0% found this document useful (0 votes)
102 views55 pages

Sy Bms Sem III It Unit III

The document discusses the history and technical aspects of email. It describes how email works by sending messages between users across computer networks using a store-and-forward model. The basic format of an email message is then explained, including the header which contains fields like From, To, Subject, and the body which contains the message text. Common email header fields and their purposes are also listed.

Uploaded by

DWITI Ravariya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
102 views55 pages

Sy Bms Sem III It Unit III

The document discusses the history and technical aspects of email. It describes how email works by sending messages between users across computer networks using a store-and-forward model. The basic format of an email message is then explained, including the header which contains fields like From, To, Subject, and the body which contains the message text. Common email header fields and their purposes are also listed.

Uploaded by

DWITI Ravariya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 55

lOMoARcPSD|30678159

SY BMS SEM III IT- Unit-III

bachlor of commerce (University of Mumbai)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by DWITI Ravariya ([email protected])
lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

e-mail -
Electronic mail (email, e-mail, eMail or e-Mail) is a method of exchanging messages (“mail”) between
people using electronic devices. Email entered limited use in the 1960s, but users could only send to
users of the same computer, and some early email systems required the author and the recipient to both
be online simultaneously, similar to instant messaging. Ray Tomlinson is credited as the inventor of
email; in 1971, he developed the first system able to send mail between users on different hosts across
the ARPANET, using the @ sign to link the user name with a destination server. By the mid-1970s, this
was the form recognized as email.
Email gives an excellent opportunity to coolly compose your thoughts, couch it in appropriate language
and put it in writing, go through it over and again, fine tuning or revising it before you hit the send button.
You don’t have that kind of advantage in a telephone conversation. Many time you forget what you
planned to say.
Email operates across computer networks, primarily the Internet. Today’s email systems are based on a
store-and-forward model. Email servers accept, forward, deliver, and store messages. Neither the users
nor their computers are required to be online simultaneously; they need to connect, typically to a mail
server or a webmail interface to send or receive messages or download it.
Originally an ASCII text-only communications medium, Internet email was extended by Multipurpose
Internet Mail Extensions (MIME) to carry text in other character sets and multimedia content
attachments. International email, with internationalized email addresses using UTF-8, is standardized
but not widely adopted.
The history of modern Internet email services reaches back to the early ARPANET, with standards for
encoding email messages published as early as 1973 (RFC 561). An email message sent in the early
1970s is similar to a basic email sent today.
Historically, the term electronic mail is any electronic document transmission. For example, several
writers in the early 1970s used the term to refer to fax document transmission. As a result, finding its
first use is difficult with the specific meaning it has today.
The term electronic mail has been in use with its current meaning since at least 1975, and variations of
the shorter E-mail have been in use since at least 1979:
• Email is now the common form, and recommended by style guides. It is the form required by
IETF Requests for Comments (RFC) and working groups. This spelling also appears in most
dictionaries.
• E-mail is the form favored in edited published American English and British English writing as
reflected in the Corpus of Contemporary American English data, but is falling out of favor in
some style guides.
• Email is a traditional form used in RFCs for the “Author’s Address” and is required “for
historical reasons“.
• E-mail is sometimes used, capitalizing the initial E as in similar abbreviations like E-piano, E-
guitar, A-bomb, and H-bomb.
In the original protocol, RFC 524, none of these forms was used. The service is simply referred to as
mail, and a single piece of electronic mail is called a message.
An Internet e-mail consists of an envelope and the content consists of a header and a body.

By- Mr. Bhanuprasad Vishwakarma Page 1

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

Message format
The basic Internet message format used for email is defined by RFC 5322, with encoding of non-ASCII
data and multimedia content attachments defined in RFC 2045 through RFC 2049, collectively called
Multipurpose Internet Mail Extensions or MIME. The extensions in International email apply only to
email. RFC 5322 replaced the earlier RFC 2822 in 2008, then RFC 2822 in 2001 replaced RFC 822 –
the standard for Internet email for decades. Published in 1982, RFC 822 was based on the earlier RFC
733 for the ARPANET.
Internet email messages consist of two sections, ‘header’ and ‘body’. These are known as ‘content’. The
header is structured into fields such as From, To, CC, Subject, Date, and other information about the
email. In the process of transporting email messages between systems, SMTP communicates delivery
parameters and information using message header fields. The body contains the message, as unstructured
text, sometimes containing a signature block at the end. The header is separated from the body by a blank
line.
Message header
RFC 5322 specifies the syntax of the email header. Each email message has a header (the “header
section” of the message, according to the specification), comprising a number of fields (“header fields”).
Each field has a name (“field name” or “header field name”), followed by the separator character “:”,
and a value (“field body” or “header field body”).
Each field name begins in the first character of a new line in the header section, and begins with a non-
whitespace printable character. It ends with the separator character “:”. The separator follows the field
value (the “field body”). The value can continue onto subsequent lines if those lines have space or tab
as their first character. Field names and, without SMTPUTF8, field bodies are restricted to 7-bit ASCII
characters. Some non-ASCII values may be represented using MIME encoded words.
Header fields
Email header fields can be multi-line, with each line recommended to be no more than 78 characters,
although the limit is 998 characters. Header fields defined by RFC 5322 contain only US-ASCII
characters; for encoding characters in other sets, a syntax specified in RFC 2047 may be used. In some
examples, the IETF EAI working group defines some standards track extensions, replacing previous
experimental extensions so UTF-8 encoded Unicode characters may be used within the header. In
particular, this allows email addresses to use non-ASCII characters. Such addresses are supported by
Google and Microsoft products, and promoted by some government agents.
The message header must include at least the following fields:
• From: The email address, and, optionally, the name of the author(s). Some email clients are
changeable through account settings.
• Date: The local time and date the message was written. Like the From: field, many email clients
fill this in automatically before sending. The recipient’s client may display the time in the format
and time zone local to them.
RFC 3864 describes registration procedures for message header fields at the IANA; it provides for
permanent and provisional field names, including also fields defined for MIME, netnews, and HTTP,
and referencing relevant RFCs. Common header fields for email include:

By- Mr. Bhanuprasad Vishwakarma Page 2

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

• To: The email address(es), and optionally name(s) of the message’s recipient(s). Indicates
primary recipients (multiple allowed), for secondary recipients see Cc: and Bcc: below.
• Subject: A brief summary of the topic of the message. Certain abbreviations are commonly
used in the subject, including “RE:” and “FW:”.
• Cc: Carbon copy; Many email clients mark email in one’s inbox differently depending on
whether they are in the To: or Cc: list.
• Bcc: Blind carbon copy; addresses are usually only specified during SMTP delivery, and not
usually listed in the message header.
• Content-Type: Information about how the message is to be displayed, usually a MIME type.
• Precedence: commonly with values “bulk”, “junk”, or “list”; used to indicate automated
“vacation” or “out of office” responses should not be returned for this mail, e.g. to prevent
vacation notices from sent to all other subscribers of a mailing list. Sendmail uses this field to
affect prioritization of queued email, with “Precedence: special-delivery” messages delivered
sooner. With modern high-bandwidth networks, delivery priority is less of an issue than it was.
Microsoft Exchange respects a fine-grained automatic response suppression mechanism, the X-
Auto-Response-Suppress field.
• Message-ID: Also an automatic-generated field to prevent multiple deliveries and for reference
in In-Reply-To: (see below).
• In-Reply-To: Message-ID of the message this is a reply to. Used to link related messages
together. This field only applies to reply messages.
• References: Message-ID of the message this is a reply to, and the message-id of the message
the previous reply was a reply to, etc.
• Reply-To: Address should be used to reply to the message.
• Sender: Address of the sender acting on behalf of the author listed in the From: field
(secretary, list manager, etc.).
• Archived-At: A direct link to the archived form of an individual email message.
• The To: field may be unrelated to the addresses to which the message is delivered. The delivery
list is supplied separately to the transport protocol, SMTP, which may be extracted from the
header content. The “To:” field is similar to the addressing at the top of a conventional letter
delivered according to the address on the outer envelope. In the same way, the “From:” field may
not be the sender. Some mail servers apply email authentication systems to messages relayed.
Data pertaining to the server’s activity is also part of the header, as defined below.
SMTP defines the trace information of a message saved in the header using the following two fields:
• Received: after an SMTP server accepts a message, it inserts this trace record at the top of the
header (last to first).
• Return-Path: after the delivery SMTP server makes the final delivery of a message, it inserts
this field at the top of the header.
Other fields added on top of the header by the receiving server may be called trace fields.
• Authentication-Results: after a server verifies authentication, it can save the results in this field
for consumption by downstream agents.
By- Mr. Bhanuprasad Vishwakarma Page 3

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

• Received-SPF: stores results of SPF checks in more detail than Authentication-Results.


• DKIM-Signature: stores results of DomainKeys Identified Mail (DKIM) decryption to verify
the message was not changed after it was sent.
• Auto-Submitted: is used to mark automatic-generated messages.
• VBR-Info: claims VBR whitelisting

Importance
Easy to use: E-mail frees us from the tedious task of managing data for daily use. It helps us manage
our contacts, send mails quickly, maintain our mail history, store the required information, etc.
Speed: An e-mail is delivered instantly and anywhere across the globe. No other service matches the e-
mail in terms of speed.
Easy to prioritize: Because e-mails come with a subject line, it is easy to prioritize them and ignore the
unwanted ones.
Reliable and secure: Constant efforts are being taken to improve the security in electronic mails. It
makes e-mail one of the secured ways of communication.
Informal and conversational: The language used in e-mails is generally simple and thus, makes the
process of communication informal. Sending and receiving e-mails takes less time, so it can be used as
a tool for interaction.
Easier for reference: When a person needs to reply to a mail, he/she can use the provision of attaching
previous mails as references. It helps refresh the recipient’s know-how on what he is reading.
Automated e-mails: It is possible to send automated e-mails using special programs like auto
responders. The auto responders reply only to those messages with generalized, prewritten text messages.
Environment friendly: Postal mails use paper as a medium to send letters. Electronic mail therefore,
prevents a large number of trees from getting axed. It also saves the fuel needed for transportation.
Use of graphics: Colourful greeting cards and interesting pictures can be sent through e-mails. This adds
value to the e-mail service. Advertising tool: Nowadays, many individuals and companies are using the
e-mail service to advertise their products, services, etc.
Info at your fingertips: Storing data online means less large, space taking file cabinets, folders and
shelves. You can access information far quicker if you learn how to use email this way.
Leverage: Send the same message to any number of people. Adaptations are simple, too. If you have a
product or service to sell, email is an effective medium to get your message out.
Send reminders to yourself. Do you use more than one account? Email yourself messages from work to
home or vice versa.

Objectives
1. Inform
One of the main objectives of an email marketing campaign is to inform your readers. Showing up in
your customers’ inboxes regularly presents a great opportunity to keep them informed about everything
and anything about your company.

By- Mr. Bhanuprasad Vishwakarma Page 4

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

2. Engage
Not only should they be informational, beneficial, and attractive, but you should also be sure that they
engage recipients so they will want to learn more about your business and your brand as a whole. Make
your emails engaging with images, graphics, and even videos to make sure that recipients read the emails
in their entirety and digest all of the information you’ve provided.
3. Attract
Another objective of email marketing is to attract users to your company. You may think that since
current customers have already committed to your company, that there’s no need to attract them
anymore. The truth is, current customers have the choice to stop buying products or services from your
brand whenever they choose, and email marketing is a great way to ensure that you consistently win
them over.

Outlook and Use of Outlook -


Microsoft Outlook, or simply Outlook, is a personal information manager from Microsoft, available as
a part of the Microsoft Office suite. Though primarily an email client, Outlook also includes such
functions as calendaring, task managing, contact managing, note-taking, journal logging, and web
browsing.
It can be used by individuals as a standalone application; or by organizations as a multi-user software,
through Microsoft Exchange Server or SharePoint, for such shared functions as mailboxes, calendars,
folders, data aggregation (i.e., SharePoint lists), and appointment scheduling. Microsoft has also released
apps for most mobile platforms, including iOS and Android. In addition, Windows Phone devices can
synchronize almost all Outlook data to Outlook Mobile. Using Microsoft Visual Studio, developers can
also create their own custom software that works with Outlook and Office components.
In March 2020, Microsoft announced the launch of a series of new features to appeal to business
customers of its Teams platform, in addition to the features introduced the previous month. The chat and
collaboration module now includes more efficient and integrated waypoints, designed to simplify group
work for organizations and encourage them to adopt the Microsoft platform and become the go-to
company chat platform. The main new feature, the integration of Teams with Outlook, allows users to:
move email conversations directly from Outlook to Teams chats; and share conversations from Teams
to emails on Outlook. Microsoft has also added the ability to assign a tag to members of an organization
so that users can better target their messages.

