0% found this document useful (0 votes)
401 views

Sbec-Internet and It's Applications

The document discusses the course "Internet and Its Applications" which covers topics like introduction to the internet, internet technologies, web servers, internet protocols, and case studies of online services. The course has 5 units - introduction to concepts like email, world wide web, browsers; technologies like modems, addressing; servers and search engines; network types; and case studies of online passport, gas, and train reservation services. The textbooks listed provide further information on HTML, programming for the internet, and internet and web technologies. Reference websites for online services in India are also provided.

Uploaded by

NAGARAJ G
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
401 views

Sbec-Internet and It's Applications

The document discusses the course "Internet and Its Applications" which covers topics like introduction to the internet, internet technologies, web servers, internet protocols, and case studies of online services. The course has 5 units - introduction to concepts like email, world wide web, browsers; technologies like modems, addressing; servers and search engines; network types; and case studies of online passport, gas, and train reservation services. The textbooks listed provide further information on HTML, programming for the internet, and internet and web technologies. Reference websites for online services in India are also provided.

Uploaded by

NAGARAJ G
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 102

SEMESTER IV

SKILL BASED ELECTIVE COURSE II


INTERNET AND ITS APPLICATIONS
UNIT -I
Introduction To The Internet: Computer in Business – Networking – Internet - E-mail – Resource
Sharing – Gopher – World Wide Web – Telnet – Bulletin Board Service – Wide Area
Information Service.

UNIT – II
Internet Technologies: Modem - Internet addressing – Physical connections – Telephone Lines –
Internet browsers – Internet Explorer – Netscape Navigator.

UNIT - III
Web server - proxy Server - Web Browser- Search Engines-Search Tools – Firewalls - Data Security.

UNIT – IV
Internet Relay Chat -Types of network - Packet Switched Network - Circuit Switched Network –TCP/IP
–Internet Protocol

UNIT - V
Case Study: Online Passport – Online Gas Services – Online Train Reservation – Tamilnadu
government services

TEXTBOOKS
1. C Xavier, “World Wide Web with HTML”, Tata McGraw Hill Education, 2000.
2. H.M.Deital, P.J. Deital,“Internet and World Wide Web – How to Program”, 4th Edition “PHI
Learning.
3. Raj kamal, “Internet and Web Technologies", 7th Reprint, Tata McGraw Hill Education,
2007.

REFERENCE WEBSITES
1. http://www.ebharatgas.com/
2. http://passportindia.gov.in/
3. https://www.irctc.co.in
4. http://www.tn.gov.in/

1
SUB: INTERNET AND APPLICATIONS
IV SEMESTER
UNIT -I
Introduction To The Internet: Computer in Business – Networking – Internet - E-mail – Resource
Sharing – Gopher – World Wide Web – Telnet – Bulletin Board Service – Wide Area Information
Service.

1. INTRODUCTION TO THE INTERNET:


When the computer was invented, it was considered a fast calculating device.
So people thought that computers could be used for business applications too because they need more
memory capacity.
The main difference between a scientific application and a business applications are as follows:
1. Scientific applications require only a small amount of input and give only a small amount of
output. But business applications need a high volume of data to be input and lengthy reports
are given as output
2. Scientific applications involve complex computations, whereas business applications involve
only simple additions, subtractions, etc.
When people thought that a computer could be used for business applications, an immediate need was
of a programming language, which would be suitable for such applications. Since FORTRAN, which
was very popular at that time, was not flexible enough for business applications, a new language
COBOL (Common Business Oriented Language) was developed.

2. COMPUTERS IN BUSINESS
 Computer-based business applications were called Business Data Processing Systems (BDPS) and
COBOL was largely used to design them.
 Business data was stored in the form of data files, and COBOL programs were used to process the
data files and generate useful reports.
 In COBOL, programs have very lengthy codes. Even a simple payroll system may require a
program of 500 lines and sometimes even more than 1000.
 Software that supports creation and management of data files easily and simple queries from the
data files and also gives reports in an attractive formal is called a Data Base Management System
(DBMS).
 Dbase was the first popular DBMS, version III became very popular.
 Foxbase was a similar DBMS. The same company updated the features of Foxbase and introduced
Foxpro. Now Foxpro is used in several small companies.
 At this stage a new technology called Graphical User Interface (GUI) was introduced. This
technology calls for designing programs in such a way that the user can see some pictures and
icons on the monitor, and selects them for giving input, which is very easy for the user.
 A GUI divides a program into two parts.
1. To managing the data files, called back end
2. To design pictures and icons to get input from the user, called the front end.
 The database management system which supports relational databases and relational features is
called a Relational Database Management System (RDBMS).

2
SUB: INTERNET AND APPLICATIONS

 Oracle 2000 being a popular one is given in several modules, which include:
 Oracle Workgroup 2000 (for the back end)
 Oracle Developer 2000 (for the front end)
 Oracle Designer 2000 (also for the front end)
 Oracle Power Object 2000 (also for the front end)
 Oracle Developer 2000 includes Forms 4.5 which is a tool for designing GUI, ane Report Writer
for designing and getting reports.
 There are some software’s which can be used only for the front end; such as applications software
is called a front-end tool Visual Basic, Visual C++ and Power Builder are some front-end tools.
 Visual Basic normally used with the back-end tool called Access. It can also be used with Oracle
Power Builder is popularly used with the RDBMS Sybase.
 Ingres, Informix, and Unify are some other RDBMS.
 Mainframe computers still use COBOL for business applications.
 Another system for business applications on mainframe computers is called DB/2.

3. NETWORKING
 A networking is a computers connected to each other.
 A centralized network is a network having a central computer (called a server) and other
computers called nodes.

Centralized Network
 Example: A centralized airline reservation system has a server at the main office and nodes al all
airports, travel agencies, etc.
 In some types of networks, no central server exists.
 All the computers are simply connected together through telephone connections and/or radio
waves.
 In centralized networks, a remote node can communicate only with the server, whereas in the other
type any two nodes can communicate with each other directly.
 In client server architecture, two types of software are needed for the system. The software needed
to do the work of the node is called client software.

3
SUB: INTERNET AND APPLICATIONS

 The software needed to run the central system is called the server. Clients always ask for resources
(software and data tiles) from the server which does the work of resource sharing.
 Computer networks support an enormous number of applications and services such as access to the
World Wide Web, digital video, digital audio, shared use of application and storage servers,
printers, and fax machines, and use of email and instant messaging applications as well as many
others.
 Computer networks differ in the transmission medium used to carry their signals, communications
protocols to organize network traffic, the network's size, topology and organizational internet. The
best-known computer network is the Internet.
Following is the list of hardware's required to set up a computer network:-
 Network Cables
 Distributors
 Routers
 Internal Network Cards
 External Network Cards

Characteristics of a Computer Network:-


 Share resources from one computer to another.
 Create files and store them in one computer, access those files from the other computer(s)
connected over the network.
 Connect a printer, scanner, or a fax machine to one computer within the network and let other
computers of the network use the machines available over the network.
4
SUB: INTERNET AND APPLICATIONS

4. INTERNET
 The Internet is the world's largest network of computer networks.
 There are more than 100 million users on the Internet, and they are growing rapidly by the day.

4.1 History of Internet


 In 1969, the American defense department wanted to connect all the computers in the Department
of Defense (DOD) offices and military research contractors including a large number of
universities doing military funded research. That network was called Advanced Research
Projects Agency Network (ARPANET), was also called DARPANET, the D for defense.
 It was very successful and all the universities wanted to get connected to ARPANET.
 At one stage the military officials wanted to preserve the unity of the DOD, and so divided the
network into two parts:
1. ARPANET
2. MILNET (Military Network)
 These two parts remained connected with a technical scheme called Internet Protocol (IP)
 The word protocol means "rules for meeting a person/king". On the Internet, if we want to contact
a person on another network, we need a protocol.
 Network designers have designed several protocols now, and some of them are as follows:
 Simple Mail Transfer Protocol (SMTP)
 Point-to-Point Protocol (PPP)
 Hyper-Text transfer Protocol (HTTP)
 Transfer Control Protocol/Internet Protocol (TCP/IP)
 Internet Protocol is a technical switching scheme, which enables a node of one net-work to
communicate with a node of another network.
 The American National Science Foundation then established another network of computers in
America. It permitted all the universities and research centers to hook on to their network National
Science Foundation Network (NSFNET) and to contribute to super-computer research.
 During 1994, several commercial organizations introduced networks across the globe. They also
designed protocols to communicate from one node of a network to another node in another
network.
 As a result of this we now have a network of so many different networks. This network of
networks is called the Internet.
 The Internet is a global system of interconnected computer networks that use the standard Internet
protocol suite (TCP/IP) to link several billion devices worldwide. It also known as “network of
networks” that consists of millions of private, public, academic, business, and government
networks is central interconnecting structure that connects one or more networks just like the trunk
of a tree or the spine of a human being.
 Internet is not governed by the any particular body. It is coordinated by
many volunteer organizations.
 The Internet Architecture Board (IAB) is responsible for approving standards and allocating
resources.

5
SUB: INTERNET AND APPLICATIONS

 The Internet Engineering Task Force (IETF) is responsible for discussing and investigating the
operational and technical problems of Internet.
 The Inter NIC is responsible for providing registration services to Internet community.

Internet Applications:
 Exchange messages using e-mail (Electronic mail).
 Transfer files as well as software.
 Browse through information on any topic on web.
 Communicate in real time (chat) with others connected to the Internet.
 Search databases of government, individuals and organizations.
 Read news available from leading news groups.
 Send or receive animation and picture files from distant places.
 Set up a site with information about your company’s products and services.

Connection of Internet:-
 Through Dial-up Connection: A dials us connection is a temporary connection, set up between
your computer and ISP (Internet Service Provider) server. A dial-up connection is established
using a modem, which uses the telephone line to dial up the number of ISP server.
 Through Broadband Connection: The term broadband is short for broad bandwidth. Bandwidth
refers to the amount of data that a signal or circuit can carry. Broadband connection speeds are
measured in megabits per second (mbps).
 Wireless Connection: These days we can also connect to Internet wirelessly.
 Wi-Fi: It refers to Wireless Fidelity, which lets you connect to the Internet without a direct line
from your PC to the ISP.
 WiMAx: It is a wireless digital communication system. WiMAX can provide broadband wireless
access (BWA) up to 50 km for fixed stations

6
SUB: INTERNET AND APPLICATIONS

5. E-MAIL
Email is a service which allows us to send the message in electronic mode over the internet. It
offers an efficient, inexpensive and real time mean of distributing information among people.

E-Mail Address
Each user of email is assigned a unique name for his email account. This name is known as E-mail
address. Different users can send and receive messages according to the e-mail address.
E-mail is generally of the form username@domainname. For example,
[email protected] is an e-mail address where webmaster is username and
tutorialspoint.com is domain name.
 The username and the domain name are separated by @ (at) symbol.
 E-mail addresses are not case sensitive.
 Spaces are not allowed in e-mail address.

E-mail Message Components


E-mail message comprises of different components: E-mail Header, Greeting, Text, and
Signature. These components are described in the following diagram:

E-mail Header
The first five lines of an E-mail message is called E-mail header. The header part comprises of
following fields:
 From
 Date
 To
 Subject
 CC
 BCC

7
SUB: INTERNET AND APPLICATIONS

From: The From field indicates the sender’s address i.e. who sent the e-mail.
Date: The Date field indicates the date when the e-mail was sent.
To: The To field indicates the recipient’s address i.e. to whom the e-mail is sent.
Subject: The Subject field indicates the purpose of e-mail. It should be precise and to the point.
Cc: CC stands for Carbon copy. It includes those recipient addresses whom we want to keep
informed but not exactly the intended recipient.
Bcc: BCC stands for Black Carbon Copy. It is used when we do not want one or more of the
recipients to know that someone else was copied on the message.
Greeting: Greeting is the opening of the actual message. Eg. Hi Sir or Hi Guys etc.
Text: It represents the actual content of the message.
Signature: This is the final part of an e-mail message. It includes Name of Sender, Address, and
Contact Number.

Advantages:
E-mail has proved to be powerful and reliable medium of communication. Here are the benefits
of E-mail:
 Reliable
 Convenience
 Speed
 Inexpensive
Reliable: Many of the mail systems notify the sender if e-mail message was undeliverable.
Convenience: There is no requirement of stationary and stamps. One does not have to go to post
office. But all these things are not required for sending or receiving an mail.
Speed: E-mail is very fast. However, the speed also depends upon the underlying network.
Inexpensive: The cost of sending e-mail is very low.

Disadvantages
Apart from several benefits of E-mail, there also exists some disadvantages as discussed below:
 Forgery
 Overload
 Misdirection
 Junk
Forgery: E-mail doesn’t prevent from forgery, that is, someone impersonating the sender, since
sender is usually not authenticated in any way.
Overload: Convenience of E-mail may result in a flood of mail.
Misdirection: It is possible that you may send e-mail to an unintended recipient.
Junk: Junk emails are undesirable and inappropriate emails. Junk emails are sometimes referred to
as spam.

E-mail Protocols
E-Mail Protocols are set of rules that help the client to properly transmit the information to or from
the mail server. Here in this tutorial, we will discuss various protocols such as

8
SUB: INTERNET AND APPLICATIONS

1. SMTP,
2. POP, and
3. IMAP.

1. SMPTP: SMTP stands for Simple Mail Transfer Protocol. It was first proposed in 1982. It is a
standard protocol used for sending e-mail efficiently and reliably over the internet.
 SMTP is application level protocol.
 SMTP is connection oriented protocol.
 SMTP is text based protocol.
 It handles exchange of messages between e-mail servers over TCP/IP network.
 Apart from transferring e-mail, SMPT also provides notification regarding incoming mail.

2. IMAP stands for Internet Mail Access Protocol. It was first proposed in 1986. There exist five
versions of IMAP as follows:
1. Original IMAP
2. IMAP2
3. IMAP3
4. IMAP2bis
5. IMAP4
 MAP allows the client program to manipulate the e-mail message on the server without
downloading them on the local computer.
 The e-mail is hold and maintained by the remote server.
 It enables us to take any action such as downloading, delete the mail without reading the
mail. It enables us to create, manipulate and delete remote message folders called mail boxes.
 IMAP enables the users to search the e-mails.

3. POP stands for Post Office Protocol. It is generally used to support a single client. There are
several versions of POP but the POP 3 is the current standard.
 POP is an application layer internet standard protocol.
 Since POP supports offline access to the messages, thus requires less internet usage time.
 POP does not allow search facility.

Signatures
Whenever we write a letter, we affix our signature at the end of the letter. This facility has been
included in electronic mail also.
The software we use for sending e-mail has the facility to create and modify our signature
electronically.
The electronic signature is a text-based collection of one or more lines. For example, my signature
can be set as the following.

9
SUB: INTERNET AND APPLICATIONS

This signature is appended automatically to all e-mails and sent It is also possible to set the e-mail
signature as a small diagram using text-based symbols.

Voice E-mail
In a usual (text) e-mail, we type the message in the body of the e-mail in text mode.
Recently, some companies have introduced software systems which support voice.
Such software is given as an enhancement to their usual software.
After keying the address to which the e-mail has to be sent, we must speak the message. This voice
e-mail travels just like the text e-mail and reaches its destination. When the receiver opens his
mail, the voice message of the e-mail is heard.

Considering the fact that computer users type an average of 20-30 words per min, and professional
typists type an average 60-80 words, human speech averages 200-250 words per minute. So voice
e-mail is approximately eight times faster.
In voice e-mail technology, editing spell checks, grammar and punctuation checks become
redundant.
Pictures and photographs can also be sent along with voice e-mail messages. One need not be
online at the same time to hear the message.
The message packet reaches the mailbox, and the recipient can open and hear it at any time.

6. RESOURCE SHARING
Every Internet system has some files open for anybody on the Internet.
For example, every Ph D thesis of a university can be copied by anybody free of cost.
These file names and the protocols are advertised in newspapers or private communications or web
pages. Software companies offer the beta version of their new products available on the net.
We can download these files using File Transfer Protocols (FTP).
There are two types of FTP resources available on the Internet They are:
1. Anonymous FTP: The anonymous FTP service is open to everybody on the net. The user
can log on to an FTP server without opening an account on the server. He/she can just log
on with the user ID (Identification) "anonymous". The system will then responds and ask
10
SUB: INTERNET AND APPLICATIONS

your e-mail address. Then it will ask for your (systems') password. After that you can
download any file from the FTP server
2. Non-anonymous FTP: One can download a file only if one creates an account with the
FTP server. The user must already have an account, user ID and a password to download a
file.

7. GOPHER
 Gopher is a TCP/IP application layer protocol designed for distributing, searching and retrieving
documents over the internet.
 It presented an alternative to the World Wide Web in its early stages.

