVER be typed directly into HTML code such as the

Amity Directorate of Distance and Online Education


154 IT for Managers

Notes “<“, “>”, the “©”, “&”, and the “ itself. Instead type &escape_code; (Ampersand,
Escape Code for Character, then a semicolon). For these 5 characters, here
are the escape codes...
o For the < type &lt;
o For the > type &gt;
o For the © type &copy;
o For the & type &amp;
o For the “ type &quot;
(ii) Use quotes around values in attributes... For example, if you want a horizontal
rule that is half of the screen width, type <hr width=”50%”> rather than <hr
width=50%>, or if you want one that is size 5 type <hr size=”5"> rather than
<hr size=5>. Isn’t it ironic that I don’t? <g>
(iii) ‘Don’t overlap tags... Overlapping occurs when Tag A starts, Tag B starts, Tag
A closes, then Tag B closes. This will cause errors in sensitive browsers.
Examples:
Wrong Way (Overlaps):
<font size=+1><b>This is Bold and One Font Size Bigger</font></b>
Right Way (Doesn’t Overlap):
<font size=+1><b>This is Bold and One Font Size Bigger</b></font>
Wrong Way (Overlaps):
<a href=”here.html”><i>This link is italicized</a></i>
Right Way (Doesn’t Overlap):
<a href=”here.html”><i>This link is italicized</i></a>
35. Tables
Tables are one of the most challenging things to code with HTML. It isn’t very hard,
it just takes a while to get the hang of. Tables start with the <table> tag, and usually
contain the border=”n” attribute within the opening tag. If the border=”0", than the table’s
border is invisible. Usually when you do not use the border attribute the table border will
become invisible. This is useful when you want to align text in rows and columns, but
don’t want a table border around it. border=”1" is a thin border. border=”2" is a little thicker,
border=”3" and so on. The table MUST end with a </table> tag, or the table might not
appear at all.
Example:
<table border=”0">
<tr>
<td>This table has a border of 0.</td>
</tr>
</table>
Output:
This table has a border of 0.

Amity Directorate of Distance and Online Education


Communication Network 155

Each row within the table is defined by the opening <tr> tag and the optional </ Notes
tr> closing tag. Within each table row are table cells, which are defined by the <td> opening
and </td> closing tags. Most table rows contain more than one cell. Many times, you
will need a heading for a column of cells of the first row. To do this, use the <th> opening
and </th> closing tag. The table heading tag makes the text in that cell BOLD and
CENTERED. You only need use the heading cells when necessary.
36. Adding Sounds
To add sounds to a web page use the <EMBED> tag. This tag supports many
common file formats such as .wav, .mid, .mp3, and .au. The basic structure of the tag:
<embed src=”filename.ext” width=”x” height=”x” autoplay=”x” hidden=”x” loop=”x”
volume=”x”></embed>
If you want the file to automatically play when the web page is loaded, set
autoplay=”true”, if you do not want the file to automatically start, set autoplay=”false”.
If you want the control box to be hidden, use the hidden=”true” attribute. Normally
the file will stop playing after it is completed the first time, so if you want it to start over
once it is done use the attribute loop=”true”.
You can set the volume setting with the volume attribute, a value from 1 to 100 (default
is 50). The control box size that plays the sound can vary from browser to browser, but
some versions of Netscape won’t show the box at all unless you specify. (145 and 60
are usually good).
Code:
<embed src=”http://www.davesite.com/webstation/html/davesite.mp3" loop=”true”
autoplay=”false” width=”145" height=”60"></embed>

3.9 Creating Web Pages


When you navigate to a web page on the Internet, the browser is doing a lot of work.
The browser reads all the necessary files (HTML, CSS, and JavaScript) and interprets
those raw resources to paint the complex page you see.
In this article, you'll learn how to create a web page using a text editor on your own
computer, then view the web page in your browser. If you're interested in publishing your
web page to the World Wide Web (the Internet) for everyone to see, check out this article
after you understand the steps below.
STEP 1: OPEN YOUR TEXT EDITOR
The first step is to open your text editor. It's important to use a "raw" text editor,
and not a formatted word processor.
Word processors insert characters which make the page look good, but aren't valid
HTML. They're great tools for making stylish documents, such as academic papers and
flyers, but they also insert characters that aren't valid HTML. Since a web page file must
contain valid HTML, a text editor is a better tool than a word processor for building web
pages.
STEP 2: WRITE YOUR HTML SKELETON
Now that your text editor is open, you can begin writing your HTML. As you learned
in the first lesson of the HTML & CSS course, there are a few things that are always
present in a well-formatted HTML file. Here's all of them together again:

