Block 0004
Block 0004
~
~
THE PEOPLE'S'
UNIVERSITY .CYBER SECURITY
Indira Gandhi National Open University
School of Vocational Education and Training
Internet Technology 4
/
\
~ lW1cf ttrr ~ tr ~ ~ t am: 31T\jf
~,¥ it m~ fflcr*" ctT 'ifTCAT ctiT amm: ~
t t ~ ~ ~ CfiI(On tr ~ \if1~ ~ c.pfmf
rc."Qdlan ttiT ~ ~ Slt~ sR ~ mm ~
~tl"
.•
"1
I j
- Indira Gandhi
I
MSEI-023
la?)
i:) ~ignOU
THE PEOPLE'S .
UNIVERSITY
Indira Gandhi National Open University
Cyber Security
Block
4
~TERNETTECHNOLOGY
UNIT 1
Internet Architecture 5
UNIT 2
Social Networking Sites 36
UNIT 3
Advanced Searching Techniques . . 64
UNIT 4
.-
Latest Trend in Internet Securities 93
/
/
,
Programme Expert/Design Committee of Post Graduate
Diploma in Information Security (PGDIS) \
Prof. K.R. Srivathsan Mr. Anup Girdhar, CEO, Sedulity Solutions &
Pro Vice-Chancellor, IGNOU Technologies, New Delhi
Mr. B.J. Srinath, Sr. Director & Scientist Prof. A.K. Saini, Professor, University School
'G',CERT-In, Department of Information of Management Studies, Guru Gobind Singh
Technology, Ministry of Communication and Indraprastha University, Delhi
Infotmation Technology, Govt of India
Mr. C.S. Rao, Technical Director in Cyber
Mr. A.S.A Krishnan, Director, Department of Security Division, National Informatics Centre
Information Technology, Cyber-Laws and E- Ministry of Communication and Information
Security Group, Ministry of Communication and Technology
Information Technology, Govt of India Prof. c.G. Naidu, Director, School of Vocational
Mr. S. Balasubramony, Dy.· Superintendent of Education & Training, IGNOU
Police, CBI, Cyber Crime Investigation Cell
Prof. Manohar Lal, Director, School of Computer
Delhi
and Information Science, IGNOU
Mr. B.V.C. Rao, Technical Director, National
Prof. K. Subramanian, Director, ACIIL, IGNOU
Informatics Centre, Ministry of Communication
Former Deputy Director General, National
and Information Technology .
Informatics Centre, Ministry of Communication
Prof. M.N. Doja, Professor, Department of and Information Technology, Govt of India
Computer Engineering, Jamia Milia Islamia
Prof. K. Elumalai, Director, School of Law
New Delhi
IGNOU
Dr. D.K. Lobiyal, Associate Professor, School
Dr. A. Murali M Rao, Joint Director, Computer
of Computer and Systems Sciences, JNU
Division, IGNOU
New Delhi
Mr. P.V. Suresh, Sr. Assistant Professor
Mr. Omveer Singh, Scientist, CERT-In,
School of Computer and Information Science
Department of Information Technology, Cyber-
IGNOU
Laws and E-Security Group, Ministry of
Communication and Information Technology Ms. Mansi Sharma, Assistant Professor, School
Govt of India of Law, IGNOU
Block Preparation
Unit Writers Block Editor Proof Reading
Dr. M.Kameswara Rao Prof. K.R. Srivathsan Ms. Urshla Kant
Lecturer,Department of Pro Vice-Chancellor Assistant Professor
Computer Science IGNOU School of Vocational
P.G.Center,P.B.Siddhartha Ms. Urshla Kant Education & Training
College of Arts & Science Assistant Professor, School IGNOU
Vijayawada. of Vocational Education &
(Unit 1, 2, 3 & 4)
.
Training: IGNOU
Production
Mr. B. Natrajan Mr. Jitender Sethi Mr. Hemant Parida
Dy. Registrar (Pub.) .. Asstt. Registrar (Pub.) Proof Reader
MPDD, IGNOU, New Delhi MPDD, IGNOU, New Delhi MPDD, IGNOU, New Delhi
July, 2011
© Indira Gandhi National Open University, 2011
ISBN: 978-81-266-5529-8
All rights reserved. No part of this work may be reproduced in any form, by mimeograph or any
other means, without permission in writing from the Indira Gandhi National Open University.
Further information about the School of Vocational Education and Training and the Indira Gandhi
National Open University courses may be obtained from the University's office at Maidan. Garhi,
New Delhi-l10068. or the website of IGNOU www.ignou.ac.in
Printed and published on behalf of the Indira Gandhi National Open University, New Delhi, by
the Registrar, MPDD
Laser typeset by Mctronics Printographics, 27/3 Ward No. 1, Opp. Mother Dairy, Mehrauli,
New Delhi-30
Printed by : A-One Offset Printers, 5/34, Kirti Nagar Indl, Area, New Delhi-ll0015
/
I
BLOCK INTRODUCTION
Internet technology covers the different aspects of internet working. Internet is
the name for a vast, worldwide system consisting of people, information and
computers. It is the abbreviation of internetwork system. It is a global collection
of interconnected networks. Internet may be defined as a network of networks that
are interconnected physically, capable of communicating and sharing data with
each other and able to act together as single networks. Internet technology mainly
deals with computer, modem, linkage medium and service provider for its proper
working. Internet technology is very useful in various fields of education,
publishing, shopping, advertising, financial services, social networking, searching
data and so on. Internet technology allows a global collection of computers linked
together by cables and telephone lines making communication possible among
them in a common language. It raises the issues of security and privacy which
need to be tackled properly and carefully. This block comprises of four units and
is designed in the following way;
The Unit One deals with the architectural design of the Internet. The Internet's
architecture is based in the very specification of the standard TCPI/P protocol,
designed to connect any two netwofks which may be very different in internal
hardware, software, and technical design. Once two networks are interconnected,
communication with TCPIIP is enabled end-to-end, so that any node on the Internet
has the near magical ability to communicate with any other no matter where they
are. This openness of design has enabled the Internet architecture to grow to a
global scale.
The Unit two describes the 'Social networking". Social networking is the grouping
of individuals into specific groups, like small rural communities or a neighborhood
subdivision. Depending on the website in question, many of online community
members share common interests in hobbies, religion, or politics. Such networking
helps in the development of public opinion and is the most 'common method of
sharing ~r exchanging views.
The Unit three covers search engines. It helps in locating the things or information
which you are looking for in the virtual world i.e. WWW. The information may
consist of web pages, images, information and other types of files. Some search
engines also mine data available in databases or open directories. Unlike web
directories, which are maintained by human editors, search engines operate
algorithmic ally or are a mixture ~f algorithmic and human input. .
•
Unit four explains Web 2.0. It is about revolutionary new ways of creating,
collaborating, editing and sharing user-generated content online. It's also about
ease of use. There's no need to download, and teachers and students can master
many of these tools in minutes. Web 2.0 is a category of new Internet tools and
technologies created around the idea that the people who consume media, access
the Internet, and use the Web shouldn't passively absorb what's available; rather,
they should be active contributors, helping customize media and technology for
their own purposes, as well as those of their communities.
ACKNOWLEDGEMENT
The material we have used is purely for educational purposes. Every effort has.
been made to trace the copyright holders of material reproduced in this book.
Should any infringement have occurred, the publishers and editors apologize and
will be pleased to make the necessary corrections in future editions of this book.
/
Internet Architecture
UNIT 1 INTERNET ARCHITECTURE
Structure
1.0 Introduction
1.1 Objectives
1.2 Client Server Architecture
1.2.1 Two-Tier Architecture
1.2.2 Three-tier Architecture
1.2.3 Web Architecture
1.5 IP Addressing
1.5.1 Addressing Scheme
. 1.5.2 Subnetting
1.5.3 CIDR - Classless Inter Domain Routing
1.5.4 Network Address Translation
1.5.5 Internet Routing
1.5.6 Packet Switching
1.0 INTRODUCTION
This unit explores the architectural design of the Internet and provides you with
an introduction to the technical and organizational structure of the Internet. First,
using simple examples, you will be introduced to client-server architecture, the
way it works, the processes involved in keeping it running, and the entities that
have put it all together and continue to do so. The Internet is essentially a network
for transporting digital data (i.e., bit streams) between computer processes. In the
most abstract form, a network simply consists of nodes connected by links. In the.
Internet setting, the nodes are computers and the links are connections between .
computers. Examining its architecture is foremost about looking beyond the low-
level system components and protocols and identifying the set of core functionalities
that make it tick. In this section, we study th"'emajor building blocks of the Internet
architecture.
5
/
Internet Technology
1.1 OBJECTIVES
After studying this unit, you should be able to:
BRO~ ER D l
1) The client (browser) requests for an HTML file stored on the remote machine
through the server software.
Most of the internet applications use the Client Server architecture. These terms
refer to the two processes or two applications which will be communicating with
each other to exchange some information. One of the two processes acts as a
client process and another process acts as a server.
Client Process: This is the process which typically makes a request for information.
After getting the response this process may terminate or may do some other
processing. For example: Internet Browser works as a client application which
6 sends a request to Web Server to get one HTML web page.
/ I
Server Process: This is the process which takes a request from the clients. After Internet Architecture
getting a request from the client, this process will do required processing and will
gather requested information and will send it to the requestor client. Once done, it
becomes ready to serve another client. Server process is always alert and ready to
serve incoming requests. For example: Web Server keeps waiting for requests from
Internet Browsers and as soon as it gets any request from a browser, it picks up a
requested HTML page and sends it back to that Browser.
There are two types of client server architectures: 2-tier and 3-tier architectures
Server
database
Client
presentation logic
and business rules
There is a client tier which contains user interfaces. There is also a server tier
which provides processing management and database management. Applications
in the server tier provide the business logic and the storage. A simple example in
the WWW of two tier architecture in action is a web browser in the client tier
asking for a page and a web server in the server tier delivering that page.
1) A client tier, i.e. the computer, which requests the resources, equipped with a
user interface (usually a web browser) for presentation purposes.
2) The application tier (also called middle tier/Business logic tier), whose task
it is to provide the requested resources, but by calling on another server.
3) The data tier, which provides the application tier with the data it requires. 7
/
Internet Technology
Data Server
business data Middle Tier Server
business rules
Client
presentation logic
The URN defines Universal Resource Identifier (URI) - an addressing protocol for objects in the
something's identity, WWW. There are two types of URI's~ Universal Resource Names (URN) and the
while the URLprovides Universal Resource Locators (URL). URLs are location dependent and contain
a location four distinct parts: the protocol type, the machine name, the directory path and the
file name. There are several kinds of URLs: file URLs, FTP URLs, Gopher URLs,
News URLs, and HTTP URLs.
This basic web architecture is fast evolving to serve a wider variety of needs beyond
8 static document access and browsing. The Common Gatewa '''''",..-face(CGI)
/ 1
extends the architecture to three-tiers by adding a back-end server that provides Internet Architecture
services to the Web server on behalf of the Web client, permitting dynamic
composition of web pages. Helpers or plug-ins and JavalJavaScript provide other
interesting Web architecture extensions. The capabilities of the Internet have been
enhanced" and extended by using programming languages with HTML. These
languages have been responsible for the dynamic and interactive nature of the
Net. New languages and language extensions are being developed to increasethe
usability of the Internet.
Here we will look at some of the important languages that have shape the Internet
over the years.
HTML simply consists of tags that are placed around elements, which then changes
the properties of these enclosed elements. There are hundreds of HTML tags and
some of these are proprietary, which means that only some browsers recognize
them.
JavaScript/Jscript
Java
Developed by Sun Microsystems, Java is a very powerful, object-oriented language.
A lot many platform dependency issues have been ironed out with the advent of
Java. Thus, Java programs for UNIX can be made to run on Windows or the Mac
system with little or no effort. Much development is taking place on the Java front
9
/
Internet Technology with new arrivals like Java Beans, Extended Java Beans, and Java applications for
various databases and XML. Using Java servlets one can also develop dynamic
I
Java Server Pages (JSP). Java can also be seen on the Internet in the form of I
applets embedded in an HTML page. Applets are small Java programs that run on
a Java compatible browser.
VBScript
VBScript is a client-based language that runs only on the Internet Explorer and
quite naturally, has been developed by Microsoft. Though, the browser market
share of Internet Explorer has steadily risen and overtaken that of Netscape, it is
still not advisable to use VBScript as a client side language for web pages. Many
would prefer to use JavaScript (or JScript, if you like) as it runs on all popular
web browsers - Netscape, Opera, Mozilla and the Internet Explorer. However,
VBScript is very often used for developing Active Server Pages.
PHP
Open source, great development environment - PHP is a cult. This has been the
answer of open source programmers to Microsoft's ASP. PHP not only carries all
the goodness of ASP but also is more secure and handles databases more easily. It
is a known fact that PHP on Apache Web server runs faster than ASP. PHP code is
embedded inside the HTML page and can link to databases to generate dynamic
HTML content. Furthermore, PHP scripts can be made to run on any operating
system with little or no modification.
The eXtensible Markup Language is a web page developing language that enables
programmers to create customized tags. These customized tags can provide the
much-needed functionality not available with HTML. XML documents can be
accessed using JSP, PHP etc. Current technology trends include Software as a
Service (SAAS), a mode of software delivery that provides maintenance, daily
operation and software support through Web-based servers and browsers. Other
hot trends in technology include Java technology trends, service oriented
architecture advancements and the promise and foundation within Microsoft
Window's .NET framework for web services.
AJAX
Ajax (Asynchronous JavaScript and XML) is a group of interrelated web
development techniques used on the client-side to create interactive web
applications. With' Ajax, web applications can retrieve data from the server
asynchronously in the background without interfering with the display and behavior
of the existing page. The use of Ajax techniques has led to an. increase in interactive
or dynamic interfaces on web pages. Ajax uses a combination of HTML and CSS
to mark up and style information.
10
/
Internet Architecture
1.3 INTERNET ARCHITECTURE
Internetis made up of thousand and thousands of interconnected networks. Every
computer connected to the Internet is capable of doing a few, very simple tasks
very quickly. By linking millions of comparatively simple systems together, complex
functionality is achieved.
Servers are where most of the information on the intern et "lives". These are
specialized computers which store information, share information with other servers,
and make this information available to the general public.
Browsers are what people use to access the World Wide Web from any standard
computer (Netscape Navigator, Microsoft Internet Explorer etc.).When you connect
your computer to the internet, you are connecting to a special type of server which
is provided and operated by your Internet Service Provider (ISP). The job of this
"ISP Server" is to provide the link between your browser and the rest of the internet.
A single ISP server handles the internet connections of many individual browsers.
The following figure shows a small "slice" of the. internet with several home
computers connected to a server:
:-- .••••
The Intemet,
ISP Setrver:
I ,I
Browsers:
- -
Fig. 4
ISP servers receive requests from browsers to view WebPages, check e-mail, etc.
Of course each server can't hold all the information from the entire internet, so in
order to provide browsers with the pages and files they ask for, ISP servers must
connect to other internet servers. This brings us to the next common type of server:
the "Host Server". Host servers are where web sites "live". Every website in the
world is located on a host server somewhere. The host server's job is to store
information a~d make it available to other servers. 11
/
I
Internet Technology The figure below show a slightly larger slice of the intemet:
l
1
Servers:
ISP
Browsers:
Fig. 5
To view a web page from your browser, the following sequence happens:
1) You either type an address (URL) into your "Address Bar" or click on a
.hyperlink,
2) Your browser sends a request to your ISP server asking for the page.
3) Your ISP server looks in a huge database of intemet addresses and finds the
exact host server which houses the website in question, then sends that host
server a request for the page.
4) The host server sends the requested page to your ISP server.
5) Your ISP sends the page to your browser and you see it displayed on your
screen.
9tf.·i)Wro~~\I"tlt\J
C ~~. """',_...-.1<-.11I
to,; ••••••• ,t~d.~'btt4 l~MNdk~
--..
About [(jNOF Stu(10)0llt Z'llt'P fButl+hn Board
.-..:
~~,.~
O8Iitlofh21~~
•...
tb\t1H6llo1~ ••• --."' •
The first component, the protocol, defines the manner for interpreting computer
information. Many Internet pages use HTTP (Hypertext Transfer Protocol). Other
common Internet protocols that one might come across are FTP (File Transfer
Protocol), NEWS (Usenet news groups protocol), and GOPHER (an alternative
transfer protocol).
/
When you use the Web, you use a domain name to do it. For example, the Uniform Internet Architecture
Resource Locator (URL) .•http://www.ignou.ac.in •• contains the domain name
ignou.ac.in, Every time you use a domain name, you use the Internet's !)NS servers The domain name
system (DNS) is the
to translate the human-readable domain name into the machine-readable IP address, way that Internet
The Domain Name System (DNS) -as a whole consists of a network of servers that domain names are
located and translated
map Internet domain names like www.igncu.ac.in to a l~cal IP addresses. into Internet Protocol
addresses.
Every computer on the Internet has a unique address: called its "IP address" say
for example 124.98.78.234.1t is hard to remember everyone's.Il' address. The DNS
makes it easier by allowing a familiar string of letters (the, "domain name") to be
used instead of the arcane IP address. So instead of typing IP Address, you can
type www.ignou.ac.in.Translating the name into the IP address is called "resolving
the domain name". The goal of the DNS is for any Internet user any place in the
world to reach a specific website IP address by entering its domain name.
Internet domain names are organized by their levels, with the higher levels on the
right. For example, for the domain "ignou.ac.in" the top-level domain is "in", the
second-level domain is "ac.in", and the third-level domain is "ignou.ac.in".".in" is
the Interne~ cquntry code top-level domain (ccTLD) for India, ".ac" (short for
academia) is a second Ievel domain for academic establishments, such. as
universities, colleges and research institutes in a number of countries such as New
Zealand (.ac.nz), the United Kingdom (.ac.uk), India (.ac.in), and many more. Many
. countries use .edu for the. same purpose. For example in India we use .ac.in for
Academic institutions and .edu.in for Educational institutions.
. The name servers on different machines talk to each other, exchanging and keeping
up to date all the information needed to resolve hostnames (map them to IP
addresses). Your nameserver may query three or four different sites across the
network in the process of resolving www.ignou.ac.in, but this usually happens
very quickly (as in less than a second). The nameserver will tell your browser that
www.ignou.ac.in·sIPaddressis220.227.168.115. knowing this; your machine will
be able to 'exchange bits with www.ignou.ac.in directly.
/
Internet Technology When you query for the IP address of www.ignou.ac.in. what actually happens is
this: First, your name server asks a root server to tell it where it can find a nameserver
for .in. Once it knows that, it then asks the .in server to tell it the IP address of
.ac.in nameserver. Once it has that, it asks the .ac.in nameserver to tell it the address
of the host www.ignou.ac.in.InanInternetaddress-suchasignou.ac.in - the ".in"
,
part is known as a Top Level Domain, or TLD. The" .in" registry database, for
example, contains the Internet whereabouts - or IP address - of ignou.ac.in. So in
trying to find the Internet address of ignou.ac.in your computer must first find the
".in" registry database. How is this done?
At the heart of the DNS are special computers, called root servers. They are
distributed around the world. All root servers contain the same vital information -
this is to spread the workload. and back each other up. The root servers contain
the IP addresses of all the TLD registries - the global registries such as .com, .org,
etc. and the country-specific registries such as .in (India), Jr(France,) .cn (China),
etc. Scattered across the Internet are thousands of computers - called "Domain
Name Resolver's" or just plain "resolvers" - that routinely cache the information
they receive from queries to the root servers. They are used to respond to a user's
request to resolve a domain name - that is, to find the corresponding IP address .
. User's request to reach ignou.ac.in is forwarded to a local resolver. The resolver
splits the request into its component parts. It knows where to find the .in registry
and forwards the request over to the .in registry to find the IP address of ignou.ac.in.
This answer is forwarded back to the user's computer. The domain name ignou.ac.in
has been "resolved"!
/
An Internet exchange point (IX or IXP) is a physical infrastructure that allows Internet Architecture
different Internet Service Providers (ISPs) to exchange Internet traffic between
their networks (autonomous systems) by means of mutual peering agreements, which
allow traffic to be exchanged without cost. An ISP can purchase a wholesale dial
access service from an NSP, which provides dial up connectivity for their customers.
Customers then dial into their ISP's network using a local access number, which in
turn connects to the backbone of that Internet provider's NSP. The NSP routes all
traffic and basically provides the infrastructure needed for Internet connectivity.
