Internet Project Dheeraj

download Internet Project Dheeraj

of 16

Transcript of Internet Project Dheeraj

  • 7/31/2019 Internet Project Dheeraj

    1/16

    Dated: - 28-03-2012

    Information

    Technology

    Project: Computer Project

    Submitted to: Mrs. Riya Khera

  • 7/31/2019 Internet Project Dheeraj

    2/16

    Submitted By:

    Dheeraj Kumar Jha (1090111008)

  • 7/31/2019 Internet Project Dheeraj

    3/16

  • 7/31/2019 Internet Project Dheeraj

    4/16

    Evolution of Internet

    Research into packet switching started in the early 1960s and packet switched networks such

    as ARPANET, Mark I at NPL in the UK, CYCLADES, Merit Network, Tymnet, and Telenet,

    were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET

    in particular led to the development of protocols for internetworking, where multiple separate

    networks could be joined together into a network of networks.

    The first two nodes of what would become the ARPANET were interconnected

    between Leonard Kleinrock's Network Measurement Center at the UCLA's School of

    Engineering and Applied Science and Douglas Engelbart's NLS system at SRI

    International (SRI) in Menlo Park, California, on 29 October 1969. The third site on the

    ARPANET was the Culler-Fried Interactive Mathematics center at the University of California

    at Santa Barbara, and the fourth was the University of UtahGraphics Department. In an early

    sign of future growth, there were already fifteen sites connected to the young ARPANET by

    the end of 1971. These early years were documented in the 1972 film Computer Networks: TheHeralds of Resource Sharing.

    Early international collaborations on ARPANET were sparse. For various political reasons,

    European developers were concerned with developing the X.25 networks. Notable exceptions

    were theNorwegian Seismic Array (NORSAR) in 1972, followed in 1973 by Sweden with

    satellite links to the Tanum Earth Station and Peter Kirstein's research group in the UK,

    initially at the Institute of Computer Science, London University and later at University

    College London.

    T3 NSFNET Backbone, c. 1992 This NeXT Computer was used by Sir

    Tim Berners-Lee at CERN and became

    the world's first Web server.

    In 1982, the Internet Protocol Suite (TCP/IP) was standardized and the concept of a world-wide

    network of fully interconnected TCP/IP networks called the Internet was introduced. Access to

    the ARPANET was expanded in 1981 when the National Science Foundation (NSF) developed

    the Computer Science Network (CSNET). In December 1974,RFC 675 Specification of

    Internet Transmission Control Program, by Vinton Cerf, Yogen Dalal, and Carl Sunshine, used

    the term internet, as a shorthand forinternetworking; later RFCs repeat this use, so the word

    started out as an adjective rather than the noun it is today.

    http://en.wikipedia.org/wiki/File:NSFNET-backbone-T3.pnghttp://en.wikipedia.org/wiki/File:First_Web_Server.jpghttp://en.wikipedia.org/wiki/File:NSFNET-backbone-T3.png
  • 7/31/2019 Internet Project Dheeraj

    5/16

    TCP/IP network access expanded again in 1986 when NSFNET provided access

    to supercomputer sites in the United States from research and education organizations, first at

    56 kbit/s and later at 1.5 Mbit/s and 45 Mbit/s.Commercial internet service providers (ISPs)

    began to emerge in the late 1980s and 1990s. The ARPANET was decommissioned in 1990.

    The Internet was commercialized in 1995 when NSFNET was decommissioned, removing the

    last restrictions on the use of the Internet to carry commercial traffic.[17] The Internet started a

    rapid expansion to Europe and Australia in the mid to late 1980s and to Asia in the late 1980s

    and early 1990s.

    Since the mid-1990s the Internet has had a tremendous impact on culture and commerce,

    including the rise of near instant communication by email, instant messaging, Voice over

    Internet Protocol (VoIP) "phone calls", two-way interactive video calls, and the World Wide

    Web with its discussion forums, blogs, social networking, and online shopping sites. Increasing

    amounts of data are transmitted at higher and higher speeds over fiber optic networks operating

    at 1-Gbit/s, 10-Gbit/s, or more. The Internet continues to grow, driven by ever greater amounts

    of online information and knowledge, commerce, entertainment and social networking.

