Computer Networking Internet1
Computer Networking Internet1
1
THE CONCEPT OF NETWORKING
The idea of networking is probably as old as telecommunications itself.
Nowadays, we have computer talking to each other over vast assemblages of
wires, fiber optics, microwaves etc. in this lesson we would be dealing with the
means and ways by which the process of communication is accomplished through
computers.
With the falling prices of small computers and PCs, system designers
started using these small machines to build large low-cost networks based on what
is called client-server architecture. In this, the user machines are called clients and
the are served by dedicated machines called servers.
ADVANTAGES OF NETWORKING
There are many advantages offered by networking. some of them are as follows:
• Resource Sharing
• High Reliability
• Saving Money
• Scalability
• Communication Medium
Another application called the World Wide Web provides easy access to
the information systems like the arts, business, cooking, government health,
history, hobbies, recreation, science, sports, travel, and other such million of
topics.
• Person-To-Person Communication
• Interactive Entertainment
• PRIVATE NETWORK
Many organizations have a substantial number of computers in operations,
often located far apart. For example, a company with many factories may have
compute at each location to keep track of inventories, monitor productivity, and do
the local pay roll. The issue hears is resource sharing and the goal is to make all
program, equipment, and especially data available to any one on the network
without regard to the physical location of the resource and the user Network
provides high reliability by having alternative sources of supply. For example, all
files could be replicated on two or three machines; if one of them is unavailable
the copies could be used.
Networks are helpful in saving money. Small computer have a much better
price/performance ratio than large ones. Mainframes are roughly a factor 10 faster
then personnel computer but they cost a thousand times more. In this model, the
users are called clients and the whole arrangement is called client server model.
• COMMUNICATION
Communication using computer has brought a revolution in the world of
Information Technology, particularly in the field of personal computer. We have
always heard of networking or the term network. A network is a way or means of
transmitting or receiving (exchange) information from one or more sources.
In computing networks, the origin of the information request utilizes the services
of a network to locate and return the information. This is done with addresses. In
the two previous examples of the car salesman and the employment agent, a
telephone number can be considered the address of their associate or client.
Addresses in computer networking are used in the same manner. These addresses
identify the network resource. There are two popular architectures for networking-
hierarchical and peer.
Peer networking does not need pre-defined network addressing. Instead, each
resource on the network is seen as a peer. Each network resource is peer to the
other network resources. When a new network resource joins the network it
introduces it and notifies its peer of any other network resources that it knows
about-peer networks are open and share network information.
• NETWORK HARDWARE
It is now time to turn our attention from the application and social aspect of the
networking to the technical issues involved in network design. There is generally
accepted taxonomy into which all computer networks fit, the tow dimension stands
out as important: transmission technology and scale.
- Open Wire
- Twisted Pair
- Coaxial Cable
- Optical Fiber
Network interface units connect each device in the LAN network to shared
transmission device. It contains the rules or logic to access the LAN. NIC is also
used to implement LAN protocols and for device attachments. Its function
depends on the type of topology used in LAN. In microcomputers, NIC may be
installed as an add-on card.
(c) Servers
• NETWORK SOFTWARE
Operating System is required to operate on the LAN system, manage the
tremendous workload with a number of various types of server attached to it. It has
basically two-aspect (i) Server software (ii) workstation software. As in case of
other multi-user operating systems, LAN operating system also facilitates the
sharing of expensive resources such as printer, storage space etc. among all LAN
users provides security for data and permits connection to other networks. There
are various types of LAN operating system for example Novel Netware,
WINDOWS NT, etc.
The first computer networks were designed with the hardware as the main concern
and the software as an afterthought. This strategy no longer works. Network
software is now highly structured. Most networks are organized as a series of
layers or levels, each one built upon the one below it the number of layers, the
name of each layer, the contents of each layer, and the function of each layer differ
from network to network. How ever, in all networks, the purpose of each layer is
to offer services to the higher layers, shielding those layers from the details of how
the offered service are actually implemented. Layer N on one-machine carries on a
conversation with layer on another machine. The rule and conventions used in this
conversation are collective known as the layer N protocol. A protocol is an
agreement between the communicating parties on how communication is to
proceed.
DATACOMMUNICATION 2
INTRODUCTION
Source/ Host/
Sender Medium Receiver
• Cabling
• Microwave
• fiber optics
• Radio Frequencies (RF)
• Infrared Wireless
Receiver: The receiver of the data transmitted. Examples are:
• Printers
• Terminals
• Mainframes
• Computers
DCE: The interface between the Source & the Medium, and the Medium
& the Receiver is called the DCE (Data Communication Equipment) and is a
physical piece of equipment.
DTE: Data Terminal Equipment is the telecommunications name given
to the source and receiver’s equipment.
An example of this would be your PC dialing into a BBS (Bulletin Board
System):
DATA FLOW
Data flow is the flow of data between two points. The direction of the
data flow can be described as:
Simplex: data flows in only one direction on the data communication line
(medium). Examples are radio and television broadcasts. They go from the TV
station to your home television.
Half-Duplex: data flows in both directions but only one direction at a time on the
data communication line. For example, a conversation on walkie-talkies is a
half-duplex data flow. Each person takes turns talking. If both talk at once-
nothing occurs!
Basic Definition
DIGITAL CONNECTION
0 – 4 KHz BW
World
Analog Outside
Modem Voice Band
EXTERNAL/INTERNAL MODEMS
There are 2 basic physical types of modems: Internal & External
modems. External modems sit next to the computer and connect to the serial port
using a straight-through serial cable.
i. Optical Modem- Uses optical fiber cable instead of wire. The modem
converts the digital signal to pulses of light to be transmitted over optical lines
(more commonly called a media adapter or transceiver).
ii. Short Haul Modem- A modem used to transmit data over 20 miles or
less. Modems we use at home or to connect computers together among different
offices in the same building are short haul modems.
iii. Acoustic Modem- A modem that couples to the telephone handset with
what looks like suction cups that contain a speaker and microphone. Used by
traveling salespeople to connect to hotel phones.
vi. V.32 Modem- A milestone modem that uses a 2400 baud modem with 4
bit encoding. This results in a 9600 bps (bits per second) transfer rate. It brought
the price of high speed modems below $5,000.
Baud is the speed at which the analog data is changing on the voice channel and
bps is the speed at which the decoded digital data is being transferred.
FEATURES OF MODEMS
1. Speed – The speed at which the modem can send data in bps (bits
per second). Typical modem speeds are: 300, 600, 1200, 2400,
4800, 9600, 14.4K, 19.2K, 28.8K bps.
2. Auto Dial/Redial – Smart modems can dial the phone number and
auto re dial if a busy signal is received.
3. Auto Answer – Most modems have Ring Detect capability and can
automatically answer the telephone when an incoming call comes
in.
Parallel Communication
a. Open Wire
b. Twisted Pair
c. Coaxial Cable
d. Optical Fiber
OPEN WIRE
Open wire is traditionally used to describe the electrical wire strung
along power poles. There is a single wire strung between poles. No shielding or
protection from noise interference is used. We are going to extend the traditional
definition of open wire to include any data signal path without shielding or
protection from noise interference. This can include multi conductor cables or
single wires. This medium is susceptible to a large degree o noise and
interference and consequently is not acceptable for data transmission except for
short distances under 20 ft.
TWISTED PAIR
The wires in twisted pair cabling are twisted together in pairs. Each
pair consists of a wire used for the +ve data signal and a wire used for the –ve
data signal. Any noise that appears on 1 wire of the pair will also occur on the
other wire. Because the wires are opposite polarities, they are 180 degrees out of
phase (180 degrees - phasor definition of opposite polarity). When the noise
appears on both wires, it cancels or nulls itself out at the receiving end, Twisted
pair cables are most effectively used in systems that use a balanced line method
of transmission: polar line coding (Manchester Encoding) as opposed to unipolar
line coding (TTl logic).
STP or shielded twisted pair is used with the traditional Token Ring
cabling or ICS-IBM Cabling System. It requires a custom connector. IBM STP
(shielded twisted pair) has a characteristic impedance of 150 ohms.
COAXIAL CABLE
Coaxial cable consists of two conductors. The inner conductor is
held inside an insulator with the other conductor woven around it providing a
shield. An insulating protective coating called a jacket covers the outer
conductor.
The outer shield protects the inner conductor from outside electrical signals. The
distance between the outer conductor (shield) and inner conductor plus the type
of material used for insulating the inner conductor determine the cable properties
or impedance. Typical impedances for coaxial cables are 75 ohms for Cable TV,
50 ohms for Ethernet Thinnest and Thick net. The excellent control of the
impedance characteristics of the cable allow higher data rates to be transferred
than with twisted pair cable.
OPTICAL FEBER
Optical fiber consists of thin glass fibers that can carry information
at frequencies in the visible light spectrum and beyond. The typical optical fiber
consists of a very narrow strand of glass called the core. Around the core is a
concentric layer of glass called the cladding. A typical core diameter is 62.5
microns (1 micron = 10-6meters). Typically Cladding has a diameter of 125
microns. Coating the cladding is protective coating consisting of plastic, it is
called the jacket.
Jacket Cladding Core
If the angle of incidence is small, the light rays are reflected and do
not pass into the water. If the angle of incident is great, light passes through the
media but is bent or refracted.
Water Water
Refraction Reflection
Optical fibers work on the principle that the core refracts the light
and the cladding reflects the light. The core refracts the light and guides the light
along its path. The cladding reflects any light back into the core and stops light
from escaping through it – it bounds the medium!
a. Step Index
b. Graded Index
c. Single Mode
Step index has a large core, so the light rays tend to bounce around inside
the core, reflecting off the cladding. This causes some rays to take a longer or
shorter path through the core. Some take the direct path with hardly any
reflections while others bounce back and forth taking a longer path. The result is
that the light rays arrive at different times. The signal becomes longer than the
original signal. LED light sources are used. Typical core: 62.5 microns.
