IWT Theory
IWT Theory
IWT Theory
The picture below illustrates two computers connected to the Internet; your
computer with IP address 1.2.3.4 and another computer with IP address
5.6.7.8. The Internet is represented as an abstract object in-between. (As this
paper progresses, the Internet portion of Diagram 1 will be explained and
redrawn several times as the details of the Internet are exposed.)
5. Now that our message packets have a port number and an IP address,
they are ready to be sent over the Internet. The hardware layer takes
care of turning our packets containing the alphabetic text of our
message into electronic signals and transmitting them over the phone
line.
6. On the other end of the phone line your ISP has a direct connection to
the Internet. The ISPs router examines the destination address in each
packet and determines where to send it. Often, the packet's next stop
is another router. More on routers and Internet infrastructure later.
7. Eventually, the packets reach computer, the packets start at the bottom
of the destination computer's TCP/IP stack and work upwards.
8. As the packets go upwards through the stack, all routing data that the
sending computer's stack added (such as IP address and port number)
is stripped from the packets.
9. When the data reaches the top of the stack, the packets have been re-
assembled into their original form.
7)Architecture of Internet:--
#Internet Backbone:--
The Internet backbone is made up of many large networks which
interconnect with each other. These large networks are known as Network
Service Providers or NSPs. Some of the large NSPs are UUNet, CerfNet,
IBM, BBN Planet, SprintNet, PSINet, as well as others. These networks
peer with each other to exchange packet traffic. Each NSP is required to
connect to three Network Access Points or NAPs. At the NAPs, packet
traffic may jump from one NSP's backbone to another NSP's backbone.
NSPs also interconnect at Metropolitan Area Exchanges or MAEs. MAEs
serve the same purpose as the NAPs but are privately owned. NAPs were the
original Internet interconnect points. Both NAPs and MAEs are referred to
as Internet Exchange Points or IXs. NSPs also sell bandwidth to smaller
networks, such as ISPs and smaller bandwidth providers. Below is a picture
showing this hierarchical infrastructure.
9)ISP:--
There are various terms related to the Internet. For explaining how an ISP
works, certain terms need to be presented before starting with the actual
working.
Backbone of ISP: This is the point that connects your ISP to the Internet.
The ISPs buy a particular range of bandwidth for the working of its
backbone. It is through this bandwidth that information is sent or received.
• The first step is to login into the ISP using the user information
provided to you by your ISP. Here, you enter the username, password
and telephone number of the ISP.
• Once the ISP receives your information in its modem pool, it verifies
if you are an authentic user or not.
• Once the user authentication process is done, the ISP provides you
with a dynamic IP address using the DHCP.
• If you have bought a static IP from your ISP, then this step is not
required. However, buying a static IP will cost you a lot.
• Now, you are allowed to browse any web page through your web
browser. When you type in the name of the URL on the address bar,
you are actually requesting for the IP address of the server machine,
that holds those web pages.
• The information is received at the modem pool. Once this information
is received, the ISP connects the subscriber to the modem pool.
• The requested server machine is reached through an array of dedicated
lines and routers.
• Once the ISP finds the required IP address, it transfers the requested
web pages to the source IP address.
Cooling devices and backup power supplies are among the other
components used by an ISP. These components are of utmost importance for
the effective functioning of the ISP.
10)Internet Services:--
1) Information:-
The Web has also enabled individuals and organizations to publish ideas and
information to a potentially large audience online at greatly reduced expense
and time delay.
2) Communication:-
E-mail is an important communications service available on the Internet.
The concept of sending electronic text messages between parties in a way
analogous to mailing letters or memos predates the creation of the Internet.
Pictures, documents and other files can be sent as e-mail attachments. E-
mails can be cc-ed to multiple e-mail addresses.
3)Data transfer:-
File sharing is an example of transferring large amounts of data across the
Internet. A computer file can be e-mailed to customers, colleagues and
friends as an attachment. It can be uploaded to a website or FTP server for
easy download by others.
Streaming media refers to the act that many existing radio and television
broadcasters promote Internet "feeds" of their live audio and video streams
(for example, the BBC). They may also allow time-shift viewing or listening
such as Preview, Classic Clips and Listen Again features.
4)Access:-
The prevalent language for communication on the Internet is English. After
English (28% of Web visitors) the most requested languages on the World
Wide Web are Chinese (23%), Spanish (8%), Japanese (5%), Portuguese and
German (4% each), Arabic, French and Russian (3% each), and Korean
(2%).[16] By region, 42% of the world's Internet users are based in Asia, 24%
in Europe, 14% in North America, 10% in Latin America and the Caribbean
taken together, 5% in Africa, 3% in the Middle East and 1% in
Australia/Oceania. The Internet's technologies have developed enough in
recent years, especially in the use of Unicode, that good facilities are
available for development and communication in the world's widely used
languages.
ommon methods of Internet access in homes include dial-up, landline
broadband (over coaxial cable, fiber optic or copper wires), Wi-Fi, satellite
and 3G technology cell phones..