    During the late 1990s, it was estimated that traffic on the public Internet grew by 100 percent

    per year, while the mean annual growth in the number of Internet users was thought to be

    between 20% and 50%. This growth is often attributed to the lack of central administration,

    which allows organic growth of the network, as well as the non-proprietary open nature of the

    Internet protocols, which encourages vendor interoperability and prevents any one company

    from exerting too much control over the network. As of 31 March 2011, the estimated total

    number ofInternet users was 2.095 billion (30.2% of world population). It is estimated that in

    1993 the Internet carried only 1% of the information flowing through two-

    way telecommunication, by 2000 this figure had grown to 51%, and by 2007 more than 97% of

    all telecommunicated information was carried over the Internet.

  • 7/31/2019 Internet Project Dheeraj

    6/16

    Application of Internet

    The Internet allows greater flexibility in working hours and location, especially with the spread

    of unmetered high-speed connections. The Internet can be accessed almost anywhere by

    numerous means, including through mobile Internet devices. mobile

    phones, datacards, handheld game consoles and cellular routers allow users to connect to the

    Internet wirelessly. Within the limitations imposed by small screens and other limited facilities

    of such pocket-sized devices, the services of the Internet, including email and the web, may be

    available. Service providers may restrict the services offered and mobile data charges may be

    significantly higher than other access methods.

    Educational material at all levels from pre-school to post-doctoral is available from websites.

    Examples range from CBeebies, through school and high-school revision guides, virtual

    universities, to access to top-end scholarly literature through the likes of Google Scholar.

    For distance education, help with homework and other assignments, self-guided learning,

    whiling away spare time, or just looking up more detail on an interesting fact, it has never beeneasier for people to access educational information at any level from anywhere. The Internet in

    general and the World Wide Web in particular are important enablers of

    both formaland informal education.

    The low cost and nearly instantaneous sharing of ideas, knowledge, and skills has

    made collaborative work dramatically easier, with the help of collaborative software. Not only

    can a group cheaply communicate and share ideas but the wide reach of the Internet allows

    such groups more easily to form. An example of this is the free software movement, which has

    produced, among other things, Linux, Mozilla Firefox, and OpenOffice.org. Internet chat,

    whether in the form of anIRC chat room or channel, via an instant messaging system, or

    a social networking website, allows colleagues to stay in touch in a very convenient way when

    working at their computers during the day. Messages can be exchanged even more quickly and

    conveniently than via email. These systems may allow files to be exchanged, drawings and

    images to be shared, or voice and video contact between team members.

    Content management systems allow collaborating teams to work on shared sets of documents

    simultaneously without accidentally destroying each other's work. Business and project teams

    can share calendars as well as documents and other information. Such collaboration occurs in a

    wide variety of areas including scientific research, software development, conference planning,

    political activism and creative writing. Social and political collaboration is also becoming more

    widespread as both Internet access and computer literacy spread.

    The Internet allows computer users to remotely access other computers and information stores

    easily, wherever they may be. They may do this with or withoutcomputer security, i.e.

    authentication and encryption technologies, depending on the requirements. This is

    encouraging new ways of working from home, collaboration and information sharing in many

    industries. An accountant sitting at home can audit the books of a company based in another

    country, on a serversituated in a third country that is remotely maintained by IT specialists in a

    fourth. These accounts could have been created by home-working bookkeepers, in other remote

    locations, based on information emailed to them from offices all over the world. Some of these

    things were possible before the widespread use of the

    World Wide Web (WWW)

  • 7/31/2019 Internet Project Dheeraj

    7/16

    The World Wide Web (abbreviated as WWW orW3, and commonly known as the Web) is

    a system of interlinked hypertext documents accessed via the Internet. With a web browser, one

    can view web pages that may contain text, images, videos, and other multimedia,

    and navigate between them via hyperlinks.

    Using concepts from his earlier hypertext systems

    like ENQUIRE, British engineer and computer scientist Sir Tim Berners-Lee, now Director of

    the World Wide Web Consortium (W3C), wrote a proposal in March 1989 for what wouldeventually become the World Wide Web.[1] At CERN, a European research organization

    near Genevasituated on Swiss and French soil, Berners-Lee and Belgian computer

    scientist Robert Cailliau proposed in 1990 to use hypertext "... to link and access information of

    various kinds as a web of nodes in which the user can browse at will", and they publicly

    introduced the project in December.

    Web Browser

    A web browser is a software application for retrieving, presenting, and traversing informationresources on theWorld Wide Web. An information resource is identified by a Uniform

    Resource Identifier (URI) and may be aweb page, image, video, or other piece of

    content. Hyperlinks present in resources enable users easily to navigate their browsers to

    related resources. A web browser can also be defined as an application software or program

    designed to enable users to access, retrieve and view documents and other resources on

    the Internet.