STEP INDEX MODE
Graded index has a gradual change in the core’s refractive index. This
causes the light rays to be gradually bent back into the core path. This is
represented by a curved reflective path in the attached drawing. The result is a
better receive signal than with step index. LED light sources are used. Typical
Core: 62.5 microns.
Single mode has separate distinct refractive indexes for the cladding and
core. The light ray passes through the core with relatively few reflections off the
cladding. Single mode is used for a single source of light (one color) operation.
It requires a laser and the core is very small: 9 microns.
SINGLE MODE
Comparison of Optical Fibers
We don’t use frequency to talk about speed any more, we use
wavelengths instead. The wavelength of light sources is measured in nanometers
or 1 billionth of a meter.
The cost of optical fiber is a trade – off between capacity and cost.
At higher transmission capacity, it is cheaper than copper. at lower transmission
capacity, it is more expensive.
RF Propagation
• Ground Wave
• Ionospheric
• Line of Sight (LOS)
MICROWAVE
Microwave transmission is line of sight transmission. The transmit
station must be in visible contact with the receive station. This sets a limit on the
distance between stations depending on the local geography. Typically the line
of sight due to the Earth’s curvature is only 50 Km to the horizon! Repeater
stations must be placed so the data signal can hop, skip and jump across the
country.
Advantages:
Disadvantages:
The uplink is the transmitter of data to the satellite. The downlink is the
receiver of data. Uplinks and downlinks are also called Earth stations because
they are located on the Earth. The footprint is the “shadow” that the satellite can
transmit to, the shadow being the area that can receive the satellite’s transmitted
signal.
1970 - Infancy
Let’s outline key features, circa- 1983, of what was then called
ARPANET. A small computer was a PDP-11/45, and a PDP-11/45 does not fit
on your desk. Some sites had a hundred computers attached to the Internet. Most
had a dozen or so, probably with something like a VAX doing most of the work
– mail, news, EGP routing. Users did their work using DEC VT- 100 terminals.
FORTRAN was the word of the day. Few companies had Internet access, relying
instead on SNA and IBN mainframes. Rather, the Internet community was
dominated by universities and military research sites. It’s most popular service
was the rapid email it made possible with distant colleagues. In August 1983,
there were 562 registered ARIANET hosts (RFC 1296).
Domain naming was stable by 1987 when RFC 1034 was released.
Until then, hostnames were mapped to IP address using static tables, but the
Internet’s exponential growth had made this practice infeasible.
In the early 90s, the first address exhaustion crisis hit the Internet
technical community. The present solution, CIDR, will sustain the Internet for a
few more years by making more efficient use of IP’s existing 32-bit address
space. For a more lasting solution, IETF is looking at IPv6 and its 128-bit
address space, but CIDR is here to stay.
Crisis aside, the World Wide Web (WWW) has been one of
Internet’s most exciting recent developments. The idea of hypertext has been
around for more than a decade, but in 1989 a team at the European Center for
Particle Research (CERN) in Switzerland developed a set of protocols for
transferring hypertext via the Internet. In the early 1990s it was enhanced by a
team at the National center for Supercomputing Applications (NCSA) at the
University of Illinois – one of NSF’s supercomputer centers. The result was
NCSA Mosaic, a graphical, point-and-click hypertext browser that made Internet
easy. The resulting explosion in “Web sites” drove the Internet into the public
eye.
For the next few years, the Internet will almost certainly be content
– driven. Although new protocols are always under development, we have barely
begun to explore the potential of just the existing ones. Chief among these is
these Word Wide Web, with its potential for simple on – line access to almost
any information imaginable. Yet even as the Internet intrudes into society,
remember that over the last two decades “The Net” has developed a culture o fits
own, one that may collide with society’s. Already business is making its pitch to
dominate the Internet. Already Congress has deemed it necessary to regulate the
Web.
WHO OWNS THE INTERNET?
No one actually owns the internet, and no single person or
organisation controls the internet in its entirety. More of a concept than an actual
tangible entity, the internet relies on a physical infrastructure that connects
networks to other networks. There are many organisations, corporations,
governments, schools, private citizens and service providers that own pieces of
infrastructure, but there is no one body that owns it all. There are however,
organisations that oversee and standardise what happens on internet and assigns
IP addresses and domain names, such as the national science foundation, the
internet engineering task force, icann, internic and internet architecture board.
GROWTH OF INTERNET
The Internet has changed much in the two decades since it came
into existence. It was conceived in the era of time-sharing, but has survived intp
the era of personal computers, client server and peer-to-peer computing, and the
network computer. It was designed before LAN’s existed, but has
accommodated that new network technology, as well as the more recent ATM
and frame switched services. It was envisioned as supporting a range of
functions from file sharing and remote login to resource sharing and
collaboration, and has spawned electronic mail and more recently the World
Wide Web. But most important, it started as the creation of a small band of
dedicated researchers, and has grown to be a commercial success with billions of
dollars of annual investment.
One should not conclude that the Internet has now finished
changing. The Internet, although a network in name and geography, is a creature
of the computer, not the traditional network of the telephone or television
industry. It will, indeed it must, continue to change and evolve at the speed of
the computer industry if it is to remain relevant. It is now changing to provide
such new services as real time transport, in order to support, for example, audio
and video streams. The availability of pervasive networking (i.e., the Internet)
along with powerful affordable computing and communications in portable form
(i.e., laptop computers, two-way pagers, PDA’s, cellular phones), is making
possible a new paradigm of nomadic computing and communications.
The World Wide Web provides a single interface for accessing all
these protocols. This creates a convenient and user – friendly environment. It is
no longer necessary to be conversant in these protocols within separate,
command – level environments. The Web gathers together these protocols into a
single system. Because of this feature, and because of the Web’s ability to work
with multimedia and advanced programming language, the Web is the fastest-
growing component of the Internet.
The World Wide Web consists of files, called pages or home pages,
containing links to documents and resources throughout the Internet.
E-MAIL
Electronic mail, or e-mail, allows computer users locally and
worldwide to exchange messages. Each user of e-mail has a mailbox address to
which messages are sent. Messages sent though e-mail can arrive within a matter
of seconds.
TELNET
Telnet is a program that allows you to log into computers on the
Internet and use online databases, library catalogs, chat services, and more.
There are no graphics in Telnet sessions, just text. To Telnet to a computer, you
must know its address. This can consist of words (locis.loc.gov) or numbers
(140.147.254.3). Some services require you to connect to a specific port on the
remote computer. In this case, type the port number after the Internet address.
Example: telnet nri.reston.va. Us 185.
With the increasing popularity of the Web, Telnet has become less
frequently used as a means of access to information on the Internet.
FTP
FTP stands for File Transfer Protocol. This is both a program and
the method used to transfer files between computers. Anonymous FTP is an
option that allows users to transfer files from thousands of host computers on the
Internet to their personal computer account. FTP sites contain books, articles,
software, games, images, sounds, multimedia, course work, data sets, and more.
USENET NEWS
Usenet News is a global electronic bulletin board system in which millions of
computer users exchange information on a vast range of topics. The major
difference between Usenet News and e-mail discussion groups is the fact that
Usenet messages are stored on central computers, and users must connect to
these computers to read or download the messages posted to these groups. This
is distinct from e-mail distribution, in which messages arrive in the electronic
mail-boxes of each list member.
FYI stands for For Your Information. These notes are a subset of
RFCs and contain information of interest to new Internet users.
client: A program that requests services from other programs or computers that
are functioning as servers or hosts.
DNS (Domain Name Service): DNS servers translate symbolic machine names
(such as doeace.org) into numerical addresses (128.223.142.14).
Email (electronic mail): Messages sent and received via a computer network.
FAQ (frequently asked questions): A document that answers common
questions about a particular subject.
Flame: A “flame” usually refers to any message or article that contains strong
criticism, usually irrational or highly emotional
ftp (file transfer protocol): A way to transfer files from one computer to
another via the Internet. Many sites on the Internet have repositories of software
and files that you can download using an ftp client like Fetch or WS_FTP.
IP address: A computer’s unique Internet address, which usually looks like this:
128.223.142.14. Most computers also have a domain name assigned to them,
which represents cryptic IP addresses with words that are easier to remember
(e.g.,gladstone.uoregon.edu). mailing list. An email-based forum for discussing a
particular topic. Mailing lists are administrated by a central program that
distributes messages to all participants.
POP (Post Office Protocol): An older method used by programs like Eudora or
Netscape to retrieve email from a mail server.
ssh: Secure Shell software that encrypts communications over the Internet.
Telnet: A way for users to create an unencrypted terminal session with a remote
system.
URL (Uniform Resource Locator): A fancy term for the address of a World
Wide Web page or other resource.
World Wide Web: A system of linked servers that distribute text, graphics, and
multimedia information to users all over the world.
Ensure that you notify the sender that you have received their
message.
WHAT IS ECOMMERCE?
The basic elements of electronic commerce.
WHAT IS EGOVERNANCE
eGovernment is he use of Information and Communications Technologies
(ICT’s) to promote more efficient governance by allowing:
However, form April 2001; the growth rate started declining on all
over India. The current Internet subscriber base in India is 3.3 million and the
user base is 16.5 million. The planned projection is 230 million by the end of the
year 2007.
People can access the Internet at all times. This availability of the
Internet increases the time in which people can browse the Internet for business
decisions, information-searching, and personal interactions. Unfortunately,
people who engage in fraud can also access the Internet 24 hours of the day.
They can use the capabilities of the Internet such as sending e-mail messages
worldwide in seconds or posting Web site information to carry out fraudulent
schemes.
Identity Theft and Fraud. Some Internet fraud schemes also involve
identity theft. Identity theft is the wrongful obtaining and using of someone
else’s personal data in some way that involves fraud or deception. In one federal
prosecution, the defendants allegedly obtained the names and Social Security
numbers of U.S. military officers from a Web site, and then used more than 100
of those names and numbers to apply via the Internet for credit cards with a
Delaware bank. In another federal prosecution, the defendant allegedly obtained
personal data from a federal agency’s Web site, and then used the personal data
to submit 14 car loan applications online to a Florida bank.
