Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
100%
(1)
100% found this document useful (1 vote)
196 views
16 pages
The Internet and It's Application
No Description
Uploaded by
Mkp Bijit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save The Internet and It's Application For Later
Share
100%
100% found this document useful, undefined
0%
, undefined
Print
Embed
Report
100%
(1)
100% found this document useful (1 vote)
196 views
16 pages
The Internet and It's Application
No Description
Uploaded by
Mkp Bijit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save The Internet and It's Application For Later
Share
100%
100% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save The Internet and It's Application For Later
You are on page 1
/ 16
Search
Fullscreen
CHAPTER 6 The Internet and its Applications (including HTML) Topics Covered 61 6-3 6-13 6-16 | hes, set up to serve the needs of the individual fhe hardware technology appropriate to its need to set apie lof decades, technology developed to make it possible to: iem work as a coordinated system. and uses some common conventions, se diverse networks to form a Wide Area. dual groups to use whichever network same time to communicate with computers focal area networks and make th internetworking technology nologies, to connect the. technology thus allows indivi = ¢ hardware techi their needs and at the Tis a global Wide Area Network, ng varied types of 9 client-server approach to share nformation tr consisting of a massive collection sub-networks with a distributed mesh technology. It uses Fesources located on these sub-networks. The Internet uses. avelling in packets across a network that consists of multiple uon. Networks are interconnected by routers, which forward packets to their sh topology provides redundant links. If a link fails, packets are routed along the Internet thus millions of people can communicate over any distance, ™m anywhere in the world, and publish text and images instantly. as we know it today is the outcome of a military undertaking. The Pentagon's Research Project Agency (ARPA) funded the creation of a network called ARPAnet in the development of this network was to create a EEG, is damaged from an attack, the packets can takes diferent route aogier a ocol suite was developed for connecting the ARPAnet 3 communication. ARPAnet allowed engineers and scientists working on er America to share computers and computer resources. To facilitate ApPAnct was first used by organisations having US government secur = costae projects Tin 197, the ARPADet pt merged th vi called the Usenet News. This combined network later came to atemsc computer ; computers started decreasing farther helped the growth of the Internet. ee*) Standard bodies of the Internet: Who owns the Internet? No pers or entity owns or Velope wa ake eng t aunty Aineticnt Cs ageneies, fest by ARPA and then by NSF National Science Foundation) The adjacent figure indicates the ditterer pny Srkanixations and committees that prescuty A ae wersee the Internet. In general the IETF torn erie ter working groups to develop specifications, whic! are evaluated by IESG in conjunction with the mate TAB. A volunteer organisation called 180C ii (Internet Society) controls the future of the did Internet. It manages the various organisations and standard setting procedures and publishes the new standards, Web standards are announced by the WSC (World Wide Web Consortium) In 1999 InterNIC (Internet Network Information Centre) was established with funding from NSF, {or managing the top level Internet domain names. Later in 1998 a non-profit organisation | called ICANN was formed to look after the operation of the Internet. InterNIC is no longer in service and domain name registration is now done through a number of organisations. While | ICANN is responsible for IP address allocation policies, the actual management of IP addresses is handled by different registries. ICANN allocates blocks of IP addresses to Regional Internet Registries (RIRs), The RIRs then further allocate blocks of addresses to local Internet registries within their geographic regions. Finally the local registries assign addresses to the end user Provides customers with access to the and provided connections into the Internet forfp aieente Cl Co The Internet, and its Applications connecting to the Internet through an ISP connect { inet by dialling into an Internet Service Provider's (ISP) computer or by a Mig connect directly to the Internet direct access, connect to the Internet using a dial-up ection and a modem, which is cost effective and easy to install. |. pial-Up-Connection the most common and cheapest way to connect to the Internet. It as telephone line, a modem, and special ISP-provided software. Using a : cations method called Point-to-Point Protocol (PPP), the modem establishes a to the Internet by contacting the ISP DSL (Digital Subscriber Line): DSL uses regular telephone lines to provide a high-speed access ¢ Internet. Its the latest modem technology that allows the transmission of digital data wisted Pair wire at speeds ranging from 64Kbps to several Mbps. With the help of a ” dem (an ADSL modem), DSL transfers information across regular telephone lines in format, allowing the user to be online and talk on the phone at the same time + cable Connection: The coaxial : ‘ables used with cable television can also be used to connect to ‘¢ Internet. This is done using cable modems that can send and receive information at very speeds, A cable modem requires no dialling and the user can get a 24 hour connection. ¢ signals have a bandwidth of 36Mbps to 48Mbps. One disadvantage of cable Internet ss is the problem of shared bandwidth. Therefore if 100 subscribers are sharing a 48Mbps nel, then the effective download bandwidth for each subscriber will be 480Kbps. + Satellite and Wireless: Some ISPs provide Internet access through satellite dishes they supply the subscribers, Both these options are rather costly because of their fees and equipment. + Direct Connection: With a fixed cable or a dedicated phone line like an ISDN connection, one an directly connect to an ISP. Higher capacity dedicated lines like T1 (1.28Mbps) and T3 lines (45 Mbps) can also be used for faster connection. When using a direct line, instead of using a modem, a router is used to connect to the Internet. 