The NSP builds, maintains, and expands their infrastructure as Internet traffic
demands.
Your machine then ships the packet down the wire (your connection to your ISP,
or local network) until it gets to a specialized machine called a router. The router
has a map of the Internet in its memory - not always a complete one, but one that
completely describes your network neighborhood and knows how to get to the
routers for other neighborhoods on the Internet.
.
Your packet may pass through several routers on the way to its destination. Routers
are smart. They watch how long it takes for other routers to acknowledge having
received a packet. They also use that information to direct traffic over fast links.
They use it to notice when another router (or a cable) have dropped off the network,
and compensate if possible by finding another route.
Once your packet gets to its destination machine, that machine uses the service
number to feed the packet to the web server. The web server can tell where to
reply to by looking at the command packet's source IP address. When the web
server returns this document, it will be broken up into a number of packets. The
size 'of the packets will vary according to the transmission media in the network
and the type of service.
The fundamental technology that makes the Internet work is called packet switching,
a data network in which all components (i.e., hosts and switches) operate
independently, eliminating single point-of-failure problems. The Internet is a packet-
switching network with a distributed mesh topology. Information travels in packets
across a network that consists of multiple paths to a destination. Networks are 15
,
/
Internet Technology interconnected with routers, which forward packets along paths to their destinations.
The mesh topology provides redundant links. If a link fails, packets are routed
around the link along different paths. A packet is a unit of data that is transmitted
across a packet -switched network. A packet-switched network is an interconnected
set of networks that are joined by routers or switching routers. The most common
packet-switching technology is TCP/IP, and the Internet is the largest packet-
switched network.
The concept of a packet-switched network is that any host connecting to the network
can, in theory, send packets to any other hosts. The network is said to provide any-
to-any service. The network typically consists of multiple paths to a destination
that provide redundancy. Packets contain header information that includes a
destination address. Routers in the network read this address and forward packets
along the most appropriate path to that destination.
1.3.6 TCP/lP
The fundamental means of moving data .around the Internet is controlled by a
protocol called TCPIIP, or transmission control protocol/internet protocol. TCP/IP
is also used on private networks, like your office LAN or home network. As the
name suggests, TCPIIP is the combination of TCP and IP protocols working together.
Under TCPIIP a file is broken into smaller parts called "packets" by the file server.
Each packet is assigned an IP (Internet protocol) address of the computer it has to
travel to. As the packet moves through the global network it is "switched" by a
number of servers and routers along the way toward its destination i.ethe requesting
computer or "client" computer.
The upper level, TCP (Transmission Control Protocol), gives you reliability. When
two machines negotiate a TCP connection (which they do using IP), the receiver
knows to send acknowledgements of the packets it sees back to the sender. If the
sender doesn't see an acknowledgement for a packet withinsome timeout period,
it resends that packet. Furthermore, the sender gives each TCP packet a sequence
number, which the receiver can use to reassemble packets in case they show up
out of order. TCPIIP packets also contain a checksum to enable detection of data
corrupted by bad links. The checksum is computed from the rest of the packet in
such a way that if either the rest of the packet or the checks urn is corrupted,
redoing the computation and comparing is very likely to indicate an error.
b) Compare your answer with the one given at the end of the Unit.
i
1) Explain How Client Server Model relates to Internet.
16
/
Internet Architecture
Fig. 8
1.4.1 Application Layer
The Application Layer is the top layer of the Internet protocol suite. The most
common protocols are:
• FTP (file transfer protocol) is a protocol used to copy a file from one host to
another over a TCPIIP based network.
/
Internet Technology • HTTP(Hypertext Transfer protocol) is a protocol for transferring files (text,
graphic images, sound, video,and other multimedia files) across the Internet.
b) Compare your answer with the one given at the end of the Unit.
1) Telnet, Fl'P, SMTP, DNS, HTTP are examples of protocols that are used in.
i) Application layer
18
/ I
Internet Architecture
,
.............................................................................................................................
i) Application Layer
1.5 IP ADDRESSING
Here you will learn about IP Address, general overview of routing and subnet
mask. IP address is an identifier for a computer or device on a TCPIIP network
and Internet. Networks that use the TCP/IP protocols route traffic based on the IP
address of the destination computer or network device. Every device connected to
the Internet must need a unique identifier, which is called an IP address. An IP
address is a numeric value separated by periods into four octets A typical IP address
looks like this 128.230.1.12. •
Each number in the IP address can be between 0 and 255. To make it easier for us
humans to remember, IP addresses are normally expressed in decimal format as a
"dotted decimal number" like the one above. But computers communicate in binary
form. Look at the same IP address in binary: 10000000 11100110 00000001
00001100. The four numbers in an IP address are called octets, because they each
have eight positions when viewed in binary form. If you add all the positions
together, you get 32, which is why IP addresses are considered 32-bit numbers.
Two versions of the Internet Protocol (IP) are in use: IP Version 4 and IP Version
6. The designers of TCPIIP defined an IP address as a 32-bit number and this
system, known as Internet Protocol Version 4 (IPv4), is still in use today. IPv4 was
the first version of Internet Protocol to be widely used, and accounts for most of
today's Internet traffic.
However, due to the enormous growth of the Internet and the predicted depletion
of available addresses, a new addressing system IPv6, using 128 bits for the address,
was developed in 1999.IPv6 provides a much larger address pool than IPv4, amongst
other features. The major difference between IPv4 and IPv6 is the number of IP 19 .
/
Internet Technology addresses. There are 4,294,967,296 IPv4 addresses. In contrast, there are
340,282,366,920,938,463,463,374,607,431,768,211,456 IPv6 addresses.
IPv4 IPv6
Fig. 9
Class A
Class A addresses are specified to networks with large number of total hosts. Class
A allows for 126 networks by using the first octet for the network ID. The first bit
in this octet, is always set and fixed to zero. And next seven bits in the octet is all
set to one, which then complete network ID. The 24 bits in the remaining octets
represent the hosts ID, allowing 126 networks and approximately 17 million hosts
per network. Class A network number values begin at 1 and end at 127. An example
of a Class A IP address is 102.168.212.226, where "102" identifies the network
20 and "168.212.226" identifies the host on that network.
/ I
Class B Internet Architecture
Class C
Class C addresses are used in small local area networks (LANs). Class C allows
for approximately 2 million network~ by using the first three octets for the network
ID. In class C address three bits are always set and fixed to 1 1 O. And in the first
three octets 21 bits complete the total network ID. The 8 bits of the last octet
represent the host ID allowing for 254 hosts per one network. Class C network
number values begin at 192 and end at 223. An example of a Class C IP address is
200.168.212.226 where "200.168.212" identifies the network and "226" identifies
the host on that network.
Class D and E
Classes D and E are not allocated to hosts. Class D addresses are used for
multicasting, and class E addresses are not available for general use: they are
reserved for future purposes.
1.5.2 Subtietting
A subnetwork, or subnet, is a logically visible subdivision of an IP network. The
practice of creating subnetworks is called subnetting. All computers that belong to
a subnet are Jaddressed with a common, identical, most-significant bit-group in
their address.
When a class A IP license is granted, you are assigned something like this: 67.0.0.0.
Only the value of the bits in the first octet is assigned. This means you are free to
assign any values you wish in the second, third and fourth octets. The default
subnet mask for a class A network is 255.0.0.0. High bits, ones, indicate the bits
that are part of the network field of the IP address. The default subnet mask does
not create subnets.
Therefore, a class A network with the default subnet mask is one 'network. The
three octets that are unassigned and unmasked are part of the host field of the
address. There is a total of 24 bits in those three octets. Each bit can be in one of
two states. Therefore, 224is the number of host addresses that can be assigned on
that network.
When a class B license is granted, the first two octets are assigned. For example,
164.198.x.x. The default subnet mask for a class B is 255.255.0.0. One network,
two octets free, 16 bits for the host address field. 216_2=65,534 possible host
.addresses on a class B IP network.
When a class C license is granted, the first three octets are assigned, for example:
198.52.16.0. The default subnet mask for a class C is 255.255.255.0. One octet
makes up the host address field. 28-2=254 host addresses possible on a class C
network.
/
Internet Technology For example, applying the Class C subnet mask to our IP address 216.3.128.12
produces the following network address:
IP Address: 10011100.10011010.01010001.00111000
Bitwise AND
Result: 10011100.10011010.01010001.00110000
Alternately, we can express the subnet mask in "slash notation". This is just a
slash followed by the number of ones in the subnet mask. 255.255.255.224 is
equivalent to "/27"
The example sho~n above can be illustrated with CIDR as follows: 216.3.128.12,
with subnet mask of 255.255.255.128 is written as 216.3. 128. 12/25.Similarly, the
8 customers with the block of 16 IP addresses can be written as: 216.3.128.1291
28, 216.3.128.130/28, and etc. With an introduction of CIDR addressing scheme,
IP addresses are more efficiently allocated to ISPs and customers; and hence there
is less risk of IP addresses running out any time soon.
/ I
This helps ensure security since each outgoing or incoming request must go through Internet Architecture
a translation process that also offers the opportunity to qualify or authenticate the
request or match it to a previous request.
NAT is included as part of a router and is often part of a corporate firewall. Network
administrators create a NAT table that does the global-to-local and local-to-global
IP address mapping. When a coml?uter running NAT receives a packet from an
internal client, it replaces the packet header and translates the client's port number
and internal IP address to its own port number and external IP address. It then
sends the packet to the destination host on the Internet, and keeps track of the
mapping information in a table, so that it can route the reply to the appropriate
client computer. When the computer running NAT receives a reply from the Internet
host, it again replaces te packet header and sends the packet to the client. Both the
client computer and the Internet host appear to be communicating directly with
each other. For example, a client computer with the IP address 192.168.10.2 wants
to contact a Web server with the IP address 131.110.30.4. The client is configured
to use 192.168.1.1 as the default gateway, which is the internal IP address of the
computer running NAT. The external IP address of the computer running NAT is
131.110.5.1. In this example, the NAT process occurs as follows:
• The client computer sends a packet to the computer running NAT. The packet
header indicates that the packet originates from port 1074 on the computer
with the IP address 192.168.10.2, and has a destination of port 80 on
131.110.30.4.
• The computer running NAT changes the packet header to indicate that the
packet originates from port 1563 on host 131.110.5.1, but does not change the
destination. The computer running NAT then sends the packet to the Web
server over the Internet.
• The external Web server receives the packet and sends a reply. The packet
header for the reply indicates that the packet originates from port 80 on
131.110.30.4, and has a destination of port 1563 on host 131.110.5.1.
• The computer running NAT receives the packet and checks its mapping
information to determine the destination client computer. The computer running.
NAT changes the packet header to indicate a destination of port 1074 on
192.168.10.5, and then sends the packet to the client. The source of the packet
remains as port 80 on 131.110.30.4, which is the IP address of the Web server.
To know how routers work, you need to understand how data is transported across
the Internet. The method of transport is 'Packet Switching'. Every file or piece of
data on the Internet is not transported as a single entity. It is broken up into smaller
packets and then labeled with sender's address and recipient address. Just like a
post office package is sent across a network and then sorted at various post office
nodes, until it reaches your door step, data packages are sorted and directed across
the Internet. Routers are devices that connect multiple networks together and control
what data is sent to and from any computer in those networks. Using, what is
known as a configuration table (that has information about connections and
associated network addresses), it reads every data packet that it receives from a
/
Internet Technology network and directs it through the right connection, so that it reaches the right
destination. The configuration table stored on a router has information about the
IP addresses of all computers in a network. It also has a set of priority rules for
data transport, which the router follows.
The router is an intelligent device which calculates the optimum path for the data
packet to reach the right destination in shortest time. This calculation and
determination of a path is made possible, after the router has evaluated the traffic
load across networks. An optimum use of bandwidth and faster data transfer is
made possible because of routers. Routers also secure a computer network by
providing encryption of data. Routers are silent backstage performers on the Internet,
who ensure that data is directed in the right directions and reaches the right
destinations, while also protecting networks from unauthorized access.
Internet routers are specialized computers that interconnect the network by switching
communications from one line to another at cross points. When a computer
communicates with another on the Internet, it addresses each packet with the other
computer's IP address and then sends it to the closest Internet router. The router
then uses a routing algorithm to send the packet across the Internet to the destination
computer.
Interior Gateway Protocols (IGP) are used to route Internet communications within
a local area network, such as within an office building. The two main types of IGP
protocols are described in the following sections, along with an example proprietary
protocol for comparison purposes.
Routing Information Protocol (RIP) - What makes RIP work is a routing database
that stores information on the fastest route from computer to computer, an update
process that enables each router to tell other routers which route is the fastest
from its point of view, and an update 'algorithm that enables each router to update
its database with the fastest route communicated from neighboring routers:
Open Shortest Path First (OSPF) - The main difference between OSPF and RIP
is that RIP only keeps track of the closest router for each destination address,
while OSPF keeps track of a complete topological database of all connections in
the local network.
While IGP protocols are used within local networks, Exterior Gateway Protocols
(EGP) are used for routing between networks, generally on the Internet backbone
itself, linking the different networks together.
/
Border Gateway Protocol (BGP) Internet Architecture
When a BGP router first comes up on the Internet, either for the first time or after
being turned off, it establishes connections with the other BGP routers with which
it directly communicates. The first thing it does is download the entire routing
table of each neighboring router. After that it only exchanges much shorter update
messages with other routers.
BGP routers send and receive update. messages to indicate a change in the preferred
path to reach a computer with a given IP address. If the router decides to update
its own routing tables because this new path is better, then it will subsequently
propagate this information to all of the other neighboring BGP routers to which it
is connected, and they will in turn decide whether to update their own tables and
propagate the information further.
• Sequence. The number of this packet in the whole list of packets making up
this communication.
This data provides the information an Internet router needs to get packets and
messages to their destination. For example, a destination computer can request the
retransmission of missing packets, since it knows the number of total packets and
therefore can figure out which ones it doesn't have. For additional reliability, Internet
packet headers also contain an error correction code, which is a number representing
a mathematical combination of the rest of the packet data. If even a single bit of
the packet is changed in transmission, then recalculation of the error correction
code by a router won't match the code transmitted with the message, and the
packet will be discarded and a request made for retransmission. Switching systems
enable packet networks to dynamically optimize their operation and recover from
localized damage. The switching in Internet networks is performed by computers 25
/
Internet Technology called routers at the intersection where networks come together. Internet routers
use a number of standard routing protocols to switch the incoming packets from
one network to another as required.
Since routing software can reconfigure instantly, packet switching networks can
adapt to downed links and maintain communications by roundabout paths even
under very adverse conditions. Since the systems are operating at electronic speed,
this means messages can be sent through even large, damaged networks very
quickly. One of the biggest advantages of packet switched networks is that they
use the available bandwidth very efficiently by sharing it at all times, so that no
one communication ties up a communication link. In the early 1970's, the cost of
electronics came down to the point where this model became cost-effective, and it
became possible to install routing equipment at each network node, enabling wide
area communications for the first time. Today's Internet routing protocols use
sophisticated algorithms that have been optimized for efficiency over many years.
In practice, most network connections today are very reliable, and so all packets
for a given computer are usually sent over the same path as long as it remains
operational. Today, switches are getting faster and faster, with optical switches
providing large advances in speed, and the ultimate end result is now within site:
near zero switching time as a packet moves from one network to another at near
the speed of light.
Check Your Progress 3
....................................................•.......................................................................
26
/
5) Explain the functionality of NAT. Internet Architecture
These programs will keep your computer "hidden" from prying eyes over the
internet, as well as protected from viruses and other mal ware that can be spread
through e-mail or other methods. You also need to make sure you're familiar with
the different types of security threats so you can deal with them if they ever come
up. Although the Internet can be used for many useful and educational endeavors,
it can also be quite dangerous. Harmful software, also known as malware, can
infect your computer, steal your information and even destroy your hard drive.
Luckily, there are plenty of tools you can use for security when going online.
An anti virus software is a program designed to identify and destroy all kinds of
malicious software to ensure computer security. Antivirus is a term given to a
protective software specifically designed to protect computers from all kind of
viruses harmful to a computer system. It also gives protection against malicious
software that includes viruses, key loggers, hijackers, and Trojan.
27
~
/
Internet Technology An antivirus program is software which can detect the presence of a virus on a
computer and, to the best of its abilities, remove the virus. Eradicating a virus is
the term used for cleaning out a computer.
.• Removing the code in the infected file which corresponds to the virus;
The following are some of the anti-virus products available for free download:
• AntiVir
• avast!
• AVG Anti-Virus
• BitDefender
• Comodo anti-virus
Norton Antivirus is the most widely used Antivirus software for personal computers.
Protect your computer by instantly downloading one of their antivirus programs:
Norton Antivirus, Norton Internet Security, or Norton 360.
Firewall
Unlike anti-virus software, a firewall can actually prevent malware from
downloading to your computer. In addition, a good firewall can prevent unauthorized
users from accessing a network, which can help increase corporate security. A
firewall works by monitoring connections made to and from your computer. Any
connection that is not part of a pre-defined or custom approved connection is
aborted automatically.
/
also manage public access to private networked resources such as host applications. Internet Architecture
It can be used to log all attempts to enter the private network and trigger alarms
when hostile or unauthorized entry is attempted. Firewalls can filter packets based
on their source and destination addresses and port numbers. This is known as
address filtering. Firewalls can also filter specific types of network traffic. This is
also known as protocol filtering because the decision to forward or reject traffic is
dependant upon the protocol used, for example HTTP, ftp or telnet. Firewalls can
also filter traffic by packet attribute or state.
A firewall cannot prevent individual users with modems from dialing into or out
of the network, bypassing the firewall altogether. Employee misconduct or
carelessness cannot be controlled by firewalls .
••
·:lrl·, 1'<11111';
I,u" I'll!
-lI:UIIIC: 1I;l'c:irg :;jlCClllcli
1:1Icme a'lu,wc l1"I":'Uilll
FirclflIlII
Fig. 10
Packet filtering firewalls work at the IP layer of TCPIIP. They are usually part of
a router. A router is a device that receives packets from one network and forwards
them to another network. In a packet filtering firewall each packet is compared to
a set of criteria before it is forwarded. Depending on the packet and the criteria,
the firewall can drop the packet, forward it or send a message to the originator.
Rules can include source and destination IP address, source and destination port
number and protocol used. The advantage of packet filtering firewalls is their low
cost and low impact on network performance. Most routers support packet filtering.
Even if other firewalls are used, implementing packet filtering at the router level
affords an initial degree of security at a low network layer. This type of firewall
only works at the network layer however and does not support sophisticated rule
based models. Network Address Translation (NAT) routers offer the advantages of
packet filtering firewalls but can also hide the IP addresses of computers behind
the firew all , and offer a level of circuit-based filtering. 29
/
Internet Technology Circuit level gateways
Circuit level gateways work at the session layer of the OSI model, or the TCP
layer of TCPIIP. They monitor TCP handshakingbetween packets to determine
whether a requested session is' legitimate. Information passed to remote computer
. through a circuit level gateway appears to have originated from the gateway. This.
is useful for hiding information about protected networks. Circuit level gateways
are relatively inexpensive and have the advantage of hiding information about the
private network they protect. On the other hand, they do not filter individual packets.
Application level gateways
Application level gateways, also called proxies, are similar to circuit-level gateways
.except that they are application specific. They can filter packets at the application
layer of the OSI model. Incoming or outgoing packets cannot access services for
which there is no proxy. In plain terms, an application level gateway that is
configured to be a web proxy will not allow any ftp, gopher, telnet or other traffic
through. Because they examine packets at application layer, they can filter
application specific commands such as http:post and get, etc. This cannot be
accomplished with either packet filtering firewalls or circuit level neither of which
know anything about the application level information. Application level gateways
can also be used to log user activity and logins. They offer a high level of security,
but have a significant impact on network performance. This is because of context
switches that slow down network access dramatically. They are not transparent to
end users and require manual configuration of each client computer
Pop-up Blocker
A pop-up blocker (sometimes called a pop-up killer) is a program that prevents
pop-ups from displaying in a user's Web browser. Pop-up blockers work in a number
of ways: some close the window before it appears,some disable the command that
calls the pop-up, and some alter the window's source HTML. One problem with I
pop-up blockers has been that they cannot always differentiate between an unwanted I
pop-up window and one that is user-requested.
b) Compare your answer with the one given at the end of the Unit.
1
2) What is a firewall. List out its advantages?
-; .
1
1
30
/
I
3) Explain how packet filter firewall works. Internet Architecture
.............................................................................................................................