A protocol describes the format that a message must take and the way
in which computers must exchange a message within the context of a particular
activity. The activities include sending messages across networks, exchanging e-
mail, establishing remote connections, and transferring files. Two networking
models support open systems interconnection. The first model, TCP/IP, is based
on a suite of protocols in which each protocol solves a particular network
communications problem. The second model, OSI, is based on international
standards.
WHAT IS TCP/IP?
The name TCP/IP refers to a suite of data communication protocols.
The name is misleading because TCP and IP are only two of the several protocols
that compose the suite. The name TCP/IP comes from two of the more important
protocols in the suit: the Transmission Control Protocol (TCP) and the Internet
Protocol (IP).
The first model, TCP/IP, is based on a suit of protocols in which each protocol
solves a particular network communications problem. This model contains
1. Application Layer
2. Transport Layer
3. Internet Layer
4. Network Interface Layer
5. Physical Layer
APPLICATION LAYER
A user invokes an application program the accesses a service
available across a TCP/IP internet. The application passes data to and receives data
from the transport layer.
TRANSPORT LAYER
This layer provides services that permit an application program on
one host to communicate with an application program on a remote host. The
transport layer divides the stream of data into packets, adds a destination address,
and passes the packets to the next layer. The transport uses two protocols, TCP
and UDP,
INTERNET LAYER
This layer ensures that data is routed to the correct destination. The
internet layer encapsulates the packet received form the transport layer into a
datagram, adds a header, and determines the routing requirement. For incoming
datagram, it determines which transport protocol should handle the packet.
NETWORK INTERFACELAYER
This layer controls access to network transmission mechanisms. The
network interface is responsible for accepting IP datagram and transmitting them
over a specific network. The interface can be a device driver (connected to a LAN)
or a subsystem with its own data link protocol.
PHYSICALLAYER
The hardware connection provides the physical interconnection
between the host and the network
INTERNET PROTOCOL
IP is a connectionless protocol, which means that IP does not
exchange control information, called a handshake, to establish an end-to-end
connection before transmitting data. In contrast, a connection – oriented protocol
exchanges control information with the remote computer to verify that it is ready
to receive data before sending it. When the handshake is successful, the computers
are said to have established a connection. IP relies on protocols in other layers to
establish the connection if connection-oriented services are required. IP also relies
on protocols in another layer to provide error detection and error recovery. IP is
sometimes called an unreliable protocol because it contains no error detection or
recovery code.
IP ADDRESSING
As with any other network-layer protocol, the IP addressing scheme
is integral to the process of routing IP datagrams though an internetwork. Each IP
address has specific components and follows a basic format. These IP addresses
can be subdivided and used to create addresses for subnetworks, as discussed in
more detail later in this chapter.
IP ADDRESS FORMAT
The 32-bit IP address is grouped eight bits at a time, separated by
dots, and represented in decimal format (known as dotted decimal notation). Each
bit in the octet has a binary weight (128, 64, 32, 16, 8, 4, 2, 1). The minimum
value for an octet is 0, and the maximum value for an octet is 255. Figure 30-3
illustrates the basic format of an IP address.
IP FORMAT
32 Bits
Network Host
Dotted
Decimal
Notation 172 16 122 204
IP ADDRESS CLASSES
IP addressing supports five different address classes: A, B, C, D, and
E. Only classes A, B and C are available for commercial use.
THE PORTS
Many TCP/IP programs can be initiated over the Internet. Most of
these are client/server oriented. As each connection request is received, inetd starts
a server program, which then communicates with the requesting client machine.
Keyboard
NOS
G: Network
Hard-Drive
NOS
Network G: Network
Applications Hard-Drive
Operating System
File Envelop
Presentation
Layer
Stripped
Contiguous File
Similarly, The Presentation layer strips the pertinent file from the workstation
operating system’s file envelope. The control characters, screen formatting, and
workstation operating system envelope are all stripped or added to the file (if the
workstation is receiving or transmitting data to the network). This could also
include translating ASCII file characters from a PC world to EBCDIC in an IBN
Mainframe world.
The Presentation Layer also controls security at the file level: this
provides both file locking and user security. The DOS Share program is often
used for file locking. When a file is in use, it is locked form other users to
prevent 2 copies of the same file from being generated. If 2 users both modified
the same file, and User A saved it, then User B saved it, then User A’s changes
would be erased! At this point, the data is contiguous and complete (i.e. one
large data file). See Fig.
Session Layer
In order for the data to be sent across the network, the file must be
broken up into usable small data segments (typically 512 – 18k bytes). The
Transport layer breaks up the file into segments for transport to the network, and
combines incoming segments into a contiguous file. The Transport layer does
this logically, not physically, and it is done in software as opposed to hardware.
Create Segments
Transport Checks order
Layer
The Network layer is concerned with the path through the network. It is
responsible for routing, switching, and controlling the flow of information
between hosts. The Network layer converts the segments into smaller datagrams
than the network can handle: network hardware source and destination addresses
are also added. The Network layer does not guarantee that the datagram will
reach its destination.
Network Datagram
Layer Routing
Network Layer
Network Datagram
Layer Routing
1’s & 0s
1’s & 0s
10100110010101001
Physical Layer
LAYER-SPECIFIC COMMUNICATION
Each layer may add a Header and a Trailer to its Data (which
consists of the next higher layer’s Header, Trailer and Data as it moves through
the layers). The Headers contain information that specifically addresses layer-to-
layer communication. For example, the Transport Header (TH) contains
information that only the Transport layer sees. All other layers below the
Transport layer pass the Transport Header as part of their Data.
Application Layer PDU AH File AT
Network A ware
program Application
Layer
Keyboard
Network C: Local
CPU Redirector DOS Hard-Drive
Software
Program Operating System
File Envelope
Stripped
Contiguous File
Network Datagram
Layer Routing
Data Link
Bit Level Error Checking
Network Layer
Interface
Card
Start Source Dest Control Data PCS Stop
Flag Add Add Flag
1s & 0s
OSI Model
Functional Layer Drawing
ONE CLIENT
10100110010101001
NETWORK
Other
File NOS Workstations
Server
Network G: Network
Application Hard - Drive
WHAT IS FDDI?
Due to the historical higher costs of its adapters and fiber optics,
FDDI has been used primarily in backbone networks and for high-speed
communications between host processors. The higher bandwidths offered by
ATM, Fast Ethernet, and FDDI technologies complement each other, and are
expected to coexist in virtually all organizations for many years to come.
TECHNOLOGY OVERVIEW
Token Ring and Ethernet are the two dominant LAN standards that
are being widely utilized to connect users in a workgroup to each other and to
common resources. The rapid increase in the speed and performance of personal
computers and workstations has initiated a demand for a corresponding increase
in LAN bandwidth. To meet this demand the ANSI (American National
Standards Institute) committee had developed the FDDI standard that is being
widely used.
The need for networks to handle more data, more quickly than eve,
is becoming urgent. As a result, several contenders are vying for throne of high-
speed networking. While ATM and Fast Ethernet have gained the most attention,
FDDI is the popular choice. FDDI is a full-fledged technology compared to the
emerging high-speed networking technologies, such as ATM and Fast Ethernet.
In addition, FDDI has established standard interoperability, and product
availability.
ETHERNET
Ethernet is one of the standard’s of local area network (LAN)
technology that transmits information between computers at speed of 10 & 100
million bits per second (mbps). Currently the most widely used version of
ethernet technology is the 10 Mbps twisted pair variety. It includes the original
thick coaxial system, as well as thin coaxial, twisted pair, and fiber optic
systems. The most recent ethernet standard defines the new 100 mbps as the fast
ethernet system which operates over twisted pair and fiber optic media.
HISTORY
Ethernet was invented at the Xerox Palo alto research centre in the
1970s by Dr. Robert M Metcalfe. It was designed to support research on the
office of the future, which included one of the world first personal workstations,
the Xerox alto. The first ethernet system ran at approximately 3Mbps and was
known as “experimental ethernet.” There are several Lan technologies in use
today, but ethernet is by far the most popular. Industry estimates indicates that as
of 1994, over 40 million ethernet nodes had been installed worldwide. The
widespread popularity of the ethernet ensures that there is a large market for
ethernet equipment, which also helps to keep the technology competitively
priced.
OPERATION OF ETHERNET
Each ethernet equipped computer, also known as a station operates
independently of all stations on the network: there is no central controller. All
stations attached to an ethernet are connected to a shared signaling system, also
called the medium. Ethernet signals are transmitted serially, one bit at a time,
over the shared signal channel is idle, the station transmits its data in the form of
an ethernet frame or packet.
NETWORKS
It makes sense, most often for financial reasons but also for others,
to network groups of computers where they share a common workload. All the
computers in an administrative office, all the computers to do with a certain
ward or discipline. Networking computers means that the people using them can
share files easily, send each other messages and share each other’s printers. This
idea has developed into Local Area Networks (LANs.) Nowadays most
organizations have a local area network. LAN’s can be as small as just one
shared office or as large as a whole city.
Combined Networks
LAN TOPOLOGIES
The application in use, such as multimedia, database updates, e-
mail, or file and print sharing, generally determines the type of data
transmission.
• Unicast
• Multicast
• Broadcast
UNICAST
Unicast Network
MULTICAST
Multicast Network
BROADCAST
Broadcast Network
• Star (Hub-and-Spoke)
• Ring
• Bus
• Tree
Ring Topology
Bus Topology
Bus Topology
TREE TOPOLOGY
A tree topology network is one that does not employ loops in its
topology. An example of a tree topology network is a bridged or switched
network running the spanning tree algorithm, usually found with Ethernet (IEEE
802.3) networks. The spanning tree algorithm disables loops in what would
otherwise be a looped topology. Spanning tree expands though the network and
ensures that only one active path exists between any two LAN-attached stations.