Amity Directorate of Distance and Online Education


156 IT for Managers

Notes <!DOCTYPE html>


<html>
<head>
<title>My First Web Page!</title>
</head>
<body>
<h1>Hello World!</h1>
</body>
</html>
You can use this exact skeleton if you like. Just copy and paste it into your text
editor. Make sure you include everything!
STEP 3: SAVE YOUR FILE
Your web page is now ready, but currently it only exists inside of your text editor.
The next step is to save the file to your computer. If you closed the text editor now without
saving, your new web page would be lost! There are a few important things to keep in
mind when you save it the file:
1. Use the .html HTML file extension, i.e. about_me.html
2. Don't use any spaces or special characters in the file name. Use underscores
(_) or dashes (-) instead.
3. Decide where in your computer you will save the file, and make sure to remember
the location!
Use the .html HTML file extension
A file extension is the suffix of a file name, and describes the type of the file. The
file extension is always the last 3 or 4 characters in a filename, preceded by a period.
For example, the HTML file extension is .html, and it tells the browser (and other
applications) to interpret the contents of the file as a web page. Note that on older web
pages you may see .htm, but this archaic and no longer used.
Don't use any spaces or special characters in the file name
When choosing a file name, keep it simple. Stick to numbers and letters. Use
underscores (_) or dashes (-) instead of spaces. Leave out percent signs, slashes,
question marks, exclamation points, commas, and other "special characters". The browser
needs to locate the file based on its name, and special characters within the file name
can interrupt that process. File names should be kept simple and should follow conventions
in order to make navigating to your web page more reliable.
Decide where in your computer you will save the file
After choosing a file name, select an appropriate location in your file system to save
your web page. It's good practice to create a new folder to house this web page. If you
do create a new folder, use the same naming conventions outlined above in order to
minimize future headaches. The most important thing when selecting the location to save
to is to remember where you saved it. If you saved it already but you don't remember
where, just click File > Save As..., choose a new location to save, and be sure to remember
this time.

Amity Directorate of Distance and Online Education


Communication Network 157

STEP 4: OPEN YOUR WEB PAGE IN YOUR BROWSER Notes


Now you're ready to view your new page in your browser! First, open up your browser.
In the top menu, click File > Open File. Navigate to the location you saved your web page.
Click on your web page file and then click Open. You should see your web page!

3.10 Telecommunication Networks


Telecommunication networks are transmission systems enabling information to be
transmitted in analogue or digital form between various different sites by means of
electromagnetic or optical signals. The information may consist of audio or video data
or some other type of data. The networks are based either on wired or wireless
infrastructures. Typical examples of telecommunication networks are the telephone
landline network, the mobile network, cable TV networks or the internet.
Telecommunication networks for two-way speech transmission (phone networks)
Various types of phone network can be used for two-way speech transmission. In
the early days of the telephony era, the phone network was wire-based and transmitted
the speech signals by means of electromagnetic, analogue signals. Nowadays, the phone
networks are digital and can be wire-based (landline network) or wireless (mobile network).
The system for connecting subscribers has progressed from being purely circuit-switched
to packet-switched.
Telecommunication networks for data transmission
Telecommunication networks for transmitting data formerly used numerous different
protocols. Owing to the triumph of the internet, the internet protocol (IP) has gained
widespread acceptance as standard protocol for data transmission. Nowadays, virtually
all data networks are IP-based. The data in these networks are divided up into individual
data packets and tagged with the destination and source addresses. At the network nodes,
the destination addresses are evaluated by so-called routers, and the data packets are
sent to the next node along the route to the destination address. In principle, the individual
packets can find differing routes through the network and reach their destination at different
times. The destination system puts them back in the correct order if necessary.
Merging of speech and data transmission via voice-over IP technology
The increasing efficiency of IP networks, short latency periods and jitter values
coupled with high bandwidths make data networks suitable for time-critical real-time
applications such as telephony. Thanks to voice-over IP technology, phone networks have
now almost fully merged with data networks. This has the advantage for the provider that
only one single infrastructure needs to be operated for data and speech transmission.
The user benefits from a multitude of new applications providing flexible communication
options. This means phone systems can be entirely cloud-based. Users do not need their
own system software and can use all the telephone services available from any location
with internet access.

