You are on page 1of 48

INTERNET TECHNOLOGY

UNIT – 1

Internet Technology and Protocol: Basics of Web and Network, Internet


Protocols, FTP, HTTP, HTTPS, Email protocols –SMTP, POP3, IMAp4, MIME6,
Router, E-mail Addresses, Resources Addresses, Application areas: E-commerce,
Education Entertainment such as games and gambling, Impact of Internet on Society
– Crime on/through the Internet.

Prepared by: NITIN UPADHYAY


Department of CSE

Prepared By Nitin Upadhyay 1


Internet Basics

Internet is defined as an Information super Highway, to access information over the


web. However, It can be defined in many ways as follows:
 Internet is a world-wide global system of interconnected computer networks.
 Internet uses the standard Internet Protocol (TCP/IP).
 Every computer in internet is identified by a unique IP address.
 IP Address is a unique set of numbers (such as 10.60.200.7) which identifies a
computer location.
 Internet is accessible to every user all over the world.

Prepared By Nitin Upadhyay 2


Internet

The Internet is a global wide area network that connects computer systems across
the world. It includes several high-bandwidth data lines that comprise the Internet
"backbone." These lines are connected to major Internet hubs that distribute data to
other locations, such as web servers and ISPs.

Prepared By Nitin Upadhyay 3


WWW Evolution of the Internet
The concept of Internet was originated in 1969 and has undergone several technological &
Infrastructural changes as discussed below:
 The origin of Internet devised from the concept of Advanced Research Project Agency
Network ARPANET.
 ARPANET was developed by United States Department of Defense.
 Basic purpose of ARPANET was to provide communication among the various bodies of
government.
 Initially, there were only four nodes, formally called Hosts.
 In 1972, the ARPANET spread over the globe with 23 nodes located at different
countries and thus became known as Internet.
 By the time, with invention of new technologies such as TCP/IP protocols, DNS, WWW,
 browsers, scripting languages etc., Internet provided a medium to publish and access
 information over the web.

Prepared By Nitin Upadhyay 4


Client-Server model
Client-Server Model is one of the types of Networking Model. It is mostly used
networking model in today's life. In Client/Server Model, a central device that is Server
is placed to control all the communications between server-client. In this fashion,
various computers can be connected to a server. These connected computers are called
nodes. If one node needs to communicate to another node, then it must go through the
server. Thus in Client-Server model, data or resources cannot be accessed or shared
independently or individually by clients.

Prepared By Nitin Upadhyay 5


Intranet
Intranet is defined as private network of computers within an organization with its own
server and firewall. Moreover we can define Intranet as:

 Intranet is system in which multiple PCs are networked to be connected to each


other. PCs in intranet are not available to the world outside of the intranet.

 Usually each company or organization has their own Intranet network and
members/employees of that company can access the computers in their intranet.

 Every computer in internet is identified by a unique IP address.

 Each computer in Intranet is also identified by a IP Address, which is unique among


the computers in that Intranet.

Prepared By Nitin Upadhyay 6


Benefits of Intranet
Intranet is very efficient and reliable network system for any organization. It is beneficial
in every aspect such as collaboration, cost-effectiveness, security, productivity and much
more.
Communication:-Intranet offers easy and cheap communication within an organization.
Employees can communicate using chat, e-mail or blogs.
Time Saving:-Information on Intranet is shared in real time.
Collaboration:-Information is distributed among the employees as according to
requirement and it can be accessed by the authorized users, resulting in enhanced
teamwork.
Cost Effective:-Employees can see the data and other documents using browser rather
than printing them and distributing duplicate copies among the employees, which
certainly decreases the cost.
Security:-Since information shared on intranet can only be accessed within an
organization, therefore there is almost no chance of being theft.
Immediate Updates:-Any changes made to information are reflected immediately to all
the users.
Specific Users:-Intranet targets only specific users within an organization therefore,
once can exactly know whom he is interacting.

Prepared By Nitin Upadhyay 7


Extranet
Extranet refers to network within an organization, using internet to connect to the
outsiders in controlled manner. It helps to connect businesses with their customers and
suppliers and therefore allows working in a collaborative manner.

