Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
11 views

ESS316 _Service Web_Lecture Notes 1

Service Web notes

Uploaded by

Eugene Mbah Tebo
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

ESS316 _Service Web_Lecture Notes 1

Service Web notes

Uploaded by

Eugene Mbah Tebo
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

ESS 316 : Service Web .

Lecture Notes 1
INTRODUCTION TO INTERNET

INTRODUCTION
In the present age of information Technology, use of Internet is becoming quite popular for
accessing information on any topic of your interest. It also provides tremendous
opportunities to students, researchers and professionals for getting information on matters
related to academic and professional topics and lot more. In the present world, most of the
people who have computers around themselves use Internet to access information from
the World Wide Web, exchange messages & documents and e-services.

OBJECTIVES
After going through this lesson, you would be able to:
➢ explain various terminology used in internet
➢ use various services provided by internet
➢ search the desired information over internet
➢ define e-mail and its various features
➢ explain the process of downloading file.
➢ … etc

INTERNET
The Internet is a global system of interconnected computer networks that use the standard
Internet protocol suite (TCP/ IP) to serve billions of users worldwide. It is a network of
networks that consists of millions of private, public, academic, business, and government
networks, of local to global scope, that are linked by a broad array of electronic, wireless
and optical networking technologies. The Internet carries a vast range of information
resources and services, such as the interlinked hypertext documents of the World Wide Web
(WWW) and the infrastructure to support electronic mail.

Uses of Internet
Internet has been the most useful technology of the modern times which helps us not only
in our daily lives, but also our personal and professional lives developments. The internet
helps us achieve this in several different ways.

For the students and educational purposes the internet is widely used to gather information
so as to do the research or add to the knowledge of various subjects. Even the business
professionals and the professionals like doctors, access the internet to filter the necessary
information for their use.

The internet is therefore the largest encyclopedia for everyone, in all age categories. The
internet has served to be more useful in maintaining contacts with friends and relatives who
live abroad permanently.

Advantages of Internet:
➢ E-mail: Email is now an essential communication tools in business. With e-mail you can
send and receive instant electronic messages, which works like writing letters. Your
messages are delivered instantly to people anywhere in the world, unlike traditional
mail that takes a lot of time.

Copyright @ Eugene Tebo November 2024


1
ESS 316 : Service Web . Lecture Notes 1
Email is free, fast and very cheap when compared to telephone, fax and postal
services.
➢ 24 hours a day - 7 days a week: Internet is available, 24x7 days for usage.
Information: Information is probably the biggest advantage internet is offering. There
is a huge amount of information available on the internet for just about every subject,
ranging from government law and services, trade fairs and conferences, market
information, new ideas and technical support. You can almost find any type of data
on almost any kind of subject that you are looking for by using search
engines like google, yahoo, msn, etc.
➢ Online Chat: You can access many ‘chat rooms’ on the web that can be used to
meet new people, make new friends, as well as to stay in touch with old friends. You
can chat in MSN and yahoo websites.
➢ Services: Many services are provided on the internet like net banking, job searching,
purchasing tickets, hotel reservations, guidance services on array of topics engulfing
every aspect of life.
➢ Communities: Communities of all types have sprung up on the internet. Its a great
way to meet up with people of similar interest and discuss common issues.
➢ E-commerce: Along with getting information on the Internet, you can also shop
online. There are many online stores and sites that can be used to look for products
as well as buy them using your credit card. You do not need to leave your house and
can do all your shopping from the convenience of your home. It has got a real
amazing and wide range of products from household needs, electronics to
entertainment.
➢ Entertainment: Internet provides facility to access wide range of Audio/Video songs,
plays films. Many of which can be downloaded. One such popular website is
YouTube.
➢ Software Downloads: You can freely download innumerable, softwares like utilities,
games, music, videos, movies, etc from the Internet.

