Documente Academic
Documente Profesional
Documente Cultură
1 INTERNET SERVICES
Internet Services allows us to access huge amount of information such as text, graphics, sound
and software over the internet. Following diagram shows the four different categories of
Internet Services.
Communication Services
There are various Communication Services available that offer exchange of information with
individuals or groups. The following table gives a brief introduction to these services:
Internet Relay Chat (IRC): Allows the people from all over the world to communicate in
4
real time.
Mailing Lists : Used to organize group of internet users to share common information
5
through e-mail.
Internet Telephony (VoIP) : Allows the internet users to talk across internet to any PC
6
equipped to receive the call.
Archie
2
It’s updated database of public FTP sites and their content. It helps to search a file by its name.
Gopher
3
Used to search, retrieve, and display documents on remote sites.
Web Services
Web services allow exchange of information between applications on the web. Using web
services, applications can easily interact with each other. The web services are offered using
concept of Utility Computing.
Video Conferencing
Video conferencing or Video teleconferencing is a method of communicating by two-way video
and audio transmission with help of telecommunication technologies.
5.2 Email
Email is a service which allows us to send the message in electronic mode over the internet. It
offers an efficient, inexpensive and real time mean of distributing information among people.
E-Mail Address
Each user of email is assigned a unique name for his email account. This name is known as E-
mail address. Different users can send and receive messages according to the e-mail address.
E-mail is generally of the form username@domainname. For example,
webmaster@gmail.com is an e-mail address where webmaster is username and gmail.com is
domain name.
The username and the domain name are separated by @ (at) symbol.
E-mail addresses are not case sensitive.
OPERATIONS OF E-MAIL
1. Composing and Sending Email
Before sending an email, we need to compose a message. When we are composing an email
message, we specify the following components. The correct email address should be specified;
otherwise it will send an error back to the sender.
E-mail Message Components
E-mail message comprises of different components: E-mail Header, Greeting, Text, and
Signature.
E-mail Header
The first five lines of an E-mail message is called E-mail header. The header part comprises of
following fields:
From
Date
To
Subject
CC
BCC
FROM
The From field indicates the sender’s address i.e. who sent the e-mail.
DATE
The Date field indicates the date when the e-mail was sent.
TO
The To field indicates the recipient’s address i.e. to whom the e-mail is sent.
SUBJECT
The Subject field indicates the purpose of e-mail. It should be precise.
CC
CC stands for Carbon copy. It includes those recipient addresses whom we want to keep
informed but not exactly the intended recipient.
BCC
BCC stands for Black Carbon Copy. It is used when we do not want one or more of the
recipients to know that someone else was copied on the message.
GREETING
Greeting is the opening of the actual message. Eg. Hi Sir or Hi Guys etc.
TEXT
It represents the actual content of the message.
SIGNATURE
This is the final part of an e-mail message. It includes Name of Sender, Address, and Contact
Number.
These components are described in the following diagram:
Once you have specified all the above parameters, It’s time to send the email. The mailer
program provides a Send button to send email, when you click Send, it is sent to the mail
server and a message mail sent successfully is shown at the above.
2. Reading Email
Emails are stored under different tabs such as primary, social, and promotion. When you
click one of tab, it displays a list of emails under that tab.
To read an email, just have to click on that email. Once click on a particular email, it
gets opened.
The opened email may have some file attached with it. The attachments are shown at the
bottom of the opened email with an option called download attachment.
3. Replying Email
After reading an email, you may have to reply that email. To reply an email,
click Reply option shown at the bottom of the opened email.
Once you click on Reply, it will automatically copy the sender’s address in to the To
field. Below the To field, there is a text box where you can type the message.
Once you are done with entering message, click Send button. It’s that easy. Your email
is sent.
4. Forwarding Email
It is also possible to send a copy of the message that you have received along with your own
comments if you want. This can be done using forward button available in mail client software.
The difference between replying and forwarding an email is that when you reply a message to a
person who has send the mail but while forwarding you can send it to anyone.
5. Deleting Email
If you don’t want to keep email into your inbox, you can delete it by simply selecting the
message from the message list and clicking delete or pressing the appropriate command.
Advantages
E-mail has prooved to be powerful and reliable medium of commmunication. Here are the
benefits of E-mail:
Reliable : Many of the mail systems notify the sender if e-mail message was undeliverable.
Convenience: There is no requirement of stationary and stamps.
Speed : E-mail is very fast. However, the speed also depends upon the underlying network.
Inexpensive : The cost of sending e-mail is very low.
Printable : It is easy to obtain a hardcopy of an e-mail.