Extranet Implementation
Extranet is implemented as a Virtual Private Networks (VPN) because it uses internet
to connect to corporate organization and there is always a threat to information
security. VPN offers a secure network in public infrastructure (Internet).

Prepared By Nitin Upadhyay 8


Storing, locating, and transmitting
information on the Web
Clients, servers, and sites
On the Web, information is stored at Web sites. Access to the information at a Web site is
managed by a Web server for the site. Users access the information using a Web client, which is
also called a browser.

Prepared By Nitin Upadhyay 9


Storing, locating, and transmitting information
on the Web
How information is stored: HTML
Information on the Web is stored in documents, using a language named HTML (Hyper Text
Markup Language). Web clients interpret HTML and display the documents to a user. The
protocol that governs the exchange of information between the Web server and Web client is
named HTTP (Hyper Text Transfer Protocol).
How information is located: the URL
To move from one page of a document to another page, or to another document on the same
or another Web site, the user clicks a link in the document shown in their Web client.
Documents and locations within documents are identified by an address that is called a
Uniform Resource Locator, or URL. This is an example of a URL: http://www.opju.com
URLs contain information about which server the document is on, and may also specify a
particular document available to that server, and even a position within the document. In
addition, a URL may carry other information from a Web client to a Web server, including
the values entered into fields in an HTML form.

Prepared By Nitin Upadhyay 10


Network
 A network can be defined as a group of computers and other devices connected in some
ways so as to be able to exchange data.
 Each of the devices on the network can be thought of as a node; each node has a unique
address.
 Addresses are numeric quantities that are easy for computers to work with, but not for
humans to remember. Example: 204.160.241.98
 Some networks also provide names that humans can more easily remember than numbers.
Example: www.opju.ac.in, corresponding to the above numeric address.

Prepared By Nitin Upadhyay 11


Types of Network

There are mainly three types of computer networks based on their size:
1. Local Area Network (LAN)
2. Metropolitan Area Network (MAN)
3. Wide area network (WAN)

Prepared By Nitin Upadhyay 12


LAN
1. Local area network is a group of computers connected with each other in a small places
such as school, hospital, apartment etc.
2. LAN is secure because there is no outside connection with the local area network thus
the data which is shared is safe on the local area network and can’t be accessed outside.
3. LAN due to their small size are considerably faster, their speed can range anywhere from
100 to 100Mbps.
4. LANs are not limited to wire connection, there is a new evolution to the LANs that allows
local area network to work on a wireless connection.

Prepared By Nitin Upadhyay 13


MAN
MAN network covers larger area by connections LANs to a larger network of computers. In
Metropolitan area network various Local area networks are connected with each other
through telephone lines. The size of the Metropolitan area network is larger than LANs and
smaller than WANs(wide area networks), a MANs covers the larger area of a city or town.

Prepared By Nitin Upadhyay 14


WAN
Wide area network provides long distance transmission of data. The size of the WAN is
larger than LAN and MAN. A WAN can cover country, continent or even a whole world.
Internet connection is an example of WAN. Other examples of WAN are mobile broadband
connections such as 3G, 4G etc.

Prepared By Nitin Upadhyay 15


Network Protocols
A protocol is a set of rules that governs the communications between computers on a
network. These rules include guidelines that regulate the following characteristics of a
network: access method, allowed physical topologies, types of cabling, and speed of data
transfer.
Layered Software and the OSI Model
Computers communicate using a layered set of protocols, the primary example of which is
the Open Systems Interconnection (OSI) reference model.  This is a model that was proposed
as a set of standard layers and protocols for communication between different computers
around the world and has been in use since 1983. 
Layers provide a division of the work done by a network.  Networks are set up with a protocol
hierarchy that divides the communication task into several layers.  A protocol is a set of rules
for communication within a layer.  A service is what the layer provides to the layer above it
through an interface.  Protocols at one layer are unaware of issues at another layer.