Limitations of Internet
➢ Theft of Personal information: Electronic messages sent over the Internet can be easily
snooped and tracked, revealing who is talking to whom and what they are talking
about. If you use the Internet, your personal information such as your name, address,
credit card, bank details and other information can be accessed by unauthorized
persons. If you use a credit card or internet banking for online shopping, then your
details can also be ‘stolen’.
➢ Negative effects on family communication: It is generally observed that due to more
time spent on Internet, there is a decrease in communication and feeling of
togetherness among the family members.
➢ Internet addiction: There is some controversy over whether it is possible to actually be
addicted to the Internet or not. Some researchers, claim that it is simply people
trying to escape their problems in an online world.
➢ Children using the Internet has become a big concern. Most parents do not realize
the dangers involved when their children log onto the Internet. When children talk to
others online, they do not realize they could actually be talking to a harmful person.
Moreover, pornography is also a very serious issue concerning the Internet, especially
when it comes to young children. There are thousands of pornographic sites on the

Copyright @ Eugene Tebo November 2024


2
ESS 316 : Service Web . Lecture Notes 1
Internet that can be easily found and can be a detriment to letting children use the
Internet.
➢ Virus threat: Today, not only are humans getting viruses, but computers are also.
Computers are mainly getting these viruses from the Internet. Virus is is a program
which disrupts the normal functioning of your computer systems.
Computers attached to internet are more prone to virus attacks and they can end
up into crashing your whole hard disk.
➢ Spamming: It is often viewed as the act of sending unsolicited email. This multiple or
vast emailing is often compared to mass junk mailings. It needlessly obstruct the
entire system. Most spam is commercial advertising, often for dubious products, get-
rich-quick schemes, or quasi-legal services. Spam costs the sender very little to send
— most of the costs are paid for by the recipient or the carriers rather than by the
sender

Challenges in the use of internet


➢ Security
Increasing the number of connected devices increases the opportunity to exploit
security vulnerabilities, as do poorly designed devices, which can expose user data
to theft by leaving data streams inadequately protected and in some cases people’s
health and safety (implanted, Internet-enabled medical devices and hackable cars)
can be put at risk.
➢ Privacy
Intrusion to personal life
➢ Standards
Lack of standards and documented best practices on the use of internet.
➢ Regulation There are a wide range of regulatory and legal questions surrounding the
use of internet which need thoughtful consideration

The need for internet security


Internet security ensures that people and businesses are confident exchanging information.

Without Internet security, the Internet would stop functioning because nobody would be
willing to use it. The primary goals of Internet security are to authenticate people, to prevent
impostors, to preserve integrity so people are not afraid to use the Internet and to keep
private information from becoming public.

Internet security also allows technological progress to be made and continued


development to occur.
Without Internet security, it would be impossible to expand on existing technologies
because they would be prone to corruption. For example, most people own mobile
devices that can connect to the Internet, as of 2015.
Without proper Internet security measures in place, people would not be willing to own
these devices, and companies would stop making them as demand decreased.

Hackers are capable of stealing identities, infiltrating large corporations and even causing
physical damage. With personal information, hackers can blackmail people or companies.
With private credit card or banking information, hackers can make purchases and steal

Copyright @ Eugene Tebo November 2024


3
ESS 316 : Service Web . Lecture Notes 1
money.

Internet security prevents online crime

Applications of the internet


1. Communication
At the moment the easiest thing that can be done using the internet is that we can
communicate with the people living far away from us with extreme ease. Earlier the
communication used to be a daunting task but all that chanced once internet came into
the life of the common people.

2. Research
In order to do research you need to go through hundreds of books as well as the
references and that was one of the most difficult jobs to do earlier

3.Education
Education is one of the best things that the internet can provide. There are a number of
books, reference books, online help centres, expert’s views and other study oriented
material on the internet that can make the learning process very easier as well as a fun
learning experience. There are lots and lots of websites which are related to different
topic

4. Financial Transaction
Financial transaction is the term which is used when there is exchange of money. With
the use of internet in the financial transaction, your work has become a lot easier.

Now you don’t need to stand in the queue at the branch of your particular bank rather
you can just log in on to the bank website with the credential that has been provided
to you by the bank and then can do any transaction related to finance at your will

5. Real Time Updates


This is been mentioned here in regards to the news and other happenings that may be
on-going in different parts of the world but with the use of internet we come to know
about it very easily and without any difficulty.