Use of Outlook:
1. Outlook and Microsoft Exchange Play Well Together
If your e-mail server runs Microsoft Exchange, Outlook is a no-brainer. They go together like bacon and
eggs, toast and coffee, peaches and cream.
Users need to know absolutely nothing to connect. They just fire up Outlook, enter their e-mail address,
and it and Exchange commune. Transparently. That cuts down on IT involvement in client configuration
and allows users to switch computers easily.
2. Outlook Plays Well With Active Directory.
Active Directory’s authentication extends to Exchange. That means that a user can simply log on to a
computer, start Outlook, and her Active Directory credentials are passed to the Exchange server-no
typing or separate logon required.
By- Mr. Bhanuprasad Vishwakarma Page 5

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

In fact, since the e-mail address is stored in Active Directory, a user need not even enter that information
if authenticating through AD. Outlook automatically figures out the right e-mail address (and, yes, you
can bypass that functionality if you need to), log you in and you’re good to go.
3. Outlook Integrates with Many Devices and Applications
If you’re possessed by any sort of PDA or smartphone, there’s a way to synch it with Outlook. Some
vendors don’t even provide a native personal information manager for their devices, but rely on the fact
that most customers have a copy of Outlook that does the trick very nicely.
Even third party add-on applications for devices like BlackBerry or various Windows Mobile models
manage to talk to Outlook. Skype talks to Outlook. ACT! talks to Outlook. In fact, it’s hard to find a
desktop tool that doesn’t talk to Outlook. And you can find dozens of little add-ins that extend Outlook
even farther-check out Office Addins.com for example.
4. Outlook Makes it Easy to Organize Your Assets
Most e-mail clients offer some sort of rules for sorting and managing e-mail, but Outlook 2007 (in
conjunction with Exchange 2007) really raises the bar. Sure, you can sort messages into folders, or
forward or redirect them according to selected criteria. However, you also have the option to send
different automatic Out of Office (OOO) messages to internal and external addresses. For example, users
who subscribe to mailing lists may not want to send messages to addresses outside their company at all
(mailing list admins frown on OOO messages, which act like spam to the list), but need to give internal
senders information on who’s covering for them.
If you need to follow up on a message, Outlook offers flags of various colors that can be tied to reminders
if you need a friendly nag. A shortcut folder called “Follow Up” gathers links to all flagged messages to
make them simple to locate. And if you want to be sure the boss’s messages leap out at you, with a
couple of clicks you can make them show up in the color of your choice in your in-box listing. My boss’s
mail, for example, is red, and his counterpart with whom I also deal is an unsubtle lime green. There’s
no missing either of their tomes in the clutter!
5. Outlook Plays Nicely With SharePoint
Microsoft’s SharePoint is a collaborative platform offering tools for building and managing websites,
intranets and workspaces. But Microsoft realizes that many users have neither the time nor the mental
bandwidth to log on to yet another server to check forum discussions or to examine shared documents.
What to do? Simple-Outlook users can opt to receive notifications of new or changed content by e-mail,
then click through to the SharePoint site. They can also add content to a shared workspace or participate
in forum discussions by e-mail, thanks to integration with Outlook and Exchange.
6. Outlook Expedites Workflow
Outlook’s messaging isn’t limited to mere e-mail. Companies can set up workflows for functions such
as online voting. For example, if a group wants to decide on a location for a festive lunch, the coordinator
can send a message offering several options. Recipients simply click a voting button within the e-mail
message to send their responses.
Using Outlook’s forms feature, things like requests for time off can be automatically routed to approvers,
and the reply returned to the user.

By- Mr. Bhanuprasad Vishwakarma Page 6

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

7. Outlook’s User Interface is Familiar


Since Microsoft Office is the market leader in productivity software, the Outlook user interface is
familiar to users, cutting down on the learning curve. Sure, there’s a ton of functionality to discover, but
the basics are relatively intuitive to someone who’s used to Microsoft Office. That can save a bundle in
training costs. And since the familiarity extends to the development environment, it’s also relatively easy
for developers using Microsoft Visual Studio to interface with Outlook, either to add functionality or to
tie it to other corporate applications.
8. Outlook Offers Integrated Calendar, Tasks, etc.
Outlook includes an address book, calendar, task list and virtual sticky notes. All pieces are integrated;
dragging and dropping an e-mail message can create an appointment or a task or a note. Tasks may be
delegated with a click or two. Not only does the responsible victim get informed of the job he’s inherited,
but the delegator can get regular status reports. And with the purchase of the version containing
Microsoft Business Contact Manager, Outlook becomes a business in a box for a small enterprise.
9. Believe It or Not, Outlook Has Pretty Good Security
Yes, I know Microsoft has a bad reputation on the security front. But Outlook 2007, in particular, has
good junk mail filtering (as long as you keep it up-to-date), blocks external content such as web bugs
and downloaded images and data from foreign sites, disallows executable attachments and prevents the
execution of ActiveX applets, by default. You can bypass the security if you like, but it has to be a
conscious decision.
10. Outlook Offers One-Stop e-mail
You’re not limited to a single account in Outlook. Several accounts using different protocols (including
POP3 and IMAP) can feed into the same set of folders, and be managed with one set of rules. Or, if you
prefer, they can be sorted into separate folders by account. You choose.
Yes, other e-mail clients can integrate multiple accounts, but Outlook’s advantage lies in its native
support for Exchange.
Of course, in the grand scheme of things, it all comes down to picking the right tool for the job, and that
job is primarily e-mail. Microsoft Outlook is now robust, secure and versatile enough to be that tool. The
extra functionality is just the cherry on the sundae for lucky Outlook users.

Configuring Outlook -
Outlook is one of the most popular email clients in the world, and has a host of powerful features. In
order to get the most out of Outlook, you’ll want to add your email accounts so that you can find all of
your messages in one place, import your calendar so that you can see upcoming events, and add your
contacts from your various online contacts lists.
1. Understand the difference between POP and IMAP email services
There are two ways that email can be delivered to your email client: POP (Post Office Protocol) and
IMAP (Internet Message Access Protocol). POP is the older method of transferring email messages, and
works by downloading new messages to your client and then deleting them from the server. IMAP was
designed to allow you to check email from multiple devices, as messages and organization are synced
between all of the clients you use.

By- Mr. Bhanuprasad Vishwakarma Page 7

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

• There is really no practical reason to use POP if IMAP is available. IMAP is more stable, more
secure, and allows you to check your email from your computer, phone, and laptop without losing
any messages.
• Most email services allow you to use IMAP, though some may charge for it. Gmail, Yahoo!,
Outlook.com (Hotmail), AOL, and most service providers allow for IMAP.
2. Configure your service for IMAP (Gmail)
Most email services allow you to access the IMAP functions without making any changes. The major
exception to this is Gmail, where you will need to manually enable IMAP.
Log into the Gmail website and click the Gear button. Select “Settings’ and then click the “Forwarding
and POP/IMAP” tab. Select “Enable IMAP” and click “Save Changes”.
3. Open Outlook
When you add an IMAP email service, you’ll be able to check, organize, and manage your email in
Outlook and on all of your other devices. Any changes you make in Outlook will be reflected in your
other email clients.
4. Click the “File” tab. In the “Info” section, click the “+ Add Account” button.
5. Select “Manual setup or additional server types”. This will allow you to enter any email account.
Note: If you’re using Gmail or Hotmail (Outlook.com), you can enter your email address and password
in the “E-Mail Account” section of the Add New Account window and skip the rest of this section.
Outlook will take care of the rest of the configuration for you. You can also manually set them up if you
prefer by reading on.
6. Select “POP or IMAP”. This will enable you to enter a web-based email account.
7. Enter your email account information. Enter your name as well as your email address in the top
section. Leave the Server Information blank for now (see next step). In the Logon Information
section, enter your account User Name (usually the same as your email address) as well as the
password you use to access the account.
8. Enter your mail server information
In the Server Information section, enter in the information for your mail service. Select “IMAP” from
the Account Type drop-down menu. Below is information for some of the more popular mail services:
Service Incoming Mail Server Outgoing Mail Server
Gmail imap.gmail.com smtp.gmail.com
Yahoo! imap.mail.yahoo.com smtp.mail.yahoo.com
Hotmail imap-mail.outlook.com smtp-mail.outlook.com
AOL imap.aol.com smtp.aol.com
Comcast imap.comcast.net smtp.comcast.net
Time Warner mail.twc.com mail.twc.com
AT&T imap.mail.att.net smtp.mail.att.net

By- Mr. Bhanuprasad Vishwakarma Page 8

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

9. Click the .More Settings… button. Click the Outgoing Server tab.
10. Check the “My outgoing server (SMTP) requires authentication”. Select “Use same settings as
my incoming mail server”. This setting is the same for nearly all email services.
11. Click .Next > after entering all of your account settings. Outlook will begin testing your settings
to ensure that it can connect to the server to send and receive messages.
12. Wait for your messages to sync. once you’ve connected your email account, your messages and
folders will begin syncing with Outlook. Depending on how many messages you have, this may
take a few moments. You can monitor the process from the status bar at the bottom of the
window.
Outlook will only have to do a major sync the first time you connect your account. After this, it will just
sync any changes made from any of your email clients.
14. Browse through your messages. On the left side of the window, you’ll see your email account
with its associated folders listed underneath. You can browse through these folders to see all of
your messages. Any organizational changes you make in Outlook will be reflected in the web
version of your email account, and vice versa.

Bulk Email Software -


Bulk email software is software that is used to send emails in large quantities.
Bulk email software usually refers to standalone software, while there are bulk email sending web-based
services as well.
Computer worms that spread themselves via email are an example of bulk email software, sometimes
referred to as a mass mailer. Such worms usually (but not necessarily) send spoofed “From” headers.
Most bulk email software programs are hosted by third party companies who sell access to their system.
Customers pay per send or at a fixed monthly rate to have their own user account from which they can
manage their contacts and send out email campaigns. Generally the advantage of this type of program is
the reliability of the third party vendor and their application. Some bulk email software programs are
self-hosted. The customer buys a license or develops their own program and then hosts the program.
Generally the advantage of this type of program is the lack of ongoing monthly fees to the
owner/developer of the program. The disadvantage to using this option is that delivery rate is reduced as
often users use one server to send bulk emails. There are various settings to tweak to avoid a server being
labeled as spam.
Why is bulk email software important?
If marketers were to create and send emails to each prospect on their contact list one at a time, they
would probably not have time to do anything else. Sending thousands of marketing messages to
prospective customers every couple of days is a tiresome and repetitive task.
With bulk email software, you can:
• Create marketing emails faster
• Reach hundreds or thousands of recipients with one email
• Reduce the cost of sending mass emails
• Increase traffic to a website
By- Mr. Bhanuprasad Vishwakarma Page 9

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

The Fall of Bulk Email Software


Bulk email software is not a new concept for online businesses and marketers; it has been around for a
while. However, it is steadily being replaced by email services. The majority of email marketers prefer
these services as opposed to the software because the former offers a more holistic approach to internet
marketing. With a reliable email service, you can:
• Automate repetitive marketing tasks
• Create personalized email campaigns
• Send bulk emails to multiple mailing lists
• Boost brand awareness and reputation
• Attract and nurture quality leads
• Monitor marketing campaign statistics on the go
Bulk Email Software vs Bulk Email Services
Bulk email services work as a standalone system that allows one to add email addresses and send email
campaigns. Marketers, who use bulk email as a method for increasing brand or product awareness, may
leverage using an email marketing service to save both time and money. This ultimately allows a
business to get more ROI with the help of professional instruments.
For an email marketer, online business owner or internet marketer, it is easy to get confused about
whether email software or an email service is the best choice. So, here is a comprehensive comparison
of the two:
Features Bulk Email Software Bulk Email Service
Price Costs roughly between $30-$100 depending Price is based on the size of the
on the vendor. However, that is not the only mailing list. Users can, therefore,
cost. The software requires regular updates choose a package that suits their
that come at a fee. The prices are mostly needs and thier budget best. And,
fixed and non-negotiable. one can send bulk emails for free if
their list is not very big.
Reputation Bulk email software has no reputation and Bulk email services manage their
offers no guarantee that emails sent will be IP and server reputation and offer
seen or opened. Remember, sender customers superior credibility.
reputation is everything in email marketing Therefore, a brand’s marketing
as it shows how recipients and mailbox emails have better chances of
providers see a particular IP address. A being opened and read by
negative IP reputation can hurt a brand in subscribers.
more ways than one.
Upgrades Updates are available, but users incur Services are regularly updated and
additional costs to get them. customers do not get overcharged
to obtain them. Plus, most
upgrades are conducted
automatically.

By- Mr. Bhanuprasad Vishwakarma Page 10

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

Lead Segmenting subscribers is not available. Mailing list segmentation is a


Segmentation Consequently, users must manage their common feature in most services.
mailing lists manually. With the SendPulse email service,
for example, it is possible to
segment mailing lists based on
different criteria such as age,
gender, occupation, location,
activities and more.
Landing Pages Users don’t have the option to create landing Subscription forms are a key
and pages or subscription forms. Therefore, users element of an email service. With
Subscription must look for additional software to perform the help of ready-made templates
forms these functions. and a drag-and-drop email editor,
users can create customized
subscription forms easily.
SendPulse allows users to design
multichannel forms by adding links
to messengers. Some services also
help users create landing pages for
their websites.
Cleaning Up Users must manage their contact lists The mailing list is constantly kept
the Mailing themselves. Therefore, if a subscriber opts up to date. When a lead
List out, one must remove their address from the unsubscribes from your marketing
mailing list manually. emails, their address is
automatically removed from the
list.
Email Design Email templates are often limited which There is no need for HTML or any
means that there is less variety to choose coding knowledge. Email services
from. Furthermore, they can only be edited offer several ready-made email
using HTML. Thus, it is difficult to modify templates that can be edited. The
them to one’s preference without technical user sets the parameters, and the
knowledge about how HTML works. service generates the code. Plus,
you can add videos, images,
buttons and more to your emails.
Ease of Use Very technical to set up. The provider might Online services are easy to use,
not allow for bulk email sending through an and anyone can start creating an
internal server. In this case, one has to find email campaign immediately after
an external SMTP server. signing up.
Statistics and Does not allow for the evaluation of the Statistics on how recipients
Follow Up results of an email campaign. Instead, one respond to a campaign are
has to install additional programs to monitor collected and stored automatically.
bulk email marketing performance. With a credible email service like
SendPulse, a company can monitor
the delivery rate, opens, click-
through rates (CTR), unopened

By- Mr. Bhanuprasad Vishwakarma Page 11

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

emails, emails marked as spam and


much more.
Technical For any problems, issues or concerns, one Usually, offer 24-hour customer
Support has to contact the system administrator, and support 7 days a week. Plus, most
it can take some time to get the help that you services provide multiple
need communication channels including
phone, email and live chat.
Therefore, it is easy to have your
problems solved quickly and
conveniently.

Intranet -
Intranet is defined as private network of computers within an organization with its own server and
firewall. Moreover we can define Intranet as:
Intranet is system in which multiple PCs are networked to be connected to each other. PCs in intranet
are not available to the world outside of the intranet.
Usually each company or organization has their own Intranet network and members/employees of that
company can access the computers in their intranet.
Every computer in internet is identified by a unique IP address.
Each computer in Intranet is also identified by a IP Address, which is unique among the computers in
that Intranet.

