0% found this document useful (0 votes)
94 views20 pages

SLM - Unit 13

Uploaded by

pavanmay227597
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
94 views20 pages

SLM - Unit 13

Uploaded by

pavanmay227597
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

Fundamentals of Information Technology Unit 13

Unit 13 Internet and Its Working


Structure:
13.1 Introduction
Objectives
13.2 History of Internet
13.3 Basics of Internet
13.4 Components of Internet
13.5 Internet Protocol Addressing
13.6 Internet Connection Types
13.7 How Internet Works
13.8 Internet Security
13.9 Uses of Internet
13.10 Summary
13.11 Terminal Questions
13.12 Answers

13.1 Introduction
In the previous unit we have studied operating system basics, its functions,
development of an operating system, virtual memory, operating system
mechanisms, operating system services and operating system security. In
this unit, we will study the history of internet, basics behind the internet,
various components of the internet, web browsers, web servers, Hyper Text
Transfer Protocol (HTTP), World Wide Web (WWW), internet protocol
addressing, and types of internet connection. Finally we will study how
internet works, internet security and uses of internet.
Today Internet is everywhere and is growing rapidly worldwide. In everyday
life, the internet has been called by different names such as Net and Web.
During the last few years E-mail, internet, intranet, and video conferencing,
cellular technologies have all become very popular. As long as your
computer is connected to the internet, you can communicate with anyone in
the world, who has a computer that is also connected to the internet. It is
just like using the mobile; you can always ring up a person, no matter where
the person is located. Internet is the only technology that has affected the
people irrespective of their location, language or profession. It has shrunk
the whole world and brought people closer. This technology has changed

Sikkim Manipal University B2071 Page No.: 255


Fundamentals of Information Technology Unit 13

the way in which the computers work and the way people work with
computers. It has made a commendable impact in different areas, especially
in the areas of learning, working, living and communicating.
Objectives:
After studying this unit, you should be able to:
 discuss history of internet
 discuss HyperText Markup Language and Uniform Resource Locator
 explain web browser and web server
 discuss HyperText Transfer Protocol and World Wide Web
 list and explain various internet connections
 describe internet protocol addressing
 explain the internet security
 list various uses of internet

13.2 History of Internet


The history of internet began in 1957 when Union of Soviet Socialist
Republics (USSR) launched the first artificial earth satellite sputnik and US
formed the Advanced Research Projects Agency (ARPA) within the
Department of Defense (DOD). The early ARPANET consisted primarily of
research universities and military contractors with computers linked by
telephones lines leased from AT&T. The chronological development of the
internet is seen below.
Chronological Development of the Internet
1969: ARPA (Advanced Research Projects Agency) goes online in
December, connecting four major U.S. universities. Designed for research,
education, and government organizations, it provides a communications
network linking the country in the event that a military attack destroys
conventional communications systems.
1972: Electronic mail is introduced by Ray Tomlinson, a Cambridge, Mass
computer scientist. He uses @ to distinguish between the sender's name
and network name in the email address.
1973: Transmission Control Protocol/Internet Protocol (TCP/IP) was
designed and in 1983 it became the standard for communicating between
computers over the Internet. One of these protocols, FTP (File Transfer

Sikkim Manipal University B2071 Page No.: 256


Fundamentals of Information Technology Unit 13

Protocol), allows users to log onto a remote computer, list the files on that
computer, and download files from that computer.
1982: The word “Internet” is used for the first time.
1984: Domain Name System (DNS) is established, with network addresses
identified by extensions such as .com, .org, and .edu.
1988: A virus called the Internet Worm temporarily shuts down about 10%
of the world's Internet servers.
1989: The World (world.std.com) presents as the first provider of dial-up
Internet access for consumers. Tim Berners develops a new technique for
distributing information on the Internet. He calls it World Wide Web. The
Web is based on hypertext, which permits the user to connect from one
document to another at different sites on the Internet via hyperlinks
(specially programmed words, phrases, buttons, or graphics).
1994: Marc Andreessen and Jim Clark start Netscape Communications.
They introduce the Navigator browser.
2001: Wikipedia is created.
2004: Internet Worm, called MyDoom or Novarg, spreads through Internet
servers. About 1 in 12 email messages are infected. Facebook goes online
and the era of social networking begins. Mozilla unveils the Mozilla Firefox
browser.
2005: YouTube.com is launched.
2006: AOL (America Online) changes its business model, offering most
services for free and relying on advertising to generate revenue. The
Internet Governance Forum meets for the first time.
2009: The Internet marks its 40th anniversary.
2010: Facebook reaches 400 million active users.
2011: Twitter and Facebook play a large role in the Middle East revolts.

