0% found this document useful (0 votes)
14 views

CA Notes Unit - IV

Telnet allows users to remotely access another computer over a network through a virtual command line interface. It uses the Telnet protocol and commonly connects to port 23. While it allows access, Telnet is considered insecure due to a lack of encryption. FTP is used for transferring files between computers over a network, typically for uploading and downloading website files. It establishes two connections, one for control commands and one for transferring data. Network tools like Ping, IPConfig/Ifconfig, Tracert, and ARP help monitor, manage, diagnose and troubleshoot computer networks.

Uploaded by

sharat chandra
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

CA Notes Unit - IV

Telnet allows users to remotely access another computer over a network through a virtual command line interface. It uses the Telnet protocol and commonly connects to port 23. While it allows access, Telnet is considered insecure due to a lack of encryption. FTP is used for transferring files between computers over a network, typically for uploading and downloading website files. It establishes two connections, one for control commands and one for transferring data. Network tools like Ping, IPConfig/Ifconfig, Tracert, and ARP help monitor, manage, diagnose and troubleshoot computer networks.

Uploaded by

sharat chandra
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

UNIT - IV

Chapter 8: Internet Applications

Telnet:
Telnet is a network protocol for remote terminal access.It creates a virtual
command line interface to another computer over a network.Like accessing a
remote computer directly through its keyboard and screen.
Telnet client software on the main computer connects to a telnet server on the
remote computer. Everything you type is sent to the remote server, and its output is
displayed on the main computer’s local screen.
key points about Telnet:
1. Remote Access: Telnet allows a user to remotely access another
computer or device connected to a network.
2. Command-Line Interface (CLI): Once connected via Telnet, users can
access the command-line interface of the remote system.
3. Protocol: Telnet operates on the application layer of the TCP/IP
protocol suite. It uses the Telnet protocol to facilitate the connection
between the local and remote systems.
4. Port: Telnet commonly uses TCP port 23 as the default port for
communication.
5. Security Concerns: Due to its lack of encryption, Telnet is considered
insecure for transmitting sensitive information over a network.

FTP (File Transfer Protocol):


A protocol for transferring files between computers over a network, commonly
used for uploading and downloading website files.
Works by establishing two connections:
1. One for control commands (login, file listing, etc.)
2. One for transferring actual data
It is most used for Website updates and maintenance, File sharing between
computers, Backing up data to remote servers, Software distribution.

E-mail (Electronic Mail):


Email, short for electronic mail, is a method of exchanging digital messages
between individuals or groups using electronic devices and the Internet.
Email operates on standardised protocols like SMTP (Simple Mail Transfer
Protocol) for sending emails, IMAP (Internet Message Access Protocol).
An email consists of various components, including the sender's and
recipient's email addresses, subject line, message body, attachments (if any), and
timestamps.
It allows users to send and receive text-based messages, files, images, and
other types of data instantly across different devices and platforms.
Users access and manage emails through email client applications (e.g.,
Outlook, Gmail, Thunderbird) or web-based interfaces provided by email service
providers.
It's extensively used for both personal communication and professional
purposes, serving as a primary mode of communication in many workplaces.

Search engines:
Search engines are online tools or software applications designed to retrieve
information from the internet based on user queries.
When a user enters a query (keywords or phrases), the search engine uses
algorithms to match the query against its index and ranks relevant pages based on
various factors like content quality, relevance, and authority.
Search engines present users with a results page displaying a list of links
(search engine results pages or SERPs), along with snippets or brief descriptions of
the content.
Examples include Google, Bing, Yahoo, Baidu, and others, each with its
algorithms and methodologies for ranking web pages.

Social networks:
Social networks have become an undeniable force in shaping our personal
and professional lives. These platforms provide spaces for communication,
community building, and information sharing, influencing everything from trends and
news to marketing and political movements.
Social networks are online platforms where users create profiles, connect with
others, and share content. Think of them as digital communities built around shared
interests, hobbies, or professional connections.
Facebook, Instagram, Twitter, LinkedIn, and YouTube are some of the most
popular social networks.

Video conferencing:
Video conferencing has become a staple in today's world, allowing us to
connect with colleagues, friends, and family across the globe in real-time. Here are
some key points to grasp the concept
Video conferencing is a technology that lets two or more people in different
locations hold a face-to-face meeting using video and audio transmission over a
network. Think of it as a live video call with enhanced functionalities for meetings
and presentations.
Video conferencing platforms or apps like Zoom, Google Meet, Microsoft
Teams, or Skype are used to initiate and manage the call.
When a meeting is started, participants join by entering a meeting link or code,
and their audio and video feeds are connected simultaneously.
Video conferencing platforms offer various features like screen sharing,
virtual whiteboards, file sharing, chat windows, and recording capabilities to enhance
collaboration and engagement.
It saves time and money, and also it improves communications.

