Sbec-Internet and It's Applications
Sbec-Internet and It's Applications
UNIT – II
Internet Technologies: Modem - Internet addressing – Physical connections – Telephone Lines –
Internet browsers – Internet Explorer – Netscape Navigator.
UNIT - III
Web server - proxy Server - Web Browser- Search Engines-Search Tools – Firewalls - Data Security.
UNIT – IV
Internet Relay Chat -Types of network - Packet Switched Network - Circuit Switched Network –TCP/IP
–Internet Protocol
UNIT - V
Case Study: Online Passport – Online Gas Services – Online Train Reservation – Tamilnadu
government services
TEXTBOOKS
1. C Xavier, “World Wide Web with HTML”, Tata McGraw Hill Education, 2000.
2. H.M.Deital, P.J. Deital,“Internet and World Wide Web – How to Program”, 4th Edition “PHI
Learning.
3. Raj kamal, “Internet and Web Technologies", 7th Reprint, Tata McGraw Hill Education,
2007.
REFERENCE WEBSITES
1. http://www.ebharatgas.com/
2. http://passportindia.gov.in/
3. https://www.irctc.co.in
4. http://www.tn.gov.in/
1
SUB: INTERNET AND APPLICATIONS
IV SEMESTER
UNIT -I
Introduction To The Internet: Computer in Business – Networking – Internet - E-mail – Resource
Sharing – Gopher – World Wide Web – Telnet – Bulletin Board Service – Wide Area Information
Service.
2. COMPUTERS IN BUSINESS
Computer-based business applications were called Business Data Processing Systems (BDPS) and
COBOL was largely used to design them.
Business data was stored in the form of data files, and COBOL programs were used to process the
data files and generate useful reports.
In COBOL, programs have very lengthy codes. Even a simple payroll system may require a
program of 500 lines and sometimes even more than 1000.
Software that supports creation and management of data files easily and simple queries from the
data files and also gives reports in an attractive formal is called a Data Base Management System
(DBMS).
Dbase was the first popular DBMS, version III became very popular.
Foxbase was a similar DBMS. The same company updated the features of Foxbase and introduced
Foxpro. Now Foxpro is used in several small companies.
At this stage a new technology called Graphical User Interface (GUI) was introduced. This
technology calls for designing programs in such a way that the user can see some pictures and
icons on the monitor, and selects them for giving input, which is very easy for the user.
A GUI divides a program into two parts.
1. To managing the data files, called back end
2. To design pictures and icons to get input from the user, called the front end.
The database management system which supports relational databases and relational features is
called a Relational Database Management System (RDBMS).
2
SUB: INTERNET AND APPLICATIONS
Oracle 2000 being a popular one is given in several modules, which include:
Oracle Workgroup 2000 (for the back end)
Oracle Developer 2000 (for the front end)
Oracle Designer 2000 (also for the front end)
Oracle Power Object 2000 (also for the front end)
Oracle Developer 2000 includes Forms 4.5 which is a tool for designing GUI, ane Report Writer
for designing and getting reports.
There are some software’s which can be used only for the front end; such as applications software
is called a front-end tool Visual Basic, Visual C++ and Power Builder are some front-end tools.
Visual Basic normally used with the back-end tool called Access. It can also be used with Oracle
Power Builder is popularly used with the RDBMS Sybase.
Ingres, Informix, and Unify are some other RDBMS.
Mainframe computers still use COBOL for business applications.
Another system for business applications on mainframe computers is called DB/2.
3. NETWORKING
A networking is a computers connected to each other.
A centralized network is a network having a central computer (called a server) and other
computers called nodes.
Centralized Network
Example: A centralized airline reservation system has a server at the main office and nodes al all
airports, travel agencies, etc.
In some types of networks, no central server exists.
All the computers are simply connected together through telephone connections and/or radio
waves.
In centralized networks, a remote node can communicate only with the server, whereas in the other
type any two nodes can communicate with each other directly.
In client server architecture, two types of software are needed for the system. The software needed
to do the work of the node is called client software.
3
SUB: INTERNET AND APPLICATIONS
The software needed to run the central system is called the server. Clients always ask for resources
(software and data tiles) from the server which does the work of resource sharing.
Computer networks support an enormous number of applications and services such as access to the
World Wide Web, digital video, digital audio, shared use of application and storage servers,
printers, and fax machines, and use of email and instant messaging applications as well as many
others.
Computer networks differ in the transmission medium used to carry their signals, communications
protocols to organize network traffic, the network's size, topology and organizational internet. The
best-known computer network is the Internet.
Following is the list of hardware's required to set up a computer network:-
Network Cables
Distributors
Routers
Internal Network Cards
External Network Cards
4. INTERNET
The Internet is the world's largest network of computer networks.
There are more than 100 million users on the Internet, and they are growing rapidly by the day.
5
SUB: INTERNET AND APPLICATIONS
The Internet Engineering Task Force (IETF) is responsible for discussing and investigating the
operational and technical problems of Internet.
The Inter NIC is responsible for providing registration services to Internet community.
Internet Applications:
Exchange messages using e-mail (Electronic mail).
Transfer files as well as software.
Browse through information on any topic on web.
Communicate in real time (chat) with others connected to the Internet.
Search databases of government, individuals and organizations.
Read news available from leading news groups.
Send or receive animation and picture files from distant places.
Set up a site with information about your company’s products and services.
Connection of Internet:-
Through Dial-up Connection: A dials us connection is a temporary connection, set up between
your computer and ISP (Internet Service Provider) server. A dial-up connection is established
using a modem, which uses the telephone line to dial up the number of ISP server.
Through Broadband Connection: The term broadband is short for broad bandwidth. Bandwidth
refers to the amount of data that a signal or circuit can carry. Broadband connection speeds are
measured in megabits per second (mbps).
Wireless Connection: These days we can also connect to Internet wirelessly.
Wi-Fi: It refers to Wireless Fidelity, which lets you connect to the Internet without a direct line
from your PC to the ISP.
WiMAx: It is a wireless digital communication system. WiMAX can provide broadband wireless
access (BWA) up to 50 km for fixed stations
6
SUB: INTERNET AND APPLICATIONS
5. E-MAIL
Email is a service which allows us to send the message in electronic mode over the internet. It
offers an efficient, inexpensive and real time mean of distributing information among people.
E-Mail Address
Each user of email is assigned a unique name for his email account. This name is known as E-mail
address. Different users can send and receive messages according to the e-mail address.
E-mail is generally of the form username@domainname. For example,
[email protected] is an e-mail address where webmaster is username and
tutorialspoint.com is domain name.
The username and the domain name are separated by @ (at) symbol.
E-mail addresses are not case sensitive.
Spaces are not allowed in e-mail address.
E-mail Header
The first five lines of an E-mail message is called E-mail header. The header part comprises of
following fields:
From
Date
To
Subject
CC
BCC
7
SUB: INTERNET AND APPLICATIONS
From: The From field indicates the sender’s address i.e. who sent the e-mail.
Date: The Date field indicates the date when the e-mail was sent.
To: The To field indicates the recipient’s address i.e. to whom the e-mail is sent.
Subject: The Subject field indicates the purpose of e-mail. It should be precise and to the point.
Cc: CC stands for Carbon copy. It includes those recipient addresses whom we want to keep
informed but not exactly the intended recipient.
Bcc: BCC stands for Black Carbon Copy. It is used when we do not want one or more of the
recipients to know that someone else was copied on the message.
Greeting: Greeting is the opening of the actual message. Eg. Hi Sir or Hi Guys etc.
Text: It represents the actual content of the message.
Signature: This is the final part of an e-mail message. It includes Name of Sender, Address, and
Contact Number.
Advantages:
E-mail has proved to be powerful and reliable medium of communication. Here are the benefits
of E-mail:
Reliable
Convenience
Speed
Inexpensive
Reliable: Many of the mail systems notify the sender if e-mail message was undeliverable.
Convenience: There is no requirement of stationary and stamps. One does not have to go to post
office. But all these things are not required for sending or receiving an mail.
Speed: E-mail is very fast. However, the speed also depends upon the underlying network.
Inexpensive: The cost of sending e-mail is very low.
Disadvantages
Apart from several benefits of E-mail, there also exists some disadvantages as discussed below:
Forgery
Overload
Misdirection
Junk
Forgery: E-mail doesn’t prevent from forgery, that is, someone impersonating the sender, since
sender is usually not authenticated in any way.
Overload: Convenience of E-mail may result in a flood of mail.
Misdirection: It is possible that you may send e-mail to an unintended recipient.
Junk: Junk emails are undesirable and inappropriate emails. Junk emails are sometimes referred to
as spam.
E-mail Protocols
E-Mail Protocols are set of rules that help the client to properly transmit the information to or from
the mail server. Here in this tutorial, we will discuss various protocols such as
8
SUB: INTERNET AND APPLICATIONS
1. SMTP,
2. POP, and
3. IMAP.
1. SMPTP: SMTP stands for Simple Mail Transfer Protocol. It was first proposed in 1982. It is a
standard protocol used for sending e-mail efficiently and reliably over the internet.
SMTP is application level protocol.
SMTP is connection oriented protocol.
SMTP is text based protocol.
It handles exchange of messages between e-mail servers over TCP/IP network.
Apart from transferring e-mail, SMPT also provides notification regarding incoming mail.
2. IMAP stands for Internet Mail Access Protocol. It was first proposed in 1986. There exist five
versions of IMAP as follows:
1. Original IMAP
2. IMAP2
3. IMAP3
4. IMAP2bis
5. IMAP4
MAP allows the client program to manipulate the e-mail message on the server without
downloading them on the local computer.
The e-mail is hold and maintained by the remote server.
It enables us to take any action such as downloading, delete the mail without reading the
mail. It enables us to create, manipulate and delete remote message folders called mail boxes.
IMAP enables the users to search the e-mails.
3. POP stands for Post Office Protocol. It is generally used to support a single client. There are
several versions of POP but the POP 3 is the current standard.
POP is an application layer internet standard protocol.
Since POP supports offline access to the messages, thus requires less internet usage time.
POP does not allow search facility.
Signatures
Whenever we write a letter, we affix our signature at the end of the letter. This facility has been
included in electronic mail also.
The software we use for sending e-mail has the facility to create and modify our signature
electronically.
The electronic signature is a text-based collection of one or more lines. For example, my signature
can be set as the following.
9
SUB: INTERNET AND APPLICATIONS
This signature is appended automatically to all e-mails and sent It is also possible to set the e-mail
signature as a small diagram using text-based symbols.
Voice E-mail
In a usual (text) e-mail, we type the message in the body of the e-mail in text mode.
Recently, some companies have introduced software systems which support voice.
Such software is given as an enhancement to their usual software.
After keying the address to which the e-mail has to be sent, we must speak the message. This voice
e-mail travels just like the text e-mail and reaches its destination. When the receiver opens his
mail, the voice message of the e-mail is heard.
Considering the fact that computer users type an average of 20-30 words per min, and professional
typists type an average 60-80 words, human speech averages 200-250 words per minute. So voice
e-mail is approximately eight times faster.
In voice e-mail technology, editing spell checks, grammar and punctuation checks become
redundant.
Pictures and photographs can also be sent along with voice e-mail messages. One need not be
online at the same time to hear the message.