6. Leisure
Right from watching your favourite videos to listening songs, watching movies, playing
games, chatting with the loved ones has been possible due to internet. Internet has
progressed with so much pace that today whenever you get time, you just move on to the
internet and so such activities which helps you to relax. Leisure is one of the most important
uses of internet and that has surely one thing that attracts people towards it. Internet is
home of some of the excellent resources using which you can freshen up your mood in
minutes.

7. Shopping
There is huge number of options available for a common people to buy or to sell any
particular item using the internet. Using internet now it is possible to buy products from all

Copyright @ Eugene Tebo November 2024


4
ESS 316 : Service Web . Lecture Notes 1
over the world.

8. Blogging
There is huge number of websites over the internet which allows you to write blogs.
You just need to get yourself registered as per their procedure and then start writing.
And if your blogs are really good and so many people visit your blog then there is chance
that you might get elected to write blogs for big organisations. Blogging has reached to all
new level with the help of internet and is one such use which is beneficial to everyone.

Emerging trends in Internet


➢ Mobile advertising in use-firms using mobile apps to advertise products
➢ Ecommerce growing rapidly
Ecommerce growth is hardly a new trend, but it is worth mentioning the continued
high growth in the sector.
➢ Advanced social communication apps-eg whatsapp,IMO etc.People can interact
through this apps.
➢ Blogging-a frequently updated personal journal or dairy on the web.
➢ E-education-it’s now possible for people to study online.
➢ Hacking-un authorized access to websites. Hackers are becoming a threat in
websites.
➢ Google and Facebook are dominating ad markets
The two giants of digital are solidifying their positions as market leaders in the
online ad space.

SERVICES OF INTERNET -E-mail, FTP, Telnet


Email, discussion groups, long-distance computing, and file transfers are some of the
important services provided by the Internet.

Email is the fastest means of communication. With email one can also send software and
certain forms of compressed digital image as an attachment.

News groups or discussion groups facilitate Internet user to join for various kinds of debate,
discussion and news sharing. Long-distance computing was an original inspiration for
development of ARPANET and does still provide a very useful service on Internet.

Programmers can maintain accounts on distant, powerful computers and execute


programs.

File transfer service allows Internet users to access remote machines and retrieve programs,
data or text.

(a) E-Mail (Electronic Mail)


E-mail or Electronic mail is a paperless method of sending messages, notes or letters from
one person to another or even many people at the same time via Internet. E-mail is very
fast compared to the normal post. E-mail messages usually take only few seconds to arrive
at their destination. One can send messages anytime of the day or night, and, it will get
delivered immediately. You need not to wait for the post office to open and you don’t

Copyright @ Eugene Tebo November 2024


5
ESS 316 : Service Web . Lecture Notes 1
have to get worried about holidays.
It works 24 hours a day and seven days a week. What’s more, the copy of
the message you have sent will be available whenever you want to look at it even in the
middle of the night. You have the privilege of sending something extra such as a file,
graphics, images etc. along with your e-mail. The biggest advantage of using email is that it
is cheap, especially when sending messages to other states or countries and at the same
time it can be delivered to a number of people around the world.

It allows you to compose note, get the address of the recipient and send it. Once the mail
is received and read, it can be forwarded or replied. One can even store it for later use, or
delete. In e-mail even the sender can request for delivery receipt and read receipt from
the recipient.

(i) Features of E-mail:


➢ One-to-one or one-to-many communications
➢ Instant communications
➢ Physical presence of recipient is not required
➢ Most inexpensive mail services, 24-hours a day and seven days a week
➢ Encourages informal communications

(ii) Components of an E-mail Address


As in the case of normal mail system, e-mail is also based upon the concept of a recipient
address. The email address provides all of the information required to get a message to the
recipient from any where in the world.

Consider the e-mail ID. john@hotmail.com

In the above example john is the username of the person who will be sending/receiving the
email. Hotmail is the mail server where the username john has been registered and com is
the type of organization on the internet which is hosting the mail server.

(b) FTP (File Transfer Protocol)


File Transfer Protocol, is an Internet utility software used to uploaded and download files. It
gives access to directories or folders on remote computers and allows software, data and
text files to be transferred between different kinds of computers.

FTP works on the basis of same principle as that of Client/Server. FTP “Client” is a program
running on your computer that enables you to communicate with remote computers.