Global : E-mail can be sent and received by a person sitting across the globe.
Generality : It is also possible to send graphics, programs and sounds with an e-mail.
Disadvantages
Apart from several benefits of E-mail, there also exists some disadvantages as discussed below:
Forgery : E-mail doesn’t prevent from forgery, that is, someone impersonating the sender, since
sender is usually not authenticated in any way.
Overload :Convenience of E-mail may result in a flood of mail.
Misdirection : It is possible that you may send e-mail to an unintended recipient.
Junk : Junk emails are sometimes referred to as spam.
No Response : It may be frustrating when the recipient does not read the e-mail and respond on
a regular basis.
Working of E-mail
Email working follows the client server approach. In this client is the mailer i.e. the mail
application or mail program and server is a device that manages emails.
The basic steps involved in sending and receiving emails and will give you a better
understanding of working of email system:
Suppose person A wants to send an email message to person B.
Person A composes the messages using a mailer program i.e. mail client and then select Send
option.
The message is routed to Simple Mail Transfer Protocol to person B’s mail server.
The mail server stores the email message on disk in an area designated for person B.
The disk space area on mail server is called mail spool.
Now, suppose person B is running a POP client and knows how to communicate with B’s
mail server.
The POP server to check if any new email has arrived for B.As in this case, person A has
sent an email for person B, so email is forwarded over the network to B’s PC. This is
message is now stored on person B’s PC.
The following diagram gives pictorial representation of the steps discussed above:
There are several email service providers available in the market with their enabled features
such as sending, receiving, drafting, storing an email and much more.
The following table shows the popular email service providers:
WWW Operation
The WWW is based on these three core technologies.
1. HTML
2. HTTP
3. Web Browser and Web server.
WWW works on client- server approach. Following steps explains how the web works:
1. User enters the URL (say, http://www.tutorialspoint.com) of the web page in the
address bar of web browser.
2. Then browser requests the Domain Name Server for the IP address corresponding to
www.tutorialspoint.com.
3. After receiving IP address, browser sends the request for web page to the web server
using HTTP.
4. Then web server receives request using HTTP protocol and checks its search for the
requested web page.
5. If found it returns it back to the web browser and close the HTTP connection.
6. Now the web browser receives the web page, It displays the contents of web page in web
browser’s window.
Web Page
Web page is a document available on world wide web. Web Pages are stored on web server
and can be viewed using a web browser.
A web page can cotain huge information including text, graphics, audio, video and hyper
links. These hyper links are the link to other web pages.
Collection of linked web pages on a web server is known as website. There is unique Uniform
Resource Locator (URL) is associated with each web page.
Dynamic web page shows different information at different point of time. It is possible to
change a portion of a web page without loading the entire web page.
Through Telnet, an administrator or another user can access someone else's computer
remotely. On the Web, HTTP and FTP protocols allow you to request specific files from remote
computers, but not to actually be logged on as a user of that computer.
With Telnet, you log on as a regular user with whatever privileges you may have been
granted to the specific application and data on that computer.
Characteristics of Telnet:
1. Accessing Remote Computers: One of the biggest advantages of Telnet software is that it
allows remote access to someone else's computer.
2. Saves Time: Telnet saves time because instead of physically traveling to another person's
home,
3. Router configuration: Since it uses plain text it is very easy to fix problems.
4. Universal: Telnet can be used on any computer operating system versions.
Disadvantages of Telnet
1. It's not secure - everything is sent in plain text be it over a local network or over the Internet.
2. It is old: It is text based only, there are no graphics or colors which makes it boring.
5.6 Internet Relay Chat
Internet Relay Chat (IRC) is a protocol for live interactive Internet text messaging
(chat) or simultaneous conferencing.
Internet Relay Chat (IRC) is an open protocol that allows users with an IRC client to
exchange text messages in real time over the Internet. Created by Jarkko Oikarinen in 1988, IRC
was one of the first chat systems to allow more than two participants to join in a discussion.
It is mainly designed for group communication in discussion forums, called channels, but
also allows one-to-one communication via private messages well as chat and data transfer,
including file sharing.
Generally, the user runs a program (called a “client”) to connect to a server on one of the
IRC nets.
The server relays information to and from other servers on the same net.
Once connected to an IRC server on an IRC network, you will usually join one or more
“channels” and converse with others there.
Advantages of IRC
1. IRC is decentralized: There is no single company controlling IRC (in contrast to gchat or
Facebook chat or AIM, etc.)
2. IRC's channel paradigm is very flexible and robust: allows for real-time discussion with up to
hundreds of people at once.