The message packet reaches the mailbox, and the recipient can open and hear it at any time.
6. RESOURCE SHARING
Every Internet system has some files open for anybody on the Internet.
For example, every Ph D thesis of a university can be copied by anybody free of cost.
These file names and the protocols are advertised in newspapers or private communications or web
pages. Software companies offer the beta version of their new products available on the net.
We can download these files using File Transfer Protocols (FTP).
There are two types of FTP resources available on the Internet They are:
1. Anonymous FTP: The anonymous FTP service is open to everybody on the net. The user
can log on to an FTP server without opening an account on the server. He/she can just log
on with the user ID (Identification) "anonymous". The system will then responds and ask
10
SUB: INTERNET AND APPLICATIONS
your e-mail address. Then it will ask for your (systems') password. After that you can
download any file from the FTP server
2. Non-anonymous FTP: One can download a file only if one creates an account with the
FTP server. The user must already have an account, user ID and a password to download a
file.
7. GOPHER
Gopher is a TCP/IP application layer protocol designed for distributing, searching and retrieving
documents over the internet.
It presented an alternative to the World Wide Web in its early stages.
The Gopher service was first used in the campus-wide Information System of the University of
Minnesota. It became very popular during 1991-93.
Gopher is easy-to-use and user-friendly as com-pared to FTP.
Gopher facilitates simple menu selection features and also provides browsing of large files.
The resources (files) available on Gopher are called gopher space.
Two types of search engine are available in gopher
1. Veronica 2. Jug head
Veronica is popular of the two. Both work much like the web search engine. They search pre-built
databases for keywords that you provide.
11
SUB: INTERNET AND APPLICATIONS
The gopher does not retain any information about the client across transactions.
This aspect of gopher design is the key to gopher’s efficiency: the server is only connected to the
user long enough to serve a particular request.
It does not pay the high overhead cost of having hundreds or thousands of users logged in at once.
Later, another search facility called Jughead was also developed. Since the Gopher resources are
arranged in simple linear forms, searching takes more time, and further it does not support
multimedia features. Both FTP and Gopher mainly have text-based resources.
A large quantum of FTP and Gopher-based resources are still available on the Internet However,
things have moved to a better technology the World Wide Web. Now some of the FTP and Gopher
resources have migrated to WWW.
Hyper-Text:
Hyper-text is a text of more than two dimensions.
Consider any text that is typed from left to right It has only two dimensions:
1. Left to right
2. Top to bottom
Left to right is normally considered as the x-axis and top to bottom is considered the y-axis.
In hyper-text one 2-D text is shown on the screen. Certain words are highlighted.
If we click one of those highlighted words, more details about that word appear in an-other
window. We say that these details form the third dimension, the z-axis, which goes deeper into the
text
This can be done further on the smaller window also. For example, consider the window shown
below Fig.
12
SUB: INTERNET AND APPLICATIONS SEM: IV
The word link is appearing in a different color. If we click on it further details are shown in
another window.
Hypertext system can store a large collection of textual and multimedia documents
Http:
The acronym for Hyper-Text Transfer Protocol is HTTP, and WWW for the World Wide Web.
Pointers connect the web pages in multiple ways in the form of multiple linked lists.
For example, educational websites are arranged in one list, religious webs in another and similarly
for other types also.
com - businesses
edu - educational institutions
gov - government organizations
mil - military organization
org - nonprofit organizations
net - network resources
A site may be in more than one list.
Each page of the web is called a web page or website.
Every Internet-connected system may have a website. If you have a web page, you can keep any
text, pictures, sound or even animation on your website.
Nowadays companies give a complete profile in text, picture and sound on their websites. Text,
picture, sound or animation kept on a website can be seen by anybody who browses the web.
Browsing the web means looking at various web pages one after the other, also called surfing the
web.
Browsers
The software used for browsing web pages is called a browser. The following are some popular
browsers:
13
SUB: INTERNET AND APPLICATIONS
Netscape Navigator
Mosaic
Hot Java
Microsoft Internet Explorer
Search Engines
The universally accepted computer language to create hyper-text is called Hyper-Tem Mark-up
Language (HTML).
Websites on the Internet are connected in such a way that one site has a pointer to the next website.
Each website has an address. In the web, we can begin search from a search site or an index site.
These websites are also called search engines. The following are some popular search engines.
1. http:// www.yahoo.com is a search site.
2. http:// www.lycos.com is an index site.
3. http:// wwwAskleeves.com
The home page of the Lycos search engine is shown in Fig It has a text box to choose a particular
topic. We can also choose some of the sites of the Lycos network, such as 11-ipod.com,
Angelfire.com, MailCity.com, WhoWhere.com. Each of these sites help us in their unique ways to
search for information.
Ask Jeeves is a different type of search engine, which gets us the necessary information by asking
us several questions. Depending upon our replies, it uses other search engines and gets the required
website.
14
SUB: INTERNET AND APPLICATIONS
The home page of Ask Jeeves is shown in Fig. This has several questions related to our search. We
can proceed further by replying to these queries.
The home page of the most popular search engine, Yahoo, is shown in Fig.
15
SUB: INTERNET AND APPLICATIONS
HT mail is a web server which provides a free e-mail service to all Internet users. We can just
register our name in the home page of the Hobnail website. The home page is shown in Fig.
We can give the user ID and the password for registration. If the user ID is not one which is
already registered, it is accepted by the server. We can then have an e-mail address similar to the
ones shown below.
[email protected]
[email protected]
[email protected]
9. TELNET
Telnet was developed in 1969 to aid in remote connectivity between computers over a network
Telnet is a utility which enables an Internet user to log in and work on another system which is
geographically located in another place of the world. This is also called a remote login facility.
For example, a person has a computer in his office at New Delhi. He has to visit Mumbai on a
family trip. But when he is free at Mumbai, he can log in his system at Delhi from Mumbai and
use all the databases and files, and work on the system.
Telnet can access almost all the libraries in any part of the world and their books.
16
SUB: INTERNET AND APPLICATIONS
We can log in to research laboratory computers and access some useful software. When we want
to log in to a system using Telnet, we must know the password of the system, which is a very
important security feature.
Telnet can connect to a remote machine that on a network and is port listening. Most common
ports to which one can connect to through telnet are:
Port 21 - File Transfer Protocol
Port 22 - SSH Remote Login Protocol
Port 23 - Telnet Server
Port 25 - Simple Mail Transfer Protocol (SMTP)
Port 53 - Domain Name Server (DNS)
Port 69 - Trivial File Transfer Protocol (TFTP)
Port 70 - Gopher
Port 80 - Hyper Text Transfer Protocol (HTTP)
Port 110 - Post Office Protocol 3 (POP3)
The most common use of telnet stands to enable remote authentication and access
To use Telnet, you need to know the address of the host whose resources you want to use.
5 MARK
1. Briefly describe about search Engine. Page 14
2. Write note on Hyper-Text with example. Page 15
3. Describe about 2 Search Engines with suitable example. Page 14 - 16
4. Write a short note on internet. Page 2
5. Write a short note on computer in business Page 2 - 3
6. Write a short note on netWorking. Page 3 - 4
7. Write about Telnet. Page 16 - 17
10 MARK
1. Briefly describe about WWW. Page 12 - 16
2. Explain the term Electronic Mail (E-MAIL). Page 7 – 10
3. Briefly describe about History of internet. Page 5 - 6
18
SUB: INTERNET AND APPLICATIONS
UNIT – II
Internet Technologies: Modem - Internet addressing – Physical connections – Telephone Lines –
Internet browsers – Internet Explorer – Netscape Navigator.
INTERNET TECHNOLOGIES:
If we want to connect our computer to the Internet, we can do so only through an Internet server.
There are Companies which have Internet servers and provide Internet connectivity called Internet
Service Providers (ISP).
They have satellite connections with the Internet.
We must apply to an ISP and ask for an Internet connection.
They give a web page, an e-mail box and other facilities. We must have a telephone connection to
communicate with the ISP 's office, and a device called Modem.
Our computer gets connected to the Internet.
We connect our computer to the modem, and the modem is connected to the telephone line. This is
illustrated in Fig.
There are various types of Internet connections. The following are some of them.
Shell Account (text only).
TCP/IP Account (text, graphics, sound and animation).
Shell accounts enable us to browse through text items only: the graphics and multi-media elements
cannot be viewed. So the shell account does not permit full use of Internet capability. Using a shell
account, we can make use of the e-mail facility.
Transfer Control Protocol/Internet Protocol (TCP/IP) is very powerful and most popular. With a
TCP/IP connection, we can have the benefit of Internet fully.
19
SUB: INTERNET AND APPLICATIONS
MODEM
Conversion of digital signals into signals transmittable through a telephone is called modulation.
Converting telephone signals into digital signals is called demodulation.
A modem is a device used for modulation and demodulation (Modulator-Demodulator).
Modems are classified according to their rate of transfer of data, measured in terms of bytes
per second (BPS).
If the data transfer capacity of a modem is 14.4 kilobytes, it means that the rate of transfer of data
through the modem is 14.4 kilobytes per second.
The first modems were "dial-up," meaning they had to dial a phone number to connect to an ISP.
Modern modems are typically DSL or cable modems, which are considered "broadband" devices.
DSL modems operate over standard telephone lines, but use a wider frequency range.
This allows for higher data transfer rates than dial-up modems and enables them to not
interfere with phone calls.
Types of Modem
Modem can be categorized in several ways like direction in which it can transmit data, type of
connection to the transmission line, transmission mode, etc.
Depending on direction of data transmission, modem can be of these types −
1. Simplex − A simplex modem can transfer data in only one direction, from digital device to
network (modulator) or network to digital device (demodulator).
2. Half duplex − A half-duplex modem has the capacity to transfer data in both the directions
but only one at a time.
3. Full duplex − A full duplex modem can transmit data in both the directions simultaneously.
20
SUB: INTERNET AND APPLICATIONS
INTERNET ADDRESSING
◊ Millions of computers have been connected to the Internet.
◊ When we want to communicate with a computer through the Internet, we need to specify the
address of that computer, every computer connected to the Internet is given an address, called
the IP Address [Internet Protocol Address].
◊ The IP address of a computer consists of four groups of numbers separated by periods or dots 0.
◊ For example, 18.181.0.24 is an IP address.
◊ Internet Corporation for Assigned Names and Numbers is responsible for assigning IP addresses.
◊ The first octet referred here is the left most of all. The octets numbered as follows depicting
dotted decimal notation of IP Address:
◊ The number of networks and the number of hosts per class can be derived by this formula:
◊ When calculating hosts' IP addresses, 2 IP addresses are decreased because they cannot be
assigned to hosts, i.e. the first IP of a network is network number and the last IP is reserved
for Broadcast IP.
Class A Address:-
◊ The first bit of the first octet is always set to 0 (zero). Thus the first octet ranges from 1 – 127,
i.e.
◊ Class A addresses only include IP starting from 1.x.x.x to 126.x.x.x only. The IP range
127.x.x.x is reserved for loopback IP addresses.
◊ The default subnet mask for Class A IP address is 255.0.0.0 which implies that Class A
addressing can have 126 networks (27-2) and 16777214 hosts (224-2).
◊ Class A IP address format is thus: 0NNNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH
Class B Address:-
◊ An IP address which belongs to class B has the first two bits in the first octet set to 10, i.e.