13.3 Basics of Internet


The Internet is the global “Network of Networks,” linking thousands of
computer networks together. A group of computers and other devices
connected together is called a Network. Every computer that is connected to

Sikkim Manipal University B2071 Page No.: 257


Fundamentals of Information Technology Unit 13

the Internet is a part of a network, even the computer which you are using at
home. Some basics behind the internet technology are seen below:
 HTML – HTML stands for HyperText Markup Language. HTML was
created by Tim Berners-Lee in collaboration with “Robert Caillau” while
they worked at CERN in 1989. It is a subset of Standard Generalized
Mark-Up Language (SGML). HTML is the language of Internet, using
which we can create a website. It is used to create documents on the
World Wide Web. It is simply a collection of certain keywords called
‘Tags’ that are helpful in writing the document to be displayed using a
browser on Internet.
HTML is a platform independent language that can be used on any
platform such as Windows, Linux, Macintosh, and so on. To display a
document in the web it is essential to mark-up the different elements
(headings, paragraphs, tables, and so on) of the document with the
HTML tags. To view a mark-up document, user has to open the
document in a browser. A browser understands and interprets the HTML
tags, identifies the structure of the document and makes decision about
presentation of the document.
 Hyperlinks: Hyperlink is an electronic link to other text. In other words,
if you click on hypertext it will take you to other related material. Most
internet documents contain hyperlinks.
 Hypermedia: Hypermedia is an electronic link to pictures, sounds,
animations and movies. Documents with links that contain information
other than text is called hypermedia.
 Uniform Resource Locator: Whenever we want to access any website
we need the URL. URL stands for Uniform Resource Locator. Uniform
Resource Locator is a string of characters used to represent and identify
a page of information on the World Wide Web that is used by a web
browser such as Netscape or Internet Explorer to find HTTP, FTP, telnet
and other resources on the Internet. Each URL consists of a scheme
(HTTP, HTTPS, FTP, or Gopher) and a scheme-specific string. This
string can also include a combination of a directory path, search string,
or name of the resource.

Sikkim Manipal University B2071 Page No.: 258


Fundamentals of Information Technology Unit 13

 Website: A URL gives the address of a specific Website on the Internet.


There are no spaces or other characters in URL and it
uses forward slashes to denote different directories. Some examples
of URLs are http://www.manipalglobal.com/, http://www.yahoo.co.in, and
ftp://ftp.servername.com/. As you can see, not all URLs begin with
"http". The first part of the address tells what protocol to use. If you were
told to visit the URL "ftp://ftp.manipal.com/books.txt", you would be using
the File Transfer Protocol (FTP) to download the file "books.txt" from a
remote computer. If the URL was "http://10.0.0.1/file.html", you would be
using Hyper Text Transfer Protocol to read the document "file.html" on
the Web.
 Domain Name System (DNS): The second part of a URL (after the "://")
contains the address of the computer being located as well as the path
to the file.
For example, in http://www.manipal.com/Content/Reports/index.html,
"www.manipal.com" is the address or domain name of the host
computer and "/Content/Reports/index.html" is the path to the file. When
an address ends with a slash and last part of the address is something
like ".html" or ".php," the Web server typically defaults to a file in the
current directory named "index.html," or "index.php." So, if you type in
"http://www.apple.com/" and "http://www.apple.com/index.html," you
should get the same page.
Self-Assessment Questions
1. HTML stands for _________________.
2. Linking thousands of computers network together is called _______.
3. __________ is an electronic link to other text.
4. A ________ gives the address of a specific Website on the Internet.