Prepared By Nitin Upadhyay 16


Open Systems Interconnection (OSI) model
OSI (Open Systems Interconnection) is reference model for how applications can
communicate over a network. A reference model is a conceptual framework for
understanding relationships. The purpose of the OSI reference model is to guide vendors
and developers so the digital communication products and software programs they create
will interoperate, and to facilitate clear comparisons among communications tools.

It divides the communications processes into seven layers. Each layer both performs
specific functions to support the layers above it and offers services to the layers below it.
The Open System Interconnection model is a seven-layer structure that specifies the
requirements for communications between two computers. The ISO (International
Organization for Standardization) standard 7498-1 defined this model. This model allows
all network elements to operate together, no matter who created the protocols and what
computer vendor supports them.
Prepared By Nitin Upadhyay 17
Benefits of the OSI model
The main benefits of the OSI model include the following:
 Helps users understand the big picture of networking
 Helps users understand how hardware and software elements function together
 Makes troubleshooting easier by separating networks into manageable pieces
 Defines terms that networking professionals can use to compare basic functional
relationships on different networks
 Helps users understand new technologies as they are developed
 Aids in interpreting vendor explanations of product functionality

Prepared By Nitin Upadhyay 18


OSI Models
Layer 1 – The Physical Layer

The physical layer of the OSI model defines connector and interface specifications, as
well as the medium (cable) requirements. Electrical, mechanical, functional, and
procedural specifications are provided for sending a bit stream on a computer network.

Components of the physical layer include:


 Cabling system components
 Adapters that connect media to physical interfaces
 Connector design and pin assignments
 Hub, repeater, and patch panel specifications
 Wireless system components
 Parallel SCSI (Small Computer System Interface)
 Network Interface Card (NIC)
Prepared By Nitin Upadhyay 19
OSI Models
Layer 2 – The Data Link Layer

Layer 2 of the OSI model provides the following functions:


 Allows a device to access the network to send and receive messages
 Offers a physical address so a device’s data can be sent on the network
 Works with a device’s networking software when sending and receiving messages
 Provides error-detection capability
Common networking components that function at layer 2 include:
 Network interface cards
 Ethernet and Token Ring switches
 Bridges

Prepared By Nitin Upadhyay 20


OSI Models
Layer 3 – The Network Layer

Layer 3, the network layer of the OSI model, provides an end-to-end logical addressing
system so that a packet of data can be routed across several layer 2 networks (Ethernet,
Token Ring, Frame Relay, etc.). Note that network layer addresses can also be referred
to as logical addresses.
This layer handles the addressing and routing of the data (sending it in the right
direction to the right destination on outgoing transmissions and receiving incoming
transmissions at the packet level). IP is the network layer for the Internet.

Prepared By Nitin Upadhyay 21


OSI Models
Layer 4– The Transport Layer

Layer 4, the transport layer of the OSI model, offers end-to-end communication between
end devices through a network. Depending on the application, the transport layer either
offers reliable, connection-oriented or connectionless, best-effort communications.
Some of the functions offered by the transport layer include:
 Application identification
 Client-side entity identification
 Confirmation that the entire message arrived intact
 Segmentation of data for network transport
 Control of data flow to prevent memory overruns
 Establishment and maintenance of both ends of virtual circuits
 Transmission-error detection
 Realignment of segmented data in the correct order on the receiving side
 Multiplexing or sharing of multiple sessions over a single physical link

Prepared By Nitin Upadhyay 22


OSI Models
Layer 5– The Session Layer

Layer 5, the session layer, provides various services, including tracking the number of
bytes that each end of the session has acknowledged receiving from the other end of the
session. This session layer allows applications functioning on devices to establish,
manage, and terminate a dialog through a network. Session layer functionality includes:
 Virtual connection between application entities
 Synchronization of data flow
 Creation of dialog units
 Connection parameter negotiations
 Partitioning of services into functional groups
 Acknowledgements of data received during a session
 Retransmission of data if it is not received by a device

