IWT Theory

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 29

UNIT-1

1) Evolution of Internet & WWW :--From


Forouzan
2) Review of TCP/IP:--Forouzan
3) Architecture:--Tannen baum
4) DNS:--tannen baum

5)How Internet Works(Working of Internet):--


Because the Internet is a global network of computers each computer
connected to the Internet must have a unique address. Internet addresses are
in the form nnn.nnn.nnn.nnn where nnn must be a number from 0 - 255.
This address is known as an IP address. (IP stands for Internet Protocol;
more on this later.)

The picture below illustrates two computers connected to the Internet; your
computer with IP address 1.2.3.4 and another computer with IP address
5.6.7.8. The Internet is represented as an abstract object in-between. (As this
paper progresses, the Internet portion of Diagram 1 will be explained and
redrawn several times as the details of the Internet are exposed.)

If you connect to the Internet through an Internet Service Provider (ISP),


you are usually assigned a temporary IP address for the duration of your
dial-in session. If you connect to the Internet from a local area network
(LAN) your computer might have a permanent IP address or it might
obtain a temporary one from a DHCP (Dynamic Host Configuration
Protocol) server. In any case, if you are connected to the Internet, your
computer has a unique IP address.
the message must be translated from alphabetic text into electronic
signals, transmitted over the Internet, then translated back into alphabetic
text. How is this accomplished? Through the use of a protocol stack.
Every computer needs one to communicate on the Internet and it is
usually built into the computer's operating system (i.e. Windows, Unix,
etc.). The protocol stack used on the Internet is referred to as the TCP/IP
protocol stack because of the two major communication protocols used.
The TCP/IP stack looks like this:

Protocol layers Comments


Application protocol layer Protocol specific 2 application
i.e.www,email,FTP etc
Transmission control protocol layer TCP directs 2 a specific on a
computer using a port no.
Internet protocol layer IP directs packets 2 a specific
computer using an IP address.
Hardware Layer Converts Binary packet data into a
n/w signals & back(i.e. Ethernet n/w
card,MODEM for phone lines)
1. The message would start at the top of the protocol stack on your
computer and work it's way downward.
2. If the message to be sent is long, each stack layer that the message
passes through may break the message up into smaller chunks of data.
This is because data sent over the Internet (and most computer
networks) are sent in manageable chunks. On the Internet, these
chunks of data are known as packets.
3. The packets would go through the Application Layer and continue to
the TCP layer. Each packet is assigned a port number. Ports will be
explained later, but suffice to say that many programs may be using
the TCP/IP stack and sending messages. We need to know which
program on the destination computer needs to receive the message
because it will be listening on a specific port.
4. After going through the TCP layer, the packets proceed to the IP
layer. This is where each packet receives it's destination address.

5. Now that our message packets have a port number and an IP address,
they are ready to be sent over the Internet. The hardware layer takes
care of turning our packets containing the alphabetic text of our
message into electronic signals and transmitting them over the phone
line.
6. On the other end of the phone line your ISP has a direct connection to
the Internet. The ISPs router examines the destination address in each
packet and determines where to send it. Often, the packet's next stop
is another router. More on routers and Internet infrastructure later.
7. Eventually, the packets reach computer, the packets start at the bottom
of the destination computer's TCP/IP stack and work upwards.
8. As the packets go upwards through the stack, all routing data that the
sending computer's stack added (such as IP address and port number)
is stripped from the packets.
9. When the data reaches the top of the stack, the packets have been re-
assembled into their original form.

7)Architecture of Internet:--
#Internet Backbone:--
The Internet backbone is made up of many large networks which
interconnect with each other. These large networks are known as Network
Service Providers or NSPs. Some of the large NSPs are UUNet, CerfNet,
IBM, BBN Planet, SprintNet, PSINet, as well as others. These networks
peer with each other to exchange packet traffic. Each NSP is required to
connect to three Network Access Points or NAPs. At the NAPs, packet
traffic may jump from one NSP's backbone to another NSP's backbone.
NSPs also interconnect at Metropolitan Area Exchanges or MAEs. MAEs
serve the same purpose as the NAPs but are privately owned. NAPs were the
original Internet interconnect points. Both NAPs and MAEs are referred to
as Internet Exchange Points or IXs. NSPs also sell bandwidth to smaller
networks, such as ISPs and smaller bandwidth providers. Below is a picture
showing this hierarchical infrastructure.

This is not a true representation of an actual piece of the Internet.


Diagram 4 is only meant to demonstrate how the NSPs could
interconnect with each other and smaller ISPs. None of the physical
network components are shown in Diagram 4 as they are in Diagram 3.
This is because a single NSP's backbone infrastructure is a complex
drawing by itself. Most NSPs publish maps of their network
infrastructure on their web sites and can be found easily. To draw an
actual map of the Internet would be nearly impossible due to it's size,
complexity, and ever changing structure.
Diagram 5
The Internet Routing Hierarchy
So how do packets find their way across the Internet? Does every computer
connected to the Internet know where the other computers are? Do packets
simply get 'broadcast' to every computer on the Internet? The answer to both
the preceding questions is 'no'. No computer knows where any of the other
computers are, and packets do not get sent to every computer. The
information used to get packets to their destinations are contained in routing
tables kept by each router connected to the Internet.