13.4 Components of Internet


As seen in the previous section, Internet is a worldwide network of networks
that connects millions of computers. By using internet the users send and
receive email, login to remote computers (telnet), browse databases of
information (gopher, World Wide Web, WAIS), and send and receive
programs via ftp. Some components of internet are seen below:

Sikkim Manipal University B2071 Page No.: 259


Fundamentals of Information Technology Unit 13

Web Browsers: A browser is also called as web browser, it can be defined


as application software to enable users to access, retrieve and view
documents and other resources on the Internet. A browser cannot work
unless it is connected to the internet. It displays the web pages of the
current URL. It has no database of its own. All browsers are designed to
display the pages of information located at Web sites around the world. The
most popular browsers include Microsoft's Internet Explorer and Netscape
Navigator, Google Chrome, Mozilla Firefox, and so on.
There are many web browsers available having different features. However,
every browser shares some basic features mentioned below:
 Web browsers also maintain a history list, which is a record of all web
pages visited during the period. You can revisit a web page located on
the history list by displaying the history list and selecting that page.
 It handles requests for HTML files, interprets links and deals with
embedded images, audio and video elements.
 It allows users to save a collection of pages, allowing for lateral retrieval.
 It provides a row of buttons at the top of the browser window for
browsing the internet conveniently.
 All web browsers have a feature usually called favorites or bookmarks
that is used to save web page URLs. Once a web page is saved as a
favorite or a bookmark, you can redisplay that page without typing its
URL; simply select the link from the favorites or bookmarks.
Web servers
Web servers are computers that deliver web pages. Every Web server has
an IP address and a domain name. For example, if you enter the URL
"http://www.manipal.com/Content/Reports/index.html," in your web browser,
This sends a request to the web server whose domain name is
manipal.com. The server then fetches the pages named index.html and
sends it to your browser. The web server is the central and critical part of
the World Wide Web. Web servers not only indicate web sites and URL
resources, but also provide a mail service, File transfer protocol service,
among others. There are a number of public-domain Web servers available
for a variety of platforms, including most UNIX variants, as well as personal
computer environments such as Microsoft Windows. Some well-known
public domain servers are CERN, NCSA httpd, and Apache servers.

Sikkim Manipal University B2071 Page No.: 260


Fundamentals of Information Technology Unit 13

Hyper Text Transfer Protocol (HTTP)


The Hyper Text Transfer Protocol is a protocol designed to allow the
transfer of Hyper Text Markup Language (HTML) documents. HTML is a tag
language used to create hypertext documents. Hypertext documents include
links to other documents that contain additional information about the
highlighted term or subject. Such documents can contain other elements
apart from text, such as graphic images, audio and video clips.
HTTP is based on request-response activity. A client, running an application
called a browser, establishes a connection with a server and sends a
request to the server in the form of a request method. The server sends a
response to the browser, once the response is sent then it will close the
connection.
World Wide Web
World Wide Web is a huge collection of “pages” of information from all over
the world linked to each other. World Wide Web and the Internet are not the
same, but they are related and interdependent. The Web consists of a vast,
worldwide collection of documents called Web pages or simply pages. Each
page can be a combination of text, pictures, audio clips, video clips,
animations and other electronically presentable material. What makes Web
pages interesting is that they contain hyperlinks usually called links. Each
link points to another web page and when you click a link; your browser
program fetches the page the link connects to. Every page can have many
links that take you to new destinations. Web pages can be linked to other
pages anywhere in the world. This system of inter linked documents is
known as hypertext.
The World Wide Web is also called as WWW, W3, or simply as the Web.
The term "www" is commonly found at the beginning of Web addresses. It is
a graphical interface to the Internet, providing a way of accessing
information scattered across millions of computers around the world.
Before the World Wide Web, the Internet was very difficult to navigate.
Much of the information on it was tough to find and just as difficult to make
use of it. Locating and downloading files residing on the Internet needed
some specialized skills. Tim Berners-Lee is widely known as the father of
the World Wide Web. Tim Berners-Lee was a physicist at the European

Sikkim Manipal University B2071 Page No.: 261


Fundamentals of Information Technology Unit 13

Organization for Nuclear Research [CERN], a highly esteemed particle


physics laboratory in Switzerland.
Self-Assessment Questions
5. Mention any two browsers.
6. ____________ deliver web pages.
7. HTTP is based on _____________ activity.
8. WWW stands for _____________.