Prepared By Nitin Upadhyay 23


OSI Models
Layer 6– The Presentation Layer

Layer 6, the presentation layer, is responsible for how an application formats the data to
be sent out onto the network. The presentation layer basically allows an application to
read (or understand) the message.
Examples of presentation layer functionality include:
 Encryption and decryption of a message for security
 Compression and expansion of a message so that it travels efficiently
 Graphics formatting
 Content translation
 System-specific translation

Prepared By Nitin Upadhyay 24


OSI Models
Layer 7– The Application Layer

Layer 7, the application layer, provides an interface for the end user operating a device
connected to a network. This layer is what the user sees, in terms of loading an
application (such as Web browser or e-mail); that is, this application layer is the data the
user views while using these applications.
Examples of application layer functionality include:
 Support for file transfers
 Ability to print on a network
 Electronic mail
 Electronic messaging
 Browsing the World Wide Web

Prepared By Nitin Upadhyay 25


Different types of protocols and different uses of protocol

Transmission Control Protocol (TCP): TCP is a popular communication protocol


which is used for communicating over a network. It divides any message into series of
packets that are sent from source to destination and there it gets reassembled at the
destination.
Internet Protocol (IP): IP is designed explicitly as addressing protocol. It is mostly used
with TCP. The IP addresses in packets help in routing them through different nodes in a
network until it reaches the destination system. TCP/IP is the most popular protocol
connecting the networks.
User Datagram Protocol (UDP): UDP is a substitute communication protocol to
Transmission Control Protocol implemented primarily for creating loss-tolerating and low-
latency linking between different applications.

Prepared By Nitin Upadhyay 26


Different types of protocols and different uses of protocol

Post office Protocol (POP): POP3 is designed for receiving incoming E-mails.


Simple mail transport Protocol (SMTP): SMTP is designed to send and distribute outgoing
E-Mail.
File Transfer Protocol (FTP): FTP allows users to transfer files from one machine to
another. Types of files may include program files, multimedia files, text files, and
documents, etc.
Hyper Text Transfer Protocol (HTTP): HTTP is designed for transferring a hypertext
among two or more systems. HTML tags are used for creating links. These links may be in
any form like text or images. HTTP is designed on Client-server principles which allow a
client system for establishing a connection with the server machine for making a request.
The server acknowledges the request initiated by the client and responds accordingly.

Prepared By Nitin Upadhyay 27


Different types of protocols and different uses of protocol

Hyper Text Transfer Protocol Secure (HTTPS): HTTPS is abbreviated as Hyper Text


Transfer Protocol Secure is a standard protocol to secure the communication among two
computers one using the browser and other fetching data from web server. HTTP is used
for transferring data between the client browser (request) and the web server (response) in
the hypertext format, same in case of HTTPS except that the transferring of data is done in
an encrypted format. So it can be said that https thwart hackers from interpretation or
modification of data throughout the transfer of packets.
Telnet: Telnet is a set of rules designed for connecting one system with another. The
connecting process here is termed as remote login. The system which requests for
connection is the local computer, and the system which accepts the connection is the
remote computer.
Gopher: Gopher is a collection of rules implemented for searching, retrieving as well as
displaying documents from isolated sites. Gopher also works on the client/server principle.
Prepared By Nitin Upadhyay 28
E-Mail
Short for electronic mail, e-mail or email is information stored on a computer that is
exchanged between two users over telecommunications. More plainly, e-mail is a message that
may contain text, files, images, or other attachments sent through a network to a specified
individual or group of individuals. The first e-mail was sent by Ray Tomlinson in 1971. By
1996, more electronic mail was being sent than postal mail.
There are a number of advantages of e-mail and the usage of e-mail versus postal mail. Some
of the main advantages are listed below.

Free delivery - Sending an e-mail is virtually free, outside the cost of Internet service. There
is no need to buy a postage stamp to send a letter.
Global delivery - E-mail can be sent to nearly anywhere around the world, to any country.
Instant delivery - An e-mail can be instantly sent and received by the recipient over the
Internet.
File attachment - An e-mail can include one or more file attachments, allowing a person to
send documents, pictures, or other files with an e-mail.
Long-term storage - E-mails are stored electronically, which allows for storage and archival
over long periods of time.
Environmentally friendly - Sending an e-mail does not require paper, cardboard, or
packing tape, conserving paper resources.