6.2 Some Services Pro’ led by the Internet uularity of the Internet is due to the various services it provides. These services are used by m different walks of life. Some of these popular services are discussed below. ps the most important use of the Internet is to exchange mails. Electronic mail was originally designed to allow a pair of individuals to communicate via computers. Initially only text messages could be sent. Over a period of time software was developed to also send multimedia messages with colour, various fonts, and images. Like other Internet applications e-mail also uses a client-server approach. Here the e-mail user runs client software to connect to the mail-server of the e-mail service provider to send mail to or receive ail from another user. icture of an E-mail: An email basically consists of two parts. se are the email header and email body. nae ake information that includes the sender's email address, one : receiver email addresses, the date of sending the email, the Subject field etc. The body contains the actual e-mail’s content. _ E-mail addresses: Just as a normal letter needs the postal the mail to the correct address, similarly an e-mail sho message routing. Address format for an email has at Usii {outing portion, separated by the @ character. Th user's mailbox to which the mail is directed, and ceded to route the message to the particular mail itis of the form User_Name @ main_t entifies the user from the place todebrup.bh @ yahoo.co.in tells the ¢ mail program that the mai Por eeample the email adder A nec named debrup bho whose maitbox is located in iter with the « Types of email services \ teing email client program thie type nf service ses one among many email client enfiware available ike Eudora Microsoft Outlook, ete to create, eend, receive, and forward ails the interface provides an Inbor fo store the incoming mails, an Outbox to temporarily store the outgoing mails and a Bent Maile folder to view the mails already sent. There can also be a Drafts folder where the \iser can save temporary mails before sending them, Once the send /receive command is executed, mails downloaded by the client ean be stored in the hard disk of the user computer for future use, Hence the user can also work off-line to view the downloaded fails, Multiple mails can also be composed off-line and then sent together after making a Connection, Personal address books and contact lists can be maintained by such an e-mail cliesit software, The figure above shows the Microsoft Outlook e-mail client interface Using Web mail: It is an e-mail service that can be accessed using a Web browser and an e-mail — service like Gmail, Yahoo! Mail, Hotmail ete. ‘The main advantage with such a mailing system is that the user can access his/her mail account from anywhere around the world with a computer, an connection, and a Web . The disadvantage withmz Insert Copy Recipient Address copy of the mail is to be sent person, then type-in the « mail ada 0 We tae Of that person in the Ce’ texte iy ae stands for curbon copy). The Reems ee 16 Name ¢ eh M mail can be sent to multiple recipient a ete by inserting their email addres the Ce textbox and separating there semicolons. You can also have « Bee option i.c. a blind carbon copy. It an email address is typed in the BCC felt then the recipients under Te and Cg a Tote cae inte lemon of will not be able to see the mites be erat lahat Taba under the BCC field in the email header hides EE PET po Type Subject: Type the subject of the | Pa0sng Conve mail in the ‘Subject’ text box to indicate L&!! to the recipient in a few words the content of the mail Asample mail composition screen showing the said textboxes is shown above, aching a File to an e- h files are known as attachments owser interface to find the file in the co1 p attach it with the e-mail » be sent along with the main message of the e-mail, ‘0 do so, click on the attachment option and use the mputer. After finding the file, click on the attach button lier ¢-mail clicnts supported only text files. Present day e-mail software allows the attachment binary files like formatted documents, spreadsheets, images, audio and video files, This iw ssible with the advent of the MIME protocol. MIME stands for Multipurpose Internet Mail tension and allows the transfer of binary files along with the text message of an e-mail. pchanism ng an e-mail: Aficr writing the mail the user has to select the Bend tion to send the e-mail to the desired recipient, Once the Send button is pressed, the following eps take place to transfer the e-mail. e-mail client software transfers message to the outgoing mail of the sender’s ISP. This nsfer is made using the Simple Transfer Protocol or SMTP with help of TCP/IP. recipient's mail address is @ address, the sender's