" .
..............................................................................................................................
I
...................................................................................... . ,. . .
/
Internet Technology 3) The Uniform Resources Locator, also known as the "URL" is the address of a
website. It contains following parts
Path: is anything that appears after the "/" after the hostname. It can have a
filename or just be one or more directories.
1) (i)
2) The main difference between the UDP and TCP protocol is that the UDP is
connectionless protocol while the TCP is a connection oriented protocol. TCP
breaks the data into packets and It supports error correction. User Datagram
Protocol also breaks the data into packets like the TCP and it does not support
error correction. TCP can establish a Connection and UDP cannot. TCP
provides a stream of unlimited length, UDP sends small packets. TCP
guarantees that as long as you have a connection data sent will arrive at the
destination, UDP provides not guarantee delivery. UDP is faster for sending
small amounts of data since no connection setup is required, the data can be
sent in less time then it takes for TCP to establish a connection.
3) HTTP (Hypertext Transfer Protocol) and FTP (File Transfer Protocol) are one
of the protocols that are being used in the internet, each with its own function. ~,
The purpose of HTTP is to serve as a means of accessing the World Wide 1
Web. Websites are accessed using http with the help of browsers. FTP, as the
name implies, is used in transferring files from one computer to another. When
connecting to a FTP server you are using a FILE server (that means you can't
see anything but files there), but if you connect to a HTTP server you access
a WEB server, which means you can load web pages into a browser. Using a
FTP connection you can download and upload files to the server, but when
you use the HTTP connection you can only download content from the Internet
for viewing, is a "read only" method.
32 5) (ii)
I
Check Your Progress 3 Internet Architecture
1) The Internet Protocol version 4"or IPv4, is the defined standard in the world
today, but it is being replaced by the. more advanced IPv6, to help solve the IP
address exhaustion problem.IPv4 is a 32 bit addressing scheme in a TCPIIP
network where as IPv6 is a 128 bits address. Address available in IPv4 is 232
where as in IPv6 it is 2128•
1) VIRUS stands for Vital Information Resource under Seize. A computer virus
is a software program, script, or macro designed to infect, destroy, modify, or
cause other problems with your computer or software programs. The user may
protect themselves from virus using an anti-virus protection program. The anti-
virus protection program is designed to detect, protect, and clean any computer
viruses. The following are some of the best antivirus software used: AVG, "
Avira, Avast, Kaspersky, Norton etc.
3) Packet filtering firewalls work at the IP layer of TCPIIP. They are usually part
of a router. A router is a device that receives packets from one network and
forwards them to another network. In a packet filtering firewall each packet is
compared to a set of criteria before it is forwarded. Depending on the packet
and the criteria, the firewall can drop the packet, forward it or send a message
,
to the originator. Rules can include source and destination IP address, source
and destination port number and protocol used. The advantage of packet
filtering firewalls is their low cost and low impact on network performance.
Most routers support packet filtering. ,
5) Software that works in conjunction with your internet browser and is designed
to block unwanted pop-ups from occurring while you are browsing the internet. 1
Pop-up ads or pop-ups are a form of online advertising on the World Wide
Web intended to attract web traffic or capture e-mail addresses. It works when
certain web sites open a new web browser window to display advertisements.
34
/
I
Internet Architecture
1.9 . SUGGESTED READINGS
• Internet architecture: an introduction to IP protocols By Uyless D. Black
Prentice HalL
• www.informit.com
• www.nos.org/htm/itl.htrnl
• www.tcpipguide.com
35
/
Internet Technology
UNIT 2 SOCIAL NETWORKING
SITES
Structure
2.0 Introduction
2.1 Objectives
2.2 Social Networking
2.2.1 Benefits of Social Networks
2.2.2 Social Networking for Business
2.2.3 Social Networking Functionalities
2.3 Pros and Cons of Social Networking
2.3.1 Advantages
2.3.2 Disadvantages
2.4 Social Network Categories
2.5 Social Networking Sites
2.5.1 FaceBook
2.5.2 YouTube
2.5.3 Orkut
2.5.4 Flickr
2.5.5 Twitter
2.5.6 MySpace
2.5.7 LinkedIn
2.5.8 Tagged
2.5.9 Classmates
2.5.10 BharatStudent
2.6 Security Issues
2.7 Let Us Sum Up
2.8 Check Your Progress: The Key
2.9 Suggested Readings ' I
2.0 INTRODUCTION'
In both professional and personal life, human beings naturally form groups based
on affinities and expertise. We gravitate to others with whom we share interests ..
Most of us belong to real world networks that formed organically. Not surprisingly,
these networks rapidly migrated to the online world. In modern times people are
able to communicate amongst themselves more efficiently than ever before. Due
to advancements in computer technology people all over the world can now interact
and communicate with virtually anyone else who has access to a computer and the
internet using social networking. Social Networking is defined as a social structure
connecting relationships between individuals or organizations. A social networking
site is an online place where a user can create a profile and build a personal
network that connects him or her to other users. Social networking sites allow you
to meet other internet users without having to rely on chat rooms. Using Social
Networking Sites people are able to publish multimedia content about themselves,
their interests and concerns. Instead of being limited to a network amongst peers
within the workplace, social networking sites are increasingly allowing relationships
to be built up with people right across the globe and from all walks of life. Some
36 of the more popular social networking sites include Facebook, YouTube, and
/ I
Twitter. This unit gives a detailed description of social networking websites Social Networking Sites
providing some examples and also discusses their advantages.
2.1 OBJECTIVES·
After studying this unit, you should be able to:
• Recognize the areas Iways businesses can use social networking; and
Social networking sites include web-based services that allow individuals to:
• articulate a list of other users within whom they share a connection, and
r .•
• View and traverse their list of conn'e~tions and those made by others within
their system.
Support for learning: Social networks can enhance informal learning and support
social connections within groups of learners and with those involved in the support
of learning.
Engaging with others: Passive use of social networks can provide valuable
business intelligence and feedback on institutional services.
Ease of access to information and applications: The ease of use of many social
networking services can provide benefits to users by simplifying access to other
tools and applications. The Facebook Platform provides an example of how a social
networking service can be used as an environment for other tools.
/
Internet Technology 2.2.2 Social Networking for Business
Social networking websites are not just for individuals, businesses can also
capitalize on the boom of social networking websites. Just as individuals build
and maintain connections with each other on social networking websites, so can
businesses build and maintain connections with their customers. Social networking
websites offer several avenues for .businesses to reach customers such as the usual
banner. advertising, creating a profile on the website, or creating-groups and events.
Banner Advertising Banner advertising has long been a popular advertising method
on the Internet: MySpace.com has banner advertisements running along the top
and bottom of every page a user must access to view messages, comments, and
others' profiles. Often these are flashy or involve an online game, making them
hard to ignore. Facebook sells banner advertising, called "flyers," to its users who
can post a room for rent or a notice of a group meeting. Facebook allows the
purchaser of the advertisements to choose the network to which the flyer is
displayed, allowing the advertiser to customize for its specific demographic.
YouTube.com does not have many banner advertisements. Its advertisements are
more subtle, such as company-sponsored videos.
Creating Groups and Events One final option for business on social networking
websites is the creation of groups or events centered on the company's product.
Perhaps the company can create a group for people who like the product and open
discussion forums so that users can talk about their experiences with the product.
The company could also create an event on Facebook. This could be an event held
on a campus that is sponsored by the company. The users of social networking
websites are practically doing the advertising for the company.
Expert Search: Expert search identify implicit knowledge by searching the network
according to different criteria (e.g. name, interests, company). Examples for
functions enabling expert search are: search boxes.
/ I
Network Awareness: The awareness of the activities (and/or the current status Social Networking Sites
and changes of the latter) of the contacts in the personal network is supported by
functionalities, too. These functionalities enable indirect communication via
awareness. Examples for functions enabling network awareness are: News Feeds,
"Birthdays" -box.
These days the social networking sites have become extremely popular among the
youth as well as the professional people. Keeping in mind, the growing popularity
of these sites and the effect it has and the benefits that it brings along, it can be
easily predicted that its popularity is sure to grow much more. Some of the sites
such as Friendster and MySpace are the two most popular sites that aim to build
special niche for people who share common interests and passions. Whereas social
networking sites such as Twitter and LinkedIn are more professionally related and
help the business men promote their businesses.
However, everything has a positive and negative side. Similarly, the social
networking sites are also made up of their set of pros and cons.
2.3.1 Advantages
The social networking web sites are more like the virtual meeting places where
people can just chill and hang out with friends. They can discuss on different
topics, share information, and exchange 'files and pictures. There are some people
who use these sites as a platform to meet long lost friend and batch mates, whereas
there are others for whom it becomes a bridge to meet their future love. You can
either reconnect with your friends and family members or search a dating partner.
Some people also use these websites to promote their blogs and services. The
professional people uses this as a medium to raise their visibility, get noticed, tell
about their company, service, and get more clients. •
By joining different communities, now people can easily know about the latest
news related to that community. You can easily get the experts advice on any
challenge you may face related to their topic of interest. And the best part of this
is that the advice is free. You don't need to pay a single paisa for it. Experts are ,
always ready to give their advice and share information with you. These are just
some of the several positive things that have contributed to make social networking
really popular among people and spread smiles. It has made world a small pace
and everyone can stay connected.
Low Costs: Definitely, it's cheaper to use online social networking for both personal
and business use because most of it is usually free. While personal use is rather
simple for anyone, the business functions are underestimated by many. In a social
networking site, you can scout out potential customers and target markets with
just a few clicks and keystrokes, adding a boost to your usual advertisements and
promotional strategies. It lets you learn about their likes and dislikes, which is
tremendous. If you want to fine tune your business, then this is the way to go,
whether on a budget or not. 39
/
, Internet Technology Builds Credibility: You definitely can gain the customers' confidence if you can
connect to them on both a personal and professional level. Despite having to do a
bit of work, it definitely pays off as you can be tapped for an offer if someone
catches wind of your products or services. As long as you don't pursue them too
aggressively, you will do well here.
Connections: You are friends with people who have other friends, and so on.
There .is potential in such a common situation. By using a social networking site,
you can do what you can and get connected with these people to form a web of
connections that can give you leverage if you play your cards right. As long as you
give as well as you receive, then they will most likely stick with you. These
connections are definitely valuable in the long run.
2.3.2 Disadvantages
Social networking helps in a lot of ways but the users have to really careful to stay
secure and safe. Security is one of the topmost concerns of social networking sites
that you currently use. This is mainly because the social networking sites allow
you to display your personal information such as name, location, and email address.
There are some people who always in search of a fake identity. If they get all the
information about you on internet, they may use your identity for different type of
illegal activities, which may cause you problems in future. It is always advisable
to don't provide your entire identity information online. You may get many requests
for adding as friends or joining different communities. Always try to know as
much as possible before adding anyone as friend or joining any community. Because
they may use fake identity or may involve in some illegal activities, which may
spoil your image.
1
Lack of Anonymity: You are putting out information about your name, location, j
age, gender, and many other types of information that you may not want to let 1
others know. Most people would say be careful, but no one can be certain at any j
. given time. As long as people can know who you exactly are, then some can find
ways to do you in.
1
1
Seams and Harassment: There is a potential for failure of security in both personal
and business context. While many sites apply certain measures to keep any of l
these cases of harassment, cyber-stalking, online seams, and identity theft to an ~
absolute minimum, you still may never know.
Time Consuming: If this is not your kind of thing that it would just be a waste of
.
\
,
time for you. The key to social networking is that it is supposed to be fun, whether
you are just doing it for kicks or clicking around for business purposes. That should
be reasonable enough for anyone, but there are those people who don't see the
point. For them, it can be a disadvantage.
- .
...............................................................................................................................
40
/ I
2) Explain how social networking is used for Business? Social Networking Sites
...............................................................................................................................
I facebook ~ -- '"'PO
-.e
Facdllkltelfs ••• ~ •••• sIaiIR" SiplUp
--
peeple:iII,...1iIe.. Jfs tee, andahotaj'S will be..
,-------
Fig. 1 41
/ I
Internet Technology Content-based social networks
With these services, the user's profile remains an important way of organising
connections. However, they play a secondary role in the posting of content. Photo-
sharing site Flickr (www.flickr.com) is an example of this type of service, one
where groups and comments are based around pictures. Shelfari (www.shelfari.com)
is one of the current crop of book-focused sites, with the members 'bookshelf'
being a focal point of their profile and membership.
~l~\
--
Watch the world.
, .••.t:••
•......•..
• rlr· •••
1i
I
42
/ I
Mobile social networks Social Networking Sites
Many social networking sites are now offering mobile access to their services,
allowing members to interact with their personal networks via their mobile phones.
Two examples are Facebook (www.facebook.com) and Bebo (www.bebo.com).
Increasingly, there are mobile-led and mobile-only based communities emerging,
such as Wadja (www.wadja.com) .
Fig. 5
Micro-blogginglPresence updates
Many services let users post status updates i.e. short messages that can be updated
to let people know what mood you are in or what you are doing. These types of
networks enable users to be in constant touch with what their network is thinking,
doing and talking about. Twitter (www.twitter.com) and Wayn (www.wayn.com)
are examples.
TopT•••••,. ~••• ,
~~"''''',~lI\dlJoo'lIV~~
!IfIOIilIc.: •• ~JOl'\,I
Iu&lIIn~'S'v,o~~'rid
~'..!I~
Fig. 6.
Social Search
--
C-"-,
Y~"'~
-,··---"""'1
~
ri'''''''''' "'".---,
__~V~vImd~
--;1 rl...:~='-_-'- --=..-_-_- _-_~-,
_.,MItI,""'JI,..~·
~vffM.~~_.
Fig. 7 43
/ I
Internet Technology Thematic Websites
The building of networks around areas of common interest is one way in which
people can be brought together successfully. Sites like Netmums
(www.netmums.com) also add in a local-dimension by putting mums in touch with
others in their area, where they can share advice, information, recommendations,
information on schools and are able to network both at the local and national
levels. In addition, there are also sites for those with a disability such as
www.deafgateway.info which provides a place for deaf people to interact.
Fig. 8
b) Compare your answer with the one given at the end of the Unit.
I
.
.............................................................................................................................
.
1
2) Discuss about mobile social networks.
.. .
......................................................... .: .
..............................................................................................................................
44
/ I
4) Explain Micro-Blogging. Social Networking Sites
..............................................................................................................................
2.5.1 FaceBook
Facebook is one of the most popular profile based online social network in the
world. It provides a platform for users to connect with friends and others who
work and study around them. Facebook has grown exponentially, allowing users
to share photos, videos, to share links, to meet new friends and to organize events,
amongst others. It Supports both offline networks and creates new ones. It is used
to connect people to one another, their place of employment, their region, and
schools. It links networks together.
Vr:g EnNui
Fig. 9
2) Fill in your details in the 'Sign Up' section and click the green 'Sign Up'
button.
3) Complete the details required for the security check and click the green 'Sign
Up' button.
4) You will then be presented with a series of screens that walk you through
adding friends, information and a photograph to your profile. For each step
you can either choose to follow the onscreen instructions or skip the step if
you don't wish to do it 45
/
Internet Technology 5) Once these steps have been completed you will see the following screen. At
this point you should also check your email account for the email from facebook
titled. 'Just one more step to get started on Facebook'. Open this email and
click the link to complete the sign up process.
...
UpIUclCi'-l Photo
".
--
M~t~~l
·~",,~w""Jb).~""'·~fto~.
6) You have now created your profile and it can be viewed by clicking your
name on the left hand side next to your photo. You can then spend some time
refining the information displayed on your profile - the facebook help function
is also very useful and can be accessed by clicking the link at the bottom right
.of each.page.
7) You can add Friends using 'Friends' option on the left hand side of the screen.
~~ ----.....- _-""'&~"_, .
,--
t,,,,,,_ 1f'O>"""', •••••••.•••••
p-
-
..,.,.~~
'~
'io!"""'~
,- Fr<! Friends
Fro Frif'nQg.
'~" ~ ..
Fig.J1
• •
46 Fig. 12
/ I
2.5.2 YouTube Social Networking Sites
MQ<' Popular
I:ht~Mit1m~nt . MUSiC
--._r-::..
--..,.
Rlh"lIIh', Onl.v Gill. A
C~II'"i\('1'101."
,,.'4.' 1 '\ ••ItlV.'!t
El...
"...
'.... 101
--.~.~_ ..._ _-
-_.._ --
~-~-
~Vii.<II(><>s
___ ""INV~l\IP@
...•.•...•...
...•.
Qht{'1L Iy_d Pt'"~ Thta DIDOV. MVYClVTV~f
Tlm- r'mill'" htl, ••• PLAyt.,.16T
Fig. 13
2) As soon as you can see the "Get Started with your account't.page, you can
begin the process to open an account by filling the necessary, details. Once
you have entered all of your information on YouTube's signup page, you will
be prompted to check your email for a validation link. This is the way that
YouTube will validate your email address to make sure you are not creating a
fake account. Just click on the link or copy and paste it into ~our browser and
the signup process will be complete.
""'•••••.•
_,1
-l __
y~~"..~~~AoZ •. ~"
~_fiIlNl'flel~v
~-i_
"'''''IJriiII1tII;;:
--,- v l= 1---,- VI
- ["1_ Of_
~ ~~""~tJI!I"Y""J __ ili~~"""~
o ~=·=OM~;fPi9T~~~~~~_
","""",,,,,p., "'"
~,""","""~"'~~~fIIIMIV""T~
. T~"~~
IT_"~ .
ll.,,,:,,~";_. ,,".~_
~iH'~q~_~=*,>~~Ii!JII~
.=~~=:~~y'~':r-~~~<f;f)
8IY'!II.~~1118~~*1Pi"~·~""~~W.¥9.l::Ifl::l~"
1.~mJPit ~,. .. li9.0j:l'!t'. h.!~ ~f hNtet ~ ~"l{t.~ ~9\1E.\'·
Fig. 14 47
/
Internet Technology 3) Once you created an account you can start viewing, rating and commenting
on other peoples' videos and upload videos. With a massive database filled
with all kinds of full motion content, there are plenty of videos for you to
view and browse. Click on 'All Categories' to select a category of your choice
and click a video of that category. Once the video is over, you can rate it by
clicking on a star directly below the video. You can save the video as a favoriie
or comment on the video.
Fig. 15
Fig. 16
1) Visit the main YouTube site itself. If you look to the top of the website, you
will see a selection of links that start off with "Hello, (Your Username)." Just
to the right of that is a link that says "My Account". Go ahead and click that
right now so you can begin building your account profile.
2) Even though the page is full of clickable links, you should only concern
yourself with the "Personal Info" and "Video Posting Settings" at this time -
as they are the only portions of your profile that will be necessary to help you
make a name for yourself or your business on You'Iube.
3) Once that is done you can start to actually browse YouTube and look for
various videos that you like. There are multiple ways to do this, but the best
by far is to use the search box that is accessible on each and every YouTube
page. Just type in a keyword or two and you will be taken to a list of the
videos that have been tagged with that keyword.
4) Click on the video that you want to see and watch it. Then, when you are
finished you can either click on the recommended links for related videos or
you can add the video to your favorites, make a comment on it or post the
.,
video to your blog or website with one quick click. All of the controls are I
/
2.5.3 Orkut Social Networking Sites
Orkut is Google's social network that provides community and a way to build
connections. In other words, Orkut is Google's version of Facebook and LinkedIn.
If you have a Goog1e account, you can sign right on and start building your profile.
If not, it'll only take a minute to create an account and you'll be able to use it on
all Google applications and beyond as many sites allow you to sign in with a
Google ID.
Orkut works and runs just like any other social networking site. You create a profile,
build a network of friends, and then interact with the community by posting updates
about yourself, uploading photos and videos, and practically everything else that
you normally do in a social networking site. Orkut makes it easy to find people
who share your hobbies and interests, look for romantic connections or establish
new business contacts. You can also create and join a wide variety of on line
communities to discuss current events, reconnect with old school mates or even
exchange your favorite recipes. You can chat with your friends, find old friends,
share photos, join communities related to your interests and more
Who you interact with, is entirely up to you. Before getting to know an orkut
member, you can read their profile and even see how they're connected to you
through the friends network. To join orkut, simply sign in with your Google Account
and you can begin to create your own profile right away.