Prepared By Nitin Upadhyay 29


Components of E-Mail
The main components of an e-mail system that facilitate sending and receiving of e-mails on
Internet are :
 An e-mail client
 An e-mail server (SMTP server)
 POP and IMAP servers.

An e-mail client
Email client primarily is a desktop application that enables users to receive and send emails
directly on their desktop. Typically, email client requires an email address to be setup and
configured before user can start using email service. These configuration and settings
generally include email address, password, POP3/IMAP and SMTP address, port number,
email aliases and other related preferences.

Prepared By Nitin Upadhyay 30


Components of E-Mail
If we use e-mails for online communication the we would definitely be using  an e-mail client.
An e-mail client provides we with the following capabilities :
 Provides a list of messages that people have sent to us. Each entry in the list contains the
name of sender, a subject, a few words from the message body and the time/date on which
it was received.
 Provides the ability to read a complete message, reply to it or forward it to other people.
 Provides the ability to compose a new message and send it to the desired recipients.
 Delete a message.
The e-mail clients could be standalone (like Microsoft Outlook, Pegasus etc) or could be web
based (like gmail, yahoo etc). There could be many advanced abilities that e-mail clients may
provide but whatever the type of e-mail client be, the core abilities described above are
provided by all type of clients.

Prepared By Nitin Upadhyay 31


Components of E-Mail
An e-mail Server
Whenever we send a message from our e-mail client, it goes to an e-mail server. The e-mail
server manages the messages received by it. It forwards the message to a POP or IMAP service
if the message is to be sent to a recipient on the same subnet else it follows the standard
procedure to send the message over Internet to the destined person.
An e-mail server comes into the picture twice if e-mail is sent over Internet to a remote
destination. First it’s the sender’s e-mail server that sends the e-mail over the Internet and
second is the receiver’s e-mail server that receives the e-mail and makes sure that it is
delivered to the recipient’s system. On the other hand, an E-mail server comes into picture
only once when the recipient is on the same subnet.
SMTP servers are widely used as e-mail servers all over the internet. An SMTP server is also
known as Mail Transfer Agent (MTA).

Prepared By Nitin Upadhyay 32


Components of E-Mail
An POP and IMAP servers.
These servers come into the picture when a message is received by SMTP server and it needs
to be forwarded to the actual recipient. 
POP Server
POP stands for Post Office Protocol. A POP (or POP3) server in it’s simplest form stores the
messages for a particular user in a text file. The file for a particular user is appended with
information each time an e-mail is received by a POP server.  If our e-mail client is configured
to use a POP3 protocol then whenever we try to fetch e-mails through our e-mail client then a
request is sent to our POP server for the same.
A POP server requires the log-in credentials of a user that are sent through e-mail client. Once
a user is authenticated, the POP server provides access to user’s e-mails.  As with any client
server architecture, the e-mail client interacts with the POP server through a predefined set of
commands like USER, PASS, LIST, DELE & QUIT.
Prepared By Nitin Upadhyay 33
Components of E-Mail
IMAP Server
IMAP stands for Internet message access protocol. This protocol is also used to access e-mails
but it is far more capable than POP. One of the most prominent feature an IMAP server
provides is the central access to e-mails. Unlike POP server, an IMAP server keeps the e-mails
on the server itself and so we can access e-mails from any machine or device.
This server also provides easy management of e-mails like searching, categorizing the e-mails
and placing them into various sub-folders etc. The only problem that one could imagine with
IMAP server is that we always need an Internet connection so that the e-mail client is able to
fetch e-mails from the IMAP server. But today, almost all of the e-mail clients have the
capability to cache the e-mails so that we can even view them when we are offline.
To interact with IMAP server, the e-mail client connects to server machine on port 143. As
with POP, IMAP server also understands a set of commands which the e-mail client uses to
connect with the server.
Prepared By Nitin Upadhyay 34
How e-mail system works
With the understanding of all the major components used in e-mail system, lets connect the
dots and understand how the whole e-mail system works:
 An e-mail client like Gmail, yahoo, outlook etc is used to create or reply to an e-mail.
 Once the e-mail is drafted successfully, it is sent using the e-mail client.
 This e-mail first goes to the SMTP server (also known as MTA (Mail transfer agent) ) to
which the e-mail client is connected.
 The e-mail server looks out for the recipients address. The address is of the
form <name>@domain.com
 The e-mail server first uses the DNS technique to resolve the domain name into a valid IP
address.
 Next it sends the e-mail to to this IP address over the Internet.
 Now the e-mail traverses over the Internet in a series of IP packets and reaches the
destination SMTP server or the MTA.
Prepared By Nitin Upadhyay 35
How e-mail system works
 This server collects all the e-mails and places them to appropriate location so that these are
accessible to our e-mail clients through POP or IMAP services.