Routers are packet switches. A router is usually connected between


networks to route packets between them. Each router knows about it's sub-
networks and which IP addresses they use. The router usually doesn't know
what IP addresses are 'above' it. Examine Diagram 5 below. The black boxes
connecting the backbones are routers. The larger NSP backbones at the top
are connected at a NAP. Under them are several sub-networks, and under
them, more sub-networks. At the bottom are two local area networks with
computers attached.
When a packet arrives at a router, the router examines the IP address put
there by the IP protocol layer on the originating computer. The router
checks it's routing table. If the network containing the IP address is
found, the packet is sent to that network. If the network containing the IP
address is not found, then the router sends the packet on a default route,
usually up the backbone hierarchy to the next router. Hopefully the next
router will know where to send the packet. If it does not, again the packet
is routed upwards until it reaches a NSP backbone. The routers connected
to the NSP backbones hold the largest routing tables and here the packet
will be routed to the correct backbone, where it will begin its journey
'downward' through smaller and smaller networks until it finds it's
destination.

8)Basic hardware tools of Internet Access:--(Tannen baum)

S/W Tools for Internet Access:--

1)ISP:- An Internet service provider (ISP), also sometimes referred to as


an Internet access provider (IAP), is a company that offers its customers
access to the Internet. The ISP connects to its customers using a data
transmission technology appropriate for delivering Internet Protocol
Paradigm, such as dial-up, DSL, cable modem, wireless or dedicated
high-speed interconnects. ...

2)MODEM:- A modem (modulator-demodulator) is a device that


modulates an analog carrier signal to encode digital information, and also
demodulates such a carrier signal to decode the transmitted information.
The goal is to produce a signal that can be transmitted easily and decoded
to reproduce the original digital data. Modems can be used over any
means of transmitting analog signals, from driven diodes to radio.
For internet access it is used……..

1. Computer with Internet connection. PC or Macintosh is fine. You


can also browse the Net with a Pocket PC, a WebTV, or even a Citrix
or Sparc workstation, if it is setup correctly. As you might know,
there are coffee shop "Internet Cafes" that will rent usage of
connected computers to you.
2. Internet account with a connection provider. Often called "ISP"
(Internet Service Provider), these are usually phone or cable
companies that charge you $20 to $80 USD a month for internet
access. Note: if you browse the Net from work, your company eats
this cost as part of their operations. They also will have rules for you
to follow. If you browse from an Internet Cafe, you will need to pay
perhaps $6 USD per hour.
3. Internet browser software. The most popular is called Internet
Explorer version 7 or 8 ("IE"). The the second most common browser
is Mozilla Firefox. Other browser choices include: Chrome, AOL,
Opera, and Netscape.
4. Anti-virus software. Symantec/Norton or McAffee are two of the
the most common. Avira Antivirus is my personal favorite. These
will help defend you against nasty programs that will erase parts of
your hard drive.
5. Email software. You can choose from the very popular Outlook or
Outlook Express, less-common email softwares like Eudora or
Groupwise, or the free "web-mail" offered by Yahoo or Hotmail or
Gmail.com.
6. Plug-In software. This is a big topic in its own right, but here are
the most-common you will need: Java Virtual Machine, Macromedia
Flash Player, Windows Media Player, Real Audio music player,
Apple Quick Time.
7. Optional: stereo speakers, microphone, and webcam. These
hardware devices will allow you to hear game sounds, do Internet
telephoning, and send images to your friends and family.
8. Optional: Anti-Spam software.
9. Optional: Censorware, to help police what your kids can see.
10. Optional: graphic software, so you can edit pictures you like.
11. Optional: printer.
12. Optional: wheel mouse, to quickly scroll pages up and down.

9)ISP:--

Following graphic give a typical view of current major ISP architectures,


and depending on the number of physical boxes could be extended from few
thousand to few million users.
Definition: An ISP is a company that supplies Internet connectivity to home
and business customers. ISPs support one or more forms of Internet access,
ranging from traditional modem dial-up to DSL and cable modem
broadband service to dedicated T1/T3 lines.

More recently, wireless Internet service providers or WISPs have emerged


that offer Internet access through wireless LAN or wireless broadband
networks.

In addition to basic connectivity, many ISPs also offer related Internet


services like email, Web hosting and access to software tools.

There are various terms related to the Internet. For explaining how an ISP
works, certain terms need to be presented before starting with the actual
working.