21
SUB: INTERNET AND APPLICATIONS
◊ Class B IP Addresses range from 128.0.x.x to 191.255.x.x. The default subnet mask for Class
B is 255.255.x.x.
◊ Class B has 16384 (214) Network addresses and 65534 (216-2) Host addresses.
◊ Class B IP address format is: 10NNNNNN.NNNNNNNN.HHHHHHHH.HHHHHHHH
Class C Address:-
◊ The first octet of Class C IP address has its first 3 bits set to 110, that is:
◊ Class C IP addresses range from 192.0.0.x to 223.255.255.x. The default subnet mask for
Class C is 255.255.255.x.
◊ Class C gives 2097152 (221) Network addresses and 254 (28-2) Host addresses.
◊ Class C IP address format is: 110NNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH
Class D Address:-
◊ Very first four bits of the first octet in Class D IP addresses are set to 1110, giving a range of:
◊ Class D has IP address rage from 224.0.0.0 to 239.255.255.255. Class D is reserved for
Multicasting. In multicasting data is not destined for a particular host, that is why there is no
need to extract host address from the IP address, and Class D does not have any subnet
mask.
Class E Address:-
This IP Class is reserved for experimental purposes only for R&D or Study. IP addresses in this class
ranges from 240.0.0.0 to 255.255.255.254. Like Class D, this class too is not equipped with any subnet
mask.
Text-based addressing:
◊ Computers are also given another address, which is text-based.
◊ For example, skp .mit .edu is a valid Internet address.
◊ All users have text-based addresses.
◊ An Internet service called DNS (Domain Name System) converts into the actual numerical
address. This address is also called the Uniform Resource Locator (URL).
◊ The Internet address has two parts. They are the:
• Name of the user (user ID)
• Name of the server (server ID).
The @ symbol is given in between the above two names. For example, our address is
[email protected]
◊ My user ID is stxavier and my ISP's server ID is md2 vsnl .net .in. The server ID contains
several parts separated by dots.
22
SUB: INTERNET AND APPLICATIONS
◊ The extreme right part of the address in the above example refers to India. This part of the
address is usually called the top-level domain to which the computer is connected.
◊ All addresses on the Internet are classified into several top-level domains.
◊ The classification may either be geographical or organizational.
◊ Table shows some examples of codes used for geographical classification.
Another top-level domain classification is based for the nature of the organization. For example, all
universities and educational institutions are given "edu" as the top-level domain name. Other top-level
domain' names for organizations are given in Table.
The first part of the URL specifies the protocol used. Table shows some URL.s.
23
SUB: INTERNET AND APPLICATIONS
PHYSICAL CONNECTIONS
Internet connectivity is done through a modem and a telephone line. The path of the data is as follows
Most of the V.34 modems can compress the data in ratio of 4 :1. So, they can achieve a throughput of
28.8 x 4 = 115.2 KBPS in an ideal situation. However, practically they can achieve a speed of at least
56 KBPS.
TELEPHONE LINES
◊ An ordinary Internet account holder gets only a dial-up connection.
◊ Several users share one port of the ISP Server and at one time, only one user can work.
◊ The port is connected to a particular telephone number.
◊ When one user dials the telephone number to get physical connection to the server, if the port is
already in use by another user, an engaged tone will be heard.
24
SUB: INTERNET AND APPLICATIONS
◊ When the port is free, the user gets connected to the ISP and can work on the Internet. Figure
shows the dial-up connections of users.
Leased Lines:
◊ A leased line connection is very expensive.
◊ The user is given full freedom on a port of the ISP server one port is for his exclusive use.
◊ So he can use it around the clock without any interruption.
◊ Whenever the user dials, he gets a connection and can work on the Internet. Figure shows the
leased line of a user.
25
SUB: INTERNET AND APPLICATIONS
If a company gets a leased line connection, it is possible for several units of the company to access the
Internet simultaneously. It is possible to have several types of media in telephone connections, as
shown in Table.
Frame Relay:
◊ The frame relay type of connection is cheaper compared to leased line connections.
◊ In a frame relay type connection, we connect our network to the telephone company's frame
relay switch.
◊ The frame relay switch then routes the data traffic to the ISP.
ISDN
◊ Different telecommunication services such as telephone, telex and facsimile fax use separate
networks for each service.
◊ These non-integrated services require separate switching systems, special customer access
networks, individual trunk networks and separate operation staff. These services are costly.
◊ An effort to integrate all these services into a single network is ISDN.
◊ Integrated services digital network (ISDN) is a communication network which is used for
transmitting all -types of integrated data, which includes voice, video, facsimile and
computer signals.
◊ The following are the advantages of an ISDN network
1. increases user productivity
2. higher transmission Rate
3. all types of services are integrated into a single network
4. lower cost
5. higher accuracy level
26
SUB: INTERNET AND APPLICATIONS
The two B-channels are used to send bulk data. The D-channel is used to control the data flow in the
B-channels. Since the data flows in the two B-channels, each of 64 KBPS bandwidth, the theoretical
bandwidth of a BRI line is 128 KBPS. Practically, it may be a little less than 128 KBPS due to several
factors affecting the data transfer.
Recently such computers have become available which are "ready for connecting to ISDN". These
computers have in-built terminal adapter cards, so they can be directly plugged into NT-1.
27
SUB: INTERNET AND APPLICATIONS
INTERNET BROWSERS
Internet is working on the client server architecture.
The web server runs a server program, and an Internet node runs a client program.
The client program used to see websites is called a browser.
Web Browser is application software that allows us to view and explore information on the web.
User can request for any web page by just entering a URL into address bar.
Web browser can show text, audio, video, animation and more. It is the responsibility of a web
browser to interpret text and commands contained in the web page
Following are the most common web browser available today:
Browser Vendor
Internet Explorer Microsoft
Google Chrome Google
Mozilla Firefox Mozilla
Netscape Navigator Netscape Communications Corp.
Opera Opera Software
Safari Apple
Sea Monkey Mozilla Foundation
K-meleon K-meleon
Architecture:-
There is a lot of web browser available in the market. All of them interpret and display information on
the screen however their capabilities and structure varies depending upon implementation. But the
most basic component that all web browsers must exhibit is listed below:
Controller/Dispatcher
Interpreter
Client Programs
Controller works as a control unit in CPU. It takes input from the keyboard or mouse, interpret it and
make other services to work on the basis of input it receives.
Interpreter receives the information from the controller and executes the instruction line by line.
Some interpreter is mandatory while some are optional For example, HTML interpreter program is
mandatory and java interpreter is optional.
Client Program describes the specific protocol that will be used to access a particular service.
Following are the clients programs that are commonly used:
HTTP
SMTP
FTP
NNTP
POP
28
SUB: INTERNET AND APPLICATIONS
Internet Explorer and Netscape Navigator are used commonly to browse the Internet
INTERNET EXPLORER
Internet Explorer is graphical user interface software for browsing the Internet.
Internet explorer is a web browser developed by Microsoft.
To start internet explorer, follow the following steps:
Go to Start button and click Internet Explorer.
29
SUB: INTERNET AND APPLICATIONS
The Internet Explorer window will appear as shown in the following diagram
Window
A portion of the computer screen that is enclosed by a border is called a window. The size of the
window can be small or big. A typical window is shown in Figure.
30
SUB: INTERNET AND APPLICATIONS
31
SUB: INTERNET AND APPLICATIONS
SEM: IV
In the menu bar, there are six menus. They are the:
1. File menu
2. Edit menu
3. View menu
4. Go menu
5. Favorites menu
6. Help menu
They appear as a horizontal bar at the top of the window. When we click one of them, a pull down
menu appears. For example, when we click ‘File’ we get the File menu
File Menu
The file menu has the following choices as shown in Fig
Saving Webpage:-
You can save web page to use in future. In order to save a webpage, follow the steps given below:
Click File > Save As. Save Webpage dialog box appears.
Choose the location where you want to save your webpage from save in: list box. Then
choose the folder where you want to save the webpage.
32
SUB: INTERNET AND APPLICATIONS
Save Picture As: This option let you save the picture at specific location with its name. When you
click this option, a dialog box is opened where you can specify its name and location.
Opening a site
When we want to open a website document, we must select Open on the File menu.
The window as shown in Fig appears.
33
SUB: INTERNET AND APPLICATIONS
If we know the URL of the website, we can type the name in the window and click the OK button.
If we don't know the URL, we can browse and find it In order to browse, we must click the Browse
button. We get the window as shown in Fig.
We must select the URL and then click Open to go to the open window, then click the OK button of
the window to open the website.
Edit Menu
The edit menu is used to edit the current document.It is got by clicking Edit on the menu bar.
This menu contains the editing commands such as cutting, copying and pasting.
Copy - Copy highlighted images or text to paste into another application; MS Word, PowerPoint or
other applications. You can also use the keyboard combination Ctrl + C
Find- Used for searching a word or part of word within the document. When we click Find on the Edit
menu we get a window as shown in Fig.
34
SUB: INTERNET AND APPLICATIONS
When we type the word to be searched and click the button Find Next, the word is searched and the
cursor goes to that location.
View Menu
The view menu is used to customize the view in our screen.
The view menu as shown Fig has the following commands:
35
SUB: INTERNET AND APPLICATIONS
Option Window
If the Show pictures box is ticked, the web page will show the pictures (if any).
If this box is not ticked, the pictures will not be shown on the web page. Similarly, the tick boxes Play
sounds and Play videos can be used for sound and video. In the middle part on the left there is a panel
called Colors with a tick box called Use Windows colors, and two boxes for selecting colors of the text
and background color. ii we tick on the tick box, the original Windows colors are chosen for the
background and the text. If we remove the tick by another click, we can choose the background and
text color. In a web page hot texts will appear in a different color. This can be designed using the right
hand side panel in the middle of the window, called Links. This panel has a tick box, Underline links,
36
SUB: INTERNET AND APPLICATIONS
using which we can set the display to underline all hot texts (links). They can also be displayed in a
different color. When we open a web page, several links may appear in a page. By clicking the hot
text, we visit the linked document In order to distinguish between the links which have been visited
already and those which have not yet been visited, we can assign two different colors for the hot texts.
These colors can be assigned using the two keys Visited and Unvisited. On selection of either of these
keys, we get the color palette as shown in Fig.
We can now select any color from the palette. If we are not able to choose from this palette, we can
define a new custom color by clicking the button Define Custom Colors. When we click this button,
we get a window as shown in Fig.
We can create a color using the basic colors red, green and blue and add it to the custom colors.
The General window also has a button, Languages, to choose a language for the web.
As websites are created in several languages, this option helps us select the language and then open the
website. On clicking the Languages button, we get a window as shown in Fig.
37
SUB: INTERNET AND APPLICATIONS
If we want to add a new language, we click the Add button. We can choose the font for our display by
clicking the Font Settings in the General window. On clicking this button, we get a window as shown
in Fig. We can select a font and click the OK button.
Navigation Window:
The Connection window is to set up connections. The navigation window shown in Fig is a very
useful tool in the Internet Explorer.
38
SUB: INTERNET AND APPLICATIONS
Using this window, we can set the starling page URL and can preserve a history of the websites we
visit The number of days up to which the history must be preserved can also be set.