The FTP client takes FTP command and sends these as requests for information from the
remote computer known as FTP servers. To access remote FTP server it is required, but not
necessary to have an account in the FTP server.

When the FTP client gets connected, FTP server asks for the identification in terms of User
Login name and password of the FTP client (Fig. 1.1).

If one does not have an account in the remote FTP server, still he can connect to the server

Copyright @ Eugene Tebo November 2024


6
ESS 316 : Service Web . Lecture Notes 1
using anonymous login.
Using anonymous login anyone can login in to a FTP server and can access public archives;
anywhere in the world, without having an account. One can easily Login to the FTP site with
the username anonymous and e-mail address as password.

Fig 1.1

(i) Objectives of FTP :


➢ Provide flexibility and promote sharing of computer programs, files and data
➢ Transfer data reliably and more efficiently over network
➢ Encourage implicit or indirect use of remote computers using Internet
➢ Shield a user from variations in storage systems among hosts.

(ii) The basic steps in an FTP session


➢ Start up your FTP client, by typing ftp on your system’s command line/’C>’ prompt
(or, if you are in a Windows, double-click on the FTP icon).
➢ Give the FTP client an address to connect. This is the FTP server address to which the
FTP client will get connected
➢ Identify yourself to the FTP remote site by giving the Login Name
➢ Give the remote site a password
➢ Remote site will verify the Login Name/Password to allow the FTP client to access its
files
➢ Look directory for files in FTP server
➢ Change Directories if required
➢ Set the transfer mode (optional);
➢ Get the file(s) you want, and
➢ Quit.

(c) Telnet (Remote Computing)


Telnet or remote computing is telecommunication utility software, which uses available
telecommunication facility and allows you to become a user on a remote computer.
Once you gain access to remote computer, you can use it for the intended purpose.

The TELNET works in a very step by step procedure.


The commands typed on the client computer are sent to the local Internet Service Provider

Copyright @ Eugene Tebo November 2024


7
ESS 316 : Service Web . Lecture Notes 1
(ISP), and then from the ISP to the remote computer that you have gained access.
Most of the ISP provides facility to TELENET into your own account from another city and
check your e-mail while you are travelling or away on business.

The following steps are required for a TELNET session


➢ Start up the TELNET program
➢ Give the TELNET program an address to connect (some really nifty TELNET packages
allow you to combine steps 1 and 2 into one simple step)
➢ Make a note of what the “escape character” is
➢ Log in to the remote computer,
➢ Set the “terminal emulation”
➢ Play around on the remote computer, and
➢ Quit.

TYPES OF INTERNET CONNECTIONS


There are five types of internet connections which are as follows:
1. Dial up Connection
2. Leased Connection
3. DSL connection
4. Cable Modem Connection
5. VSAT

1. Dial up connection
Dial-up refers to an Internet connection that is established using a modem. The modem
connects the computer to standard phone lines, which serve as the data transfer medium.
When a user initiates a dial-up connection, the modem dials a phone number of an
Internet Service Provider (ISP) that is designated to receive dial-up calls. The ISP then
establishes the connection, which usually takes about ten seconds and is accompanied by
several beepings and a buzzing sound.

After the dial-up connection has been established, it is active until the user disconnects
from the ISP.
Typically, this is done by selecting the “Disconnect” option using the ISP’s software or a
modem utility program.
However, if a dial-up connection is interrupted by an incoming phone call or someone
picking up a phone in the house, the service may also be disconnected.

Advantages
• Low Price
• Secure connection – your IP address continually changes
• Offered in rural areas – you need a phone line

Disadvantages
• Slow speed.
• Phone line is required.
• Busy signals for friends and family members.

Copyright @ Eugene Tebo November 2024


8
ESS 316 : Service Web . Lecture Notes 1

2. Leased Connection
Leased connection is a permanent telephone connection between two points set up by a
telecommunications common carrier.

Typically, leased lines are used by businesses to connect geographically distant offices.
Unlike normal dial-up connections, a leased line is always active. The fee for the
connection is a fixed monthly rate.

The primary factors affecting the monthly fee are distance between end points and the
speed of the circuit. Because the connection doesn’t carry anybody else’s
communications, the carrier can assure a given level of quality.