13.5 Internet Protocol Addressing


The Internet is a global network of computers; each computer connected to
the Internet must have a unique address. Internet addresses are in the form
xxx.xxx.xxx.xxx where xxx must be a number from 0 - 255. This address is
known as IP (Internet Protocol) address.
Each computer or server is known as the host and the IP address specifies
its network connection. An IP address is a set of four numbers (32 bits)
separated by period (a dot.). A part of the address is designated as the
network address, and the other part as a node or host address. For example
an IP address looks like 110.45.51.108. In the given IP address
110.45.51.108, the 110.45 is the network address and 51.108 is the host or
node address. Network address uniquely identifies each network. Host
address uniquely identifies each machine on a network (must be unique
because it identifies a particular machine).
These IP address numbers are primarily read and managed by computers.
Network classes are based on the network size. There are three classes:
Class A, Class B and Class C networks.
Class A Network
In Class A network, the first byte is assigned to the network address, and
remaining three bytes are used for the node address. The Class A format is
Network.node.node.node. Example, in 49.22.102.70, 49 is the network
address and 22.102.70 is the node address. The length of a Class A
network is a byte. And the first bit of that byte is reserved as 0. Only 7 bits
remain for manipulation. It is also decided that the network address of all
zeros (0000.0000) is reserved. So the actual number of usable Class A
network is 128 minus 1 that is. 127 (127 = 128).

Sikkim Manipal University B2071 Page No.: 262


Fundamentals of Information Technology Unit 13

Class B Network
Class B networks are smaller than Class A networks. In Class B network,
the first two bytes are assigned to the network address, and the remaining
two bytes are used for node addresses. Format is
Network.Network.Node.Node. In this class, in IP address 130.57.30.56, the
network address is 130.57 and the node address is 30.56. With the network
address being two bytes, there would be 216 unique combinations. But
Internet designers decided that all Class B networks should start with the
binary digits 1 and 0. This leaves 14 bit positions to manipulate, and
therefore 214 or 16384 unique Class B networks. Class B network has two
bytes to use for node addresses. This is 216 minus the two patterns in the
reserved-exclusive club (all zeros and all ones), for a total of 65,534
possible node addresses for each Class B Network.
Class C Network
Class C networks are smaller than Class B networks. They can have up to
254 nodes. Network addresses range from 192.0.0.0 to 223.0.0.0. In this
case only the last zero is replaced with the node addresses. The format is
Network.Network.Network.Node. Class C network must start with the bit
pattern 110. Three bytes that is 24 bits, minus three reserved bits, leaves 21
positions to network address. Class C network can have 221 or 20, 97,152
network addresses. Each Class C network has one byte to use for node
addresses. This leads to 256 minus the two special patterns of all zeros and
all ones, for a total of 254 node addresses.
The following table provides a summary of the three classes of networks:

Class Leading Decimal range Maximum Maximum nodes


bit pattern of network networks per network
address
A 0 1-127 127 16,777,216
B 10 128-191 16,384 65,534
C 110 192-223 20,97,152 254

Sikkim Manipal University B2071 Page No.: 263


Fundamentals of Information Technology Unit 13

Self-Assessment Questions
9. Each computer connected to the Internet must have _________
address.
10. Class A network format is __________
11. In Class B network, the first four bytes are assigned to the network
address. (True/False)