E- commerce:
E-commerce, short for electronic commerce, refers to the buying and selling
of goods and services over the Internet. It's like a bustling digital marketplace where
you can find almost anything imaginable, from groceries and clothing to plane tickets
and online courses.
Types of E-commerce:
1. Business-to-consumer (B2C): The most familiar type, where businesses
sell directly to consumers (e.g., Amazon, Nike).
2. Business-to-business (B2B): Businesses selling to other businesses
(e.g., wholesale suppliers, software companies).
3. Consumer-to-consumer (C2C): Individuals selling to other individuals
(e.g., eBay, Etsy).
4. Consumer-to-business (C2B): Individuals selling services or products to
businesses (e.g., freelancing platforms, influencer marketing).
It helps to Shop anytime, anywhere, from the comfort of your home. Access a
vast global marketplace with diverse products and brands. Often find better deals
and compare prices easily. Read reviews, compare features, and learn about
products before buying.Recommendations and targeted advertising cater to your
preferences.

M- Commerce:
M-commerce, short for mobile commerce, refers to the buying and selling of
goods and services through wireless handheld devices such as smartphones and
tablets. It is an extension of e-commerce (electronic commerce) but specifically
involves transactions conducted using mobile devices and wireless technologies.
M-commerce leverages mobile applications, mobile-optimised websites, and other
mobile technologies to facilitate various online transactions.
M-commerce has become increasingly prevalent as mobile devices have
become accessible, offering users the convenience of making transactions easily. It
has transformed the way people shop, access services, and interact with businesses,
providing a seamless and flexible experience for both consumers and merchants.

E- wallet:
An e-wallet, a digital or mobile wallet, is essentially a virtual version of your
physical wallet that stores your payment information like credit cards, debit cards,
and sometimes even bank accounts. You can use it to make contactless payments
through your smartphone or other connected devices, eliminating the need to carry
physical cards or cash.

It benefits in Carry all your payment information in one place, eliminating the
need for bulky wallets, E-wallets use advanced encryption and security measures to
protect your financial information, Checkout online or in-store quickly and easily with
just a tap or scan,Track your spending habits and gain valuable insights into your
financial health and Can be used by anyone with a smartphone and internet
connection, even those without traditional bank accounts.
Popular e-wallets:
G-pay
Phone pay.

Chapter 9: Network Tools:

Network tools are software or hardware utilities that help you monitor,
manage, diagnose, and troubleshoot computer networks. They're essential for
network administrators, IT professionals, and even home users who want to keep
their networks running smoothly.

some commands used to monitor the network connection:


Ping:
"ping" is a network utility tool used to test the reachability of a host (usually a
computer or server) on an Internet Protocol (IP) network. The name "ping" comes
from sonar terminology, representing the sound of a sonar pulse that is used to
detect objects underwater. Similarly, in networking, a "ping" is a small packet of data
sent from one computer to another to check if the destination is reachable and
measure the round-trip time for the data to travel back.
Ex:
Ipconfig (Internet Protocol CONFIGuration):
A command line utility that is used to display and manage the IP address
assigned to the machine. In Windows, typing ipconfig without any parameters
displays the computer's currently assigned IP, subnet mask and default gateway
addresses.

Ifconfig:
Use the ifconfig command to determine basic information about the
interfaces of a particular system. For example, a simple ifconfig query can tell you
the following: Device
names of all
interfaces on a
system. All IPv4 and,
if applicable, all IPv6
addresses that are
assigned to the
interfaces.
Tracert:
The tracert command(called traceroute on non-Windows systems) is a
network diagnostic tool used to trace the path that data packets take from the local
computer to a destination IP address or domain. It's particularly helpful in
troubleshooting network connectivity issues and identifying the specific hops
(routers or intermediate devices) that data packets traverse.

ARP:
The ARP (Address Resolution Protocol) command is a network protocol used
to map an IP address to a physical machine (MAC) address that's recognized on a
local network. It helps in translating IP addresses to MAC addresses and vice versa.
The ARP command operates at the Data Link Layer (Layer 2) of the OSI model.
ARP works by broadcasting a request within a local network asking, "Who has
this IP address?" The device that owns that IP address responds with its MAC
address, allowing the requesting device to create or update its ARP cache entry. This
process ensures efficient communication within a network by maintaining a table of
IP-to-MAC address mappings.
Netstat:
The netstat command is a versatile networking utility available in various
operating systems.It stands for "network statistics" and is used to display
information about network connections, routing tables, interface statistics,
masquerade connections, and multicast memberships.
In its basic form, netstat provides a snapshot of active network connections
on a system. Commonly used options with netstat include:
-a (all): Displays all active connections, including listening ports.
-t (tcp): Shows TCP protocol connections.
-u (udp): Displays UDP protocol connections.
Whois:
WHOIS is a query and response protocol used to obtain information about
domain names, IP addresses, and other resources registered with the Internet
Corporation for Assigned Names and Numbers (ICANN) and other domain
registration authorities. The term "WHOIS" also refers to databases containing this
information.

When a domain name is registered, the person or organisation registering it provides


contact information such as names, addresses, phone numbers, and email
addresses. This information is stored in the WHOIS database, and it is publicly
accessible.

It's important to note that the accessibility of WHOIS information and the level of
detail provided may vary based on the policies of the domain registration authorities
and any privacy protection services employed by domain owners.

You might also like