Modem: Every computer that connects to the internet has to do so using a


modem. The full form of modem is 'modulator-demodulator'. The function
of the modem is synonymous to its name. It modulates the data and converts
it into digital form before passing on the information to the Internet service
provider. The data that it receives from the Internet service provider is also
in the form of digital signal, and so it demodulates the data.

IP Address: IP stands for Internet Protocol. Every computer that connects to


the internet is assigned an IP address by the ISP. When we type in the name
of a particular website in our web browser, we are actually typing in the
Internet Protocol address of the website. The IP address in this case is the
address of the server machine that holds the desired web pages. It is
generally of the form n.n.n.n, where n stands for a number.

DHCP: 'Dynamic Host Control Protocol' in its abbreviated form is known as


DHCP. A protocol is nothing but a set of rules that decides the process of
doing a work. The dynamic host control protocol is used by the ISP to assign
temporary addresses to any of its subscribers who intend to connect to the
Internet.

Backbone of ISP: This is the point that connects your ISP to the Internet.
The ISPs buy a particular range of bandwidth for the working of its
backbone. It is through this bandwidth that information is sent or received.

The ISP Facility


The Internet service provider carries out its entire functioning in a room
called the data center. The advanced data centers consists of various
equipments. However, for the ease of explaining how an ISP works, I will
introduce you to the basic equipments which carry out the Internet
connection procedure. A pool of modems inside the data center is used to
connect every subscriber to the Internet. Once a modem in the modem pool
receives the information, it connects the subscriber to the backbone. The
entire functioning of the modem pool is controlled by algorithms running in
a computer to which the modems are connected. This setup of modems is
generally referred to as the ISP port server.

How does an ISP Work?


Let's start with the procedure right from the local computer. Home
computers connect to the ISP using telephone cables or broadband Internet
connections. Large networks like that of educational institutes connect to the
ISP using a D1 line. The way of logging into the ISP is however same for
both. For connecting to the Internet, you will need a modem and an ISP
subscription. Let's try to understand the entire procedure in a step by step
process:

• The first step is to login into the ISP using the user information
provided to you by your ISP. Here, you enter the username, password
and telephone number of the ISP.
• Once the ISP receives your information in its modem pool, it verifies
if you are an authentic user or not.
• Once the user authentication process is done, the ISP provides you
with a dynamic IP address using the DHCP.
• If you have bought a static IP from your ISP, then this step is not
required. However, buying a static IP will cost you a lot.
• Now, you are allowed to browse any web page through your web
browser. When you type in the name of the URL on the address bar,
you are actually requesting for the IP address of the server machine,
that holds those web pages.
• The information is received at the modem pool. Once this information
is received, the ISP connects the subscriber to the modem pool.
• The requested server machine is reached through an array of dedicated
lines and routers.
• Once the ISP finds the required IP address, it transfers the requested
web pages to the source IP address.

Cooling devices and backup power supplies are among the other
components used by an ISP. These components are of utmost importance for
the effective functioning of the ISP.

10)Internet Services:--
1) Information:-

World Wide Web browser software, such as Microsoft's Internet Explorer,


Mozilla Firefox, Opera, Apple's Safari, and Google Chrome, let users
navigate from one web page to another via hyperlinks embedded in the
documents. These documents may also contain any combination of
computer data, including graphics, sounds, text, video, multimedia and
interactive content including games, office applications and scientific
demonstrations. Through keyword-driven Internet research using search
engines like Yahoo! and Google, users worldwide have easy, instant access
to a vast and diverse amount of online information. Compared to printed
encyclopedias and traditional libraries, the World Wide Web has enabled the
decentralization of information.

The Web has also enabled individuals and organizations to publish ideas and
information to a potentially large audience online at greatly reduced expense
and time delay.

Advertising on popular web pages can be lucrative, and e-commerce or the


sale of products and services directly via the Web continues to grow. In the
early days, web pages were usually created as sets of complete and isolated
HTML text files stored on a web server.

2) Communication:-
E-mail is an important communications service available on the Internet.
The concept of sending electronic text messages between parties in a way
analogous to mailing letters or memos predates the creation of the Internet.
Pictures, documents and other files can be sent as e-mail attachments. E-
mails can be cc-ed to multiple e-mail addresses.

3)Data transfer:-
File sharing is an example of transferring large amounts of data across the
Internet. A computer file can be e-mailed to customers, colleagues and
friends as an attachment. It can be uploaded to a website or FTP server for
easy download by others.
Streaming media refers to the act that many existing radio and television
broadcasters promote Internet "feeds" of their live audio and video streams
(for example, the BBC). They may also allow time-shift viewing or listening
such as Preview, Classic Clips and Listen Again features.