-- a
--_. *~...,.~ut
."...''''~ u.·)!'r.e~,""""';;r~·_,,, ..,.••..••
~Ir""~·JtIl'J..H·~G. \l'I"CI~/'
'§t.§§ fi
Fig. 17
Like any other social networking website, Orkut has its own set of unique features
that enable users to make new friends, maintain friends lists, send messages and
scraps to friends, rate friends and off course create and join communities based on
their interests where they can create forums and polls. One notable feature of
Orkut is a facility for integrating Gmail's Instant Messaging service- GTalk. That
means you can chat directly with your Gmail contacts right inside your Orkut
profile page. You can also create community polls from time to time to ignite
activities in your Orkut update stream. One feature which you may not like is that
Orkut allows everyone to see your profile even if they are not in your list of Orkut
friends. If you're a Facebook user, you might not like this feature. But if there is a
particular person that you don't want to allow viewing of your profile, you can
simply put them in your "ignore list".
Other features of the Orkut social networking site include profile customization,
profile restriction, a "Crush List", and listing cif friends by the order of their login
time on the site.
Scrapping: Orkut allows users to send offline as well as online messages through
its unique scrapping feature. Although earlier people were skeptical of the fact
that these scrapbooks had unrestricted access to one and all, Orkut has upgraded
the feature and now users can actually make their scrapbooks accessible only for
their friends. This scrap booking feature has caught on with the younger generation,
and for Orkut addicts, the number of scraps is has come to being a matter of pride
for many. 49 .
/
Internet Technology Groups, Ratings, Fans and Testimonials: Orkut also allows users to manage
their contacts by slotting them in distinct categories or levels that .define your
relationship with concerned people. These levels are 'haven't met', acquaintances,
friends, good frierids and best friends. In addition to this, users can create their
own friend groups based on any criteria that the user prefers. Once you've
. categorized your friend groups you also get to rate each individual on their level
of 'coolness' 'trustworthiness' and 'sexiness' on a scale of three. The coolness
quotient is depicted with ice cubes, the trustworthiness with smileys and the sexiness
with red hearts, on a scale of three cubes, three smileys and three hearts. In case
you admire a person, you can become their fan, which will result in your name
being shown in their fans list. The number of fans and other ratings are supposed
to imply how popular a person is. Also Orkut allows its users to write testimonials
for each other which are displayed on the user's profile. Off course the user has
the right to accept or reject a testimonial according to his will.
Communities: The communities that one can create have no restrictions as fat as
the topics are concerned. Starting from conventional topics like food, countries,
movies, music, poetry, books, television, celebrities etc. There are no limits as far
as the topics are concerned which leads to redundancy. Often there exists more
than one community about a single topic, which makes it a bit confusing.
User Lists and Teasers: Orkut users get to add people in their own personal lists
which include: The crush list (users can add people in this list if they think they
have a crush on that person), hot list (users can add people who they think are hot)
and off course for the unwanted lot you have the ignore list to dump them.
Photographs, Videos, Blogs: Orkut allows users to upload their pictures, videos
and also share links to their blogs on blogspot. Although the number of pictures
one could upload earlier was restricted, once can now add as many pictures in
their Orkut album as they want. Also the photos and videos can be locked for
security and be made accessible only to selected friends according to the preference
of the user. Being Google's brainchild, Orkut can also be linked with other Goggle
applications like Picas a and even Gtalk.
2.5.4 Flickr
Flickr is an online photo management and sharing application on an online
community platform. It was one of the first Web 2.0 applications that is still going
strong, hosting over 2 billion images in their database. The site's popularity is
heavily due to the organization tools and the ability to tag and browse photos by ,.
social classifications. Users can choose to share photos with the general public or 1.
Users can upload their digital images from their desktop to organize their photos
in a centralized location and then choose to share them with the world.
-
_ ••••••••••• '"1 __ ~". ~••• oI.c-
Share photos. -
Watdltheworld..
50 Fig. 18
/
Benefits of Using Flickr Social Networking Sites
I) Organization - Images are organized by tags, sets, and groups. Flickr users
can find images associated with the topic of their interest (such as a location
name) through these forms of metadata.
2) Sharing - Photos can be shared with millions of users and targeted groups.
Groups are people with common interests such as food, pets, events,
destinations, activities or events",etc. If a topic of your passion is not found,
you can start and create yOl~ own group.
3) Control - Photos can be stored as public or private.
4) Interaction - User friendly and compatible with various platforms and
browsers. Flickr partners with third parties to offer streamlined services,
5) Increase Web Presence - Online photos are easily distributed. Flickr profiles
often show up in organic search and do add to organic relevancy. You can
also get some relevant traffic if uploaded pictures are tagged with the most
desirable and relevant keywords.
How to Set Up an Account on Flickr?
1) Go to www.flickr.com
2) Create a Yahoo ID if you do not already have one.
"'.-..
••••. ~lC'fto
~'m, ••lll\.
:t~
Fig. 19
Fig. 20
4) Click on Step 1: Choose Photos and videos. You can select multiple pictures
~at a time. Select Public for the privacy setting (if you choose to share your
photos with everyone on the web) and then click Upload. 51
/
Internet Technology 5) Click on Describe Your Photos
• Title: Include the property name and locationo Description: Describe the
PHOTO with location based keywords.
• Tag: insert main keywords. Make sure that keywords are in quote brackets
if there are multiple words
2.5.5 Twitter
Twitter is a social networking and microblogging service, owned and operated by
Twitter Inc. that enables its users to send and read other users' messages called
tweets.
,
'If(tWt; TOF!CS S: eu"~ ~ 'I ••~ <>, I 'I' Cl, , "
AlIH.wTWIIt ••
C"ldi"9IhIWtot~!h.I'l"""
TwithlrCQrro
~-h~it~~·fGiJ
~~~jOIj\OoMl\,
&$~~~nt.r>M
~.aIIl)n~
Fig. 21
The short format of the tweet is a defining characteristic of the service, allowing
informal collaboration and quick information sharing .Twittering is also a less
gated method of communication: you can share information with people that you
wouldn't normally exchange email or IM messages with, opening up your circle
of contacts to an ever-growing community of like-minded people.
You can send your messages using the Twitter web site directly, as a single SMS
alert, or via a third-party application such as Twirl, Snitter, or the Twitterfox add-
on for Firefox.
'Using Twitter
Visit the Twitter website and click "Join for free" to create your account. Consider
using your real name as your user name to help your friends find you more easily.
Once your account is created, login and click "Settings." From here, you can setup
your account details, manage your password, register your mobile phone and IM
account, configure how you receive Notices, upload your photo and customize
your account's design.
You can "tweet" from your Twitter page by simply entering a message in the text
field at the top of the page and clicking "Update."
~------------~~----------~
52 Fig. 22
/
Finding and adding friends to your "Twitterverse" is easy. Login to your account, Social Networking Sites
visit your friends' Twitter pages and click "Follow" underneath their photo. If
your friend's account is public, you will immediately start seeing their tweets on
your page; otherwise your friend will need to approve you before you can see
their updates.
2.5.6 MySpace
MySpace.com is one of a class of web sites that are termed "social networking"
sites. People are given a web address where they can post information about
themselves, and they can very conveniently contact other people on the same social
networking site. Similar sites include Xanga.com, Friendster.com, and
Facebook.com.
Sign up free
Fig. 23
After you sign up for MySpace, you will have to describe yourself and explain
your interests so other members know stuff about you. There will be an "About
Me" section where you basically write about yourself. After filling that out, there
will be another self explanatory se~tion labeled "Who I'd Like to Meet". This
would be the basics of telling people about your self.
Soon, you will be to the point of where you fill out "Interests" and "Details."
Interests are basically what your favorite books, music, televisions shows, and
movies are. Details are how old you are, what your occupation is, and many other
factual notations that you feel like providing to the intern et community
Friends
Now that your site is up and running, it is time to find some friends. You most
likely know someone that has MySpace, so it shouldn't be that difficult. Simply
go up to the search function and look for people in your area. You can search your
exact area and even your high school graduation year for old and existing friends.
Comments
Comments are little messages from friends that appear on your main MySpace
page. Only friends on your friend list can post a comment to you. This keeps from
random people you don't know from saturating your pages with stuff you might
now want on your page.
Bulletins
A bulletin is just what it sounds like. It's a bulletin board that you can write a
message on that everyone on your page can see. For example: It is your birthday
and you are having a party next week. Post a bulletin on the bulletin board with
the date, location, and time of the party, and everyone will know about it. It saves
minutes on your phone and some l1.(.l[ley in the pocket. 53
••
Internet Technology Music
There are many MySpace pages of musicians that have their music on their site.
Go to the music search to find your favorite band. Add the song that your want on
your site to play and wallah! When a person goes to your MySpace, they hear
. your favorite bands song play.
Communication
1) Email Messages - These are private messages sent to and from member to
member. They are good for talking to friends but very unreliable for making
money.
2) Bulletins -Bulletins are the star performers for what we are talking .about
here. It's priceless real estate that we will be using to our benefit. Bulletins
are really messages that are intended for everyone on your myspace friend's
list to see.
3) Blogs - Blogs or 'Blogging' is another great source for getting targeted traffic
to view what you have on offer. It's more like a newsletter format, where you
keep readers up to date with specific detailed information with regular posts.
4) Forums - Forums are a great tool on myspace. Bulletins are similar to the
forum; however a forum is more like active continuous conversation between
different users. A bulletin is more like one person posting a comment and all
responses are disabled.
2.5.7 Linkedln
Linkedln is a social network within the larger world of social media that is geared
toward business. LinkedIn is very popular with those who are seeking work and
trying to build their network of contacts so they can reach out to employers.
Linkedln is also popular as a way of marketing a business, because business owners
can interact with those who are interested in their services by answering questions.
participating in discussions and more.
Signing up for and using Linkedln is completely free to users if they so choose.
The site does have some advertising, but it's not as invasive as other networking
sites out there. All you need to get going and start learning how to use Linkedln is
to create a Linkedln login to sign up for a free account. You can also upgrade to a
paid Linkedln membership.
54 . Fig. 24
Components of a LinkedIn Profile Social Networking Sites
Title
This part of your profile appears directly under your name. It's a one or two sentence
summary of who you are or what you do. Use your key phrase(s) here, but construct
it so your title makes sense. This is essentially who you are or who you'd like to
be.
Summary
Your summary allows you to create a free-form description of your experience,
expertise and your objectives. There are two sections - Professional Experience &
Goals, and Specialties. Make s~re this area is well written using proper grammar
and is typo-free. Use short paragraphs with just one or two sentences each.
Experience
LinkedIn allows you to .create a rather lengthy online resume with your current
and previous work experience listed. The goal is to keep your readers engaged so
they don't want to leave right away without finding out more about you.
Education
Since your LinkedIn profile is an online resume, this area is important if formal
education is expected for what you do.
Additional Information
Just as it is with a paper resume, you'll want to consider adding information that
can help make your profile stand out. Within your LinkedIn profile, you can add a
photo of yourself, link to your Twitter account, your websites, awards and so on.
You can also include your interests. Just don't list anything you wouldn't want a
potential customer or employer to know about or you wouldn't want to be public
" ,
information. .,
Recommendations
After you have established a LinkedIn profile and have built up some LinkedIn
connections in your network, ask for recommendations from people who are familiar
with your professional skills. The right recommendations can help your profile
stand out and they might help you land more work. One of the best ways to get
recommendations is to first write a LinkedIn recommendation for someone. During
that process, the person you recommend will be asked to write one for you. To
see how your Linkedln profile looks to the public, click the link next to Public
Profile on the Edit My Profile page.
2.5.8 Tagged
Tagged is a social network that has been created to fulfill the necessity of finding
new friends. All you have to do is join for free and you will have access to messages,
friends, and chat rooms where you can meet new people that share your interests
or j st chat when you feel like it. Tagged Feat res: 55
I
Internet Technology • Create your own custom profile
rut N!Imc!:
------ --- -
------
~QII NIImt;
Otndof:0rtI!IW 0 Ma
!!iIItidIIIo;. Mo,;th .., D~'" v•• , v
ZilloM' =- -
blllflG\lll9l: Enalll;; -
, -
N.xt>
Fig.2S
If you desire you can browse through pictures so you can see if you recognize
somebody, and you can also filter your search by gender, age, country, location
and ethnicity. What is more, you can also check out some videos where you can
search them by: most viewed, time, category and languages, and you may also
upload your own videos. In addition, Tagged also offers advertisers the opportunity
to place their ads on the site, they offer different types and sizes, and they provide
a list for potential channel sponsorship.
2.5.9 Classmates
Classmates.com is a social networking site that helps members find, connect, and
keep in touch with friends and acquaintances.
fma~l: L _
classmates·com ~----
P-illssword:L _
..•
Untted Stal~'
Alabama Kentucky North Dakota
Alaska Louisiana Ohio
Anzona Maine Oklahoma Who got married and
Arkansas Maryland
~~:~~~1.
.'__
:_ who stayed single?
56 Fig. 26
How to create a profile in classmates. corn Social Networking Sites
2) Click the state or country you graduated in. An alphabet page appears. Click
the letter that corresponds to your hometown. A city page opens up. Choose
the city your school is in. Click the school. A free registration form appears.
3) Fill in the free registration form to continue. You will come to a homepage for
your school. A list will appear half way down the screen that displays all the
people now signed up with Classmates.com.
4) Search through the alphabetical list. You can search by last name or category.
Categories include new members and parents of students. You can also specify
what years you want to search.
5) Click on the name of someone you recognize. You are taken to a page
displaying information about the person. You are also able to send the person
an email from here. Click your browser's "Back" button to go back to the
main list of names.
6) Click the down arrow next to the "Last Names" button to view names starting
with another letter of the alphabet. You can also sort by first name if you
don't remember someone's last name.
2.5.10 BharatStudent
Bharatstudent.com is a social utility that brings together all the young Indians
living across the globe. It is for every Young Indian who is a student or a non-
student, fresh graduate, a working professional or an Entrepreneur, and is focu~ed
on providing comprehensive solutions for any personal and professional issues.
T••• 3n!I
SodaII__ '<i ••g~in INDIA
_Stud·,_
,.. Stully Al:oroM
1:3mpusH Game2cJne
,,.,.,,41edge ~.,
Fig. 27
To join Bharatstudent.com, one has to be of Indian Origin and can join into a
school or work network, or they can join a regional network. Members can grade
their schools or work places, write reviews, connect with old friends, make new
friends, share interests, join groups, send messages, write Blogs, share photos and
watch.
Features of BharatStudent.com
GenXZone Gen X Zone is for people who believe in them and are at an edge over
others. Gen X Zone consists of Boy Zone, girl Zone, Game Zone and live Radio.
CafeBharat Cafe Bharat is place where you can check for the latest film news,
gossips, photo galleries, wallpapers, trailers and event videos. 57
Internet Technology Study Zone Study Zone consists of two separate sections viz: study India and
study abroad. Study India sections provide all the information you need about
various programs in various institutes and guidance on how to apply. Study abroad
section is intended to guide the estimated 1 million Indian students aspiring to
study abroad in the critical and time-consuming stage Of identifying and selecting
a short-list of institutes for higher education. Our online platform brings efficiency
and a close sense of community of Indian Students that is scattered all around the
world. The database of Indian students studying in major universities will be of
great help for those who aspire to study in the US, Canada, Australia, UK and
elsewhere. We guide the students in identifying schools that provide good education,
provide financial assistantships, while being affordable.
Services Apart from the all the above features bharatstudent.com provides services
such as Classifieds, Greeting, and store . .In Classifieds the user can look for various
categories and hence can narrow down to his perusal. In the greetings section the
user.has the chance to select among various available greeting cards and can greet
his/her friends with them. In Store the user has the option of shopping various
products such as books, DVD's etc ... Online .
b) Compare your answer with the one given at the end of the Unit.
58
/
5) Explain the functionality of LinkedIn. Social Networking Sites
Malware
Social networking sites are vehicles for malicious attacks to spread malware, For
Example Fake Twitter invitations that have been used to spread a mass-mailing
and malicious worm. Instead of pointing to an invitation link, the Tweet: directs
users, to a malicious attachment that gathers e-mail addresses from compromised
computers and spreads by copying itself into removable drives and shared folders.
Spam
All the personal information the sites share can be easily collected by employees
of the site with bad intentions and be used in sophisticated social engineering
attacks.
Phishing
Social networking sites are used to launch attacks that aim to lure victims to a
malicious and fake iogin page to obtain the user's personal login details. This
information could be used for various cyber criminal activities, such as breaking
into the users' online banking accounts or enterprise accounts.
Identity Hijacking
/ I
Internet Technology
2.7 LET US SUM UP
This unit deals with the "Social networking". Social networking is the grouping of
individuals into specific groups, like small rural communities or a neighborhood
subdivision. Although social networking is possible in person, especially in the
workplace, universities, and high schools, it is most popular and easy in online
platform. When it comes to online social networking, websites are commonly used
known as social sites. Social networking web sites function like an online community
of internet users. Depending on the web site in question, many of these online
community members share common interests in hobbies, religion, or politics. Such
networking helps in the development of public opinion and is the most common
method of sharing or exchanging views.
• Job opportunities: The individuals in the Social Networks can get better
jobs through personal contacts. Even the Businesses can get new orders
and opportunities through personal contacts of its employees.
3) A thematic website is a mini web site that focuses on a particular subject that
we want to emphasize on a current website. It allows more efficient referencing
and thus ensures better visibility. The main objective of a thematic website is
to bring out specific information of our original website in order to help the
search engine robots find it more easily. If any original website contains a lot
of information, it can be difficult for the search engines to target a specific
piece of information. Internet thus offers to create a new website in which
specific information on products or services will be emphasized. When Internet
users make a specific search, thematic website will appear more easily in the
top results. Thesratic website will also have links that will directly lead to the
original website to ensure greater visibility and traffic.
1) Facebook is a social network service. Users can create profiles with photos,
lists of personal interests, contact information; and other personal information.
Users can communicate with friends and other users through private or public
messages and a chat feature. They can also create and join interest groups and
like pages. One of the main advantages that Facebook provides for individuals
is that it allowsthem to easily connect with their friends and family wherever
they might be. Facebook also has some advantages for businesses: Since
61
Internet Technology Facebook is a giant network of people, businesses can advertise their business
to specific groups that would most likely be interested. Those people, if they
liked the product, would in turn tell their friends about the company. Another
advantage is that the cost of advertising is very low. Businesses can save a
good amount of advertising budget by using Facebook. Facebook also helps
business to develop relationships with their customers and raise the visibility
of their company. Facebook is a very good site for both individuals and
businesses as it helps them to connect and grow.
2) YouTube is most popular video sharing website and it has millions of users
all over the world. It offers wide range of videos and people can view them
for free. There are a lot of features of YouTube which have been analyzed by
the business owners and they are using this platform for marketing their
products and services as to elevate the prospective customers. This site is also
helpful in getting socialize with people across nation as you can leave a
comment on videos watched by you and you can even share the videos with
others. You can upload the video on this site and make them available to
public. You can record anything such as skits, plays and video related to nature
and upload on the site. This site can also be used for education purposes as
there are a lot of tutorials available which you can find by making a search in
YouTube search bar. You will get a list of links and you can click on any of
them. You will also get the information about related videos.
3) Flickr is one of the most popular image storing and sharing sites on the Web.
Flickr is all about sharing content with family, friends": and people from .all
around the world with following features
• www.socialnetworking.in
• www.whatissocialnetworking.com
63
Internet Technology
UNIT 3 ADVANCED SEARCHING
TECHNIQUES
Structure
3.0 Introduction
3.1 Objectives
3.2 Searching the Web
3.2.1 Tools for Searching the Web
3.2.2 How do Search Engines Work?
3.3 Basic Search Operators
·3.3.1 Boolean Search
3.3.2 Truncation Search
3.3.3 Phrase Search
3.3.4 Other Search Operators
3.4 Google: Basic Search
3.4.1 Google Search Strategies
3.4.2 Google Basic Search Operators
3.5 Google: Advanced Search
3.5.1 Advanced Operators
3.5.2 Google Advanced Search Page Options
3.6 Google: Advanced Image Search
3.7 AltaVista: Advanced Search
3.8 Search Tips
3.9 Let Us Sum Up
3.10 Check Your Progress: The Key
3.11 Suggested Readings
3.0 INTRODUCTION
Web is the most appropriate medium to use and to find your information. There
are hundreds of millions of pages available, to present information on an amazing
variety of topics. When you need to know about a particular subject, how do you
know which pages to read? The best and fastest way to find information is a Web
search. There are several very useful techniques for finding the most reliable
information available on web. Most internet searches are conducted using a tool
called a search engine. Internet search engines are special sites on the Web that
are designed to help people find information stored on other sites .. There are many
search engines and many are good at searching for one kind of information but
not another. The more powerful search engines, like Google, Alta Vista and Yahoo!,
are quite versatile. Regardless of the search engine ycu prefer, there are some
methods of refining searches that are common to most engines. There are also
techniques that are unique to the particular search engine you're using so you
can't assume that the information presented here will always provide the most
efficient search. This section provides various techniques related to searching for
information on the engine that you're using.···
64
Advanced Searching Techniques
3.1 OBJECTIVES
After studying this unit, you should be able to:
• Use search engines and directories to locate information on the Internet related
to a specific subject or topic; and
y Cl' TV •• _ ';":;''':IISI[~:'J •• +
zv
..!-
-
alt:avist:a-
10.- __
-----.I liE.;;';;:"'-
Web directories cover a much smaller proportion of the Web' but using them will
bring you more highly relevant results. The largest web directories index a few
million pages compared with the billions of pages indexed by some major search
engines. Remember that the web directories - like the search engines - do not
search the Web directly. Instead, they search their own databases of indexed Web
pages. Some search engines are in fact hybrid search tools because they are both
search engines and web directories. (Google, for example, is a search engine and
a directory, powered by Open Directory Project).