Social impact:-
The Internet has enabled entirely new forms of social interaction,
activities, and organizing, thanks to its basic features such as widespread
usability and access. Social networking websites such as Facebook,
Twitter and MySpace have created new ways to socialize and interact.
Users of these sites are able to add a wide variety of information to
pages, to pursue common interests, and to connect with others. YouTube
and Flickr specialize in users' videos and photographs.
6)WWW
7)News-groups/Entertainment etc..
11)Internet Account:--
To connect to the Internet, you can use one of several types of accounts:
Internet PPP accounts (using a dial-up, ISDN, or DSL line), cable Internet
accounts, or online services. You can also use an old-fashioned text-based
account ..
DSL Accounts
If you want to use a high-speed Internet account, check with local and
national ISPs to find out which ones offer DSL in your area. If your ISP
offers ISDN or DSL accounts, they can work with your telephone company
to get the high-speed phone line installed and tell you the type of ISDN or
DSL modem you need. See the section "Connecting to a DSL Line " in
Chapter 21 for how to configure Windows to work with a high-speed
account.
Before the advent of PPP and SLIP accounts, most Internet accounts were
text-only UNIX shell accounts. You run a terminal-emulation program (a
program that allows your PC to pretend it's a computer terminal) on your PC
to connect to an Internet host computer. Most Internet hosts run UNIX, a
powerful but frequently confusing operating system, and you have to type
UNIX commands to use a UNIX shell account. To send and receive e-mail
or browse the Web, you run text-only programs, such as pine (the most
popular UNIX e-mail program) and Lynx (the most widely used UNIX Web
browser). UNIX shell accounts don't let you see graphics, use a mouse, or
easily store information on your own computer.
With a cable Internet account, your cable television company is your ISP,
and you connect to the Internet over your cable. Contact your cable company
to find out whether it offers Internet accounts. If it does, sign up to open an
account. The monthly fee usually includes the rental of a cable modem. See
" Configuring Windows for a Cable Modem " in Chapter 21 for an
explanation of how to configure Windows to work with a cable Internet
account.
Online Services
The two most popular online services in the United States are America
Online (AOL) and CompuServe (CIS), which is owned by AOL. The
Microsoft Network (MSN) started out as an online service, but has been
relaunched as an ISP. AOL and CompuServe let you use some Winsock-
compatible programs while you are connected to the account. For example,
you can use the Internet Explorer or Netscape Navigator Web browsers with
any of these accounts. However, AOL doesn't support standard e-mail
programs--you have to use their software (or their Web site) to read your
mail.
AOL is available in the United States, Canada, and the U.K., with other
countries being added. The latest version of the America Online software (as
of 2001) is 6.0, but 7.0 is on the way. To sign up for an AOL account, install
and run the AOL software. Download the software from the AOL Web site,
if you haven't already received it on a CD-ROM bound into a magazine or in
a direct mail solicitation. Windows XP may come with the AOL software
pre-installed, especially if you buy a computer with Windows XP
preinstalled. The program steps you through connecting to AOL using an
existing account, or signing you up for a new one.
When you start Internet Explorer, you usually start at the MSN portal Web
site (http://www.msn.com, which is accessible no matter what kind of
Internet account you use.
12)Internet Connectivity:--
ADSL
ADSL is the most commonly deployed types of DSL in North America.
Short for asymmetric digital subscriber line ADSL supports data rates of
from 1.5 to 9 Mbps when receiving data (known as the downstream rate) and
from 16 to 640 Kbps when sending data (known as the upstream rate).
ADSL requires a special ADSL modem.
ADSL+2
ADSL+2A is an extension to ADSL broadband technology that provides
subscribers with significantly faster download speeds when compared to
traditional ADSL connections. ADSL+2 works in the same fashion as ADSL
a special filter is installed on a subscriber's telephone line to split existing
copper telephone lines (POTS) between regular telephone (voice) and
ADSL+2. ADSL2+ service is most commonly offered in highly-populated
metropolitan areas and subscribers must be in close geographical locations
to the provider's central office to receive ADSL2+ service.
SDSL
SDSL is still more common in Europe. Short for symmetric digital
subscriber line, a technology that allows more data to be sent over existing
copper telephone lines (POTS). SDSL supports data rates up to 3 Mbps.