 The Gopher service was first used in the campus-wide Information System of the University of
Minnesota. It became very popular during 1991-93.
 Gopher is easy-to-use and user-friendly as com-pared to FTP.
 Gopher facilitates simple menu selection features and also provides browsing of large files.
 The resources (files) available on Gopher are called gopher space.
 Two types of search engine are available in gopher
1. Veronica 2. Jug head
 Veronica is popular of the two. Both work much like the web search engine. They search pre-built
databases for keywords that you provide.

11
SUB: INTERNET AND APPLICATIONS

 It was designed as a response to the problem of resource discovery in gopher space.


 Veronica is simply accessed through a gopher client, which is already known by gopher users.

 The gopher does not retain any information about the client across transactions.
 This aspect of gopher design is the key to gopher’s efficiency: the server is only connected to the
user long enough to serve a particular request.
 It does not pay the high overhead cost of having hundreds or thousands of users logged in at once.
 Later, another search facility called Jughead was also developed. Since the Gopher resources are
arranged in simple linear forms, searching takes more time, and further it does not support
multimedia features. Both FTP and Gopher mainly have text-based resources.
 A large quantum of FTP and Gopher-based resources are still available on the Internet However,
things have moved to a better technology the World Wide Web. Now some of the FTP and Gopher
resources have migrated to WWW.

8. WORLD WIDE WEB


The World Wide Web (WWW) is a collection of pages maintained on the Internet using a
technique that is called hyper-text

Hyper-Text:
Hyper-text is a text of more than two dimensions.
Consider any text that is typed from left to right It has only two dimensions:
1. Left to right
2. Top to bottom
Left to right is normally considered as the x-axis and top to bottom is considered the y-axis.
In hyper-text one 2-D text is shown on the screen. Certain words are highlighted.
If we click one of those highlighted words, more details about that word appear in an-other
window. We say that these details form the third dimension, the z-axis, which goes deeper into the
text
This can be done further on the smaller window also. For example, consider the window shown
below Fig.

12
SUB: INTERNET AND APPLICATIONS SEM: IV

The word link is appearing in a different color. If we click on it further details are shown in
another window.
Hypertext system can store a large collection of textual and multimedia documents

Http:
The acronym for Hyper-Text Transfer Protocol is HTTP, and WWW for the World Wide Web.
Pointers connect the web pages in multiple ways in the form of multiple linked lists.
For example, educational websites are arranged in one list, religious webs in another and similarly
for other types also.
 com - businesses
 edu - educational institutions
 gov - government organizations
 mil - military organization
 org - nonprofit organizations
 net - network resources
A site may be in more than one list.
Each page of the web is called a web page or website.
Every Internet-connected system may have a website. If you have a web page, you can keep any
text, pictures, sound or even animation on your website.
Nowadays companies give a complete profile in text, picture and sound on their websites. Text,
picture, sound or animation kept on a website can be seen by anybody who browses the web.
Browsing the web means looking at various web pages one after the other, also called surfing the
web.

Browsers
The software used for browsing web pages is called a browser. The following are some popular
browsers:

13
SUB: INTERNET AND APPLICATIONS

 Netscape Navigator
 Mosaic
 Hot Java
 Microsoft Internet Explorer

Search Engines
The universally accepted computer language to create hyper-text is called Hyper-Tem Mark-up
Language (HTML).
Websites on the Internet are connected in such a way that one site has a pointer to the next website.
Each website has an address. In the web, we can begin search from a search site or an index site.
These websites are also called search engines. The following are some popular search engines.
1. http:// www.yahoo.com is a search site.
2. http:// www.lycos.com is an index site.
3. http:// wwwAskleeves.com

The home page of the Lycos search engine is shown in Fig It has a text box to choose a particular
topic. We can also choose some of the sites of the Lycos network, such as 11-ipod.com,
Angelfire.com, MailCity.com, WhoWhere.com. Each of these sites help us in their unique ways to
search for information.
Ask Jeeves is a different type of search engine, which gets us the necessary information by asking
us several questions. Depending upon our replies, it uses other search engines and gets the required
website.

14
SUB: INTERNET AND APPLICATIONS

The home page of Ask Jeeves is shown in Fig. This has several questions related to our search. We
can proceed further by replying to these queries.
The home page of the most popular search engine, Yahoo, is shown in Fig.

It also has a text box to type our search key.


We can also choose any topic from the hot texts shown below the text box.
Yahoo is quite popular with the users. A user can also get a free e-mail account in the Yahoo site.
We must first register our e-mail address on this site, and if the registration is accepted, we can
have e-mail free of cost
When we give a user name which was not used earlier by anybody, it is accepted by Yahoo.
For example, the following can be an e-mail address.
[email protected]

15
SUB: INTERNET AND APPLICATIONS

HT mail is a web server which provides a free e-mail service to all Internet users. We can just
register our name in the home page of the Hobnail website. The home page is shown in Fig.

We can give the user ID and the password for registration. If the user ID is not one which is
already registered, it is accepted by the server. We can then have an e-mail address similar to the
ones shown below.
[email protected]
[email protected]
[email protected]

9. TELNET
Telnet was developed in 1969 to aid in remote connectivity between computers over a network
Telnet is a utility which enables an Internet user to log in and work on another system which is
geographically located in another place of the world. This is also called a remote login facility.
For example, a person has a computer in his office at New Delhi. He has to visit Mumbai on a
family trip. But when he is free at Mumbai, he can log in his system at Delhi from Mumbai and
use all the databases and files, and work on the system.

Telnet can access almost all the libraries in any part of the world and their books.

16
SUB: INTERNET AND APPLICATIONS

We can log in to research laboratory computers and access some useful software. When we want
to log in to a system using Telnet, we must know the password of the system, which is a very
important security feature.
Telnet can connect to a remote machine that on a network and is port listening. Most common
ports to which one can connect to through telnet are:
 Port 21 - File Transfer Protocol
 Port 22 - SSH Remote Login Protocol
 Port 23 - Telnet Server
 Port 25 - Simple Mail Transfer Protocol (SMTP)
 Port 53 - Domain Name Server (DNS)
 Port 69 - Trivial File Transfer Protocol (TFTP)
 Port 70 - Gopher
 Port 80 - Hyper Text Transfer Protocol (HTTP)
 Port 110 - Post Office Protocol 3 (POP3)
The most common use of telnet stands to enable remote authentication and access
To use Telnet, you need to know the address of the host whose resources you want to use.

10. BULLETIN BOARD SERVICE


A Bulletin Board Service (BBS) is a service provided by private parties on the Internet.
The parties providing this service collect enormous amounts of information and keep it on their
system for the use of their subscribers.
The BBS is available in most cities. If we want to join any one, BBS, we must apply and get
permission.
Then members can log in to that BBS and access a wide variety of data.
Depending upon your interest, you can get information on anything: cinema, science, education,
games, sports, etc.
Most BBS offer general information, but there are a few which offer specialized services in
specific subjects like medical guidance, stock market information, children's education, etc.

11. WIDE AREA INFORMATION SERVICE


Three companies, Apple, Thinking Machines and Dow Jones, came out with a project of
maintaining a large resource database in the form of files.
They called this service Wide Area Information Service (WAIS). They suggested that all the
knowledge must be stored in the WAIS database in the form of essays, bits, pictures, etc.
A user must have a facility to search and get any desired resource by paying for it
The WAIS is not used much, but its resources are still available on the Internet
The search for WAIS information on the Internet is done simply by typing the word or words
which describe the information that we are looking for.
WAIS will quickly search the database and send back a list of articles, ranked according to
relevancy.
We can then select whichever articles we want to read, and WAIS will send the entire text
Due to the immense popularity of the Web, the WAIS is not used much:
17
SUB: INTERNET AND APPLICATIONS

5 MARK
1. Briefly describe about search Engine. Page 14
2. Write note on Hyper-Text with example. Page 15
3. Describe about 2 Search Engines with suitable example. Page 14 - 16
4. Write a short note on internet. Page 2
5. Write a short note on computer in business Page 2 - 3
6. Write a short note on netWorking. Page 3 - 4
7. Write about Telnet. Page 16 - 17

10 MARK
1. Briefly describe about WWW. Page 12 - 16
2. Explain the term Electronic Mail (E-MAIL). Page 7 – 10
3. Briefly describe about History of internet. Page 5 - 6

18
SUB: INTERNET AND APPLICATIONS

UNIT – II
Internet Technologies: Modem - Internet addressing – Physical connections – Telephone Lines –
Internet browsers – Internet Explorer – Netscape Navigator.

INTERNET TECHNOLOGIES:
If we want to connect our computer to the Internet, we can do so only through an Internet server.
There are Companies which have Internet servers and provide Internet connectivity called Internet
Service Providers (ISP).
They have satellite connections with the Internet.
We must apply to an ISP and ask for an Internet connection.
They give a web page, an e-mail box and other facilities. We must have a telephone connection to
communicate with the ISP 's office, and a device called Modem.
Our computer gets connected to the Internet.
We connect our computer to the modem, and the modem is connected to the telephone line. This is
illustrated in Fig.

There are various types of Internet connections. The following are some of them.
 Shell Account (text only).
 TCP/IP Account (text, graphics, sound and animation).
Shell accounts enable us to browse through text items only: the graphics and multi-media elements
cannot be viewed. So the shell account does not permit full use of Internet capability. Using a shell
account, we can make use of the e-mail facility.
Transfer Control Protocol/Internet Protocol (TCP/IP) is very powerful and most popular. With a
TCP/IP connection, we can have the benefit of Internet fully.

19
SUB: INTERNET AND APPLICATIONS

MODEM
 Conversion of digital signals into signals transmittable through a telephone is called modulation.
Converting telephone signals into digital signals is called demodulation.
 A modem is a device used for modulation and demodulation (Modulator-Demodulator).

 Modems are classified according to their rate of transfer of data, measured in terms of bytes
per second (BPS).

 If the data transfer capacity of a modem is 14.4 kilobytes, it means that the rate of transfer of data
through the modem is 14.4 kilobytes per second.
 The first modems were "dial-up," meaning they had to dial a phone number to connect to an ISP.
 Modern modems are typically DSL or cable modems, which are considered "broadband" devices.
 DSL modems operate over standard telephone lines, but use a wider frequency range.
 This allows for higher data transfer rates than dial-up modems and enables them to not
interfere with phone calls.
Types of Modem
Modem can be categorized in several ways like direction in which it can transmit data, type of
connection to the transmission line, transmission mode, etc.
Depending on direction of data transmission, modem can be of these types −
1. Simplex − A simplex modem can transfer data in only one direction, from digital device to
network (modulator) or network to digital device (demodulator).
2. Half duplex − A half-duplex modem has the capacity to transfer data in both the directions
but only one at a time.
3. Full duplex − A full duplex modem can transmit data in both the directions simultaneously.
20
SUB: INTERNET AND APPLICATIONS

INTERNET ADDRESSING
◊ Millions of computers have been connected to the Internet.
◊ When we want to communicate with a computer through the Internet, we need to specify the
address of that computer, every computer connected to the Internet is given an address, called
the IP Address [Internet Protocol Address].
◊ The IP address of a computer consists of four groups of numbers separated by periods or dots 0.
◊ For example, 18.181.0.24 is an IP address.
◊ Internet Corporation for Assigned Names and Numbers is responsible for assigning IP addresses.
◊ The first octet referred here is the left most of all. The octets numbered as follows depicting
dotted decimal notation of IP Address:

◊ The number of networks and the number of hosts per class can be derived by this formula:

◊ When calculating hosts' IP addresses, 2 IP addresses are decreased because they cannot be
assigned to hosts, i.e. the first IP of a network is network number and the last IP is reserved
for Broadcast IP.

Class A Address:-
◊ The first bit of the first octet is always set to 0 (zero). Thus the first octet ranges from 1 – 127,
i.e.

◊ Class A addresses only include IP starting from 1.x.x.x to 126.x.x.x only. The IP range
127.x.x.x is reserved for loopback IP addresses.
◊ The default subnet mask for Class A IP address is 255.0.0.0 which implies that Class A
addressing can have 126 networks (27-2) and 16777214 hosts (224-2).
◊ Class A IP address format is thus: 0NNNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH

Class B Address:-
◊ An IP address which belongs to class B has the first two bits in the first octet set to 10, i.e.

21
SUB: INTERNET AND APPLICATIONS

◊ Class B IP Addresses range from 128.0.x.x to 191.255.x.x. The default subnet mask for Class
B is 255.255.x.x.
◊ Class B has 16384 (214) Network addresses and 65534 (216-2) Host addresses.
◊ Class B IP address format is: 10NNNNNN.NNNNNNNN.HHHHHHHH.HHHHHHHH

Class C Address:-
◊ The first octet of Class C IP address has its first 3 bits set to 110, that is:

◊ Class C IP addresses range from 192.0.0.x to 223.255.255.x. The default subnet mask for
Class C is 255.255.255.x.
◊ Class C gives 2097152 (221) Network addresses and 254 (28-2) Host addresses.
◊ Class C IP address format is: 110NNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH

Class D Address:-
◊ Very first four bits of the first octet in Class D IP addresses are set to 1110, giving a range of:

◊ Class D has IP address rage from 224.0.0.0 to 239.255.255.255. Class D is reserved for
Multicasting. In multicasting data is not destined for a particular host, that is why there is no
need to extract host address from the IP address, and Class D does not have any subnet
mask.

Class E Address:-
This IP Class is reserved for experimental purposes only for R&D or Study. IP addresses in this class
ranges from 240.0.0.0 to 255.255.255.254. Like Class D, this class too is not equipped with any subnet
mask.

Text-based addressing:
◊ Computers are also given another address, which is text-based.
◊ For example, skp .mit .edu is a valid Internet address.
◊ All users have text-based addresses.
◊ An Internet service called DNS (Domain Name System) converts into the actual numerical
address. This address is also called the Uniform Resource Locator (URL).
◊ The Internet address has two parts. They are the:
• Name of the user (user ID)
• Name of the server (server ID).
The @ symbol is given in between the above two names. For example, our address is
[email protected]
◊ My user ID is stxavier and my ISP's server ID is md2 vsnl .net .in. The server ID contains
several parts separated by dots.

22
SUB: INTERNET AND APPLICATIONS

◊ The extreme right part of the address in the above example refers to India. This part of the
address is usually called the top-level domain to which the computer is connected.
◊ All addresses on the Internet are classified into several top-level domains.
◊ The classification may either be geographical or organizational.
◊ Table shows some examples of codes used for geographical classification.

Another top-level domain classification is based for the nature of the organization. For example, all
universities and educational institutions are given "edu" as the top-level domain name. Other top-level
domain' names for organizations are given in Table.

The first part of the URL specifies the protocol used. Table shows some URL.s.

23
SUB: INTERNET AND APPLICATIONS

PHYSICAL CONNECTIONS
Internet connectivity is done through a modem and a telephone line. The path of the data is as follows

1. The user's node sends the digital data.


2. The modem of the user converts the digital data into analog signals.
3. The telephone line transmits the data to the modem of the ISP.
4. The modem of the ISP converts the analog signals received into digital data.
5. The ISP's node receives the message in digital form.
In this communication process, two important devices work together.
• modem
• telephone line
The quantity of data transferred by a device is called its throughput or data transfer rate. The
throughput is measured in terms of KBPS (Kilobytes per Second). For example, the speed of two
popular types of modems is shown in Table 2.4.

Most of the V.34 modems can compress the data in ratio of 4 :1. So, they can achieve a throughput of
28.8 x 4 = 115.2 KBPS in an ideal situation. However, practically they can achieve a speed of at least
56 KBPS.

TELEPHONE LINES
◊ An ordinary Internet account holder gets only a dial-up connection.
◊ Several users share one port of the ISP Server and at one time, only one user can work.
◊ The port is connected to a particular telephone number.
◊ When one user dials the telephone number to get physical connection to the server, if the port is
already in use by another user, an engaged tone will be heard.

24
SUB: INTERNET AND APPLICATIONS

◊ When the port is free, the user gets connected to the ISP and can work on the Internet. Figure
shows the dial-up connections of users.

Leased Lines:
◊ A leased line connection is very expensive.
◊ The user is given full freedom on a port of the ISP server one port is for his exclusive use.
◊ So he can use it around the clock without any interruption.
◊ Whenever the user dials, he gets a connection and can work on the Internet. Figure shows the
leased line of a user.

Speed of Telephone Lines:


◊ One can achieve a speed of 56 KBPS only in the case of a leased line.
◊ In the case of dial-up connections, the telephone connection is so designed that three or four
users can simultaneously use the same port.
◊ This is possible by getting four connections on the same number. In such a case, each user will
share the line. So, any user can get a speed of only 56/4 = 14 KBPS.
Figure shows dial-up users accessing a port simultaneously.