Advantage of Intranet
Intranet is very efficient and reliable network system for any organization. It is beneficial in every aspect
such as collaboration, cost-effectiveness, security, productivity and much more.

By- Mr. Bhanuprasad Vishwakarma Page 12

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

(i) Communication
Intranet offers easy and cheap communication within an organization. Employees can communicate
using chat, e-mail or blogs.
(ii) Time Saving
Information on Intranet is shared in real time.
(iii) Collaboration
Information is distributed among the employees as according to requirement and it can be accessed by
the authorized users, resulting in enhanced teamwork.
(iv) Platform Independency
Intranet can connect computers and other devices with different architecture.
(v) Cost Effective
Employees can see the data and other documents using browser rather than printing them and distributing
duplicate copies among the employees, which certainly decreases the cost.
(vi) Workforce Productivity
Data is available at every time and can be accessed using company workstation. This helps the employees
work faster.
(vii) Business Management
It is also possible to deploy applications that support business operations.
(viii) Security
Since information shared on intranet can only be accessed within an organization, therefore there is
almost no chance of being theft.
(ix) Specific Users
Intranet targets only specific users within an organization therefore, once can exactly know whom he is
interacting.
(x) Immediate Updates
Any changes made to information are reflected immediately to all the users.

Issues in Intranet
Apart from several benefits of Intranet, there also exist some issues.. These issues are shown in the
following diagram:

By- Mr. Bhanuprasad Vishwakarma Page 13

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

Applications
Intranet applications are same as that of Internet applications. Intranet applications are also accessed
through a web browser. The only difference is that, Intranet applications reside on local server while
Internet applications reside on remote server. Here, we’ve discussed some of these applications:

By- Mr. Bhanuprasad Vishwakarma Page 14

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

(i) Document publication applications


Document publication applications allow publishing documents such as manuals, software guide,
employee profits etc without use of paper.
(ii) Electronic resources applications
It offers electronic resources such as software applications, templates and tools, to be shared across the
network.
(iii) Interactive Communication applications
Like on internet, we have e-mail and chat like applications for Intranet, hence offering an interactive
communication among employees.
(iv) Support for Internet Applications
Intranet offers an environment to deploy and test applications before placing them on Internet.

Extranet -
An extranet is a controlled private network that allows access to partners, vendors and suppliers or an
authorized set of customers normally to a subset of the information accessible from an organization’s
intranet. An extranet is similar to a DMZ in that it provides access to needed services for authorized
parties, without granting access to an organization’s entire network. An extranet is a private network
organization.
Historically the term was occasionally also used in the sense of two organizations sharing their internal
networks over a VPN.
During the late 1990s and early 2000s, several industries started to use the term ‘extranet’ to describe
centralized repositories of shared data (and supporting applications) made accessible via the web only
to authorized members of particular work groups – for example, geographically dispersed, multi-
company project teams. Some applications are offered on a software as a service (SaaS) basis.

Advantage of Extranet
• Exchange large volumes of data using Electronic Data Interchange (EDI)
• Share product catalogs exclusively with trade partners
• Collaborate with other companies on joint development efforts
• Jointly develop and use training programs with other companies
• Provide or access services provided by one company to a group of other companies, such as an
online banking application managed by one company on behalf of affiliated banks.

By- Mr. Bhanuprasad Vishwakarma Page 15

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

Disadvantage of Extranet
• Extranets can be expensive to implement and maintain within an organization (e.g., hardware,
software, employee training costs), if hosted internally rather than by an application service
provider.
• Security of extranets can be a concern when hosting valuable or proprietary information.

Issues in Extranet
Apart for advantages there are also some issues associated with extranet. These issues are discussed
below:
1. Hosting
Where the extranet pages will be held i.e. who will host the extranet pages. In this context there are two
choices:
2. Host it on your own server.
Host it with an Internet Service Provider (ISP) in the same way as web pages.
But hosting extranet pages on your own server requires high bandwidth internet connection which is
very costly.
3. Security
Additional firewall security is required if you host extranet pages on your own server which result in a
complex security mechanism and increase work load.
By- Mr. Bhanuprasad Vishwakarma Page 16

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

4. Accessing Issues
Information cannot be accessed without internet connection. However, information can be accessed in
Intranet without internet connection.
5. Decreased Interaction
It decreases the face to face interaction in the business which results in lack of communication among
customers, business partners and suppliers.

Networking Basics -
A computer network is a group of two or more interconnected computer systems. You can establish a
network connection using either cable or wireless media.
It is the interconnection of multiple devices, generally termed as Hosts connected using multiple paths
for the purpose of sending/receiving data or media.
There are also multiple devices or mediums which helps in the communication between two different
devices which are known as Network devices. Ex: Router, Switch, Hub, Bridge.
Every network involves hardware and software that connects computers and tools.
Components of Computer Network
Here are essential computer network components:
1. Switches
Switches work as a controller which connects computers, printers, and other hardware devices to a
network in a campus or a building.
It allows devices on your network to communicate with each other, as well as with other networks. It
helps you to share resources and reduce the costing of any organization.
2. Routers
Routers help you to connect with multiple networks. It enables you to share a single internet connection
with multiple devices and saves money. This networking component acts as a dispatcher, which allows
you to analyze data sent across a network. It automatically selects the best route for data to travel and
send it on its way.
3. Servers
Servers are computers that hold shared programs, files, and the network operating system. Servers allow
access to network resources to all the users of the network.
4. Clients
Clients are computer devices which access and uses the network as well as shares network resources.
They are also users of the network, as they can send and receive requests from the server.
5. Transmission Media
Transmission media is a carrier used to interconnect computers in a network, such as coaxial cable,
twisted-pair wire, and optical fiber cable. It is also known as links, channels, or lines.

By- Mr. Bhanuprasad Vishwakarma Page 17

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

6. Access points
Access points allow devices to connect to the wireless network without cables. A wireless network
allows you to bring new devices and provides flexible support to mobile users.
7. Shared Data
Shared data are data which is shared between the clients such as data files, printer access programs, and
email.
8. Network Interface Card
Network Interface card sends, receives data, and controls data flow between the computer and the
network.
9. Local Operating System
A local OS which helps personal computers to access files, print to a local printer and uses one or more
disk and CD drives which are located on the computer.
10. Network Operating System
The network operating system is a program which runs on computers and servers. It allows the computers
to communicate via network.
11. Protocol
A protocol is the set of defined rules that allows two entities to communicate across the network. Some
standard protocols used for this purpose are IP, TCP, UDP, FTP, etc.
12. Hub
Hub is a device that splits network connection into multiple computers. It acts a distribution center so
whenever a computer requests any information from a computer or from the network it sends the request
to the hub through a cable. The hub will receive the request and transmit it to the entire network.
13. LAN Cable
Local Area Network(LAN) cable is also called as Ethernet or data cable. It is used for connecting a
device to the internet.
14. OSI
OSI stands for Open Systems Interconnection. It is a reference model which allows you to specify
standards for communications.

Unique Identifiers of Network


Below given are some unique network identifiers:
1. Hostname
Every device of the network is associated with a unique device, which is called hostname.
2. IP Address
IP (Internet Protocol) address is as a unique identifier for each device on the Internet. Length of the IP
address is 32-bits. IPv6 address is 64 bits.

By- Mr. Bhanuprasad Vishwakarma Page 18

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

3. DNS Server
DNS stands for Domain Name System. It is a server which translates URL or web addresses into their
corresponding IP addresses.
4. MAC Address
MAC (Media Access Control Address) is known as a physical address is a unique identifier of each host
and is associated with the NIC (Network Interface Card). General length of MAC address is: 12-digit/ 6
bytes/ 48 bits
5. Port
Port is a logical channel which allows network users to send or receive data to an application. Every host
can have multiple applications running. Each of these applications are identified using the port number
on which they are running.
Advantages of a Computer Network
Here are the fundamental benefits/pros of using Computer Networking:
• Helps you to connect with multiple computers together to send and receive information when
accessing the network.
• Helps you to share printers, scanners, and email.
• Helps you to share information at very fast speed
• Electronic communication is more efficient and less expensive than without the network.
Disadvantages of using Computer Networks
Here are drawbacks/ cons of using computer networks:
• Investment for hardware and software can be costly for initial set-up
• If you don’t take proper security precautions like file encryption, firewalls then your data will be
at risk.
• Some components of the network design may not last for many years, and it will become useless
or malfunction and need to be replaced.
• Requires time for constant administration
• Frequent server failure and issues of regular cable faults
Summary:
• A computer network is a group of two or more interconnected computer systems
• Computer networks help you to connect with multiple computers together to send and receive
information
• Switches work as a controller which connects computers, printers, and other hardware devices
• Routers help you to connect with multiple networks. It enables you to share a single internet
connection and saves money
• Servers are computers that hold shared programs, files, and the network operating system
• Clients are computer device which accesses and uses the network and shares network resources

By- Mr. Bhanuprasad Vishwakarma Page 19

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

• Hub is a device that split a network connection into multiple computers.


• Access points allow devices to connect to the wireless network without cables
• Network Interface card sends, receives data and controls data flow between the computer and the
network
• A protocol is the set of defined rules which that allows two entities to communicate across the
network
• Hostname, IP Address, DNS Server, and host are important unique indetenfiters of computer
networks.
• ARP stands for Address Resolution Protocol
• RAR Reverse Address Resolution Protocol gives an IP address of the device with given a
physical address as input.
• Computer network helps you to share expensive software’s and database among network
participants
• The biggest drawback of installing computer network is that its initial investment for hardware
and software can be costly for initial set-up

Different Types of Network -


Used for everything from accessing the internet or printing a document to downloading an attachment
from an email, networks are the backbone of business today. They can refer to a small handful of devices
within a single room to millions of devices spread across the entire globe, and can be defined based on
purpose and/or size.

Types of Networks in Use Today


1. Personal Area Network (PAN)
The smallest and most basic type of network, a PAN is made up of a wireless modem, a computer or
two, phones, printers, tablets, etc., and revolves around one person in one building. These types of
networks are typically found in small offices or residences, and are managed by one person or
organization from a single device.
There are two types of Personal Area Network:-
• Wireless Personal Area Network: Wireless Personal Area Network is developed by simply using
wireless technologies such as WiFi, Bluetooth. It is a low range network.
• Wired Personal Area Network: Wired Personal Area Network is created by using the USB.
2. Local Area Network (LAN)
We’re confident that you’ve heard of these types of networks before LANs are the most frequently
discussed networks, one of the most common, one of the most original and one of the simplest types of
networks. LANs connect groups of computers and low-voltage devices together across short distances
(within a building or between a group of two or three buildings in close proximity to each other) to share
information and resources. Enterprises typically manage and maintain LANs.
By- Mr. Bhanuprasad Vishwakarma Page 20

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

Using routers, LANs can connect to wide area networks (WANs, explained below) to rapidly and safely
transfer data.
3. Wireless Local Area Network (WLAN)
Functioning like a LAN, WLANs make use of wireless network technology, such as Wi-Fi. Typically
seen in the same types of applications as LANs, these types of networks don’t require that devices rely
on physical cables to connect to the network.
4. Campus Area Network (CAN)
Larger than LANs, but smaller than metropolitan area networks (MANs, explained below), these types
of networks are typically seen in universities, large K-12 school districts or small businesses. They can
be spread across several buildings that are fairly close to each other so users can share resources.
5. Metropolitan Area Network (MAN)
These types of networks are larger than LANs but smaller than WANs and incorporate elements from
both types of networks. MANs span an entire geographic area (typically a town or city, but sometimes a
campus). Ownership and maintenance is handled by either a single person or company (a local council,
a large company, etc.).
Uses of Metropolitan Area Network
• MAN is used in communication between the banks in a city.
• It can be used in an Airline Reservation.
• It can be used in a college within a city.
• It can also be used for communication in the military.
6. Wide Area Network (WAN)
Slightly more complex than a LAN, a WAN connects computers together across longer physical
distances. This allows computers and low-voltage devices to be remotely connected to each other over
one large network to communicate even when they’re miles apart.
The Internet is the most basic example of a WAN, connecting all computers together around the world.
Because of a WAN’s vast reach, it is typically owned and maintained by multiple administrators or the
public.
Advantages of Wide Area Network
Following are the advantages of the Wide Area Network:
• Geographical area: A Wide Area Network provides a large geographical area. Suppose if the
branch of our office is in a different city then we can connect with them through WAN. The
internet provides a leased line through which we can connect with another branch.
• Centralized data: In case of WAN network, data is centralized. Therefore, we do not need to buy
the emails, files or back up servers.
• Get updated files: Software companies work on the live server. Therefore, the programmers get
the updated files within seconds.
• Exchange messages: In a WAN network, messages are transmitted fast. The web application like
Facebook, Whatsapp, Skype allows you to communicate with friends.