DNS (Domain Name System)
Name Servers:
In order for Internet users to reach a Web site, their computer must
find the address of the Web server that hosts the desired site. Computers locate
one another across the Internet using numbers, not letters. For each Web site on
the Internet there is a unique domain name and numeric address, known as an
Internet Protocol (IP) address (e.g.,205.139.94.60). This number, while quite
convenient for the computer to use, is difficult for Internet users to remember;
thus the need for domain names.
WHAT IS CLIENT/SERVER TECHNOLOGY
Modem: Modems are devices which use phone lines to connect your computer to
your Internet service provider’s (ISP) host computer (also called a server) which
is connected to the Internet. The speed of a modem determines how fast
information is transmitted to and from your computer and is measured in bits per
second (bps)(it takes about 10 bits to transmit a single character such as the letter
A). There are faster ways of connecting to the Internet using ISDN lines, cable
modems and Digital Subscriber Lines (DSL). An ISDN line transfers
information at a rate of between 57,600 bps and 128,000 bps. ISDN adapter
instead of a modem, and some specialized equipment that the phone company
must install. A T-1 line is very fast connection used by web servers or other
computers than need to be connected to the Internet all the time. You can get
internet access through some cable TV networks. Speeds can be as great as 36
Mbps. Cable access requires a special cable modem. Because it works with your
TV cable, is doesn’t tie up a telephone line. Cable modems are always on, so
there is no need to connect.
WWW BROWSER
A Web browser is a program that you can use to view files on the
Internet, including images, text, sound and video. A graphical Web browser is a
browser that enables you to view Multimedia content such as images, audio, and
video, on the Internet. The first graphical Web browser was “Mosaic” that was
developed in 1993 by the National Center for Supercomputing Application at the
University of Illinois. Mac Andreessen and six fellow students developed the
program for creating the Mosaic browser while working on a university-
sponsored computer project. This program has contributed immensely to
developing and propagating the World Wide Web to the forefront of Internet
tools. Mosaic converted the text only WWW into an environment that is similar
to Microsoft Windows. With the introduction of Mosaic, the total amount of data
transported though the Web increased by a factor of 10,000 within six months.
WEB SERVER
A connection between the web browser and the web server is called
‘stateless’. This is because when you send a request for a web page to a web
server by using the browser, the server checks for the validity of the request for
an HTML document. Then the server sends the requested web page to your web
browser and the connection is closed. The web browser connects to the web
server only when a request for the web page to be reloaded or refreshed is
submitted. You can avail of Web servers by paying for them, known as
commercial Web servers. Alternatively, you can use the free Web servers that
are called Freeware, Microsoft Internet Information Server (IIS) ® and Netscape
web server are among the most popular commercial web servers. Apache® is a
popular Freeware.
WHAT IS HTTP?
HTTP, the Hypertext Transfer Protocol, is the application-level
protocol that is used to transfer data on the Web; HTTP comprises the rules by
which Web browsers and servers exchange information over a TCP/IP
connection. An HTTP server is a program that listens on a machine’s port for
HTTP requests. An HTTP client or web client opens a TCP/IP connection to the
server via a socket, transmits a request for a document, and waits for a reply
from the server. After the request-reply sequence is completed, the socket is
closed. So the HTTP protocol is a transactional one. The lifetime of a connection
corresponds to a single request-reply sequence that is known as a transaction.
- a request line
- a set of request headers
- an entity
The server sends a response that comprises
- a status line,
- a set of response headers, and
- an entity.
WHAT IS A URL?
http://www.nyise.org/fanny/index.html
http://www.nyise.org/index.html
This part is the name of the computer(s)
which have the pages on them, and is
known as the Domain Name.
http://encarta.msn.com/encnet/features/home.aspx
This part of the address is (almost) This part indicates the location of
always at the start of a web page the web page on the computer.
address, and most of the time you
don’t need to use it.
The second type offers the possibility to type in a query once and
then indicates in which database of which robot(s), the search is to be carried
out. The query is then simultaneously submitted to the chosen search robots. The
results are presented either in a long list sorted according to relevance or as a list
per search robot that is then sorted according to relevance.
SEARCHING CRITERION
Quotes
Asterisk
AND operator
Search results must contain all words joined by the AND statement.
Example: commercial AND service.
Search result cannot contain the word that follows the AND NOT
statement.
OR operator
Search results must contain at least one of the words joined by the
OR statement. Example: distributor OR agent lists sites that contain either word.
Plus
Adding a plus sign (+) directly in front of a word requires that the
word be included in all search results. Place the plus sign between two words in
a multiple word search.
Example: export+assistance
Minus
Adding a plus sign (+) directly in front of a word indicates that the
word should not be found in search results, Example: commerce-chamber
Parentheses
A web browser is a program that you can use to view files on the
Internet, in including images, text, sound and video
HISTORY
The first graphical Web browser, a program that lets Internet users
page through the Web, was “Mosaic”. This program was developed in 1993 by
the National Center for Supercomputing Application at the University of Illinois.
Mac Andreessen and six fellow students developed the program while working
on a university-sponsored computer project. This program has provided much of
the forward push that has bought the World Wide Web to the forefront of
Internet tools. Mosaic turned the then text only WWW into a point-and-click
environment much like Microsoft Windows by using only a mouse. With the
introduction of Mosaic, the total amount of data transported though the Web
increased by a factor of 10,000 within six months.
To view a Web site from the list of bookmarks, select the item that
represents the Web site from the list. The browser will display the page. Please
note: The bookmark feature is referred to as favorites in Internet Explorer and
bookmark in Netscape Navigator
WHAT IS BROWSER HISTORY?
A built in feature of the browser which keeps a record of the pages
visited by the user with help of the browser.
The Back button and the Forward Button are quick navigation aids
you “surf” between different web pages on the internet. Web pages contain
Hyperlinks that link different pages (and different sites) to each other. As you
navigate between the different pages and web sites, your browsing history is
stored and can be accessed quickly using these buttons. The Stop Button will
stop a page from loading in the browser. Use this when you have clicked on a
link by mistake or when the page is having trouble loading. The Refresh Button
re-loads the web page in the browser. This can be used when a page is having
trouble loading. The Home Button will take you to your home page (for
information on how to set this up, see setting your home page below). The
Search Button will give you quick access to the search facility in the browser.
This is usually set to the Microsoft search site, which will appear in a pane on
the right-hand side of the screen. The Favorites Button opens your favorites in a
pane on the right-hand side of the screen
FILE MENU
EDIT MENU
Using this menu one can
Cut : One can cut content of the displayed page so they can be copied to
another program.
Copy : One can copy content of the displayed page so they can be copied to
another program.
Select All : One can select all content of the displayed page.
Toolbar : One can view the toolbars that are available in Internet Explorer.
Status bar : One can view the status of the web page being accessed.
Explorer bar : One can change the icons on the Explorer bar.
Full Screen : One can view the browser in Full Screen mode (all the browser
controls will disappear apart from a small toolbar).
FAVORITES MENU
Using this menu one can
Mail and news : Access any email or news reading programs you have on
your computer.
Internet Options : One can configure proxy, clear caches, browser security
options.
HELP MENU
Using this menu one can
access the Help for the program.
access online tours of the Internet and support site for Microsoft products
get information about the browser (version etc.)
Saving files from the web Saving web pages fo they can viewed
when you are “offline” or stored on a local drive is quite simple if one is using
version 5+ of Internet Explorer. Web page are usually made up of a lot of
different elements such as text, images, sound and video. Internet Explorer 5
saves all the files needed to reproduce the web page as it appears online in a
folder so things like images will still be present in your local copy of the file.
Internet Explorer 4, on the other hand, will only save the HTML file that brings
all these elements together and formats them on the web page. This means that if
one is using version 4, one will find that any images, sound, video, and even
some of the functionality and formatting of a saved page is lost.
PRINTING WEB PAGES
To print a web page one either click on the print icon or choose the
file menu and choose print. On click this option the current page will be printed
on the default configured printer (To change print setting one needs to Page
Setup).
NETSCAPE COMMUNICATOR
Netscape’s Communicator, often referred to simply as “Netscape”
is one the most popular Web browsers. This is graphical browsers, which means
that can display graphics as well as text, and can used to view interact with
multimedia formats, including sound, video, and other programs. The browser
part of Netscape’s Communicator is called Netscape navigator.
An email address is composed of two parts the user name and the
domain in the format username@domain. Each email address uniquely identifies
an Internet user.
The user name is the name you use to login to your host server.
This name is unique within the network. The domain is the unique identifier of a
server on the Internet user.
EMAIL NETWORKS:
Email Networks are nothing but a group of users who share
common information with the help of emails. One can become a part of network
by signing on to the network. After which one will receive or post queries or
information to the user group or the email network.
WHAT IS POP3?
POP3 is better suited for the average user using a single computer.
POP3 matches the method used by most users to use email: download, read,
delete. In contrast, IMAP, reads, sorts, and makes email available for download.
IMAP allows the user to easily download messages from his account by
eliminating the need to manage the account size.
WHAT IS MIME?
WHAT IS IMAP4?
Users can also create multiple mail folders on the IMAP4 mail
server and move messages between the folders. By keeping all messages on the
mail server, users can log into the IMAP4 server from different locations and
have access to both new and old messages in their mail folders.
Benefits of IMAP4:
- Mail is centrally stored and managed on the mail server and can be
backed up.
EMAIL HEADERS.
Return-Path: [[email protected]]
Click View from the pull-down menu bar. Then click Headers and
Select all.
Outlook Express
Open the message. Then click File from the pull-down menu bar
and selected Properties. Another window with two tabs is displayed. To view the
details, click the Details tab. Cut and paste the headers into the message that you
want to forward.
EMAIL STRUCTURE
To: In this field you can type an address (or several addresses
separating names with a comma or semicolon) to whom one would like to send a
email to.
CC (carbon Copy): This will send a copy of the message to the address
placed in this field and other recipients can see that the copy was sent.