25
SUB: INTERNET AND APPLICATIONS

If a company gets a leased line connection, it is possible for several units of the company to access the
Internet simultaneously. It is possible to have several types of media in telephone connections, as
shown in Table.

◊ Ordinary lines have a capacity of 56 KBPS speed.


◊ The T1 type medium has four conductor-wise, two standard phone lines wrapped around each
other in a single sheath.
◊ The connector at the end of the wire is a modular R1-45 jack, which is similar to a standard
modular phone plug but slightly larger.
◊ A T1 connection can support a speed of 1544 KBPS.
◊ A T3 type connection is a very high capacity one, and very expensive too. It has an enormous
capacity, of 44 736 IMPS. Only very large communication companies in America use T3
type Wires.

Frame Relay:
◊ The frame relay type of connection is cheaper compared to leased line connections.
◊ In a frame relay type connection, we connect our network to the telephone company's frame
relay switch.
◊ The frame relay switch then routes the data traffic to the ISP.

ISDN
◊ Different telecommunication services such as telephone, telex and facsimile fax use separate
networks for each service.
◊ These non-integrated services require separate switching systems, special customer access
networks, individual trunk networks and separate operation staff. These services are costly.
◊ An effort to integrate all these services into a single network is ISDN.
◊ Integrated services digital network (ISDN) is a communication network which is used for
transmitting all -types of integrated data, which includes voice, video, facsimile and
computer signals.
◊ The following are the advantages of an ISDN network
1. increases user productivity
2. higher transmission Rate
3. all types of services are integrated into a single network
4. lower cost
5. higher accuracy level
26
SUB: INTERNET AND APPLICATIONS

There are two types of ISDN services. They are:


1. Basic Rate Interface (BRI)
2. Primary Rate Interface (PRO)
Basic Rate Interface is economically cheaper and is used to connect home or small business
establishments. In a BRI type connection, there are two B-type channels and one D-type channel. Each
B-type channel has 64 KBPS bandwidth and the D channel has 16 KBPS bandwidth as shown below.

The two B-channels are used to send bulk data. The D-channel is used to control the data flow in the
B-channels. Since the data flows in the two B-channels, each of 64 KBPS bandwidth, the theoretical
bandwidth of a BRI line is 128 KBPS. Practically, it may be a little less than 128 KBPS due to several
factors affecting the data transfer.

Interfaces for ISDN


To connect our communications device to an ISDN line, we need to use two items of interface
equipment. They are:
1. Network Terminater for Layer 1 (NT-1)
2. Terminal adapter
◊ The ISDN terminal is usually called an ISDN wall jack.
◊ A device called network terminater for Layer 1 (NT-1) is connected to the ISDN wall jack.
◊ The NT-1 acts as the interface between the devices and the outside ISDN line. Another device
called a terminal adapter is connected between the devices and the NT-1.
◊ The function of the terminal adapter is to convert the signals of the equipment to ISDN-
acceptable signals.
An ISDN connection is shown in Fig.

Recently such computers have become available which are "ready for connecting to ISDN". These
computers have in-built terminal adapter cards, so they can be directly plugged into NT-1.

27
SUB: INTERNET AND APPLICATIONS

INTERNET BROWSERS
 Internet is working on the client server architecture.
 The web server runs a server program, and an Internet node runs a client program.
 The client program used to see websites is called a browser.
 Web Browser is application software that allows us to view and explore information on the web.
User can request for any web page by just entering a URL into address bar.
 Web browser can show text, audio, video, animation and more. It is the responsibility of a web
browser to interpret text and commands contained in the web page
 Following are the most common web browser available today:
Browser Vendor
Internet Explorer Microsoft
Google Chrome Google
Mozilla Firefox Mozilla
Netscape Navigator Netscape Communications Corp.
Opera Opera Software
Safari Apple
Sea Monkey Mozilla Foundation
K-meleon K-meleon

Architecture:-
There is a lot of web browser available in the market. All of them interpret and display information on
the screen however their capabilities and structure varies depending upon implementation. But the
most basic component that all web browsers must exhibit is listed below:
 Controller/Dispatcher
 Interpreter
 Client Programs
Controller works as a control unit in CPU. It takes input from the keyboard or mouse, interpret it and
make other services to work on the basis of input it receives.
Interpreter receives the information from the controller and executes the instruction line by line.
Some interpreter is mandatory while some are optional For example, HTML interpreter program is
mandatory and java interpreter is optional.
Client Program describes the specific protocol that will be used to access a particular service.
Following are the clients programs that are commonly used:
 HTTP
 SMTP
 FTP
 NNTP
 POP

28
SUB: INTERNET AND APPLICATIONS

Internet Explorer and Netscape Navigator are used commonly to browse the Internet

INTERNET EXPLORER
Internet Explorer is graphical user interface software for browsing the Internet.
Internet explorer is a web browser developed by Microsoft.
To start internet explorer, follow the following steps:
 Go to Start button and click Internet Explorer.

29
SUB: INTERNET AND APPLICATIONS

The Internet Explorer window will appear as shown in the following diagram

This graphical environment basically contains four primary objects.


They are:
1. Window
2. Icon
3. Menu
4. Dialog box

Window
A portion of the computer screen that is enclosed by a border is called a window. The size of the
window can be small or big. A typical window is shown in Figure.

30
SUB: INTERNET AND APPLICATIONS

A window contains the following.


 title bar
 tool bar
 control box
 menu bar
 minimize, maximize and close buttons
 horizontal scroll bar
 left and right arrows
 vertical scroll bar
 up and down arrows
 status bar
The title bar is the horizontal bar at the top of the window showing the title of the window. The control
box is at the top left corner of the window. When we click the control box, we get a menu as shown in
Figure.

It contains the some or all the following commands.


1. Restore: returns window to the size it was before
2. Move: moves the entire window
3. Size: resizes the entire window
4. Minimize: shrinks the window into an icon
5. Maximize: enlarges the window into full size
6. Close: closes the window
7. Tool bar: a toggle key to show or hide the tool bar
8. Status bar: a toggle key to show or hide the status bar

31
SUB: INTERNET AND APPLICATIONS
SEM: IV
In the menu bar, there are six menus. They are the:
1. File menu
2. Edit menu
3. View menu
4. Go menu
5. Favorites menu
6. Help menu
They appear as a horizontal bar at the top of the window. When we click one of them, a pull down
menu appears. For example, when we click ‘File’ we get the File menu

File Menu
The file menu has the following choices as shown in Fig

 Open : opens a selected website


 Save : saves the document
 Save as : saves the document in a different file name
 Page setup: for setting up a page format
 Print: for printing the document
 New: to create a new window, message, post or contact
 Send Link to: to link with other URLs
 Create shortcut: to create a shortcut for the website; on selecting this command a shortcut is
automatically made available using an icon
 Properties: to find the properties of the website
 Browse offline to browse offline
 Close: closes Internet Explorer

Saving Webpage:-
You can save web page to use in future. In order to save a webpage, follow the steps given below:
 Click File > Save As. Save Webpage dialog box appears.
 Choose the location where you want to save your webpage from save in: list box. Then
choose the folder where you want to save the webpage.

32
SUB: INTERNET AND APPLICATIONS

 Specify the file name in the File name box.


 Select the type from Save as type list box.
o Webpage, complete
o Web Archive
o Webpage HTML only
o Text File
 From the encoding list box, choose the character set which will be used with your webpage.
By default, Western European is selected.
 Click save button and the webpage is saved.
Saving Web Elements:-
Web elements are the pictures, links etc. In order to save these elements follow the steps given below:
 Right click on the webpage element you want to save. Menu options will appear. These
options may vary depending on the element you want to save.

Save Picture As: This option let you save the picture at specific location with its name. When you
click this option, a dialog box is opened where you can specify its name and location.

Opening a site
When we want to open a website document, we must select Open on the File menu.
The window as shown in Fig appears.

33
SUB: INTERNET AND APPLICATIONS

If we know the URL of the website, we can type the name in the window and click the OK button.
If we don't know the URL, we can browse and find it In order to browse, we must click the Browse
button. We get the window as shown in Fig.

We must select the URL and then click Open to go to the open window, then click the OK button of
the window to open the website.

Edit Menu
The edit menu is used to edit the current document.It is got by clicking Edit on the menu bar.

This menu contains the editing commands such as cutting, copying and pasting.
Copy - Copy highlighted images or text to paste into another application; MS Word, PowerPoint or
other applications. You can also use the keyboard combination Ctrl + C
Find- Used for searching a word or part of word within the document. When we click Find on the Edit
menu we get a window as shown in Fig.

34
SUB: INTERNET AND APPLICATIONS

When we type the word to be searched and click the button Find Next, the word is searched and the
cursor goes to that location.

View Menu
 The view menu is used to customize the view in our screen.
 The view menu as shown Fig has the following commands:

 Tool bar: A toggle key to show or hide the tool bar


 Status bar: A toggle key to show or hide the status bar
 Fonts: This command is used to select the font on our screen. we can select any one of the
following sizes.
1. Largest
2. Large
3. Medium
4. Small
5. Smallest
 Stop
 Refresh: This command refreshes the page; recent updates can be seen when refresh the page
 Source: This command is used to view the HTML source code of the web page
 Options: This command is used to select aesthetic colors for text, background and hyperlinks.
When we choose the Options command, we get the multiple tabs as shown in Fig. 3.10.

35
SUB: INTERNET AND APPLICATIONS

This is a combination of six windows, namely:


1. General
2. Connection
3. Navigation
4. Program
5. Security
6. Advanced
The window shown in above Fig is the General window.
This has three tick boxes at the top portion of the window, namely:
1. Show pictures
2. Play sounds
3. Play videos
4. These tick boxes can be ticked by just clicking on the box.
5. The tick can be removed another click on the box.

Option Window
If the Show pictures box is ticked, the web page will show the pictures (if any).
If this box is not ticked, the pictures will not be shown on the web page. Similarly, the tick boxes Play
sounds and Play videos can be used for sound and video. In the middle part on the left there is a panel
called Colors with a tick box called Use Windows colors, and two boxes for selecting colors of the text
and background color. ii we tick on the tick box, the original Windows colors are chosen for the
background and the text. If we remove the tick by another click, we can choose the background and
text color. In a web page hot texts will appear in a different color. This can be designed using the right
hand side panel in the middle of the window, called Links. This panel has a tick box, Underline links,

36
SUB: INTERNET AND APPLICATIONS

using which we can set the display to underline all hot texts (links). They can also be displayed in a
different color. When we open a web page, several links may appear in a page. By clicking the hot
text, we visit the linked document In order to distinguish between the links which have been visited
already and those which have not yet been visited, we can assign two different colors for the hot texts.
These colors can be assigned using the two keys Visited and Unvisited. On selection of either of these
keys, we get the color palette as shown in Fig.

We can now select any color from the palette. If we are not able to choose from this palette, we can
define a new custom color by clicking the button Define Custom Colors. When we click this button,
we get a window as shown in Fig.

We can create a color using the basic colors red, green and blue and add it to the custom colors.
The General window also has a button, Languages, to choose a language for the web.
As websites are created in several languages, this option helps us select the language and then open the
website. On clicking the Languages button, we get a window as shown in Fig.

37
SUB: INTERNET AND APPLICATIONS

If we want to add a new language, we click the Add button. We can choose the font for our display by
clicking the Font Settings in the General window. On clicking this button, we get a window as shown
in Fig. We can select a font and click the OK button.

Navigation Window:
The Connection window is to set up connections. The navigation window shown in Fig is a very
useful tool in the Internet Explorer.

38
SUB: INTERNET AND APPLICATIONS

Using this window, we can set the starling page URL and can preserve a history of the websites we
visit The number of days up to which the history must be preserved can also be set.

Favorites Menu:
The History option keeps the history of all the sites visited. Internet Explorer also has a provision to
store the addresses of the favorite sites. This is clone in a folder called Favorites. This Favorites folder
can be used in a very convenient form by creating subfolders within this Favorites folder. When we
click the Favorites option in the menu bar, the Favorites menu is displayed as shown in Fig. 3.18. If we
want to add this current web page in Favorites, we can just click the Add to Favorites command of the
Favorites Menu shown in Fig.

On clicking Add to Favorites, we get the window as shown in Fig. 3.19. If we click OK the current
website address will be stored in the Favorites folder. Suppose we want to store it in a subfolder. We
must click the Create in button of this window.-

39
SUB: INTERNET AND APPLICATIONS

On clicking it, the window gets extended as shown in Fig. This displays all the subfolders in the
Favorites folder. We can now select the folder in which the address has to be stored and then click the
OK button. If we want to create a new folder, we must select the parent folder and then click the
button New Folder.
Opening a Favorite Site: If we want to open a favorite site which was already stored in a Favorite
folder, we must first click the Favorite menu in the menu bar. All the subfolders of the Favorite folder
appear at the bottom of the pull down menu. Select the desired folder and the desired address. The site
is opened. For example, suppose a site with the name "Xavier" is al-ready in a subfolder Research in
the Favorites folder.
Organizing the Favorites Folder: If we want to rearrange the Favorites folder, we must click the
Organize Favorites command in the Favorites menu. We can rearrange them by click-and-drag mouse
operation. We can delete any subfolder by just pressing the delete key after selecting the subfolder.
This window has five buttons, namely:
• Delete
• Rename
• Move
• Open
• Close

40
SUB: INTERNET AND APPLICATIONS

Tool Bar
The tool bar contains some icons as keys for important functions. By just clicking on an icon in the
tool bar, a job can be done. The following are some important keys on the tool bar.

NETSCAPE NAVIGATOR
Netscape Navigator was the most popular web browser before Microsoft launched Internet Explorer.
The Netscape Navigator window has a format similar to that of Intern Explorer.
The window has a menu bar with the following menu options.

• File
• Edit
• View
• Go
• Communicator
• Help

File Menu
The File menu is used to customize the page setup, to preview, to print the document for opening or
saving a page, closing a page or exiting Netscape Navigator.

41
SUB: INTERNET AND APPLICATIONS

The File menu is used to manipulate your files. Using the file menu you can:
 Open a New browser window, or create a New blank page in Composer
 Open Page - open pages on your hard drive that you might have created with composer, or
open a page that has been saved from the Internet
 Save As - you can save Web pages from the Internet on your disk
 Print files - prints the current web page

Edit Menu
The Edit menu is used to edit the content of a frame. It is possible to select a portion o the whole, Cut
it, Copy it, Move it or Paste it at any desired location. The Edit menu i similar to the edit menu of any
word processor

Use the Edit menu to:


 Cut - cut text
 Copy - copy highlighted text on a web page
 Paste - paste text
 Select All - selects all the text on a page
 Find in Page - searches the current page for words
 Search Internet - this will take you to Netscape's search page
 Edit Preferences - this is where you can change your preferences for Netscape. You can
enter your e-mail information, change the default home page, font size, etc.

View Menu
The View menu is used to customize the view screen of Navigator

42
SUB: INTERNET AND APPLICATIONS

The View menu can be used to:


 Show - Using this item you can show or hide the various toolbars at the top of your
Navigator Window
 Increase/Decrease Font size - this will increase or decrease the size of the text on a web
page
 Reload - this will cause Netscape to reconnect to the web server and download the web page
again
 View Page Source - this will display the HTML code for the page you are viewing
 View Page Info - this displays information about the web page you are viewing - date
created, date modified, etc.

Communicator Menu
This menu is very important in choosing the communicator and choosing bookmarks, etc. It has four
parts. In the first part of the menu, the list of communications are shown, which are:

Bookmark
The Bookmark's option of the Communicator menu is used to make bookmarks for our favorite
websites. This is similar to the Favorites option of Internet Explorer.

43
SUB: INTERNET AND APPLICATIONS

History
The history of the Websites visited so far can be preserved for easy reference. This is done using the
History option of the Tools menu in communicator menu.

Security
Netscape Navigator has a set of security options to make you feel secure. Since the Internet connects
your system (network) to other systems across the globe, you have to be very careful and secure lest
your valuable data is copied or damaged by anybody. We must click the Security tool on the tool bar
to go into the security window.

44
SUB: INTERNET AND APPLICATIONS

There are several security provisions. It is possible to set a password for Communicator. For creating
the password, we must select the Password option in the left frame.
This is used to set the password. It is possible to protect our Java applets and Java Script from the
access of others. For doing this, there is an option called Java/JavaScript. The following are some
more security provisions. • Navigator • Messenger • Certificates • Yours • People • Web Sites •
Signers • Cryptographic

Go menu:
The Go menu is used to navigate through pages that you have visited.