By- Mr. Bhanuprasad Vishwakarma Page 21

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

• Sharing of software and resources: In WAN network, we can share the software and other
resources like a hard drive, RAM.
• Global business: We can do the business over the internet globally.
• High bandwidth: If we use the leased lines for our company then this gives the high bandwidth.
The high bandwidth increases the data transfer rate which in turn increases the productivity of
our company.
Disadvantages of Wide Area Network
The following are the disadvantages of the Wide Area Network:
• Security issue: A WAN network has more security issues as compared to LAN and MAN
network as all the technologies are combined together that creates the security problem.
• Needs Firewall & antivirus software: The data is transferred on the internet which can be changed
or hacked by the hackers, so the firewall needs to be used. Some people can inject the virus in
our system so antivirus is needed to protect from such a virus.
• High Setup cost: An installation cost of the WAN network is high as it involves the purchasing
of routers, switches.
• Troubleshooting problems: It covers a large area so fixing the problem is difficult.
7. Storage-Area Network (SAN)
As a dedicated high-speed network that connects shared pools of storage devices to several servers, these
types of networks don’t rely on a LAN or WAN. Instead, they move storage resources away from the
network and place them into their own high-performance network. SANs can be accessed in the same
fashion as a drive attached to a server. Types of storage-area networks include converged, virtual and
unified SANs.
8. System-Area Network (also known as SAN)
This term is fairly new within the past two decades. It is used to explain a relatively local network that
is designed to provide high-speed connection in server-to-server applications (cluster environments),
storage area networks (called “SANs” as well) and processor-to-processor applications. The computers
connected on a SAN operate as a single system at very high speeds.
9. Passive Optical Local Area Network (POLAN)
As an alternative to traditional switch-based Ethernet LANs, POLAN technology can be integrated into
structured cabling to overcome concerns about supporting traditional Ethernet protocols and network
applications such as PoE (Power over Ethernet). A point-to-multipoint LAN architecture, POLAN uses
optical splitters to split an optical signal from one strand of singlemode optical fiber into multiple signals
to serve users and devices.
10. Enterprise Private Network (EPN)
These types of networks are built and owned by businesses that want to securely connect its various
locations to share computer resources.
11. Virtual Private Network (VPN)
By extending a private network across the Internet, a VPN lets its users send and receive data as if their
devices were connected to the private network even if they’re not. Through a virtual point-to-point
connection, users can access a private network remotely.
By- Mr. Bhanuprasad Vishwakarma Page 22

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

Hubs -
A hub, also called a network hub, is a common connection point for devices in a network. Hubs are
devices commonly used to connect segments of a LAN. The hub contains multiple ports. When a packet
arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets.
A hub is a network hub used for connection of devices in a network. It connects several devices in a
LAN. All the devices in the network connection is connected through hub that acts as a central
connection for all the devices. There are many ports in the hub and if a packet arrives only at one port,
it is copied so that all the ports can see the packets. This helps if there is any trouble in one port of the
hub. The three types of hub are active, passive and intelligent. Active hubs amplify the incoming electric
signal whereas passive hubs do not amplify the electric signal. Intelligent hubs are kind of active hubs.
When referring to a network, a hub is the most basic networking device that connects multiple computers
or other network devices together. Unlike a network switch or router, a network hub has no routing tables
or intelligence on where to send information and broadcasts all network data across each connection.
Most hubs can detect basic network errors such as collisions, but having all information broadcast to
multiple ports can be a security risk and cause bottlenecks. In the past, network hubs were popular
because they were cheaper than a switch or router. Today, switches do not cost much more than a hub
and are a much better solution for any network.
What Hubs Do?
Hubs and switches serve as a central connection for all of your network equipment and handles a data
type known as frames. Frames carry your data. When a frame is received, it is amplified and then
transmitted on to the port of the destination PC.
In a hub, a frame is passed along or “broadcast” to every one of its ports. It doesn’t matter that the frame
is only destined for one port. The hub has no way of distinguishing which port a frame should be sent
to. Passing it along to every port ensures that it will reach its intended destination. This places a lot of
traffic on the network and can lead to poor network response times.
Compared to a standard switch, the hub is slower as it can send or receive information just not at the
same time, but typically costs more than a hub.
Types of Hub
There are three types which is deployed according to its usage. They are passive, active, and intelligent.
In recent days, the modification was done to hubs that provide high performance.
1. Passive Hub
It has quiescent creatures as the name portraits and it does not should any impact on performance but it
helps in identifying the bugs and detecting the faulty hardware. They are a simple that receives the packet
on a port and is then broadcast to all the port.
It has a 10base-2 port and RJ-45 connectors which is connected to each local area network device. This
connecter is applied as a standard one in your network. AUI ports are placed in advanced passive hubs
which are connected as the transceiver as per the network design.

By- Mr. Bhanuprasad Vishwakarma Page 23

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

2. Active Hub
Active hubs have some additional features apart from passive hubs. It monitors the data which is sent
out to the connected devices. It has a unique role in this network communication by using Store
technology where it checks the data before sending out and prioritizes which packet to send first.
It has the option to fix the damaged packets and hold the direction and distribution of the rest of the
packets. If a week signal is received in port but it’s still readable then the active hub amplifies it to a
stronger signal before its retransmitted to other ports.
If any connecting device is not functioning in the network it can boost the signal which is viewed by
other devices with passive hubs. Hence it helps in the continuation of service in the local area network.
But few of them will account for the malfunction of any device and offer related diagnostic capabilities
in the local area network. They will be able to resync the packets and transmit them again. Some cables
go through electromagnetic troubles and stop the packet from entering into the designated port or rarely
it does not reach the port. At those times, they can make up for the packet or data loss. They are accessible
to retime the port for slower delivery and error-prone connections
3. Intelligent Hub
These give many advantages than passive and active hubs. The management who wants to expand their
business in networking can assign users to share a common pool efficiently and work more quickly using
intelligent hubs. The technique behind them is explored recently and now its great demand in the market.
It is proved that it delivers unparallel performance for your local area network. If any problem is detected
with any physical device it is easily detected, diagnosed and solution to the problem using management
data which can be rectified by the hub.
This is a standard improvement over active hubs. Detecting the centralized management tool which helps
to explore the network which runs out of the device to find the low functioning devices.
Another feature is flexibility which has high transmission rates to numerous devices. They have their
standard terms with transmission rate as 10, 16, in the speed of 100Mbps to desktop.
Benefits of Hubs
• The technical information has a physical layer function which is connecting multiple hubs and
has numerous benefits. They detect crucial problems and immoderate collision and interrupt
jabbering occurred between ports or devices. If any fault occurs, it disconnects the signal flow
and prevents the damaged device from the rest of the device.
• If there is any misbehavior or hissing in a cable can also be detected and prevented the device
from great loss. It has an inbuilt twisted based ethernet which helps to detect any malfunction.
To pass the data through each segment through repeater should be the same in all partitions
because the repeater cannot connect the data with different segments.
• Many classes have varied speed range hubs. Class 1 has a signal delay of 140-bit time by setting
a transaction record in a range of 100BASE-TX, and 100BASE-T4 whereas class 2 has the signal
delay of 92-bit time by accessing a single collision domain.
• Dual speed is an internal port switch that works on 10M/bits and 100M/bits segments. When any
device is connected along with these segments the port becomes active and the data signal is
transmitted at a higher rate, but this turns as a failure model because it fails to design the switch
between traffic flow.
By- Mr. Bhanuprasad Vishwakarma Page 24

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

A switch is part of Hub which tracks all details of the MAC address of the connected devices. It knows
about the system or devices and their connection port, so if any packet is received, the switch chooses
and sends it to that port. The network hub is also called an active, multiport repeater, ethernet, and
repeater. The hubs and switches with multiple inputs and output ports that form a network and all the
connected devices act a single network segment and work efficiently preventing data loss.

Bridges -
A bridge is a type of computer network device that provides interconnection with other bridge networks
that use the same protocol.
Bridge devices work at the data link layer of the Open System Interconnect (OSI) model, connecting
two different networks together and providing communication between them. Bridges are similar to
repeaters and hubs in that they broadcast data to every node. However, bridges maintain the media
access control (MAC) address table as soon as they discover new segments, so subsequent transmissions
are sent to only to the desired recipient.
A network bridge is a device that divides a network into segments. Each segment represent a separate
collision domain, so the number of collisions on the network is reduced. Each collision domain has its
own separate bandwidth, so a bridge also improves the network performance.
A bridge is also called Layer 2 Switch. A network bridge is a device that is primarily used in Local Area
Networks (LANs). It is because these networks can potentially flood and clog a large network.
It is one of their abilities that they broadcast data to all the nodes if they do not know the destination
node’s address. The bridge uses a database.
The purpose of this database is to ascertain where to pass the data frame, where to transmit the data
frame, or where to discard the data frame. Network bridges are also called Ethernet bridges. They connect
two segments of a single network together. The main purpose of bridges is to divide a network into
different manageable sections.
A bridge works at the Data link layer (Layer 2) of the OSI model. It inspects incoming traffic and decide
whether to forward it or filter it. Each incoming Ethernet frame is inspected for destination MAC address.
If the bridge determines that the destination host is on another segment of the network, it forwards the
frame to that segment.
Consider the following example network:

By- Mr. Bhanuprasad Vishwakarma Page 25

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

In the picture above we have a network of four computers. The network is divided into segments by a
bridge. Each segment is a separate collision domain with its own bandwidth. Let’s say that Host A wants
to communicate with Host C. Host A will send the frame with the Host C’s destination MAC address to
the bridge. The bridge will inspect the frame and forward it to the segment of the network Host C is on.
Network bridges offer substantial improvements over network hubs, but they are not widely used
anymore in modern LANs. Switches are commonly used instead.
Types of bridges in networking
Following are some Types of bridges in networking
1. Transparent Bridge
This is a bridge in which the stations are completely unaware of the experience of the bridge. For
example, May or May not a bridge is added or deleted from the network, the station’s reconfiguration is
unnecessary. This bridge makes use of two different processes like bridge forwarding and bridge
learning.
2. Source routing bridge
In this bridge, the routing operation is performed by the source station. The frame specifies which route
to follow. The hot discovers the frame by sending a special frame which is called a discovery frame.
This spreads through the entire network by using all possible paths to the destination.
Advantages of bridges
• Bridges can extend a network.
• Bridges can act as a repeater.
• They can reduce network traffic on a segment.
• They can subdivide the network communication.
• They increase the available bandwidth to individual nodes.
• Bridges reduce collisions as well.
• Bridges can create separate collision domains.
• They can connect different architectures.

Disadvantages of bridges
• They are slower than repeaters.
• Filtering makes them slower.
• They do not filter broadcasts.
• Bridges are more expensive.
• They must use routable protocols.
• They need to understand the protocols which they forward.
• They require a lot of amount for initial configuration.
• These are complex devices.
By- Mr. Bhanuprasad Vishwakarma Page 26

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

• These devices are unable to read a specific IP address.


• Its speed is slow.
• Bridges cannot use a firewall as a device.
• They send messages to all the nodes.
• Sending a message to all nodes reduces speed.
• Sending messages to all nodes causes a waste of time.

Routers -
A router is a networking device that forwards data packets between computer networks. Routers
perform the traffic directing functions on the Internet. Data sent through the internet, such as a web page
or email, is in the form of data packets. A packet is typically forwarded from one router to another router
through the networks that constitute an internetwork (e.g. the Internet) until it reaches its destination
node.
A router is connected to two or more data lines from different IP networks. When a data packet comes
in on one of the lines, the router reads the network address information in the packet header to determine
the ultimate destination. Then, using information in its routing table or routing policy, it directs the
packet to the next network on its journey.
The most familiar type of IP routers are home and small office routers that simply forward IP packets
between the home computers and the Internet. An example of a router would be the owner’s cable or
DSL router, which connects to the Internet through an Internet service provider (ISP). More sophisticated
routers, such as enterprise routers, connect large business or ISP networks up to the powerful core routers
that forward data at high speed along the optical fiber lines of the Internet backbone.
A router is the first line of security from intrusion into a network. Enabling the highest level of security
on the router turns on things like the firewall, and is the best way to keep your computer system and
information safe from attack.
How Routers Work?
Routers connect a modem like a fiber, cable, or DSL modem to other devices to allow communication
between those devices and the internet. Most routers, including wireless routers, usually feature several
network ports to connect numerous devices to the internet simultaneously.
A router typically connects physically, using a network cable, to the modem via the internet or WAN
port and then physically, again through a network cable, to the network interface card in whatever wired
network devices you have. A wireless router can connect using various wireless standards to devices that
also support the particular standard used.
The IP address assigned to the WAN or internet connection is a public IP address. The IP address
assigned to the local network connection is a private IP address. The private IP address assigned to a
router is usually the default gateway for the various devices on the network.
Wireless routers, and wired routers with multiple connections, also act as simple network switches
allowing the devices to communicate with each other. For example, several computers connected to a
router can be configured to share files and printers among each other.

By- Mr. Bhanuprasad Vishwakarma Page 27

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

Routers are like small computers, with a CPU and memory to deal with incoming and outgoing data.
Different software, such as DD-WRT, can be loaded on the router, much like an operating system on a
computer.
A router operates on the Network layer (layer 3) of the OSI model and uses routing tables to understand
where traffic is coming from and where it should go.
Managing a Router
There will most likely come a time where you need to make changes to how your network works. This
is done by accessing the software on the router.
A few reasons you need to log in to your router is if you want to change the router’s login password,
encrypt the network, set up port forwarding rules, change the Wi-Fi password, pick a different wireless
network name, or update the firmware on the router.
Some other common tasks related to managing a router involve rebooting the router and completely
resetting the router’s software.

Buying a Router
There are several things to consider before buying a router, such as how fast it needs to be to support
your internet speed and devices, as well as its power to ensure that all your devices can receive internet
access.
For example, maybe you’re buying a Wi-Fi router to serve lots of devices, like gaming consoles,
computers, tablets, and phones. If your house is small, you might be able to get away with one router,
whereas larger homes or businesses with several rooms might be better off with a mesh network or a
Wi-Fi extender.
See these lists if you’re having trouble deciding on a new router:
• Long-Range Routers
• Secure Routers
• Routers for Under $50
• Budget Routers
• DD-WRT Routers
• Gaming Routers
• Travel Routers
• Parental Control Routers
• VPN Routers
Mobile Wi-Fi hotspots are similar to routers because they connect multiple devices to the same internet
connection.
Types of Routers
Core routers used by Internet Service Providers (ISPs) are the fastest and most powerful, sitting at the
center of the internet and forwarding information along the main fiber optic backbone. Enterprise routers
connect large organizations’ networks to these core routers.
By- Mr. Bhanuprasad Vishwakarma Page 28

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

An edge router, also known as an access router, is a lower-capacity device that resides at the boundary
of a LAN and connects it to a the public internet or a private wide area network (WAN) and/or
external local area network (LAN). Home and small office routers are considered subscriber edge
routers.
Branch routers link an organization’s remote office locations to its WAN, connecting to the primary
campus network’s edge routers. Branch routers often provide additional features, like time-division
multiplexing, wireless LAN management capabilities and WAN application acceleration.
A logical router is a configured partition of a traditional network hardware, or physical, router. It
replicates the hardware’s functionality, creating multiple routing domains within a single router. Logical
routers perform a subset of the tasks that can be handled by the physical router, and each can contain
multiple routing instances and routing tables.
A wireless router works in the same way as the router in a hard-wired home or business local area
network (LAN), but allows greater mobility for notebook or portable computers. Wireless routers use
the 802.11g specification, a standard that offers transmission over short distances.