BCC (Blind carbon Copy): This will send a copy of the message to the
address placed in the field but other recipients do NOT see that the copy was
sent.
SUBJECT line: The subject should be should be short but descriptive. Some
people filter their mail by subject so the subject line should be reflective of the
contents of the message or the message may not be read by the recipient
EMAIL STRUCTURE
(Body): You can type your message in the message field, copy text from
another program and paste in the message field or embed a document in the
message field. Notice that the font options (color, size, style) become active at
this point. REMEMBER the recipients of your message using a different email
program may not see text the same way you wrote it.
OUTLOOK EXPRESS:
Using Outlook Express: Click on the Outlook Express icon on the
desktop or click on the START button at the lower left of the screen and then
select Programs/Outlook Express.
Outbox: Contains a list of mails that was composed offline and is ready to send
and messages that you elect to send later
Deleted Items: Deleted items are temporarily stored here. Right click on the
deleted folder and select to empty it.
Drafts: These are messages composed but which are not ready to be sent
SENDING MESSAGES:
Click on the send button to send this message.
On the toolbar, click the New Mail button. Select the address of person to send
to.
Attachment: To attach a file click on the attach icon and them attach the file.
EMAIL ENCRYPTION
Encryption of email messages is absolutely necessary, if you send
sensitive, personal, or business information through an open network such as the
Internet. Unless you have been a meditating hermit for the last few years, the
media has bombarded you with the woes of sending unencrypted email. Still,
99% of all email traffic travels though the Internet unsecured.
DIGITAL SIGNATURES
Most e-mail encryption tools have another element. On top of
encryption algorithms, they add a digital signature. The digital signature assures
the e-mail’s reader that no one tampered with the message and that it did in fact
come from the author.
The encryption software can only create one possible hash from an
original message. However, there could be other messages that end up creating
the same hash. Still, finding those other messages are virtually impossible.
Though improbable, a person could find a different message that creates the
same hash. that other message would most likely be gibberish.
The second step is to encrypt the hash. The author encrypts the
hash using his/her private key. Voila: a digital signature. The reader can decrypt
the encrypted hash using the author’s public key. The intended reader’s
encryption software checks to see if the author’s message creates the same hash.
That ensures that no one has altered the message.
HISTORY OF FTP
1973, Feb – First “official” FTP document which was a protocol for
file transfer between HOSTs on the ARPANET. In this document, the primary
function of FTP is defined as transferring files efficiently and reliably among
hosts and allowing the convenient use of remote file storage capabilities.
June, 1980 – Specification of FTP
1985 – Standard FTP
4) IP Address Control – These are two parts to this feature set and
many servers may claim this functionality that do not have both
feature sets. On the one hand, this could indicate that the server
software in question has the ability to define and enforce blocked IP
addresses. By assigning blocked IP addresses, the administrator can
restrict problematic clients or hackers from accessing the FTP site.
IF they make a request, they will be summarily denied, often not
even getting a response. The other feature set this refers to is the
ability to set the server to only pay attention to requests coming on
a specific IP. By implementing this feature set, administrators can
set up several small FTP servers on the same computer and have
them each look at requests from a different nic card. In this way, a
single physical server is used even though it is hosting several
different FTP servers.
7) Disk Quota Limitations – Many servers that have user support also
support the ability to set exactly how much space a user can upload
data to or download form. In this way you can restrict users form
using up too much of the available resource pool so that no specific
user has too much in the way of resources over any other.
All in all there are a wide range of FTP server applications out there
from a variety of manufacturers. Whether you are using Serv-U, Coffeecup FTP,
or any one of a host of other servers, the administrator needs to make sure that it
offers the features an ability that are right for you. Once you transition to an FTP
server, it is rather difficult to move to a new one so be careful in which server
you select for your needs.
DOS FTP
COMMAND FUNCTION
ascii Sets transfer mode to ASCII (for text files and HTML pages).
binary Sets transfer mode to BINARY (for graphics and sound files).
disconnect Breaks the ftp connection but keeps FTP client open.
get Copies a remote file to the local computer using the current file
transfer type (the local dir is the one your launched FTP in or
changed to with the ics command).
CUTE FTP
Choose Site Manager from the File menu. Choose which folder you
would like the Site Profile to be in (possibly in the General FTP Sites folder) and
click on the Next fill in the following fields:
CUTE FTP
Once you are logged in, the left window is the Local Window and
the right window is the Remote Window. In the Remote Window, you will be
logged into the Home Directory; open up the Domain Directory to which you
want to upload your site. Then, choose the files in the Local Window you want
to upload and click and drag them to the Remote Window. The next time you
need to upload to the site, simply choose Site Manager from the File menu and
click on the Site Profile and click Connect.
BROWSER BASED FTP
Using Internet Explorer to upload is easy. In the address bar type
ftp:/ username: [email protected] This will log you into the
Home Directory. From here open the folder for the Domain Directory to which
you want to upload. Once in the Domain Directory, simply click and drag the
files from your computer into the Domain Directory.
Telnet 9
WHAT IS TELNET?
2. Press the Start Button in the lower left corner of the screen and
choose Run.
telnet IP number of the server Press Enter. You will see a login
screen login:
4. Type your login ID.
5. Press Enter. It will ask you for your password; type your password
and press Enter. NOTE: you will NOT see the text appear, or your
cursor move, when typing your password. This is normal and helps
make your account more secure.
4. Press Enter. It will ask you for your password; type password and
press Enter. NOTE: you will not see the text appear, or your cursor
move, when typing your password. This is normal and helps make
your account more secure
WHAT IS TERMINAL EMULATION?
WHAT IS USENET?
ORGANIZATION OF NEWSGROUPS
ORGANIZATION OF NEWSGROUPS
NEWS SERVER
The news server software that is installed on the news server must
provide an effective means to store and deal with articles. It also has to take care
that old articles are deleted regularly or expired so that there is enough space on
the hard disks to store new ones.
IRC NETWORKS
EFNet the largest IRC network, accommodates upto 22,000 clients
at a time. EFNet has approximately 84 servers linked together. The second and
third largest existing networks are the UnderNet and DalNet. The EFNet located
in New York, UnderNet in Los Angeles, and DalNet in Dallas comprise the ‘Big
3’ in the IRC world. If something smaller appeals to you, then most IRC
networks will suit you better than the Big 3. The number of people who can
access small IRC networks ranges from 2 to a few hundred people. You can
even find networks that suited to your interests, for example, family-oriented,
technical, hobbies, adventure, and role-playing games
USING IRC
To use IRC, you need to install client software on your computer.
Next you need to use your Internet connection to connect to an IRC network.
After you are connected to an IRC network, you can select a channels to join. A
channel is like a room, where you can talk in groups or in private conversations
to any number of people. You can also leave at any time and join another
channel. While IRC is anonymous, it is not designed to hide you form other
people. Also, when you are talking to people you do not know and you have no
way of knowing if what they are saying is true or not. So use some caution when
using IRC. Remember that IRC as a whole is un moderated, although each
channel is controlled by a channel operator, who can force people off the
channel. People can and will say things that will shock and offend you. Some
channels will be calm and others will be chaotic. If you don’t like what’s being
said in one place, you can move on to another. You are bound to find people
with whom you can enjoy pleasant conversation. As soon as the last person
leaves a channel, it no longer exists. So a channel can be uninteresting to you on
one visit and just the place you want to be on another visit, because it’s an
entirely new channel.
IRC commands start with a slash. Here are a few examples:
SMILIE
3. Web browser. Web browsers are client software which can be used
to navigate and access the large volume of Web pages stored in
different Web servers on the internet. The browsers are text and
graphics-based, however the later is more preferred because they
can display graphics and icons which are more users friendly. The
most commonly used Web browsers are Netscape Communicator
(Netscape Communications 1998) and Microsoft Internet Explorer
(Microsoft Corporation 1998).
Structure
Typically, your information will be presented in segments, called
pages. The structure of your information system is the way these pages are
connected. Some common structures are a sequence where the information is
meant to be read form the beginning to the end, a grid where connections
between pages does not make a regular pattern, and a hierarchy where a parent
page provides access to a number of different sequences. Each of these
structures has advantages, and will be appropriate for different projects.
Audience
Ergonomics
Information Changes
Structural Changes
Once you have set up many files, linked to each other, it becomes
more difficult to make changes without leaving parts of your site “stranded”.
This can be particularly problematic when the original designer of a site leaves
the organization and someone new must take over. Planning for this eventuality
may save considerable effort later.
Revisits by Users
Users who have visited your site may have book marked it for
future reference. If you remove your web site then the next time that the
bookmarks are referenced the user will be met with the response that your site
does not exist. This is not good advertising. So, make sure that you are fully
committed to ongoing maintenance of a web page before hosting your Web site.
1. Go to the home page of the Search Engine and look for a link called
“Add URL” or “Submit a Site.”
2. Click on this link then look for a link to a Help page. The difficulty
here is that each Search Engine seems to have it’s own rules. They
might be confusing but not unfathomable.
3. Do you have frames in your site and does the Search Engine index
sites with frames? (A few do, most don’t)
Macromedia Dreamweaver
http://www.macromedia.com/software/dreamweaver/
http://www.netobjects.com/
DOCUMENT MANAGEMENT
Every firm must have and manage evidence – the proof of their
actions, such as dealing with clients, customers, other firms, other firms, etc., as
well as the other way around. In short, every firm should be able to prove all
their actions were done efficiently and effectively, That’s why in many
companies, thousands and even millions of documents have been accumulated
and more documents are added daily.