  • 7/31/2019 Internet Project Dheeraj

    8/16

    Although browsers are primarily intended to access the World Wide Web, they can also be

    used to access information provided by web servers in private networks or files in file systems.

    The major web browsers areFirefox, Google Chrome, Internet Explorer, Opera, and Safari.

    E-Mail

    Electronic mail, commonly known as email ore-mail, is a method of exchanging digital

    messages from an author to one or more recipients. Modern email operates across

    the Internet or other computer networks. Some early email systems required that the author and

    the recipient both be online at the same time, in common with instant messaging. Today's email

    systems are based on a store-and-forward model. Email servers accept, forward, deliver and

    store messages. Neither the users nor their computers are required to be online simultaneously;

    they need connect only briefly, typically to an email server, for as long as it takes to send or

    receive messages.

    An email message consists of three components, the message envelope, the message header,

    and the message body. The message header contains control information, including, minimally,

    an originator's email address and one or more recipient addresses. Usually descriptive

    information is also added, such as a subject header field and a message submission date/time

    stamp.

    Originally a text-only (7-bit ASCII and others) communications medium, email was extended

    to carry multi-media content attachments, a process standardized in RFC 2045 through 2049.

    Collectively, these RFCs have come to be called Multipurpose Internet Mail

    Extensions (MIME).

    Electronic mail predates the inception of the Internet, and was in fact a crucial tool in creating

    it,[2] but the history of modern, global Internet email services reaches back to the

    early ARPANET. Standards for encoding email messages were proposed as early as 1973

    (RFC 561). Conversion from ARPANET to the Internet in the early 1980s produced the core of

    the current services. An email sent in the early 1970s looks quite similar to a basic text message

    sent on the Internet today.

    Network-based email was initially exchanged on the ARPANET in extensions to the File

    Transfer Protocol (FTP), but is now carried by the Simple Mail Transfer Protocol (SMTP), firstpublished as Internet standard 10 (RFC 821) in 1982. In the process of transporting email

  • 7/31/2019 Internet Project Dheeraj

    9/16

    messages between systems, SMTP communicates delivery parameters using a

    message envelope separate from the message (header and body) itself.

    Web Search Engine

    A web search engine is designed to search for information on the World Wide Web and FTP

    servers. The search results are generally presented in a list of results often referred to as

    SERPS, or "search engine results pages". The information may consist ofweb pages, images,

    information and other types of files. Some search engines also mine data available

    in databases or open directories. Unlike web directories, which are maintained only by human

    editors, search engines also maintain real-time information by running an algorithm on a web

    crawler.

    How Web Search Engine Works

    A search engine operates in the following order:

    1. Web crawling

    2. Indexing

    3. Searching

    Web search engines work by storing information about many web pages, which they retrieve

    from theHTML itself. These pages are retrieved by a Web crawler (sometimes also known as a

    spider) an automated Web browser which follows every link on the site. Exclusions can be

    made by the use ofrobots.txt. The contents of each page are then analyzed to determine how it

    should be indexed (for example, words are extracted from the titles, headings, or special fields

    called meta tags). Data about web pages are stored in an index database for use in later queries.

    A query can be a single word. The purpose of an index is to allow information to be found as

    quickly as possible. Some search engines, such as Google, store all or part of the source page

    (referred to as a cache) as well as information about the web pages, whereas others, such

    as AltaVista, store every word of every page they find. This cached page always holds the

    actual search text since it is the one that was actually indexed, so it can be very useful when the

    content of the current page has been updated and the search terms are no longer in it. This

    problem might be considered to be a mild form oflinkrot, and Google's handling of it

    increases usability by satisfying user expectations that the search terms will be on the returned

    webpage. This satisfies theprinciple of least astonishment since the user normally expects the

    search terms to be on the returned pages. Increased search relevance makes these cached pages

    very useful, even beyond the fact that they may contain data that may no longer be available

    elsewhere.

    When a user enters a query into a search engine (typically by using keywords), the engine

    examines its index and provides a listing of best-matching web pages according to its criteria,usually with a short summary containing the document's title and sometimes parts of the text.

  • 7/31/2019 Internet Project Dheeraj

    10/16

    The index is built from the information stored with the data and the method by which the

    information is indexed. Unfortunately, there are currently no known public search engines that

    allow documents to be searched by date. Most search engines support the use of the boolean

    operators AND, OR and NOT to further specify the search query. Boolean operators are for

    literal searches that allow the user to refine and extend the terms of the search. The engine

    looks for the words or phrases exactly as entered. Some search engines provide an advanced

    feature called proximity search which allows users to define the distance between keywords.