13.6 Internet Connection Types


Today, people buy computers to access the internet, to send and receive
email, surf the web and chat with others. The first step in going online is
establishing a connection between your computer and the internet. To do
this, you have to sign up with an Internet Service Provider (ISP). ISP means
the one who gives internet connection to the home. There are different
types of internet connections available to the user, some of them are seen
below:
Dial-up
Dialup internet service is a service that allows connectivity to the internet
through a standard telephone line. Connecting telephone line to the internal
or external modem on your computer and configuring the computer to dial a
specific number provided by your internet service provider (ISP) will give the
access to the internet on your computer. ISP is one in which provides your
home with a connection to the internet. Dial-up is both the oldest and the
slowest type of connection. Dial-up connection is too slow for many of the
things people like to do online today, such as viewing you tube videos and
listen to the streaming music.
Once you have joined an Internet Service Provider, you must choose a
username and password. When the modem dials the phone number you are
given by your ISP, a connection is made, and then information is swapped
between the modem and the remote server. A remote server is the
computer and related software that is established to handle users who want
to access a network remotely. The username and password you choose for
the modem allows access to the dial up gateway to the internet. The
gateway to the internet is a network that allows entry into another network.
This allows you to receive and send email, search the World Wide Web,
participate in chat rooms and many more.

Sikkim Manipal University B2071 Page No.: 264


Fundamentals of Information Technology Unit 13

Broadband Connection
Broadband Internet service is the most used form of Internet access
because of its high speed. Compared to dial-up connections, broadband
connections are much easier to set up and more reliable as signals rarely
get dropped. When you work with broadband, you do not need to set up
dialing rules. Most broadband providers give users a router or modem,
which users need to connect to the service provider. Users must also install
network adapters on their computers (unless they use USB routers)
connected to the back of the modem that provides the essential link to the
internet. In this configuration, the necessary connection is established over
the local area rather than directly to the ISP. Therefore, the local area
connection must be properly configured to gain access to the internet.
Broadband is offered in four different forms, DSL (or Digital Subscriber
Line), fiber-optic, cable, and satellite.
Direct connection Via LAN
Local Area Networks (LANs) provide Internet access to computers and
other devices in a limited area such as a home, school, computer
laboratory, or office building. Although LANs may provide high data-rates
that typically range from 10 to 1000 Mbps, but actual Internet access speed
is limited.

Wi–Fi Connection
Wi-Fi internet connectivity is also called as wireless internet connectivity. If
wireless internet connectivity is available to public then it is referred as “hot
spot”. Wi-Fi connectivity does not require any wires; rather it is a local area
network run by radio waves. A person with a laptop or notepad or mobile or
tablet can be connected to the internet using Wi-Fi. Neighbors can also
access this wireless connection that is the reason most wireless internet are
configured with password security. If the proper password is not provided,
access is denied.
While wireless Internet access is very convenient in the home, it can be
even more in the workplace. The technology for wireless is improving
continuously and there is greater security and faster data transfer speeds. In
case of wired internet, cables used to connect client machines might need
to be routed through walls, ceilings, and floors, this is one of the major
disadvantages.

Sikkim Manipal University B2071 Page No.: 265


Fundamentals of Information Technology Unit 13

One of the most popular applications for wireless Internet access is the
public hot spot. Internet cafes are one example of places where one can sit
with a laptop and sip coffee while surfing the internet, checking email, doing
research and many more activities. Cell phones and Personal Digital
Assistants (PDAs) equipped with Web browsers can also use Wi-Fi access
through public hot spots.
Self-Assessment Questions
12. ISP stands for _______________
13. ________ gives internet connection to the home.
14. Mention any two internet connection types.
15. Once you join Internet Service Provider you must choose __________
and ___________.
16. Wi-Fi internet connectivity is also called as ________________.

13.7 How Internet Works


The primary objective of any network is to exchange information between
different locations. The rules for this exchange are called Protocols. Protocol
on Internet is TCP/IP (Transmission Control Protocol/Internet Protocol)
which is actually a name for a set of rules framed to connect computers in a
wide area network, a network which is established between computers
across cities or countries.
Let us take a practical example of simply exchanging a message between
two persons, one at Lucknow and another at Mumbai.
 Surya has an email account at Lucknow as [email protected]
 Rishaba has an email account at Mumbai as Rishaba@bml. vsnl.net.in
 When Surya wants to send a message to Rishaba at Mumbai, he types
out his message and types out the address of the recipient in the email
(write mail) box.
 Surya’s message is then broken into packets (unit of data), which is an
easy and reliable communicable entity.
 These packets are then broadcast to various connected links along with
the destination address, say Delhi and Kanpur. At these sites also, there
is packet forwarding facilities available based on address available and
after a while, all packets ultimately reach the destination address that is
Mumbai.