ISP ds the mail through the Internet mail server of the at's ISP. SMTP is again used transferring the mail from 0} il server to another. The mail may to go through several mail servers fs mail received by the incoming mail server of snt’s mail-box.Part 2: Chapter © ceive! inbox of the e-mail Message: Once a mail 1s received at the inbox of U or + Roading and Replying to a Message! (1h cre are attachments, these can be download, Pay nemessage and To [the user can apen (he neh tye saved inv the user computer and opened using approprisg The attachments Ming a mail, one can reply to the mail by clicking on the Reply option, per Fag 8 a oS ete be ema prgzam automaticly ner oe mail address to a reply. ARer wating the reply press the Send button to send it. c 4 by someone using the Internet «Netiquette: The etiquette or mules to be followed by Netiquette: Tied aetiuiette. Accordingly there are a set of guidelines to be followed while using ped below: are di e-mail service. Some of these guidelin Flaming: If'« person sends a message with angry or heated content then it is known ay ged by the Internet community as it is considered rude, flaming, Flaming is usually discouray Spamming: The term spam is used to indicate unwanted commercial e-mail. Being a cheap Spammine Jmmunication, companies can send advertisement materials through ¢-mail, | Many people who receive such mails may not be interested in them. The process of sending aay petty or spamming is not allowed. Email clients have spam-filters that can be used t| filter out and delete such spam mails. Phishing: It is the process of attempting to acquire sensitive information such as usernames, _ passwords and bank and credit card details of a person by posing as a reliable sender ofthe vail {ike a fraud mail on winning a lottery). It is a criminal offence to hide one’s identity ang | pose as someone else and should not be carried out by an e-mail account holder. Don't forward chain letters or junk mail: Usually such mails are illegal and they unnecessarily fill up a user's mailbox. Protocols_used_with email: There are basically two types of protocols used for sending/ receiving e-mails. The first type is used to transfer messages between mail servers and the second type is used to retrieve the mails from mail servers by the user computer. . SMTP: The Simple Mail Transfer Protocol handles communicat : mail servers a TCP/IP network, along with the POPS proto % sending e-mail messages from one TCP/IP host used to transfer mail from an e-mail client like ISP, and also from one mail server to another.5 of using e-mail taKe’ pisadvan ie Hae + Pe mation overioad [01 hes =e p foreryf whit ts can) Be jane anally One rag ne ah hundred find out which are i, thenich are net THY APAMMIN HH evap security Risk’ fe snails ‘ine ROMEe® Of computer viruses, Vininen can rte 89 mall. fren mall Bombing |!‘ Intentional sending of » large umber of e-mails $0 particular tarpet Th my cause overloading and «aan finally lee ‘ ail Spoofing | ith when the © mail s ahered to, hen be misused ied earlier, the process in calny Trott card details, which p a 1 Phishing (pronounced fishing) Distraction: Checking and replying to +The World Wide Web (WWW): % 1 the Internet is 1 MW, which» usually referred to as the “Web” (with a capital ‘W), The Wye | : ect by Tim Berners-Lee at the physics research centre at CREM ty ‘and. it way mainly developed for sharing hypertext information over a. LLAWA_| "k: Since 1995 it has remained the number one Intemet service #urpassilig FIP * Software Component: The service consists of Web cents requesting files from Web servers. A 1 ‘s to the Web using client software like a Web Browser to access these flee, The ied browsing or surfing the Web. On the other hand, Web servers are responsible ‘trieving and distributing the requested Web files. A Web site must ‘at site. Examples of such Web servers include Apache, Sun Java System Web Server, etc. Content: The Web contains information on various subjects, stored in ‘bousands of computers around the world. These files called Web pages can contain’ 'n the form of text, audio, video, cxceuabie files, etc. The HTML lang: Gate such Web pages which are stored in special servers called tuch Web pages for a, particulat parseih ae GAmeaINBOn ‘rtd a Web Pages in a Web site, the home is the default file that ieseed. A Web page can also be linked to other related Web \rperlinks. By following these links, one can easily move from one ¢ World Wide Web© Use of the Wed for Socialising \ i Ott unline service that helps in busking mcial relations among people who ahare common interests and activities Serves the Internet. Most social network Se ik Pacebook, Twitter ete. are Web based and 5 oa users to interact over the Interne @ Mogging. A blog is a personal W a be like @inry oF Journal A person usin ates a blog to share eme's thoughts on a particular subject The sewers in turn can interactively add comment : © Use of the Wed for doing Business Huying and selling of prrehacts ie commer be rough various sites tat Gtuptay th acct we A a aed a Ges dake A eae ins hame using Web services like eBay, flipkeart ete ‘ away and Air Tickets The Web provides an easy to use interfsed to for their w “and in a queue at a booking counter + Relation between the internet and the World Wide Web: Wide Web * 5. and al @ifierence betwren them. The Inter networks In contrast. the Web is Though the Internet and the Worig sometimes used interchangeably. however there a as we know is a global system of interconnected computer ‘¢ of the services that fun on the