3.11 Wireless Communication


Wireless communication involves the transmission of information over a distance
without the help of wires, cables or any other forms of electrical conductors. Wireless
communication is a broad term that incorporates all procedures and forms of connecting
and communicating between two or more devices using a wireless signal through wireless
communication technologies and devices.

Amity Directorate of Distance and Online Education


158 IT for Managers

Notes Features of Wireless Communication

The evolution of wireless technology has brought many advancements with its
effective features.
• The transmitted distance can be anywhere between a few meters (for example,
a television's remote control) and thousands of kilometers (for example, radio
communication).
• Wireless communication can be used for cellular telephony, wireless access
to the internet, wireless home networking, and so on.

Advantages of Wireless Communication

Wireless communication has the following advantages:


i. Communication has enhanced to convey the information quickly to the
consumers.
ii. Working professionals can work and access Internet anywhere and anytime
without carrying cables or wires wherever they go. This also helps to complete
the work anywhere on time and improves the productivity.
iii. Doctors, workers and other professionals working in remote areas can be in
touch with medical centres through wireless communication.
iv. Urgent situation can be alerted through wireless communication. The affected
regions can be provided help and support with the help of these alerts through
wireless communication.
v. Wireless networks are cheaper to install and maintain.

Disadvantages of Wireless Communication


• The growth of wireless network has enabled us to use personal devices
anywhere and anytime. This has helped mankind to improve in every field of
life but this has led many threats as well.
• Wireless network has led to many security threats to mankind. It is very easy
for the hackers to grab the wireless signals that are spread in the air. It is very
important to secure the wireless network so that the information cannot be
exploited by the unauthorized users.

3.12 WAP Protocol


WAP stands for Wireless Application Protocol. Per the dictionary definition for each
of these words we have:
• Wireless: Lacking or not requiring a wire or wires pertaining to radio
transmission.
• Application: A computer program or piece of computer software that is
designed to do a specific task.
• Protocol: A set of technical rules about how information should be transmitted
and received using computers.
WAP being open and secure, is well suited for many different applications including,
but not limited to stock market information, weather forecasts, enterprise data, and games.
Despite the common misconception, developing WAP applications requires only a
few modifications to existing web applications. The current set of web application

Amity Directorate of Distance and Online Education


Communication Network 159

development tools will easily support WAP development, and in the future more Notes
development tools will be announced.

3.13 Summary
Computer networks mean an interconnected collection of computers. Two computers
are said to be interconnected if they are able to exchange information. The connection
need not be via a copper wire, fiber optics, microwaves and communication satellites can
also be used.
A linear bus topology consists of a main run of cable with a terminator at each end.
All nodes such as file server, workstations, and peripherals are connected to the linear
cable.
A ring network is a network topology in which each node connects to exactly two
other nodes, forming a single continuous pathway for signals through each node – a ring.
Data travels from node to node, with each node along the way handling every packet.
The ring topology does not require a central server to manage connectivity between the
nodes.
A star topology is designed with each node such as file server, workstations, and
peripherals connected directly to a central network hub, switch or concentrator.
A Mesh topology consists of a network where every device on the network is
physically connected to every other device on the network. This provides a great deal of
performance and reliability, however the complexity and difficulty of creating one increases
geometrically as the number of nodes on the network increases.
A home area network is a residential LAN which is used for communication between
digital devices typically deployed in the home, usually a small number of personal
computers and other accessories.
A Enterprise Private Network is a network built by an enterprise to interconnect the
various company sites (production sites, headoffices, remote offices, shops etc.) in order
to share computer resources over the network.
A storage area network (SAN) is a high-speed special-purpose network (or
subnetwork) that interconnects different kinds of data storage devices with associated data
servers on behalf of a larger network of users. Typically, a storage area network is part
of the overall network of computing resources for an enterprise.
An extranet is a private network that uses Internet protocols, network connectivity.
An extranet can be viewed as part of a company’s intranet that is extended to users outside
the company, usually via the Internet.
Hyper Text Markup Language is the predominant markup language for web pages.
It provides a means to create structured documents by denoting structural semantics for
text such as headings, paragraphs, lists etc. as well as for links, quotes, and other items.
Telecommunication networks are transmission systems enabling information to be
transmitted in analogue or digital form between various different sites by means of
electromagnetic or optical signals. The information may consist of audio or video data
or some other type of data. The networks are based either on wired or wireless
infrastructures.
Wireless communication involves the transmission of information over a distance
without the help of wires, cables or any other forms of electrical conductors. Wireless