Prepared By Nitin Upadhyay 36


File Transfer Protocol
File Transfer Protocol (FTP) is a standard Internet protocol for transmitting files between
computers on the Internet over TCP/IP connections.
The role of FTP protocol
FTP protocol defines the way in which data must be transferred over a TCP/IP network.
The aim of FTP protocol is to:
 allow file sharing between remote machines
 allow independence between client and server machine system files
 enable efficient data transfer

Prepared By Nitin Upadhyay 37


File Transfer Protocol Model
FTP protocol falls within a client-server model, i.e. one machine sends orders (the client) and
the other awaits requests to carry out actions (the server).
During an FTP connection, two transmission channels are open:
 A channel for commands (control channel)
 A channel for data

So, both the client and server have two processes allowing these two types of information to be
managed:
Prepared By Nitin Upadhyay 38
File Transfer Protocol Model
 DTP (Data Transfer Process) is the process in charge of establishing the connection and
managing the data channel. The server side DTP is called SERVER-DTP, the client side
DTP is called USER-DTP
 PI (Protocol Interpreter) interprets the protocol allowing the DTP to be controlled using
commands received over the control channel. It is different on the client and the server:

 The SERVER-PI is responsible for listening to the commands coming from a USER-PI
over the control channel on a data port, establishing the connection for the control
channel, receiving FTP commands from the USER-PI over this, responding to them
and running the SERVER-DTP.
 The USER-PI is responsible for establishing the connection with the FTP server,
sending FTP commands, receiving responses from the SERVER-PI and controlling the
USER-DTP if needed.

Prepared By Nitin Upadhyay 39


File Transfer Protocol Model
When an FTP client is connected to a FTP server, the USER-PI initiates the connection to the
server according to the Telnet protocol. The client sends FTP commands to the server, the
server interprets them, runs its DTP, then sends a standard response. Once the connection is
established, the server-PI gives the port on which data will be sent to the Client DTP. The
client DTP then listens on the specified port for data coming from the server. 
It is important to note that since the control and data ports are separate channels, it is
possible to send commands from one machine and receive data on another. So, for example it
is possible to transfer data between FTP servers by passing through a client to send control
instructions and by transferring information between two server processes connected on the
right port.

Prepared By Nitin Upadhyay 40


Telnet
Telnet is a protocol that allows we to connect to remote computers (called hosts) over
a TCP/IP network (such as the Internet). Using telnet client software on our computer, we can
make a connection to a telnet server (i.e., the remote host). Once our telnet client establishes a
connection to the remote host, our client becomes a virtual terminal, allowing us to
communicate with the remote host from our computer. In most cases, we'll need to log into
the remote host, which requires that we have an account on that system. Occasionally, we can
log in as guest or public without having an account.