 Back - this takes you back to the page you just viewed
 Forward - this will take you forward a page
 Home - this returns you to the Home page set in Netscape Preferences
At the bottom of this window you will find a list of the titles of the last few pages that you have
viewed. You can highlight any of the pages on the list and go to that page.

45

5 MARK:
1. Explain about ISP. Page 19.
2. Explain on types of port. Page 21
3. Write short note on Modem types. Page 20

10 MARK:
1. Briefly explain telephone lines. Page 24 - 27
2. Write short note on Internet explorer. Page 29 - 33
3. Explain about Internet addressing. Page 21 - 23
4. Write short note on Internet browser. Page 28 - 45
SUB: INTERNET AND APPLICATIONS

UNIT - III
Web Server - Proxy Server - Web Browser - Search Engines - Search Tools - Firewalls - Data Security

WEB SERVER
A Web server is a program that uses HTTP (Hypertext Transfer Protocol) to serve the files that form
Web pages to users, in response to their requests, which are forwarded by their computers' HTTP
clients.
Web server is a computer where the web content is stored. Basically web server is used to host the
web sites but there exists other web servers also such as gaming, storage, FTP, email etc.
Web Application Architecture

Web Server Working


Web server respond to the client request in either of the following two ways:
 Sending the file to the client associated with the requested URL.
 Generating response by invoking a script and communicating with database

Key Points
 When client sends request for a web page, the web server search for the requested page if
requested page is found then it will send it to client with an HTTP response.
 If the requested web page is not found, web server will the send an HTTP response:Error 404
Not found.
46
SUB: INTERNET AND APPLICATIONS

 If client has requested for some other resources then the web server will contact to the
application server and data store to construct the HTTP response.
Architecture
Main Server Architectures
 Multi-process (Apache on Unix) „
 Multi-threaded (Apache on NT/XP) „
 Single process event driven (Zeus, thttpd) „
 Asymmetric multi-process event-driven (Flash)
Multi-Process Architecture

 Utilizes multiple processors „


 Easy to debug „
 Can pre-fork a pool of processes „
 Inter Process Communication is difficult and expensive „
 High memory cost, context switches
Multi-Threaded Architecture

 Utilizes multiple threads, good performance „


 Easy to change threading policies „
 Need to synchronize, to avoid data races „
 Resources utilization (kernel and user-level): …
 memory consumption, context switches, startup „
 Blocking I/O can cause deadlocks
Single Process Event-Driven

47
SUB: INTERNET AND APPLICATIONS
SEM: IV
 Use a selector to check for ready file descriptors „
 Uses a finite state machine to determine how to move to the next processing stage „
 No context switching, no synchronization, single address space „
 Modern OS do not provide adequate support for asynchronous disk operations
Asymmetric Multi-Process Event-Driven

 Similar to Single Process Event-Driven but with helpers for blocking I/O (e.g., disk requests)
The most leading web servers available today:
1. Apache HTTP Server
This is the most popular web server in the world developed by the Apache Software Foundation.
Apache web server is an open source software and can be installed on almost all operating systems
including Linux, UNIX, Windows, FreeBSD, Mac OS X and more. About 60% of the web server
machines run the Apache Web Server.
2. Internet Information Services (IIS)
The Internet Information Server (IIS) is a high performance Web Server from Microsoft. This web
server runs on Windows NT/2000 and 2003 platforms (and may be on upcoming new Windows
version also). IIS comes bundled with Windows NT/2000 and 2003; Because IIS is tightly integrated
with the operating system so it is relatively easy to administer it.
3. Lighttpd
The lighttpd, pronounced lighty is also a free web server that is distributed with the FreeBSD
operating system. This open source web server is fast, secure and consumes much less CPU power.
Lighttpd can also run on Windows, Mac OS X, Linux and Solaris operating systems.
4. Sun Java System Web Server
This web server from Sun Microsystems is suited for medium and large web sites. Though the server
is free it is not open source. It however, runs on Windows, Linux and UNIX platforms. The Sun Java
System web server supports various languages, scripts and technologies required for Web 2.0 such as
JSP, Java Servlets, PHP, Perl, Python, and Ruby on Rails, ASP and Coldfusion etc.
5. Jigsaw Server
Jigsaw (W3C's Server) comes from the World Wide Web Consortium. It is open source and free and
can run on various platforms like Linux, UNIX, Windows, and Mac OS X Free BSD etc. Jigsaw has
been written in Java and can run CGI scripts and PHP programs.

48
SUB: INTERNET AND APPLICATIONS

PROXY SERVER
Proxy server is an intermediary server between client and the internet. Proxy servers offers the
following basic functionalities:
 Firewall and network data filtering.
 Network connection sharing
 Data caching
A proxy server is a dedicated computer or a software system running on a computer that acts as an
intermediary between an endpoint device, such as a computer, and another server from which a user or
client is requesting a service. The proxy server may exist in the same machine as a firewall server or it
may be on a separate server, which forwards requests through the firewall.
An advantage of a proxy server is that its cache can serve all users. If one or more Internet sites are
frequently requested, these are likely to be in the proxy's cache, which will improve user response
time. A proxy can also log its interactions, which can be helpful for troubleshooting.
A proxy server is used for many purposes, including:
 To provide internal system security
 To speed up resource access
 To apply access policies for tracking organizational Internet use or assessing employee
progress.
 To bypass special controls, such as parental or security controls
 To scan for viruses and malware
 To circumvent regional restrictions
 To allow websites to make requests to externally hosted resources when cross-domain
restrictions prohibit websites from linking to outside domains
Monitoring and Filtering
Proxy servers allow us to do several kind of filtering such as:
 Content Filtering
 Filtering encrypted data
 Bypass filters
 Logging and eavesdropping
Improving performance
It fasten the service by process of retrieving content from the cache which was saved when previous
request was made by the client.
Translation
It helps to customize the source site for local users by excluding source content or substituting source
content with original local content. In this the traffic from the global users is routed to the source
website through Translation proxy.
Accessing services anonymously
In this the destination server receives the request from the anonymzing proxy server and thus does not
receive information about the end user.
Security
Since the proxy server hides the identity of the user hence it protects from spam and the hacker
attacks.

49
SUB: INTERNET AND APPLICATIONS

Type of Proxies
Following table briefly describes the type of proxies:
Forward Proxies
In this the client requests its internal network server to forward to the internet.

Open Proxies
Open Proxies helps the clients to conceal their IP address while browsing the web.

Reverse Proxies
In this the requests are forwarded to one or more proxy servers and the response from the proxy server
is retrieved as if it came directly from the original Server.

Architecture
The proxy server architecture is divided into several modules as shown in the following diagram:

50
SUB: INTERNET AND APPLICATIONS

Proxy user interface


This module controls and manages the user interface and provides an easy to use graphical interface,
window and a menu to the end user. This menu offers the following functionalities:
 Start proxy
 Stop proxy
 Exit
 Blocking URL
 Blocking client
 Manage log
 Manage cache
 Modify configuration
Proxy server listener
It is the port where new request from the client browser is listened. This module also performs
blocking of clients from the list given by the user.
Connection Manager
It contains the main functionality of the proxy server. It performs the following functions:
 It contains the main functionality of the proxy server. It performs the following functions:
 Read request from header of the client.
 Parse the URL and determine whether the URL is blocked or not.
 Generate connection to the web server.
 Read the reply from the web server.

51
SUB: INTERNET AND APPLICATIONS

 If no copy of page is found in the cache then download the page from web server else will
check its last modified date from the reply header and accordingly will read from the cache
or server from the web.
 Then it will also check whether caching is allowed or not and accordingly will cache the
page.
Cache Manager
This module is responsible for storing, deleting, clearing and searching of web pages in the cache.
Log Manager
This module is responsible for viewing, clearing and updating the logs.
Configuration
This module helps to create configuration settings which in turn let other modules to perform desired
configurations such as caching.

WEB BROWSER
Web Browser is application software that allows us to view and explore information on the web. User
can request for any web page by just entering a URL into address bar.
Web browser can show text, audio, video, animation and more. It is the responsibility of a web
browser to interpret text and commands contained in the web page.
Earlier the web browsers were text-based while now a days graphical-based or voice-based web
browsers are also available. Following are the most common web browser available today:
Especially sites should be compatible to major browsers like Explorer, Firefox, Chrome,
Netscape, Opera, and Safari.

Internet Explorer
Internet Explorer (IE) is a product from software giant Microsoft. This is the most commonly used
browser in the universe. This was introduced in 1995 along with Windows 95 launch and it has passed
Netscape popularity in 1998.

Google Chrome
This web browser is developed by Google and its beta version was first released on September 2, 2008
for Microsoft Windows. Today, chrome is known to be one of the most popular web browser with its
global share of more than 50%.

Mozilla Firefox
Firefox is a new browser derived from Mozilla. It was released in 2004 and has grown to be the
second most popular browser on the Internet.

Safari
Safari is a web browser developed by Apple Inc. and included in Mac OS X. It was first released as a
public beta in January 2003. Safari has very good support for latest technologies like XHTML, CSS2
etc.

52
SUB: INTERNET AND APPLICATIONS

Opera
Opera is smaller and faster than most other browsers, yet it is full- featured. Fast, user-friendly, with
keyboard interface, multiple windows, zoom functions, and more. Java and non Java-enabled versions
available. Ideal for newcomers to the Internet, school children, handicap and as a front-end for CD-
Rom and kiosks.

Konqueror
Konqueror is an Open Source web browser with HTML 4.01 compliance, supporting Java applets,
JavaScript, CSS 1, CSS 2.1, as well as Netscape plugins. This works as a file manager as well as it
supports basic file management on local UNIX filesystems, from simple cut/copy and paste operations
to advanced remote and local network file browsing.

Lynx
Lynx is a fully-featured World Wide Web browser for users on Unix, VMS, and other platforms
running cursor-addressable, character-cell terminals or emulators.

Function of web browser:


The purpose of a web browser is to fetch information resources and display them on a user's device.
This process begins when the user inputs a URL, such as https://en.wikipedia.org/, into the browser.
Virtually all URLs on the Web start with either http: or https: which means the browser will retrieve
them with the Hypertext Transfer Protocol. In the case of https: the communication between the
browser and the web server is encrypted for the purposes of security and privacy. Another URL prefix
is file: which is used to display local files already stored on the user's device.
Once a web page has been retrieved, the browser's rendering engine displays it on the user's device.
This includes image and video formats supported by the browser.
Web pages usually contain hyperlinks to other pages and resources. Each link contains a URL, and
when it is clicked, the browser navigates to the new resource. Thus the process of bringing content to
the user begins again.
To implement all of this, modern browsers are a combination of numerous software components.
Common user interface features of browsers:
 Back and forward buttons to go back to the previous page visited or forward to the next one.
 A refresh or reload button to reload the current page.
 A stop button to cancel loading the page. (In some browsers, the stop button is merged with
the reload button.)
 A home button to return to the user's home page.
 An address bar to input the URL of a page and display it.
 A search bar to input terms into a search engine. (In some browsers, the search bar is merged
with the address bar.)

53
SUB: INTERNET AND APPLICATIONS

Browser Architecture:

1. User Interface:
The space where interaction between users and the browser.
Most of the browsers have common inputs for user interface:
•Address bar.
• Next and back buttons.
•Buttons for home, refresh and stop
•Bookmark web pages

54
SUB: INTERNET AND APPLICATIONS

2. Browser Engine
The bridge between User Interface & Rendering Engine, Browser Engine provides methods to begin
the loading of URL and other high-level browsing actions.
 Reload,
 Back,
 Forward actions
 Error messages
 Loading progress
3. Rendering Engine
Rendering Engine interprets (render) the HTML, XML, JavaScript and generates the layout that is
displayed in the User Interface. Key component of this phase is HTML, CSS parse. This is a reasons
why the browser display a website so difference.

SEARCH ENGINES
Search Engine refers to a huge database of internet resources such as web pages, newsgroups,
programs, images etc. It helps to locate information on World Wide Web.
User can search for any information by passing query in form of keywords or phrase. It then searches
for relevant information in its database and return to the user.
A search engine is a web-based tool that enables users to locate information on the World Wide Web.
Popular examples of search engines are Google, Yahoo!, and MSN Search. Search engines utilize
automated software applications (referred to as robots, bots, or spiders) that travel along the Web,
following links from page to page, site to site. The information gathered by the spiders is used to
create a searchable index of the Web.

55
SUB: INTERNET AND APPLICATIONS

Search Engine Components

Generally there are three basic components of a search engine as listed below:
1. Web Crawler
2. Database
3. Search Interfaces
Web crawler
It is also known as spider or bots. It is a software component that traverses the web to gather
information.
Database
All the information on the web is stored in database. It consists of huge web resources.
Search Interfaces
This component is an interface between user and the database. It helps the user to search through the
database.
Search Engine Working
Web crawler, database and the search interface are the major component of a search engine that
actually makes search engine to work. Search engines make use of Boolean expression AND, OR,
NOT to restrict and widen the results of a search. Following are the steps that are performed by the
search engine:
 The search engine looks for the keyword in the index for predefined database instead of
going directly to the web to search for the keyword.
 It then uses software to search for the information in the database. This software component
is known as web crawler.
 Once web crawler finds the pages, the search engine then shows the relevant web pages as a
result. These retrieved web pages generally include title of page, size of text portion, first
several sentences etc.
These search criteria may vary from one search engine to the other. The retrieved information is
ranked according to various factors such as frequency of keywords, relevancy of information, links
etc.
 User can click on any of the search results to open it.

56
SUB: INTERNET AND APPLICATIONS

Architecture
The search engine architecture comprises of the three basic layers listed below:
 Content collection and refinement.
 Search core
 User and application interfaces

Search Engine Processing


Indexing Process
Indexing process comprises of the following three tasks:
 Text acquisition
 Text transformation
 Index creation

57
SUB: INTERNET AND APPLICATIONS

Text Acquisition: It identifies and stores documents for indexing.


Text Transformation: It transforms document into index terms or features.
Index Creation:It takes index terms created by text transformations and create data structures to
suport fast searching.
Query Process:Query process comprises of the following three tasks:
 User interaction
 Ranking
 Evaluation
User Interaction: It supports creation and refinement of user query and displays the results.
Ranking: It uses query and indexes to create ranked list of documents.
Evaluation: It monitors and measures the effectiveness and efficiency. It is done offline.

SEARCH TOOLS
Definition - Utilities available on the Internet to help you find information among the millions of
documents on the Web.
Search Tools are categorized into three types:
1. Internet Directories: It will classify information by topic and also allows you to choose one
of the topics or type a keyword or phrase to search
2. Search Engines: A search engine will search the entire contents of the Internet by
keyword(s).
3. Meta-Search Engines: A meta-search engine will search a dozen different search engines
and directories simultaneously and display the ten best responses from each search engine
Each type of searching tool accomplishes a different task and locates information in a different way.

Search Engines:
AltaVista- http://altavista.com - searches through more than 50 million Web pages. Use "+" to indicate
words that must be contained on a page. Use "-" for words that must not be contained on pages.
Quotation marks must be used for searching phrases.
KidsClick http://sunsite.berkeley.edu/KidsClick - a database of more than 5,000 records of interest to
kids.
MathSearch - http://www.maths.usyd.edu.au/MathSearch.html - More than 190,000 Web documents
from mathematics and statistics servers.

Subject Directories
Yahooligans - http://www.yahooligans.com A student-friendly Search tool allowing students to
browse and do subject category searches. Lycos: http://www.lycos.com A very large database. It has
specialty areas for locating Librarian's Index to the Internet: http://sunsite.berkeley.edu/InternetIndex

Meta-Search
DogPile: http://www.dogpile.com
Metacrawler: http://www.metacrawler.com

58
SUB: INTERNET AND APPLICATIONS

FIREWALLS
A firewall is a network security system that monitors and controls incoming and outgoing network
traffic based on predetermined security rules. A firewall typically establishes a barrier between a
trusted internal network and untrusted external network, such as the Internet.
A Firewall may be simply defined as a single point between two or more networks where all traffic
must pass; the firewall authenticates controls and logs all the traffic.
In the computing world Firewall is software or hardware based network security system that controls
incoming and outgoing network traffic by analyzing data packets and determining whether they should
be allowed through or not based on a certain rule set. It can have a variety of configuration depending
upon the user requirement. It builds a bridge between internal and external network and protects
against.

• Remote login
• Application back doors
• Virus, spam, malware etc.
A Firewall accomplishes controlled access using
• Packet filtering
• Circuit level gateway
• Application level gateway
• Stateful inspection

Why a Firewall is needed?


There is no need for a firewall if each and every host of a private network is properly secured.
Unfortunately, in practice the situation is different. A private network may consist of different
platforms with diverse OS and applications running on them. Many of the applications were designed
and developed for an ideal environment, without considering the possibility of the existence of bad
guys. Moreover, most of the corporate networks are not designed for security. Therefore, it is essential
to deploy a firewall to protect the vulnerable infrastructure of an enterprise.