Some widely used web directories are: Google, Open Directory Project
(dmoz.orgj.Yahool.Popular virtual libraries include: Librarians, WWWVirtual Library .
., t X
Tools •
e
~~~~~~~
I SggrclT D,ract"rl J ~"
Computers Shopping
<
~ ~ programmllU ~",i ~
8"'S
CaI!%I"1 an:tU%~(fr!!e1 Hgmi!';m1 Gadw ~ ~
>
Fig.3: A snapshot of Google directory
I'I:tp:/Iv1b.Cl<o/ x
G. _""tuallbary TV & VIdeo
"
., . • • • p~ • t661s •
TbeArts Intematio ~
'"-rt History r C1asw-a'1Mu.ic, Tlr••atm !rrt"rrrati",ral R••l~6n"> al1d S..curity,
srtd D,-alTfa.' SWft.ain-wl,. Oqv,.lvpm~r ....
• omplete Planet
.~
~
.~
• Health + News • Search Engines
• Computing & Internet + Home & Garnen • Newspapers
~
• !!llilrI.
, EIlQII1eedl19
+ Jobs & Careers
.• la1.'J
.~
• People
Potibes
.~
+ SQcial Sciences
+ Tmllsp°rtation
+ ElwirOIJ01ent .1i~ Produsts & Te,hnalMY • Tr~vel
• Familv • LivlnQ 1111110S Recreation + WeatMr
• Finance & Economics
• food & Onnk
+ Magni,jes & Journals
• 1.'eClia & Entertainment .~ References
• Dogpile
• HotBot
• IBoogie
~ r met~se~rchengines ..! +
67
Internet Technology
•
1
w.t)
1 --DII-ectQr.' ~
-- --~ews
---- Add custom tab
---- NEW
Words or combinations of words that you have entered in the search box of a
search engine are compared with the information in the search engine's database.
The search function tries to match your input with the content of this information.
The documents that are found are sorted, using a couple of algorithms, but surely
on relevance, and are presented in your browser. The most relevant document is
shown first, followed by other, less relevant documents. Search engines have four
functions - crawling, building an index, calculating relevancy & rankings and
serving results. Search engines do not really search the World Wide Web directly.
Each one searches a database of web pages that it has harvested and cached. When
you use a search engine, you are always searching a somewhat stale copy of the
real web page. When you click on links provided in a search engine's search results,
you retrieve the current version of the page.
Search engine databases are selected and bu,i.ltby computer robot programs called
spiders. These "crawl" the web, finding pages for potential inclusion by following
the links in the pages they already have in their database. They cannot use
imagination or enter terms in search boxes that they find on the web. If a web
page is never linked from any other page, search engine spiders cannot find it. The
only way a brand new page can get into a search engine is for other pages to link
to it, or for a human to submit its URL for inclusion. All major search engines
offer ways to do this. After spiders find pages, they pass them on to another
computer program for "indexing". This program identifies the text, links, and other
content in the page and stores it in the search engine database's files so that the
database can be searched by keyword and whatever more advanced approaches
are offered, and the page will be found if your search matches its content. Many
web pages are excluded from most search engines by policy. The contents of most
of the searchable databases mounted on the web, such as library catalogs and
article databases, are excluded because search engine spiders cannot access them.
All this material is referred to as the "Invisible Web" (what you don't see in search
engine results).
If you want a document that contains all of your keywords, use the capitalized
word AND between keywords. The engine will only find documents that have
both words. Here's an example:
Search Results: Web Pages that include both of the words containing both fly and
fishing
OR
If you want to broaden your search to find. documents that contain either of the
keywords, use the OR operator between words. This is very useful when searching
for terms that have synonyms.
Search Results: WebPages that include either of the words or both them on the
same webpage containing web or those containing designer.
NOT
Using the capitalized NOT preceding a search term eliminates documents that
contain that term.
Search Results: WebPages that include the first word but not the second word on
WebPages that contains web but not spider.
Truncation Operator *
Example: micro*
Truncation Operator?
Examples: Kir?land
Search Results. WebPages that contain Kirtland, Kirkland etc .. Would be found.
The symbol "?" is used as a right-handed truncator only; it will find all forms of a 69,
word.
Internet Technology
Example: Reengineeing? Finds "reengineer", "reengineers", and "reengineering",
etc.
When using search terms' containing more than one word, enclosing them in
quotation marks, returns documents containing the exact phrase only. Here's an
example: When searching for information on gun control legislation, using "gun
control" eliminates documents that contain the words gun and control, but not in
that order; possibly in entirely different paragraphs and maybe not even relating to
the topic of gun control.Use parentheses to clarify relationships between search
terms. Example: (television or mass media) and women. This search looks for
both "television and women" and "mass media and women".
A '+' symbol preceding a word (with no space between) requires that the word be
present in documents. If a common word is essential to getting the results you
want, you can include it by putting a "+" sign in front of it. '
Example: World War +I
"-" search
A '-' symbol preceding a keyword ensures that the word is not present in returned
documents.
Meaning - Messages that contain the word "dinner" but do not contain the word
'movie"
"-" search
Example: -food
Return the results about food as well as recipe, nutrition and cooking information
'." search
( . ) a single-character wildcard:
Example: m.trix
b) Compare your answer with the one given at the end of the Unit.
1) List out the functions of a search engine .
.............................................................................................................................
.............................................................................................................................
.............................................................................................................................
70 .............................................................................................................................
. .
2) Which type of search will find matches containing an exact sentence or part Advanced Searching Techniques
of a sentence as specified by a user?
i) Keyword search
iv) + D) wildcard
v) % E) search engine
~~biii~
• C I "I ~~r-,~,~,w
t<\I!l\W.~!J\i!\fi li\W~ Ll~ll'f8
W~b Iimui., Mw. bImi QrIul1~ lZmiil mIWI. iQQQgli I Search settings I Su!nJn
Fig. 8 71
Internet Technology 3.4.1 Google Search Strategies
The following things make pages appear at the top of your search:
• If your search terms appear in the content of the page (especially in headers)
When you choose the search terms you enter into Google, think about the titles
you would expect to see on these pages or that you would see in links to these
pages. The more well-known your search target, the easier it will be to find.
e
Aovanced Seare
IGNOU Language Tools '
Fig. 9
Enter the one word that you associate with your topic. Typically this will return
too many results (unless the term is a commercial trademark and you are looking
for the company's web site).
When you enter more than one word, Google assumes you want pages with ALL
.of these words present. This also often returns too many results. The pages you
get will have all the words in any order, and they mayor may not be near each
other. For example, if you enter a first and last name, you may get some pages of
the person you seek, but unless they are very well known, you will also get pages
where a list of names contains one person with the first-name and another person
with the last-name.
Go gl security attacks
About 37 ,800,000 '.sults (O.oe seoonds)
Search
•
·'1 Everything Security Att~cks 0.
• News SecUl hy An,lcks. Attacks against the encryptlon schems (cryptoanalyllc attacks). Chosen •
plalnteld· Same as Known·plalntext attack, but tha analyst gets to '.
.•• More -...,w comptecnooc orgllndependanlfsec,"hyl Jsec.1Tt,lcks_html (,.;u.:hI:oO SIIfltl:Jr
T'ipes of Attacks
ViiiIYtlW,ltl,l. AIUIlI. a ThiS page lists types of •• cUlhy "I!.lcks. This documentwili address ".
Pladesh \I'II\.IVW.comptechdoc.org/lndepend~mJsecultryl._/sec(lttilck$,html (d(tlrJU Slrnc\~(
•• Change location
+ sr,ow rMmi' lI~tioUltr from I..:l'Jrnptetfldo(' orl,l
The United Nabons S&CIIIiIy Council and the United States have led
condemnations of a new series of atMcks in Iraq targeting members oftbe
Christian '"
RadloFreeEuropeJRadlollbeftl" 'Jf " TF;lIJ ~nlrlr·
Fig. 10
If you use Google to find sites that you know are popular (such as the Microsoft
72 Web site), you can click the "I Feel Lucky" link to bypass the search results and
go straight to the top of the list. While this works well for commercial sites, it is Advanced Searching Techniques
less certain for other searches.
Go
;>dvaneed Se.roh
rnicrosoft __ .J Language Tools
Google Search
Fig. 11
bones OR skeleton
.',
_Images
--I
Everything
News
Bones eN
prodUtedbyF
senes) - Wikipedia the free eriCYCloped,a
A_serlestonsJslllgof26IM>-m
•• oOO""""'''''d_o_Np-'Spii:lt_
en wjklpediaorgfwiOOOfI~sJTV_se'le'S.)·
•
Cacned- Sttnrta:!
.-_:_c.- .
~
~-.
• Videos
Season 5 SeeleyBooth
..,.
More Howard Epps DaYidBoreanaz
Emily Oesthanel t<aU\y Reiths
More results from """klpe(ll~i 0111»
--
Pr •••• '"
Skeleton - Wikipedia the free encyclopedia
• Change location
TheIwman•••_1aI<es 20",alS!Je_~isilJlljj _po<l.In
Typesof skeletons' Human· Bones3nd.ta~e· See alSo
"""'f-
en.w'tkjpMiaorgf\llti~eteti)u· C~r.tia-::!·
Sj~i-;j;r
~.-
Latest Development- Organization Function· S~baSed difenm(:e~
en:wikipedia ol1J/¥riklJHuman_st,."l'I4t- (.i{'~"~ SirnU:u
Pas12 days
+l Shl')# more N'sult~from ~,,"1kip~4'.;
o,.~
Fig. 12
Operator '+'
Google ignores certain "common words" (called stop words) because they appear
•
too frequently in pages and would thus pull up too many pages that would not
satisfy the search request properly. Using the "+' sign will force Google to treat
the word following it (without a space in between) as a valid search term. For
example, Goog1e tells you that if searching for "Ramayan Episode 1" you should
use [Ramayan Episode + 1].
Go •.gle
't EYerp!iing
• Videos R.1n ••••• Part 1 ofl
1'~i" ••.•.•'?;..;or2'Jf))?
.••. More
-.. •.•...
~-,,¥'f'.>6M~t-\·..:~ .•.
-.Rs.,••• .3
• Ij't'Ut\meol.'arn
~ SimR.w....,.
•.. Ramaoanda
--
.•. Change location ~
~.;m;.."'·~1NitY1OO~
• ~OgQO!.il1!wm
RolI:Ml311 Ser!eTl.Episot1e 10
Pages from India
}'ig.13 73
I
Internet Technology Operator '.'
This special character is much more useful than the "+" sign. It tells Google to
omit pages that have a particular word or phrase in it. Often words have multiple
meanings and you end up with results that include pages that have nothing remotely
to do with what you were interested in. For example, let's say that you were
interested in learning about virus, with the exclusion of computer virus since you
already know about that. The following would satisfy that search: [virus -computer]
G ~'
~-
News WW'Nwlfsfont~ coml '....ecneu- SImilar
.-
.• More \Nhat IS a Virus?
.!I:"ltilt"'_lli_"","~"""~I_'IIOi<I!!TItta!"'IIt_
QIlIjIni_""'_iTt~"""Itta!IIatI"'~II1T","1!lIfIl....
c scnec
_.-
WW'N.o&ws-mecllca\ ""'tlhealtnlWhat-ls-a-\IIIu5 aspx -:lmll:;f
• Change location
Access MusIc I The Virus 11· Totally Integrated Synthesizers
__ ~TOmlIJiII_~_l)tijfnll!llllll¥tmuoloolllrtl!lrUlmln1lt""'ITIMI •• !!OfI ••• 1IIf
SWI1Il1OIi••••••llttbto __ I"'Itta!WIlUJllI_DlIISWI1Il1OIiIt_.
Pages from India ww·",,;.access·muslt~ del Cached· Similar
• ••••••••••••
--
Virus definition - Medical and Health Information on the Common ...
Latest 11Q)_W1III-ITIMI""!l.miIlfmlrQlllli __ I_"'il$TJari"'.'OIliI!llT_~
Past 2 days ~oq>I!t!fr.'""''''IIvi!tQl'''Ii.lo'' ••i_'Ivi!tQl'''lltilllfl!-.
wv.w medter». ';.:lm/scnptlmalruart asp?articleKey=5997 cacneo - Similar
Sites wrth Images
Church 01 Virus
• More search tools """"'iTll","'~Qj\mulUJIIlIj~~i~<!,,~~~1IJlOOi1l\ll
Fig. 14
Operator '-'
By placing a "-" sign (called a tilde) right in front of a word (no space in between),
you are instructing Google to search not only for the word following the tilde, but
also its synonyms. Without doing this in certain types of searches you will miss
many valuable sites. Let's say that you want to find sites that offer a primer on
alternative energy. You know that the word "primer" is not the only way to say
"an .introduction to" or "the basics of' but you don't want to try to think up all the
synonyms and build a massive OR query. So, you use, the tilde like this:["security"
-primer] .You should execute this query by clicking the link to study the results.
Looking at just the first page, you'll see pages that use the words, "basics', and
"introduction". Although not "primer", the sites appear to be what we are looking
for. Using just one word like "primer" would have missed many sites of interest.
Go 81>
-...- .. -~----~-
I"U1 InformatIOn SeCtI.-itv primel
; JmFI~~- •••..• ,ev.
-
• . yd< Security
~--~
• Wore
""*'A1Y.QWr~1
_<lOoo!'"_Ilt __
~it>aq~_"ttclJQJlll~M~.:df~.
-.--~.-~.-.
W'W' sensag.teading.]oomf b.lsk~klf()rl'l'l<lb:)n.$eCUlCy-tltill~_44 l'td COO',Il~mer
-------_.
Pages trom rds
Computer Security Basics
~~n~ __ ~~!11111"_·~"""_
Past 2c.!)'fS
••. MoI'esearch100ts "It'WWr:(lneU:1;:I!!IIdoct.menI~~<:.pcs )sectHJCy1J1:mI Cached s,1/'TlII8f
-----
I"'Of'! An Intloduction to Computet Security The NISI Handbook
I 1Qlt~~
- -Fet't;:.~art le
'""'--'-;""'-"-"'"
c. •..•;.1 ~~ 12,h..... pi!
Fig. 15
Operator '*'
You can use the asterisk "*,, as a wildcard in your search query. It means that
wherever there is an asterisk, the search will accept any word.
74
This works well if you know a phrase but forgot one of the words For example, Advanced Searching Techniques
let's say you know there is a story called Little something Riding Hood, but for the
life of you, you cannot remember what that missing word is. You can search for it
like this:
----.-
_ •• _.ag,Il!odVVOlf. The slPfy has been~_
-
•. More The tee . The tee's h.~1(rt· ere- Pfeto!lHOn~
en.Wio;~.orgtM ,l.It'\<-_- o;d_Rkhn~LHoO<l (''lCt~.d - stniIar
•.. .. __.M.-.
__c..._~----~-_.--
little Red Riding Hood - Bntish Council - Home
...- .
----
•. Change location --IID- ••• -
wwwI:>rtIShcounciOlg!lad$-stoI1es-red-rkllng ..hood-pop.,opiim-Olched - S#rjIar
Fig. 16
Go gle
~t&aJIIiiooI Chemicallnfo,mation Technology Cente, . Cvhe. Security Tools
-......,..m- .
iIIIIIgji!oiinglllle.,........".,.",..,....,
__ •••• ~-. .•••_
•. More ~_oIIlI __ 'h~ • .....,;;"tIy
•••_ Cybe, Safety & Security
'---so/I!I!f&~
www ~v com/S_chemlTCJsec osp?CD=l633 - Cached
ISSUestigweb_orgl
India to develop Us own Whe, security tools I iGovernment.in
----
211Ot!IDlQI_~ ••T~ __ IID"""""IOliPiIs •••.•• qIIon __ 1!r
_.'-_~m1ilni!ll'i_"' _
W'NW.igo<.-et1'lIT'Iert.lnI ,.mdI8-develop-ls-own-~ybel-~ect" ity-tools-38647 -
. Cached
Pages from India .
Data Cent er Fi,m Terrema,k Names Cybe, Security Analyst I WHIR
eest a weeee ~
25Q:!t2!!DIIQl_~IIIIe~"'~""" _
.•. More seerch tools lIIIe_ewo1f~SI!<IIUritIf~IIIIe--W!sSlS_1IIoIIps1lm_
wwwthewho'.comI J102ll10 .. O"••• _~enI"'..Frm..Terremar1<..N •••••.. Cyber_
Secutr_AnoIys1· Cached
---
WOIt'w_cdac~~2 esox ,-~.he<t
In order to find more detailed information from the Web site Google offers advanced
search operators to make your searches more precise and to obtain more useful
results. Google supports several advanced operators, which are query words that
have special meaning to Google. Typically these operators modify the search in
some way, or even tell Goog1e to do a totally different type of search. They include
allintext, allintitle, allinurl, define, filetype, info, intext, intitle, inurl, site, nurnrange,
daterange etc. 75
Internet Technology Allintext
If you start your query with allintext:, Google restricts results to those containing
all the query terms you specify in the text of the page. For example, [allintext:
travel packing list] will return only pages in which the words "travel", "packing",
and "list" appear in the text of the page.
Go gle
..
.-. PJdcm••••••••••••••
_
_
Lnt' Trp!krwog
WW'#Jf'tr
••••••••.
_
T__
~veletsprJft~Mtdog-tiist
••
••• """""'
PIlF_.
t;1'm. C&::f'led -
__
::;.w:..-
••• _
-"' _P .
Pnnlibf. padqno U"
OoI_
Mcom
•••_Uot
Lmure " e.n.m, Tram PalM UU' IqM Ldit wrlh Onc std
tr..,...IIgH.the:
Ot ••I•••••••
___ diIIltywmii;j't..,.
u..",A ••••••• e,L••.•••••••• _ ••••.••_ most_lst:nw9/
www~comI-O!ocherl ~
VU'"
f ••• _'_Tr Pacl<m
yau;QI'I!~""'OCtime
W
arw:tbro'e-hcanIdBnce
~_"'.,_1iot.
of !cnowWlg)'CU,"-
~tt!otAcorr! .'fJ •• ~Jd"~J..H:t"".~ Sr.~
+- .~.(;Y,.JI{.
Fig. 18
Allintitle
If you start your query with allintitle:, Google restricts results to those containing
all the query terms you specify in the title. For example, [allintitle: detect virus]
will returri only documents that contain the words "detect" and "VIruS' in the title.
Go gle
.......
~ «11' HptftM 4«4*,!,., •• h~s
c..~~IIIIrN'.y.o;IIdetIII:!IwtIiid'fl-ma_~.,...~
'*"ft.' •.
----- ---
and!Ifl'tOW_~tblfli'ldlIl:UI'l1'JOUlj4ttI;lh:.~ .•••••~\tIWII:_
!MIa.ans...-.er~.co!{t! _~_.rJtj.:Jou_~_"fI'hIOt.Ifl4;ls_has.Jlltec1e<j..'J'ClUf_
~_-_a::'I{j_If_,'O\l_ere_~_1o_'t'Jd ••I_can_¥OU>' '::$Ohe1 ~r.rw
Fig. 19
Allinurl
If you include inurl: in your query, Google will restrict the results to documents
containing that word in the URL. Only web-pages where the keywords form part
of the actual URL will be shown, this can be either the domain name itself or the
directory, filename.