4)Access:-
The prevalent language for communication on the Internet is English. After
English (28% of Web visitors) the most requested languages on the World
Wide Web are Chinese (23%), Spanish (8%), Japanese (5%), Portuguese and
German (4% each), Arabic, French and Russian (3% each), and Korean
(2%).[16] By region, 42% of the world's Internet users are based in Asia, 24%
in Europe, 14% in North America, 10% in Latin America and the Caribbean
taken together, 5% in Africa, 3% in the Middle East and 1% in
Australia/Oceania. The Internet's technologies have developed enough in
recent years, especially in the use of Unicode, that good facilities are
available for development and communication in the world's widely used
languages.
ommon methods of Internet access in homes include dial-up, landline
broadband (over coaxial cable, fiber optic or copper wires), Wi-Fi, satellite
and 3G technology cell phones..

Social impact:-
The Internet has enabled entirely new forms of social interaction,
activities, and organizing, thanks to its basic features such as widespread
usability and access. Social networking websites such as Facebook,
Twitter and MySpace have created new ways to socialize and interact.
Users of these sites are able to add a wide variety of information to
pages, to pursue common interests, and to connect with others. YouTube
and Flickr specialize in users' videos and photographs.

6)WWW
7)News-groups/Entertainment etc..

11)Internet Account:--

To connect to the Internet, you can use one of several types of accounts:
Internet PPP accounts (using a dial-up, ISDN, or DSL line), cable Internet
accounts, or online services. You can also use an old-fashioned text-based
account ..

Internet (PPP) Accounts

A PPP (Point-to-Point Protocol) account is an Internet account that uses the


PPP communications protocol. PPP is the most popular type of Internet
account because the most popular software--Internet Explorer, Netscape
Navigator, Outlook Express, Eudora, and other programs--is designed to
work with PPP accounts. Occasionally, you may run into a SLIP (Serial Line
Internet Protocol) or CSLIP account (Compressed SLIP), which are old,
less-reliable protocols than PPP, but which work the same way. This book
refers to PPP, CSLIP, and SLIP accounts as dial-up Internet accounts.
An Internet service provider (ISP) is an organization that provides Internet
accounts, usually PPP accounts, but occasionally UNIX shell accounts. All
ISPs provide dial-in accounts using regular phone lines, and many also
provide ISDN and DSL connections.

Dial-Up Internet Accounts, Including ISDN

To connect to an Internet account over a dial-up phone line, you need a


PPP-, CSLIP-, or SLIP-compatible communications program, which is built
into Windows. Windows Network Connections can dial the phone by using
your modem, connect to your ISP, log into your account by using your user
name and password, and then establish a PPP, CSLIP, or SLIP connection,
so your computer is connected to the Internet. While connected, you can use
a variety of Winsock-compatible programs to read your e-mail, browse the
Web, and access other information from the Internet. When you are done,
you tell Windows to disconnect from your Internet account. You configure
your network connection by using the New Connection Wizard. You can
also create and edit network connections manually.

DSL Accounts

If you want to use a high-speed Internet account, check with local and
national ISPs to find out which ones offer DSL in your area. If your ISP
offers ISDN or DSL accounts, they can work with your telephone company
to get the high-speed phone line installed and tell you the type of ISDN or
DSL modem you need. See the section "Connecting to a DSL Line " in
Chapter 21 for how to configure Windows to work with a high-speed
account.

UNIX Shell Accounts and Bulletin Board Systems

Before the advent of PPP and SLIP accounts, most Internet accounts were
text-only UNIX shell accounts. You run a terminal-emulation program (a
program that allows your PC to pretend it's a computer terminal) on your PC
to connect to an Internet host computer. Most Internet hosts run UNIX, a
powerful but frequently confusing operating system, and you have to type
UNIX commands to use a UNIX shell account. To send and receive e-mail
or browse the Web, you run text-only programs, such as pine (the most
popular UNIX e-mail program) and Lynx (the most widely used UNIX Web
browser). UNIX shell accounts don't let you see graphics, use a mouse, or
easily store information on your own computer.

Cable Internet Accounts

With a cable Internet account, your cable television company is your ISP,
and you connect to the Internet over your cable. Contact your cable company
to find out whether it offers Internet accounts. If it does, sign up to open an
account. The monthly fee usually includes the rental of a cable modem. See
" Configuring Windows for a Cable Modem " in Chapter 21 for an
explanation of how to configure Windows to work with a cable Internet
account.

Online Services

An online service is a commercial service that enables you to connect and


access its proprietary information system. Most online services also provide
an Internet connection, e-mail, access to the Web, and sometimes other
Internet services. Online services usually require special programs to
connect to and use your account. Previous U.S. versions of Windows came
with signup programs for some online services.

The two most popular online services in the United States are America
Online (AOL) and CompuServe (CIS), which is owned by AOL. The
Microsoft Network (MSN) started out as an online service, but has been
relaunched as an ISP. AOL and CompuServe let you use some Winsock-
compatible programs while you are connected to the account. For example,
you can use the Internet Explorer or Netscape Navigator Web browsers with
any of these accounts. However, AOL doesn't support standard e-mail
programs--you have to use their software (or their Web site) to read your
mail.