Internet. It is a collection of ther resources. linked by hyperlinks and URLs. In short, the application running on the Internet Wed is © Riteenet Browsing Services andthe Web Browser; 0 SE An information browning service allows an individual to conveniently obtain and display information stored on a remote computer. The service uses client-server architecture, whereby 4 local computer running a browser program acts as a client to interact with a remote server + Different browwing facilities: 4 Gopher Thos is one of the earliest browsing services and uses a menu driven approach information accessible through Gopher is stored on computers called Gopher servers located ‘all over the internet. These provide access to large quantity of information using simple point fend chek methads A Gopher client application like Turbo Gopher can be used for this. Wed Browser Web browsers were developed to access and view Web Pages or HTML files published on thousands of Web servers that formed a part of the World Wide Web. The Siret graphical Web browser, Mosaic wan developed in 1993. In 1994 Netscape Communications Geveloped the Netscape Navigator Microsoft soon developed its Internet Explorer browser ‘Other Web browsers in use inchide Google Chrome, Moailla Firefox, Opera ete * Features of Web Browser: & Interface A Web browser use promded for mewing end eavigating through a document, atop tor marually sefreehing « page that loaded uwompletety To the Web, che user has to type the URL of the web site in the Browsers aise allow the user Lo move to related Web sites by pages casplayed by the browser, This is one of the most in e Page Style A Web fle can be statie, containing ASCII text can be dymamic i nature using seripting languages such as Protecel Web Lrowsers use TCP/IP tor reliable data to access & Web server and download an HTML file 4. Application Integration Over Internet software such as can also be run from a Web browser. The Web browser doing various services provided by the Internet.Faminnmanon Weis huge task ifthe user has to manually search the | Seas doen oon ts an automated search that can be used to find this 1 to do such an automated search gine te software that is use search-engil “X Search Buy software broadly consists of three a Search Bngine Automatec of keywords: and also called DOES OF a find other As web pages pages frequently, crawlers: matically visit Web sites at look — for Depending on the web the crawler prepares of the URLs, keywords ient search, The Index ks, for eff the Search Algorithm: When a user submits a search, the search engine uses a special ) to go through the index to find web pages with matching keywords. The played in order of importance. er has to first type the URL of the search service provider in the browser the browser program obtains a copy of the search service provider's eb page provides a text-box where the user has search alge dar. In response, age (like the home page of Google). The W © topic to search and then press the search button. fware in the computer then requests the search service to find web pages having the requested topic. It uses string matching techniques to sclect Web pages containing a Stang similar to the requested topic. It then returns a Web page displaying a list of URLs containing hyperlinks to the desired search topic. The user can then select an URL from the search list to display the required web page on the search topic. The client Listed below are the URLs of some search service providers. AltaVista at http://www.altavista.digital.com Yahoo at http://www.yahoo.com Lycos at http://www.lycos.com Google at http://www.google.com Advantages: is helpful when the user wants to view a Web page on a particular topic a, Automated Search ¢ but is not aware of any URL to the Web site. b. Knowing a particular URL, a user can browse through a particular site only. An automated search on the other hand produces a list of sites to choose from on the same topic. search criteria involving Boolean operations (like AND, OR) to get c. One can use complex specific search results. d. One can search for text files, multimedia files and images using an automated search. . Newsgroup service was developed by people at universities and colleges as umunication, well before the development of the Internet. At that time they ‘to the military. Hence they developed a netwo {short for “user network”) to share available as an Internet servicet Part 2: Chapter 6 der software, which is @ Program thy access a newsgroup, the user has to first obtain newsrea can communicate with Usenet vccept that instead of being received by an individual, o emails, EXCEPE then read that message and respond to i, in board. Anyone can posted subject, To take part in a discussion the user has to firg Newsgroups are simile message is posted to « bullet leading to a discussi subscribe to a newsgroup * Types of Newsgroups: be eitht 2 Moderated Newsgroup: In sent to the newsgroup moderator, messages depending on their relevance moderated or un-moderated in nature. such newsgroups, all messages posted to the newsgrouP ate fire ee tgereens the messages and accepts OF rejects to the particular newsgroup’s activities. s are generally free-for-all, although ethically b> Un-moderated Newsgroup: Such newsgroup: y b . Too ple, no-nonsense messages related to the newsgroup's activities the form of major subjects, separated into 's, recreation etc. Several of these soc, computers as comp, etc. An which is an alternative group that wuld post 01 Newsgroups are organised in subcategories. These include