*"'!iI!!!lmdlO
aII'~,,
__ _""""",, __ ....t.1liem!r!!!!!!
CmltWnW!Io~"l!Ij!lI
w.b..d.Its.iQ.lTllndlat,'MIi):sitEmiW',dalt'lil. ••• blauiW"tl1"1Il1fn"dj t.IJt1llmitldJw~ain·~jW:!le:
web:site>d.lIsIflJlln!J)S"atwtl!ft;"tiiltnllm:tJfII <Ywi1l~wd:tJtu.tUJm~IJtlYI~1IQl
~~IllL4'lll.IU'" "~WH'Omr'iln~'t")mi ·r.••(h~tI
,....,..,,,,..-
W¥fN.welrplatfotm,tom
--_.-2_
DiI!.ltIlM'~
.•..
~_IIm:itt!llfl _[}le,J"""hd,. •• [i)e_~W ••••
•••• Dfli1pp W"ID
~
~S:a:lldtQJTS.Is..~d&illJ'lindlfJmre1~ --..~I!iIp!--
-""-
ClfiIgnar:s1lllQunpttt:tve;CQtII
fIlgoos
..• !lm!~ autsQtlJ'On'gJQJlmIJ&lWj
Wlfdalh •••. aU,tma>atWdld.asi!lJllanUl
lUMJawnantlmuli01't$attltl'br<tiJtBl>onstI.-
~tdia~ ~~oe!l-:"""
'€'~I':'~a9("S~CoP'".A-t 1efabad
Fig. 20
76
Cache Advanced Searching Techniques
The query cache:url will display Google's cached version of a web page, instead
of the current version of the page. For example, [cache:www.ignou.ac.in] will show
Google's cached version of the ignou's home page. It shows the last copy of a web
page that Google saved. In other words you can see the actual content that GoogJe
have on file exactly as their crawlers saw it.
This is Google's cache of ht1p:llwwN.ignou.ac 1nl. tt IS a snapshot of the page as it appeared on 6 Nov2010 22:05:58 GMT. The rr
the meantime. Learn more
.Ignou
t(W THE PEOPLE'S
UNIVERSITY
o=
1I
0'
\1 ,,',ut It;> " .ll Stu.l ••nt M~ Ut"
Fig. 21
Define
If you start your query with define:, Google shows definitions from pages on the
web for the term that follows. This advanced search operator is useful for finding
definitions of words, phrases, and acronyms. For example, [define: blog ] will
show definitions for "Blog".
------------------------------------------------------------~
_u_ ~ I I Search
Go gic :define:blog ____ -1
.edvine.d
fI:!.f.m.nal
SureI'!
Relaltd phreses: bloq cltent Video bloq ~ .!l.!.Qa.ll micro bloq el bloq de la fena !!ill1.J1]Qg
• A olog (a cOl\b'IIction afthe term "Web log") Is • WI ofwebs~, usua'", ""Int.lnld by In IndMduel 'HI1ttftgUllf Inbi" of
commentary, descriptions ollvents, or othef mttentl such .s graphics of'lld,o. Enbies re common", displtyed In rewl'$"
chronologlt.1 order. '"
enwikIPedla orgffflktl8log
• Wlb$~ thit tlloW$ U$tl'$ to fQft.c~ sh re opinions, end discuss vanous topics In tht ftlrm of en onllne journal white readll'$
m.y comment an posts, '"
en:'I'Vlktlonary orgfWIkifblog
Fig. 22
Filetype
If you include filetype:suffix in your query, Google will restrict the results to pages
whose names end in suffix. For example, [ cyber security filetype:pdf] will return
Adobe Acrobat PDF files that match the terms "cyber" and "security". You can
restrict the results to pages whose names end with PDF and doe by using the OR
operator, e.g. [cyber security filetype:pdf OR filetype:doc].
77
Internet Technology
Go gle ._113 _
-,...-_.
(POf'! C(
file ~ormat:PDF~Aad:III-Quick VieW eybe. Safety & Security
1IIefllAC_CJIko _1Ilt •••_af_tqii:s •••. _
__ *'_-'.c:)IoeI_illy:AOi!isaf. __ ~-s-,&-
---.~&
lozowskO csWMtongton.edWCyber~<urity.pdf ISsues togweb Q(gi
- - ..
.• More search tools
_CJIko_IIlt.-.:h
eormM PDFMdIIIIeAadlll-
$e<urity·ll~
Quick Vie
18 I'd>211I0_ 101'11r-." lmy.c:)IoeI -lilt
pdf
IIIi!go
T_9oofI'faffJ_
s.", ••
in ••• u.s._---._,8.:Dl!I._
" venzonbU'slfleS$ comI IwPJ3l'Qed:If)J-us·tederaf..gOverl"\n'll!'nt-rrom~cybe,·
•••••• /"'~ N'\ Yf"IMf
Fig. 23
Info
. The query info:URL will present some information about the corresponding web
page. For instance, [info.www.ignou.ac.in] will show information about the IGNOU
website home page. This functionality can also be obtained by typing the web
page URL directly into a Google search box.
G 1_
IGNOU - The People's University
OIlers Iis&ante edooIIion degree progr;IITlS in ads, :sdente, commette, soda!
and IinbIniIIion 1edIrIoto!JI. Conbiiris -as and ••Ib••••••••••
abcd_
Ignou ac 1nl
""¥IV¥'
GoogIe can show you the foIoNng ilo III300n for this lR..:
Fig. 24
Link
The query link: URL shows pages that point to that URL. For example, to find
pages that point to ignou's home page, enter:[link:www.ignou.ac.in]
..•...• --..-~ h d
~
1RP'1r:lVlilM!lni_ •• IID~~~~lI1n;J\\III!r~ljIIiWwtJl ~
1D"'~d M_~IID~iII_
ww'" pcf6.neVpages!pre'post-lours.phpC.ch~d
78 Fig. 25
Movie Advanced Searching Techniques
If you include movie: in your query, Google will find movie-related information.
For examples, movie:3 idiots will return the pages related to the movie. .
•••••••
Videos
~-
News Videos for movie -3 idiots
- -_.....=;,_.
.• More lldio!a - ExcMiyt hW:!lq
ofttyemoyie 1 Idiot!
5tM-~~~ t fII.'n-I(t.kv\2\.110
••. '¥"ods.myspaceC'Oln
.CMngo-
] Idiots - Qlf'QII TraiIe(
~ IM· 30 Oct 2Ol~
•.
l_"'~
youtube corn
Music
if you're looking for music you ean use the operator "music:". Google will try to
find all information about Artists; Albums and Songs.
Go
~ A.R. R~hm~n MP3 Oov;nloads - A.R. R~hm~n Music
News Oov;nloads - A R •••
_ ••••••• <!lnllllPlilllllm-a.i!llBhttllllWiliD~.~1Illi!
Images ~.~~._<lI~¥(.<ilislJD!Iar;slml1llrlJltl"" in:lI
_<lItdlt'a!BWtel;,_
VIdeos ¥fWW.mp3.comJarbstfar-lilhnl.-)n/summal)1 - Carlli'd. - S!m:!a'
.•. More
A. R. RAHMAN . THE OFFICW. WESSITE
• \Sklp IOtro
.."........... lIN 1IlIIe1Jltl~\lM!JIII!:II Sn~<Orlllln:tlliardl'll!lSlIWiIiD
~ IlWillitl!elltl!mJls;iI\pHffmm\llllffilellWilroaws .
• CMnga lotabon ~.<ll"'lllll<lll com! ~'h~d· Sl~)ilar
••••
p&gl!s flom ImUa
•••••••••
Lalest
Fig. 27
Site
If you include site: in your query, Google will restrict your search results to the
site or domain you specify. For example, [admissions site:www.ignou.ac.in] will
show admissions related information from IGNOU's site.
G-_.A.-- l!I1lInni~sbe.~~iirn
-- --- -~- ..
Fig. 28
Weather
If you enter a query with the word weather and a city or location name, if Google
recognizes the location, the forecast will appear at the top of the results page. 79
Internet Technology Otherwise, your results will usually include links to sites with the weather conditions
and forecast for that location.
For example, [weather New Delhi] will return the weather for New Delhi.
G weather:delhi
ilbo", 7 .840,000 resu~s (0.10 seconds)
Search
Fig. 29
Numrange
The ""operator
80 Fig. 30
3.5.2 Google Advanced Search Page Options Advanced Searching Techniques
The Advanced Search option on Google offers users several options to obtain
specific and focused search results. Here's how this feature can be used. With
Advanced Search, you can search only for pages that. ..
j-------_ ----- -
I
IL '(L "'" <
Fig. 31 81
Internet Technology 1) Go to the Advanced Search Page
From Google's main search page, click the Advanced Search link to the right of
the main search text box at the top of the page. You are sent to the Google Advanced
Search page.
The top part of the page, highlighted in blue, enables you to type search terms and
to combine them in unique ways. Keep in mind that you can combine several of
these options. For example, you can search for pages that have the exact phrase
rhubarb patch but that do not have the word Barber on them. Here are your choices:
• The with all of the words option means that Google returns results in which
pages contain all your search terms. If a page is missing just one of the terms,
it won't be included in the search results.
• The with the exact phrase option means that Google returns results in which
pages contain the exact phrase it's the same as putting quotation marks around
the words in your search phrase.
• The with at least one of the words option means that Google returns pages
that contain any of your search terms. This is the default Google search method.
• The without the words option is meant to be used in combination with one of
the previous search options as a way to narrow a search. When you use this
option, Google excludes any pages that contain the search terms you type on
this line.
• The Language option enables you to narrow the results returned to pages that
are primarily written in a single language. Click the drop-down box to make
your choice of language. There are dozens of languages from which you can
choose. The default search language is any language.
• The File Format option enables you to search for files, rather than web pages.
So if you know that a particular piece of information is in a specific file
format, use the File Format option to make it easier to find the file. You can
search for files in half a dozen formats: Adobe Acrobat (.pdf), Adobe Postscript
(.ps), Microsoft Word (.doc), Microsoft Excel (.xls), Microsoft PowerPoint
(.ppt), and Rich Text Format (.rtf). You can also tell Google to have your
results exclude the selected file formats by choosing Don't from the drop-
down list just to the right of File Format.
e The Date option enables you to specify web pages that have been updated in
a specific time period: in the past three months, the past six months, or the
past year. You can also leave this option set to the Google default of any time.
Make your choice from the drop-down list.
The next set of choices on the Advanced Search page allow you to narrow your
search in these ways:
• The Domain option enables you to search through only a specific domain or
domains, such as www.ignou.com. To search multiple domains, separate the
URLs by commas. You can also exclude domains from your search by selecting
Don't from the drop-down box to the right of Domain.
82
• The Usage Rights option enables you to search through pages or material that Advanced Searching Techniques
is bound or not bound by specific usage rights (that is, by the way in which
the information can be used). The default is not filtered by license, which
means that Google searches for any material. From the drop-down list, you
can make a wide range of choices, from free to use or share, up to free to use,
share or modify, even commercially. The SafeSearch option enables you to
filter searches so they do not contain sexually explicit or inappropriate material.
The Page-Specific Search section of the Advanced Search page enables you to do
two types of searches:
• Similar enables you to find pages similar to a page you've already found.
6) Do Topic-Specific Searches
The final section of the Advanced Search page enables you to search through
topic-specific pages (such as "pages related to Microsoft or Apple Macintosh) or
through scholarly pages. When you click any of the topic-specific searches, you
are sent to a new Google page (Google determines which page has the most relevant,
information). Type your search term on that page, and you'll do a topic-specific
search.
b) Compare your answer with the one given at the end of the Unit.
.............................................................................................................................
e,
3) What does the Google search engine return when you use 'Cache' Operator?
Explain. ".'
..... , ., .
83
Internet Technology 4) Differentiate between the operator's allinURL and allintitle
Since then the web has exploded and digital images have become commonplace -
the internet is now full of millions of digital images easily accessible to search
engines. Google, being the leader in search technology, has created a resource to
specifically search for images only called Google Advanced Image Search. Google
Advanced Image Search is both powerful and easy to use.
[ - ~ __ ------~
----1 ~SeNd! Images 1_1"'-_
"'''I'ttlf!l'!
IR>itJo
9thtlSll
1!J1~'"
lliml!lit"aI¥lIrQ1
A"uypntlhl$
,,
IFUihOllIm
!&IaDJkandl .•..tn1lt
• 0 ••
.00 •• .....l
"'~-
~all
.•.'" " ~,
'Sow'!;
wt.t••
Fig. 32
"'~tothewords
RetIJm images theecortain o en{ COOlet't 0 news cortefll 0 faces
o pOO!ocortert :) c~p art 0 ~ne drawings
stze RetIJm images that are
-- ---
IV1{ slze
ExKtetu RetIJm images exacltfthe sJze U<ftlt HeIght iY",r!'''&.:;':,,,,,,,=,,,
~.
Aapeet 111IIo
Colontion
RetIJm Images With an aspect ratio !het Is
RetIJm rrit image files fu!matted as
ReIum rrit lmeges in
~1!elyE! -
~--- .--
any c%rs_ _
00mIIIn ReIIm lmeges from IIIe site or oomein
UNgtRIgtD Ret\IrIl images tliat ere
Safes..ch o No fikeli 0 Use moderate fileli
Fig. 33
• Find results related to all of the words: simply type keywords in here and
press search. You will get results related to all the keywords you searched.
This should be used for general searches only.
Go .;gle Soarcll
...-..•.
G-~
filA'; Go gte
~
~ Go le C'sI
Vn"slr
~-
..."" •...
k ••• _1t<
E.ac1ly
-.
F""
Clip •••
-.,y-
""'-
F!AJcofol
Co gie.lO!l4
-~-
~""'-
• D•••
•00 •• .... ~-:-:
Fig. 34
• Find results related to the exact phrase: for more exact results, type the
•
keywords in here and you will get results related to the exact phrase you
are looking for. Those results should be more satisfying than the one
provided with the general search.
• Find results related to any of the words: if you want to find pictures
related to a couple of words but not to all of them, just use this option.
Could be used for specific term searches, where there might not be many
pictures, so it could be useful to add a couple of synonyms in the pot.
• Find results not related to the words: although this field might seem useless,
it can come in handy when you're searching for a keyword with several
meanings: you can restrict the search to what you want by providing
synonyms to the other meanings of the keyword in this field.
Fig. 35
• For example, I went to Google Image Search and did a search for
"Google". It pulled up a variety of images (example above) that involved
Google, as expected. To get the faces, set content type = face. The result
was a page full of Google faces
••, Everything
_1"nLt IiWllibdlaaarntltm;~do2d!e4gQQgll!
.•. More
/,l'hWMl:w
large
Medium
Icon
larger than
EKaclly
ArIylype
"'-
Photo
Clip art
line draWIng
';'Iwon:llut
Fullcolol
Black andW'hile
.!!:IDII •
•00 ••
5mJ"HlI,If'.vM
Show sizes
Reset tools
Fig. 36
• Size: return images according to their size that you can select from the
drop-down list: extra large, large, medium, small, any size etc.
• Filetypes: you can choose from this drop-list the format of your results,
between BMP, JPG, GIF and PNG.
FiJ.ety pes Return only irnEl~ fil€s forrnEltt-ed EIS
JPG fifes
GIF fifeS
PNG fifeS
BMP il-es
Fig. 37
• Domain: an option useful for webmasters or for the ones trying to find
only the pictures from a specific domain. All you have to do is type that
domain in this field.
/
AltaVist21 India Advanced Searching Techniques
Advanced Search
SettinQs
Fig. 38
The Advanced Search page also requires that the most important keyword appear
in the "Sort by" search box in order to return the most relevant results at the top of
the list.
·D? aJtavista-
Advanced Web Search
------~----~----------~~----------------------
Build OIlquel)' witll. ..
Location o by domain _. _
OByURl ~
----
__
Fig. 39
Asic Search Tips
• Use NOT to indicate that your chosen word must NOT be included.
• Use NEAR between words which must be within la words of each other.
• Use parentheses around a phrase or group of words that must NOT be found
together. 87
/
Internet Technology Near
Alta Vista offers a number of powerful search features not found elsewhere. One
very effective tool available on the Advanced Search page is the NEAR search. A
NEAR search limits results to pages where keywords appear within 10 words of
each other. This can be extremely helpful in situations where an AND search
produces too many results and a phrase search (" ") produces too few results.
Translation
)
Whenever your search results list a relevant resource in another language, check
out Alta Vista's translation feature. With this service, French, German, Italian,
Spanish, and Portuguese web sites are translated to English (and vice versa).
To use this capability, enter your keywords and click the Search button at either
the Simple or Advanced Search page. When the search results appear, click the
Translate link at the bottom of the result of interest.
,Specialty Searches
Alta Vista offers several specialty search engines including an image finder, an .
MP3/audio finder, a video finder, and a people finder. The image search tool can
be especially handy for locating clipart, graphics, or other image files.
W
altavista"
Image Search
Fig. 40
b) Compare your answer with the one given at the end of the Unit.
. , , .
2) List out various "File Types" that can be searched using Google.
88
/
'3) Explain the advantages of using NEAR operator in AltaVista. Advanced Searching Techniques
TIP 1: Choose the Right Search Tool or Technique: Besides various search
engines for searching the information on the Internet you can use subject directories
to acquaint yourself with the field and select the most appropriate information
resources.
TIP 2: Use Boolean Operators: To narrow your search use Boolean operators
.They restricts your search results by telling the search engine to return only Web
pages that satisfy the given condition.
TIP 3: Use Advanced Search Operators: The major search engines, offer
advanced search operators that let you really zero in what you are looking for on
the Internet.
TIP 4: Don't Stick to One Search Engine: Although Google is by far and away
the most popular search engine, no single search engine, not even Google, can
cover even a fraction of the entire Internet. To perform a more comprehensive
search of the Internet and, hence, increase your odds of finding additional useful
information about a topic, be sure to use these other general purpose search engines:
AllTheWeb, AltaVista, Hotbot, Yahoo! Etc.
TIP 5: Use Met search Engines: Since each search engine covers different portions
of the Internet at different times, to perform a thorough search of the Internet, you
should query as many search engines as possible. However, going to each search
engine and repeatedly entering the same search query is both time consuming and
tedious. Meta search engines let you enter your query just once and then query
multiple search engines simultaneously, returning a compilation of search results
from all the search engines queried. Some of the more powerful met,a search engines
include: dog pile, metacrawler, Vivisimo etc.
TIP 6: Use Subject Directories: Subject directories provide the ability to quickly
get a birds-eye-view of a topic, and then drill down to find detailed or "finer-
grained" information about the topic. Unlike search engines, which index millions
of Web pages and typically present you with an overwhelming number of search
results, subject directories offer a limited and neatly categorized set of topics,
typically sorted alphabetically for easy reference and browsing. A few of the most
popular broad-coverage subject directories include: Digital Librarian, Directory
Resources, Google Directory, Librarians' Internet Index, Open Directory Project,
WWW Virtual Library etc.
TIP 7: Use Deep Web: The invisible or deep Web is the vast reservoir of
information stored in databases and sometimes dynamically generated only upon
request, making it inaccessible to search engines, subject directories, and even
intuitive searches. It is difficult to measure the precise size of the deep Web.
TIP 8: Use Social Search: Social search uses the power of the community
participation and judgment to locate information of general interest and answer 89
/
Internet Technology specific questions. Social search works well for finding subjective content through
informed opinions. Common social search platforms include blogs, microblogs
(Twitter), social networks (Facebook. LinkedIn), question-and-answer (Q&A) sites
(Answerbag.com, allexperts.com, WikiAnswers).
• Results.
2) ii)
3) A Meta-Search engine is a search tool that sends user requests to several other
search engines and/or databasesand aggregates the results into a single list or
displays them according to their source. Metasearch engines enable users to
enter search criteria once and access several search engines simultaneously.
On the other hand, a subject directory is a catalog of sites collected and
organized by humans. Subject directories are often called subject "trees"
because they start with a few main categories and then branch out into
subcategories, topics, and subtopics. They allow you to browse Internet
resources by different subject categories and enable you to search by keywords
within the contents of the directories
4) iii)
5) i) -B
ii) -A
iii) -E
iv) -C
.'~) -D
Check Your Progress 2
1) When you enter your search term in Google search box and clicking on "I'm
Feeling Lucky" button will automatically take you straight to the top-ranking
90
/
result returned for your query. "I'm Feeling Lucky" means you will be get to Advanced Searching Techniques
see the first web page returned for your query without other choices. For
example if you type "apple" into the search box and press I'm Feeling Lucky,
you'll go directly to Apple Computer's Web site.