For example, a T-1 channel is a type of leased line that provides a maximum transmission
speed of 1.544 Mbps. You can divide the connection into different lines for data and voice
communication or use the channel for one high speed data circuit.

Dividing the connection is called multiplexing.

Increasingly, leased lines are being used by companies, and even individuals, for Internet
access because they afford faster data transfer rates and are cost-effective if the Internet
is used heavily.

Advantage
➢ Secure and private: dedicated exclusively to the customer
➢ Speed: symmetrical and direct
➢ Reliable: minimum down time
➢ Wide choice of speeds: bandwidth on demand, easily upgradeable
➢ Leased lines are suitable for in-house office web hosting

Disadvantages
➢ Leased lines can be expensive to install and rent.
➢ Not suitable for single or home workers
➢ Lead times can be as long as 65 working days
➢ Distance dependent to nearest POP
➢ Leased lines have traditionally been the more expensive access option. A Service
Level Agreement (SLA) confirms an ISP’s contractual requirement in ensuring the
service is maintained. This is often lacking in cheaper alternatives.

3. DSL connection
Digital Subscriber Line (DSL) is a family of technologies that provides digital data
transmission over the wires of a local telephone network. DSL originally stood for digital
subscriber loop.
In telecommunications marketing, the term DSL is widely understood to mean Asymmetric
Digital Subscriber Line (ADSL), the most commonly installed DSL technology.

DSL service is delivered simultaneously with wired telephone service on the


same telephone line. This is possible because DSL uses higher frequency bands for data

Copyright @ Eugene Tebo November 2024


9
ESS 316 : Service Web . Lecture Notes 1
separated by filtering. On the customer premises, a DSL filter on each outlet removes the
high frequency interference, to enable simultaneous use of the telephone and data.

The data bit rate of consumer DSL services typically ranges from 256 kbit/s to 40 Mbit/s in
the direction to the customer (downstream), depending on DSL technology, line conditions,
and service-level implementation.

In ADSL, the data throughput in the upstream direction, (the direction to the service
provider) is lower, hence the designation of asymmetric service.
In Symmetric Digital Subscriber Line (SDSL) services, the downstream and upstream data
rates are equal.

Advantages:

➢ Security: Unlike cable modems, each subscriber can be configured so that it will not
be on the same network. In some cable modem networks, other computers on the
cable modem network are left visibly vulnerable and are easily susceptible to break
in as well as data destruction.
➢ Integration: DSL will easily interface with ATM and WAN technology.
➢ High bandwidth
➢ Cheap line charges from the phone company.
➢ Good for “bursty” traffic patterns

Disadvantages
➢ No current standardization: A person moving from one area to another might find
that their DSL modem is just another paperweight. Customers may have to buy new
equipment to simply change ISPs.
➢ Expensive: Most customers are not willing to spend more than $20 to $25 per month
for Internet access. Current installation costs, including the modem, can be as high as
$750. Prices should come down within 1-3 years. As with all computer technology,
being first usually means an emptier wallet.
➢ Distance Dependence: The farther you live from the DSLAM (DSL Access Multiplexer),
the lower the data rate. The longest run lengths are 18,000 feet, or a little over 3 miles.

4. Cable Modem Connection


A cable modem is a type of Network Bridge and modem that provides bi-directional data
communication via radio frequency channels on a HFC and RFoG infrastructure. Cable modems
are primarily used to deliver broadband Internet access in the form of cable Internet, taking
advantage of the high bandwidth of a HFC and RFoG network.

They are commonly deployed in Australia, Europe, Asia and Americas.

Copyright @ Eugene Tebo November 2024


10
ESS 316 : Service Web . Lecture Notes 1

The figure above shows the most common network connection topologies when using
cable modems.

The cable TV company runs a coaxial cable into the building to deliver their Internet
service. Although fed from the same coax that provides cable TV service, most companies
place a splitter outside of the building and runs two cables in, rather than using a splitter at
the set-top box. The coax terminates at the cable modem.

The cable modem itself attaches to the SOHO computing equipment via its 10BASE-T port.
In most circumstances, the cable modem attaches directly to a user’s computer. If a LAN
is present on the premises (something many cable companies frown upon), some sort of
router can be connected to the cable modem.

