The first part of the URL berfore the colon specifies the access
meethod. On the Web this is usually http (for Hypertext Transfer
Protocol).
The second part of the URL after the colon, specifies the resource.
The text after the two slashes (//) indicates a server name, and the
text after the single slash defines the directory or individual file you
will be connected to. If you are linking to a document, it will usually
have the file name extension .html, the abbreviation for Hypertext
Markup Language.
What is Internet ?
Internet is a network of network connecting people world wide.
Modem : It is a device used for modulation and demodulation of signals to be
transmitted. Converts Anolog Signals to Digital and vice – versa.
Browser : It should be according to the operating system if Operating System is
win 95 or NT. Browser is Internet Explorer but if Operating System is Novell
Netware Browser should be Netscape navigator. Browser is generally use to
search information on Internet. It helps in opening the website requested.
Encryption :
The process of rendering a message ( or data) unusable to all but the intended
recipients, who have the ability to decrypt it.
Cryptography is the science of creating workable procedures for encrypting and
decrypting messages.
The goal is to ensure that a message intercepted by a distrusted user cannot be
decrypted in a feasible amount of time. Although there are many different approaches
to encryption, the two most common are :
1. Symmetric / Private Key Encryption. This method uses a secret key known only to
the sender and recipient of a message. The secret key is used both to encrypt the
message when it is sent and to decrypt it when it is received. Symmetric key
encryption is very secure, but suffers from one problem if we want to send a message
to someone who does not have our key, we must also fine a way to securely give
them a copy of the key.
2. Public Key Encryption : This method is now commonly used in many computer
networking and telecommunication using the Secure Sockets Layer (SSL) protocol for
example, sending credit card numbers over the Internet. SSL establishes a secure
communications session over the Internet by using public key encryption, which
provides every participating user with a public key and a private key. Users are the
only ones aware of their private keys, while their public keys are generally available to
anyone who wants them. Remember that if a message is encrypted with a user’s
public key, it can be decrypted only with the same user’s private key and vice versa.
WEB SERVER
A Web server is the program that runs on a Web site and is
responsible for replying to Web browser requests for files. You
need a Web server to publish documents on the web.
NNTP shares characteristics with both Simple Mail Transfer Protocol and TCP.
Internet :
Hardware Requirement :
1. PC 2. Modem 3. Phone Line Connection.
Software Requirement :
1. Operating System (win 95) or Win 98
2. Browser (Internet Explorer, Netscape Navigator)
3. E-mail Software
4. Internet A/c and connection.
What is Internet ?
Internet is a network of network connecting people world wide.
Modem : It is a device used for modulation and demodulation of signals to be
transmitted. Converts Anolog Signals to Digital and vice – versa.
Browser : It should be according to the operating system if Operating System is
win 95 or NT. Browser is Internet Explorer but if Operating System is Novell
Netware Browser should be Netscape navigator. Browser is generally use to
search information on Internet. It helps in opening the website requested.
Internet Security
• Internet is not a secure place for the same you have to protect your
password. These should be main security against people who want
to break your account. The people called hackers or crackers.
• User Accounts : The very first level of network security is the use
of user accounts to allow only authorized users access to the
network. Without an account, a computer user can not log in and
therefore can not use the network.
AltaVista : This has been created by the research facility Digital Electronic
Corporation (DEC) of USA. This search engine has a spider called
AltaVista : This has been created by the research facility Digital Electronic
Corporation (DEC) of USA. This search engine has a spider called
scooter that traverses the Web and Usenet newsgroups. The engine
has two modes of search types namely, simple and advanced search.
In simple search, AltaVista will attempt to find pages that include as many
of your search words as possible, and rank those pages highest to
lowest in the result.
In advanced search , the page uses the same syntax rules as the basic
search, but it adds Boolean Operators to make searches much more
flexible. The operators include &(AND), | (OR), and !(NOT).
Spiders : The software that scans document on the Internet and adds this to the
search engine in database. Spiders is the process of scanning web sites to add
new pages and to update existing one.
A web spiders is an automated search engine. When someone submits a source
(website) to the search engine, it sends a small, but powerful program back to the
site of the submission, which scans the site for more resources. It finds additional
resources, it catalogs them as well as original resource. The advantage of this is
that, you can find information in a site, even if the site is not dedicated to that
specific type of information.
Bots : A bot is a software tool for digging through data. You give a bot directions
and it bring back answer.
It is a type of automated software. The term bot has become interchangeable with
agent, to indicate that the software can be sent out on a mission, usually to find
information and report back. Strictly speaking, an agent is a bot that goes out on a
mission. Some bots operate in place : for example, a bot in Microsoft Front Page
automates work on a Web page. Bots have great potential in data mining, the
process of finding in enormous amounts of data. Data mining often requires a series
of searches, bots can save labor as they persist in a search, refining it as they go
along. Intelligent bots can make decisions based on past experiences, which will
become an important tool for data miners trying to perfect complex searches that
delve into billions of data points.
Agent : Problem can be identified and resolved locally by agents rather than by
harried operators at a central management console or by sending technicians to
remote locations, which is expensive and time – consuming.
Internet Agent : Internet Agents are special programs that accomplish specified
tasks while the user is busy doing something else Perhaps the most common type
of agent on the Internet is the search engine.
The “agent” concept originated as a method of improving the efficiency of network
management. The manager – agent relationship is intrinsic to most standard
network management protocols, including the Simple Network Management
Protocol (SNMP) used to manage Transmission Control Protocol / Internet Protocol
(TCP / IP) networks. SNMP agents are widely available for all kinds of network
devices, including bridges, routers, hubs, multiplexers and switches.
Mobile Agent : Internet Agents are especial useful for mobile computer users for
a variety of information retrieval needs. Generally, wireless network are not very
fast. In addition, ……………….
Agents can be written in – house or purchased from venders such as IBM and
Oracle.