IP Address -
An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a
computer network that uses the Internet Protocol for communication. An IP address serves two main
functions: host or network interface identification and location addressing.
Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit number. However, because of the
growth of the Internet and the depletion of available IPv4 addresses, a new version of IP (IPv6), using
128 bits for the IP address, was standardized in 1998. IPv6 deployment has been ongoing since the mid-
2000s.
IP addresses are written and displayed in human-readable notations, such as 172.16.254.1 in IPv4, and
2001:db8:0:1234:0:567:8:1 in IPv6. The size of the routing prefix of the address is designated in CIDR
notation by suffixing the address with the number of significant bits, e.g., 192.168.1.15/24, which is
equivalent to the historically used subnet mask 255.255.255.0.
The IP address space is managed globally by the Internet Assigned Numbers Authority (IANA), and by
five regional Internet registries (RIRs) responsible in their designated territories for assignment to local
Internet registries, such as Internet service providers, and other end users. IPv4 addresses were
distributed by IANA to the RIRs in blocks of approximately 16.8 million addresses each, but have been
exhausted at the IANA level since 2011. Only one of the RIRs still has a supply for local assignments in
Africa. Some IPv4 addresses are reserved for private networks and are not globally unique.
Network administrators assign an IP address to each device connected to a network. Such assignments
may be on a static (fixed or permanent) or dynamic basis, depending on network practices and software
features.
Function
An IP address serves two principal functions. It identifies the host, or more specifically its network
interface, and it provides the location of the host in the network, and thus the capability of establishing
a path to that host. Its role has been characterized as follows: “A name indicates what we seek. An

By- Mr. Bhanuprasad Vishwakarma Page 29

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

address indicates where it is. A route indicates how to get there.” The header of each IP packet contains
the IP address of the sending host, and that of the destination host.
IP versions
Two versions of the Internet Protocol are in common use in the Internet today. The original version of
the Internet Protocol that was first deployed in 1983 in the ARPANET, the predecessor of the Internet,
is Internet Protocol version 4 (IPv4).
The rapid exhaustion of IPv4 address space available for assignment to Internet service providers and
end user organizations by the early 1990s, prompted the Internet Engineering Task Force (IETF) to
explore new technologies to expand the addressing capability in the Internet. The result was a redesign
of the Internet Protocol which became eventually known as Internet Protocol Version 6 (IPv6) in 1995.
IPv6 technology was in various testing stages until the mid-2000s, when commercial production
deployment commenced.
Today, these two versions of the Internet Protocol are in simultaneous use. Among other technical
changes, each version defines the format of addresses differently. Because of the historical prevalence
of IPv4, the generic term IP address typically still refers to the addresses defined by IPv4. The gap in
version sequence between IPv4 and IPv6 resulted from the assignment of version 5 to the experimental
Internet Stream Protocol in 1979, which however was never referred to as IPv5.
Other versions v1 to v9 were defined, but only v4 and v6 ever gained widespread use. v1 and v2 were
names for TCP protocols in 1974 and 1977, as there was to separate IP specification at the time. v3 was
defined in 1978, and v3.1 is the first version where TCP is separated from IP. v6 is a synthesis of several
suggested versions, v6 Simple Internet Protocol, v7 TP/IX: The Next Internet, v8 PIP — The P Internet
Protocol, and v9 TUBA — Tcp & Udp with Big Addresses.

What is Your IP Address?


To view your IP address you can use the ipconfig (IPCONFIG) command line tool. Ipconfig displays
all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol
(DHCP) and Domain Name System (DNS) settings.
To launch the command prompt from a Windows-based computer click: Start > All Programs >
Accessories > Command Prompt. Type ipconfig and press the Enter key.
You can also use Google search to find your IP address. Type “what is my IP address” as a search query
and Google will show the IP address of the computer from which the query was received as the top
search result.

Local Area Network (LAN) -


A local area network (LAN) is a collection of devices connected together in one physical location, such
as a building, office, or home. A LAN can be small or large, ranging from a home network with one user
to an enterprise network with thousands of users and devices in an office or school.
Regardless of size, a LAN’s single defining characteristic is that it connects devices that are in a single,
limited area. In contrast, a wide area network (WAN) or metropolitan area network (MAN) covers larger
geographic areas. Some WANs and MANs connect many LANs together.

By- Mr. Bhanuprasad Vishwakarma Page 30

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

A LAN comprises cables, access points, switches, routers, and other components that enable devices to
connect to internal servers, web servers, and other LANs via wide area networks.
The rise of virtualization has also fueled the development of virtual LANs, which enable network
administrators to logically group network nodes and partition their networks without a need for major
infrastructure changes.
For example, in an office with multiple departments, such as accounting, IT support, and administration,
each department’s computers could be logically connected to the same switch but segmented to behave
as if they are separate.

Types of LAN
Ethernet is the most common type of LAN. Different Lan can be differentiated on the behalf of following
characteristics.
• Topology: The topology is the geometric arrangement of a network elements. For example,
Network devices can be interconnected in a ring topology or in a bus topology or linear bus.
• Protocols: It is a guidelines for communicating data between two devices. The protocols also
determine type of error and data compression.
• Media: The cable used in Lan to connect devices are twisted-pair wire, coaxial cables, or fiber
optic.

Benefits of a LAN
The advantages of a LAN are the same as those for any group of devices networked together. The devices
can use a single Internet connection, share files with one another, print to shared printers, and be accessed
and even controlled by one another.
LANs were developed in the 1960s for use by colleges, universities, and research facilities (such as
NASA), primarily to connect computers to other computers. It wasn’t until the development of Ethernet
technology (1973, at Xerox PARC), its commercialization (1980), and its standardization (1983) that
LANs started to be used widely.
While the benefits of having devices connected to a network have always been well understood, it wasn’t
until the wide deployment of Wi-Fi technology that LANs became commonplace in nearly every type
of environment. Today, not only do businesses and schools use LANs, but also restaurants, coffee shops,
stores, and homes.
Wireless connectivity has also greatly expanded the types of devices that can be connected to a LAN.
Now, nearly everything imaginable can be “connected,” from PCs, printers, and phones to smart TVs,
stereos, speakers, lighting, thermostats, window shades, door locks, security cameras–and even
coffeemakers, refrigerators, and toys.

The Evolution of LAN


As there is a tremendous use of PC or desktop computers in the office environment, it became apparent
that attaching a printer or FAX machine to each and every computer is highly expensive. Further,
copying files to a disk and moving from one computer to another to print the file is also time consuming.
Connecting computers so that they could share a printer and share files translated into big savings.

By- Mr. Bhanuprasad Vishwakarma Page 31

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

In 1982, 10 Mbps Ethernet cards came into existence and they were very expensive. By 1988, 10 Mbps
Ethernet had acceptable performance for large LANs and was still good for small installations. By 1990,
large installations were beginning to see congestion. Hence, alternatives to 10 Mbps cards were
becoming popular. One of these alternatives was to install a switched architecture, rather than
constructing architecture with hubs.
In 1996, 10Mbps switched LANs were providing acceptable service for smaller installations. The
awesome technology at this point was 100Mbps shared Ethernet. By 1998 switched 10Mbps Ethernet
was common in small LANs and switched 100 Mbps Ethernet was common in large LANs. Large LANs
are beginning to see limitations of 100 Mbps when everyone on the LAN starts doing video conferencing.
Now, Gigabyte Ethernet cards are available for sale. The 10 Mbps cards are not used anymore. Now-i-
days 10/100, 10/100/1000 auto-sensing cards are available in the market. Everything is moving to dual
mode auto-sensing technology. Even though Gigabyte Ethernet is getting more popular now-a-days,
Gigabyte LANs are 10 times faster than a 100Mbps LAN. Ethernet was evolved from a protocol called
ALOHA. ALOHA was mainly used in packet radio network which communicate using satellites. In
brief, an earth station sends some data, as soon as the data is ready it waits for an acknowledgement
(ACK). If it fails to get an ACK, it would time out and sends the same thing again. The sender keeps
trying until the transmission is successful. The lesson to be learned here is that it is important to limit the
number of users on a shared network medium. Traffic analysis can help determine the maximum number
of users to ensure a reasonable Quality of Service (QOS).

LAN Advantages and Services


A LAN has the following advantages:
• They work on higher operating speed than WAN and MAN.
• They suit the requirements of a specific organization.
• They are easy to install and maintain.
• They exist as connected (wired) and wireless configurations.

LAN can provide the following services. They are:


(i) File-based service
Transfer of files from one node to another within the LAN area. For example, in a typical LAN used for
local banking, the file containing the detailed transactions of a specific customer is transferred form sever
to the client, whenever new transactions are made on behalf of the customer. It also provides efficient
ways of storing and retrieving the data. When multiple copies of the same file exist, it provides necessary
synchronization in updating the files. LAN also provides backup for the critical data so that safe recovery
is possible when a failure occurs. It also provides data encryption facility to control the access to certain
data to only selected persons.
(ii) Print services
There can be one or more printers, modems, and fax machines attached to a LAN and used by
applications. A number of clients can share these devices. Print services allow many clients to safely
share printers and other such devices. All modem LANs provide these services.

By- Mr. Bhanuprasad Vishwakarma Page 32

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

(iii) Application-based services


Applications run on a client may require higher computational capabilities. Servers are more powerful
than the clients. In a LAN, more than one client can share the computational power of a server.
Application servers are good examples for this.
(iv) Mail and message-based services
Electronic-mail is an important service used for exchanging information between people on a network.
Mails can be stored or forwarded to another user. Many free mail servers are available on the Internet to
provide free mail services to its clients.
(v) Database services
Storing and retrieving of data in databases is another requirement of a client to control and manipulate
the data. Database servers are the most popular ones that service the need of clients.
(vi) Distributed data services
When data is distributed, it is possible for more than one client system to share the data. Though the
databases appear physically distributed, there is a single logical view given by the database server. There
are so many issues involved in sharing a single file by more than one client. Consistency issue is very
seriously tackled when updating shared files.
(vii) Remote services
Linking a LAN with a remote computer or a mainframe is another service required. This feature is used
to access remote databases available in large mainframes.

Characteristics of a LAN
A LAN can be characterized by means of hardware and software components and a set of protocols.
Hardware components of a LAN are:
1. The Server
Server is a computer that provides services to other computers (workstations or clients) on the network.
The primary goal of a LAN server is data management. It stores, retrieves, and protects the data. A server
also sends data to the requesters on the network and also to authorized remote users. The type and
configurations needed for the server, depends mainly on the purpose for which the LAN is being
constructed. Servers may be classified, based on the type of service they provide. A single server may
provide a number of services also. The following are the list of servers categorized, based on the type of
service.
(i) File server and disk server
A file server makes the disk storage space (in the order of several Gigabytes), to various client PCs. The
file server satisfies the request for data from application programs running in client workstations. It also
keeps the consistency of data when more than one client makes simultaneous data requests. In a LAN,
working with a file server, all application running in a workstation may request for a file with involving
the local operating system. The workstation sends its file request to the server and the server processes
the request and sends the required file directly to the workstation.

By- Mr. Bhanuprasad Vishwakarma Page 33

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

(ii) Disk servers


Disk servers are similar to file servers. The difference is that, in a file server when an application running
in a workstation requests for a specific file, the local operating system, running on the workstation
interacts with the file server and gets the information required. In a disk server, the application can
directly access the required file without the intervention of the local operating system.
(iii) Database server
These servers are a subset of the file server category. They provide access to huge databases for clients.
Database information is stored in hard disk storage or CD ROM or optical disk drives. It contains the
DBMS, which is more sophisticated than the basic file I/O access method. DBMS eliminates data
redundancy and allows the user, transparent data distribution. The database server extracts only the
relevant data and passes it to the requesting client, rather than passing the entire file like a file server.
(iv) Print server
Every LAN has one or more printers shared by all the nodes or workstations. The role of a print server
is to collect the information from several workstations, store them on the disk and send it to the printer.
This processing is known as print spooling. Print services become a part of the file server nowadays. In
many LAN architectures, any PC on the LAN can act as a print server.
(v) Backup server
Such servers provide backup in case the main server fails. Every network must have a back up server to
keep all the information safe. Periodically, these servers must be updated so that reliability can be
improved.
(vi) Gateway server
A gateway server is used to provide connectivity to other networks. The GIAS (Gateway server of
VSNL, India) is a gateway server, which provides connectivity to all other networks on the Internet for
the Indian segment of the Internet. A gateway server also provides connectivity to dissimilar networks.
(vii) Communication server
Communication servers are more diverse than the other servers. The main functions of a communication
server are linking client workstations on the LAN with mainframe computers, sharing a pool of modems
among the client stations, and communicating with other LANs as well.
Examples of the most popular LAN servers are Novell Netware LAN Server, Microsoft Windows NT
Server or Windows 2000, IBMOS2 Server, etc.
2. Workstations
Workstations or nodes are the clients that use the services provided by the network server. Workstations
are loaded with special software to interact with the server to access the services. Examples of
workstations include the Microsoft Windows NT workstation, Windows 2000 workstation, IBM
workstation, Sun workstation, etc.
3. The Transmission Media for LAN
Various transmission media are used for constructing a LANs. The most popular among them are twisted
pair, coaxial cable, or optical fibers. LANs operated with any such transmission media is known as wired
LAN. LANs can also be constructed without a transmission media or cable. Such LANs are known as
wireless LANs.