Sikkim Manipal University B2071 Page No.: 266


Fundamentals of Information Technology Unit 13

 At Mumbai, all packets marked for a particular address to an email


account [email protected] and particular message number are
(automatically generated) reassembled and then posted in the inbox that
Rishaba is supposed to access.
The above example shows a message transfer. However, the on-line
transfer also occurs in the same way, provided machines at both the ends
are switched on and set to transmit and receive internet traffic.
When your phone is off the hook, your line is engaged and you cannot
receive another call. However, your cable operator can beam so many
channels and you can surf them at will. Telephones are circuit switched. In
simple terms, it means that when you dial a number it goes to your nearest
exchange, which routes it to the nearest exchange of the called number,
and the bell rings at the end. The moment the receiver lifts his phone off the
hook, a circuit between you and him is established. This is a dedicated
circuit. The whole mechanism is called circuit switching.
Your cable operator, on the other hand, can send multiple channels
because each channel has a different frequency and depending on the
bandwidth of the cable, many channels can be beamed. Imagine a wide
road with neatly defined lanes, one for two wheeler, one for cars and one for
light commercial vehicles and so on. Imagine frequency as the type of
vehicles you have it.
In case of computer-to-computer communication, you cannot afford to have
circuit switching, and you cannot assign different frequencies to each
computer. The computer networks are packet switched. The different
stations send discrete blocks of data to one other. You can think of these
blocks of data as corresponding to some piece of a file, a piece of e-mail, or
an image.
The message is broken into pieces called packets. The time too is divided
and each computer gets a quota of time to send packets. Suppose many
stations want to communicate at the same time, they have to share the
network resources, especially the wires.

13.8 Internet Security


Internet security has become a high priority subject, due to several reasons.
One reason is the increase in the business through the internet. Business
through the internet provides several advantages. Internet business helps
Sikkim Manipal University B2071 Page No.: 267
Fundamentals of Information Technology Unit 13

companies to distribute their products and services directly to the


customers. Customers also benefit by paying less and they can shop at any
time on a global level. But several risks are associated with internet
business. Growing use of web based applications provide multiple points of
entry for viruses and worms. Such entry points have become real threats.
Different threats or attacks leads to the loss of valuable data stored in
different devices such as computers, storage devices and so on. Data
protection has become a critical use as the loss of data means loss of
business.
Previously connection to the internet was made only as and when required.
Computers remained disconnected from the internet most of the time. Web
enabling of different activities makes it necessary to have an always active
connection. An active connection is more prone to the attacks such as virus,
spyware, spreading of malware and stealing of information. Majority of the
present internet connections are broadband types having high speeds and
this makes the spreading of malware and viruses very easy. Many of the
worms and malware are of the self-propagating type and these do not
require any instructions for spreading in networks. Since viruses change
their patterns quickly, installation of antivirus software alone is not fully
effective to filter out the viruses.
A "network firewall" is like a filter for Internet messages. A firewall
selectively allows certain messages to pass through based on its type (e-
mail, web, file sharing). All other messages are stopped at the gates. In this
manner, you can protect your computer to a certain degree by simply not
allowing Internet traffic to your machine unless it arrives through a
recognized port.
Self-Assessment Questions
17. __________ leads to the loss of valuable data stored in the computer.
18. Mention any two self-propagating types that spread in the network.

13.9 Uses of Internet


Many people use internet for various purposes such as to apply for the jobs,
search material for the course work, to listen music, to watch movies, to run
small business such as buying or selling the products and many more.
Some applications of the internet are seen below:

Sikkim Manipal University B2071 Page No.: 268


Fundamentals of Information Technology Unit 13

1. Search for information


In the Internet, you can search in different ways, depending on what you are
looking for and how you prefer to search. To search information, we use
various online search engines like Google, Bing, Yahoo and many more. A
search engine is a tool for searching information on the internet. Most of the
search engines work in a similar manner. A search engine, periodically
looks at every page in the web, extracts keywords, based on the keywords it
displays all the links.
We will consider the example of google. If we want to search information in
google there is a search box. When you start typing the information you
want to search, google will autosuggest words which it thinks you might be
searching for. The more you type the suggestions become more specific
and if you see in the auto suggest drop down list there is no need to type,
just click with the mouse. You can also perform a search by typing in your
keyword and press the enter button on the keyboard.
Most of the search engines will only display around ten sites on a page.
More search results are displayed at the bottom of the page; you can see
links to related searches as well as a series of numbers. Suppose if you
want to see next ten search results, you have to click on the next page
number of your search results.
2. Electronic Mail (e-mail)
One of the widely used features on the Internet is electronic mail (e-mail).
The system of communicating messages in electronic form is called
electronic mail or email in short. Electronic mail sends messages from one
user to another. Now a days many people use the word “mail” in place of
“e-mail”. Through e-mails, you can contact any person, living in any part of
the world. A user can send text, attachments, pictures, audios, database
files and many more to another user, even if the other user is not accessing
the Internet at that instance. The receiver (user) can read this message
some time later. When you receive an e-mail, the system stores it the inbox
for later use.
The method of e-mail transmission is very fast and messages reach their
destinations within seconds. The received messages remain in the
computer until they are deleted. Online availability of the recipient is not
required when sending messages as e-mails. If the messages cannot be

Sikkim Manipal University B2071 Page No.: 269


Fundamentals of Information Technology Unit 13

delivered within a reasonable time limit, messages come back to the sender
indicating the reasons for non-delivery. Mails that are returned to senders
are called bounced mails.
3. E-Commerce
Electronic Commerce or E-Commerce is a range of online business
activities that includes explaining the products and providing a mechanism
for customers to buy those products from the website. E-Commerce
includes online shopping and online purchasing.
The primary activities of electronic commerce include:
 Product Search – Prospective customer searches for the desired
product with appropriate features over the internet.
 Price Search – Once the customer identifies the appropriate product,
then he or she decides whether to purchase or not based on price
offerings.
 Actual Purchase – once the customer has decided to purchase then he
or she makes an actual purchase over the internet.
 Payments – Once the payment transaction is complete and the vendor
receives the money, the delivery of the goods takes place.
The sequential activities as seen above may end at the first or second point
if customer does not like the product or price.
4. Chatting
Chatting is an online interactive communication mechanism that allows
people to make a real time discussion with multiple people through the
internet. Chatting can be a private chat with friends or relatives or a general
chat with even unknown persons. People can chat with their relatives and
friends irrespective of their locations. Students use chatting as a means to
learn from instructors. Several companies use chatting methods for product
support as well as for technical support. Chatting is also used for
entertainment.
Earlier, chatting was purely in the form of text. People located at different
places typed their conversation through the keyboard of the computer. What
is typed by one person in the computer is displayed on the screens of others
taking part in the chat. The text based chatting became outdated and now
we have multimedia chat. Multimedia chat enables the use of different

Sikkim Manipal University B2071 Page No.: 270


Fundamentals of Information Technology Unit 13

media such as audio, video, and so on. This type of chatting enables people
to have a live conversation and they can communicate with the help of live
video through the internet by using suitable audio and video equipment. To
make voice chat, computers must be fitted with speakers and microphone.
5. Telnet to other Computers
Telnet is a user command and fundamental TCP/IP protocol for accessing
remote computers. Through Telnet, an administrator or another user can
access someone else's computer remotely. On the Web, HTTP and FTP
protocols allow you to request specific files from remote computers, but not
to actually be logged on as a user of that computer. With Telnet, you log on
as a regular user with whatever privileges you may have been granted to
the specific application and data on that computer. With telnet program, you
can connect to your computer to the remote computer. The remote
computer usually asks you to enter a user name and a password. When you
are connected to a remote computer via Telnet, you interact with that
computer as if you were directly connected to your computer.
Usually when people who are on a business trips want to read their e-mails
or they want to access data on the computer in another branch or in main
office. Telnet is the internet tool that allows you to work from your own
workstation into another computer at a different workstation. Some Telnet
requires commands to type at the prompt. In such cases, instructions
appear at the bottom of the screen telling you what to type. If the
instructions do not appear, you can often view a list of commands or
instructions by typing help at the prompt and press enter.
Self-Assessment Questions
19. Mention any two uses of internet.
20. Specify any two online search engines.
21. ______________ provides explanation about the products and also
purchase from the website.
22. Mention any two multimedia chat modes.
23. __________ is used to connect to the remote computer.
13.10 Summary
Let us recap the important points covered in the unit:
 The history of internet began in 1957 when Union of Soviet Socialist
Republics (USSR) launched the first artificial earth satellite sputnik.
Sikkim Manipal University B2071 Page No.: 271
Fundamentals of Information Technology Unit 13