Access Control Policies


Access control policies play an important role in the operation of a firewall. The policies can be
broadly categorized in to the following four types:
Service Control:
• Determines the types of internet services to be accessed
• Filters traffic based on IP addresses and TCP port numbers
59
SUB: INTERNET AND APPLICATIONS

• Provides Proxy servers that receives and interprets service requests before it is passed on
Direction Control:
Determines the direction in which a particular service request may be initiated and allowed to flow
through the firewall
User Control:
• Controls access to a service according to which user is attempting to access it
• Typically applied to the users inside the firewall perimeter
• Can be applied to the external users too by using secure authentication technique
Behavioral Control:
• Controls how a particular service is used
• For example, a firewall may filter email to eliminate spam
• Firewall may allow only a portion of the information on a local web server to an external user
Firewall Capabilities
Important capabilities of a firewall system are listed below:
• It defines a single choke point to keep unauthorized users out of protected network
• It prohibits potentially vulnerable services from entering or leaving the network
• It provides protection from various kinds of IP spoofing
• It provides a location for monitoring security-related events
• Audits and alarms can be implemented on the firewall systems
• A firewall is a convenient platform for several internet functions that are not security related
• A firewall can serve as the platform for IPSec using the tunnel mode capability and can be used to
implement VPNs

Limitations of a Firewall
Main limitations of a firewall system are given below:
• A firewall cannot protect against any attacks that bypass the firewall. Many organizations buy
expensive firewalls but neglect numerous other back-doors into their network
• A firewall does not protect against the internal threats from traitors. An attacker may be able to break
into network by completely bypassing the firewall, if he can find a ``helpful'' insider who can be
fooled into giving access to a modem pool
• Firewalls can't protect against tunneling over most application protocols. For example, firewall
cannot protect against the transfer of virus-infected programs or files
Types of Firewall
On the basis of Traffic controlling technique Firewall can be categorized into the following four:
1. Packet Filtering Firewall
It operates by filtering the incoming and outgoing packets using routers or devices that have been
configured to screen.
It examines the information contained in TCP and IP packet headers, in order to accept or deny
packets from entering or leaving the network. It checks the following attributes
 Source address.
 Destination address.
 Application or protocol.

60
SUB: INTERNET AND APPLICATIONS

 Source port number.


 Destination port number
2. Circuit Level Firewall
Along with allowing or disallowing packets a Circuit Level Firewall also determines whether the
connection between both ends is valid. It validates each session of established connection for exchange
of data and monitors TCP handshaking.
It also checks connection request attributes against configured filtering rules and then traffic is filtered
based on specified session rules. It checks for the following
 . Destination of IP address/Port
 . Source of IP address / Port
 . Time of day
 . Protocol
 . User
 . Password
3. Application Level gateway
An Application Level gateway is similar to circuit level gateways but is application specific i.e. it can
filter packets at the application layer of the 051 model. Incoming or outgoing packets are unable to
access services for which there is no proxy. Therefore, it is also called proxies. It can also be used to
log user activity and logins. They can also filter application specific commands.
Network Address Translation
NAT works by using one set of addresses for communications on the internet and a separate set of
addresses for communication on the private network.
• Class A addresses: 10.0.0.0 – 10.255.255.255.255
• Class B addresses: 172.16.0.0 – 172.31. 255.255
• Class C addresses: 192.168.0.0 – 192.168.255.255
As these addresses are reserved for internal network addressing, these are not routable. The Firewall
performs translation of an internal address to an external IP address and vice versa to facilitate
communication between the private and the public network.

61
SUB: INTERNET AND APPLICATIONS

4. Active Firewall Elements


The structure of an active firewall element, which is integrated in the communication interface
between the insecure public network and the private network

Integration Module: It integrates the active firewall element into the communication system with the
help of device drivers. In case of packet filters, the integration is above the Network Access Layer,
where as it are above the Transport layer ports in case of Application Gateway.
Analysis Module: Based on the capabilities of the firewall, the communication data is analyzed in the
Analysis Module. The results of the analysis are passed on to the Decision Module.
Decision Module: The Decision Module evaluates and compares the results of the analysis with the
security policy definitions stored in the Rule set and the communication data is allowed or prevented
based the outcome of the comparison.
Processing module for Security related Events: Based on rule set, configuration settings and the
message received from the decision module, it writes on the logbook and generates alarm message to
the Security Management System.
Authentication Module: This module is responsible for the identification and authentication of the
instances that are communicated through the firewall system.
Rule set: It contains all the information necessary to make a decision for or against the transmission of
communication data through the Firewall and it also defines the security related events to be logged.
Logbook: All security-related events that occur during operation are recorded in the logbook based on
the existing rule set.
Security Management System: It provides an interface where the administrator enters and maintains
the rule set. It also analyses the data entered in the logbook.

62
SUB: INTERNET AND APPLICATIONS

DATA SECURITY
Introduction
Due the rapid growth and widespread use of information and communication technologies, Internet
services as well as numerous occurrences of international terrorism, demands better methods of
protecting computers, data and information.
Data
- Collection of data objects and their attributes
- An attribute is a property or characteristic of an object
Examples: eye color of a person, temperature, etc.
- A collection of attributes describe an object.
Object is also known as record, point, case, sample, entity, or instance
Information
Collection of organization data or preparing data to take the decision , where
Data + Processing = Information
Example: book is data while my book is information.

Definition
Data security is the protection of programs and data in computers and communication systems against
unauthorized modification, destruction, disclosure or transfer whether accidental or intentional.
Data control It is the measures taken to enforce the security of the programs and data. Data can be
lost in various ways, such as viruses, user errors, computer crashes, hacking etc. In order to protect
against data loss, controls need to be put in place.
Data Security Core Principles
The three core principles of data security also referred to as information security are confidentiality,
integrity and availability.

63
SUB: INTERNET AND APPLICATIONS

Confidentiality - It means that sensitive data or information belonging to an organization or


government should not be accessed by or disclosed to unauthorized people. Such data include
employees’ details, classified military information, business financial records etc.
Integrity - This means that data should not be modified without owner’s authority. Data integrity is
violated when a person accidentally or with malicious intent, erases or modifies important files such as
payroll or a customer’s bank account file.
Availability - The information must be available on demand. This means that any information system
and communication link used to access it must be efficient and functional. An information system may
be unavailable due to power outages, hardware failures, unplanned upgrades or repairs.
Definition of other terms:
Vulnerability: weakness in the system that can be compromised and therefore lead to loss or harm
e.g. weak password.
Threats: circumstances that have the potential to cause loss or harm. Types of threats include:
Interception, Interruption, Modification, and Fabrication.
Authentication: It is the verification of the identity of the user. It is achieved through; - something
you know i.e. password, use what you have i.e. badge, smartcard, something that you are e.g.
biometric analysis i.e. finger prints, voice recognition, retina, face recognition etc.
Denial of service: Denial of service (DoS) usually refers to an attack that attempts to make a computer
resource unavailable to its intended users by flooding a network or server with requests and data.

Data Security Refer to the term Cryptography is one of the mathematical application that is useful in
transforming that data through an insecure communication network, which is the worst case.
As a result: security has two parts:
1. Cryptography
2. Physical pretiction
 cryptography the art or science encompassing the principles and methods of transforming an
intelligible message into one that is unintelligible, and then retransforming that message back
to its original form
 plaintext the original intelligible message
 ciphertext the transformed message
 cipher an algorithm for transforming an intelligible message into one that is unintelligible by
transposition and/or substitution methods
 key some critical information used by the cipher, known only to the sender & receiver
 encipher the process of converting plaintext to ciphertext using a cipher and a key
 decipher the process of converting ciphertext back into plaintext using a cipher and a key
 cryptanalysis the study of principles and methods of transforming an unintelligible message
back into an intelligible message without knowledge of the key.
 cryptology both cryptography and cryptanalysis

64
SUB: INTERNET AND APPLICATIONS CLASS: II-B.Sc CS
SEM: IV STAFF NAME: K.VINOTHKUMAR

5 MARKS
1. Write short note on types of proxy server. Page 51 - 52
2. Explain in detail about web browser. Page 52 - 53
3. Write short note on function of web browser. Page 53
4. Explain in detail about Search tools. Page 56 – 57

10 MARKS
1. Explain about firewall in detail Page 59 - 62
2. Explain about data security in detail Page 63 – 64
3. Explain detail about search Engines. Page 55 – 57
4. Explain detail about Web Server. Page 46 – 48
5. Explain detail about Proxy Server. Page 49 – 52

65
SUB: INTERNET AND APPLICATIONS

UNIT – IV
Internet Relay Chat - Types of Network - Packet Switched Network - Circuit Switched Network -
TCP/IP - Internet Protocol.

INTERNET RELAY CHAT


 Internet Relay Chat is a protocol developed by Oikarinen in August 1988. It defines set of rules
for communication between client and server by some communication mechanism such as chat
rooms, over the internet.
 IRC consist of separate networks of IRC servers and machines. These allow IRC clients to connect
to IRC. IRC client runs a program client to connect to a server on one of the IRC nets. After
connecting to IRC server on IRC network, user can join with one or more channels and converse
over there.
 IRC enables users to connect to a server using a software program or web service and
communicate with each other live.
 IRC Commands
 Following commands are used while connected to an IRC server. Almost of the below commands
will work with most of IRC clients and servers.
Command Description
/away (message) Leaves a message let the others know why you are gone.
/clear Clears the text from current window.
/clearall Clears all the text from all of the opened windows.
/dcc chat (username) Opens a chat window with the username that you specify.
/help Brings up a list of all the commands or the help window.
/ignore (on/of) Allows you to ignore or not ignore a user.
(username)
/ignore (+/-) (username) Alternative to ignore or not ignore a user.
/join (#channel) Joins a particular chat group.
/nick (username) Changes the username
/part (channel) Leaves specified channel.
/ping (username) Pings a specified user and it let you know how far they are in
seconds
/whowas (username) Shows information about specified user that was in earlier.
/ping (channel) Pings all users in specified channel.
IRC is organized into numerous independent networks, all with different audiences, geographical
reach, and management. Besides the major networks, there are also many smaller networks that serve
either a niche audience or a small geographical region.

66
SUB: INTERNET AND APPLICATIONS

In its simplest form, it is a medium in which people can interact with one another textually in real-
time. The interaction can take place in channels (chat rooms) with a variety of topics or even be peer to
peer. Any individual with an IRC client can join a server, participate in a particular channel or even
create their own.

Advantages of using IRC:


 IRC's channel paradigm is very flexible and robust: allows for real-time discussion with up to
hundreds of people at once.
 IRC has the concept of access levels and complex channel modes. For example, users may be
banned from a channel based on their IP address, or a channel may be secret or private and
require an invitation or a secret code to enter.
 Instant access to a large number of "lurking" and active people

Disadvantages of using IRC:


All passwords and everything you say can be sniffed by anyone between you and the server.
The chat client line length and buffer limits mean that it is impossible to develop an argument, and
therefore all "discussion" is necessarily limited to chat-sized bites of words.
Hyperbole, jokes, and sarcasm not only may be misunderstood.

TYPES OF NETWORK
Networks Definition:
A network is a set of nodes connected by media links. A node can be a computer, printer, or any
other device capable of sending or receiving data generated by other nodes on the network. The links
connecting the devices are often called communication channels.

Distributed processing
Networks use distributed processing, in which a task is divided among multiple computers.
Advantages of distributed processing include the following:
 Security / Encapsulation
 Distributed databases
 Faster problem solving

Network Criteria
The three criteria necessary for an effective and efficient network are performance, reliability and
security
 Performance – The performance of a network depends on a number of factors, including the
number of users, the type of transmission medium, the capabilities of the connected hardware,
and the efficiency of the software.
 Reliability – The network ability is measured by frequency of failure, the time it takes a link to
recover from a failure, and the network’s robustness in a catastrophe.
 Security – Network security issues include protecting data from unauthorized access and viruses.

67
SUB: INTERNET AND APPLICATIONS

Applications
The network applications in different fields are the following:
 Marketing and sales
 Financial services
 Manufacturing
 Electronic messaging

Categories of Networks
Communication Networks can be of following 5 types:
1. Local Area Network (LAN)
2. Metropolitan Area Network (MAN)
3. Wide Area Network (WAN)
4. Wireless
5. Inter Network (Internet)

Local Area Network (LAN)


 It is also called LAN and designed for small physical areas such as an office, group of
buildings or a factory.
 LANs are used widely as it is easy to design and to troubleshoot. Personal computers and
workstations are connected to each other through LANs.
 We can use different types of topologies through LAN, these are Star, Ring, Bus, Tree etc.
 LAN can be a simple network like connecting two computers, to share files and network
among each other while it can also be as complex as interconnecting an entire building.
 LAN networks are also widely used to share resources like printers, shared hard-drive etc

68
SUB: INTERNET AND APPLICATIONS

Characteristics of LAN
 LAN's are private networks, not subject to tariffs or other regulatory controls.
 LAN's operate at relatively high speed when compared to the typical WAN.
 There are different types of Media Access Control methods in a LAN, the prominent ones are
Ethernet, Token ring.
 It connects computers in a single building, block or campus, i.e. they work in a restricted
geographical area.
Applications of LAN
 One of the computer in a network can become a server serving all the remaining computers
called clients. Software can be stored on the server and it can be used by the remaining
clients.
 Connecting locally all the workstations in a building to let them communicate with each
other locally without any internet access.
 Sharing common resources like printers etc are some common applications of LAN.
Advantages of LAN
 Resource Sharing: Computer resources like printers, modems, DVD-ROM drives and hard
disks can be shared with the help of local area networks. This reduces cost and hardware
purchases.
 Software Applications Sharing: It is cheaper to use same software over network instead of
purchasing separate licensed software for each client a network.
 Easy and Cheap Communication: Data and messages can easily be transferred over
networked computers.
 Centralized Data: The data of all network users can be saved on hard disk of the server
computer. This will help users to use any workstation in a network to access their data.
 Data Security: Since, data is stored on server computer centrally, it will be easy to manage
data at only one place and the data will be more secure too.
 Internet Sharing: Local Area Network provides the facility to share a single internet
connection among all the LAN users. In Net Cafes, single internet connection sharing system
keeps the internet expenses cheaper.
Disadvantages of LAN
 High Setup Cost: Although the LAN will save cost over time due to shared computer
resources, but the initial setup costs of installing Local Area Networks is high.
 Privacy Violations: The LAN administrator has the rights to check personal data files of
each and every LAN user. Moreover he can check the internet history and computer use
history of the LAN user.
 Data Security Threat: Unauthorised users can access important data of an organization if
centralized data repository is not secured properly by the LAN administrator.
 LAN Maintenance Job: Local Area Network requires a LAN Administrator because, there
are problems of software installations or hardware failures or cable disturbances in Local
Area Network. A LAN Administrator is needed at this full time job.
 Covers Limited Area: Local Area Network covers a small area like one office, one building
or a group of nearby buildings.

69
SUB: INTERNET AND APPLICATIONS CLASS: II-BCA
SEM: IV STAFF NAME: V.BALASUBRAMANIYAM
Metropolitan Area Network (MAN)
It was developed in 1980s.It is basically a bigger version of LAN. It is also called MAN and uses the
similar technology as LAN. It is designed to extend over the entire city. It can be means to connecting
a number of LANs into a larger network or it can be a single cable. It is mainly hold and operated by
single private company or a public company.

Characteristics of MAN
 It generally covers towns and cities (50 km)
 Communication medium used for MAN are optical fibers, cables etc.
 Data rates adequate for distributed computing applications.
Advantages of MAN
 Extremely efficient and provide fast communication via high-speed carriers, such as fibre
optic cables.
 It provides a good back bone for large network and provides greater access to WANs.
 The dual bus used in MAN helps the transmission of data in both directions simultaneously.
 A MAN usually encompasses several blocks of a city or an entire city.
Disadvantages of MAN
 More cable required for a MAN connection from one place to another.
 It is difficult to make the system secure from hackers and industrial espionage(spying)
graphical regions.

Wide Area Networks


A Wide area network provides long distance transmission of data, voice, image, and video information
over large geographical areas that may comprise a country, a continent, or even the whole world.