Advantages
➢ Always Connected: A cable modem connection is always connected to the
Internet. This is advantageous because you do not have to wait for your computer to
“log on” to the Internet; however, this also has the disadvantage of making your
computer more vulnerable to hackers.
Broadband: Cable modems transmit and receive data as digital packets, meaning
they provide high-speed Internet access. This makes cable modem connections
much faster than traditional dial-up connections.
➢ Bandwidth: Cable modems have the potential to receive data from their cable
provider at speeds greater than 30 megabits per second; unfortunately, this speed is
rarely ever realized. Cable lines are shared by all of the cable modem users in a
given area; thus, the connection speed varies depending upon the number of other
people using the Internet and the amount of data they are receiving or transmitting.
➢ File Transfer Capabilities: Downloads may be faster, but uploads are typically slower.
Since the same lines are used to transmit data to and from the modem, priority is
often given to data traveling in one direction.
➢ Signal Integrity: Cable Internet can be transmitted long distances with little signal
degradation. This means the quality of the Internet signal is not significantly
decreased by the distance of the modem from the cable provider.
➢ Routing: Cable routers allow multiple computers to be hooked up to one cable

Copyright @ Eugene Tebo November 2024


11
ESS 316 : Service Web . Lecture Notes 1
modem, allowing several devices to be directly connected through a single modem.
Wireless routers can also be attached to your cable modem.
➢ Rely on Existing Connections: Cable modems connect directly to preinstalled cable
lines. This is advantageous because you do not need to have other services, such as
telephone or Internet, in order to receive Internet through your cable modem. The
disadvantage is that you cannot have cable internet in areas where there are no
cable lines.

Disadvantages
➢ Cable internet technology excels at maintaining signal strength over distance. Once
it is delivered to a region, however, such as a neighborhood, it is split among that
regions subscribers. While increased capacity has diminished the effect somewhat, it
is still possible that users will see significantly lower speeds at peak times when more
people are using the shared connection.
➢ Bandwidth equals money, so cable’s advantage in throughput comes with a price.
Even in plans of similar speeds compared with DSL, customers spend more per
Mb with cable than they do with DSL.
➢ It’s hard to imagine, but there are still pockets of the United States without adequate
cable television service. There are far fewer such pockets without residential land-line
service meaning cable internet is on balance less accessible in remote areas.

5. VSAT
Short for Very Small Aperture Terminal, an earthbound station used in satellite
communications of data, voice and video signals, excluding broadcast television. A VSAT
consists of two parts, a transceiver that is placed outdoors in direct line of sight to the
satellite and a device that is placed indoors to interface the transceiver with the end user’s
communications device, such as a PC.

The transceiver receives or sends a signal to a satellite transponder in the sky. The satellite
sends and receives signals from a ground station computer that acts as a hub for the
system.

Each end user is interconnected with the hub station via the satellite, forming a star
topology. The hub controls the entire operation of the network. For one end user
to communicate with another, each transmission has to first go to the hub station that then
retransmits it via the satellite to the other end user’s VSAT.

Advantages
Satellite communication systems have some advantages that can be exploited for the
provision of connectivity. These are:
➢ Costs Insensitive to Distance
➢ Single Platform service delivery (one-stop-shop)
➢ Flexibility
➢ Upgradeable
➢ Low incremental costs per unit

Copyright @ Eugene Tebo November 2024


12
ESS 316 : Service Web . Lecture Notes 1
Disadvantages
However like all systems there are disadvantages also. Some of these are

➢ High start-up costs (hubs and basic elements must be in place before the services
can be provided)
➢ Higher than normal risk profiles
➢ Severe regulatory restrictions imposed by countries that prevent VSAT networks and
solutions from reaching critical mass and therefore profitability
➢ Some service quality limitations such the high signal delays (latency)
➢ Natural availability limits that cannot be mitigated against
➢ Lack of skills required in the developing world to design, install and maintain satellite
communication systems adequately

DOWNLOADING FILES
Downloading is the process of copying a file (such as a game or utility) from one computer
to another across the internet. When you download a game from our web site, it means
you are copying it from the author or publisher’s web server to your own computer.

This allows you to install and use the program on your own machine.