As the time is passing, more and more the proof is moving from
traditional paper documents to electronic media, so electronic documents
management is a significant part of any agency’s business operations. But, it also
means that no single medium now holds all the documents relating to an
agency’s business activities. If electronic document management is not done to
the full extent and/or not all traditional records management disciplines for paper
documents are applied to electronic documents, it can result in:
DOCUMENT MANAGEMENT
Modern digital technology has created a situation where documents
are easily copied and transferred from one medium to another. Electronic
document imaging is the conversion of paper documents into electronic images
on a computer. Electronic document archival and retrieval provide conditions
for:
1. Improved, instantaneous and more efficient, access to
documents, records and evidence than ever before
ACCESSIVILITY
DOCUMENT LAYOUT
White space that includes spaces, new lines, tabs, and comments
may appear before or after each section. The head and body sections should be
delimited by the HTML element.
Output : on screen
Hello world
TITLE
Every HTML document should have a title that preferably consists
of about half a dozen words that declare the document’s purpose. Titles are not
displayed as part of the document text, but are rather displayed separately from
the document by most browsers at the top of the window. The title of the HTML
document is also used for identification in certain other contexts. The title
generally goes on the first line of the document.
For example:
The directive for the title tag is title which is self explanatory.
There are both starting and ending title tags. The ending tag is similar to the
starting tag except for a slash (/) that precedes the directive, for
example:</TITLE>. HTML is not case sensitive. This means that both <title>
and <TITLE> are the same.
HEADER
A heading element briefly describes the section that it introduces.
Heading information may be user agents, for example, to construct a table of
contents for a document automatically. There are six levels of headings in
HTML with H 1 to indicate the most important and H6 as the least. Visual
browsers usually render more important headings in larger fonts than less
important ones. Authors should not choose a heading level based on the font size
commonly used by visual browsers. The heading level should be chosen based
on the importance of the heading and the placement in the document.
LISTS
Formatted lists can also be created using HTML tags. The three
main types of list that can be used are ordered lists and unordered lists and
definition list. An ordered is numbered list, whereas an unordered list is bulleted:
1. Ordered list
• Unordered list
• Definition List
ORDERED LISTS
<OL> - Designates the start of an ordered list
<ol>
</ol>
Example
<ul>
<li>First Item
<li>Second Item
<li>Third Item
</ul>
• First Item
• Second Item
• Third Item
DEFINITION LISTS
Example
<dl><lh>Team
<dt><b>Project Manager</b>
<dd>Rahul Kumar
<dt><B>Team Leader</b>
<dd>Shashank Gupta
<dt><B>Programmer</b>
<dd>Anil Sharma
<dt><B>Programmer</b>
<dd>Anil Kumar
</dl>
Team
Project Manager
Rahul Kumar
Team Leader
Shashank Gupta
Programmer
Anil Sharma
Programmer
Anil Kumar
BLOCK-LEVEL ELEMENTS
ADDRESS
Example:
<ADDRESS>Maintained by Vijay
<A HREF=”mailto:[email protected]”>
[email protected] </A></ADDRESS>
Maintained by Vijay
BLOCKQUOTE
The BLOCKQUOTE element defines a block quotation. Unlike
inline quotations, block quotations may contain block-level elements such as P
and TABLE.
Example:
<p>This is a test document for the HTML page you can key in the
same content and check the page in the
browser</P><BLOCKQUOTE>and </BLOCKQUOTE>
and
DIV – DIVISION
The DIV element defines a generic block-level container, allowing
authors to provide style or language information to blocks of content.
Example:
SPAN
Example:
Example:
<CENTER>
<TABLE>
<TR ALIGN=center>
<TD>Name</TD>
<TD>Office</TD>
<TD>City</TD>
</TR>
<TR ALIGN=center>
<TD>Vijay</TD>
<TD>PS</TD>
<TD>Bangalore</TD>
</TR>
</TABLE>
</CENTER>
Output on the screen
INLINE ELEMENTS
H1
The H1 element defines a level-one heading. A document generally
should have exactly one H1 element to mark the most important heading. Visual
browsers typically render H1 in a large, bold font.
Example:
HR – Horizontal Rule
Example:
<HR>
</HR>
Example:
<P> Hi this is a test document to test the use of the Paragraph tag
</P>
TABLE
The TABLE element defines a table for data that can be arranged in
rows and columns. TABLE is commonly used as a layout device, but
programmers should avoid this practices as much as possible. Tables can cause
problems are often accentuated when tables are used solely for layout purposes.
Browsers will not display anything until the complete table has been
downloaded, which can have very noticeable effects when an entire document is
laid out within a TABLE.
Example:
<TABLE>
<TR>
<TH>First Name:</TH>
<TH>Vijay</TH>
</TR>
<TR>
<TD>Last Name</TD>
<TD>R</TD>
</TR>
</TABLE>
GROUPS for borders between row groups and column groups only
A – ANCHOR
The A element denotes an anchor which is a hypertext link or the
destination of a link, The HREF attribute specifies a hypertext link to another
resource, such as an HTML document or a JPEG image.
Example:
The value of the HREF attribute is the URL of the link. The TYPE
attribute can be used to specify the Internet media type of the link, allowing
browsers to avoid fetching a resource that they cannot handle.
ABBR = ABBREVIATION
Example:
My first page
L.A.
ACRONYM
Example;
CBI
B – BOLD
Example:
<B>Show Clearly</B>
BIG
The BIG element suggests that text be rendered in a larger font. In
most cases, use of a structural element such as STRONG or a heading (e.g., H3)
is more appropriate since these elements express the meaning of the text more
clearly.
BR - BREAK
Example:
<br>
Show Clearly
See Clearly
secondline
thirdline
FONT
I – ITALIC
The I element suggests that text be rendered as italic text.
Example:
Example:
SUP
The SUP element is used for superscripts. Since SUP is inherently
presentational, it should not be relied upon to express a given meaning.
However, it can be useful for mathematical exponents where the context implies
the meaning of the exponent, as well as other cases where superscript
presentation is helpful but not required.
Example:
2<SUP>3</SUP>equals 8
U – UNDERLINE
The U element, suggests that text be rendered as underlined text.
Example
<H3><U>My heading</U><>/H3?
BUTTON – Button
OBJECT – Object
My heading
APPLET
The ALT attribute can be used to give alternate text for browsers
that recognize the APPLET element but do not support Java or do not have Java
enabled. Authors can also give alternate content between the start and end tags
of the APPLET element – a better method than using the ALT attribute since it
allows authors to include HTML markup in the alternate content and also works
with pre-HTML 3.2 browsers that do not support APPLET.
Example:
<APPLET archive=”ansnow.jar” code=”amsnow.c;ass” width=320
height=208>
</APPLET>
BUTTON
Example:
<BUTTON NAME=submit
VALUE=continue>Continue</BUTTON>
OBJECT
The OBJECT element is used to include object such as images,
videos, Java applets, and VRML worlds. OBJECT is intended to replace the
more specific IMG and APPLET elements, as well as the proprietary EMBED
and BGSOUND elements a better choice for the time being.
Example:
<object classid=”clsid:D27CDB6E-AE6D-11cf-96B8-
444553540000” codebase=http://macromedia.com/ ../swflash.cab
width=”440” height=”330”><param name=”movie”
value=”images/03a01001.swf”>
SCRIPT
The SCRIPT element includes a client-side script in the document.
Client-side scripts allow greater interactivity in a document by responding to
user events. For example, a script could be used to check the user’s form input
prior to submission to provide immediate notice of any errors by the user.
Example:
<script language=”Javascript”>
function alertme() {
} </script>
FORMS
Having looked at the structure of the standard HTML document
and some of the basic HTML elements, let us now look at various form
elements.
Form Elements
• GET
• POST
The difference between these two is the manner in which the data
in the form is sent to the CGI script.
The method is GET or POST, depending on how you want the data
returned. Within a form, input fields are defined are defined with: for multi line
text input (surrounds prompting text):
Example:
IMG – IMAGE
Example:
The ALT attribute provides alternate text for those users who do
not load images. Effective ALT text should generally give the function of the
image rather than a description of the image. For example, ALT=”Welcome to
XYZ Corp.” would be more appropriate than ALT=”XYZ Corp LOGO” for a
company’s logo on its welcome page. Good ALT text is crucial to the
accessibility of a document for the significant portion of users who do not load
images.
The WIDTH and HEIGHT attributes are most useful when they
specify the exact dimensions of the image in pixels. This allows image-loading
browsers to reserve the proper amount of space for the image and continue to
render the rest of the document.
SELECT
The SELECT element defines a form control for the selection of
options. Internet Explorer displays the SELECT element without a FORM
element. However, Netscape Navigator will not display any SELECT element
outside of a FORM.
Example:
<P>Select one or more sections to search:
<SELECT NAME=sections>
<OPTION><OPTION>
<OPTION>Design Elements</OPTION>
<OPTION>Tools</OPTION>
<OPTION>Feature Article</OPTION>
</SELECT>
</P>
SPECIAL CHARAVTERS
Three characters out of the entire ASCII (or ISO 8859) character
set are special and cannot be used “asis” within an HTML document. These
character are left angle bracket (<), right angle bracket (>), and ampersand (&).
Note:
1. The “escape sequence” only means that the given sequence of characters
represents the single character in an HTML document. The conversion to
single character itself takes place when the document is formatted for
display by reader.
2. There are additional escape sequences that are possible; notably, there
are a whole set of such sequences to support 8-bit characters sets
(namely, ISO 8859-1);
Introduction to Interactivity Tools 13
WHAT IS ASP?
WHAT IS VB SCRIPT?
WHAT IS JAVASCRIPT?
JavaScript is a script is a script language from Netscape that is
supported in Netscape Navigator as of Version 2.0. It is easier to use than Java,
but not as powerful. JavaScript uses the HTML page as its user interface,
whereas Java can generate a completely custom interface. On the client,
JavaScript applets are maintained in source code. On the server, they are
compiled into byte code, similar to Java programs. A JavaScript applet can be
used to display a data entry form and validate the input, while a java program
processes the information. JavaScript is also used to tie Java applets together.
WHAT IS JAVA
MULTIMEDIA
The different media it possesses and makes use of the use of digital technology
The interaction it demands of the user The integration of sound, images, text and
data into seamless applications
VRML
STREAMING
GIF Animator
Macromedia Flash
WHAT IS A FIREWALL?