SDSL works by sending digital pulses in the high-frequency area of
telephone wires and can not operate simultaneously with voice connections
over the same wires. SDSL requires a special SDSL modem. SDSL is called
symmetric because it supports the same data rates for upstream and
downstream traffic.
VDSL
Very High DSL (VDSL) is a DSL technology that offers fast data rates over
relatively short distances — the shorter the distance, the faster the
connection rate.
2.) Dial-up:
This method of connecting to the internet is the oldest and slowest method.
It is also the most readily available in all places which also receive phone
service. Using this type of connection requires connecting a phone line into
your PC and using a modem to communicate through the phone line. While
in use by your computer, you may not use your phone line. Many people pay
for a second line dedicated directly to their dial-up connection much as
business might with fax lines.
3) Cable:
This method of connection is also many times faster than dial-up. In this
case, your PC is connected to a cable modem which is then connected
through your cable TV lines at your house. Since this wire is separate from
your phone line, you may watch tv, talk on the phone, and connect to the
internet all at the same time.
Bonded T-1
A bonded T-1 is two or more T-1 lines that have been joined (bonded)
together to increase bandwidth. Where a single T-1 provides approximately
1.5Mbps, two bonded T1s provide 3Mbps or 46 channels for voice or data.
Two bonded T-1s allow you to use the full bandwidth of 3Mbps where two
individual T-1s can still only use a maximum of 1.5Mbps at one time. To be
bonded the T-1 must run into the same router at the end, meaning they must
run to the same ISP.
T-3 Lines
T-3 lines are dedicated phone connections supporting data rates of about 43
to 45 Mbps. It too is a popular leased line option. A T-3 line actually
consists of 672 individual channels, each of which supports 64 Kbps. T-3
lines are used mainly by Internet Service Providers (ISPs) connecting to the
Internet backbone and for the backbone itself.
Satellite(VSAT)
Internet over Satellite (IoS) allows a user to access the Internet via a satellite
that orbits the earth. A satellite is placed at a static point above the earth's
surface, in a fixed position. Because of the enormous distances signals must
travel from the earth up to the satellite and back again, IoS is slightly slower
than high-speed terrestrial connections over copper or fiber optic cables.
To ensure that user requests reach the correct Web site, you must configure a
unique identity for each site on the server. To do so, you must distinguish
each Web site with at least one of three unique identifiers: a host header
name, an IP address, or a unique TCP port number.
Web sites hosted on the same server can be distinguished using the
following unique identifiers.
IIS enables you to configure Web sites to listen on all available IP addresses,
or on an individual IP address. If you use multiple IP addresses to
distinguish between different sites on the same server, you must configure
IIS to assign each site a unique IP address.
Procedures:-
1.In IIS Manager, expand the local computer, right-click the Web Sites
directory, point to New, and then click Web Site.
2.Click Next.
3.In the Description box, type the name you have selected for the Web site,
and click Next.
4.In the Enter the IP address to use for this Web site box, click the unique
IP address reserved for this site.
5.In the TCP port this Web site should use box, type the port number used
by all sites on the server. This should typically be left at the default of 80.
6.If SSL encryption is enabled on the server, type the SSL port number, and
then click Next. If SSL encryption is not enabled on the server, the SSL
port box does not appear.
7.In the Path box, type or browse to the path of your Web site home
directory.
8.To create a secured or private Web site, clear the Allow anonymous
access to this Web site check box, and then click Next. (Web sites are
configured for anonymous access by default.)
9.In the Web Site Access Permissions box, set the permissions for the home
directory.
10.Click Next, and then click Finish.
Procedures:-
1.In IIS Manager, expand the local computer, right-click the Web Sites
directory, point to New, and then click Web Site.
2.Click Next.
3.In the Description box, type the name you have selected for the Web site,
and then click Next.
4.In the Enter the IP address to use for this Web site box, click the IP
address used by all sites on the server.
5.In the TCP port this Web site should use box, type the port number used
by all sites on the server.
6.In the Host Header for this Web site (Default:None) box, type the host
header name to identify the Web site. The host header name must contain
the full name of the site, for example, www.microsoft.com.
7.If SSL encryption is not enabled on the server, the SSL port box does not
appear. If SSL encryption is enabled on the server, type the SSL port
number, and then click Next. Note that you cannot use host headers with
SSL encryption.
8.In the Path box, type or browse to the path of your Web site home
directory.
9.To create a secured or private Web site, clear the Allow anonymous
access to this Web site check box, and click Next. (Web sites are
configured for anonymous access by default.)
10.In the Web Site Access Permissions box, set the permissions for the
home directory.
Procedures:-
1.In IIS Manager, expand the local computer, right-click the Web Sites
directory, point to New, and then click Web Site.
3.In the Description box, type the name that you have selected for the Web
site, and then click Next.