    There is also concept-based searching where the research involves using statistical analysis on

    pages containing the words or phrases you search for. As well, natural language queries allow

    the user to type a question in the same form one would ask it to a human. A site like this would

    be ask.com.

    The usefulness of a search engine depends on the relevance of the result set it gives back.

    While there may be millions of web pages that include a particular word or phrase, some pages

    may be more relevant, popular, or authoritative than others. Most search engines employ

    methods to rank the results to provide the "best" results first. How a search engine decideswhich pages are the best matches, and what order the results should be shown in, varies widely

    from one engine to another. The methods also change over time as Internet usage changes and

    new techniques evolve. There are two main types of search engine that have evolved: one is a

    system of predefined and hierarchically ordered keywords that humans have programmed

    extensively. The other is a system that generates an "inverted index" by analyzing texts it

    locates. This second form relies much more heavily on the computer itself to do the bulk of the

    work.

    Most Web search engines are commercial ventures supported by advertising revenue and, as a

    result, some employ the practice of allowing advertisers to pay money to have their listings

    ranked higher in search results. Those search engines which do not accept money for their

    search engine results make money byrunning search related ads alongside the regular search

    engine results. The search engines make money every time someone clicks on one of these ads.

  • 7/31/2019 Internet Project Dheeraj

    11/16

    Intranet & Extranet

    Intranet

    An intranet is a computer network that uses Internet Protocol technology to securely share

    information within organizations. It is the connection of computer networks in a local area. The

    term is used in contrast to internet, a network between organizations, and instead refers to a

    network within an organization. Sometimes, the term refers only to the organization's

    internal website, but may be a more extensive part of the organization's information technology

    infrastructure. It may host multiple private websites and constitute an important component and

    focal point of internal communication and collaboration. Any of the well known Internet

    protocols may be found in an intranet, such as HTTP (web services), SMTP (e-mail),

    and FTP (file transfer protocol). Internet technologies are often deployed to provide modern

    interfaces to legacy information systems hosting corporate data.

    An intranet can be understood as a private analog of the Internet, or as a private extension of

    the Internet confined to an organization. The first intranet websites and home pages began to

    appear in organizations in 1996-1997. Although not officially noted, the term intranet first

    became common-place among early adopters, such as universities and technology corporations,

    in 1992.

    Intranets have also contrasted with extranets. While intranets are generally restricted to

    employees of the organization, extranets may also be accessed by customers, suppliers, or other

    approved parties. Extranets extend a private network onto the Internet with special provisions

    for authentication, authorization and accounting (AAA protocol).

    In many organizations, intranets are protected from unauthorized external access by means of a

    network gateway and firewall. For smaller companies, intranets may be created simply by

    using private IP ranges, such as 192.168.*.*. In these cases, the intranet can only be directly

    accessed from a computer in the local network; however, companies may provide access to off-

    site employees by using a virtual private network. Other security measures may be used, such

    as userauthentication and encryption.

    Alternatively, the intranet domain may be publicly accessible, but users would need to log in

    before they could view most of the content.

  • 7/31/2019 Internet Project Dheeraj

    12/16

    Extranet

    An extranet is a computer network that allows controlled access from the outside, for specific

    business or educational purposes. In a business-to-businesscontext, an extranet can be viewed

    as an extension of an organization's intranet that is extended to users outside the organization,

    usually partners, vendors, and suppliers, in isolation from all other Internet users. In

    contrast, business-to-consumer (B2C) models involve known servers of one or more

    companies, communicating with previously unknown consumer users. An extranet is similar to

    a DMZ in that it provides access to needed services for channel partners, without granting

    access to an organization's entire network.

    Relationship between Extranet & Intranet

    An extranet can be understood as an intranet mapped onto the public Internet or some othertransmission system not accessible to the general public, but managed by more than one

    company's administrator(s). For example, military networks of different security levels may

    map onto a common military radio transmission system that never connects to the Internet. Any

    private network mapped onto a public one is a virtual private network (VPN), often using

    special security protocols.