 The Internet is the global "Network of Networks," linking thousands of


computer networks together.
 HTML is the language of Internet, by using this language we can create
a website.
 Hyperlink is an electronic link to other text.
 Various components of internet are web browser, web server, Hyper
Text Transfer Protocol and World Wide Web.
 A web browser enable users to access, retrieve and view documents
and other resources on the Internet.
 The Hyper Text Transfer Protocol is a protocol designed to allow the
transfer of Hyper Text Markup Language (HTML) documents. HTTP is
based on request-response activity.
 World Wide Web (WWW) is a huge collection of “pages” of information
linked to each other around the globe.
 Each computer connected to the Internet must have a unique address.
Internet addresses are in the form xxx.xxx.xxx.xxx where xxx must be a
number from 0 - 255. This address is known as IP (Internet Protocol)
address.
 Various types of internet connections are available to the user such as
dial-up, broadband, direct connection through LAN and Wi-Fi.
 The primary objective of any network is to exchange information
between different locations. The rules for this exchange are called
Protocols. The protocol on Internet is TCP/IP.
 Internet security has become a high priority subject due to several
reasons. One reason is the increase in business through the internet
and another reason is creation of identical websites forms a major
threat.
 People use internet for various purposes like searching for the
information, electronic mail, e-commerce, chatting, telnet to other
computers and many more.

13.11 Terminal Questions


1. Write short note on HTML and URL.
2. Explain various components of internet.
3. Briefly explain Internet Protocol Addressing.
4. Discuss different internet connection types.
Sikkim Manipal University B2071 Page No.: 272
Fundamentals of Information Technology Unit 13

5. Explain how internet works.


6. Explain internet security and uses of internet.

13.12 Answers
Self Assessment Questions
1. Hypertext Markup Language
2. Internet
3. Hyperlink
4. URL
5. Mozilla Firefox, Google Chrome
6. Web servers
7. Request-Response
8. World Wide Web
9. Unique
10. Network.node.node.node
11. False
12. Internet Service Provider
13. ISP
14. Wi-Fi, broadband
15. Username and password
16. Wireless internet connectivity
17. Threats
18. Worms and malware
19. Searching of information and E-Commerce
20. Google and Yahoo
21. E-Commerce
22. Audio and Video
23. Telnet
Terminal Questions
1. HTML stands for HyperText Markup Language. HTML was created by
Tim Berners-Lee in collaboration with “Robert Caillau” while they
worked at CERN in 1989. (Refer to section 13.3)
2. Various components of internet are web browser, web server, Hyper
Text Transfer Protocol and World Wide Web. (Refer section 13.4)

Sikkim Manipal University B2071 Page No.: 273


Fundamentals of Information Technology Unit 13

3. Every computer which is connected to internet should have unique


address. (Refer to section 13.5)
4. Various types of internet connections are available to the user such as
dial-up, broadband, direct connection through LAN and Wi-Fi. (Refer to
section 13.6)
5. The primary objective of any network is to exchange information
between different locations. The rules for this exchange are called
Protocols. (Refer to section 13.7)
6. Internet security has become a high priority subject due to several
reasons. One reason is the increase in business through the internet
and another reason is creation of identical websites forms a major
threat. (Refer to section 13.8).
People use internet for various purposes like searching for the
information, electronic mail, e-commerce, chatting, telnet to other
computers and many more. (Refer to section 13.9)

Sikkim Manipal University B2071 Page No.: 274

You might also like