Amity Directorate of Distance and Online Education


160 IT for Managers

Notes communication is a broad term that incorporates all procedures and forms of connecting
and communicating between two or more devices using a wireless signal through wireless
communication technologies and devices.

3.14 Check Your Progress

I. Fill in the Blanks


1. ___________ mean an interconnected collection of computers.
2. HTML stands for ________.
3. WWW stands for ________.
4. ___________ is a communication network which bridges all the same computer
networks worldwide as a whole.
5. WANs using high-speed connections to connect individual LAN segments are
called __________ networks.

II. True or False


1. MANs are the network that are in between LANs and WANs.
2. Internal webs are also called as Intranets.
3. HTML is a text file containing small markup tags.
4. In HTML, there are 8 number of heading levels.
5. WWW is a collection of linked information residing on computers connected
by the internet.

III. Multiple Choice Questions


1. WANs using high-speed connections to connect individual LAN segments are
called _____________.
(a) Routes
(b) Primary distributors
(c) Backbone networks
(d) Fishbone networks
2. Internet Explorer is a _____
(a) News Reader
(b) Graphing Package
(c) Web Browser
(d) Any person browsing the net
3. _____________ allows the user to view the information available on the World
Wide Web.
(a) TCP/IP
(b) Browser
(c) Dialer
(d) None of these
4. List tag used in html is ______
(a) Paired
(b) Unpaired
Amity Directorate of Distance and Online Education
Communication Network 161

(c) Single Notes


(d) None of these
5. Which of the following is HTML tag could not be used as CSS tag?
(a) <h1>
(b) <style>
(c) <a>
(d) <p>

3.15 Questions and Exercises

I. Short Answer Questions


1. What is computer network?
2. What do you mean by network topologies?
3. Give the meaning of network architectures.
4. What is OSI Model?
5. What do you mean by Internet?
6. Define Intranet.
7. Give the meaning of extranets.
8. What do you mean by World Wide Web?
9. What is HTML?
10. Give the meaning of telecommunication networks.
11. Define wireless communication.
12. What is WAP protocol?

II. Extended Answer Questions


1. Describe the needs for networking.
2. Explain the elements of networking.
3. What are the advantages and disadvantages of network?
4. Discuss the network topologies.
5. Describe the network architectures.
6. What are the advantages and drawbacks of Internet?
7. Explain the Intranet and Extranets.
8. Write short note on World Wide Web.
9. Explain the HTML Command Tags.
10. How to creating web pages? Explain.
11. Explain the telecommunication networks.
12. Discuss the wireless communication.
13. Explain the WAP Protocol.

3.16 Key Terms


z Network: A network is any collection of independent computers that
communicate with one another over a shared network medium. A computer
network is a collection of two or more connected computers.
Amity Directorate of Distance and Online Education
162 IT for Managers

Notes z PAN: A personal area network is a computer network used for communication
among computer and different information technological devices close to one
person.
z VPN: uses a technique known as tunneling to transfer data securely on the
Internet to a remote access server on your workplace network.
z GAN: A Global Area Network is a network used for supporting mobile
communications across an arbitrary number of wireless LANs, satellite coverage
areas etc.
z Internet: can be defined as a large network that connects other networks of
computers all around the world.
z HTML: means Hyper Text Markup Language. HTML is the language of Internet.
It is used to create Web pages of web sites of the internet. It has a set of tags
(commands).