Favorites Menu:
The History option keeps the history of all the sites visited. Internet Explorer also has a provision to
store the addresses of the favorite sites. This is clone in a folder called Favorites. This Favorites folder
can be used in a very convenient form by creating subfolders within this Favorites folder. When we
click the Favorites option in the menu bar, the Favorites menu is displayed as shown in Fig. 3.18. If we
want to add this current web page in Favorites, we can just click the Add to Favorites command of the
Favorites Menu shown in Fig.
On clicking Add to Favorites, we get the window as shown in Fig. 3.19. If we click OK the current
website address will be stored in the Favorites folder. Suppose we want to store it in a subfolder. We
must click the Create in button of this window.-
39
SUB: INTERNET AND APPLICATIONS
On clicking it, the window gets extended as shown in Fig. This displays all the subfolders in the
Favorites folder. We can now select the folder in which the address has to be stored and then click the
OK button. If we want to create a new folder, we must select the parent folder and then click the
button New Folder.
Opening a Favorite Site: If we want to open a favorite site which was already stored in a Favorite
folder, we must first click the Favorite menu in the menu bar. All the subfolders of the Favorite folder
appear at the bottom of the pull down menu. Select the desired folder and the desired address. The site
is opened. For example, suppose a site with the name "Xavier" is al-ready in a subfolder Research in
the Favorites folder.
Organizing the Favorites Folder: If we want to rearrange the Favorites folder, we must click the
Organize Favorites command in the Favorites menu. We can rearrange them by click-and-drag mouse
operation. We can delete any subfolder by just pressing the delete key after selecting the subfolder.
This window has five buttons, namely:
• Delete
• Rename
• Move
• Open
• Close
40
SUB: INTERNET AND APPLICATIONS
Tool Bar
The tool bar contains some icons as keys for important functions. By just clicking on an icon in the
tool bar, a job can be done. The following are some important keys on the tool bar.
NETSCAPE NAVIGATOR
Netscape Navigator was the most popular web browser before Microsoft launched Internet Explorer.
The Netscape Navigator window has a format similar to that of Intern Explorer.
The window has a menu bar with the following menu options.
• File
• Edit
• View
• Go
• Communicator
• Help
File Menu
The File menu is used to customize the page setup, to preview, to print the document for opening or
saving a page, closing a page or exiting Netscape Navigator.
41
SUB: INTERNET AND APPLICATIONS
The File menu is used to manipulate your files. Using the file menu you can:
Open a New browser window, or create a New blank page in Composer
Open Page - open pages on your hard drive that you might have created with composer, or
open a page that has been saved from the Internet
Save As - you can save Web pages from the Internet on your disk
Print files - prints the current web page
Edit Menu
The Edit menu is used to edit the content of a frame. It is possible to select a portion o the whole, Cut
it, Copy it, Move it or Paste it at any desired location. The Edit menu i similar to the edit menu of any
word processor
View Menu
The View menu is used to customize the view screen of Navigator
42
SUB: INTERNET AND APPLICATIONS
Communicator Menu
This menu is very important in choosing the communicator and choosing bookmarks, etc. It has four
parts. In the first part of the menu, the list of communications are shown, which are:
Bookmark
The Bookmark's option of the Communicator menu is used to make bookmarks for our favorite
websites. This is similar to the Favorites option of Internet Explorer.
43
SUB: INTERNET AND APPLICATIONS
History
The history of the Websites visited so far can be preserved for easy reference. This is done using the
History option of the Tools menu in communicator menu.
Security
Netscape Navigator has a set of security options to make you feel secure. Since the Internet connects
your system (network) to other systems across the globe, you have to be very careful and secure lest
your valuable data is copied or damaged by anybody. We must click the Security tool on the tool bar
to go into the security window.
44
SUB: INTERNET AND APPLICATIONS
There are several security provisions. It is possible to set a password for Communicator. For creating
the password, we must select the Password option in the left frame.
This is used to set the password. It is possible to protect our Java applets and Java Script from the
access of others. For doing this, there is an option called Java/JavaScript. The following are some
more security provisions. • Navigator • Messenger • Certificates • Yours • People • Web Sites •
Signers • Cryptographic
Go menu:
The Go menu is used to navigate through pages that you have visited.
Back - this takes you back to the page you just viewed
Forward - this will take you forward a page
Home - this returns you to the Home page set in Netscape Preferences
At the bottom of this window you will find a list of the titles of the last few pages that you have
viewed. You can highlight any of the pages on the list and go to that page.
45
5 MARK:
1. Explain about ISP. Page 19.
2. Explain on types of port. Page 21
3. Write short note on Modem types. Page 20
10 MARK:
1. Briefly explain telephone lines. Page 24 - 27
2. Write short note on Internet explorer. Page 29 - 33
3. Explain about Internet addressing. Page 21 - 23
4. Write short note on Internet browser. Page 28 - 45
SUB: INTERNET AND APPLICATIONS
UNIT - III
Web Server - Proxy Server - Web Browser - Search Engines - Search Tools - Firewalls - Data Security
WEB SERVER
A Web server is a program that uses HTTP (Hypertext Transfer Protocol) to serve the files that form
Web pages to users, in response to their requests, which are forwarded by their computers' HTTP
clients.
Web server is a computer where the web content is stored. Basically web server is used to host the
web sites but there exists other web servers also such as gaming, storage, FTP, email etc.
Web Application Architecture
Key Points
When client sends request for a web page, the web server search for the requested page if
requested page is found then it will send it to client with an HTTP response.
If the requested web page is not found, web server will the send an HTTP response:Error 404
Not found.
46
SUB: INTERNET AND APPLICATIONS
If client has requested for some other resources then the web server will contact to the
application server and data store to construct the HTTP response.
Architecture
Main Server Architectures
Multi-process (Apache on Unix) „
Multi-threaded (Apache on NT/XP) „
Single process event driven (Zeus, thttpd) „
Asymmetric multi-process event-driven (Flash)
Multi-Process Architecture
47
SUB: INTERNET AND APPLICATIONS
SEM: IV
Use a selector to check for ready file descriptors „
Uses a finite state machine to determine how to move to the next processing stage „
No context switching, no synchronization, single address space „
Modern OS do not provide adequate support for asynchronous disk operations
Asymmetric Multi-Process Event-Driven
Similar to Single Process Event-Driven but with helpers for blocking I/O (e.g., disk requests)
The most leading web servers available today:
1. Apache HTTP Server
This is the most popular web server in the world developed by the Apache Software Foundation.
Apache web server is an open source software and can be installed on almost all operating systems
including Linux, UNIX, Windows, FreeBSD, Mac OS X and more. About 60% of the web server
machines run the Apache Web Server.
2. Internet Information Services (IIS)
The Internet Information Server (IIS) is a high performance Web Server from Microsoft. This web
server runs on Windows NT/2000 and 2003 platforms (and may be on upcoming new Windows
version also). IIS comes bundled with Windows NT/2000 and 2003; Because IIS is tightly integrated
with the operating system so it is relatively easy to administer it.
3. Lighttpd
The lighttpd, pronounced lighty is also a free web server that is distributed with the FreeBSD
operating system. This open source web server is fast, secure and consumes much less CPU power.
Lighttpd can also run on Windows, Mac OS X, Linux and Solaris operating systems.
4. Sun Java System Web Server
This web server from Sun Microsystems is suited for medium and large web sites. Though the server
is free it is not open source. It however, runs on Windows, Linux and UNIX platforms. The Sun Java
System web server supports various languages, scripts and technologies required for Web 2.0 such as
JSP, Java Servlets, PHP, Perl, Python, and Ruby on Rails, ASP and Coldfusion etc.
5. Jigsaw Server
Jigsaw (W3C's Server) comes from the World Wide Web Consortium. It is open source and free and
can run on various platforms like Linux, UNIX, Windows, and Mac OS X Free BSD etc. Jigsaw has
been written in Java and can run CGI scripts and PHP programs.
48
SUB: INTERNET AND APPLICATIONS
PROXY SERVER
Proxy server is an intermediary server between client and the internet. Proxy servers offers the
following basic functionalities:
Firewall and network data filtering.
Network connection sharing
Data caching
A proxy server is a dedicated computer or a software system running on a computer that acts as an
intermediary between an endpoint device, such as a computer, and another server from which a user or
client is requesting a service. The proxy server may exist in the same machine as a firewall server or it
may be on a separate server, which forwards requests through the firewall.
An advantage of a proxy server is that its cache can serve all users. If one or more Internet sites are
frequently requested, these are likely to be in the proxy's cache, which will improve user response
time. A proxy can also log its interactions, which can be helpful for troubleshooting.
A proxy server is used for many purposes, including:
To provide internal system security
To speed up resource access
To apply access policies for tracking organizational Internet use or assessing employee
progress.
To bypass special controls, such as parental or security controls
To scan for viruses and malware
To circumvent regional restrictions
To allow websites to make requests to externally hosted resources when cross-domain
restrictions prohibit websites from linking to outside domains
Monitoring and Filtering
Proxy servers allow us to do several kind of filtering such as:
Content Filtering
Filtering encrypted data
Bypass filters
Logging and eavesdropping
Improving performance
It fasten the service by process of retrieving content from the cache which was saved when previous
request was made by the client.
Translation
It helps to customize the source site for local users by excluding source content or substituting source
content with original local content. In this the traffic from the global users is routed to the source
website through Translation proxy.
Accessing services anonymously
In this the destination server receives the request from the anonymzing proxy server and thus does not
receive information about the end user.
Security
Since the proxy server hides the identity of the user hence it protects from spam and the hacker
attacks.
49
SUB: INTERNET AND APPLICATIONS
Type of Proxies
Following table briefly describes the type of proxies:
Forward Proxies
In this the client requests its internal network server to forward to the internet.
Open Proxies
Open Proxies helps the clients to conceal their IP address while browsing the web.
Reverse Proxies
In this the requests are forwarded to one or more proxy servers and the response from the proxy server
is retrieved as if it came directly from the original Server.
Architecture
The proxy server architecture is divided into several modules as shown in the following diagram:
50
SUB: INTERNET AND APPLICATIONS
51
SUB: INTERNET AND APPLICATIONS
If no copy of page is found in the cache then download the page from web server else will
check its last modified date from the reply header and accordingly will read from the cache
or server from the web.
Then it will also check whether caching is allowed or not and accordingly will cache the
page.
Cache Manager
This module is responsible for storing, deleting, clearing and searching of web pages in the cache.
Log Manager
This module is responsible for viewing, clearing and updating the logs.
Configuration
This module helps to create configuration settings which in turn let other modules to perform desired
configurations such as caching.
WEB BROWSER
Web Browser is application software that allows us to view and explore information on the web. User
can request for any web page by just entering a URL into address bar.
Web browser can show text, audio, video, animation and more. It is the responsibility of a web
browser to interpret text and commands contained in the web page.
Earlier the web browsers were text-based while now a days graphical-based or voice-based web
browsers are also available. Following are the most common web browser available today:
Especially sites should be compatible to major browsers like Explorer, Firefox, Chrome,
Netscape, Opera, and Safari.
Internet Explorer
Internet Explorer (IE) is a product from software giant Microsoft. This is the most commonly used
browser in the universe. This was introduced in 1995 along with Windows 95 launch and it has passed
Netscape popularity in 1998.