AOL is available in the United States, Canada, and the U.K., with other
countries being added. The latest version of the America Online software (as
of 2001) is 6.0, but 7.0 is on the way. To sign up for an AOL account, install
and run the AOL software. Download the software from the AOL Web site,
if you haven't already received it on a CD-ROM bound into a magazine or in
a direct mail solicitation. Windows XP may come with the AOL software
pre-installed, especially if you buy a computer with Windows XP
preinstalled. The program steps you through connecting to AOL using an
existing account, or signing you up for a new one.

The Microsoft Network (MSN)

Microsoft Network (MSN) was Microsoft's entrant in the world of online


services in 1995. Although MSN has gained a lot of users because of the
easy-to-click icon on the Windows 95, 98, and Me desktops, it's never been
as highly rated as AOL or CompuServe. Microsoft has changed MSN from
an online service to a regular Internet service, so you now use network
connections to connect to MSN and Winsock programs to access its
services.

When you start Internet Explorer, you usually start at the MSN portal Web
site (http://www.msn.com, which is accessible no matter what kind of
Internet account you use.

12)Internet Connectivity:--

Internet connection types:


In order to connect to the internet, a worldwide community of
interconnected computers and information, you must pay a service provider
for a connection. This is much the same as paying the phone company for
connection to the worldwide phone grid. The difference is that the internet is
the same price whether you communicate with someone in Japan or your
next door neighbor.
There are four main types of internet connections common to the general
public:

1.)DSL (128Kbps to 8Mbps):-

DSL is also called an always on connection because it uses existing 2-


wire copper telephone line connected to the premise and will not tie
up your phone as a dial-up connection does. There is no need to
dial-in to your ISP as DSL is always on. The two main categories of
DSL for home subscribers are called ADSL and SDSL.

ADSL
ADSL is the most commonly deployed types of DSL in North America.
Short for asymmetric digital subscriber line ADSL supports data rates of
from 1.5 to 9 Mbps when receiving data (known as the downstream rate) and
from 16 to 640 Kbps when sending data (known as the upstream rate).
ADSL requires a special ADSL modem.

ADSL+2
ADSL+2A is an extension to ADSL broadband technology that provides
subscribers with significantly faster download speeds when compared to
traditional ADSL connections. ADSL+2 works in the same fashion as ADSL
a special filter is installed on a subscriber's telephone line to split existing
copper telephone lines (POTS) between regular telephone (voice) and
ADSL+2. ADSL2+ service is most commonly offered in highly-populated
metropolitan areas and subscribers must be in close geographical locations
to the provider's central office to receive ADSL2+ service.

SDSL
SDSL is still more common in Europe. Short for symmetric digital
subscriber line, a technology that allows more data to be sent over existing
copper telephone lines (POTS). SDSL supports data rates up to 3 Mbps.
SDSL works by sending digital pulses in the high-frequency area of
telephone wires and can not operate simultaneously with voice connections
over the same wires. SDSL requires a special SDSL modem. SDSL is called
symmetric because it supports the same data rates for upstream and
downstream traffic.

VDSL
Very High DSL (VDSL) is a DSL technology that offers fast data rates over
relatively short distances — the shorter the distance, the faster the
connection rate.

• All types of DSL technologies are collectively referred to as xDSL.


• xDSL connection speeds range from 128 Kbps to 8 Mbps.

2.) Dial-up:
This method of connecting to the internet is the oldest and slowest method.
It is also the most readily available in all places which also receive phone
service. Using this type of connection requires connecting a phone line into
your PC and using a modem to communicate through the phone line. While
in use by your computer, you may not use your phone line. Many people pay
for a second line dedicated directly to their dial-up connection much as
business might with fax lines.

3) Cable:
This method of connection is also many times faster than dial-up. In this
case, your PC is connected to a cable modem which is then connected
through your cable TV lines at your house. Since this wire is separate from
your phone line, you may watch tv, talk on the phone, and connect to the
internet all at the same time.

Cable speeds range from 512 Kbps to 20 Mbps.

4) FiOs (Fiber Optic):


This method of connection is the fastest available to most home users. Fiber
optic internet connections work in the same way as DSL or Cable
connections do, except that a fiber optic line is run from the telephone pole
directly to your location. As with other high speed lines, you may use the
phone, tv, and computer all at the same time. The advantage of fiber optics is
its speed advantage capabilities over DSL and cable.

Wireless Internet Connections:-

Wireless Internet, or wireless broadband is one of the newest Internet


connection types. Instead of using telephone or cable networks for your
Internet connection, you use radio frequency bands. Wireless Internet
provides an always-on connection which can be accessed from anywhere —
as long as you geographically within a network coverage area. Wireless
access is still considered to be relatively new, and it may be difficult to find
a wireless service provider in some areas. It is typically more expensive and
mainly available in metropolitan areas.