2) The two option are available for Page specific tool in Google Advanced search:
Similar and link. Similar will list pages that Google feels are similar to the
page you enter. Link will list pages that link to the page you enter.
3) Google takes a snapshot of each page it examines and caches (stores) that
version as a back-up. The cached version is what Google uses to judge if a
page is a good match for your query. Practically every search result includes a
Cached link. Clicking on that link takes you to the Google cached version of
that web page, instead of the current version of the page. This "isuseful if the
original page is unavailable because of Internet congestion or when the owner
recently removed the page from the Web.
4) The title of a webpage is usually displayed at the top of the browser window
and in the first line of Google's search results for a page. The author of a
website specifies the title of a page with the HTML TITLE element. If you
start your query with allintitle:, Google restricts results to those containing all
the query terms you specify in the title. The Uniform Resource Locator, more
commonly known as URL, is the address that specifies the location of a file
on the Internet. If you start your query with allinurl:, Google restricts results
to those containing all the query terms you specify in the URL.
1) Google image search is one of the most powerful tools to find an image on
the Internet. Content types Option returns images according to their content.
• Any Content: Results will include images with any type of content.
• Faces: Results will only include images with a face as the focal point.
• Photo Content: Results will only include images that are actual photos.
• Clip Art: Results will only include images that are clip art and exclude
actual photos.
• Line Drawings: Results will only include images of line art like those
used with pen or penciL
2) When you use the filetype: operator in a Google search (for example,
filetype:.xml, Google searches for files with the .xml extension, not for files
of file type XML.Limiting your search to a specific file type will return pages
with that file extension, and may return fewer relevant results. Supported file
types for Google Search include: PDF, PS, TXT, PPT, DOC, XLS, SWF
(Shockwave Flash), RTF etc.
3) When two terms or phrases are linked with the NEAR operator, only documents
where the terms appear within 10 words of one another will be retrieved,
thereby indicating a higher probability of a conceptual link. This gives the
NEAR operator considerably greater power in focusing in on a topic. NEAR
is a restrictive AND. For example, the search string software NEAR
programmer returns ONLY those documents that have software and programmer
within 10 words of each other. 91
Internet Technology
3.11 SUGGESTED READINGS
• www.googleguide.com
• .www.learnwebskills.com/search/engines.html
• www.searchengineguide.com/searchengines.html
92
Latest Trend in Internet
UNIT 4 LATEST TREND IN Securities
INTERNET SECURITIES
Structure
4.0 Introduction
4.1 Objectives
4.2 Web 2.0 Applications
4.2.1 Web 2.0 Domains
4.2.2 Web 2.0 Principles
4.2.3 Web 2.0 Characteristics
4.3 Web 2.0 Concepts'
4.3.1 AJAX (Asynchronous JavaScript and XML)
4.3.2 Rich Internet Applications
4.3.3 SOAP (Simple Object Access Protocol)
4.3.4 REST (Representational State Transfer)
4.4 Web 2.0 Technologies
4.4.1 RSS
4.4.2 Blog
4.4.3 Mashups
4.4.4 PodCast
4.4.5 Social Bookmarking
4.4.6 Social Networking
4.4.7 Tags
4.4.8 Folksonornies
4.4.9 Wiki
4.5 Web Security Threats
4.6 Let Us Sum Up
4.7 Check Your Progress: The Key
4.8 Suggested Readings
4.0 INTRODUCTION
Web 2.0 is the use of World Wide Web technology and web design that aims to
facilitate the users to share ideas, opinions, reflections and contents. Web2.0 is
about making global information available to local social contexts and giving people
the flexibility to find, organize, share and create information in a locally meaningful
fashion that is globally accessible. Web2.0 is defined as a framework of a web of
connections where the content is generated by the user. Web 1.0 pushed information
out to the user from a single source. Web 2.0 allows the user to become an active
participant in knowledge generation. Web2.0 technology enables interaction through
the use of wikis, blogs, social networks and RSS feeds that facilitate knowledge
sharing. Web 2.0 allows users to communicate with the data stored on servers and
is typically performed via forms in a Hypertext Markup Language (HTML) page,
a scripting language sucii as JavaScript, or through Flash, Silverlight or Java
applications. These methods use the client's computer to reduce server workloads
and increase the responsiveness of the application. This unit discuss about various
applications of web 2.0, its characteristics and related technologies.
93
Internet Technology
4.1 OBJECTIVES
After studying this unit, you should be able to:
Web 2.0 includes the following types of web sites and web applications:
Blogs (short for 'web logs') are online journals or diaries hosted on a website and
often distributed to other sites or readers using RSS (see below). They tend to be
treated differently depending on the target audience. Their emphasis is usually
"personal", with the audience makeup generally being to a group of users already
known to the content editor.
Microblogging sites These are similar to blogs, except that posts are intended to
be as condensed as possible. The most prominent of these services is arguably
Twitter (http://twitter.comJ), where users are encouraged to answer the question
"What are you doing?", in 160 characters or less (i.e. the length of an SMS text
message - one means of posting to the service).
Collective intelligence refers. to any system that attempts to tap the expertise of a
group rather than an individual to make decisions. Technologies that contribute to
collective intelligence include collaborative publishing and common databases for
sharing knowledge.
•
Mash-ups are aggregations of content and functionalities from different online
sources/applications to create a new service, i.e mashing- up existing technologies
for an entirely new purpose. For example, www.WikiMapia.org takes the functions
of a wiki and overlays it with Google Maps for an entirely new kind of map.
Similarly, Google Maps can also process RSS feeds from photo-sharing sites which
can include positioning data where available (e.g. Flickr), to show photos and the
locations where they were taken.
Aggregators and social bookmarking sites are sites or programs that gather data
from multiple sources (such as RSS feeds) and organise the information to present
in a new, more streamlined or appropriate format.
Social networking refers to systems that allow members of a specific site to learn
about other members' skills, talents, knowledge, or preferences. Commercial
examples include www.Facebook.coin and www.Linkedln.com. Some companies
use these systems internally to help identify experts. Other examples include
www.MySpace.com and www.bebo.com.
Web applications online programs that can do virtually everything other existing
software programs can do - www.zoho.com, for instance, can replace Microsoft
Office programs, as can Google Does (http://docs.google.coml).
Web services are software systems that make it easier for different systems to
communicate with one another automatically in order to pass information or conduct
transactions. For example, a retailer and supplier might use web services to
communicate over the internet and automatically update each other's inventory
systems.
Wikis are systems for collaborative publishing, allowing many authors to contribute
to an online document or discussion. The most obvious example is
ww. Wikipedia.org.
Science 2.0 uses the technologies of web 2.0 to conversations between researchers,
let them discuss 'the data and connect it with other data that might be relevant.
Blogs, wikis and such permit users to make information available in ways that
create a conversation. Web 2.0 permits scientists to create digitized conversations
that provide context for the data.
Health 2.0 is the use of a specific set of Web tools (blogs, Podcasts, tagging,
search, wikis, etc) by actors in health care including doctors, patients, and scientists,
using principles of open source and generation of content by users, and the power
95
Internet Technology of networks in order to personalize health care, collaborate, and promote health
education.
Business Intelligence 2.0 (BI 2.0) is a term that refers to new tools and software
for business intelligence, beginning in the mid-2000s, that enable, among other
things, dynamic querying of real-time corporate data by employees, and a more
web- and browser-based approached to such data, as opposed to the proprietary
querying tools that had characterized previous business intelligence software.
Open web The entire space of the World Wide Web open to anyone to access and
participate. This has been the initial domain in which Web 2.0 technologies,
applications, and attitudes have developed.
Enterprise Inside the firewalls of organizations and their business partners. The
power of Web 2.0 technologies, originally developed on the open web, are now
being applied within enterprises to enhance performance and achieve business
outcomes. This domain is sometimes termed Enterprise 2.0.
Another powerful principle of Web 2.0 is the permission it gives for the construction
of applications that are virtual. When this virtual application is constructed, data
and functions can be pulled from a variety of different sources. In most cases,
these applications will be small, and they can be deployed quickly within a short
period of time. Currently, this function is only made available to a select few
corporations. Once Web 2.0 is introduced, this power will be given to individuals.
Another principle that has often been connected to Web 2.0 is its ability to be
participative. Historically, the Internet has been similar to traditional media in the
•
sense that those who used it generally viewed information. Rather than participating
in the online world as they surfed, they were mere spectators. The content basically
flowed from the person who provided to those who wanted to view it.
The ability for viewers to be involved in the application is one of the most important
aspects of Web 2.0. One of the most important things that separate Web 2.0 from
1.0 is the fact that content can be generated to meet the needs of the individual
user. The traditional Internet has been a place where viewers were forced to view
what the provider wanted them to view. With Web 2.0, they can view what they
want. One term that is often used to describe Web 2.0 is modularity. This term is
used to describe the ability of developers and users to pick from a variety of
components to construct something that suits their needs.
The Web 2.0 applications can be used to build more applications. The developers
responsible for the construction of Web 2.0 have stated that they are placing an
emphasis on sharing. Sharing can include ideas, content, or even code. At the
same time, business people should not take this to mean that they can't make
96 money. To be profItable on Web 2.0, businesses must become more skilled at adding
value that is beyond the existing infrastructure. The most important aspect of this Latest Trend in Internet
new system will be communication, and those who wish to succeed must understand Securities
the importance that communication plays on the web.
Standards provide an essential platform for Web 2.0. Common interfaces for
accessing content and applications are the glue that allows integration across the
many elements of the emergent web.
Openness The world of Web 2.0 has only become possible through a spirit of
openness whereby developers and companies provide open, transparent access to
their applications and content.
Modularity Web 2.0 is the antithesis of the monolithic. It emerges from many,
many components or modules that are designed to link and integrate with others,
together building a whole that is greater than the sum of its parts.
User Control A primary direction of Web 2.0 is for users to control the content
they create, the data captured about their web activities, and their identity. This
powerful trend is driven by the clear desires of participants.
Identity is a critical element of both Web 2.0 and the future direction of the internet.
We can increasingly choose to represent our identities however we please, across
interactions, virtual worlds, and social networks. We can also own and verify our
real identities in transactions if we choose.
Network as platform: Rather than having to install software locally, Web 2.0
services allow applications to be hosted on the network.
Tagging: Rather than having to rely on use of formal classification systems (which
may not be meaningful to many users) tags can be created by users. The tags,
which may also be meaningful to their peers, provide communal ways of accessing
Web resources.
Embedding: Many examples of Web 2.0 services allow the content to be embedded
in third party Web sites, blogs, etc 97
Internet Technology Check Your Progress 1
Note: a) Space is given below for writing your answer.
b) Compare your answer with the one given at the end of the Unit.
..............................................................................................................................
Since data can be sent and retrieved without requiring the user to reload an entire
Web page, small amounts of data can be transferred as and when required.
Moreover, page elements can be dynamically refreshed at any level of granularity
to reflect this. An AJAX application performs in a similar way to local applications
residing on a user's machine, resulting in a user experience that may differ from
traditional Web browsing. Examples of AJAX usage include GMail and Flickr. It
is largely due to these and other prominent sites that AJAX has become popular
only relatively recently - the technology has been available for some time. One
precursor was dynamic HTML (DHTML), which twinned HTML with CSS and
JavaScript but suffered from cross-browser compatibility issues. AJAX is not a
technology, rather, the term refers to a proposed set of methods using a number of
existing technologies. As yet, there is no firm AJAX standard, although the recent
establishment of the Open AJAX Alliance, supported by major industry figures
such as IBM and Google, suggests that one will become available soon.
Although the techniques within AJAX are relatively mature, the overall approach
is still fairly new and there has been criticism of the usability of its applications.
• A Web application can request only the content that needs to be updated, thus
drastically reducing bandwidth usage and load time.
• Use of Ajax can reduce connections to the server, since scripts and style sheets
only have to be requested once.
• Dynamic Web page updates make it difficult for a user to use bookmarks.
• Browser does not support JavaScript or have JavaScript disabled, will not be
able to use its functionality.
Ajax is powerful because it has now allowed many web sites to run applications
that are very similar to those that are commonly used on personal computers. Some 99
\
Internet Technology of these applications include spread sheets and word processing programs. In
addition to this, some web sites are now capable of carrying out project management
functions. A number of operating systems have also appeared that are browser
based.
While these operating systems don't function in the same way as Windows or Mac
OS, they mimic the experience that is commonly found with these products. The
key advantage they have 'over traditional operating systems is that they are more
functional, and they can be run on almost every browser that is available today.
An .;Juvantage of SOAP is that program calls are much more likely to get through
firewall servers that screen out requests other than those for known applications
(through the designated port mechanism). Since HTTP requests are usually allowed
through firewalls, programs using SOAP to communicate can be sure that they can
100 communicate with programs anywhere.
4.3.4 REST (Representational State Transfer) Latest Trend in Internet
Securities
Representational State Transfer (REST) is a style of software architecture for
distributed hypermedia systems such as the World Wide Web. REST strictly refers
to a collection of network architecture principles that outline how resources are
defined and addressed. The term is often used in a looser sense to describe any
simple interface that transmits domain-specific data over HTTP without an
additional messaging layer such as SOAP or session tracking via HTTP cookies.
REST connectors provide a generic interface for accessing and manipulating the
value set of a resource, regardless of how the membership function is defined or
the type of software that is handling the request. URL or URN are the examples of
a resource identifier. REST components perform actions with a resource by using
a 'representation' to capture the current or intended state of that resource and
transferring that representation between components. A representation is a sequence
of bytes, plus 'representation metadata' to describe those bytes. Other commonly
used but less precise names for a representation include: document, file, and HTTP
message entity, instance, or variant. A representation consists of data, metadata
describing the data, and, on occasion, metadata to describe the metadata (usually
for the purpose of verifying message integrity). Metadata are in the form of name-
value pairs, where the name corresponds to a standard that defines the value's
structure and semantics. The data format of a representation is known as a media
type.
REST Connectors
The primary connector types are client and server. The essential difference between
the two is that a client initiates communication by making a, request, whereas a 101
I
Internet Technology server listens for connections and responds to requests in order to supply access to
its services. A component may include both client and server connectors.
b) Compare your answer with the one given at the end of the Unit.
..............................................................................................................................
RSS works by having the web site author maintain a list of notifications on their
web site in a standard way. This list of notifications is called an "RSS Feed".
People who are interested in finding out the latest headlines or changes can check
this list. Special computer programs called "RSS aggregators" have been
developed that automatically access the RSS feeds of websites you care about on
your behalf and organize the results for you. (RSS feeds and aggregators are also
sometimes called "RSS Channels" and "RSS Readers".) Producing an RSS feed
is very simple and hundreds of thousands of websites now provide this feature,
including major news organizations like the New York Times, the BBC, and Reuters,
as well as many weblogs.
Think of an RSS aggregator as just a web browser for RSS content. RSS aggregators
automatically check a series of RSS feeds for new items on an ongoing basis,
making it is possible to keep track of changes to multiple web sites without needing
to tediously read and re-read each of the websites yourself. They detect the additions
. and present them all together to you in a compact and useful manner. If the title
and description of an item are of interest, the link can be used to quickly bring the
related web page up for reading. There are many RSS aggregators available. Some
are accessed through a browser, some are integrated into email programs, and
some run as a standalone application on your personal computer.
It is getting more and more common for websites to have RSS feeds. They usually
indicate the existence of the feed on the home page or main news page with a link
to "RSS", or sometimes by displaying an orange button with the letters "XML" or
"RSS". RSS feeds are also often found via a "Syndicate this" link. Text "RSS"
links sometimes (there are lots of variations) point to a web page explaining the
nature of the RSS feeds provided and how to find them. The buttons are often
linked directly' to the RSS feed file itself. Once you know the URL of an RSS
feed, you can provide that address to an RSS aggregator program and have the 103
1
Internet Technology aggregator monitor the feed for you. Many RSS aggregators come preconfigured
with a list to choose from of RSS feed URLs for popular news websites.
RSS is defined in Wikipedia as "a family of Web feed formats used to publish
frequently updated works-such as blog entries, news headlines, audio and video-in
a standardized format" . RSS and the related Atom standard can be used to provide
alerts and syndication of content. These lightweight standards play an important
role in a Web 2.0 environment in allowing content to be easily reused.
RSS and Aton. are widely used by popular Web 2.0 services, allowing the content
provided by the services to be viewed without the user having to visit the service.
Examples include:
In addition to notifying you about news headlines and changes to websites, RSS
can be used for many other purposes. There does not even have to be a web page
associated with the items listed -- sometimes all the information you need may be
in the titles and descriptions themselves.
One RSS aggregator is all that you need to read all of the RSS feeds, be they
headlines, alerts, changes, or other notifications. RSS is shaping up to be a very
popular and useful means for communicating.
Newsreader
A newsreader gathers the news from multiple blogs or news sites via RSS (see
below), allowing readers to access all their news from a single web site or program.
Online newsreaders (like Bloglines, Pluck, or Newsgator) are web sites that let
you read RSS feeds from within your web browser. Desktop newsreaders download
the news to your computer, and let you read your news inside a dedicated software
program.
4.4.2 Blog
A weblog or blog (a derivative of "web" and "log") is essentially an online diary,
where anyone with a basic knowledge of computers can post anything - random
104
. thoughts, photos, homework, and poetry, just to name a few - for the rest of the Latest Trend in Internet
world to see. A blog is just a web page that contains entries in reverse chronological Securities
order, with the most recent entry on top. In addition to the classic text blog, we
now have photo blogs (consisting of up loaded photos), audio blogs (a.k.a.
"podcasts") and video blogs (which consist of regularly uploaded video files).
Blogs range in scope from individual diaries to political campaigns, media programs,
and businesses. They range in scale from the writings of one occasional author
(known as a blogger), to the collaboration of a large community of writers. Many
blogs enable visitors to leave public comments, which can lead to a community of
readers centred on the blog. Hence, the totality of weblogs or blog-related websites
is known as a "blogosphere."
" .
S",ndica '0"
Fig. 1
In general, not only do blogs contain several hyperlinks to other web sites and
. stories, there is usually a standing list of links to the author's favorite bookmarks.
Blogging technology gave users a huge variety of templates, an easy-to-navigate
. five-minute registration process, and (perhaps best of all) free web hosting.
Blogroll
A list of recommended sites that appears in the sidebar of a blog. These sites are
typically sites that are either on similar topics, sites that the blogger reads regularly,
or sites that belong to the blogger's friends or colleagues.
Moblogging
Short for mobile blogging, moblogging refers to posting blog updates from a cell
phone, camera phone or pda (personal digital assistant). Mobloggers may update
their web sites more frequently than other bloggers, because they don't have to be
at their computers in order to post.
Types of Blogs
This section samples just a small flavour of what is out there in the blogosphere.
Political Blogs: When discussed in the news, the term blog is often understood to
refer to a "political blog." Political blogs may take a number of forms. Often an
individual will link to articles from news web sites and post their own comments
as well. Others focus on long essays about current political topics. Most news,
activism, and issue-based blogs follow the same format. In fact, a recent trend in
politics is that candidates are incorporating blogging into their own campaigns,
tying blogs into the world of politics.
105
Internet Technology Personal Blogs: The term personal blogs is often used to describe an online diary
or journal, such as Xanga. The weblog format of an online diary makes it possible
for users without much experience to create, format, and' post entries with ease.
People often write their day-to-day experiences, complaints, poems, prose, illicit
thoughts and more, allowing others to contribute.
Topical Blogs: Topical blogs focus on very particular niche. An example is Google
Blog, which covers nothing but news about Google. Another example is a soldier
blog, also known as a military blog, or "milblog." Many blogs now allow categories,
which means a general blog can be reshuffled to become a topical blog at the
user's need.
Health Blogs: Blogs written as personal accounts of living with a specific health
issue, sharing information about the experience with others who have an interest
in that health issue and providing mutual support. A major category of health blogs
are medical blogs, which themselves generally fall into two categories. One type
is a blog written by a health care professional about his or her work experiences,
medical news or other personal thoughts. A more recent trend is a blog that deals
with actual patient cases. This latter blog allows other physicians to submit cases
to the web site. Physicians can then offer comments or help with the case.
Legal Blawgs: Blogs by lawyers or law students, which discuss law and legal
affairs, are often referred to as "blawgs." By extension, the creator of such a blog
is a blawger, sometimes spelled blawgger.