Google Chrome
This web browser is developed by Google and its beta version was first released on September 2, 2008
for Microsoft Windows. Today, chrome is known to be one of the most popular web browser with its
global share of more than 50%.
Mozilla Firefox
Firefox is a new browser derived from Mozilla. It was released in 2004 and has grown to be the
second most popular browser on the Internet.
Safari
Safari is a web browser developed by Apple Inc. and included in Mac OS X. It was first released as a
public beta in January 2003. Safari has very good support for latest technologies like XHTML, CSS2
etc.
52
SUB: INTERNET AND APPLICATIONS
Opera
Opera is smaller and faster than most other browsers, yet it is full- featured. Fast, user-friendly, with
keyboard interface, multiple windows, zoom functions, and more. Java and non Java-enabled versions
available. Ideal for newcomers to the Internet, school children, handicap and as a front-end for CD-
Rom and kiosks.
Konqueror
Konqueror is an Open Source web browser with HTML 4.01 compliance, supporting Java applets,
JavaScript, CSS 1, CSS 2.1, as well as Netscape plugins. This works as a file manager as well as it
supports basic file management on local UNIX filesystems, from simple cut/copy and paste operations
to advanced remote and local network file browsing.
Lynx
Lynx is a fully-featured World Wide Web browser for users on Unix, VMS, and other platforms
running cursor-addressable, character-cell terminals or emulators.
53
SUB: INTERNET AND APPLICATIONS
Browser Architecture:
1. User Interface:
The space where interaction between users and the browser.
Most of the browsers have common inputs for user interface:
•Address bar.
• Next and back buttons.
•Buttons for home, refresh and stop
•Bookmark web pages
54
SUB: INTERNET AND APPLICATIONS
2. Browser Engine
The bridge between User Interface & Rendering Engine, Browser Engine provides methods to begin
the loading of URL and other high-level browsing actions.
Reload,
Back,
Forward actions
Error messages
Loading progress
3. Rendering Engine
Rendering Engine interprets (render) the HTML, XML, JavaScript and generates the layout that is
displayed in the User Interface. Key component of this phase is HTML, CSS parse. This is a reasons
why the browser display a website so difference.
SEARCH ENGINES
Search Engine refers to a huge database of internet resources such as web pages, newsgroups,
programs, images etc. It helps to locate information on World Wide Web.
User can search for any information by passing query in form of keywords or phrase. It then searches
for relevant information in its database and return to the user.
A search engine is a web-based tool that enables users to locate information on the World Wide Web.
Popular examples of search engines are Google, Yahoo!, and MSN Search. Search engines utilize
automated software applications (referred to as robots, bots, or spiders) that travel along the Web,
following links from page to page, site to site. The information gathered by the spiders is used to
create a searchable index of the Web.
55
SUB: INTERNET AND APPLICATIONS
Generally there are three basic components of a search engine as listed below:
1. Web Crawler
2. Database
3. Search Interfaces
Web crawler
It is also known as spider or bots. It is a software component that traverses the web to gather
information.
Database
All the information on the web is stored in database. It consists of huge web resources.
Search Interfaces
This component is an interface between user and the database. It helps the user to search through the
database.
Search Engine Working
Web crawler, database and the search interface are the major component of a search engine that
actually makes search engine to work. Search engines make use of Boolean expression AND, OR,
NOT to restrict and widen the results of a search. Following are the steps that are performed by the
search engine:
The search engine looks for the keyword in the index for predefined database instead of
going directly to the web to search for the keyword.
It then uses software to search for the information in the database. This software component
is known as web crawler.
Once web crawler finds the pages, the search engine then shows the relevant web pages as a
result. These retrieved web pages generally include title of page, size of text portion, first
several sentences etc.
These search criteria may vary from one search engine to the other. The retrieved information is
ranked according to various factors such as frequency of keywords, relevancy of information, links
etc.
User can click on any of the search results to open it.
56
SUB: INTERNET AND APPLICATIONS
Architecture
The search engine architecture comprises of the three basic layers listed below:
Content collection and refinement.
Search core
User and application interfaces
57
SUB: INTERNET AND APPLICATIONS
SEARCH TOOLS
Definition - Utilities available on the Internet to help you find information among the millions of
documents on the Web.
Search Tools are categorized into three types:
1. Internet Directories: It will classify information by topic and also allows you to choose one
of the topics or type a keyword or phrase to search
2. Search Engines: A search engine will search the entire contents of the Internet by
keyword(s).
3. Meta-Search Engines: A meta-search engine will search a dozen different search engines
and directories simultaneously and display the ten best responses from each search engine
Each type of searching tool accomplishes a different task and locates information in a different way.
Search Engines:
AltaVista- http://altavista.com - searches through more than 50 million Web pages. Use "+" to indicate
words that must be contained on a page. Use "-" for words that must not be contained on pages.
Quotation marks must be used for searching phrases.
KidsClick http://sunsite.berkeley.edu/KidsClick - a database of more than 5,000 records of interest to
kids.
MathSearch - http://www.maths.usyd.edu.au/MathSearch.html - More than 190,000 Web documents
from mathematics and statistics servers.
Subject Directories
Yahooligans - http://www.yahooligans.com A student-friendly Search tool allowing students to
browse and do subject category searches. Lycos: http://www.lycos.com A very large database. It has
specialty areas for locating Librarian's Index to the Internet: http://sunsite.berkeley.edu/InternetIndex
Meta-Search
DogPile: http://www.dogpile.com
Metacrawler: http://www.metacrawler.com
58
SUB: INTERNET AND APPLICATIONS
FIREWALLS
A firewall is a network security system that monitors and controls incoming and outgoing network
traffic based on predetermined security rules. A firewall typically establishes a barrier between a
trusted internal network and untrusted external network, such as the Internet.
A Firewall may be simply defined as a single point between two or more networks where all traffic
must pass; the firewall authenticates controls and logs all the traffic.
In the computing world Firewall is software or hardware based network security system that controls
incoming and outgoing network traffic by analyzing data packets and determining whether they should
be allowed through or not based on a certain rule set. It can have a variety of configuration depending
upon the user requirement. It builds a bridge between internal and external network and protects
against.
• Remote login
• Application back doors
• Virus, spam, malware etc.
A Firewall accomplishes controlled access using
• Packet filtering
• Circuit level gateway
• Application level gateway
• Stateful inspection
• Provides Proxy servers that receives and interprets service requests before it is passed on
Direction Control:
Determines the direction in which a particular service request may be initiated and allowed to flow
through the firewall
User Control:
• Controls access to a service according to which user is attempting to access it
• Typically applied to the users inside the firewall perimeter
• Can be applied to the external users too by using secure authentication technique
Behavioral Control:
• Controls how a particular service is used
• For example, a firewall may filter email to eliminate spam
• Firewall may allow only a portion of the information on a local web server to an external user
Firewall Capabilities
Important capabilities of a firewall system are listed below:
• It defines a single choke point to keep unauthorized users out of protected network
• It prohibits potentially vulnerable services from entering or leaving the network
• It provides protection from various kinds of IP spoofing
• It provides a location for monitoring security-related events
• Audits and alarms can be implemented on the firewall systems
• A firewall is a convenient platform for several internet functions that are not security related
• A firewall can serve as the platform for IPSec using the tunnel mode capability and can be used to
implement VPNs
Limitations of a Firewall
Main limitations of a firewall system are given below:
• A firewall cannot protect against any attacks that bypass the firewall. Many organizations buy
expensive firewalls but neglect numerous other back-doors into their network
• A firewall does not protect against the internal threats from traitors. An attacker may be able to break
into network by completely bypassing the firewall, if he can find a ``helpful'' insider who can be
fooled into giving access to a modem pool
• Firewalls can't protect against tunneling over most application protocols. For example, firewall
cannot protect against the transfer of virus-infected programs or files
Types of Firewall
On the basis of Traffic controlling technique Firewall can be categorized into the following four:
1. Packet Filtering Firewall
It operates by filtering the incoming and outgoing packets using routers or devices that have been
configured to screen.
It examines the information contained in TCP and IP packet headers, in order to accept or deny
packets from entering or leaving the network. It checks the following attributes
Source address.
Destination address.
Application or protocol.
60
SUB: INTERNET AND APPLICATIONS
61
SUB: INTERNET AND APPLICATIONS
Integration Module: It integrates the active firewall element into the communication system with the
help of device drivers. In case of packet filters, the integration is above the Network Access Layer,
where as it are above the Transport layer ports in case of Application Gateway.
Analysis Module: Based on the capabilities of the firewall, the communication data is analyzed in the
Analysis Module. The results of the analysis are passed on to the Decision Module.
Decision Module: The Decision Module evaluates and compares the results of the analysis with the
security policy definitions stored in the Rule set and the communication data is allowed or prevented
based the outcome of the comparison.
Processing module for Security related Events: Based on rule set, configuration settings and the
message received from the decision module, it writes on the logbook and generates alarm message to
the Security Management System.
Authentication Module: This module is responsible for the identification and authentication of the
instances that are communicated through the firewall system.
Rule set: It contains all the information necessary to make a decision for or against the transmission of
communication data through the Firewall and it also defines the security related events to be logged.
Logbook: All security-related events that occur during operation are recorded in the logbook based on
the existing rule set.
Security Management System: It provides an interface where the administrator enters and maintains
the rule set. It also analyses the data entered in the logbook.
62
SUB: INTERNET AND APPLICATIONS
DATA SECURITY
Introduction
Due the rapid growth and widespread use of information and communication technologies, Internet
services as well as numerous occurrences of international terrorism, demands better methods of
protecting computers, data and information.
Data
- Collection of data objects and their attributes
- An attribute is a property or characteristic of an object
Examples: eye color of a person, temperature, etc.
- A collection of attributes describe an object.
Object is also known as record, point, case, sample, entity, or instance
Information
Collection of organization data or preparing data to take the decision , where
Data + Processing = Information
Example: book is data while my book is information.
Definition
Data security is the protection of programs and data in computers and communication systems against
unauthorized modification, destruction, disclosure or transfer whether accidental or intentional.
Data control It is the measures taken to enforce the security of the programs and data. Data can be
lost in various ways, such as viruses, user errors, computer crashes, hacking etc. In order to protect
against data loss, controls need to be put in place.
Data Security Core Principles
The three core principles of data security also referred to as information security are confidentiality,
integrity and availability.
63
SUB: INTERNET AND APPLICATIONS
Data Security Refer to the term Cryptography is one of the mathematical application that is useful in
transforming that data through an insecure communication network, which is the worst case.