3. Privacy: IRC has the concept of access levels and complex channel modes.
4. Meeting new people: persons are able to meet and communicate with new people all over the
world on IRC.
Disadvantages of IRC
1. Informality: hyperbole, jokes, and sarcasm not only may be misunderstood by some persons in
the chat.
2. Chat bytes: The chat client line length and buffer limits mean that all "discussion" is
necessarily limited to chat-sized bites of words.
Linking is extremely important as it connects many pages and websites around the web.
Access the web
There are a few items required to access the web:
• Computer (PC or Laptop) —a computer make sure having the ability to connect to a wireless
connection.
• Internet Connection—need to pay to get a connection in your house which will allow you to access
the internet.
Typically there are two options:
1. Connect your computer using a network cable that connects in to your telephone line or
cable line.
2. Connect using a wireless connection. Establish a connection to the device without making
any physical connection to it. This is referred to as connecting to a WiFi network.
3. Web browser — once you have an internet connection then you’ll need to have an internet
browser on your computer. This browser allows you to browse websites.
5.8 URL
URL Stands for "Uniform Resource Locator." A URL is the address of a
specific webpage or file on the Internet. The URL can be typed it in the address bar of your web
browser. If the server name in the URL is not valid, your browser may display a "Server not
found" error. If the path in the URL is incorrect, the server may respond with a 404 error.
While all website URLs begin with "http," several other prefixes exist. Other protocols, such as File
Transfer Protocol (FTP) or Gopher, also use URLs. The URLs used by these protocols might have a
different syntax to the one used for HTTP.
For example, the URL of the TechTerms website is "http://techterms.com."
The address of this page is "http://techterms.com/definition/url" and includes the following
elements:
1. http:// – the URL prefix, which specifies the protocol used to access the location
2. techterms.com – the server name or IP address of the server
3. /definition/url – the path to the directory or file
Below is a list of various URL prefixes:
http – a webpage, website directory, or other file available over HTTP
ftp – a file or directory of files available to download from an FTP server
news – a discussion located within a specific newsgroup
telnet – a Unix-based computer system that supports remote client connections
gopher – a document or menu located on a gopher server
Here is an example of an HTTP URL:
http://www.example.com/software/index.html
What is a Hostname?
A hostname is the label (the name) assigned to a device (a host) on a network and is used to
distinguish one device from another on a specific network or over the Internet. Hostnames are
also used by DNS servers so you can access a website by a common, easy-to-remember name to
avoid having to remember a string of numbers (an IP address) just to open a website.
For example, in the URL pcsupport.about.com, the hostname is PC support.
Examples of a Hostname
Each of the following is an example of a Fully Qualified Domain Name (FQDN) with its
hostname written off to the side:
pcsupport.about.com: pcsupport
www.google.com: www
images.google.com: images
products.office.com: products
www.microsoft.com: www
Port
A number used to identify a specific webserver at the provided hostname. When omitted, a
scheme specific default value is used. For http, the default is 80. For https, the default is 443.
http://www.example.com:1030/software/index.html
Browser Vendor
Safari Apple
K-meleon K-meleon
Architecture
There are a lot of web browser available in the market. All of them interpret and display
information on the screen however their capabilities and structure varies depending upon
implementation. But the most basic component that all web browsers must exhibit is listed
below:
Controller/Dispatcher
Interpreter
Client Programs
Controller works as a control unit in CPU. It takes input from the keyboard or mouse, interpret
it and make other services to work on the basis of input it receives.
Interpreter receives the information from the controller and execute the instruction line by line.
Some interpreter are mandatory while some are optional For example, HTML interpreter
program is mandatory and java interpreter is optional.
Client Program describes the specific protocol that will be used to access a particular service.
Following are the client programs that are commonly used:
HTTP, SMTP, FTP, NNTP, POP
What is the primary function of the Web browsers?
Web browser functions are to provide the resources or information to the user when asked
by them.
It processes the user inputs in the form of URL like http://www.google.com in the browser
and allows the access to that page.
URL is used to identify the resources and fetch them from the server and displays it to the
client.
It allows the user to interact with the web pages and dynamic content like surveys, forms,
etc.
It also allows the user to navigate through the complete web page and see its source code in
the HTML format.
It provides security to the data and the resources that are available on the web that is by
using the secure methods.
Internet explorer is a web browser developed by Microsoft. It is installed by default with the
windows operating system however, it can be downloaded and be upgraded.
To start internet explorer, follow the following steps:
Go to Start button and click Internet Explorer.
Accessing Web Page
Accessing web page is very simple. Just enter the URL in the address bar.