Prepared By Nitin Upadhyay 41


HTTP & HTTPS
HTTP: Http stands for Hyper Text Transfer Protocol. It allows World Wide Web users to
transferring information like image, text, video, music, graphic and other files on web pages.
Http is basically used to access html pages and also other resources can be accessible using
HTTP.  
HTTP is a request-response protocol in the client-server computing model. When we enter
http:// in front of the address tells the browser to connect over HTTP. For example, when we
enter a URL (http://www.abc.com) in our web browser, this sends an HTTP command to the
Web server to fetch and transfer the requested web page. Here, our web browser is our client
and our website host as a server.
HTTPS: HTTPS stands for Hypertext Transfer Protocol Secure. HTTPS is a protocol which
uses an encrypted HTTP connection by transport-layer security.
Sometimes, the clients may be exchanging private information with a server, which needs to
be secured for preventing some hacking issue. For this reason, HTTPS was developed
by Netscape Corporation to allow authorization and secured transactions.
Prepared By Nitin Upadhyay 42
E-Commerce

E-Commerce is an area which is used in various fields of business like wholesale, retail
as well as manufacturing unit. E-Commerce is a subset of the e-business that concerns
commerce. The activity of the exchange of goods and services with some or the other
kind of payment methods can be intended as commerce. E-Commerce world is an
application of information sharing among business trading basically online commercial
transaction with clients. Ecommerce is categorized into six major types they are:
1. Business-to-Business
2. Business-to-Consumer
3. Business-to-Administration
4. Consumer-to-Consumer
5. Consumer-to-Business
6. Consumer-to-Administration 

Prepared By Nitin Upadhyay 43


E-Commerce Applications
Retail and wholesale: E-commerce has a number of applications in retail and
wholesale. E-retailing or on-line retailing is the selling of goods from Business-to-
Consumer through electronic stores that are designed using the electronic catalog and
shopping cart model. Cybermall is a single Website that offers different products and
services at one Internet location. It attracts the customer and the seller into one virtual
space through a Web browser.

Marketing: Data collection about customer behavior, preferences, needs and buying
patterns is possible through Web and E-commerce. This helps marketing activities
such as price fixation, negotiation, product feature enhancement and relationship with
the customer.

Finance: Financial companies are using E-commerce to a large extent. Customers can
check the balances of their savings and loan accounts, transfer money to their other
account and pay their bill through on-line banking or E-banking. Another application
of E-commerce is on-line stock trading. Many Websites provide access to news, charts,
information about company profile and analyst rating on the stocks.

Prepared By Nitin Upadhyay 44


E-Commerce Applications
Manufacturing: E-commerce is also used in the supply chain operations of a
company. Some companies form an electronic exchange by providing together buy and
sell goods, trade market information and run back office information such as inventory
control. This speeds up the flow of raw material and finished goods among the
members of the business community. Various issues related to the strategic and
competitive issues limit the implementation of the business models. Companies may
not trust their competitors and may fear that they will lose trade secrets if they
participate in mass electronic exchanges.

Auctions: Customer-to-Customer E-commerce is direct selling of goods and services


among customers. It also includes electronic auctions that involve bidding. Bidding is a
special type of auction that allows prospective buyers to bid for an item. For example,
airline companies give the customer an opportunity to quote the price for a seat on a
specific route on the specified date and time.

Prepared By Nitin Upadhyay 45


Client / Server Architecture
2- Tier Architecture: 2-tier architecture is used to describe client/server systems in
which the client requests resources and the server responds directly to the request,
using its own resources. This means that the server does not call on another
application in order to provide part of the service:

Prepared By Nitin Upadhyay 46


Client / Server Architecture
3- Tier Architecture: In 3-tier architecture, there is an intermediary level, meaning
that the architecture is generally split up between: a client, i.e. the computer, which
requests the resources, equipped with a user interface (usually a web browser) for
presentation purposes; the application server (also called middleware), whose task it is
to provide the requested resources, but by calling on another server; and the data
server, which provides the application server with the data that it requires:

Prepared By Nitin Upadhyay 47


Assignment Questions
Q. Define the term Internet.
Q. Explain About the Protocols used in OSI Model.
Q. Compare Web servers with Web Clients .
Q. Write short Notes on – Intranet / Extranet / Email.
Q. Develop an E-commerce application to enable users to do online shopping.
Q. Write the advantages of E-commerce.
Q. Write the importance of OSI Model.
Q. What is a Client Server Architecture? Site with a diagram.

Prepared By Nitin Upadhyay 48

You might also like