As a result: security has two parts:
1. Cryptography
2. Physical pretiction
cryptography the art or science encompassing the principles and methods of transforming an
intelligible message into one that is unintelligible, and then retransforming that message back
to its original form
plaintext the original intelligible message
ciphertext the transformed message
cipher an algorithm for transforming an intelligible message into one that is unintelligible by
transposition and/or substitution methods
key some critical information used by the cipher, known only to the sender & receiver
encipher the process of converting plaintext to ciphertext using a cipher and a key
decipher the process of converting ciphertext back into plaintext using a cipher and a key
cryptanalysis the study of principles and methods of transforming an unintelligible message
back into an intelligible message without knowledge of the key.
cryptology both cryptography and cryptanalysis
64
SUB: INTERNET AND APPLICATIONS CLASS: II-B.Sc CS
SEM: IV STAFF NAME: K.VINOTHKUMAR
5 MARKS
1. Write short note on types of proxy server. Page 51 - 52
2. Explain in detail about web browser. Page 52 - 53
3. Write short note on function of web browser. Page 53
4. Explain in detail about Search tools. Page 56 – 57
10 MARKS
1. Explain about firewall in detail Page 59 - 62
2. Explain about data security in detail Page 63 – 64
3. Explain detail about search Engines. Page 55 – 57
4. Explain detail about Web Server. Page 46 – 48
5. Explain detail about Proxy Server. Page 49 – 52
65
SUB: INTERNET AND APPLICATIONS
UNIT – IV
Internet Relay Chat - Types of Network - Packet Switched Network - Circuit Switched Network -
TCP/IP - Internet Protocol.
66
SUB: INTERNET AND APPLICATIONS
In its simplest form, it is a medium in which people can interact with one another textually in real-
time. The interaction can take place in channels (chat rooms) with a variety of topics or even be peer to
peer. Any individual with an IRC client can join a server, participate in a particular channel or even
create their own.
TYPES OF NETWORK
Networks Definition:
A network is a set of nodes connected by media links. A node can be a computer, printer, or any
other device capable of sending or receiving data generated by other nodes on the network. The links
connecting the devices are often called communication channels.
Distributed processing
Networks use distributed processing, in which a task is divided among multiple computers.
Advantages of distributed processing include the following:
Security / Encapsulation
Distributed databases
Faster problem solving
Network Criteria
The three criteria necessary for an effective and efficient network are performance, reliability and
security
Performance – The performance of a network depends on a number of factors, including the
number of users, the type of transmission medium, the capabilities of the connected hardware,
and the efficiency of the software.
Reliability – The network ability is measured by frequency of failure, the time it takes a link to
recover from a failure, and the network’s robustness in a catastrophe.
Security – Network security issues include protecting data from unauthorized access and viruses.
67
SUB: INTERNET AND APPLICATIONS
Applications
The network applications in different fields are the following:
Marketing and sales
Financial services
Manufacturing
Electronic messaging
Categories of Networks
Communication Networks can be of following 5 types:
1. Local Area Network (LAN)
2. Metropolitan Area Network (MAN)
3. Wide Area Network (WAN)
4. Wireless
5. Inter Network (Internet)
68
SUB: INTERNET AND APPLICATIONS
Characteristics of LAN
LAN's are private networks, not subject to tariffs or other regulatory controls.
LAN's operate at relatively high speed when compared to the typical WAN.
There are different types of Media Access Control methods in a LAN, the prominent ones are
Ethernet, Token ring.
It connects computers in a single building, block or campus, i.e. they work in a restricted
geographical area.
Applications of LAN
One of the computer in a network can become a server serving all the remaining computers
called clients. Software can be stored on the server and it can be used by the remaining
clients.
Connecting locally all the workstations in a building to let them communicate with each
other locally without any internet access.
Sharing common resources like printers etc are some common applications of LAN.
Advantages of LAN
Resource Sharing: Computer resources like printers, modems, DVD-ROM drives and hard
disks can be shared with the help of local area networks. This reduces cost and hardware
purchases.
Software Applications Sharing: It is cheaper to use same software over network instead of
purchasing separate licensed software for each client a network.
Easy and Cheap Communication: Data and messages can easily be transferred over
networked computers.
Centralized Data: The data of all network users can be saved on hard disk of the server
computer. This will help users to use any workstation in a network to access their data.
Data Security: Since, data is stored on server computer centrally, it will be easy to manage
data at only one place and the data will be more secure too.
Internet Sharing: Local Area Network provides the facility to share a single internet
connection among all the LAN users. In Net Cafes, single internet connection sharing system
keeps the internet expenses cheaper.
Disadvantages of LAN
High Setup Cost: Although the LAN will save cost over time due to shared computer
resources, but the initial setup costs of installing Local Area Networks is high.
Privacy Violations: The LAN administrator has the rights to check personal data files of
each and every LAN user. Moreover he can check the internet history and computer use
history of the LAN user.
Data Security Threat: Unauthorised users can access important data of an organization if
centralized data repository is not secured properly by the LAN administrator.
LAN Maintenance Job: Local Area Network requires a LAN Administrator because, there
are problems of software installations or hardware failures or cable disturbances in Local
Area Network. A LAN Administrator is needed at this full time job.
Covers Limited Area: Local Area Network covers a small area like one office, one building
or a group of nearby buildings.
69
SUB: INTERNET AND APPLICATIONS CLASS: II-BCA
SEM: IV STAFF NAME: V.BALASUBRAMANIYAM
Metropolitan Area Network (MAN)
It was developed in 1980s.It is basically a bigger version of LAN. It is also called MAN and uses the
similar technology as LAN. It is designed to extend over the entire city. It can be means to connecting
a number of LANs into a larger network or it can be a single cable. It is mainly hold and operated by
single private company or a public company.
Characteristics of MAN
It generally covers towns and cities (50 km)
Communication medium used for MAN are optical fibers, cables etc.
Data rates adequate for distributed computing applications.
Advantages of MAN
Extremely efficient and provide fast communication via high-speed carriers, such as fibre
optic cables.
It provides a good back bone for large network and provides greater access to WANs.
The dual bus used in MAN helps the transmission of data in both directions simultaneously.
A MAN usually encompasses several blocks of a city or an entire city.
Disadvantages of MAN
More cable required for a MAN connection from one place to another.
It is difficult to make the system secure from hackers and industrial espionage(spying)
graphical regions.
70
SUB: INTERNET AND APPLICATIONS
Characteristics of WAN
It generally covers large distances (states, countries, continents).
Communication medium used are satellite, public telephone networks which are connected
by routers.
Advantages of WAN
Covers a large geographical area so long distance business can connect on the one network.
Shares software and resources with connecting workstations.
Messages can be sent very quickly to anyone else on the network. These messages can have
picture, sounds or data included with them(called attachments).
Expensive things(such as printers or phone lines to the internet) can be shared by all the
computers on the network without having to buy a different peripheral for each computer.
Everyone on the network can use the same data. This avoids problems where some users may
have older information than others.
Disadvantages of WAN
Need a good firewall to restrict outsiders from entering and disrupting the network.
Setting up a network can be an expensive, slow and complicated. The bigger the network the
more expensive it is.
Once set up, maintaining a network is a full-time job which requires network supervisors and
technicians to be employed.
Security is a real issue when many different people have the ability to use information from
other computers. Protection against hackers and viruses adds more complexity and expense.
Wireless Network
Digital wireless communication is not a new idea. Earlier, Morse code was used to implement
wireless networks. Modern digital wireless systems have better performance, but the basic idea is the
same.
Wireless Networks can be divided into three main categories:
1. System interconnection
2. Wireless LANs
3. Wireless WANs
System Interconnection
System interconnection is all about interconnecting the components of a computer using short-range
radio. Some companies got together to design a short-range wireless network called Bluetooth to
connect various components such as monitor, keyboard, mouse and printer, to the main unit, without
wires. Bluetooth also allows digital cameras, headsets, scanners and other devices to connect to a
computer by merely being brought within range.
In simplest form, system interconnection networks use the master-slave concept. The system unit is
normally the master, talking to the mouse, keyboard, etc. as slaves.
Wireless LANs
These are the systems in which every computer has a radio modem and antenna with which it can
communicate with other systems. Wireless LANs are becoming increasingly common in small offices
71
SUB: INTERNET AND APPLICATIONS CLASS: II-BCA
SEM: IV STAFF NAME: V.BALASUBRAMANIYAM
and homes, where installing Ethernet is considered too much trouble. There is a standard for wireless
LANs called IEEE 802.11, which most systems implement and which is becoming very widespread.
Wireless WANs
The radio network used for cellular telephones is an example of a low-bandwidth wireless WAN. This
system has already gone through three generations.
The first generation was analog and for voice only.
The second generation was digital and for voice only.
The third generation is digital and is for both voice and data.
Inter Network
Inter Network or Internet is a combination of two or more networks. Inter network can be formed by
joining two or more individual networks by means of various devices such as routers, gateways and
bridges.
Internetworks
The networks are connected to form an Internetwork.
72
SUB: INTERNET AND APPLICATIONS
Example:
The Internetwork is made of five networks:
Four LANs and
One WAN.
If host A needs to send a data packet to host D, the packet first needs to go from A to S1, then from
S1 to S3, and finally from S3 to host D. We say that the data packet passes through three links.
Need for Network Layer
To solve the problem of delivery through several links, the network layer was designed. The network
layer is responsible for host-to-host delivery and for routing the packets through the routers or
switches.
Network Layer at Source - it is responsible for creating a packet that carries two universal addresses: a
destination address and a source address. The source network layer receives data from the transport
layer, adds the universal address of host A and D and check for its size. The network layer at the
source may also add fields for error control.
Network Layer at Router or Switch- responsible for routing the packet. When a packet arrives, the
router or switch finds the interface from which the packet must be sent. This is done by using a routing
table.
Network Layer at Destination – The network layer at the destination is responsible for address
verification; it makes sure that the destination address on the packet is the same as the address of the
host.
Internet as a Packet –Switched Network – The internet, at the network layer, is a packet-switched
network. In general, switching can be divided into two broad categories: circuit switching and packet
switching.
73
SUB: INTERNET AND APPLICATIONS
74
SUB: INTERNET AND APPLICATIONS
All address information is only transferred during setup phase. Once the route to destination is
discovered, entry is added to switching table of each intermediate node. During data transfer, packet
header (local header) may contain information such as length, timestamp, sequence number etc.
Connection-oriented switching is very useful in switched WAN
75
SUB: INTERNET AND APPLICATIONS
1. Transmission Delay:
Time taken to put a packet onto link. In other words, it is simply time required to put data bits on the
wire/communication medium. It depends on length of packet and bandwidth of network.
2. Propagation delay:
Time taken by the first bit to travel from sender to receiver end of the link. In other words, it is simply
the time required for bits to reach destination from start point. Factors on which Propagation delay
depends are Distance and propagation speed.
3. Queuing Delay:
Queuing delay is the time a job waits in a queue until it can be executed. It depends on congestion. It
the time difference between when packet arrived Destination and when the packet data was processed
or executed. It may be caused by mainly three reasons i.e. originating switches, intermediate switches
or call receiver servicing switches.
4. Processing Delay :
Processing delay is the time it takes routers to process the packet header. Processing of packets help in
detecting bit-level errors that occur during transmission of packet to destination. Processing delays in
high-speed routers are typically on the order of microseconds or less.
CIRCUIT SWITCHED NETWORK
In circuit switching network resources (bandwidth) is divided into pieces and bit delay is constant
during a connection. The dedicated path/circuit established between sender and receiver provides a
guaranteed data rate. Data can be transmitted without any delays once the circuit is established.
Telephone system network is the one of example of Circuit switching.
Two methods of multiplexing multiple signals into a single carrier are
1. Frequency Division Multiplexing: Divides into multiple bands
Frequency Division Multiplexing or FDM is used when multiple data signals are combined
for simultaneous transmission via a shared communication medium. It is a technique by
which the total bandwidth is divided into a series of non-overlapping frequency sub-bands,
where each sub-band carry different signal. Practical use in radio spectrum & optical fiber to
share multiple independent signals.