By- Mr. Bhanuprasad Vishwakarma Page 34

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

4. Communication Equipments
(i) Repeater
A repeater operates at layer-I. It has just enough intelligence to find out the layer-l incoming signals are
and then send out a clean stream of signals built from scratch. Noise is eliminated from the signals in
this manner. A repeater has one incoming and one outgoing line. It extends the distance that a signal
may be sent over a transmission media.
(ii) Hub
A hub is a multi-port repeater. Any incoming signal is repeated on all other outgoing lines. A hub
functions at layer-I.
(iii) Bridge
A bridge has more intelligence than a hub or repeater. This device separates two segments of a single
LAN. A bridge operates at layer-2 by looking at the destination address in the frame header. Consulting
a table, the bridge will determine if the frame needs to pass on to the other segment. Only certain frames
may pass those with the correct MAC address.
(iv) Switch
A switch is a multi-port bridge. It performs its functions at layer two. It looks at MAC layer addresses
just like a bridge, consults a table, and determines if a frame needs to be sent on one of the attached lines.
Multiple connections can occur through a switch simultaneously as long as they don’t compete for the
same line. A switch, just like a bridge, does not divide a LAN into two LANs. It merely reduces
unnecessary traffic on LAN segments.
(v) Router
A router is more intelligent than bridges and switches. It functions at layer-3. At layer-2 all incoming
frames are checked for errors and then they are delivered to layer-3. A layer-3 datagram has an address
that permits it to be sent across internet works (interconnected networks). This requires a single global
addressing scheme. The router finds the layer-3 address and consults a table that it keeps. There the
router will learn which attached line to send the datagram on. A router provides facilities to the stations
on the LAN, to access other networks.

Metropolitan Area Network (MAN) -


A metropolitan area network (MAN) is a computer network that interconnects users with computer
resources in a geographic region of the size of a metropolitan area. The term MAN is applied to the
interconnection of local area networks (LANs) in a city into a single larger network which may then also
offer efficient connection to a wide area network. The term is also used to describe the interconnection
of several local area networks in a metropolitan area through the use of point-to-point connections
between them.
The MAN network (Metropolitan Area Network) is a high-speed network (broadband) that covers larger
geographic area such as city (tens of kilometers) or districts than local area network (LAN) but smaller
than wide area network (WAN) and providing the ability to integrate multiple services through the
transmission of data, voice, and video, on transmission media such as copper, fiber optics, and
microwaves.

By- Mr. Bhanuprasad Vishwakarma Page 35

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

The term is applied to the single network such as a cable television network, or it can be a way of
connecting a certain number of LANs in a more extensive network so that resources can share from LAN
to LAN and from device to device. For example, a company can use a MAN to connect the LANs of all
its offices scattered around the city. Local libraries and government agencies often use a MAN to connect
to citizens and private industries. It may also connect MANs within a larger area than LAN. The
geographical limit of a MAN may span a city.
In MAN, different LANs connected through a local telephone exchange. Some of the widely used
protocols for MAN are X.25, Frame Relay, Asynchronous Transfer Mode (ATM), ISDN (Integrated
Services Digital Network), xDSL (Digital Subscriber Line), ADSL (Asymmetrical Digital Subscriber
Line), WDM (Wavelength Division Modulation), etc. These protocols are quite different from those
used for LANs.
A MAN can wholly own by a private company, which will be its operator, or it can be a service provided
by a public service company, such as a local telephone company. Many telephone companies have a
very popular MAN service called Multimegabit Data Switching Services (SMDS).
The copper pair technology positioned as the world’s largest network an excellent alternative for the
creation of metropolitan networks, for its low latency (between 1 and 50 ms), excellent stability and the
lack of radio interference, the MAN LOOP networks, offer speeds of 10 Mbit/s or 20 Mbit/s, on copper
pairs and 100 Mbit/s, 1 Gbit/s and 10 Gbit/s through optical fiber.
The concept of the metropolitan area network represents an evolution of the concept of a local area
network to a broader scope, covering larger areas that in some cases are not limited to an urban
environment but can reach regional and even national coverage through the interconnection of different
networks of the metropolitan area.
This type of networks is a larger version than the LAN and usually based on a technology similar to this
one. The main reason to distinguish a MAN with a particular category is that a standard has adopted to
make it work, which is equivalent to the IEEE standard.
WAN networks also applied in organizations, in groups of corporate offices near a city, these do not
contain switching elements, which divert the packets by one of several potential output lines. These
networks can be public or private.
The networks of the metropolitan area, comprise a specific geographical location “city, the
municipality,” and its distance of coverage is greater than 4 km. They are networks with two
unidirectional buses, each of which is independent of the other in terms of data transfer.

By- Mr. Bhanuprasad Vishwakarma Page 36

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

Applications of Metropolitan Area Network


The Metropolitan Area Network (MAN) has many and varied applications; the main ones are:
• Deployment of VoIP services (Voice over Internet Protocol), in the metropolitan area, allowing
eliminating the “obsolete” traditional lines of analog or ISDN telephony, eliminating the current
expenditure of these lines.
• Interconnection of local area networks (LAN).
• Deployment of Wi-Fi zones without wireless Backhaul (Femtocell) freeing all Wi-Fi channels
for access, this in practice means more than 60% improvement in the connection of Wi-Fi users.
• Computer to computer interconnection.
• Local video surveillance systems.
• CAD / CAM transmission.
• Walkways for wide area networks (WAN).
They also allow the transmission of voice, data and video traffic with high latency guarantees, which is
why it is necessary to install a metropolitan area network at the corporate level, for corporations that
have multiple dependencies in the same capital area.
MAN public or private
A metropolitan area network can be public or private.
An example of a private MAN would be a large department or administration with buildings distributed
throughout the city, transporting all voice and data traffic between buildings through its own MAN and
routing external information through public operators.
The data could transport between the different buildings, either in the form of packages or over fixed
bandwidth channels.
Video applications can link buildings for meetings, simulations, or project collaboration.
An example of public MAN is the infrastructure that a telecommunications operator installs in a city to
offer broadband services to its customers located in this geographical area.
1. Network nodes
Citizen area networks allow to execute and exceed 600 access nodes to the network, which makes it very
useful for public and private environments with a large number of jobs.
2. Network extension
The networks of metropolitan area allow to reach a diameter around 50 km, depending on the scope of
network training of the type of cable used, as well as the technology used. This diameter is considered
sufficient to house a metropolitan area. They cover a city and can connect many, forming more networks.
3. Distance between nodes
Metropolitan area networks allow distances between access nodes of several kilometers, depending on
the type of cable. These distances are considered sufficient to connect different buildings in a
metropolitan area or private camp.

By- Mr. Bhanuprasad Vishwakarma Page 37

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

4. High reliability
Reliability referred to the error rate of the network while it is in operation the error rate defined as the
number of erroneous bits that transmitted over the network. In general, the error rate for optical fiber is
lower than that of copper cable with equal length. The error rate not detected by the error detection
mechanisms is of the order of 10-20. This feature allows metropolitan area networks to work in
environments where errors can be disastrous, such as air traffic control.
The creation of municipal metropolitan networks would allow municipalities to have a high-performance
infrastructure by providing them with a network similar to that of Internet service providers. In this way,
the town hall can connect new offices, remote users, or video cameras on public roads.
5. High security
Fiber optic offers a safe means because it is not possible to read or change the optical signal without
physically interrupting the link.
6. Real-time traffic
The metropolitan area networks guarantee minimum network access times, which allows for the
inclusion of synchronous services necessary for real-time applications, where it is crucial that specific
messages go through the network without delay even when the network load is high.
Between node and node, you cannot have, for example, more than 100 kilometers of cable.
Approximately 20 km of cable can approximate, but it not known at what moment information or data
sent can be lost.
Synchronous services require a reservation of bandwidth; Such is the case of voice and video traffic. For
this reason, metropolitan area networks are optimal networks for multimedia traffic environments,
although not all metropolitan networks support isochronous traffic (information transmission at constant
intervals).

Wide Area Network (WAN) -


A WAN is a network that uses various links – private lines, Multiprotocol Label Switching (MPLS),
virtual private networks (VPNs), wireless (cellular), the Internet to connect smaller metropolitan and
campus networks in diverse locations into a single, distributed network. The sites they connect could be
a few miles apart or halfway around the globe. In an enterprise, the purposes of a WAN could include
connecting branch offices or even individual remote workers with headquarters or the data center, in
order to share corporate resources and communications.
A wide area network (WAN) is a network that exists over a large-scale geographical area. A WAN
connects different smaller networks, including local area networks (LANs) and metro area networks
(MANs). This ensures that computers and users in one location can communicate with computers and
users in other locations. WAN implementation can be done either with the help of the public transmission
system or a private network.
A WAN connects more than one LAN and is used for larger geographical areas. WANs are similar to a
banking system, where hundreds of branches in different cities are connected with each other in order to
share their official data.
A WAN works in a similar fashion to a LAN, just on a larger scale. Typically, TCP/IP is the protocol
used for a WAN in combination with devices such as routers, switches, firewalls and modems.
By- Mr. Bhanuprasad Vishwakarma Page 38

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

WAN architecture
Initially, WANs were built with meshed webs of private lines bought from telecommunications carriers,
but WAN architectures have advanced to include packet-switched services such as frame relay and ATM
as well as MPLS. With these services, a single connection to a site can be connected to many others via
switching within service-provider networks. For certain types of traffic, the Internet can also be woven
into the mix to provide less expensive WAN connections.
History of WANs
WANs have been around since the early days of computing networks. The first examples of WANs
included circuit-switched telephone lines, but advances in technologies now include wireless
transmissions and fiber-optic transmissions. Data can also be moved via leased lines, or even via satellite
transmission.
As technologies changed, so did transmission rates. The early days of 2400 bps modems evolved to 40
Gbps and 100 Gbps connectivity today. These speed increases have allowed more devices to connect to
networks, witnessed by the explosion of computers, phones, tablets and smaller Internet of Things
devices.
In addition, speed improvements have allowed applications to utilize larger amounts of bandwidth that
can travel across WANs at super-high speed. This has allowed enterprises to implement applications
such as videoconferencing and large-file data backup. Nobody would have considered conducting a
videoconference across a 28K bps modem, but now workers can sit in a cubicle and participate in a
global company meeting via video.
Many WAN links are supplied via carrier services in which customers’ traffic rides over facilities shared
by other customers. Customers can also buy dedicated links that nail up circuits point-to-point and are
used for just one customer’s traffic. These are typically used for top-priority traffic or delay-sensitive
applications that have high-bandwidth needs such as videoconferencing.
Connections between WAN sites may be protected by virtual private networking (VPN) technology that
overlays security functions including authentication, encryption, confidentiality and non-repudiation.

WAN Management and optimization


Because data transmission is still reliant on the rules of physics, the greater the distance between two
devices, the longer it will take for data to travel between them. The greater the distance, the greater the
delay. Network congestion and dropped packets can also introduce performance problems.
Some of this can be addressed using WAN optimization, which makes data transmissions more efficient.
This is important because WAN links can be expensive, so technologies have sprung up that reduce the
amount of traffic crossing WAN links and ensure that it arrives efficiently. These optimization methods
include abbreviating redundant data (known as deduplication), compression, and caching (putting
frequently used data closer to the end user).
Traffic can be shaped, giving some applications (such as VoIP) a higher priority over other, less urgent
traffic (such as email), which in turn helps improve the overall WAN performance. This can be
formalized into quality of service settings that define classes of traffic by the priority each class receives
relative to others, the type of WAN connection that each traffic type will travel, and the bandwidth that
each receives.

By- Mr. Bhanuprasad Vishwakarma Page 39

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

Domain Name Registration -


Domain name registration is the act of reserving a name on the Internet for a certain period, usually one
year. It is important to know that this domain will remain yours for as long as you renew it and there is
no way to purchase a domain name forever.
Domain name registration is necessary for a website, an email or another web service. However you
don’t have to always register a new domain name. Many companies allow you to use subdomains of
their domain names for a website, or you can have an email with their primary domain (ex. yahoo.com,
gmail.com).
The most important thing about a domain name registration is that it gives you personality and
recognized identity. Once you register a domain name, the information about its owner is publicly
available.
The price for a domain name registration varies greatly on its extension. For example, the most common
.com is the most affordable one, while some country-specific domain name extensions are 5 times more
expensive.
Domain Name Registration Process
In order to reserve a domain name in a gTLD, a domain name registrant must register it with an
ICANN-accredited registrar. The registrar will check if the domain name is available for registration
and create a WHOIS record with the domain name registrant’s information. It is also possible to
register domain names through a registrar’s resellers.