70
SUB: INTERNET AND APPLICATIONS

Characteristics of WAN
 It generally covers large distances (states, countries, continents).
 Communication medium used are satellite, public telephone networks which are connected
by routers.
Advantages of WAN
 Covers a large geographical area so long distance business can connect on the one network.
 Shares software and resources with connecting workstations.
 Messages can be sent very quickly to anyone else on the network. These messages can have
picture, sounds or data included with them(called attachments).
 Expensive things(such as printers or phone lines to the internet) can be shared by all the
computers on the network without having to buy a different peripheral for each computer.
 Everyone on the network can use the same data. This avoids problems where some users may
have older information than others.
Disadvantages of WAN
 Need a good firewall to restrict outsiders from entering and disrupting the network.
 Setting up a network can be an expensive, slow and complicated. The bigger the network the
more expensive it is.
 Once set up, maintaining a network is a full-time job which requires network supervisors and
technicians to be employed.
 Security is a real issue when many different people have the ability to use information from
other computers. Protection against hackers and viruses adds more complexity and expense.

Wireless Network
Digital wireless communication is not a new idea. Earlier, Morse code was used to implement
wireless networks. Modern digital wireless systems have better performance, but the basic idea is the
same.
Wireless Networks can be divided into three main categories:
1. System interconnection
2. Wireless LANs
3. Wireless WANs
System Interconnection
System interconnection is all about interconnecting the components of a computer using short-range
radio. Some companies got together to design a short-range wireless network called Bluetooth to
connect various components such as monitor, keyboard, mouse and printer, to the main unit, without
wires. Bluetooth also allows digital cameras, headsets, scanners and other devices to connect to a
computer by merely being brought within range.
In simplest form, system interconnection networks use the master-slave concept. The system unit is
normally the master, talking to the mouse, keyboard, etc. as slaves.
Wireless LANs
These are the systems in which every computer has a radio modem and antenna with which it can
communicate with other systems. Wireless LANs are becoming increasingly common in small offices

71
SUB: INTERNET AND APPLICATIONS CLASS: II-BCA
SEM: IV STAFF NAME: V.BALASUBRAMANIYAM
and homes, where installing Ethernet is considered too much trouble. There is a standard for wireless
LANs called IEEE 802.11, which most systems implement and which is becoming very widespread.

Wireless WANs
The radio network used for cellular telephones is an example of a low-bandwidth wireless WAN. This
system has already gone through three generations.
 The first generation was analog and for voice only.
 The second generation was digital and for voice only.
 The third generation is digital and is for both voice and data.

Inter Network
Inter Network or Internet is a combination of two or more networks. Inter network can be formed by
joining two or more individual networks by means of various devices such as routers, gateways and
bridges.

Internetworks
The networks are connected to form an Internetwork.

72
SUB: INTERNET AND APPLICATIONS

Example:
The Internetwork is made of five networks:
 Four LANs and
 One WAN.
If host A needs to send a data packet to host D, the packet first needs to go from A to S1, then from
S1 to S3, and finally from S3 to host D. We say that the data packet passes through three links.
Need for Network Layer

To solve the problem of delivery through several links, the network layer was designed. The network
layer is responsible for host-to-host delivery and for routing the packets through the routers or
switches.
Network Layer at Source - it is responsible for creating a packet that carries two universal addresses: a
destination address and a source address. The source network layer receives data from the transport
layer, adds the universal address of host A and D and check for its size. The network layer at the
source may also add fields for error control.
Network Layer at Router or Switch- responsible for routing the packet. When a packet arrives, the
router or switch finds the interface from which the packet must be sent. This is done by using a routing
table.
Network Layer at Destination – The network layer at the destination is responsible for address
verification; it makes sure that the destination address on the packet is the same as the address of the
host.
Internet as a Packet –Switched Network – The internet, at the network layer, is a packet-switched
network. In general, switching can be divided into two broad categories: circuit switching and packet
switching.

73
SUB: INTERNET AND APPLICATIONS

PACKET SWITCHED NETWORK


Packet switching is a method of transferring the data to a network in form of packets. In order to
transfer the file fast and efficient manner over the network and minimize the transmission latency, the
data is broken into small pieces of variable length, called Packet. At the destination, all these small-
parts (packets) has to be reassembled, belonging to the same file. A packet composes of payload and
various control information. No pre-setup or reservation of resources are needed.
Packet Switching uses Store and Forward technique while switching the packets; while forwarding the
packet each hop first store that packet then forward. This technique is very beneficial because packets
may get discarded at any hop due to some reason. More than one path is possible between a pair of
source and destination. Each packet contains Source and destination address using which they
independently travel through the network. In other words, packets belonging to the same file may or
may not travel through the same path. If there is congestion at some path, packets are allowed to
choose different path possible over existing network.
Packet-Switched networks were designed to overcome the weaknesses of Circuit-Switched networks,
since circuit-switched networks were not very effective for small messages.
Advantage of Packet Switching over Circuit Switching :
 More efficient in terms of bandwidth, since the concept of reserving circuit is not there.
 Minimal transmission latency.
 More reliable as destination can detect the missing packet.
 More fault tolerant because packets may follow different path in case any link is down,
Unlike Circuit Switching.
 Cost effective and comparatively cheaper to implement.
Disadvantage of Packet Switching over Circuit Switching :
 Packet Switching don’t give packets in order, whereas Circuit Switching provides ordered
delivery of packets because all the packets follow the same path.
 Since the packets are unordered, we need to provide sequence numbers to each packet.
 Complexity is more at each node because of the facility to follow multiple path.
 Transmission delay is more because of rerouting.
 Packet Switching is beneficial only for small messages, but for bursty data (large messages)
Circuit Switching is better.

Modes of Packet Switching:


Connection-oriented Packet Switching (Virtual Circuit) :- Before starting the transmission, it
establishes a logical path or virtual connection using signalling protocol, between sender and receiver
and all packets belongs to this flow will follow this predefined route.
Virtual Circuit ID is provided by switches/routers to uniquely identify this virtual connection.
Data is divided into small units and all these small units are appended with help of sequence number.
Overall, three phases takes place here- Setup, data transfer and tear down phase.

74
SUB: INTERNET AND APPLICATIONS

All address information is only transferred during setup phase. Once the route to destination is
discovered, entry is added to switching table of each intermediate node. During data transfer, packet
header (local header) may contain information such as length, timestamp, sequence number etc.
Connection-oriented switching is very useful in switched WAN

Connectionless Packet Switching (Datagram) :- Unlike Connection-oriented packet switching, In


Connectionless Packet Switching each packet contains all necessary addressing information such as
source address, destination address and port numbers etc. In Datagram Packet Switching, each packet
is treated independently. Packets belongs to one flow may take different routes because routing
decisions are made dynamically, so the packets arrived to destination might be out of order. It has no
connection setup and tear down phase, like Virtual Circuits.
Packet delivery is not guaranteed in connectionless packet switching, so the reliable delivery must be
provided by end systems using additional protocols.

75
SUB: INTERNET AND APPLICATIONS

Delays in Packet switching:


1. Transmission Delay
2. Propagation Delay
3. Queuing Delay
4. Processing Delay

1. Transmission Delay:
Time taken to put a packet onto link. In other words, it is simply time required to put data bits on the
wire/communication medium. It depends on length of packet and bandwidth of network.
2. Propagation delay:
Time taken by the first bit to travel from sender to receiver end of the link. In other words, it is simply
the time required for bits to reach destination from start point. Factors on which Propagation delay
depends are Distance and propagation speed.
3. Queuing Delay:
Queuing delay is the time a job waits in a queue until it can be executed. It depends on congestion. It
the time difference between when packet arrived Destination and when the packet data was processed
or executed. It may be caused by mainly three reasons i.e. originating switches, intermediate switches
or call receiver servicing switches.
4. Processing Delay :
Processing delay is the time it takes routers to process the packet header. Processing of packets help in
detecting bit-level errors that occur during transmission of packet to destination. Processing delays in
high-speed routers are typically on the order of microseconds or less.
CIRCUIT SWITCHED NETWORK
In circuit switching network resources (bandwidth) is divided into pieces and bit delay is constant
during a connection. The dedicated path/circuit established between sender and receiver provides a
guaranteed data rate. Data can be transmitted without any delays once the circuit is established.
Telephone system network is the one of example of Circuit switching.
Two methods of multiplexing multiple signals into a single carrier are
1. Frequency Division Multiplexing: Divides into multiple bands
Frequency Division Multiplexing or FDM is used when multiple data signals are combined
for simultaneous transmission via a shared communication medium. It is a technique by
which the total bandwidth is divided into a series of non-overlapping frequency sub-bands,
where each sub-band carry different signal. Practical use in radio spectrum & optical fiber to
share multiple independent signals.

76
SUB: INTERNET AND APPLICATIONS

2. Time Division Multiplexing: Divides into frames


Time-division multiplexing (TDM) is a method of transmitting and receiving independent
signals over a common signal path by means of synchronized switches at each end of the
transmission line. TDM is used for long-distance communication links and bears heavy data
traffic loads from end user. Time division multiplexing (TDM) is also known as a digital
circuit switched.
Circuit switching is a switching method in which a dedicated communication path in physical form
between two stations within a network is established, maintained and terminated for each
communication session. It has basically three phases as circuit establishment, data transfer and circuit
disconnect.
Once the connection is established, the data transfer is transparent. The main feature of such a
connection is that it provides a fixed data rate channel and both subscribers must operate at this rate, It
is considered inefficient compared to packet switching because channel capacity is completely
dedicated for duration of connection. If there is no data at any moment of time, channel capacity goes
wasted. Moreover, setting up of connection takes time.
Circuit switching has two types of transmissions.
1. Datagram transmissions - Datagram transmissions have individually addressed frames.
2. Data-stream transmissions - Data-stream transmissions have a stream of data for which
address checking occurs only once.
The routing in circuit switching may have either static routing or dynamic routing. In case of static
routing, this methodology uses the same approach all the time while dynamic routing allows
alternate routing depending on traffic.

The Key Point of Circuit Switching are.


1. It is the simplest method of data communication in which a dedicated physical connection or path is
established between the sending and receiving device.
2. In circuit switched networks, a set of switches are connected by physical links. A connection
between two stations is a dedicated path made of one or more links.
3. Figure shows a circuit switched network in which computer A, B and C are connected to computer
D, E, F and G via four switches
4. The four switches connecting these computers thus provide dedicated links by reducing the line
cost. Here I, II, III and IV are the circuit switches or nodes. Nodes I, III, IV are connected to
computers while II is only routing node.

77
SUB: INTERNET AND APPLICATIONS

5. In circuit switching the routing decision is made when path is set up across the network. After the
link has been set between the sender and receiver, the information is forwarded continuously over the
link.
6. The dedicated path established between the sender and the receiver is maintained for entire duration
of conversation.
7. This link or path is released only when data transmission between sender and receiver is over.
8. Circuit switching takes place at the physical layer.
9. Before starting communication, the stations must make a reservation of resources to be used during
the communication. These resources can be switch buffers, switch processing time, switch input/output
ports. These resources remain dedicated during the entire duration of data transfer.
10 Data transferred between the two stations are not packetized (i.e. in form of packets). The data are a
continuous flow· sent by the source station and received by the destination station and there may be
periods of silence.
11. There is no addressing involved in data transfer. The switches route the data based on their
occupied band (FDM) or time slot (TDM). However, there is end-to-end addressing used during set up
phase.
12. In telephone systems circuit switching is used.
13. The communication in a circuit switched network takes place in three phases:
1. Circuit establishment or setup phase: In circuit .switched network, before actual data transfer
takes place, a dedicated circuit or path is established between the sender and receiver. End-to-
End addressing (i.e. source and destination address) is required for creating a connection
between two end systems.
2. Data transfer phase: Actual data transfer between the source and destination takes place after
the dedicated path is set up between them. The data flows are continuous between sender and
receiver. There may be periods of silence in between. Generally all the internal connections are
duplex.
3. Circuit disconnects or tears down phase: When one of the parties needs to disconnect, a signal
is sent to each switch to release the resources.

78
SUB: INTERNET AND APPLICATIONS

Circuit Switch
A circuit switch is a device that creates a temporary connection between an input link and output link.

A circuit switch usually has n input lines and m output lines i.e. number of input lines and number of
output lines may not be equal.

Advantages of Circuit Switching


1. The dedicated path/circuit established between sender and receiver provides a guaranteed data rate.
2. Once the circuit is established, data is transmitted without any delay as there is no waiting time at
each switch.
3. Since a dedicated continuous transmission path is established, the method is suitable for long
continuous transmission.
Disadvantages of Circuit Switching
The various disadvantages of circuit switching are:
1. As the connection is dedicated it cannot be used to transmit any other data even if the channel is
free.
2. It is inefficient in terms of utilization of system resources. As resources are allocated for the entire
duration of connection, these are not available to other connections.
3. Dedicated channels require more bandwidth.
4. Prior to actual data transfer, the time required to establish a physical link between the two stations is
too long.

TCP/IP
TCP/IP means Transmission Control Protocol and Internet Protocol. It is the network model used in
the current Internet architecture as well. Protocols are set of rules which govern every possible
communication over a network. These protocols describe the movement of data between the source
and destination or the internet. They also offer simple naming and addressing schemes.

79
SUB: INTERNET AND APPLICATIONS

Overview of TCP/IP reference model


TCP/IP that is Transmission Control Protocol and Internet Protocol was developed by Department
of Defence's Project Research Agency (ARPA, later DARPA) as a part of a research project of
network interconnection to connect remote machines.
The features that stood out during the research, which led to making the TCP/IP reference model were:
 Support for a flexible architecture. Adding more machines to a network was easy.
 The network was robust, and connections remained intact untill the source and destination
machines were functioning.
The overall idea was to allow one application on one computer to talk to(send data packets) another
application running on different computer.
Different Layers of TCP/IP Reference Model
The 4 layers that form the TCP/IP reference model:
Layer 1: Host-to-network Layer
1. Lowest layer of the all.
2. Protocol is used to connect to the host, so that the packets can be sent over it.
3. Varies from host to host and network to network.
Layer 2: Internet layer
1. Selection of a packet switching network which is based on a connectionless internetwork
layer is called a internet layer.
2. It is the layer which holds the whole architecture together.
3. It helps the packet to travel independently to the destination.
4. Order in which packets are received is different from the way they are sent.
5. IP (Internet Protocol) is used in this layer.
6. The various functions performed by the Internet Layer are:
o Delivering IP packets
o Performing routing
o Avoiding congestion
Layer 3: Transport Layer
1. It decides if data transmission should be on parallel path or single path.
2. Functions such as multiplexing, segmenting or splitting on the data is done by transport layer.
3. The applications can read and write to the transport layer.
4. Transport layer adds header information to the data.
5. Transport layer breaks the message (data) into small units so that they are handled more
efficiently by the network layer.
6. Transport layer also arrange the packets to be sent, in
sequence. Layer 4: Application Layer
The TCP/IP specifications described a lot of applications that were at the top of the protocol stack.
Some of them were TELNET, FTP, SMTP, DNS etc.
1. TELNET is a two-way communication protocol which allows connecting to a remote
machine and run applications on it.
2. FTP(File Transfer Protocol) is a protocol, that allows File transfer amongst computer users
connected over a network. It is reliable, simple and efficient.

80
SUB: INTERNET AND APPLICATIONS

3. SMTP(Simple Mail Transport Protocol) is a protocol, which is used to transport electronic


mail between a source and destination, directed via a route.
4. DNS(Domain Name Server) resolves an IP address into a textual address for Hosts connected
over a network.
5. It allows peer entities to carry conversation.
6. It defines two end-to-end protocols: TCP and UDP
o TCP(Transmission Control Protocol): It is a reliable connection-oriented protocol
which handles byte-stream from source to destination without error and flow control.
o UDP(User-Datagram Protocol): It is an unreliable connection-less protocol that do
not want TCPs, sequencing and flow control. Eg: One-shot request-reply kind of
service.
Difference between OSI and TCP/IP Reference Model
Following are some major differences between OSI Reference Model and TCP/IP Reference Model,
with diagrammatic comparison below.
OSI(Open System Interconnection) TCP/IP(Transmission Control Protocol /
Internet Protocol)
1. OSI is a generic, protocol independent 1. TCP/IP model is based on standard
standard, acting as a communication gateway protocols around which the Internet has
between the network and end user. developed. It is a communication protocol,
which allows connection of hosts over a
network.
2. In OSI model the transport layer guarantees 2. In TCP/IP model the transport layer does
the delivery of packets. not guarantees delivery of packets. Still the
TCP/IP model is more reliable.
3. Follows vertical approach. 3. Follows horizontal approach.
4. OSI model has a separate Presentation layer 4. TCP/IP does not have a separate
and Session layer. Presentation layer or Session layer.
5. Transport Layer is Connection Oriented. 5. Transport Layer is both Connection
Oriented and Connection less.
6. Network Layer is both Connection Oriented 6. Network Layer is Connection less.
and Connection less.
7. OSI is a reference model around which the 7. TCP/IP model is, in a way implementation
networks are built. Generally it is used as a of the OSI model.
guidance tool.
8. Network layer of OSI model provides both 8. The Network layer in TCP/IP model
connection oriented and connectionless provides connectionless service.
service.
9. OSI model has a problem of fitting the 9. TCP/IP model does not fit any protocol
protocols into the model.
10. Protocols are hidden in OSI model and are 10. In TCP/IP replacing protocol is not easy.
easily replaced as the technology changes.
11. OSI model defines services, interfaces and 11. In TCP/IP, services, interfaces and
protocols very clearly and makes clear protocols are not clearly separated. It is also
distinction between them. It is protocol protocol dependent.
independent.
12. It has 7 layers 12. It has 4 layers
81
SUB: INTERNET AND APPLICATIONS

Comparison of OSI and TCP/IP Reference Model


Now it's time to compare both the reference model that we have learned till now. Let's start by
addressing the similarities that both of these models have.
Following are some similarities between OSI Reference Model and TCP/IP Reference Model.
 Both have layered architecture.
 Layers provide similar functionalities.
 Both are protocol stack.
 Both are reference models.