76
SUB: INTERNET AND APPLICATIONS
77
SUB: INTERNET AND APPLICATIONS
5. In circuit switching the routing decision is made when path is set up across the network. After the
link has been set between the sender and receiver, the information is forwarded continuously over the
link.
6. The dedicated path established between the sender and the receiver is maintained for entire duration
of conversation.
7. This link or path is released only when data transmission between sender and receiver is over.
8. Circuit switching takes place at the physical layer.
9. Before starting communication, the stations must make a reservation of resources to be used during
the communication. These resources can be switch buffers, switch processing time, switch input/output
ports. These resources remain dedicated during the entire duration of data transfer.
10 Data transferred between the two stations are not packetized (i.e. in form of packets). The data are a
continuous flow· sent by the source station and received by the destination station and there may be
periods of silence.
11. There is no addressing involved in data transfer. The switches route the data based on their
occupied band (FDM) or time slot (TDM). However, there is end-to-end addressing used during set up
phase.
12. In telephone systems circuit switching is used.
13. The communication in a circuit switched network takes place in three phases:
1. Circuit establishment or setup phase: In circuit .switched network, before actual data transfer
takes place, a dedicated circuit or path is established between the sender and receiver. End-to-
End addressing (i.e. source and destination address) is required for creating a connection
between two end systems.
2. Data transfer phase: Actual data transfer between the source and destination takes place after
the dedicated path is set up between them. The data flows are continuous between sender and
receiver. There may be periods of silence in between. Generally all the internal connections are
duplex.
3. Circuit disconnects or tears down phase: When one of the parties needs to disconnect, a signal
is sent to each switch to release the resources.
78
SUB: INTERNET AND APPLICATIONS
Circuit Switch
A circuit switch is a device that creates a temporary connection between an input link and output link.
A circuit switch usually has n input lines and m output lines i.e. number of input lines and number of
output lines may not be equal.
TCP/IP
TCP/IP means Transmission Control Protocol and Internet Protocol. It is the network model used in
the current Internet architecture as well. Protocols are set of rules which govern every possible
communication over a network. These protocols describe the movement of data between the source
and destination or the internet. They also offer simple naming and addressing schemes.
79
SUB: INTERNET AND APPLICATIONS
80
SUB: INTERNET AND APPLICATIONS
Diagrammatic Comparison between OSI Reference Model and TCP/IP Reference Model
82
SUB: INTERNET AND APPLICATIONS
INTERNET PROTOCOL
IP (Internet Protocol) is a Network Layer Protocol.
Several versions are most popular (IPv4).
Gaining popularity is IPv6 due to increased addressing space and security handling.
IP and the Internet Architecture:
IP is the highest layer protocol which is implemented at BOTH routers and hosts.
IP Service
Delivery service of IP is minimal
IP provide provides an unreliable connectionless best effort service (also called:“datagram service”).
1. Unreliable: IP does not make an attempt to recover lost packets
2. Connectionless: Each packet (“datagram”) is handled independently. IP is not aware that
packets between hosts may be sent in a logical sequence
3. Best effort: IP does not make guarantees on the service (no throughput guarantee, no delay
guarantee,…)
Consequences:
1. Higher layer protocols have to deal with losses or with duplicate packets
2. Packets may be delivered out-of-sequence
83
SUB: INTERNET AND APPLICATIONS
IP Datagram Format:
Internet Protocol is connectionless and unreliable protocol. It ensures no guarantee of successfully
transmission of data. In order to make it reliable, it must be paired with reliable protocol such as TCP
at the transport layer. Internet protocol transmits the data in form of a datagram as shown in the
following diagram:
84
SUB: INTERNET AND APPLICATIONS
Identification (16 bits): Unique identification of a datagram from a host. Incremented whenever a
datagram is transmitted
Flags (3 bits):
1. First bit always set to 0
2. DF bit (Do not fragment)
3. MF bit (More fragments)
Time To Live (TTL) (1 byte): Specifies longest paths before datagram is dropped
Role of TTL field: Ensure that packet is eventually dropped when a routing loop occurs
Used as follows: Sender sets the value (e.g., 16)
Each router decrements the value by 1
When the value reaches 0, the datagram is dropped
Protocol (1 byte): Specifies the higher-layer protocol.
Used for demultiplexing to higher layers.
Header checksum (2 bytes): A simple 16-bit long checksum which is computed for the header of the
datagram.
Options:
Security restrictions
Record Route: each router that processes the packet adds its IP address to the header.
Timestamp: each router that processes the packet adds its IP address and time to the header.
(loose) Source Routing: specifies a list of routers that must be traversed.
(strict) Source Routing: specifies a list of the only routers that can be traversed.
Padding: Padding bytes are added to ensure that header ends on a 4-byte boundary
5 MARKS
1. Write short note on Internet Relay Chat Page 66 - 67
2. Write short note on wireless network Page 71 - 72
3. Write short note on internetwork Page 73
4. Differentiate OSI vs TCP / IP Page 81
10 MARKS
1. Explain about TCP/IP in detail Page 79 - 81
2. Explain about Packet switched network in detail Page 74 - 76
3. What are the types of networks? Page 67 - 71
4. Explain about Circuit Switched Network. Page 76 – 79
5. Explain about IP. Page 83 – 85
86
SUB: INTERNET AND APPLICATIONS
UNIT - V
Case Study: Online Passport – Online Gas Services – Online Train Reservation – Tamilnadu
government services
CASE STUDY
ONLINE PASSPORT
The Passport Seva Project was launched by the Ministry of External Affairs with the objective of
delivering Passport Services to the citizens in a comfortable environment with wider accessibility and
reliability. The project envisages setting up of Passport Seva Kendras (PSKs) across the country, a
Data Centre and Disaster Recovery Centre, Call centre operating in multiple Indian languages, and a
centralized nationwide computerized system for issuance of passports.
With the implementation of the Passport Seva Project, Passport Seva Kendras are working as extended
arms of Regional Passport Offices.
An applicant may ascertain the jurisdiction of Regional Passport Office and Passport Seva Kendra
before submitting an application.
Visit Passport Seva Project for more information.
Passport Services
87
SUB: INTERNET AND APPLICATIONS
For issue of fresh passport and reissue of passport, you need to fill the application form online via e-
Form Submission (preferred) or via Online Form Submission. Apart from this applicant can submit the
application form directly in the respective CPO/passport office/ Passport Seva Kendra (PSK)/District
Passport Cell (DPC)/Speed post centres.
The various passport services are:
I. Issue of Fresh Passport: You can apply for fresh passport if applying for the first time.
II. Reissue of Passport: You can apply for reissue of passport if you want another passport in
lieu of an existing passport for any of the following reasons:
Change in existing personal particulars.
Validity expired within 3 years/ Due to expire.
Validity expired more than 3 years ago.
Exhaustion of pages.
Damaged passport.
Lost passport.
If you ever held a passport in the past, no matter how much long back or at what age, you should
choose the Re-Issue category only.
Miscellaneous Service: Issue of Police Clearance Certificate (PCC)
Liberalization of Police Verification procedure for passport issuance
Police Verification (PV) has been an integral part of Passport issuance process since its inception.
The modalities of police verification have undergone various changes from time to time, whereas the
principles have remained the same i.e., ascertaining the applicant’s identity, citizenship and absence of
criminal antecedents.
In order to further improve and liberalize Police Verification procedure for passport issuance, the
Government has decided that henceforth normal passport applications of all first time applicants
furnishing Aadhaar, Electoral Photo Identity Card (EPIC), Permanent Account Number (PAN) Card
and an affidavit in the format of Annexure-I will be processed on Post-Police Verification basis,
enabling faster issue of passport, without payment of any additional fees, subject to successful online
validation of Aadhaar number. In addition, EPIC and PAN card may also be validated, if required,
from the respective databases.
In addition to the above, Ministry has also launched mPassport Police App for speedy submission of
Police Verification Report (PVR). The App would facilitate the field level verification officers to
directly capture the PV report into the system digitally.
With the launch of this App, the need to download and print the physical Personal Particulars Form
and questionnaire would no longer be required resulting in paperless end-to-end digital flow of the PV
process, further reducing the time required for completion of PVR, within the desired time limit of 21
days.
Source: Ministry of External Affairs
Procedures
Under Passport Seva, new measures and procedures have been introduced in order to improve
governance in Passport Offices. The new measures and procedures are aimed at ensuring citizens'
comfort, improvement in delivery of passport services, transparency and enhanced security.
88
SUB: INTERNET AND APPLICATIONS
Applicants are now required to present themselves at the respective Passport Seva Kendra (PSK) for
enabling the Passport Issuing Authority to obtain applicants' photographs, biometrics and granting
decision in their presence.
Online application and Appointment
The Online Appointment system has been introduced to ensure avoiding congestion at the Passport
Seva Kendras (PSKs) and cutting down the waiting time for applicants. Appointment date/time will be
automatically allotted by the system as per the availability of appointment slots at the desired PSK.
steps to be followed for online application and appointment
Online registration, filling up and submitting online application form, (alternatively,
download e-form, fill up and upload the same at the Online Portal)
Fix the Schedule (Online Appointment Booking instruction) for an appointment and visit a
Passport Seva Kendra (PSK) for completing the process. To know the appointment
availability for the passport office of your choice, .
Following steps may be followed to obtain and manage appointment:
Step 1: Visit the website passportindia.gov.in;
Step 2: Register ‘user name’ and assign a ‘password’;
Step 3: Log in using your ‘user name’ and ‘password’;
Step 4: Fill online application form as the case may be and submit online (alternatively,
download e-form, fill up and upload the same at the portal). Uploading of documents is
optional;
Step 5: Now take an appointment to visit the nearest Passport Seva Kendra (appointments are
released region-wise). It is advised that the citizen should be ready with step ‘1’ to ‘4’ above
before the ‘appointment release time’. As soon as appointments are released (please see
region-wise timings), they should click on ‘Schedule Appointment’ link to book the
appointment. Appointment will be automatically booked and allocated to you if available.
Note: Prior payment of passport service fee has been mandatory for booking appointments at PSKs.
For this purpose, the Online Payment feature has been introduced through the Passport Seva Online
Portal. Online Payment can be made using any one of the following modes:
89
SUB: INTERNET AND APPLICATIONS
Step 3: Select the Mode of Payment (NET BANKING or CARD PAYMENTS), follow the
instructions and make payment. Please do not click the Back button or refresh the page, as this may
lead to failure of transaction.
Step 4: Once the payment is successful, an appointment will be booked automatically for the selected
Passport Seva Kendra and the “Appointment Confirmation” screen of PSP Portal will be displayed.
Step 5: Take a printout of the Application (ARN) Receipt, and carry it along while visiting the
Passport Seva Kendra on the given appointment date/time.
Visit passportindia.gov.in for more information about e-Form and it's submission.
90
SUB: INTERNET AND APPLICATIONS
the date of appointment and as per the time mentioned in the appointment slip. On-line appointment is
not mandatory for these applicants;
Step 3: Some categories are allowed as Walk-in applicants and obtaining online appointment is not
mandatory. [Please see below: - Walk-in Appointments with online Registration]
Step 4: In case you are unable to secure appointment or don’t fall under Walk-in category, you may
visit concerned Passport Office for submission of manual passport application form if permitted by the
concerned RPO [Please refer the section Manual Submission of Applications that is given below].