3.17 Check Your Progress: Answers


I. Fill in the Blanks
1. Computer networks
2. Hyper Text Markup Language
3. World Wide Web
4. Internet
5. Backbone
II. True or False
1. True
2. True
3. True
4. False
5. True
III. Multiple Choice Questions
1. (c) Backbone networks
2. (c) Web Browser
3. (b) Browser
4. (a) Paired
5. (b) <style>

3.18 Case Study


At Du Pont Co’s (www dupont. com)$4 billion performance coating grope, the critical
issue was content management. “We have a very large number of documents for marketing
brochures, press releases, warranty information on products and general support content
for our distributors and car repair body shops”, explains Catherine March and the groups
e - business strategy manager. “Our salesmen were driving around with 23 kg of obsolete
literature in their trunk”.
Du Pont opted to deliver the information through a web - based intranet extranet portal,
using technology from Bow - street, a portal s/w and web development tools company
Du pont wanted the ability to custormize information about its half a dozen coating brands.

Amity Directorate of Distance and Online Education


Communication Network 163

It also wanted each of its 2500 distributors and repair shops worldwide to see the Notes
information displayed in almost 4000 different site views; which the technology would allow
it to do.
Since the content capability was initiated, Du Pont’s site had grown rapidly. The
body shops can not get training bench marketing tools. and can paint colour formulas
via the portal. There are also job posting and resume services. and for the distributors,
Du Pont is researching adding order - tracking and order accuracy capabilities soon.
Questions:
a) What are the business benefits of the web portal ? Make a critical assessment.
b) What is the importance of ‘content management’ for enterprise web portals?
c) Can a small business develop and maintain such a portal ?

3.19 Further Readings


1. Turban, Rainer and Potter (2003). Introduction to information technology. John
Wiley and sons.
2. Sinha, P.K., PritiSinha (2002). Foundation of computing. BPB Publications.
3. James, A. O’Brien (2005). Introduction to Information Systems. TMH
4. Norton P (2010), Introduction to Computers, Tata McGraw-Hill
5. Potter T (2010), Introduction to Computers, John Wiley & Sons (Asia) Pvt Ltd
6. Morley D & Parker CS (2009), Understanding Computers – Today and Tomorrow,
Thompson Press
7. Jawadekar, WS (2009); Management Information System; Tata McGraw Hill
8. Mclead R & Schell G (2009), Management Information Systems; Pearson
Prentice Hall
9. O’Brein, JA (2009); Introduction to Information Systems; Tata McGraw Hill

3.20 Bibliography
1. Robert Schultheis and Mary Summer, Management Information Systems – The
Managers View, Tata McGraw Hill, 2012.
2. Kenneth C. Laudon and Jane Price Laudon, Management Information Systems
– Managing the digital firm, PHI Learning / Pearson Education, PHI, Asia, 2015.
3. Rahul de, MIS in Business, Government and Society, Wiley India Pvt Ltd, 2012
4. Gordon Davis, Management Information System : Conceptual Foundations,
Structure and Development, Tata McGraw Hill, 23st Reprint 2014.
5. Haag, Cummings and Mc Cubbrey, Management Information Systems for the
Information Age, McGraw Hill, 2005. 9th edition, 2015.
6. Turban, McLean and Wetherbe, Information Technology for Management –
Transforming Organisations in the Digital Economy, John Wiley, 6th Edition,
2008.
7. Raymond McLeod and Jr. George P. Schell, Management Information
Systems,Pearson Education, 2007.
8. James O Brien, Management Information Systems – Managing Information
Technology in the E-business enterprise, Tata McGraw Hill, 2014.

Amity Directorate of Distance and Online Education


164 IT for Managers

Notes 9. Raplh Stair and George Reynolds, Information Systems, Cengage Learning,
12th Edition, 2016
10. Corey Schou and Dan Shoemaker, Information Assurance for the Enterprise –
A Roadmap to Information Security, Tata McGraw Hill, 2007.
11. Frederick Gallegor, Sandra Senft, Daniel P. Manson and Carol
Gonzales,Information Technology Control and Audit, Auerbach Publications,
4th Edition, 2013.
±±±±

Amity Directorate of Distance and Online Education

You might also like