Here’s how to download a file using Internet Explorer and Windows 7.


(This example shows a download of the file “dweepsetup.exe” from Dexterity Games.)

If you’re using a different browser such as Netscape Navigator or a different version of


Windows, your screen may look a little different, but the same basic steps should work.

1. Click on the download link for the program you want to download. Many sites offer
multiple download links to the same program, and you only need to choose one of these
links.

2. You may be asked if you want to save the file or run it from its current location. If you are
asked this question, select “Save.” If not, don’t worry — some browsers will automatically
choose “Save” for you as seen below..

3. You will then be asked to select the folder where you want to save the program or file,
using a standard “Save As” dialog box. Pay attention to which folder you select before
clicking the “Save” button. It may help you to create a folder like “C:\Download” for all of
your downloads, but you can use any folder you’d like.

4. The download will now begin. Your web browser will keep you updated on the progress
of the download by showing a progress bar that fills up as you download. You will also

Copyright @ Eugene Tebo November 2024


13
ESS 316 : Service Web . Lecture Notes 1
be reminded where you’re saving the file. The file will be saved as
“C:\Download\dweepsetup.exe” in the picture below.

Note: You may also see a check box labeled “Close this dialog box when download
completes.” If you see this check box, it helps to uncheck this box. You don’t have to, but if
you do, it will be easier to find the file after you download it.

5. Depending on which file you’re downloading and how fast your connection is, it may
take anywhere from a few seconds to a few minutes to download. When your
download is finished, if you left the “Close this dialog box when download completes”
option unchecked, you’ll see a dialog box as shown below

6. Now click the “Open” button to run the file you just downloaded. If you don’t see the
“Download complete” dialog box, open the folder where you saved the file and
double-click on the icon for the file there.

What happens next will depend on the type of file you downloaded. The files you’ll
download most often will end in one of two extensions. (An extension is the last few letters
of the filename, after the period.) They are:
➢ .EXE files: The file you downloaded is a program. Follow the on-screen instructions
from there to install the program to your computer and to learn how to
run the program after it’s installed.
➢ .ZIP files: ZIP is a common file format used to compress and combine files to make
them download more quickly. Some versions of Windows (XP and sometimes
ME) can read ZIP files without extra software. Otherwise, you will need an unzipping
program to read these ZIP files. Common unzipping programs are WinZip, PKZIP, and
Bit Zipper, but there are also many others. Many unzipping programs are shareware,
which means you will need to purchase them if you use them beyond their specified
trial period.

Copyright @ Eugene Tebo November 2024


14
ESS 316 : Service Web . Lecture Notes 1

INTEXT QUESTIONS
1. What are the different types of Internet Connection?
2. Fill in the blanks:
(a) A __________ is a type of Network Bridge and modem that provides bi-directional data
communication via radio frequency channels on a HFC and RFoG infrastructure.
(b) The ________ is a global system of interconnected computer networks that use the
standard Internet protocol suite (TCP/IP) to serve billions of users worldwide.
(c) VoIP stands for______________ , referring to the protocol that underlies all Internet
communication.

WHAT YOU HAVE LEARNT


In this lesson you learnt about the Internet, its importance and types of internet services and
different types of internet connections have also been discussed along with their
advantages and disadvantages.

TERMINAL QUESTIONS
1. What is Internet? What are its advantages and disadvantages?
2. What are the various services of internet?
3. Explain in brief different types of internet connection.

ANSWER TO INTEXT QUESTIONS


Intext Question
1. The types of internet connection are:
• Dial up Connection
• Leased Connection
• DSL connection
• Cable Modem Connection
• VSAT
2. (a) cable modem (b) Internet (c) Voice-over-Internet Protocol

The Web Concepts


The Web was developed to be a pool of human knowledge, and human culture, which
would allow collaborators in remote sites to share their ideas and all aspects of a common
project.
The Web consists of a vast assortment of files and documents that are stored on these
computers and written in some form of Hyper Text Markup Language (HTML) that tells
browsers how to display the information.

The computers that store the files are called servers because they can serve requests from
many users at the same time. Users access these HTML files and documents via applications
called browsers.