Alternatively RPO may consider giving staggered appointments keeping in view the load/capacity at
the respective PSK under their jurisdiction. Tatkaal and other urgency applications will be given
preference in allotting appointments through this route.
Such applicants should fill-up the application online, generate 'Application Reference Number' and
visit RPO along with printed copy of 'ARN Sheet';
91
SUB: INTERNET AND APPLICATIONS
92
SUB: INTERNET AND APPLICATIONS
Alternatively, you can also get in touch with the Indane Gas customer care to find out your
nearest distributor.
Submit the Documents Required:-
Your distributor will ask you to submit a completely filled in application form along with
KYC documents like Proof of Address and Proof of Identity.
Also, submit two photograph copies and proof for subsidy, if applicable.
Confirmation:-
Your dealer will send you a confirmation by message or email acknowledging the request
that you have placed for a new gas connection.
You can also check your application status online at the Indane Gas LPG portal
Credit Score of 750 = Easy approval on Loans/Credit Card! Check now in less than 3 min!
Documents Required for Indane Gas New Connection:-
While requesting a new Indane Gas connection, customers will be required to submit some KYC
documents for their application to be processed. If the customer is applying online, he must attach the
KYC documents and if the customer is applying directly at the distributor’s showroom, he must submit
the documents given below with the application form.
Aadhaar Card
Driving License
Voter ID
Lease Agreement
Recent telephone, water or electricity bills
Passport
LIC policy
Bank account statement or credit card statement
House registration document
Flat possession letter
From the above given list, all relevant documents are to be submitted by the customer while applying
for a new Indane Gas Connection.
Indane Gas Booking Procedure:-
Customer can book a refill Indane gas cylinder using the website, mobile app or the IVRS system. The
customer can also directly contact the nearest dealer to make the booking for a refill cylinder.
Online Indane Gas Booking Procedure:-
All registered Indane Gas customers can book a refill gas cylinder online by providing details like the
17 digit LPG ID, PAN card number, consumer number and contact address.
You will have to log onto that portal using the user id and password.
Just fill in the form to book an Indane Gas cylinder easily and submit to place an order.
You will be able to track the status of your booking online and pay directly to the distributor
after delivery.
Indane Gas Booking through SMS:-
Consumers can also book an Indane Gas refill using the SMS facility. Just send out an SMS in the
format - IOC to the IVRS number for your area.
Indane Gas Booking through IVRS:-
93
SUB: INTERNET AND APPLICATIONS
Customers will be able to place a booking for a refill Indane LPG cylinder using the IVRS facility in
three language options including their regional language. Customers just have to enter the STD code of
the distributor and the the consumer number to make a booking.
Indane Gas Booking using Mobile App:-
Indane has come up with a mobile App for Android and iOS and customers can directly download the
mobile app to register a request for refill cylinder and also to place request for a second gas cylinder.
The customer just has to enter details like the consumer number, distributor details and other contact
information.
Get your Credit Score FREE in less than 3 minutes
Indane Gas Booking Through Distributors:-
Customers can visit their nearest distributor to place a request for an Indane refill cylinder. The
customer will have to provide details including customer number and contact details to place a request.
Indane Gas Cylinder Prices:-
Indane provides domestic as well as commercial LPG cylinders. From 5KG to 19KG, subsidized to
non-subsidized, the prices varies for different areas. If you want to know the exact prices of the Indane
gas products, please click here: Indane Gas Cylinder Price
Advantages of Indane Gas Online Application Process:-
The new age LPG gas customers want a hassle free experience when booking a new connection,
requesting a gas refill or surrendering a connection. Keeping this in mind, Indane Gas has come up
with the e-SV initiative which will offer an array of benefits for the customers. Here are some of the
advantages that come with the Indane Gas online application process.
Intimations and Tracking:-
Consumers can track their request and get intimations by email and SMS at various stages of
processing which will keep them informed about the progress
Better Monitoring of New Connections:-
Every new stage in a new LPG gas connection release can be monitored electronically via the e-SV
process and this will lead to a significant reduction in time taken for the release of a new connection.
Consumer Awareness:-
While applying for a new Indane LPG gas connection, consumers can read and go through all the
conditions applicable for availing an LPG connection.
Consumer Choice:-
The prospective customer can make a new choice regarding the type of connection including single
cylinder, double cylinder and also other products like hot plate etc. Since the customers can select
these products directly from the online portal, forced selling by distributors is reduced.
Cashless Transactions:-
Prospective consumers can pay using their credit cards and debit cards or net banking through a strong
online payment gateway. Making a payment online reduces the possibility of overcharging and also
helps customers make immediate purchase decisions.
94
SUB: INTERNET AND APPLICATIONS
distributor or fill forms to apply for a new Indane Gas connection. Also, the original Subscription
Voucher (SV) copy will be sent directly to the customer’s residence along with the equipment
requested.
Online De-Duplication Process:-
The e-SV facility offered by Indane Gas is integrated with online de-duplication check for multiple
LPG gas connections before releasing a connection to a prospective customer. Thanks to this process,
the possibility of releasing multiple connections to the same household and the blocking of gas
connection at a later date is avoided.
FAQs on Indane Gas:-
What are the Value Added Services offered by Indane Gas?
Indane Gas distributors offer value added services to its customers in the form of high efficient thermal
LPG stoves, Suraksha safety hoses and BIS approved portable fire extinguishers.
Who do I call if I have a query regarding my Indane LPG connection?
For any queries regarding your Indane gas connection, call on the customer care number provided for
your region. These are available throughout the day. You can also contact an officer from the
company, details of which are available on the Indane website.
What is Indane Preferred Time Delivery?
Usually, LPG cylinders are delivered based on booking numbers. However, in the case of Preferred
Time Delivery, you can choose a delivery slot on a day on your choice at an additional charge. The
charges depend on the time of day selected.
Are there options for Indane Preferred Time Delivery customers?
Yes, there are three slots available for Preferred Time Delivery customers, as mentioned below:
Preferred Time customer- you can choose a preferred time from Monday to Friday.
Preferred Day and Time customer- you can choose the day as well as the time slot for
delivery.
Saturday/Sunday Preferred customer- you can choose a time slot on either Saturday or
Sunday for cylinder delivery.
How do I register for the Indane Preferred Delivery option?
To become a Preferred Delivery customer, you will have to register yourself on the Indane website or
you can submit an application to this effect at your local Indane LPG distributor.
Does Indane conduct a safety audit on its products? If so, when does this take place?
Indane conducts a safety audit of all its products, from the safety hose to the regulator and stove or
hotplate. The audit is conducted once every 2 years, and you are required to schedule a visit by an
Indane mechanic. The mechanic will conduct a thorough check of the entire LPG apparatus.
What is the cost of the safety audit?
The safety audit costs Rs.75, which is payable to your Indane LPG distributor. You will also have to
schedule the visit through your distributor.
95
SUB: INTERNET AND APPLICATIONS
96
SUB: INTERNET AND APPLICATIONS
Tourism:-
Indian Railways Catering and Tourism Corporation also organises budget and deluxe package tours
for domestic and foreign tourists. A popular tourism package for budget tourists covering important
tourist destinations across India is called "Bharat Darshan". Luxury tourism packages are also
available, that involve special luxury trains such as Buddhist Circuit Train and Maharajas'
Express operation.
Apart from conventional tourism, it also offers adventure tourism packages that include water sports,
adventure and wildlife treks, etc. A provision for customising tours as per specific requirements is also
an added attraction. Recently a new venture of Indian Railways, named as Rail Tourism India has been
launched to provide direct catering and tourism packages to users.
Milestones
As a biggest e-commerce portal in India, it made lot of records.
On 2 September 2013, nearly 5,82,000 tickets booked in a day.
On 19 March 2014, nearly 5,80,000 tickets booked in a day.
On 1 April 2015, Indian Railway Catering and Tourism Corporation (IRCTC) created a new
national record with 13,45,496 tickets booked in a day.
On 2 April 2015, nearly 11,00,000 tickets booked in a day.
In April 2015, nearly 13,40,000 tickets booked in a day.
Along with the application, you should pay a small amount has fee to municipal office. If you fail to
register within the allotted time as said and if you find any difficulty in registration you can contact
any agents or consultants to make your work easy.
Apart from Indian Residents, NRI’s living in the US should obtain either birth certificate or non-
availability of birth certificate for them to apply for Green Card. Henceforth as you can see the usage
of a birth certificate is varied and is of priority.
I tried to get N-A-B-C Online from Tamilnadu government for my good old parents residing
with me in Florida.
As I cannot travel to Tamilnadu, solely for this purpose, I decided to hand over the job to a
reliable consultant. After making conversations with many consultants, I placed the order
with Christ Consultants.
I personally would suggest http://www.christconsultants.com/ for birth certificate services in
Tamil Nadu, Kerala, and Karnataka, as they are leaders in it; giving a good service at the
earliest. They are almost the third hand for most NRI’s in need
How to pay your Tamil Nadu Electricity Board’s (TNEB) electricity bill online:-
New users can sign up through this Web Page for payment of CC charges through Credit / Debit
cards or through Net Banking.The consumer has to sign up once for registration.This requires a
valid Consumer ID and an e-mail account.
With valid e-mail ID & Consumer Number the consumer chooses a unique username for entering
the web site.
On completion of registration requirements, an e-mail is generated to the consumer for
successful validation of e-mail ID. A click on the link in the e-mail will lead to user login screen.
The user shall login and key in his authenticated password for making payments through web
site.
Consumer number/username for which registration has been made cannot be modified and if
required, the user can be deleted through the support link and a fresh registration can be made.
One user can permanently register for many Consumer Numbers using "Add Consumer No"
button and shall pay during the corresponding collection cycle for the respective consumer.
Every consumer number has to be individually selected for making payment.
A print of the e-receipt could be generated.
The changes in consumer number and e-mail ID and other personal particulars could be carried
out using "Update Profile" button.
The user shall change his passwords frequently for security purposes using "Change Password"
button.
A “Forget password” link is available for generating e-mail to the registered mail-id which shall
furnish the current password.
Gone are those days when you had to stand in long queues to pay your electricity bills over the
counters. Apart from that, one also has to take almost half a day off from their work to stand in
long queues only to find that the server doesn’t work for the day.
Thanks to Tamil Nadu government, it has now facilitated the public to pay their electricity bills
online through its website, https://www.tnebnet.org/, at their convenience.
98
SUB: INTERNET AND APPLICATIONS
Choose the consumer number, if you have more than one consumer number.
Select the payment mode. For eg., Net banking or Credit Card or Debit Card
5 MARKS
1. Explain in detail about train reservation. PAGE 96 - 97
2. What are the Documents Required for Indane Gas New Connection. PAGE 93 - 94
3. What are the steps to be followed for online application and appointment? PAGE 98 - 99
4. Write the case study for gravity flow. PAGE 97 - 98
10 MARKS
1. Explain about processing of online passport PAGE 87 - 91
2. Explain about Tamilnadu government service. PAGE 97 - 100
3. Explain the case study of online reservation? PAGE 95 – 97
5. Write short note on online gas service. PAGE 91 - 95
101