There are two symbols that assure the public that a web site has
these security measures in place. Firstly a secure web server will be prefixed by
http’s:// rather than the normal http://. Secondly your browser will display the
“golden padlock” symbol that is your assurance that you are in a secure area. To
gain certification for the security of your domain is a costly, complicated and
time-consuming procedure.
INTELLECTUAL PROPERTY
Intellectual property consists of written works, photographs,
artwork, and music that people create from information and ideas. Many people
enjoy sharing their intellectual property with others. However, they may want to
get credit for their hard work.
COPYRIGHT ISSUES
AN INTRODUCTION
COMMUNICATION
Many companies now rely on the internet for communication, both
within the company and with customer. While this is typically through email,
other facilities such as chat, instant messaging, web telephony and
audio/videoconferencing are also being used.
CONCEPTS
TECHNOLOGY IN E-COMMERCE
Introduction
In any E-C0mmerce systems implementation, integration between
business processes with in companies is very important for a successful
implementation. Within a company integration needs include interfacing with
legacy systems, communicating with third party products, and integrating
business processes across distributed E-Commerce systems. The two most
commonly deployed technologies for this type of integration are ALE
(Application Link and Enabling) and (Electronic Data Interchange) technologies,
which make use of the popular Idoc (Intermediate Document) interface for
exchanging data. EDI provides business process integration across companies by
exchanging business documents such as purchase order. Invoices, and shipment
notices in electronic form using industry standard formats such as ANSIX.12
(American National Standard’s Institute) and EDIFACT (Electronic Data
Interchange For Administration, Commerce, and Transport).
Advantages of E-Commerce
• Improved Productivity
• Cost Savings
• Streamlined Business Processes
• Better Customer Service
• Opportunities for New businesses
Improved Productivity:
Cost Savings:
Based on the experience of a wide variety of early adopters of
electronic commerce. Forrester Research has estimated that doing business on
the Internet can result in cost savings of about 5% to 10% of sales. This cost
savings steam from efficient communication quicker turnaround time and closer
access to markets.
Business over the Internet has a global customer reach. There are
endless possibilities for businesses to exploit and expand their customer base.
The latter half of the 1990’s has seen an explosion in the use of the
Internet/Intranet and its accessibility to individuals, corporations, and
educational institutions. This revolution has dramatically changed the way
organizations conduct business with its consumers and with each other. The
geographic boundaries, that offer limited access to goods and services, are
crumbling and companies of all sizes are busy building commerce solutions and
adapting to new ways of doing business. The internet/Internet with inherent
features like easy access, real-time information, and low cost, is a natural driver
for commerce solutions. Further, companies enticed with the promise of the
following competitive advantage as are undertaking electronic commerce
projects.
• Broader market reach
• Increased efficiency and accuracy and accuracy through automated
order-processing, inventory control billing, shipping, and so forth.
• Better customer service and support
• Instant communication with consumers and trading partners.
• Improved profit margins through automated supply chain
management,
• Better forecasting of customer needs for goods and services
• Reduced labor costs
• Lower overall costs
Address Mask
The address mask is used to identify the parts of an IP address that correspond to
the different sections (separated by dots). It’s also known as the “subnet mask”
since the network portion of and address can be determined by the encoding
inherent in an IP address.
Agent
Alias
A type of nickname (usually short and easy to remember) that refers to a type of
network resource. Aliases are used so you won’t have to remember the long and
difficult names typical of network resources.
Anonymous FTP
By using the word “anonymous” as your user ID and your email address as the
password when you login to an FTP site, you can bypass local security checks
and gain limited access to public files on the remote computer. This type of
access is available on most FTP sites, but not all.
Application
Archie
You’ll usually hear this term referred to in the phrase “archie search.” Archie is a way
of automatically gathering, indexing and sometimes even retrieving files on the
Internet. Most good archie clients are able of FTP files once you’ve found the
information you’re looking for.
Archive
AVI
Authentication
Any process that ensures that users are who they say they are. When you type
your name and password, you are authenticated and allowed access.
Bandwidth
This refers to the difference (measured in Hz), between the highest and lowest
frequencies of a transmission. Most people loosely refer to bandwidth as the
amount of data that can be transferred over a network connection.
Bitmap
Bounce
If you send email and it fails to arrive at its intended recipient for any reason
(incorrect user name, network failure, etc.), the message “bounces” and returns
to you. The subject line in a bounced message usually says something like:
“Undeliverable Mail” or “Message Undeliverable.”
Browser
Non-graphical
a user interface for computers which allows you to read plain text, not pictures,
sound, or video, on the Internet. It is strictly text based, non-Windows, and does
not place high memory demands on your computer. An example is lynx.
(http://lynx.browsee.org/)
Graphical
a user interface for computer which enables people to see color, graphics, and
hear sound and see video, available on internet sites. These features are usually
designated by underlined text, a change of color, or other distinguishing feature;
sometimes the link is not obvious, for example, a picture with no designated
characteristic. Examples are Netscape and Internet Explorer.
BTW
Chat
Another term for IRC. Also, an acronym meaning “Conversational Hypertext
Access Technology.”
Client
A committee that provides a forum for North American and European network
research organizations to cooperate and plan.
Corporation for Research and Educational Networking (CREN)
Cracker
Substantially different from “hackers,” crackers are users who try to gain illegal
access to computers. They are usually malicious in their intentions.
Cyberspace
The “world of computers and the society that society that gathers around them,”
as referred to by William Gibson in his fantasy novel “Neuromancer.” It now
loosely refers to the online world and even more loosely to the Internet.
Much like an actual key used for locking and re-opening doors, DEKs are used
for the encryption and decoding of message text, sometimes in the form of a
digital signature.
Datagram
A communications line that is used solely for computer connections. If you buy
an additional phone line for your modem, that’s a dedicated line. There are other
types of dedicated lines (such as T3s and T1s) that are used for larger network
entities.
Dialup
Domain
The DNS is a static, hierarchical name service used with TCP/IP hosts, and is
housed on a number of servers on the Internet. Basically, it maintains a database
for figuring out and finding (or resolving) host names and IP addresses on the
Internet. This allows users to specify remote computers by host names rather
than numerical. IP addresses (if you’ve used UNIX, you may have heard the
DNS referred to as the BSD UNIX BIND service). For example, go to a DOS,
prompt in Windows 95, the % prompt in UNIX, or use a ping client for
Windows 3.1 or Mac, and type “PING UTW. COM”. This will check the DNS
server you have configured, look up the numerical IP address for UTW.COM,
and then ping UTW’s IP address. The advantage of the DNS is that you don’t
have to remember numerical IP addresses for all the internet sites you want to
access.
The common notation for IP addresses of the form 1.2.3.4; where each number
represents one byte in the four-byte IP address.
A foundation that addresses social and legal issues arising from the impact of
computers on society.
A method by which computer users can exchange messages with each other over
a network. Email is probably the most widely-used communications tool on the
Internet. There are many quirky conventions to Email, but most entail a “To:”,
“From:”, and “Subject:” line. One of Email’s advantages is its ability to be
forwarded and replied to easily. If an email is badly received by a group or user,
the sender is likely to get “flamed.”
Email Address
Encryption
Ethernet
A standard and probably the most popular connection type for Local Area
Networks (LANs). It was first developed by Xerox, and later refined by Digital,
Intel and Xerox (see also “DIX”). In an Ethernet configuration, computers are
connected by coaxial or twisted-pair cable where they contend for network
access using a Carrier Sense Multiple Access with Collision Detection
(CSMA/CD) paradigm. Ethernet can transfer information at up to 10 megabit-
per-second (Mb/s).
FAQ
Acronym for “Frequently Asked Questions.” FAQs are widely available on the
Internet and usually take the form of large, instructional text files. They are
written on a wide variety of topics, and are usually the most up-to-date source
for specialized information.
The most widely-used way of downloading and uploading (getting and putting)
files across an Internet connection. The File Transfer Protocol is a standardized
way to connect computers so that files can be shared between then easily. There
is a set of commands in FTP for making and changing directories, transferring,
copying, moving, and deleting files. Formerly, al FTP connections were text
based, but graphical applications are now available the make FTP commands as
easy as dragging and dropping, Numerous FTP clients exist for a number of
platforms.
Firewall
The name “firewall” derives from the term for a barrier that prevents fires from
spreading. A computer “firewall” is a barrier between your computer and the
outside world. Just like a fire is most likely to spread though open doors in a
building, your computer is most vulnerable at its ports ( the doors). Without
ports you could not go on the Internet or let Internet traffic enter your computer.
An effective software firewall isolates your computer from the Internet using a
code that sets up a blockade to inspect each packet of data, from or to your
computer – to determine whether it should be allowed to pass or be blocked.
Firewall software operates in various ways: Packet filters block traffic from IP
addresses and/or port numbers, Proxy servers can break the connection between
two networks. NATs (Network Address Translators) hides the IP addresses of
client stations by presenting one IP address to the “outside” world. Stateful
inspection verifies inbound and outbound traffic to be sure the destination and
the source are correct. Firewall software can allow your computer to operate in
stealth node, so that its IP address is not visible.
Flame
Follow-up
Gateway
Gopher
An information search and retrieval tool used widely for research. Gopher
information is stored hierarchically on computers across the Internet. It uses a
simple protocol that allows a client to access information from a multitude of
numerous Gopher servers at one time, creating what’s known as “gopher space.”
The most common search tools in gopher are Veronica and Jughead. Gopher
clients exist for most platforms.
Hacker
A computer user who works to understand the “ins and outs” of computers,
networks, and the Internet in general. Hackers are generally benign, and are not
to be confused with crackers.
Host
A computer that is attached to a network or the Internet. Hosts allow users on
client machines to connect and share files or transfer information. Individual
users communicate with hosts by using client application programs.