Educational Blogs: Students often use blogs as records of their learning while
teachers use them as records of what they taught. For example, a teacher can blog
a course, recording day-by-day what was taught, including links to internet
resources, and specifying what homework students are required to carry out. This
application has many advantages: (1) a student can quickly catch-up if they miss a
class; (2) the teacher can use the blog as a course plan; and (3) the blog serves as
an accurate summary of the course that prospective students or new teachers can
refer to.
106
/
Components of Blog Latest Trend in Internet
Securities
We'll turn now to the various components of an average'blog.
blog spot
Fig. 2
1) Advertising - Many blogs have advertising banners on them. Most often the
money generated by advertising goes to the company providing the blog
software, not the individual blogger.
3) Date - The date of the most recent post. You will notice that previous posts
have been pushed down on the page to fit below the most recent one.
6) Posting Information - Information telling who wrote that particular post and
when it was posted to the blog.
7) Comments - An area for readers of the blog to add their comments. This is an
option some bloggers use and others avoid.
9) Archives - A link to view the archive section which contains older posts.
Though there may be variety from one to another depending on the preferences of
the individual blogger, most blogs have all or most of those components.
4.4.3 Mashups
The term mashup was borrowed from the pop music scene. In the music business,
a mashup describes a new song that is mixed from the vocal and instrumental
lO7
I
Internet Technology tracks from two different songs (usually belonging to different genres). Mashup is
a web service or software tool that combines two or more tools to create a whole
new service. Wikipedia defines a mashup as "a web application that combines
data from more than one source into a single integrated tool". Many popular
examples of mashups use the Google Map service to provide a location display of
data taken from another source.
Technical Concepts
Examples of Mashups
Yahoo Pipes
Fig. 3
Yahoo Pipes is a free online service that allows people without programming
experience to remix popular streams of content types (e.g., Really Simple
Syndication [RSS)) and create data mashups using a visual drag-and-drop editor.
Yahoo Pipes also provides a library of pipes (currently numbering in the thousands)
enabling users to copy, re-use, and modify pipes for their own design. Yahoo
Pipes can provide a more focused set of news feeds than a traditional feed
aggregator offered by sites like My Yahoo. The My Yahoo site allows the user to
select news from a pre-designed set menu, whereas Yahoo Pipes allows the user to
design the specific view with only the data sources and information of interest at
108
the moment regardless of anypre-design by the content owner. Pipes also allows Latest Trend in Internet
the analysis of data feeds that were previously inaccessible due to conditions such Securities
as high volume of data (too much to sift through) or foreign language constraints
(information was not understandable). Another unique attribute of Pipes is the
ability for a Web publisher to include RSS feeds on its pages without the need of
specific pre-configured server-side software.
Flickr
Flickr allows users to search through pictorial databases maintained on Flickr servers
by retrieving pictures marked with meta-tags. Flickr provides a significant mashup
opportunity as it provides an API that enables other programs to access tags, photos,
user names, and contacts Third party developers have written wrappers for the
Flickr API that make it usable within other programming environments such as
Flash, PHP, Python, Java, Perl, and Ruby.
YouThbe
YouTube is a video-sharing site that allows users to upload videos to the YouTube
server and make them "findable'; by others by adding descriptions (tags) to the
videos .. The site contains a wide variety of different video styles such as movie
and TV clips, music videos, video-blogging, etc. Users can post videos in a number
of different formats: WMV, AVI, MOV and MPEG. The YouTube site translates
the file into the Flash Video (FLV) format. This format is very useful because of
its compatibility with most web browsers which enables users to provide a link to
a video or embed it within another web page because each video is accompanied
by the full HTML markup. This allows the video to autoplay within the web
browser.
The strength of Podcasting is the ease of use it provides rather than any radical
new functionality. If, for example, you subscribe to a Podcast provided by the
BBC, new episodes will appear automatically on your chosen device - you will
not have to go to the BBC Web site to see if new files are available and then
download them.
• Asking students to record their own Podcasts on, for example, project reports.
109
Internet Technology • Automated conversion of text files, email messages, RSS feeds, etc. to MP3
format, allowing the content to be accessed on mobile MP3 players.
• Recordings of meetings to provide access for people who could not attend.
Possible Problems
Although there is much interest in the potential for Podcasting, there are potential
problem areas which will need to be considered:
• Although appealing to the publisher, end users may not make use of the
Podcasts.
Creating Podcasts
When creating a Podcast you first need to create your MP3 (or similar) audio file.
Many recording tools are available, such as the open source Audacity software.
You may also wish to make use of audio editing software to edit files, include
sound effects, etc. You will then need to create the RSS file which accompanies
your audio file, enabling users to subscribe to your recording and automate the
download.
It is tagging a website and saving it for later. Instead of saving them to your web
browser, you are saving them to the web. And, because your bookmarks are online,
you can easily share them with friends.
Most social bookmarking sites allow you to browse through the items based on
most popular, recently added, or belonging to a certain category like shopping,
technology, politics, blogging, news, sports, etc.
Social bookmarking and social news allow you to specifically target what you
want to see. Instead of going into a search engine, typing something in, and then
searching for that needle in a haystack, you can quickly narrow down the items to
what you are looking for.
Because many social bookmarking sites display recently added lists and popular
links, you can both stay current and see relevant information.
110
How to get Started Latest Trend in Internet
Securities
The first thing you will need to do to get started with social bookmarking is to
decide on a social bookmarking website. Most social bookmarking sites allow you
to search through the public bookmarks as a guest. The best w~y to find out which
one is right for you is to actually use the site. Search through the bookmarks, see
if the look-and-feel appeals to you, and determine whether or not you find the site
easy to use.
Once you have picked a social bookmarking site, you will want to install a button
onto your browser to make it easy to use. This is usually a quick and painless
operation. The site should provide a tutorial on installing the button either after
you sign up or in their help section. Once you have your account set up and have
the button installed, you are ready to go onto the World Wide Web and start
bookmarking websites. You've got your handy button, so this is an easy process.
Simply go to whatever website you want to bookmark, and click the button.
Most sites will either pop up a small window or take you to their site and ask you
a few questions about the web site you are bookmarking. It should fill out some of
the information for you, like the title and the website address.
The main thing you want to be concerned with is the tag. A tag is a keyword or
phrase used to describe the website. Think of it like the name of a folder. You can
also have multiple tags, which can be very handy.
For example, if you are on a blog about video games, you might tag the blog with
the keywords "games" and "blog". If you are on a blog about football, you might
tag it with "football" and "blog".
In terms of social bookmarking, becoming familiar with other users and adding
them to your friends list can be an invaluable tool in finding web sites that interest
you. Just as a friend might recommend a good book or movie, a social bookmarking
friend can lead you to good websites. So, how do you go about it? By searching
through the public bookmarks. As you find interesting websites -nake note of the
user who added the bookmark to the site. You can view their profile, and browse
•
through other bookmarks they have added. If their interests are aligned with yours,
and you like the sites they have bookmarked, add them as a friend.
Profile: This is where you tell the world about yourself. Profiles contain basic
information, like where you live and how old you are, and personality questions,
like who's your favorite actor and what's your favorite book. Social networks
dedicated to a special theme like music or movies might ask questions related to
that theme .. 111
I
Internet Technology Friends: Friends are trusted members of the site that are allowed to post comments
on your profile or send you private messages. You can also keep tabs on how your
friends are using social networking, such as when they post a n~w picture or update
their profile. Friends are the heart and soul of social networking. It should be
noted that not all social networks refer to them as 'friends' - LinkedIn refers to
them as 'connections - but all social networks have a way to designate members
as trusted.
Groups: Most social networks use groups to help you find people with similar
interests or engage in discussions on certain topics. They are both a way to connect
with like-minded people and a way to identify your interests. Sometimes, groups
are called by other names, such as the 'networks' on Facebook.
Blogs: Another feature of some social networks is the ability to create your own
blog entries. While not as feature-rich as blog hosts like Wordpress or Blogger,
blogging through a social network is perfect for keeping people informed on what
you are up to.
4.4.7 Tags
Keywords that describe the content of a web site, bookmark, photo or blog post.
You can assign multiple tags to the same online resource, and different people can
assign different tags to the same resource. Tag-enabled web services include social
bookmarking sites (like del.icio.us), photo sharing sites (like Flickr) and blog
tracking sites (like Technorati). Tags provide a useful way of organizing, retrieving
and discovering information.
What is a Tag?
Tags,. which are a form of metadata, allow resources to be more easier found.
Tag Features
• Tags are chosen by the creator and/or by the viewer of the tagged item.
Tag Clouds
Web sites that use tags often display the tags visually as a tag cloud. These usually
112 take the form of an alphabetical list of tags and use font size and/or color to
identify the most frequently used tags. This enables viewers to either pick from Latest Trend in Internet
the alphabetical list or to easily spot the most popular tags. Securities
• The size represents the number of times that tag has been applied to a single
item.
• The size represents the number of items to which a specific tag has been
applied.
Hash tags (also written as 'hashtags') are used in messages using services such as
Twitter. The hash symbol (#) is placed before the word to be treated as a tag, as in
the example below.
Adding Tags
Systems vary in how you enter tags. When a single text box is provided and you
want to enter more than one tag, you will need to use a separator between the tags.
The most popular separator is the space character but some systems use other
separators; e.g. quotation marks. Other systems only allow one tag to be entered at
a time; in these cases you will have to repeat the process to add further tags.
'Official' Tags
Events and conferences increasingly are creating 'official' tags. These tags can
then be used by participants for blog posts, photos of the event, presentation slides
and other supporting materials and resources. This use of a consistent tag maximizes
the effectiveness of searching for resources relating to specific events
4.4.8 Folksonomies
A folksonomy is a decentralised, social approach to creating metadata for digital
resources. It is usually created by a group of individuals, typically the resource
users, who add natural language tags to online items, such as images, videos,
bookmarks and text. These tags are then shared and sometimes refined.
Folksonomies can be divided into broad folksonomies, when lots of users tag one
object, and narrow folksonomies, when a small number of users tag individual
items. This new social approach to creating online metadata has sparked much
discussion in the cataloguing world. Note that despite its name a folksonomy is
not taxonomy. Taxonomy is the process, within subject-based classification, of
arranging the terms given in a controlled vocabulary into a hierarchy. Folksonomies
move away from the hierarchical approach to an approach more akin to that taken
by faceted classification or other flat systems.
4.4.9 Wiki
Wiki is a collaboratively edited web page. The best known example is wikipedia,
an encyclopedia that anyone in the world can help to write or update. Wikis are
frequently used to allow people to write a document together, or~o share reference
material that lets colleagues or even members of the public contribute content. 113
Internet Technology What Is A Wiki?
A wiki is a Web site that uses wiki software, allowing the easy creation and editing
of any number of interlinked Web pages, using a simplified markup language or a
WYSIWYG text editor, within the browser.
• The ability to create and edit content within a Web environment without the
need to download any special software.
• On public Web sites to enable end users to easily contribute information, such
as the Science Museums Object Wiki .
• Wikis can support communities of practice. For example see the Museums
Wiki site, the Blogging Libraries Wiki and the AHA's Archives Wiki .
Wikipedia
Main page
:: ontents
Featured content
Current events • P+. series of homb
,," John lerew~",as;
Random article <,"~cks<mllll5$ Iraq
amoffflm/l':mdIllilat!illltfte> Royal
Donate to Wlkipedla
Australian AJ[ Force (!il'MIF)) ~ill$ r.raretnam m
••. nreracnon dluiiTg;WXQrlIjj'm~II, :mdllat'erral ~et
Help ...mlllTlIJlIIl'alll'ITimtITe> • Mlm!!tlrnm5I!IJ iJlMIPet
International CMI AVI"tlon an!! ltilll!dl im
About "'iklpedla
Community portal Orqanization (11r~ ~ widespre,)(\ tloodin9:mnms;
Fig. 4
Wikis can be public, like this wiki. That means that all content is visible to the
public and that the public may make changes.
Protected wikis may be viewed by the public, but only authorized users may
make any edits or changes.
114
Private wikis are hidden from public view and can only be seen and edited by Latest Trend in Internet
designated users. Securities
b) Compare your answer with the one given at the end of the Unit.
115
I
Internet Technology
4.5 WEB SECURITY THREATS
Most Web sites today add dynamic content to a Web page making the experience
for the user more enjoyable. Dynamic content is content generated by some server
process, which when delivered can behave and display differently to the user
depending upon their settings and needs. Dynamic Web sites have a threat that
static Web sites don't, called "cross-site scripting," also known as "XSS".
• Identity theft
Web site developers can protect their sites from being abused in conjunction with
116 these attacks by ensuring that dynamically generated pages do not contained
/
undesired tags. From the Web user's perspective, two options exist to reduce the Latest Trend in Internet
risk of being attacked through this vulnerability. The first -- disabling scripting Securities
languages in the Web browser as well as the HTML-enabled e-mail client --
provides the most protection but has the side effect of disabling functionality. The
second -- only following links from the main Web site for view uig -- will
significantly reduce a user's exposure while still maintaining functionality.
However, none of the solutions that Web users can take are complete solutions. In
the end, it is up to Web page developers to modify their pages to eliminate these
types of problems. This can be accomplished by properly filtering and validating
the input received and properly encoding or filtering the output returned to the
user.
XSRF flaws exist in web applications with a predictable action structure and which
use cookies, browser authentication or client side certificates to authenticate users.
The basic idea of XSRF is simple; an attacker tricks the user into performing an
action of the attackers choosing by directing the victim's actions on the target
application with a link or other content. This is easiest to understand in the example
of a HTTP GET.
The most popular ways to execute CSRF attacks is by using a HTML image tag,
or JavaScript image object. Typically an attacker will embed these into an email
or website so when the user loads the page or email; they perform a web request
to any URL of the attackers liking. Below is a list of the common ways that an
attacker may try sending a request.
HTML Methods
IMG SRC
<img src=''http://hostl?command'>
SCRIPT SRC
<script src=''http://hostl?command''>
IFRAME SRC
<iframe src=''http://hostl?command''>
When the web application formulates an Action (by generating a link or form that
causes an Action when submitted or clicked by the user) the application includes 117
Internet Technology as a query parameter (usually as an "Input" tag of type "hidden") a name value
pair with a name like: XSRFPreventionToken, and a value that is an
HMAC_shal(Action_Name + Secret, SessionID).
When an action is performed by the user, before the action is executed the
XSRFPreventionToken has it's value verified by comparing the value of the
provided token to a calculation of HMAC_shal_(Reqested_action_name + Secret,
User Sessionlfr). If the values do not match, then the Action Formulator is not the
application, the Action should be aborted and the event can be logged as a potential
security incident.
Note the action name should be different for each action, although the "Secret"
can remain constant. From time to time XSRFPreventionTokens may leak out from
the application, for example an application that doesn't use SSL will result in
XSRFPreventionTokens being sent to other sites in the referer field when users
click on links to those sites. By keeping action_names unique the application
minimizes the impact on the application of a potentially hostile third party learning
an XSRFPreventionToken (the attacker could now formulate only the actions with
the same name as that which referred the victim to the attacker's site). Using SSL
is almost always necessary for secure web applications.
3) A podcast is a series of digital media files (either audio or video) that are
released episodically and often downloaded through web syndication. Podcasts
enable students and teachers to share information with anyone any time. If a
student is absent, he or she can download the podcast of the recorded lesson.
Teachers may also create podcasts to be used as a preparation tool for students.
This would be pedagogic ally equivalent to having students read a text before
a lesson. It can be a tool for teachers or administrators to communicate
curriculum, assignments and other information with parents and the community.
Teachers can record book talks, vocabulary or foreign language lessons,
international pen pal letters (podcast pals!), music performance, interviews,
debates. Podcasting can be a publishing tool for student oral presentations
4) Web services (sometimes called application services) are services that are
made available from a business's Web server for Web users or other Web-
connected programs. Web services are software-powered resources or functional
components whose capabilities can be accessed at an internet URI. Standards-
based web services use XML to interact with each other, which allows them
to link up on demand using loose coupling. Web service consumers are able
to invoke method calls on remote objects by using SOAP and HTTP over the
Web.
I
Internet Technology system (such as Linux) by using the World Wide Web's Hypertext Transfer
Protocol (HTTP)and its Extensible Markup Language (XML) as the
mechanisms for information exchange. Since Web protocols are installed and
available for use by all major operating system platforms, HTTP and XML
provide an already at-hand solution to the problem of how programs running
under different operating systems in a network can communicate with each
other: SOAP specifies exactly how to encode an HTTP header and an XML
file so that a program in one computer can call a program in another computer
and pass it information. It also specifies how the called program can return a
response. An advantage of SOAP is that program calls are much more likely
to get through firewall servers that screen out requests other than those for
known applications (through the designated port mechanism). Since HTTP
requests are usually allowed through firewalls, programs using SOAP to
communicate can be sure that they can communicate with programs anywhere.
REST Principles:
• All resources share a uniform interface for the transfer of state between
client and resource, consisting of
4) Rich Internet Applications (RIAs) are web applications, which use data that
can be processed both by the server and the client. Furthermore, the data
exchange takes place in an asynchronous way so that the client stays responsive
while continuously recalculating or, updating parts of the user interface. Rich
Internet Applications provide the end user with an interface that is faster and
more responsive than traditional applications. Providing an unparalleled
interactive web experience, Rich Internet Application enable businesses to
improve productivity, utilize advanced communication systems, and provide a
higher level of service to customers. Delivering a variety of exciting features
and uses, Rich Internet Applications such as videos, word processors, online
games and mobile apps have been consistently gaining in popularity around
the world. Rich Internet Applications offer superior accessibility, portability
and scalability. Rich Internet Applications are more interactive and more
responsi ve applications than traditional web applications. The basic
characteristics are unnecessary page reload, drag & drop facilities, short
response time and multimedia animations. Based on these characteristics,
different functionalities such as live validation, auto completion, periodic
refresh, and even rich text editors can be offered to the RIA user.
/
Feed". People who are interested in finding out the latest headlines or changes Latest Trend in Internet
Securities
can check this list. Special computer programs called "RSS aggregators" have
been developed that automatically access the RSS feeds of websites you care
about on your behalf and organize the results for you. (RSS feeds and
aggregatorsare also sometimes called "RSS Channels" and "RSS Readers".
RSS aggregators automatically check a series of RSS feeds for new .items on
an ongoing basis, making it is possible to keep track of changes to multiple
websites without needing to tediously read and re-read each of the web sites
yourself. They detect the additions and present them all together to you in a
compact and useful manner. If the title and description of an item are of interest,
the l~nk can be used to quickly bring the related web page up for reading.
5) A wiki is a website that allows the creation and editing of any number of
interlinked web pages via a web browser using a simplified markup language.
Using wiki users can add, remove, and edit every page using a web browser
• Good for writing down quick ideas or longer ones, giving you more time
for formal writing and editing.
• Emailing a large document to several people can take time and some people
may not receive it due to spam filters. By using a wiki one user can share
his or her work with all of the users at one time.
• Another advantage to using a wiki is that all the drafts of a document are
saved.
I
Internet Technology
4.8 SUGGESTED READINGS
• Internet & World Wide Web How to Program, 4/e, Harvey M. Deitel and Paul
J. Deitel
• www.en.wikipedia.org/wiki/Web_2.0
• www.exforsys.com/ ...lweb-2.0/introduction-to-web-2.0.html
• www.oreilly.comlweb2/archive/what-is-web-20.html
122
Student Satisfaction Survey l@Jignou
~ THE PEOPLE'S
UNIVERSITY
Student Satisfaction Survey ofIGNOU Students
Enrollment No.
Mobile No,
Name
Programme of Study
Year of Enrolment
Age Group D Below -30 D 31-40 D 41-50 D 51 and above
Gender D Male DFemale
Regional Cent~ '"
States .
Study Centcr Code
Please indicate how much you are satisfied or dissatisfied with the following statements
SI. Questions Very Satisfied Average Dissati- Very
No. Satisfied died Dissati-
sfted
D CJ D CJ c:=J
1. Concepts are clearly explained in the printed learning
material
2. The learning materials were received in time
..
CJ D CJ D D
3. Supplementary study materials (like video/audio) available
D D D D D
4. Academic counselors explain the eoncepts clearly CJ CJ D CJ D
5.
_.'
The counscling sessions were interactive
D D D c=J D
.. '
j
MPDD-IGNOU/P.O. 1T1 July 2011
ISBN: 978-81-266-5529-8