Merits of TCP/IP model


1. It operated independently.
2. It is scalable.
3. Client/server architecture.
4. Supports a number of routing protocols.
5. Can be used to establish a connection between two computers.
Demerits of TCP/IP
1. In this, the transport layer does not guarantee delivery of packets.
2. The model cannot be used in any other application.
3. Replacing protocol is not easy.
4. It has not clearly separated its services, interfaces and protocols.

Diagrammatic Comparison between OSI Reference Model and TCP/IP Reference Model

82
SUB: INTERNET AND APPLICATIONS

INTERNET PROTOCOL
IP (Internet Protocol) is a Network Layer Protocol.
Several versions are most popular (IPv4).
Gaining popularity is IPv6 due to increased addressing space and security handling.
IP and the Internet Architecture:

IP is the highest layer protocol which is implemented at BOTH routers and hosts.

IP Service
 Delivery service of IP is minimal
 IP provide provides an unreliable connectionless best effort service (also called:“datagram service”).
1. Unreliable: IP does not make an attempt to recover lost packets
2. Connectionless: Each packet (“datagram”) is handled independently. IP is not aware that
packets between hosts may be sent in a logical sequence
3. Best effort: IP does not make guarantees on the service (no throughput guarantee, no delay
guarantee,…)
 Consequences:
1. Higher layer protocols have to deal with losses or with duplicate packets
2. Packets may be delivered out-of-sequence
83
SUB: INTERNET AND APPLICATIONS

 IP supports the following services:


1. one-to-one (unicast)
2. one-to-all (broadcast)
3. one-to-several (multicast)

 IP multicast also supports a many-to-many service.


 IP multicast requires support of other protocols (IGMP, multicast routing)

IP Datagram Format:
Internet Protocol is connectionless and unreliable protocol. It ensures no guarantee of successfully
transmission of data. In order to make it reliable, it must be paired with reliable protocol such as TCP
at the transport layer. Internet protocol transmits the data in form of a datagram as shown in the
following diagram:

Fields of the IP Header


Version (4 bits): current version is 4, next version will be 6.
Header length (4 bits): length of IP header, in multiples of 4bytes
DS/ECN field (1 byte): This field was previously called as Type-of-Service (TOS) field.
The role of this field has been re-defined, but is “backwards compatible” to TOS interpretation
Differentiated Service (DS) (6 bits): Used to specify service level (currently not supported in the
Internet)
Explicit Congestion Notification (ECN) (2 bits):Feedback mechanism used by TCP

84
SUB: INTERNET AND APPLICATIONS

Identification (16 bits): Unique identification of a datagram from a host. Incremented whenever a
datagram is transmitted
Flags (3 bits):
1. First bit always set to 0
2. DF bit (Do not fragment)
3. MF bit (More fragments)
Time To Live (TTL) (1 byte): Specifies longest paths before datagram is dropped
Role of TTL field: Ensure that packet is eventually dropped when a routing loop occurs
Used as follows: Sender sets the value (e.g., 16)
Each router decrements the value by 1
When the value reaches 0, the datagram is dropped
Protocol (1 byte): Specifies the higher-layer protocol.
Used for demultiplexing to higher layers.
Header checksum (2 bytes): A simple 16-bit long checksum which is computed for the header of the
datagram.

Options:
 Security restrictions
 Record Route: each router that processes the packet adds its IP address to the header.
 Timestamp: each router that processes the packet adds its IP address and time to the header.
 (loose) Source Routing: specifies a list of routers that must be traversed.
 (strict) Source Routing: specifies a list of the only routers that can be traversed.
Padding: Padding bytes are added to ensure that header ends on a 4-byte boundary

Maximum Transmission Unit


Maximum size of IP datagram is 65535, but the data link layer protocol generally imposes a limit that
is much smaller
Example: Ethernet frames have a maximum payload of 1500 bytes
IP datagrams encapsulated in Ethernet frame cannot be longer than 1500 bytes
The limit on the maximum IP datagram size, imposed by the data link protocol is called maximum
transmission unit (MTU)
85
SUB: INTERNET AND APPLICATIONS

5 MARKS
1. Write short note on Internet Relay Chat Page 66 - 67
2. Write short note on wireless network Page 71 - 72
3. Write short note on internetwork Page 73
4. Differentiate OSI vs TCP / IP Page 81

10 MARKS
1. Explain about TCP/IP in detail Page 79 - 81
2. Explain about Packet switched network in detail Page 74 - 76
3. What are the types of networks? Page 67 - 71
4. Explain about Circuit Switched Network. Page 76 – 79
5. Explain about IP. Page 83 – 85

86
SUB: INTERNET AND APPLICATIONS

UNIT - V
Case Study: Online Passport – Online Gas Services – Online Train Reservation – Tamilnadu
government services

CASE STUDY
ONLINE PASSPORT
The Passport Seva Project was launched by the Ministry of External Affairs with the objective of
delivering Passport Services to the citizens in a comfortable environment with wider accessibility and
reliability. The project envisages setting up of Passport Seva Kendras (PSKs) across the country, a
Data Centre and Disaster Recovery Centre, Call centre operating in multiple Indian languages, and a
centralized nationwide computerized system for issuance of passports.
With the implementation of the Passport Seva Project, Passport Seva Kendras are working as extended
arms of Regional Passport Offices.
An applicant may ascertain the jurisdiction of Regional Passport Office and Passport Seva Kendra
before submitting an application.
Visit Passport Seva Project for more information.

Passport Services

87
SUB: INTERNET AND APPLICATIONS

For issue of fresh passport and reissue of passport, you need to fill the application form online via e-
Form Submission (preferred) or via Online Form Submission. Apart from this applicant can submit the
application form directly in the respective CPO/passport office/ Passport Seva Kendra (PSK)/District
Passport Cell (DPC)/Speed post centres.
The various passport services are:
I. Issue of Fresh Passport: You can apply for fresh passport if applying for the first time.
II. Reissue of Passport: You can apply for reissue of passport if you want another passport in
lieu of an existing passport for any of the following reasons:
 Change in existing personal particulars.
 Validity expired within 3 years/ Due to expire.
 Validity expired more than 3 years ago.
 Exhaustion of pages.
 Damaged passport.
 Lost passport.
If you ever held a passport in the past, no matter how much long back or at what age, you should
choose the Re-Issue category only.
 Miscellaneous Service: Issue of Police Clearance Certificate (PCC)
 Liberalization of Police Verification procedure for passport issuance
Police Verification (PV) has been an integral part of Passport issuance process since its inception.
The modalities of police verification have undergone various changes from time to time, whereas the
principles have remained the same i.e., ascertaining the applicant’s identity, citizenship and absence of
criminal antecedents.
In order to further improve and liberalize Police Verification procedure for passport issuance, the
Government has decided that henceforth normal passport applications of all first time applicants
furnishing Aadhaar, Electoral Photo Identity Card (EPIC), Permanent Account Number (PAN) Card
and an affidavit in the format of Annexure-I will be processed on Post-Police Verification basis,
enabling faster issue of passport, without payment of any additional fees, subject to successful online
validation of Aadhaar number. In addition, EPIC and PAN card may also be validated, if required,
from the respective databases.
In addition to the above, Ministry has also launched mPassport Police App for speedy submission of
Police Verification Report (PVR). The App would facilitate the field level verification officers to
directly capture the PV report into the system digitally.
With the launch of this App, the need to download and print the physical Personal Particulars Form
and questionnaire would no longer be required resulting in paperless end-to-end digital flow of the PV
process, further reducing the time required for completion of PVR, within the desired time limit of 21
days.
Source: Ministry of External Affairs
Procedures
Under Passport Seva, new measures and procedures have been introduced in order to improve
governance in Passport Offices. The new measures and procedures are aimed at ensuring citizens'
comfort, improvement in delivery of passport services, transparency and enhanced security.

88
SUB: INTERNET AND APPLICATIONS

Applicants are now required to present themselves at the respective Passport Seva Kendra (PSK) for
enabling the Passport Issuing Authority to obtain applicants' photographs, biometrics and granting
decision in their presence.
Online application and Appointment
The Online Appointment system has been introduced to ensure avoiding congestion at the Passport
Seva Kendras (PSKs) and cutting down the waiting time for applicants. Appointment date/time will be
automatically allotted by the system as per the availability of appointment slots at the desired PSK.
steps to be followed for online application and appointment
 Online registration, filling up and submitting online application form, (alternatively,
download e-form, fill up and upload the same at the Online Portal)
 Fix the Schedule (Online Appointment Booking instruction) for an appointment and visit a
Passport Seva Kendra (PSK) for completing the process. To know the appointment
availability for the passport office of your choice, .
 Following steps may be followed to obtain and manage appointment:
 Step 1: Visit the website passportindia.gov.in;
 Step 2: Register ‘user name’ and assign a ‘password’;
 Step 3: Log in using your ‘user name’ and ‘password’;
 Step 4: Fill online application form as the case may be and submit online (alternatively,
download e-form, fill up and upload the same at the portal). Uploading of documents is
optional;
 Step 5: Now take an appointment to visit the nearest Passport Seva Kendra (appointments are
released region-wise). It is advised that the citizen should be ready with step ‘1’ to ‘4’ above
before the ‘appointment release time’. As soon as appointments are released (please see
region-wise timings), they should click on ‘Schedule Appointment’ link to book the
appointment. Appointment will be automatically booked and allocated to you if available.
Note: Prior payment of passport service fee has been mandatory for booking appointments at PSKs.
For this purpose, the Online Payment feature has been introduced through the Passport Seva Online
Portal. Online Payment can be made using any one of the following modes:

 Credit/Debit Card (MasterCard & Visa)


 Internet Banking (State Bank of India(SBI) and Associate Banks Only)
 SBI Bank Challan

Payment Through Credit/Debit Card


To pay using Credit/Debit Card OR Internet Banking, following steps may be followed
Step 1: Click the “Schedule Appointment” link, select the appointment quota (i.e. Tatkaal Quota or
Normal Quota (required only for Tatkaal ARN cases)), select the desired Passport Seva Kendra, and
click the Next>> button.
Step 2: Click the Pay and Book Appointment button to redirect t State Bank of India’s Multi Option
Payment System (MOPS).

89
SUB: INTERNET AND APPLICATIONS

Step 3: Select the Mode of Payment (NET BANKING or CARD PAYMENTS), follow the
instructions and make payment. Please do not click the Back button or refresh the page, as this may
lead to failure of transaction.
Step 4: Once the payment is successful, an appointment will be booked automatically for the selected
Passport Seva Kendra and the “Appointment Confirmation” screen of PSP Portal will be displayed.
Step 5: Take a printout of the Application (ARN) Receipt, and carry it along while visiting the
Passport Seva Kendra on the given appointment date/time.
Visit passportindia.gov.in for more information about e-Form and it's submission.

To pay using a Challan:-


Step 1: Generate and print SBI Bank Challan through the “Pay using Challan” link.
Step 2: Submit the Challan along with indicated application fee at the nearest SBI branch after at least
three hours of Challan generation.
Step 3:Payment will be reflected after at least two working days of depositing the fee in the SBI
branch. Click the “Track Payment Status” link to track Payment Status.
Step 4: If Payment Status is displayed as Success, click the “Schedule Appointment” link to schedule
an appointment.
Step 5: Select the Appointment Quota (ie. Tatkaal Quota or Normal Quota (required only for Tatkaal
ARN cases)), select the desired Passport Seva Kendra, and click the Book Appointment button. An
appointment (if available) will be booked automatically for the selected Passport Seva Kendra.
Step 6: Take a printout of the Application (ARN) Receipt, and carry it along while visiting the
Passport Seva Kendra on the given appointment date/time.
Applicants applying under Tatkaal need to pay only the fee as applicable under Normal Category
while making Online Payment. The balance fee as applicable for Tatkaal will be payable in “Cash” at
Passport Seva Kendra/ Passport Office, once Tatkaal application is accepted by Passport Officials.
Online Payment will remain valid for one year from the first appointment date. The paid fee will be
forfeited if applicants do not submit application at PSK within this period.
Charge back/Refunds
No claim for refund, return or exchange of fee will be entertained for passport related services. In case
of multiple payments for the same ARN, for Passport related services including miscellaneous
services, the claims for refund will be dealt with as per extant policy governing them.
Reschedule/Cancel an Appointment:-
An applicant will be able to cancel/reschedule the appointment only twice within one year of first
appointment date. System will not allow booking of online appointment for that ARN once two
reschedule options are exercised or first appointment was scheduled more than one year ago.
Take printout of Application Reference Number (ARN) and visit the PSK at the given appointment
Date/Time along with a copy of the printed ARN;
Step 1: Visit the Passport Seva Kendra with requisite original documents and their photocopies.
Photograph is not required. The list of requisite documents is available at the website;
Step 2: Applicants who, despite appointment, have been “refused token” due to non-availability of
required set of documents can re-visit the same PSK as “Walk-IN”, within next 3 working days from

90
SUB: INTERNET AND APPLICATIONS

the date of appointment and as per the time mentioned in the appointment slip. On-line appointment is
not mandatory for these applicants;
Step 3: Some categories are allowed as Walk-in applicants and obtaining online appointment is not
mandatory. [Please see below: - Walk-in Appointments with online Registration]
Step 4: In case you are unable to secure appointment or don’t fall under Walk-in category, you may
visit concerned Passport Office for submission of manual passport application form if permitted by the
concerned RPO [Please refer the section Manual Submission of Applications that is given below].
Alternatively RPO may consider giving staggered appointments keeping in view the load/capacity at
the respective PSK under their jurisdiction. Tatkaal and other urgency applications will be given
preference in allotting appointments through this route.
Such applicants should fill-up the application online, generate 'Application Reference Number' and
visit RPO along with printed copy of 'ARN Sheet';

Walk-in Appointments with Online Registration:


In order to facilitate submission of passport applications at Passport Seva Kendras, some types of
services such as ‘Tatkaal’ and issuance of Police Clearance Certificates and some categories of
applicants such as senior citizens, minors and differently-abled persons are allowed to submit their
duly registered online applications with ARN number as Walk-in applicants. Applicants falling under
these categories are also required to register their applications online and obtain ARN number and visit
the nearest Passport Seva Kendra at their convenience (no prior appointment required). In addition,
applicants should also refer to any advisory issued by the concerned Passport Offices from time to
time.
Currently, online application for Passport Seva Kendra is available for these cities and an applicant
may confirm the jurisdiction of Regional Passport Office and Passport Seva Kendra (PSK) before
submitting an application.

ONLINE GAS SERVICES


How to Apply for an Indane New Connection Online
 As a part of the Digital India initiative, Indian Oil Corporation introduced the e-SV and
SHAHJ schemes that will enable the customers to apply for an Indane Gas connection online.
 e-SV or the electronic subscription voucher has the details regarding the pressure regulator
and the number of cylinders offered to the customer for the security deposit that the customer
has offered.
 Upon release of the LPG connection, this document is sent by email to the customer directly

91
SUB: INTERNET AND APPLICATIONS

Process for SAHAJ Indane New Gas Connection Online


Given below is the process flow for SAHAJ and e-SV system to apply for a new Indane Gas
Connection online.
 The customer registers for a new LPG gas connection by completing the online KYC form
and uploading the supporting proof of address & proof of income documents.
 Indane Gas will make and online check of inter company dedupe of KYC documents.
 For the applications that have cleared the dedupe, a waitlist will be created.
 After verification of the submitted KYC details against the POA and POI, the waitlist will be
released to the concerned distributors.
 The prospective customers will be notified by email and SMS to proceed with the request
and to select the equipments and the suitable mode of payment.
 The customer can make an online payment by selecting the mode of payment as debit card,
credit card or net banking.
 Alternatively, the customer can also make a payment at the distributor showroom while
availing the gas connection.
Process to Apply Indane Gas New Connection Offline at The Distributor Office
Customers can also apply for a new Indane Gas connection offline by visiting the nearest distributor
office. Follow the easy steps given below to apply for a new Indane Gas connection through your
nearest neighborhood Indane Gas distributor.
Locate your Nearest Indane Gas Distributor:-
 You can find out the nearest Indane LPG distributor by performing a simple search on the
Indane LPG gas portal.