science, society, computers, new: ted science being written as sci, society as example of a USENET newsgroup can be alt.books.computing, discusses books on computing Online communication programs called chat programs were developed in the late cighties to facilitate communication between people working on similar projects in different research organisations. These programs allow the users to send and receive text-based ‘messages using the Internet in real-time. = ‘Types of Chat Services: The following types of chat services are available: Internet Relay Chat: This chat service began in 1988 and allowed thousands of Internet users to participate in real-time text-based chat. There are various IRC programs that can be used for the service, like mIRC, Microsoft Chat etc. Users usually have to type commands to participate in an IRC chat. Web based Chat: This type of chat service is accessed through a Web browser. Here users do not have to remember commands and can work using a graphical interface to send and receive IRC messages. The Yahoo! Chat site is an example of such a service. Direct Chat / Instant Messaging: This type of service allows two persons to chat when both of them are online. Using this service, the user first has to create a list of persons with whom he wants to chat. When one of the persons in the list connects to the internet, the direct chat program automatically informs the user garding this and they can start to exchange messages. The interface of Google talk direct chat service is shown on the right. Software Requirement: Internet chat uses Internet chat client software io connect to an Internet chat server. The client software then allows a user to chat with another one who is using the same sofware, by typing some comment in one window and receiving replies in another. Listed below are the URLs of some popular chat / messenger service providers: at chat.123.comeste Cheer a The Inte ain Het, aa i, vcneral, to use achat service the user * APplcat tn gener has to first 1 ona ration: Ih BS a client, using the Internet. The soft peister with operation toxin oftware o ea + Sood | ow in or that the user #8 online and can send and rece, Seve prowinct Setvce pains the oT fe messages °F in tam inca panect to an existing chat group (also called chat room) ang saers a8 COMMELT in the OUP, OF can eFeate thelr own chat roome fr wey MESNAEs ae ‘ate discussions. sions, 2 im keeps track of the users who are logged-in to the ch fon is over, the user logs out of the service °7™S 44 those who othe! c chat POEM ace rosie nt age! + agvantAe” 4 user can receive data almost instantly after it has been transmit ._ Using CIN" dogsion can be established between the users. fed and an interact gifferent types of data like text, voice, files or even URLs can be sent p mode of instant eommunieation between distant places. jase cheat Differences between Email and Chat Chatting is similar to conversation. «cession is not possible when using | 2. An interactive session can be established Ree | using chat services. an emai ___—}- chat services, __ video cannot be sent using email. | 3. Using a web-cam online video can be sent Online | and eee 4. One has to be online throughout the session Email can be composed both online and offine. service used to interact over the Internet. It helps in social networking service is an online . : A sion social networks among people by allowing users to share ideas, activities, events, and interests within their individual networks. + operation: To access a social network service, the user can open the Web site of such a service fh them. Once registered, the user can log-in and create his/her own provider and register wit rote under the service. The profile can contain various information and uploaded pictures for others to read, photo albums etc. The service can be used about the individual, blog entries to find users with similar interests, and compile and share lists of contacts. There is also a section for expressing comments and messaging by other users. To protect user privacy, social networking services allow users to selectively choose list of contacts. * Software Component: Various dedicated Web based social networking services are available that can be accessed using a Web browser. A list of some popular sites are given below: MySpace at www.myspace.com Orkut at www.orkut.com Facebook at www.facebook.com ‘Twitter at www. twitter.com * Advantages: © Comm ‘unication with Old Friends: A social network can be formed between ex-students of an edu | contac onal institution like a school or a college. These networks then help to maintain ‘em after passing out from the institution. >. Education: : Such a networ to answer rk can be used as a communication t ‘ueries or discuss topice tach a cho ion tool by teachers and students isa ‘tons can create profiles to advertise products and services through « Such networicy a Desineas kas Jn Plena ‘working can be maintained between different business partners. os pats can use the services to network withMPA Vantng | 8 Dinetiee Pern yal Hts AURUEHAT Hetieitte Hint cot ie anidenanal hw ot es 7 i msibiiiees * n i | VIFWE THreAt Herel theae ariviene alan need to be aware of virus attacks | | Renettienat Atume o Hitler tivdividiiinte Suiety Hnetworldie site can he used eccasie Hohe are referred to ae trotting ly 10 emotionalh | YY aby | 1Y ay | ANY ARON OF privMeY Hoa: OMA Katia Hatitionat aeniva t We silor ot electiaiic aitee ate artvices that ate available online 24 hours and 7 days a week. Then Htain a great deal of data that can be diffeyy . | iit rt re Tend to a of pa | sie | Ate vation au morvicee Thi cater to nlllities like. e-commerce, e-learning, e-govere’ | © Winking. e tnaetvattione etc Nome af then aervices are discunsed below: “| * BEommerse H sowie deals wilh purchasing vartous goods through the Internet usp awe protocols electronic payment services, Most electronic commerce involves tht online Iiyiigc or eelting ef some physical itema in some way, However, it can also involve some | e-counselling, ¢-reservations, ete, through the Wey Dopending spn the Lype of business conducted over the net, there can be three different type, ot Hansaeti Premiuny services Hike 6 leanaity sae stated below one oF BAB: This type of e-commerce is conducted between businesses, | Hane company buys from oF sells to another company | enn to-Consumer or BC; Electronic commerce that is conducted between businesses aninations and consumers is referred to as business-to-consumer or B2C. Examples of | atich services inelide Amazon.com, where there is no intermediary service involved © Digital Middleman: Here the transaction takes place through an intermediate entity, Here a pany lists products by some other companies in its Web site. This helps the consumer ty compare products from various companies through the same site and make the best purchawe. Example of sites providing such services include eBay, flipkart etc, The URLs of some e-commerce sites are listed below: Attpi//www.amaxon.com http://www.eBay.com Nttpi//www.fabmart.com ‘http://wow.flipeart.com * E-Governance: Electronic Government or e-Government is an online interaction between & government and various other entities through the World Wide Web. Depending upon the type of the entity involved, there can be the following types of interactions: 4. Government-to-Citizens (G2C): Involves interaction between a government and its citizens. \sinosses (G2B): Involves interaction between a government and various business agencies doing business with the government. Government-to-Government agencies (G2G): Involves interaction between a government and various other government agencies working for the government . BI Virtual Classrooms: E-learning basically involves imparting edueation usiag aoeteetronte means, One ran use various delivery methods like e-mail, Web-sites, a conferencing, etc. to impart learning material. Using satellite communication and the Web can also create a virtual classroom similar to a normal one. The only difference being that ft feucher delivers the lecture online. Such methods usually use interactive sessions where learner can learn at his/her own pace. se ‘The URLs of some e-learning sites are listed belox somone ee ttp://www.yoknowledge.com pa.4.12aking: Banking transaction that ¢, The teen + eae banking. Such type of online eeee,PIMC® through 4 : rae ee feb ste The hank ogee wah at toss 4 Sing e-banking there is no nec 2D and prope uatoer toe aig account grement of accounts can also be ont, Dank in pore wos to one mone) Brg any time of the day, even outside ete online, aise’ 2 fone a ide nc reservations: Reservations in railways, aero mov’ ently find out the availability of seats, and ine Te8ervation conve? eee and compare the ence providers before making any purchase. There is me nee Service ecessary time in procuring ticke ind unnece procuring tickets, After resermar rout of the reservation slip as a valid document fee P We eee mca tsts | et is th growing network that provid | &y The Internet P 'S various facilities to its | in the previous sections. However transactions on the Users as we have wer{he Internet are mainly of two types. These are spying and destruction ert), NEM | o taing into your computer and obtaining sensitive information, wire ee Pes impics | i struction means | shaking the computer inoperative. i ae 5 sania SIMA Reasons for Intrusion: ease | internet intruders work by using software that randomly select an IP address and try to connect | " having that IP address. If the att er : 7 ect | Reaso to the computer having tha e attempt , then the software moves to the next | Intruy adress and so on. If an attempt succeeds, then the software has full control of the target | computer and its contents. The user of the computer remains unaware of this, as the process | takes place in the background. The intruder can do any of the following things, cither with a | specific purpose in mind or just for fun, after taking over the control: + Send executable files containing viruses to your computer. | * Rename or remove files that run during booting of a computer and hence hamper booting. —_| * Copy user’s documents back to their own computers to retrieve personal /confidential data. | * Senda large number of files to fill up the storage space of the computer. | * Methods of Protection: ‘ network should be secured from both insider and outsider attacks. Apart from an outside attack, a person from within an juansation may not be fully trust worthy and can leak out teat and confidential company information. To take care of various methods of security control can be implemented AE Aa pRReS sat a ‘ndividual Host Security This primarily deals with outside dealing Cn idividual computers. The most important way of cient such a threat is to use passwords. Each and Passwords gin the Retwork is given a password. These combinatie ould be chosen with care and should ideally be a The more ot of alphabets and digits and of a proper length. break that omplicated a password, the more difficult it is to b Ue. t password, of ig ‘en ema Placed A computer firewall is a combination of software