Hypermedia
Hypertext
The standard way to mark text documents for publishing on the World Wide
Web. HTML is marked-up using “tags” surrounded by brackets. To see what
tagged HTML text looks like, select the View Source feature from the menus in
the program you are using to view this document now, and you’ll see a display
of the HTML text used to create this page.
IMHO
Acronym for “In My Humble Opinion.” Generally seen in IRC, email, or Usenet
postings.
A relatively new technology which combines voice and digital network services
in a single medium. ISDN makes it possible for communications carriers to offer
their customers digital data services as well as voice connections through a
single line. CCITT defines the standards relating to ISDN.
International Organization for Standardization (ISO)
Internet
The central registry for various Internet protocol parameters, such as port,
protocol and enterprise numbers, and options, codes and types, the currently
assigned values are listed in the “Assigned Numbers” document. If you’d like
more information or want to request a number assignment, you can email IANA
at “[email protected]”.
The 32-bit address defined by the Internet Protocol. Every resource on the
Internet has a unique numerical IP address, represented in dotted decimal
notation. IP addresses are the closest thing the Internet has to phone numbers.
When you “call” that number (using any number of connection methods such as
FTP, HTTP, Gopher, etc.) you get connected to the computer that “owns” that IP
address.
Internet Service Provider (ISP)
An ISP is a company that maintains a network that is linked to the Internet via a
dedicated communication line, usually a high-speed link known as a T1. An ISP
offers use of its dedicated communication lines to companies or individuals (like
me) who can’t afford $1, 300 a month for a direct connection. Using a modem,
you can dial up to a service provider whose computers will connect you to the
Internet, typically for a fee.
InterNIC
Meaning “Internet information Center,” InterNIC is the combined name for the
providers of registration, information, and database services to the Internet.
InterNIC is who you contact if you want to register a domain name on the
Internet.
IRC
The world-wide “party line” of the ‘90s. IRC allows multiple users to converse
in real time on different “channels.” Channels (which have a “#” sign preceding
their name) vary in traffic and content. Channel operators (or Ops) moderate the
conversation, and have the ability to “kick” people from channels, or even ban
hem if their actions warrant it. IRC clients are available for nearly all platforms.
LAN
Acronym for “Local Area Network.” LANs are now commonplace in most
businesses, allowing users to send email and share resources such as files,
printers, modems, etc. Currently, most larger companies are connection their
LANs to he Internet, allowing users to connect to resources within or outside the
LAN
Leased Line
Listserv
Mailing List
Mirror Site
Due to the popularity of some FTP and Web sites, mirror sites came into
existence. They are areas on a computer that “mirror” or contain an exact replica
of the directory structure of another computer. If you have trouble getting
connected to an FTP site, for example, because of the high amount of traffic, you
can usually connect to a mirror site that contains the same information on a
different computer. Mirror sites are usually updated once a day.
Moderator
Mosaic
A graphical browser for the World wide Web that supports hypermedia. The
NCSA (National Super Computer Association) invented the Mosaic browser,
which quickly became the industry standard. Recently, however, Netscape
Communications has stormed the market with its freeware release of their
Netscape Browser, which has radically redefined the Web. The term “Mosaic” is
sometimes used incorrectly as a synonym for the World Wide Web.
Netiquette
The combination of the words “Net” and “etiquette,” this refers to the proper
behavior on a network, and more generally the internet. The key element in
Netiquette is remembering that actual people are on the other end of a computer
connection, and offensive comments or actions are just as offensive even if you
can’t see your recipient.
An industry standard protocol for the distribution, inquiry, retrieval, and posting
of news articles.
Packet
The common term for the standard unit of data sent across a network.
The simplest way to test or time the response of an Internet connection. PING
sends a request to an Internet host and waits for a reply (called a ... yep.. you
guessed it: PONG). When you PING an address, you get a response telling you
the number of seconds it took to make the connection. PING clients exist for a
number of platforms, or you can use a UNIX or Windows 95 prompt to issue a
PING command directly.
One of the many authentication methods that can be used when connection go an
ISP. PAP allows you to login automatically, without having to use a terminal
window to type in your username and password. One warning about PAP:
passwords are sent over the connection in text format, which means there is no
protection if someone is “listening-in” on your connection.
A protocol that provides a method for transmitting packets over serial point-to-
point links. PPP is one of the most popular methods for dialup connections to the
Internet, since it allows you to use other standard protocols (such as IPX,
TCP/IP, and Netbeui) over a standard telephone connection, but it can also be
used for LAN connections.
Portal
A Web site “gateway” that provides multiple services, which could include Web
searching capability, news, free-email, discussion gouts, online shopping,
references and other services. A more recent trend is to use the same term for
sites that offer services to customers of particular industries, such as a Web-
based band “portal,” on which customers can access their checking, savings and
investment accounts.
A protocol designed to allow single users to read mail from a server. There are
three versions: POP, POP2, and POP3. When email is sent to you, it is stored on
the server until accessed by you. Once you are authenticated, the POP is used to
transmit the stored mail from the server to your local mailbox on your client
machine.
Posting
The sending of and article to a Usenet newsgroup or the placing of a message on
a BBS.
Protocol
Router
A device that forwards traffic between networks. Forwarding decisions are made
based on network layer information and routing tables, often constructed by
routing protocols.
Search Engine
Specialized software, such as Alta Vista and Yahoo, that lets WWW browser
users search for information on the Web by using keywords, phrases, and
Boolean logic. Different search engines have different ways of categorizing and
indexing information, Search engines are accessed by typing in the URL of that
engine or using a browser’s compilation of search engines in its Internet search
function.
Serial Line Internet Protocol (SLIP)
Similar to PPP, SLIP is another standard protocol used to run TCP/IP over serial
lines, such as telephone circuits or RS-232 cables. Unlike PPP, however, SLIP
does not work on a LAN connections. SLIP is probably the most popular way
for dialup users to access the Internet.
Server
SIG
Acronym for “Special Interest Group.” SIGs sponsor a variety of Listservs, IRC
channels, and Internet sites.
Signature
An ASCII text file that can be automatically attached to the bottom of a piece of
email or newsgroup posting that identifies the sender. Many signatures (or
“sigs”) use symbols and characters to create images or words to make the sig
more interesting.
A protocol used to transfer email. SMTP transfers mail from server to server,
and the end user must use POP (see also Post Office Protocol) to transfer the
messages to their machine.
Smiley
The use of punctuation marks and other symbols or characters to portray moods
when typing, especially in email messages and IRC. Here’s an example of a
simple smiley :). If you don’t see it, tilt your head to the left and look at it. The
colon makes the eyes and the parenthesis makes the smiley mouth. The smile
means happiness (like if someone says something funny) or it often denotes
sarcasm, Other combinations of characters can express many other emotions.
You may also hear them referred to as “emoticons”.
TCP/IP Stack
To properly use the TCP/IP protocol, PCs require a TCP/IP stack. This consists
of TCP/IP software, sockets software (such as WINSOCK.DLL for Windows
machines), and hardware driver software (known as packet drivers). Windows
95 comes with Microsoft’s own built-in TCP/IP stack, including version 1.1 of
Microsoft’s WINSOCK.DLL and packet drivers.
Telnet
The Internet standard protocol to connect to remote terminals. Telnet clients are
available for most platforms, When you Telnet to a UNIX site, for example, you
can issue commands at the prompt as if the machine were local.
Token Ring
A type of LAN in which networked computers are wired into a “ring.” Each
computer (or node) is in constant with the next node in the ring. A control
message, called a “token”, is passed from one node to another, allowing the node
with the token to send a message out to the network. If the ring is “broken” by
one computer losing contact, the network can no longer communicate. The IEEE
802.5 token ring standard is the most common.
Topology
The “layout” of all the computers on a network and the links that join them.
Originally, UUCP was a program that allowed UNIX systems to transfer files
over phone lines. Currently, the term is used to describe the protocol that passes
news and email across the Internet.
Usenet
More commonly referred to as the URL, the Universal Resource Locator refers
to the entire address that is recognized “universally” as the address for an
Internet resource. Each resource on the Internet has a unique URL. URLs begin
with letters that identify the resource type, such as http, ftp, gopher, etc. These
types are followed by a colon and two slashes. Next, the computer’s name is
listed, followed by the directory and filename of the remote resource. For
example, the URL for this glossary is
http://www.windows95.com/glossary.html/
White Pages
Databases containing email addresses, telephone numbers, and postal addresses
of Internet users. You can search the Internet White Pages to find information
about particular users.
WHOIS
An Internet program (related to Finger and the White Pages) that lets you enter
and Internet entity (such as domains, networks, and hosts) and display
information such as a person’s company name, address, phone number and email
address.
A distributed information service and search engine that allows natural language
input and indexed searching. Many Web search utilities use a WAIS engine.
Winsocks
Appendix -
A
HOT SITES
COMPUTER SYSTEMS
IBM
http://www.ibm.com
Apple Computer
http://www.apple.com
Printers
Hewlett-Packard
http://www.hp.com
Modems
US Robotics
http://www.usr.com
Hayes
http://www.usr.com
Practical Peripherals
http://www.practinet.com
Microsoft
http://www.microsoft.com
INTERNET SITES
Netscape Communications
http://www.netscape.com
Search Engines
Yahoo!
http://www.yahoo.com
Infoseek
http://www.infoseek.com/
Alta Vista
http://www.altavista.digital.com/
WebCrawler
http://www.webcrawler.com/
People Finders
InfoSpace
http://www.infospace.com
Who Where?
http://www.whowhere.com
Broadcast Media
This list of sites covers everything from network TV to cable to he
movies.
Network TV
ABC
http://www.abc.com
Fox
http://www.foxworld.com
Cable TV
Cinemax
http://www.cinemax.com
The Disney Channel
http://www.disney.com/DisneyChannel/
ESPN
http://www.espn.com
Movie Studios
MCA/Universal
http://www.mca.com
Sony Pictures
http://www.spe.sony.com/Pictures/SonyMovies/index.html
Warner Brothers
http://www.movies.warnerbros.com/