4.In the Enter the IP address to use for this Web site box, click the IP
address used for all sites on this server.
5.In the TCP port this Web site should use box, type the unique port
number reserved for this site.
6.Optional: In the Host Header for this Web site (Default:None) box, type
the host header name to identify the Web site. The host header name must
containing the full name of the site, for example, www.microsoft.com.
7.If SSL encryption is enabled on the server, type the SSL port number, and
then click Next. If SSL encryption is not enabled on the server, the SSL
port box does not appear.
8.In the Path box, type or browse to the path of your Web site home
directory.
9.To create a secured or private Web site, clear the Allow anonymous
access to this Web site check box, and click Next. (Web sites are
configured for anonymous access by default.)
10.In the Web Site Access Permissions box, set the permissions for the
home directory.
The first step to setting up any website is to figure out what you would like
to call it. When naming a website a tip that can help you get your website
ranked highly in the search engines is to try to include targeted keywords in
your domain name. If you are setting up a website to sell furniture try to
register a domain name that includes the keyword "furniture". Search
engines tend to give greater importance to domains that contain a searchers
keywords. It doesn't mean that you won't be able to get a non keyworded
domain ranked well in the search engines but a keyworded domain will be
easier to get ranked in the search engines then a domain that doesn't contain
any keywords. If your website isn't going to rely on search engine rankings
or is in a non competitive niche then getting a keyworded domain is not an
issue.
There are lots of domain registrars available for use on the Internet and you
will have to do a search to find one that looks reputable and is well
established.
If you would like to setup a personal site then free web hosting sites like
Blogger.com and WordPress.org can be a good option as they will let you
register a free domain name when you create an account with them.
After you have decided on your domain name and registered it you will need
a web server to host your website on. There are again lots of companies that
will host your website for you for a small monthly fee. This particular site is
hosted using services from HostGator and has found them quite good.
You can also setup your own web server if you have the technical know how
but these days being as there are a lot of companies offering inexpensive
hosting options and the overhead that goes into running your web server
there isn't much reason not to farm out the hosting work to a company that
specializes in web hosting.
There are many different options when it comes to website design. If you
have the technical know how you can do it yourself but if you require help
you can acquire the services of a professional website design company that
will create a website for you for a fee.
Once your website has been designed you just need to upload the files to
your web server to make it available for the world to view.
After you have designed and uploaded your website to your web server
space the next step is to start getting the word out about your website. If you
want to get your website ranked well in the search engines you will need to
engage in a process called Search Engine Optimisation which is the process
of choosing the keywords you would like to rank on and then implementing
those keywords into your websites text in a meaningful for the search
engines to discover. If you know what you are doing you an embark on this
process yourself or there are companies that are skilled in Search Engine
Marketing and can help you get your website ranked highly in the search
engines.
9)Email hosting services:--
An e-mail hosting service is an Internet hosting service that runs e-mail
servers.
Email hosting is a very valuable resource these days, with the explosion in
demand for email services and the huge number of people who send and
receive email messages every day. Email hosting can be a very attractive
option for companies, especially as a means of gaining new customers.
Companies that offer email hosting necessarily have large server resources.
Here’s why: Email hosting is potentially a very large enterprise, depending
on how many bells and whistles are offered. Email hosting means that a
company offers to perform email functions for customers. These functions
can be as basic as send and receive and as complicated as database
processing and global searching.
i)Global searching
ii)Chatting
iv)Database processing
v)reliability
vi)security
A Web crawler is a computer program that browses the World Wide Web
in a methodical, automated manner or in an orderly fashion. Other terms for
Web crawlers are ants, automatic indexers, bots, [1] or Web spiders, Web
robots, or—especially in the FOAF community—Web scutters[2].
A Web crawler is one type of bot, or software agent. In general, it starts with
a list of URLs to visit, called the seeds. As the crawler visits these URLs, it
identifies all the hyperlinks in the page and adds them to the list of URLs to
visit, called the crawl frontier. URLs from the frontier are recursively visited
according to a set of policies.
A crawler must not only have a good crawling strategy, as noted in the
previous sections, but it should also have a highly optimized architecture.
Shkapenyuk and Suel [34] noted that: "While it is fairly easy to build a slow
crawler that downloads a few pages per second for a short period of time,
building a high-performance system that can download hundreds of millions
of pages over several weeks presents a number of challenges in system
design, I/O and network efficiency, and robustness and manageability."
Web crawlers are a central part of search engines, and details on their
algorithms and architecture are kept as business secrets. When crawler
designs are published, there is often an important lack of detail that prevents
others from reproducing the work. There are also emerging concerns about
"search engine spamming", which prevent major search engines from
publishing their ranking algorithms.