and hardware an internal network from attacks from outsiders on the ternal network and the external Internet. It allows anyAdvantages of using « Firewall: * Block specific website access The administrator can block aevess to vartous website on the IP address of the full URLs of (hose sites ket filtering (0 by allowing Un secure eternal Network network ox based cata! + Content filtering, A firewall can do pac Dlock @ particular site based an its content some packets while blocking certain other packe 1 networks: Unwanted Trepecific sites CAN So Internal Network * Restricted access to internal access to the internal network fo be blocked by controlling the IP add + Protection from insecure services [iy {! @ firewall can be used 0 certain unse Network File Service (NI som iresses of those sit tering § afe services, like ). from availing the network Disadvantages of using a firewall: ; Since s placed at the entry point to * Selective access not possible: Since the firewall is P . network, if a particular URL is blocked, it gets locked globally for all users in the network, firew: ack a service that the user desperatey = Restriction of desirable services: A firew all may blo a service U th a aoe aennly ised services like Telnet, FTP, and NFS may get blocked. ess. Most | | | | needs to ace Use of Proxy Server: A proxy’ server is a programs that sits Ligecen an internal network and the external Internet peed of communicating with each other directly, the client Computer of an internal network communicate with an external Seen the internet via the proxy server (refer diagram) electively grant access to the Internet. For thi {maintains a table, isting all the users and their related permission settings. When a client in the internal network tries to access any site on the prcrnet, the request first goes to the proxy server. The Proxy server then scans the request dnd communicates with the Internet server. The Internet server in turn sends the requestel fle to the proxy server, which then forwards it to the internal client. rhased on the type of activity, there are various types of proxy servers like Proxy Web Sens, Proxy Telnet Server, Proxy FTP server etc. [A proxy server can § Advantages of using a Proxy Server: a Grants Internet access selectively: It acts like a guard and gives Internet acc selectively to the computers of the internal network based on individual or group The administrator can configure a group of users and allow only members in that group ® access the Internet. © Blocks specific services: It blocks access to services on the Internet that the syste? administrator does not want the internal users to avail. «Track individual Internet usage: As a proxy server works on individual user basis, it track Internet usage by each computer in the network, + Hides user identity: It hides the real IP address of the user from the rest of Internet. Disadvantages of using a proxy server: + It provides no protection from insider attacks. + It does not provide packet filtering «It may not support all TCP/IP application protocols. The best mode of protection can be imy i plemented by putting a firewall proxy the same network. The proxy allows only the authorised users of the nt access the Internet, while the firewall prevents those authorised users fr are blocked by the administrator.cography: CHYPIORTAPhY has become fe sccunty and prvacy. Firewalla use tnoieh® mont i networ’ curity mechanism. Using crypt {hese cryptogr ext or clear text, is encrypted text, also called etpher xt AL the reeeiving end the cipher to plaimtext_and presented to the destinwige This process 18 called deeryption. Rae" the message correctly, both sender and have a common rule or. ke. crypting ae “concept of KEYS #8 Very important to cryptography. A ret value that a computer uses along with natical rules to enerypt or decrypt basically two types of key based hms. Conventional cryptography uses a Seeret Key se ne same key is used both for the encryption and Geeryption. Example includes IBM's Data Encryption wee igre DES) algorithm. In Public Key cryptography, differe nt keys are used for | cryptography algorithm, coptography is used in vanous applications like digital signatures, digital certificates snure e-business, secure IP applications et Mat are Computer Viruses? |; computer Virus 1S basically a program that is made to cause any femnted harmful event in a computer. It is usually disguised as ng else so that the user does not recognise it as a virus s is designed to replicate itself and spread to other tne on the same computer or in other computers through the network emmi Viruses can affect a computer in a number of ways. These can erase data, change program files, change system files, or cause severe damage to operating system files to make the computer useless. RSA is an example of using public key CERI Yaar 1 staff are healthy eno Vinuses can come in a variety of forms and cause a variety of damages _|its the computers that k puter system. Some of the very common virus types are: getting a virust j ough,| | ep | | + File Infector Virus, This is the oldest form of virus. These attach themselves to program fies and launch themselves when someone launches the program. These viruses mostly use com & exe files as their carriers. When a user runs such a program, the virus gets activated. | * Macro Virus: Macro viruses are usually associated with Office documents and launch | ves when the document file to which they are attached is opened. At that point they Y out their damaging tasks and replicate themselves into other documents. ar * Boot Sector Virus: A boot sector virus places its code in the boot sector of the master boot feord of a hard drive. During start-up, when the computer executes instructions from the bet sector files, the virus launches itself. It stays in the memory and can hamper basic ‘computer operations. It can replicate itself to other drives in the computer also. Trojan Virus: A Trojan is usually a program that disguises itself as a normal helpful but in fact is a virus, It is not always an easy job to remove the damage done by @ ven after removing it using an antivirus program, one may need to change the ‘Non done to the registry or file system to make the system fully functional again, Trojan. B) * Worms ‘aie! fon BE Af virus programs designed to infect metworks such as the Internet. They ‘he Way. Worms na worked Computer to another and in the process replicate themselves Usually come as e-mail attachments. 3art: 2! Chapter 6 - a. The S Program usually has two main components, These detec tine: The virus engine is the actual executable program that is re: ting and cleaning a system from viruses, The On-Access component of the eg 88 a background process all the time when the computer system is working to Check a file for virus infection The Scanning component is responsible for the files in a computer for viruses. The process can be automatic or manually set —— . The Virus Information Database. This is a database that contains an updated tig viruses. It also contains a list of various markers which can be used to detect a ving When a file needs to be opencd, the antivirus program usually scans the file before allowing. Operating system to continue with the opening, While scanning, the following steps are carried oat . * The contents of the file are matched against the information in the virus database, 1 fg the signature of a particular virus * Any suspicious file property, like an unusual increase in file size, is checked * Any suspicious behaviour of the file is analysed When the software finds an infected file, it displays a message usually showing one of the following three choices: Clean the File: This is used to clean a file that has already been infected by a virus. The software will try to get the file back to its original form * Delete the File: The file is permanently deleted, when unable to repair it = Isolate the file: Some antivirus programs usually create a separate folder, where the infected files are isolated and stored. This process is called quarantine. Later the files can be deleted or other actions taken. Names of some popular antivirus programs are Norton, Quick Heal, AVG, Kaspersky, McAfee, etc
You might also like
Peer-E-Kamil - by Umera Ahmed (Roman Urdu Translation by Sk. Danish) Malgun Gothic1
PDF
96% (140)
Peer-E-Kamil - by Umera Ahmed (Roman Urdu Translation by Sk. Danish) Malgun Gothic1
492 pages
Becoming Brigitte
PDF
100% (5)
Becoming Brigitte
284 pages
Socialism in Europe and The Russian Revolution - Shobhit Nirwan
PDF
84% (75)
Socialism in Europe and The Russian Revolution - Shobhit Nirwan
17 pages
Dating Format
PDF
91% (34)
Dating Format
33 pages
Garam Khandan
PDF
100% (3)
Garam Khandan
585 pages
Not Without My Daughter-Betty Mahmoody
PDF
80% (97)
Not Without My Daughter-Betty Mahmoody
385 pages
EATMORE2BEHAPPY - Ang Mutya NG Section E (Part Three) The Final Battle
PDF
84% (67)
EATMORE2BEHAPPY - Ang Mutya NG Section E (Part Three) The Final Battle
2,146 pages
French Revolution - Shobhit Nirwan
PDF
95% (113)
French Revolution - Shobhit Nirwan
12 pages
Crimson Rivers PDF
PDF
100% (8)
Crimson Rivers PDF
2,563 pages
Bad Life (VOL 1-4)
PDF
92% (12)
Bad Life (VOL 1-4)
788 pages
"Can't Hurt Me": David Goggins
PDF
88% (8)
"Can't Hurt Me": David Goggins
12 pages
Bad Life (VOL 1-4)
PDF
100% (6)
Bad Life (VOL 1-4)
779 pages
Treasure of Nadia Walkthrough
PDF
80% (41)
Treasure of Nadia Walkthrough
226 pages
7th Time Loop 05
PDF
91% (23)
7th Time Loop 05
276 pages
The Husky and His White Cat Shizun - Erha He Ta de Bai Mao Shizun Vol. 1
PDF
90% (10)
The Husky and His White Cat Shizun - Erha He Ta de Bai Mao Shizun Vol. 1
440 pages
ELS Answers Only
PDF
20% (5)
ELS Answers Only
20 pages
11th English Guide - Unit 1 and 2 - Way To Success
PDF
61% (18)
11th English Guide - Unit 1 and 2 - Way To Success
78 pages
You Amp Me - Tal Bauer
PDF
83% (12)
You Amp Me - Tal Bauer
304 pages
The Girl in The Green Dress - Jeni Haynes, George Blair-West
PDF
100% (5)
The Girl in The Green Dress - Jeni Haynes, George Blair-West
401 pages
Maleeha Meri Behan
PDF
88% (40)
Maleeha Meri Behan
57 pages
Metal Slinger - Rachel Schne
PDF
60% (5)
Metal Slinger - Rachel Schne
366 pages
Maza Ya Saza (Family Incest)
PDF
33% (3)
Maza Ya Saza (Family Incest)
26 pages
ADDICTED (The Novel) Book 1 - The Original English Translation
PDF
93% (15)
ADDICTED (The Novel) Book 1 - The Original English Translation
1,788 pages
The Graham Effect Campus Diaries Book 1 Elle Kennedy Z Library
PDF
86% (14)
The Graham Effect Campus Diaries Book 1 Elle Kennedy Z Library
329 pages
Liberal Family 1
PDF
59% (54)
Liberal Family 1
226 pages
Mera Nam Ahsan He or Mere Ghar Me Ham 5 Log Hain
PDF
67% (15)
Mera Nam Ahsan He or Mere Ghar Me Ham 5 Log Hain
9 pages
Pakistani Family Insect Saga PDF
PDF
64% (47)
Pakistani Family Insect Saga PDF
679 pages
Lord of The Mysteries 1
PDF
100% (5)
Lord of The Mysteries 1
865 pages
Wind and Truth The Brand New Epic Stormli Brandon Sanderson
PDF
100% (3)
Wind and Truth The Brand New Epic Stormli Brandon Sanderson
1,592 pages
New Microsoft Office Word Document
PDF
67% (3)
New Microsoft Office Word Document
115 pages