T-1 Lines(Radio link)


T-1 lines are a popular leased line option for businesses connecting to the
Internet and for Internet Service Providers (ISPs) connecting to the Internet
backbone. It is a dedicated phone connection supporting data rates of
1.544Mbps. A T-1 line actually consists of 24 individual channels, each of
which supports 64Kbits per second. Each 64Kbit/second channel can be
configured to carry voice or data traffic. Most telephone companies allow
you to buy just one or some of these individual channels. This is known as
as fractional T-1 access.

Bonded T-1
A bonded T-1 is two or more T-1 lines that have been joined (bonded)
together to increase bandwidth. Where a single T-1 provides approximately
1.5Mbps, two bonded T1s provide 3Mbps or 46 channels for voice or data.
Two bonded T-1s allow you to use the full bandwidth of 3Mbps where two
individual T-1s can still only use a maximum of 1.5Mbps at one time. To be
bonded the T-1 must run into the same router at the end, meaning they must
run to the same ISP.

• T-1 Lines support speeds of 1.544 Mbps


• Fractional T-1 speeds are 64 Kbps per channel (up to
1.544 Mbps), depending on number of leased channels.
• Typical Bonded T-1 (two bonded T-1 lines) speed is
around 3 Mbps.

T-3 Lines
T-3 lines are dedicated phone connections supporting data rates of about 43
to 45 Mbps. It too is a popular leased line option. A T-3 line actually
consists of 672 individual channels, each of which supports 64 Kbps. T-3
lines are used mainly by Internet Service Providers (ISPs) connecting to the
Internet backbone and for the backbone itself.

• Typical T-3 supports speeds ranging from 43 to 45 Mbps.

Satellite(VSAT)
Internet over Satellite (IoS) allows a user to access the Internet via a satellite
that orbits the earth. A satellite is placed at a static point above the earth's
surface, in a fixed position. Because of the enormous distances signals must
travel from the earth up to the satellite and back again, IoS is slightly slower
than high-speed terrestrial connections over copper or fiber optic cables.

• Typical Internet over Satellite connection speeds (standard IP


services) average around 492 up to 512 Kbps.
UNIT-3

1)Web Hosting services:--By sir’s Notes


2)WWW/Web Server:-- By sir’s Notes
3)HTTP:-- Forouzan
4)URL:-- Forouzan
5)Web Searching:--Principle,Types,examples—By sir’s Notes
6)Web browser:-- By sir’s Notes and tannenbaum

7)Multiple sites on a single server:-- IIS supports multiple Web sites


on a single server. For example, rather than using three different servers to
host three different Web sites, you can install all three Web sites on the same
server. Consolidating Web sites saves hardware resources, conserves space,
and reduces energy costs.

To ensure that user requests reach the correct Web site, you must configure a
unique identity for each site on the server. To do so, you must distinguish
each Web site with at least one of three unique identifiers: a host header
name, an IP address, or a unique TCP port number.

Web sites hosted on the same server can be distinguished using the
following unique identifiers.

•Host header name


•IP address
•TCP port number

IIS Manager (IIS 6.0)


IIS Manager is a graphical interface for configuring your application pools
or your Web, FTP, SMTP, or NNTP sites. With IIS Manager, you can
configure IIS security, performance, and reliability features. You can add or
delete sites; start, stop, and pause sites; back up and restore server
configurations; and create virtual directories for better content management,
to name only a few of the administrative capabilities. In previous releases of
IIS, this tool was called the In
1) Creating Multiple Sites Using IP address(IIS 6.0)
Some server configurations require the use of unique IP addresses to
distinguish multiple Web sites on the same server.

IIS enables you to configure Web sites to listen on all available IP addresses,
or on an individual IP address. If you use multiple IP addresses to
distinguish between different sites on the same server, you must configure
IIS to assign each site a unique IP address.

Procedures:-
1.In IIS Manager, expand the local computer, right-click the Web Sites
directory, point to New, and then click Web Site.

2.Click Next.

3.In the Description box, type the name you have selected for the Web site,
and click Next.

4.In the Enter the IP address to use for this Web site box, click the unique
IP address reserved for this site.

5.In the TCP port this Web site should use box, type the port number used
by all sites on the server. This should typically be left at the default of 80.

6.If SSL encryption is enabled on the server, type the SSL port number, and
then click Next. If SSL encryption is not enabled on the server, the SSL
port box does not appear.

7.In the Path box, type or browse to the path of your Web site home
directory.

8.To create a secured or private Web site, clear the Allow anonymous
access to this Web site check box, and then click Next. (Web sites are
configured for anonymous access by default.)

9.In the Web Site Access Permissions box, set the permissions for the home
directory.
10.Click Next, and then click Finish.

2) Creating Multiple Sites Using Host Header Names (IIS 6.0)


Every Web site has a descriptive name, and can support one or more host
header names. Organizations that host multiple Web sites on a single server
often use host headers because this method enables them to create multiple
Web site identities without using a unique IP address for each site.