The diagram below illustrates the main functions of the parties that are usually involved in the process.
A domain name registrant is the person or organization who has registered the domain name. In order to
do so, the domain name registrant will usually apply online to a domain registrar or one of their resellers.
The domain name registrant is bound by the terms and conditions of the registrar with which it registers
By- Mr. Bhanuprasad Vishwakarma Page 40

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

its domain name, for instance adhering to a certain code of conduct or indemnifying the registrar and
registry against any legal or civil action taken as a result of use of the domain name. Domain name
registrants have certain responsibilities that are incorporated into these terms and conditions like
payment of registration fees and submission and timely update of accurate data.
In addition to registering the domain name, domain name registrants also need to have their domain
names listed on name servers in order for that domain name to be reachable on the Internet. A domain
name registrant is responsible for procuring or hosting his or her own name server if the registrar does
not offer this service or he or she has opted out of the registrar’s service.
In some cases, a person or organization who does not wish to have their information listed in WHOIS
may contract with a proxy service provider to register domain names on their behalf. In this case, the
service provider is the domain name registrant, not the end customer.
Registrars are organizations accredited by ICANN and certified by the registries to sell domain names.
They are bound by the Registrar Accreditation Agreement (RAA) with ICANN, and by their agreements
with the registries. The RAA sets out responsibilities for the registrar including maintenance of WHOIS
data, submission of data to registries, facilitating public WHOIS queries, ensuring domain name
registrants details are escrowed, and complying with RAA conditions relating to the conclusion of the
domain name registration period.
Some domain name registrants may opt to register through a reseller. These organizations are affiliated
or under contract with registrars, and usually offer other services such as web hosting, email mailboxes
etc. Resellers are bound by their agreements with the registrar(s) whose services they sell; they are not
accredited by ICANN. However, the registrar for whom they are re-selling will still be the sponsor for
the domain name registration and accountable for the domain names sold by the reseller.
While registrars are contracted to conduct the day-to-day business of selling domain name registrations,
registries are responsible for maintaining the registry for each TLD. The responsibilities of the registries
include accepting registration requests (whether from registrars or directly from domain name
registrants), maintaining a database of the necessary domain name registration data and providing name
servers to publish the zone file data (i.e. information about the location of a domain name) throughout
the Internet.
The Internet Corporation for Assigned Names and Numbers (ICANN) is the non-profit organization that
oversees the assignment of both IP addresses and domain names. It has responsibility for managing root
server and TLD name system management and has contractual agreements with both registries and
registrars that provide the foundation for the WHOIS system.

e-commerce: Meaning, Characteristics, Advantage and


Disadvantage -
E-Commerce or Electronic Commerce means buying and selling of goods, products, or services over the
internet. E-commerce is also known as electronic commerce or internet commerce. These services
provided online over the internet network. Transaction of money, funds, and data are also considered as
E-commerce. These business transactions can be done in four ways: Business to Business (B2B),
Business to Customer (B2C), Customer to Customer (C2C), Customer to Business (C2B). The standard
definition of E-commerce is a commercial transaction which is happened over the internet. Online stores

By- Mr. Bhanuprasad Vishwakarma Page 41

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

like Amazon, Flipkart, Shopify, Myntra, Ebay, Quikr, Olx are examples of E-commerce websites. By
2020, global retail e-commerce can reach up to $27 Trillion.
E-commerce is a popular term for electronic commerce or even internet commerce. The name is self-
explanatory, it is the meeting of buyers and sellers on the internet. This involves the transaction of goods
and services, the transfer of funds and the exchange of data.
So when you log into your Amazon and purchase a book, this is a classic example of an e-commerce
transaction. Here you interact with the seller (Amazon), exchange data in form of pictures, text, address
for delivery etc. and then you make the payment.
Characteristics of E-Commerce
E-commerce is characterized by the following features:
(i) The business tools are electronic and the application is commerce, i.e. profit motive.
(ii) Business is externally focused on those with whom business is conducted.
(iii) Most of the transactions are processed automatically.
(iv) Uses a gamut of business support services, such as inter-organizational e-mail and on-line
directories.

Examples of E-Commerce
• Amazon
• Flipkart
• eBay
• Fiverr
• Upwork
• Olx
• Quikr
Advantages of e-commerce
• E-commerce provides the sellers with a global reach. They remove the barrier of place
(geography). Now sellers and buyers can meet in the virtual world, without the hindrance of
location.
• Electronic commerce will substantially lower the transaction cost. It eliminates many fixed costs
of maintaining brick and mortar shops. This allows the companies to enjoy a much higher margin
of profit.
• It provides quick delivery of goods with very little effort on part of the customer. Customer
complaints are also addressed quickly. It also saves time, energy and effort for both the
consumers and the company.
• One other great advantage is the convenience it offers. A customer can shop 24×7. The website
is functional at all times, it does not have working hours like a shop.

By- Mr. Bhanuprasad Vishwakarma Page 42

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

• Electronic commerce also allows the customer and the business to be in touch directly, without
any intermediaries. This allows for quick communication and transactions. It also gives a
valuable personal touch.
Disadvantages of e-commerce
• The start-up costs of the e-commerce portal are very high. The setup of the hardware and the
software, the training cost of employees, the constant maintenance and upkeep are all quite
expensive.
• Although it may seem like a sure thing, the e-commerce industry has a high risk of failure. Many
companies riding the dot-com wave of the 2000s have failed miserably. The high risk of failure
remains even today.
• At times, e-commerce can feel impersonal. So it lacks the warmth of an interpersonal relationship
which is important for many brands and products. This lack of a personal touch can be a
disadvantage for many types of services and products like interior designing or the jewelry
business.
• Security is another area of concern. Only recently, we have witnessed many security breaches
where the information of the customers was stolen. Credit card theft, identity theft etc. remain
big concerns with the customers.
• Then there are also fulfillment problems. Even after the order is placed there can be problems
with shipping, delivery, mix-ups etc. This leaves the customers unhappy and dissatisfied.
Types of e-commerce Models
Electronic commerce can be classified into four main categories. The basis for this simple classification
is the parties that are involved in the transactions. So the four basic electronic commerce models are as
follows,
1. Business to Business
This is Business to Business transactions. Here the companies are doing business with each other. The
final consumer is not involved. So the online transactions only involve the manufacturers, wholesalers,
retailers etc.
2. Business to Consumer
Business to Consumer. Here the company will sell their goods and/or services directly to the consumer.
The consumer can browse their websites and look at products, pictures, read reviews. Then they place
their order and the company ships the goods directly to them. Popular examples are Amazon, Flipkart,
Jabong etc.
3. Consumer to Consumer
Consumer to consumer, where the consumers are in direct contact with each other. No company is
involved. It helps people sell their personal goods and assets directly to an interested party. Usually,
goods traded are cars, bikes, electronics etc. OLX, Quikr etc follow this model.
4. Consumer to Business
This is the reverse of B2C, it is a consumer to business. So the consumer provides a good or some service
to the company. Say for example an IT freelancer who demos and sells his software to a company. This
would be a C2B transaction.
By- Mr. Bhanuprasad Vishwakarma Page 43

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

Mobile Commerce -
Mobile commerce, also referred as m-commerce, is the use of wireless handheld devices, such as
cellular phones and laptops, to conduct commercial transactions online. Mobile commerce transactions
continue to grow, and the term includes the purchase and sale of a wide range of products and services,
such as online banking, bill payment and information delivery.

Mobile commerce is founded upon the increasing adoption of electronic commerce. The rapid growth
of mobile commerce is being driven by a number of positive factors, including the demand for
applications from an increasingly mobile consumer base; the rapid adoption of online commerce, thanks
to the resolution of security issues; and technological advances that have given wireless handheld devices
advanced capabilities and substantial computing power.
M-Commerce benefits for business
Surely, running a mobile app for ecommerce can’t be the sole guarantee of profit. This is a great
additional value tool to engage customers and offer experiences. Any amount of investment to make an
app, if done wisely, will be justified by loyal customers. Also, check your competition if they have app,
you should probably too.
Now we are going to name main advantages of m-commerce, with few practical examples.
1. Faster purchases
Yes, many sites have mobile versions, though apps are generally 1.5 times faster when loading data and
search results on mobile devices. Moreover, there is no need to pull data from a server and so customers
can browse and purchase products faster. As mobile ecommerce apps offer same functionality as desktop
apps, people may purchase items directly within an app.
M-commerce revenue has been rising at 30-40% rate annually since 2014, and by the end of 2017 is
expected to reach $150b total. The biggest retail app Amazon increased number of customers from 43
million in 2015 to 67 million in 2016. The reason for such achievements is intuitive mobile browsing,
which in turn drives sales up.

By- Mr. Bhanuprasad Vishwakarma Page 44

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

2. Better customer experience


Because it matters. People are well familiar with how smartphones and tablets work, so they already
know how to navigate to desired products in few clicks. In addition to purchases, customers can share
their joy of bought goods with friends, or ask for advice from community of shopaholics. Smooth
customer experience equals better conversion rates and revenue.
To reach these goals, your online shopping app should be:
• Fast
• Convenient
• Interactive
• Exclusive
3. Direct connection to customers (push notifications)
Shoppers get such alerts when they open a mobile app, and may get them even without activating an
app. 50% of users like notifications, and 80% of users say offers and rewards make them more loyal to
a brand. This is personal communication, if you look at it from another angle, store to customer directly.
Most of people perceive informing about news or discounts as care, and they want exclusive stuff.
4. Deeper analytics
Knowing your customers equals prosperity in business these days. Knowing customers demands data,
at least very basic information like age, sex, location, shopping history. Within your mobile app you may
build and set user analytics of various levels of sophistication. It depends on your business strategy and
a budget available to make an app.
With such data you will understand your target audience much better, and will be able to increase sales.
Names, phone numbers, emails, buying patterns and lots of other things in store. For instance, Walmart
app that 22 million customers use every month, uses mobile data, online data and sales data combined
to deliver better customer experience. It is a whole and enormous infrastructure.
5. Cost reduction and productivity
By reaching your audience faster with a mobile app you obviously cut down marketing campaign costs.
If an app has social media integration, users will do their part too in spreading the word. You can even
earn from placing ads within your app later on.
6. Store navigation/geolocation
Mobile apps have a much better competitive (technical) in regard to marketing opportunities. Front and
back camera, scanning codes, positioning system for location, compass, accelerometer, gyroscope and
other build-in features can be used for commercial purposes. One of the top benefits of m-commerce
solutions is navigating users to nearest stores in their vicinity via GPS.
Advantages of M-Commerce
1. Convenience
With just a few clicks on mobile devices, customers can already do shopping, banking, download media
files…and more than that. M-commerce also benefits retailers by many of their outstanding features
compared with responsive website and mobile site.

By- Mr. Bhanuprasad Vishwakarma Page 45

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

2. Flexible Accessibility
User can be accessible via mobile devices and at the same time be accessible online too through logging
on to various mobile messengers and other networking platforms. On the other hand, the user may also
choose not to be accessible by shutting down his mobile device, which at times can be a good thing.
3. Easy Connectivity
As long as the network signal is available, mobile devices can connect and do commerce transactions
not only mobile to mobile but also mobile to other devices. No need for modem or WI-FI connectivity
set up.
4. Personalization
Each mobile device is usually dedicated to a specific user so that it is personal. Users can do whatever
they want with their handheld devices: modify the wallpaper, change view settings or modify contact
information as you send emails or e-payments.
5. Time Efficient
Doing M-Commerce transactions do not require the users to plug anything like personal computer or
wait for the laptop to load.

Emerging trens in Mobile APPS

By- Mr. Bhanuprasad Vishwakarma Page 46

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

1. Cloud Technology Finally Finds It’s Place


No surprises here. From the average consumer to the tech professional, everyone has heard about the
benefits of cloud technology, and how it can to change our collective lives. Today, cloud computing is
not only fast, easy to deploy, and inexpensive; but also makes a good working argument for both large-
scale enterprises and small mom-and-dad joints.
Dropbox, OneDrive, and Google Drive are just the tip of the iceberg, as in 2018, we can expect new
powerful apps which directly run on the cloud and take minimal space in the phone storage. Syncing
data working on an app on the phone and then continuing it from a tablet or desktop will also see a huge
acceptance.
2. Enterprise Mobile Apps Get a New Lease of Life
It’s not a secret anymore that more and more developers are gravitating towards developing enterprise
mobile apps. The reason being that such apps, which make it easy to keep large teams connected, as well
as track key metrics and KPIs, are now required by almost every small and large business to some extent.
43% of the enterprise app developers earn more than $10,000 per month, as compared to the 19% of the
developers who develop consumer-focused apps. Enterprise app stores are also predicted to become the
next big thing, as with more B2B interaction, a tremendous opportunity will be offered to new
developers.
3. IoT will Open New Possibilities
IoT, or the Internet of Things, is already a $19 trillion industry, and over the next five years, more than
5 billion people are expected to be using an IoT-driven technology in some form or the other. Today,
IoT is present in modern wearable technology, smart thermostats, smart bulbs, dimmable streetlights,
etc.
In the coming year, expect this technology to be rapidly adopted for mobile application development,
while allowing for more personalized user experiences across a variety of devices.
4. Location-based Wi-Fi Services Become Commonplace
Mobile location services and Beacon technology are now starting to blur the boundaries between online
and offline advertising, especially in the retail sector. Apple had already integrated the technology within
iBeacon, and in 2016 Android followed suit.
In the following years, Wi-Fi will be used for more than just internet access, as more and more public
hotspots would also double up as location access points. App developers are also expected to follow suit,
by building apps which take advantage of such location-based Wi-Fi services.
5. M-Commerce to be the Next Great Opportunity
As e-commerce giants such as Amazon and eBay flourish, the usage of m-Commerce apps is also
expected to increase in the coming years. With more smartphones featuring technology such as NFC,
Fingerprint recognition, etc., using a mobile phone to pay for transactions, amongst others, will also find
ready acceptance. Developers will also have the opportunity to build m-Commerce apps which can
provide additional functionality to the consumer. Read our article which describes the models, benefits,
and future trends of mobile payment solutions.
6. In-App Advertising and Purchasing Will Grow Steadily
With a growing number of smartphone users using their mobile apps to perform mundane, day-to-day
tasks, the revenue generated from in-app advertising and purchasing is also steadily increasing.
By- Mr. Bhanuprasad Vishwakarma Page 47

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

According to the latest figures, in-app purchasing from mobile devices touched approximately $9 billion
in 2017. In the coming years, expect application development trends to move away from simple banners
and integrating advertisements in a fun, non-obnoxious manner for the end-user.
7. Application Security Becomes Necessary
With rapid technological advancements being made on a daily basis, application security, as well as
general smartphone security is a major concern. Currently, most of the top 100 apps in the Google app
store have already been hacked, and the picture isn’t that pretty on the iOS side as well.
Therefore, with Google, Microsoft, and Apple all raising the stakes and making security a big target for
the coming few years, developers also need to focus on cyber security and implement new-generation
security features within their apps.
8. New-gen Mobile Games See the Light of Day
With the advancements being made in the field of social connectivity and cloud technology, now is the
time for developers to focus on games which have an increased multiplayer focus rather than developing
only single player games.
By developing new-generation games based on the latest game engines, which also make use of easy
access to cloud technology, developers can push frequent and rapid updates to enhance the UX.