Copyright @ Eugene Tebo November 2024


15
ESS 316 : Service Web . Lecture Notes 1
The main Web concepts are:

Web Page
The Web page is a space of information on the Internet that presents information about a
particular person, business, or organization or cause.
• The Web consists of files, called Web pages (documents).
• It is containing links to resources (text, images, audios, videos, and other data), throughout
the Internet

Web Site
Web site can be defined as a collection of web pages which are grouped together and
usually connected together in various ways. Often called a "web site" or simply a "site." The
web site usually presents information about a particular person, business, organization or
cause.

Generally there are two types of website styles, Static and Dynamic website:

• A static Website is one that has web pages stored on the server in the same
form as the user will view them.
• A dynamic Website is one that does not have web pages stored on the server in the same
form as the user will view them. Instead, the web page content changes automatically
and/or frequently based on certain criteria.

There are two meaning for dynamic website. The first is that the web page code is
constructed dynamically, piece by piece.
The second one is that the web page content displayed varies based on certain criteria.
The criteria may be predefined rules or may be based on variable user input.

The Web Terms


Uniform Resource Locator (URL)
It is the complete address of World Wide Web page and consists of a three components
that identifies where the web page is stored on the Internet.

These parts are: the protocol, the site name, and the absolute path to the document or
resource as shown in the following example:

• protocol name (e.g., HTTP)


http:// The first thing the URL does is define the protocol that will be used for that particular
transaction. The letters HTTP let the server know to use Hypertext Transfer Protocol, or get
into “web mode.”
• domain name/ hostname (servers address that a user wants to connect
with), for example, www.google.com. www.example.com The next portion of the URL

Copyright @ Eugene Tebo November 2024


16
ESS 316 : Service Web . Lecture Notes 1
identifies the website by its domain name.

In this example, the domain name is example.com. The “www.” part at the beginning is the
particular host name at that domain. For example, there might also be
development.example.com, clients.example.com, and so on.
• File name is optional, implies the access to a file/directory into the principal webpage.

/2012/samples/first.html. This is the absolute path through directories on the server to the
requested HTML document, first.html. The words separated by slashes are the directory
names, starting with the root directory of the host.

Example: http://www.icci.org/studies/ips.html .
1. Protocol: http.
2. Host computer name: www.
3. Second-level domain name: icci.
4. Top-level domain name: org.
5. Directory name: studies.
6. File name: ips.html.

Several Top-level domain are common:


com: commercial enterprise.
edu: educational institution.
gov: government entity.
mil: military entity.
net: network access provider.
org: usually nonprofit organizations
biz: Businesses
pro: Professionals, such as doctors and attorneys

Web hosting
After we create a website, it is necessary to store it in a place where it is always
available for users. We use Web hosting services/companies for this purpose. They
own web servers that have the ability to store content.

Search engine
Search engines allow us to search in the Internet for information, images and other types of
files stored in various locations available throughout the network.

Search engines work according to certain algorithms that show the user relevant,
requested search results.

At first, information from the various websites is collected and stored and then analyzed to
organize and save them in the database for future use.
When a user enters an inquiry into the search engine, the database is organized by an
index and the user is presented with results that match best the entered search terms.
Therefore, it is important to understand that by using the search engine one does not
search the entire Internet but the search engine’s database.

Copyright @ Eugene Tebo November 2024


17
ESS 316 : Service Web . Lecture Notes 1
Therefore, we might get different results each time we use different web engines.

Internet protocols
• TCP/IP protocol: This protocol is the main protocol for Internet communication.
It defines the rules that computers need to follow to communicate with other computers via
a network.
• HTTP (Hypertext Transfer protocol): is a network protocol that ensures the exchange of
almost all types of resources on the web. With resources, we mean files, pages, images,
search results, etc. It is basically, the web browsers language to send requests to the server.
There is also the HTTPS version, which is a secure and encrypted version for HTTP
communications.
• FTP (File Transfer Protocol): is used to load (upload) or retrieve (download) files between
the client and server communication, or between two computers on the Internet. In other
words, this protocol is responsible for file transfer on the Internet.
• Internet Service Provider (ISP): is an organization that provides individuals and other
companies’ access to the Internet and other related services such as email.

Copyright @ Eugene Tebo November 2024


18

You might also like