Navigation
A web page may contain hyperlinks. When we click on these links other web page is opened.
These hyperlinks can be in form of text or image. When we take the mouse over an hyperlink,
pointer change its shape to hand.
Saving Webpage
You can save web page to use in future. In order to save a webpage, follow the steps given
below:
Click File > Save As. Save Webpage dialog box appears.
Choose the location where you want to save your webpage from save in: list box. Then
choose the folder where you want to save the webpage.
Specify the file name in the File name box.
Select the type from Save as type list box.
o Webpage, complete
o Web Archive
o Webpage HTML only
o Text File
From the encoding list box, choose the character set which will be used with your
webpage. By default, Western European is selected.
Click save button and the webpage is saved.
Saving Web Elements
Web elements are the pictures, links etc. To save these elements follow the steps given below:
Right click on the webpage element you want to save. Menu options will appear. These
options may vary depending on the element you want to save.
Save Picture As: This option let you save the picture at specific location with its name. When
you click this option, a dialog box is opened where you can sepcify its name and location.
Web crawler
It is also known as spider or bots. It is a software component that traverses the web to gather
information. Web bot, web crawler or web robot, a spider is a program or script written to
browse the World Wide Web in a systematic manner for the purpose of indexing websites. For
example, spiders are often used to gather keywords from web pages that are then sorted so users
can locate said pages through an Internet search engine.
Database
All the information on the web is stored in database. It consists of huge web resources.
Search Interfaces
This component is an interface between user and the database. It helps the user to search
through the database.
Examples
Following are the several search engines available today:
Search
Description
Engine
Google It was originally called BackRub. It is the most popular search engine globally.
Bing It is the latest web-based search engine that also delivers Yahoo’s results.
Alexa It is subsidiary of Amazon and used for providing website traffic information.
HTTP stands for Hypertext Transfer Protocol. It is the standard protocol for transferring
web pages (and their content) across the Internet.
When you browse a web page, the URL might be preceded by http://. This is telling the
web browser to use HTTP to transfer the data. Most browsers will default to HTTP if
you don't specify it. You can test this by typing in say... www.quackit.com (instead
of http://www.quackit.com).
HTTP is a stateless protocol i.e HTTP supports only one request per connection. This
means that with HTTP the clients connect to the server to send one request and then
disconnects. This mechanism allows more users to connect to a given server over a
period of time.
The client sends an HTTP request and the server answers with an HTML page to the
client, using HTTP.
HTTPS
Hypertext Transfer Protocol Secure (HTTPS) is a variant of the standard web transfer
protocol (HTTP) that adds a layer of security on the data in transit through a secure
socket layer (SSL) or transport layer security (TLS) protocol connection.
HTTPS enables encrypted communication and secure connection between a remote user
and the primary web server.
HTTPS is primarily designed to provide enhanced security layer over the unsecured
HTTP protocol for sensitive data and transactions such as billing details, credit card
transactions and user login etc
FTP
FTP stands for File Transfer Protocol. It is used to transfer files across the Internet. FTP
is commonly used by web developers to publish updates to a website (i.e. to upload a
new version of the website).
Where HTTP is used for displaying the file in your browser, FTP is used simply to
transfer the file from one computer to a specified location on another computer. You can
use FTP to transfer the files from your computer to a remote computer (such as a web
server), or to transfer from the remote computer to your local computer.
In ordered to add website to your favourite list, follow the steps given below:
Open webpage that you want to add to your favourite.
Click on favourite menu and then click on Add to
Favourites opton. Addfavourites dialog box appears.
You can also click Favourites button available in the toolbar. Favourites panel will open in the
left corner of the internet explorer window. Click add button, AddFavourites dialog box will
apppear.
In AddFavourites dialog box, the Name: text box will contains the name of the web
page that you want to add to favourites.
Click the Create in button, Favoutites folder will appear. Move to the folder where you
want to store the favourites by clicking on the folder name.
Now click OK button to save the favourites.
OPENING FAVOURITES
In order to open favourites, follow the steps given below:
In the Favourite Panel, take the mouse over the site that you want to open. Now click on the
address to open that site.
Favourite can also be opened from the Favourites menu by selecting the appropriate one.
ORGANIZING FAVOURITES
Favourites can be organized by categorizing web pages, creating folder for each category and
then storing web pages into them. In order to organize favourites, follow the steps given below:
Click Favourites menu > Organize Favourites. Organize favourites dialog box will
appears.
In order to organize the webpages, drag the individual webpage to the respective folder.
Similarly to delete a favourite, Click on deletebutton.