    For decades, institutions have been interconnecting to each other to create private networks for

    sharing information. One of the differences that characterizes an extranet, however, is that its

    interconnections are over a shared network rather than through dedicated physical lines. With

    respect to Internet Protocol networks,RFC 4364 states "If all the sites in a VPN are owned bythe same enterprise, the VPN is a corporate intranet. If the various sites in a VPN are owned by

    different enterprises, the VPN is an extranet. A site can be in more than one VPN; e.g., in an

    intranet and several extranets. We regard both intranets and extranets as VPNs. In general,

    when we use the term VPN we will not be distinguishing between intranets and extranets. Even

    if this argument is valid, the term "extranet" is still applied and can be used to eliminate the use

    of the above description."

    In the quote above from RFC 4364, the term "site" refers to a distinct networked environment.

    Twosites connected to each other across the public Internet backbone comprise a VPN. The

    term "site" does not mean "website." Thus, a small company in a single building can have an

    "intranet," but to have a VPN, they would need to provide tunneled access to that network forgeographically distributed employees.

    Similarly, for smaller, geographically united organizations, "extranet" is a useful term to

    describe selective access to intranet systems granted to suppliers, customers, or other

    companies. Such access does not involve tunneling, but rather simply an authentication

    mechanism to a web server. In this sense, an "extranet" designates the "private part" of

    a website, where "registered users" can navigate, enabled by authentication mechanisms on

    a "login page".

    An extranet requires network security.

  • 7/31/2019 Internet Project Dheeraj

    13/16

  • 7/31/2019 Internet Project Dheeraj

    14/16

    Information Technology

    Information Technology (IT) is concerned with technology to treat information. The

    acquisition, processing, storage and dissemination of vocal, pictorial, textual and numerical

    information by a microelectronics-based combination

    ofcomputing and telecommunications are its main fields.[1] The term in its modern sense first

    appeared in a 1958 article published in theHarvard Business Review, in which authors Leavitt

    and Whisler commented that "the new technology does not yet have a single established name.

    We shall call it information technology (IT).". Some of the modern and emerging fields of

    Information technology are next generation web technologies, bioinformatics, cloud

    computing, global information systems, large scale knowledgebases, etc. Advancements are

    mainly driven in the field ofcomputer science.

  • 7/31/2019 Internet Project Dheeraj

    15/16

    Data Warehousing Concept

    In computing, a data warehouse (DW) is a database used for reporting and analysis. The data

    stored in the warehouse is uploaded from the operational systems. The data may pass through

    an operational data store for additional operations before it is used in the DW for reporting.

    The typical data warehouse uses staging, integration, and access layers to house its key

    functions. The staging layer stores raw data, the integration layer integrates the data and moves

    it into hierarchal groups, and the access layer helps users retrieve data.

    Data warehouses can be subdivided into data marts. Data marts store subsets of data from a

    warehouse.

    This definition of the data warehouse focuses on data storage. The main source of the data is

    cleaned, transformed, catalogued and made available for use by managers and other business

    professionals for data mining, online analytical processing, market research and decision

    support (Marakas & O'Brien 2009). However, the means to retrieve and analyze data,

    to extract, transform and load data, and to manage the data dictionary are also considered

    essential components of a data warehousing system. Many references to data warehousing use

    this broader context. Thus, an expanded definition for data warehousing includes business

    intelligence tools, tools toextract, transform and load data into the repository, and tools to

    manage and retrieve metadata.

  • 7/31/2019 Internet Project Dheeraj

    16/16

    Advantages & Disadvantages of Data Warehouse

    A data warehouse maintains a copy of information from the source transaction systems. This

    architectural complexity provides the opportunity to:

    Maintain data history, even if the source transaction systems do not.

    Integrate data from multiple source systems, enabling a central view across the

    enterprise. This benefit is always valuable, but particularly so when the organization

    has grown by merger.

    Improve data quality, by providing consistent codes and descriptions, flagging or even

    fixing bad data.

    Present the organization's information consistently.

    Provide a single common data model for all data of interest regardless of the data's

    source.

    Restructure the data so that it makes sense to the business users. Restructure the data so that it delivers excellent query performance, even for complex

    analytic queries, without impacting the operational systems.

    Add value to operational business applications, notably customer relationship

    management (CRM) systems.

    Bibliography

    www.wikiepedia.com

    www.dogpile.com

    www.webopedia.com

    www.internet.com

    www.livinginternet.com

    www.iamai.in

    http://www.wikiepedia.com/http://www.dogpile.com/http://www.webopedia.com/http://www.internet.com/http://www.livinginternet.com/http://www.iamai.in/http://www.wikiepedia.com/http://www.dogpile.com/http://www.webopedia.com/http://www.internet.com/http://www.livinginternet.com/http://www.iamai.in/