92
SUB: INTERNET AND APPLICATIONS

 Alternatively, you can also get in touch with the Indane Gas customer care to find out your
nearest distributor.
Submit the Documents Required:-
 Your distributor will ask you to submit a completely filled in application form along with
KYC documents like Proof of Address and Proof of Identity.
 Also, submit two photograph copies and proof for subsidy, if applicable.
Confirmation:-
 Your dealer will send you a confirmation by message or email acknowledging the request
that you have placed for a new gas connection.
 You can also check your application status online at the Indane Gas LPG portal
 Credit Score of 750 = Easy approval on Loans/Credit Card! Check now in less than 3 min!
Documents Required for Indane Gas New Connection:-
While requesting a new Indane Gas connection, customers will be required to submit some KYC
documents for their application to be processed. If the customer is applying online, he must attach the
KYC documents and if the customer is applying directly at the distributor’s showroom, he must submit
the documents given below with the application form.
 Aadhaar Card
 Driving License
 Voter ID
 Lease Agreement
 Recent telephone, water or electricity bills
 Passport
 LIC policy
 Bank account statement or credit card statement
 House registration document
 Flat possession letter
From the above given list, all relevant documents are to be submitted by the customer while applying
for a new Indane Gas Connection.
Indane Gas Booking Procedure:-
Customer can book a refill Indane gas cylinder using the website, mobile app or the IVRS system. The
customer can also directly contact the nearest dealer to make the booking for a refill cylinder.
Online Indane Gas Booking Procedure:-
All registered Indane Gas customers can book a refill gas cylinder online by providing details like the
17 digit LPG ID, PAN card number, consumer number and contact address.
 You will have to log onto that portal using the user id and password.
 Just fill in the form to book an Indane Gas cylinder easily and submit to place an order.
 You will be able to track the status of your booking online and pay directly to the distributor
after delivery.
Indane Gas Booking through SMS:-
Consumers can also book an Indane Gas refill using the SMS facility. Just send out an SMS in the
format - IOC to the IVRS number for your area.
Indane Gas Booking through IVRS:-

93
SUB: INTERNET AND APPLICATIONS

Customers will be able to place a booking for a refill Indane LPG cylinder using the IVRS facility in
three language options including their regional language. Customers just have to enter the STD code of
the distributor and the the consumer number to make a booking.
Indane Gas Booking using Mobile App:-
Indane has come up with a mobile App for Android and iOS and customers can directly download the
mobile app to register a request for refill cylinder and also to place request for a second gas cylinder.
The customer just has to enter details like the consumer number, distributor details and other contact
information.
Get your Credit Score FREE in less than 3 minutes
Indane Gas Booking Through Distributors:-
Customers can visit their nearest distributor to place a request for an Indane refill cylinder. The
customer will have to provide details including customer number and contact details to place a request.
Indane Gas Cylinder Prices:-
Indane provides domestic as well as commercial LPG cylinders. From 5KG to 19KG, subsidized to
non-subsidized, the prices varies for different areas. If you want to know the exact prices of the Indane
gas products, please click here: Indane Gas Cylinder Price
Advantages of Indane Gas Online Application Process:-
The new age LPG gas customers want a hassle free experience when booking a new connection,
requesting a gas refill or surrendering a connection. Keeping this in mind, Indane Gas has come up
with the e-SV initiative which will offer an array of benefits for the customers. Here are some of the
advantages that come with the Indane Gas online application process.
Intimations and Tracking:-
Consumers can track their request and get intimations by email and SMS at various stages of
processing which will keep them informed about the progress
Better Monitoring of New Connections:-
Every new stage in a new LPG gas connection release can be monitored electronically via the e-SV
process and this will lead to a significant reduction in time taken for the release of a new connection.
Consumer Awareness:-
While applying for a new Indane LPG gas connection, consumers can read and go through all the
conditions applicable for availing an LPG connection.
Consumer Choice:-
The prospective customer can make a new choice regarding the type of connection including single
cylinder, double cylinder and also other products like hot plate etc. Since the customers can select
these products directly from the online portal, forced selling by distributors is reduced.
Cashless Transactions:-
Prospective consumers can pay using their credit cards and debit cards or net banking through a strong
online payment gateway. Making a payment online reduces the possibility of overcharging and also
helps customers make immediate purchase decisions.

No Visits to Distributor Showroom:-


Indane Gas e-SV process offers a great flexibility to the customers by allowing them to apply for a
new LPG connection right from the comfort of their homes. The customer does not have to visit the

94
SUB: INTERNET AND APPLICATIONS

distributor or fill forms to apply for a new Indane Gas connection. Also, the original Subscription
Voucher (SV) copy will be sent directly to the customer’s residence along with the equipment
requested.
Online De-Duplication Process:-
The e-SV facility offered by Indane Gas is integrated with online de-duplication check for multiple
LPG gas connections before releasing a connection to a prospective customer. Thanks to this process,
the possibility of releasing multiple connections to the same household and the blocking of gas
connection at a later date is avoided.
FAQs on Indane Gas:-
What are the Value Added Services offered by Indane Gas?
Indane Gas distributors offer value added services to its customers in the form of high efficient thermal
LPG stoves, Suraksha safety hoses and BIS approved portable fire extinguishers.
Who do I call if I have a query regarding my Indane LPG connection?
For any queries regarding your Indane gas connection, call on the customer care number provided for
your region. These are available throughout the day. You can also contact an officer from the
company, details of which are available on the Indane website.
What is Indane Preferred Time Delivery?
Usually, LPG cylinders are delivered based on booking numbers. However, in the case of Preferred
Time Delivery, you can choose a delivery slot on a day on your choice at an additional charge. The
charges depend on the time of day selected.
Are there options for Indane Preferred Time Delivery customers?
Yes, there are three slots available for Preferred Time Delivery customers, as mentioned below:
 Preferred Time customer- you can choose a preferred time from Monday to Friday.
 Preferred Day and Time customer- you can choose the day as well as the time slot for
delivery.
 Saturday/Sunday Preferred customer- you can choose a time slot on either Saturday or
Sunday for cylinder delivery.
How do I register for the Indane Preferred Delivery option?
To become a Preferred Delivery customer, you will have to register yourself on the Indane website or
you can submit an application to this effect at your local Indane LPG distributor.
Does Indane conduct a safety audit on its products? If so, when does this take place?
Indane conducts a safety audit of all its products, from the safety hose to the regulator and stove or
hotplate. The audit is conducted once every 2 years, and you are required to schedule a visit by an
Indane mechanic. The mechanic will conduct a thorough check of the entire LPG apparatus.
What is the cost of the safety audit?
The safety audit costs Rs.75, which is payable to your Indane LPG distributor. You will also have to
schedule the visit through your distributor.

95
SUB: INTERNET AND APPLICATIONS

5.1.3 ONLINE TRAIN RESERVATION


Online ticketing:-
It is known for changing the face of railway ticketing in India.
It pioneered internet-based rail ticket booking through its website, as well as from the mobile phones
via WiFi, GPRS or SMS. In addition to e-tickets, Indian Railways Catering and Tourism Corporation
also offers I-tickets that are basically like regular tickets except that they are booked online and
delivered by post.
The tickets PNR status is also made available. Commuters on the suburban rail can also book season
tickets through the website. It has also launched a loyalty program called Shubh Yatra for frequent
travelers. Through this program, passengers can avail of discounts on all tickets booked round the year
by paying an upfront annual fee.
Seeking to make it easier to book e-tickets, It launched a scheme called Rolling Deposit Scheme
(RDS). RDS is a hassle-free e-ticket booking scheme allowing passengers to reserve seats against
advance money kept with the corporation. It has also added flights and hotels booking facilities to their
line of online reservation services.
Tatkal scheme:-
Under the Tatkal scheme, passengers who plan their journey at short notice can book their tickets in
almost all Mail/Express trains through the Indian railways internet portal.
The booking starts at 10:00 AM daily for AC coach reservation and for NON-AC timing is residual to
11.00 AM, one day prior to the departure of the train from source station.
Tatkal E-ticket can be booked for selected trains one day in advance excluding date of journey from
the train originating station. It can be booked on the opening day from 10:00 AM onwards for AC
coach and 11:00 AM onwards for NON-AC. Passengers travelling on Tatkal tickets should carry a
photo ID proof along with them to be shown to the ticket checker. Earlier this year, the website has
launched Lite version which doesn't include ads, pop ups, etc. and check pnr status.

96
SUB: INTERNET AND APPLICATIONS

Tourism:-
Indian Railways Catering and Tourism Corporation also organises budget and deluxe package tours
for domestic and foreign tourists. A popular tourism package for budget tourists covering important
tourist destinations across India is called "Bharat Darshan". Luxury tourism packages are also
available, that involve special luxury trains such as Buddhist Circuit Train and Maharajas'
Express operation.
Apart from conventional tourism, it also offers adventure tourism packages that include water sports,
adventure and wildlife treks, etc. A provision for customising tours as per specific requirements is also
an added attraction. Recently a new venture of Indian Railways, named as Rail Tourism India has been
launched to provide direct catering and tourism packages to users.
Milestones
As a biggest e-commerce portal in India, it made lot of records.
 On 2 September 2013, nearly 5,82,000 tickets booked in a day.
 On 19 March 2014, nearly 5,80,000 tickets booked in a day.
 On 1 April 2015, Indian Railway Catering and Tourism Corporation (IRCTC) created a new
national record with 13,45,496 tickets booked in a day.
 On 2 April 2015, nearly 11,00,000 tickets booked in a day.
In April 2015, nearly 13,40,000 tickets booked in a day.

TAMILNADU GOVERNMENT SERVICES


Tamilnadu government provides the services such as,
 Applying birth certificate through online
 Paying electricity bill through online
 Paying property tax through online
 Applying employment exchange through online

Birth certificate service:-


 A birth certificate is the most important identity document that makes it possible for anyone
in possession of it to benefit from services offered by a government to its citizens. In India,
nowadays it is mandatory that every birth should be registered with the government.
 Birth registration can be done within 22 days from the date of birth occurrence free of cost.
From 22nd day to 365th day the birth can be registered by paying a fine amount.
 In India, Registration of birth /stillbirth is mandatory with Birth and death act 1969 to obtain
the birth certificate and avail privileges.
 In case the birth has not been registered within the specified time of its occurrence, then non-
availability of birth certificate (N-A-B-C) should be claimed. Post submission of the N-A-B-
C to the Revenue Divisional Office, the birth certificate is issued after due police verification
ordered by the revenue authorities.
Steps to register your Birth and avail Birth Certificate:-
 Contact municipal corporation office
 Fill the application form
 Fill in Data of birth, Place of birth, name of child, name of father/mother
97
SUB: INTERNET AND APPLICATIONS

Along with the application, you should pay a small amount has fee to municipal office. If you fail to
register within the allotted time as said and if you find any difficulty in registration you can contact
any agents or consultants to make your work easy.
Apart from Indian Residents, NRI’s living in the US should obtain either birth certificate or non-
availability of birth certificate for them to apply for Green Card. Henceforth as you can see the usage
of a birth certificate is varied and is of priority.
 I tried to get N-A-B-C Online from Tamilnadu government for my good old parents residing
with me in Florida.
 As I cannot travel to Tamilnadu, solely for this purpose, I decided to hand over the job to a
reliable consultant. After making conversations with many consultants, I placed the order
with Christ Consultants.
 I personally would suggest http://www.christconsultants.com/ for birth certificate services in
Tamil Nadu, Kerala, and Karnataka, as they are leaders in it; giving a good service at the
earliest. They are almost the third hand for most NRI’s in need
How to pay your Tamil Nadu Electricity Board’s (TNEB) electricity bill online:-
 New users can sign up through this Web Page for payment of CC charges through Credit / Debit
cards or through Net Banking.The consumer has to sign up once for registration.This requires a
valid Consumer ID and an e-mail account.
 With valid e-mail ID & Consumer Number the consumer chooses a unique username for entering
the web site.
 On completion of registration requirements, an e-mail is generated to the consumer for
successful validation of e-mail ID. A click on the link in the e-mail will lead to user login screen.
 The user shall login and key in his authenticated password for making payments through web
site.
 Consumer number/username for which registration has been made cannot be modified and if
required, the user can be deleted through the support link and a fresh registration can be made.
 One user can permanently register for many Consumer Numbers using "Add Consumer No"
button and shall pay during the corresponding collection cycle for the respective consumer.
 Every consumer number has to be individually selected for making payment.
 A print of the e-receipt could be generated.
 The changes in consumer number and e-mail ID and other personal particulars could be carried
out using "Update Profile" button.
 The user shall change his passwords frequently for security purposes using "Change Password"
button.
 A “Forget password” link is available for generating e-mail to the registered mail-id which shall
furnish the current password.
 Gone are those days when you had to stand in long queues to pay your electricity bills over the
counters. Apart from that, one also has to take almost half a day off from their work to stand in
long queues only to find that the server doesn’t work for the day.
 Thanks to Tamil Nadu government, it has now facilitated the public to pay their electricity bills
online through its website, https://www.tnebnet.org/, at their convenience.

98
SUB: INTERNET AND APPLICATIONS

All you have to do is just follow the following easy steps:-


 Register your online account with your customer number or service number mentioned in your
electricity card. You may also add your other customer numbers or service numbers in case you
have more than one later by logging in to your account.
 Once the registration is done, you will get an email activation link to activate the account. Open
the link and activate your online account. This will complete the registration process.
 Go to https://www.tnebnet.org/awp/login and login using your credentials.

 Choose the consumer number, if you have more than one consumer number.
 Select the payment mode. For eg., Net banking or Credit Card or Debit Card

 Enter your bank or card details and complete the payment.


 You will get an e-receipt on successful completion of payment
99
SUB: INTERNET AND APPLICATIONS

How to Pay Property Tax Online:-


You will be able to pay property tax online only if your municipal corporation has made the facility
available. To be able to pay tax online you will need to gather the details of your property in relation to
the location of the property. Once you have the details you can go to the portal and enter the relevant
information and proceed with the payment.
Example:
 Go to the site of the municipal corporation.
 Go to the page that allows you to pay property tax online.
 On that page enter assessment codes and area details as needed.
 You may also be asked to enter details such as owner number, old assessment number and door
number.
 Once all the details have been entered you will be shown the details of the tax due on your
property and you can proceed to make the payment via credit cards, debit cards or net banking.
 If you do intend to use net banking then you should remember that only net banking provided by
authorized banks will work for property tax payments.
Register with Employment Exchange:-
 Online Registration Process
 Please visit State Employment Exchange website for online registration.
 If you are not a registered member, you need to register to create your account.
 Log in to State Employment exchange website with your credentials.
 Select the district name. In case of certain states, your native state and district details are also
asked for. Hence follow the instructions given in the respective state portal.
 Fill the profile form. On submission of the form, an acknowledgement containing the
Registration Number, Registration Date and Name of the Employment Exchange is generated.
 This acknowledgement may be printed and kept for future reference.
 Produce all relevant certificates in support of education, experience, caste, sports, handicapped
(issued by Medical Board/CMO), ex-serviceman, widow, freedom fighter and proof of residence
etc. to the Employment Exchange mentioned within 15 days from the date registration. The time
limit may vary from state to state.
 Apart from the above documents you need to submit one of the following documents as
residence proof :
 Ration Card.
 Voter ID Card.
 Certificate from Municipal Councilor/Sarpanch.
 Proof of job in the State of either of the parents.
 Certificate of Education in the State.
 Letter from gazette officer or school head.
 Certificate issued by an MLA/MP.
 Domicile Certificate.
 Finally, Employment Exchange will issue you a registration card carrying Registration No with
date of renewal of that registration.
100
SUB: INTERNET AND APPLICATIONS

5 MARKS
1. Explain in detail about train reservation. PAGE 96 - 97
2. What are the Documents Required for Indane Gas New Connection. PAGE 93 - 94
3. What are the steps to be followed for online application and appointment? PAGE 98 - 99
4. Write the case study for gravity flow. PAGE 97 - 98

10 MARKS
1. Explain about processing of online passport PAGE 87 - 91
2. Explain about Tamilnadu government service. PAGE 97 - 100
3. Explain the case study of online reservation? PAGE 95 – 97
5. Write short note on online gas service. PAGE 91 - 95

101

You might also like