Procedures:-
1.In IIS Manager, expand the local computer, right-click the Web Sites
directory, point to New, and then click Web Site.

2.Click Next.

3.In the Description box, type the name you have selected for the Web site,
and then click Next.

4.In the Enter the IP address to use for this Web site box, click the IP
address used by all sites on the server.

5.In the TCP port this Web site should use box, type the port number used
by all sites on the server.

6.In the Host Header for this Web site (Default:None) box, type the host
header name to identify the Web site. The host header name must contain
the full name of the site, for example, www.microsoft.com.

7.If SSL encryption is not enabled on the server, the SSL port box does not
appear. If SSL encryption is enabled on the server, type the SSL port
number, and then click Next. Note that you cannot use host headers with
SSL encryption.

8.In the Path box, type or browse to the path of your Web site home
directory.
9.To create a secured or private Web site, clear the Allow anonymous
access to this Web site check box, and click Next. (Web sites are
configured for anonymous access by default.)

10.In the Web Site Access Permissions box, set the permissions for the
home directory.

11.Click Next, and then click Finish.

3) Creating Multiple Sites Using Ports (IIS 6.0):-


you can use nonstandard TCP port numbers to create unique Web site
identifiers for site development and testing purposes. You can do this
by creating a Web site identity that consists of a TCP/IP address or host
header name, appended with a nonstandard TCP port number. Because
TCP/IP endpoints are defined by a combination of IP address (or the
corresponding name) and port number, configuring a Web site with a
nonstandard port number creates a unique endpoint, or identity, for the
site.

Procedures:-
1.In IIS Manager, expand the local computer, right-click the Web Sites
directory, point to New, and then click Web Site.

2.In the Web Site Creation Wizard, click Next.

3.In the Description box, type the name that you have selected for the Web
site, and then click Next.

4.In the Enter the IP address to use for this Web site box, click the IP
address used for all sites on this server.

5.In the TCP port this Web site should use box, type the unique port
number reserved for this site.

6.Optional: In the Host Header for this Web site (Default:None) box, type
the host header name to identify the Web site. The host header name must
containing the full name of the site, for example, www.microsoft.com.
7.If SSL encryption is enabled on the server, type the SSL port number, and
then click Next. If SSL encryption is not enabled on the server, the SSL
port box does not appear.

8.In the Path box, type or browse to the path of your Web site home
directory.

9.To create a secured or private Web site, clear the Allow anonymous
access to this Web site check box, and click Next. (Web sites are
configured for anonymous access by default.)

10.In the Web Site Access Permissions box, set the permissions for the
home directory.

11.Click Next, and then click Finish.

8)How 2 register a website on search engine:-


Step 1) Registering a domain name:

The first step to setting up any website is to figure out what you would like
to call it. When naming a website a tip that can help you get your website
ranked highly in the search engines is to try to include targeted keywords in
your domain name. If you are setting up a website to sell furniture try to
register a domain name that includes the keyword "furniture". Search
engines tend to give greater importance to domains that contain a searchers
keywords. It doesn't mean that you won't be able to get a non keyworded
domain ranked well in the search engines but a keyworded domain will be
easier to get ranked in the search engines then a domain that doesn't contain
any keywords. If your website isn't going to rely on search engine rankings
or is in a non competitive niche then getting a keyworded domain is not an
issue.

There are lots of domain registrars available for use on the Internet and you
will have to do a search to find one that looks reputable and is well
established.
If you would like to setup a personal site then free web hosting sites like
Blogger.com and WordPress.org can be a good option as they will let you
register a free domain name when you create an account with them.

Step 2) Find a place to host your website:

After you have decided on your domain name and registered it you will need
a web server to host your website on. There are again lots of companies that
will host your website for you for a small monthly fee. This particular site is
hosted using services from HostGator and has found them quite good.

You can also setup your own web server if you have the technical know how
but these days being as there are a lot of companies offering inexpensive
hosting options and the overhead that goes into running your web server
there isn't much reason not to farm out the hosting work to a company that
specializes in web hosting.

Step 3) Designing your website:

There are many different options when it comes to website design. If you
have the technical know how you can do it yourself but if you require help
you can acquire the services of a professional website design company that
will create a website for you for a fee.

Once your website has been designed you just need to upload the files to
your web server to make it available for the world to view.

Step 4) Marketing your website on the Internet:

After you have designed and uploaded your website to your web server
space the next step is to start getting the word out about your website. If you
want to get your website ranked well in the search engines you will need to
engage in a process called Search Engine Optimisation which is the process
of choosing the keywords you would like to rank on and then implementing
those keywords into your websites text in a meaningful for the search
engines to discover. If you know what you are doing you an embark on this
process yourself or there are companies that are skilled in Search Engine
Marketing and can help you get your website ranked highly in the search
engines.
9)Email hosting services:--
An e-mail hosting service is an Internet hosting service that runs e-mail
servers.