Business Models Of E-Commerce -


e-commerce business models of all types are thriving. Sales from online stores are expected to increase
78% by 2020.
It’s easy to get caught up and excited in the latest ecommerce trends, but unless you know the
fundamentals, you’ll hit a profitability wall without knowing it.
A booming ecommerce business takes intuition, knowledge of your market, a solid business plan, and
careful research into products and business models. But one of the biggest hurdles most newcomers to
the space face is easy to solve. Many would-be ecommerce business owners just don’t know how
ecommerce businesses are set up and what different types of e-commerce are available to them.
Electronic commerce encompasses all online marketplaces that connect buyers and sellers. The internet
is used to process all electronic transactions.
B2B: Business To Business Ecommerce
A B2B model focuses on providing products from one business to another. While many businesses in
this niche are service providers, you’ll find software companies, office furniture and supply companies,
document hosting companies, and numerous other ecommerce business models under this heading.
B2B ecommerce examples you may be familiar with include the ExxonMobil Corporation and the
Chevron Corporation, Boeing, and Archer Daniel Midlands. These businesses have custom, enterprise
ecommerce platforms that work directly with other businesses in a closed environment. A B2B
ecommerce business typically requires more startup cash.
B2C: Business to Consumer Ecommerce
The B2C sector is what most people think of when they imagine an ecommerce business. This is the
deepest market, and many of the names you’ll see here are known quantities offline, too. B2C sales are

By- Mr. Bhanuprasad Vishwakarma Page 48

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

the traditional retail model, where a business sells to individuals, but business is conducted online as
opposed to in a physical store.
Examples of B2C businesses are everywhere. Exclusively online retailers include Newegg.com,
Overstock.com, Wish, and ModCloth, but other major B2C model brick-and-mortar businesses like
Staples, Wal-Mart, Target, REI, and Gap.

C2C Ecommerce
B2B and B2C are fairly intuitive concepts for most of us, but the idea of C2C is different. What does a
consumer-to-consumer ecommerce business look like?
Created by the rise of the ecommerce sector and growing consumer confidence in online business, these
sites allow customers to trade, buy, and sell items in exchange for a small commission paid to the site.
Opening a C2C site takes careful planning.
Despite the obvious success of platforms like eBay and Craigslist, numerous other auction and classified
sites (the main arenas for C2C) have opened and quickly closed due to unsustainable models.
C2B: Consumer to Business Ecommerce
C2B is another model most people don’t immediately think of, but that is growing in prevalence. This
online commerce business is when the consumer sells goods or services to businesses, and is roughly
equivalent to a sole proprietorship serving a larger business.
Reverse auctions, service provision sites like UpWork, and several common blog monetization strategies
like affiliate marketing or Google AdSense also fall under this heading.

Types of Ecommerce Business Revenue Models


The next most important thing to think about is how you want to handle inventory management and
sourcing products. Some people like the idea of making their own products and others hate the idea of
their garage full of boxes.
1. Drop Shipping
The simplest form of ecommerce, drop shipping lets you set up a storefront and take the customers’
money through credit cards or PayPal. The rest is up to your supplier. This frees you from managing
inventory, warehousing stock, or dealing with packaging, but there’s a major caveat.
Many dropshippers use Shopify and Oberlo. Its quick and inexpensive to set up. A popular model is to
set up a quick store and drive traffic with Facebook Ads. Margins are thin and if you can squeeze out
some profit here, more power to you. I’m holding off on drop shipping for now.
2. Wholesaling and Warehousing
Wholesaling and warehousing ecommerce businesses require a lot of investment at the start – you need
to manage inventory and stock, keep track of customer orders and shipping information, and invest in
the warehouse space itself.
DollarDays is an online wholesaler with a massive product catalog that includes more than 260,000
products. They employ a key strategy for retailers in this space by offering case prices AND piece prices,

By- Mr. Bhanuprasad Vishwakarma Page 49

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

they can sell to the general public and to retailers. This gives them a higher profit margin than a strictly
wholesale model.
Solutions for Wholesalers
Wholesale businesses are all about volume. You’ll need to push products out to Ebay, Amazon, Google,
etc. BigCommerce includes all this in their Basic plan for $29 month. No tinkering needed. If you have
dev skills, you can use X-Cart.

3. Private Labeling and Manufacturing


If you’ve got an idea for the perfect product, but don’t have the cash or desire to build your own factory,
this might be the right business model for you. Companies that manufacture products offsite for sale
send the plans or prototypes to a contracted manufacturer who produces the product to meet customer
specifications and can either ship directly to the consumer, to a third party such as Amazon, or to the
company selling the final product.
On-demand manufacturing allows you to quickly change suppliers if you encounter problems with
product quality. The startup costs are minimal, and if you’re interested in potentially opening your own
production facilities later, this is a good way to test a new product or concept.
4. White Labeling
White labeling is similar. You choose a product that is already successfully sold by another company,
but offers white label options, design your package and label, and sell the product. This is common in
the beauty and wellness industries, but more difficult to encounter in other niches.
One problem with white labeling is demand. You’re stuck with whatever you order, and most of these
companies set a minimum production quantity. If you can’t sell it, you’ll have to live with it. Consider
this option when you’re willing to work full time on your business and know your product is in demand.
If you have your own line of branded products and need to get traction, BigCommerce is a good option
to start. Their pricing model can get expensive when you start to make significant sales ($150K+ per
year).
5. Subscription
One of the most popular and successful pure ecommerce brands is the Dollar Shave Club. Other
examples of subscription services include Stitch Fix, Blue Apron, and Nature Box. On the local level,
community-supported agriculture boxes are popular.
These companies rely on a subscription model that delivers customers a box of products at regular,
scheduled intervals. Subscription companies have relatively reliable income streams and can easily
incentivize customers to purchase additional subscriptions or encourage their contacts to subscribe.
Picking the right products and niches can be difficult. Successful subscription boxes tend to fall into a
small handful of product categories: health and grooming, beauty, fashion, and food. Outside of these
areas, few subscription companies thrive.

E-Governance -
Electronic governance or e-governance is the application of information and communication technology
(ICT) for delivering government services, exchange of information, communication transactions,
integration of various stand-alone systems and services between government-to-citizen (G2C),
By- Mr. Bhanuprasad Vishwakarma Page 50

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

government-to-business (G2B), government-to-government (G2G), government-to-employees (G2E) as


well as back-office processes and interactions within the entire government framework. Through e-
governance, government services are made available to citizens in a convenient, efficient, and
transparent manner. The three main target groups that can be distinguished in governance concepts are
government, citizens, and businesses/interest groups. In e-governance, there are no distinct boundaries.

Benefits of E-governance
• Reduced corruption
• High transparency
• Increased convenience
• Growth in GDP
• Direct participation of constituents
• Reduction in overall cost.
• Expanded reach of government
Through e-governance, the government plans to raise the coverage and quality of information and
services provided to the general public, by the use of ICT in an easy, economical and effective manner.
The process is extremely complicated which requires, the proper arrangement of hardware, software,
networking and indeed re-engineering of all the processes to facilitate better delivery of services.

Types of Interactions in E-Governance


1. G2G (Government to Government)
When the exchange of information and services is within the periphery of the government, is termed as
G2G interaction. This can be both horizontal, i.e. among various government entities and vertical, i.e.
between national, state and local government entities and within different levels of the entity.
2. G2C (Government to Citizen)
The interaction amidst the government and general public is G2C interaction. Here an interface is set up
between government and citizens, which enables citizens to get access to wide variety of public services.
The citizens has the freedom to share their views and grievances on government policies anytime,
anywhere.
3. G2B (Government to Business)
In this case, the e-governance helps the business class to interact with the government seamlessly. It
aims at eliminating red-tapism, saving time, cost and establish transparency in the business environment,
while interacting with government.
4. G2E (Government to Employees)
The government of any country is the biggest employer and so it also deals with employees on a regular
basis, as other employers do. ICT helps in making the interaction between government and employees
fast and efficient, along with raising their level of satisfaction by providing perquisites and add-on
benefits.
E-governance can only be possible if the government is ready for it. It is not a one day task, and so the
government has to make plans and implement them before switching to it. Some of the measures include
By- Mr. Bhanuprasad Vishwakarma Page 51

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

Investment in telecommunication infrastructure, budget resources, ensure security, monitor assessment,


internet connectivity speed, promote awareness among public regarding the importance, support from
all government departments and so forth
E-governance has a great role to play, that improves and supports all tasks performed by the government
department and agencies, because it simplifies the task on the one hand and increases the quality of work
on the other.

Electronic Fund Transfer -


Electronic Funds Transfer (EFT) is the electronic transfer of money from one bank account to another,
either within a single financial institution or across multiple institutions, via computer-based systems,
without the direct intervention of bank staff. EFT transactions are known by a number of names. In the
United States, they may be referred to as electronic checks or e-checks.
According to the United States Electronic Fund Transfer Act of 1978 it is “a funds transfer initiated
through an electronic terminal, telephone, computer (including on-line banking) or magnetic tape for the
purpose of ordering, instructing, or authorizing a financial institution to debit or credit a consumer’s
account”.
EFT transactions are known by a number of names across countries and different payment systems. For
example, in the United States, they may be referred to as “electronic checks” or “e-checks”. In the United
Kingdom, the term “bank transfer” and “bank payment” are used, while in several other European
countries “giro transfer” is the common term.

Types of Electronic Fund Transfer


The term covers a number of different payment systems, for example:
• Cardholder-initiated transactions, using a payment card such as a credit or debit card
• Direct deposit payment initiated by the payer
• Direct debit payments for which a business debits the consumer’s bank accounts for payment for
goods or services
• Wire transfer via an international banking network such as SWIFT
• Electronic bill payment in online banking, which may be delivered by EFT or paper check
• Transactions involving stored value of electronic money, possibly in a private currency.
EFTs includes direct-debit transactions, wire transfers, direct deposits, ATM withdrawals and online bill
pay services. Transactions are processed through the Automated Clearing House (ACH) network, the
secure transfer system of the Federal Reserve that connects all U.S. banks, credit unions and other
financial institutions.
For example, when you use your debit card to make a purchase at a store or online, the transaction is
processed using an EFT system. The transaction is very similar to an ATM withdrawal, with near-
instantaneous payment to the merchant and deduction from your checking account.
Direct deposit is another form of an electronic funds transfer. In this case, funds from your employer’s
bank account are transferred electronically to your bank account, with no need for paper-based payment
systems.

By- Mr. Bhanuprasad Vishwakarma Page 52

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

Types of EFT payments


There are many ways to transfer money electronically. Below are descriptions of common EFT payments
you might use for your business.
1. Direct deposit lets you electronically pay employees
After you run payroll, you will tell your direct deposit service provider how much to deposit in each
employee’s bank account. Then, the direct deposit provider will put that money in employee accounts
on payday. Not all employers can make direct deposit mandatory, so make sure you brush up on direct
deposit laws.
2. Wire transfers are a fast way to send money
They are typically used for large, infrequent payments. You might use wire transfers to pay vendors or
to make a large down payment on a building or equipment.
3. ATMs
ATMs let you bank without going inside a bank and talking to a teller. You can withdraw cash, make
deposits, or transfer funds between your accounts.
4. Debit cards
Debit cards allow you to make EFT transactions. You can use the debit card to move money from your
business bank account. Use your debit card to make purchases or pay bills online, in person, or over the
phone.
5. Electronic checks
Electronic checks are similar to paper checks, but used electronically. You will enter your bank account
number and routing number to make a payment.
6. Pay-by-phone
Pay-by-phone systems let you pay bills or transfer money between accounts over the phone.
7. Personal computer banking
Personal computer banking lets you make banking transactions with your computer or mobile device.
You can use your computer or mobile device to move money between accounts.

Electronic Data Interchange (EDI) -


Electronic Data Interchange (EDI) is the electronic interchange of business information using a
standardized format; a process which allows one company to send information to another company
electronically rather than with paper. Business entities conducting business electronically are called
trading partners.
Many business documents can be exchanged using EDI, but the two most common are purchase orders
and invoices. At a minimum, EDI replaces the mail preparation and handling associated with traditional
business communication. However, the real power of EDI is that it standardizes the information
communicated in business documents, which makes possible a “paperless” exchange.
The traditional invoice illustrates what this can mean. Most companies create invoices using a computer
system, print a paper copy of the invoice and mail it to the customer. Upon receipt, the customer
By- Mr. Bhanuprasad Vishwakarma Page 53

Downloaded by DWITI Ravariya ([email protected])


lOMoARcPSD|30678159

S.Y.B.M.S. Sem-III INFORMATION TECHNOLOGY Unit-III

frequently marks up the invoice and enters it into its own computer system. The entire process is nothing
more than the transfer of information from the seller’s computer to the customer’s computer. EDI makes
it possible to minimize or even eliminate the manual steps involved in this transfer.
EDI replaces postal mail, fax and email. While email is also an electronic approach, the documents
exchanged via email must still be handled by people rather than computers. Having people involved
slows down the processing of the documents and also introduces errors. Instead, EDI documents can
flow straight through to the appropriate application on the receiver’s computer (e.g., the Order
Management System) and processing can begin immediately. A typical manual process looks like this,
with lots of paper and people involvement:
1. Business documents
These are any of the documents that are typically exchanged between businesses. The most common
documents exchanged via EDI are purchase orders, invoices and advance ship notices. But there are
many, many others such as bill of lading, customs documents, inventory documents, shipping status
documents and payment documents.
2. Standard format
Because EDI documents must be processed by computers rather than humans, a standard format must
be used so that the computer will be able to read and understand the documents. A standard format
describes what each piece of information is and in what format (e.g., integer, decimal, mmddyy). Without
a standard format, each company would send documents using its company-specific format and, much
as an English-speaking person probably doesn’t understand Japanese, the receiver’s computer system
doesn’t understand the company-specific format of the sender’s format.
• There are several EDI standards in use today, including ANSI, EDIFACT, TRADACOMS and
ebXML. And, for each standard there are many different versions, e.g., ANSI 5010 or EDIFACT
version D12, Release A. When two businesses decide to exchange EDI documents, they must
agree on the specific EDI standard and version.
• Businesses typically use an EDI translator either as in-house software or via an EDI service
provider to translate the EDI format so the data can be used by their internal applications and
thus enable straight through processing of documents.
3. Business partners
The exchange of EDI documents is typically between two different companies, referred to as business
partners or trading partners. For example, Company A may buy goods from Company B. Company A
sends orders to Company B. Company A and Company B are business partners.

By- Mr. Bhanuprasad Vishwakarma Page 54

Downloaded by DWITI Ravariya ([email protected])

You might also like