Email hosting is a very valuable resource these days, with the explosion in
demand for email services and the huge number of people who send and
receive email messages every day. Email hosting can be a very attractive
option for companies, especially as a means of gaining new customers.

Companies that offer email hosting necessarily have large server resources.
Here’s why: Email hosting is potentially a very large enterprise, depending
on how many bells and whistles are offered. Email hosting means that a
company offers to perform email functions for customers. These functions
can be as basic as send and receive and as complicated as database
processing and global searching.

E-mail hosting services usually offer premium e-mail at a cost as opposed to


advertising supported free e-mail or free webmail. E-mail hosting services
thus differ from typical end-user e-mail providers such as webmail sites.
They cater mostly to demanding e-mail users and Small and Mid Size
(SME) businesses, while larger enterprises usually run their own e-mail
hosting service. E-mail hosting providers allow for premium e-mail services
along with custom configurations and large number of accounts. In addition,
hosting providers manage user's own domain name, including any e-mail
authentication scheme that the domain owner wishes to enforce in order to
convey the meaning that using a specific domain name identifies and
qualifies e-mail senders.

Most e-mail hosting providers offer advanced premium e-mail solutions


hosted on dedicated custom e-mail platforms. The technology and offerings
of different e-mail hosting providers can therefore vary with different needs.
E-mail offered by most webhosting companies is usually more basic
standardized POP3 based e-mail and webmail based on open source
webmail applications like Horde or SquirrelMail. Almost all webhosting
providers offer standard.

Major functions are:-

i)Global searching
ii)Chatting

iii)send and receive

iv)Database processing

v)reliability

vi)security

10)Types of search engines:--


i)Spider based:-

A Web crawler is a computer program that browses the World Wide Web
in a methodical, automated manner or in an orderly fashion. Other terms for
Web crawlers are ants, automatic indexers, bots, [1] or Web spiders, Web
robots, or—especially in the FOAF community—Web scutters[2].

This process is called Web crawling or spidering. Many sites, in particular


search engines, use spidering as a means of providing up-to-date data. Web
crawlers are mainly used to create a copy of all the visited pages for later
processing by a search engine that will index the downloaded pages to
provide fast searches. Crawlers can also be used for automating maintenance
tasks on a Web site, such as checking links or validating HTML code. Also,
crawlers can be used to gather specific types of information from Web
pages, such as harvesting e-mail addresses (usually for spam).

A Web crawler is one type of bot, or software agent. In general, it starts with
a list of URLs to visit, called the seeds. As the crawler visits these URLs, it
identifies all the hyperlinks in the page and adds them to the list of URLs to
visit, called the crawl frontier. URLs from the frontier are recursively visited
according to a set of policies.

WEB CROWLER ARCHITECTURE:-

A crawler must not only have a good crawling strategy, as noted in the
previous sections, but it should also have a highly optimized architecture.
Shkapenyuk and Suel [34] noted that: "While it is fairly easy to build a slow
crawler that downloads a few pages per second for a short period of time,
building a high-performance system that can download hundreds of millions
of pages over several weeks presents a number of challenges in system
design, I/O and network efficiency, and robustness and manageability."

Web crawlers are a central part of search engines, and details on their
algorithms and architecture are kept as business secrets. When crawler
designs are published, there is often an important lack of detail that prevents
others from reproducing the work. There are also emerging concerns about
"search engine spamming", which prevent major search engines from
publishing their ranking algorithms.

Examples of Web crawlers:-

Yahoo! Slurp is the name of the Yahoo Search crawler.


 Msnbot is the name of Microsoft's Bing webcrawler.
 FAST Crawler[35] is a distributed crawler, used by Fast Search &
Transfer, and a general description of its architecture is available.[citation needed]
 Googlebot[33] is described in some detail, but the reference is only about
an early version of its architecture, which was based in C++ and Python. The
crawler was integrated with the indexing process, because text parsing was
done for full-text indexing and also for URL extraction. There is a URL
server that sends lists of URLs to be fetched by several crawling processes.
During parsing, the URLs found were passed to a URL server that checked
if the URL have been previously seen. If not, the URL was added to the
queue of the URL server.
 Methabot is a scriptable web crawler written in C, released under the
ISC license.

 80legs is a commercial web crawler that is offered through a


software as a service model.

ii)Directory based/Human based:-

A human search engine is a search engine that uses human participation to


filter the search results and assist users in clarifying their search request. The
goal is to provide users with a limited number of relevant results, as opposed
to traditional search engines that often return a large number of results that
may or may not be relevant.

Examples of human search engines include Jumper 2.0, Sproose, NiteCo[1],


ChaCha Search, Mahalo.com, Isawiki and the now defunct NowNow from
Amazon.com.

iii)Hybrid search engine:-

A hybrid search engine (HSE) is a type of computer search engine that


uses different types of data with or without ontologies to produce the
algorithmically generated results based on web crawling. Previous types of
search engines only use text to generate their results.

You might also like