Download as pdf or txt
Download as pdf or txt
You are on page 1of 30

UNIT-2

Fundamentals of E-commerce INTERNET


VI SEMESTER BBA

Prof. TRIPTI GOYAL


World Wide Web
World Wide Web (WWW), the Web, the leading information retrieval service of
the Internet. The Web gives users access to a vast array of documents that are
connected to each other by means of hypertext or hypermedia links—
i.e., hyperlinks, electronic connections that link related pieces of information in
order to allow a user easy access to them.

The Web operates within the Internet’s basic client-


server format; servers are computer programs that store and transmit documents
to other computers on the network when asked to, while clients are programs that
request documents from a server as the user asks for them. Browser software
allows users to view the retrieved documents.

The development of the World Wide Web was begun in 1989 by Tim Berners- https://www.britannica.com/topic/World-
Lee and his colleagues at CERN, an international scientific organization based in Wide-Web
Geneva, Switzerland. They created a protocol, Hyper Text Transfer Protocol (HTTP), https://home.cern/science/computing/birth-
which standardized communication between servers and clients. Their text-based web/short-history-
Web browser was made available for general release in January 1992. web#:~:text=Where%20the%20Web%20was%20
born,and%20institutes%20around%20the%20w
orld.
Web 1.0 Vs Web 2.0 Vs Web 3.0
The Web, formerly referred to as the World
Wide Web, is the pages/sites you see when
you log online. The Internet is a series of
interconnected computer systems the Web
This web version is sometimes called “the read- functions on, plus the medium allows files
only Web” because it lacks the necessary forms, and e-mails to travel along.
visuals, controls, and interactivity we enjoy on
today’s Internet.
This Internet form emphasizes User-Generated
Content (UGC), ease of use, interactivity, and
improved compatibility with other systems and
devices. Web 2.0 is all about the end user's
experience. Consequently, this Web form was
responsible for creating communities,
collaborations, dialogue, and social media. As a
result, Web 2.0 is considered the primary form of
web interaction for most of today's users.
If Web 1.0 was called “the read-only Web,” Web
2.0 is known as “the participative social Web.”
https://www.simplilearn.com/what-is-web-1-0-web-2-
It's a semantic web, where the web technology 0-and-web-3-0-with-their-difference-
evolves into a tool that lets users create, share, article#:~:text=Web%201.0%20is%20the%20%22read,
and connect content via search and analysis. It is towards%20decentralized%2C%20nearly%20anonymo
based on comprehension of words instead of us%20platforms.
numbers and keywords.
INTERNET
Internet is a global network that connects billions of computers across
the world with each other and to the World Wide Web. It uses standard
internet protocol suite (TCP/IP) to connect billions of computer users
worldwide.
It is set up by using cables such as optical fibers and other wireless and
networking technologies. At present, internet is the fastest mean of
sending or exchanging information and data between computers across
the world.
The internet is managed by ICANN (Internet Corporation for Assigned
Names and Numbers) located in the USA. It manages IP addresses
assignment, domain name registration, etc.

https://www.javatpoint.com/internet
TCP/IP
TCP/IP stands for Transmission Control Protocol/Internet Protocol. It is a set of protocols
or rules and procedures that governs communications among computers on the internet.
Although the entire internet protocol suite is commonly known as TCP/IP, it is one of the
core protocols of the Internet Protocol Suite. It was developed in 1978 and driven by Vint
Cerf and Bob Kahn.

TCP: The TCP allows applications to create channels of communications across a network.
It also allows a message to be divided into smaller packets before they are transmitted
over the internet and then assembled in the right manner at the destination address. So,
it ensures the reliable transmission of data across the network. Furthermore, it also
checks errors in the packets and requests for re-transmission if errors are found.

IP: The IP address tells the packets the address and route so that they reach the right
destination. It has a method that enables gateway computers on the internet-connected
network forward the message after checking the IPS address. It is like a line of workers
passing coal from a mine to a mining cart.
TCP/IP
TCP/IP, which is a standard layered protocol suite comprises a set of rules and
procedures, is divided into four layers, on the basis of their functionality. Each layer
has a specific protocol.

• The application layer: This layer includes all the protocols required to
communicate directly with the end-users. Some important protocols in this layer
include HTTP (Hypertext Transfer Protocol), FTP (File Transfer Protocol), SMTP
(Simple Mail Transfer Protocol), and the DHCP (Dynamic Host Configuration
Protocol).
• The transport layer: This layer ensures the transmission of the correct message or
data in proper order. It utilizes UDP (User Datagram Protocol) and TCP.
• The network access layer: It offers the functionalities to build and handle packets
of information.
• The internet layer: It performs two basic functions, routing and addressing by
using IP (Internet Protocol). It tells how the packets are to be sent to the
destination.
https://www.broadbandsearch.net/blog/who-invented-the-
internet-full-history
https://qz.com/1705375/a-complete-guide-to-the-evolution-of-the-
internet
Pros & Cons of Internet
INTERNET VS WWW
Internet WWW
The Internet allows you to link your The World Wide Web is a collection of
computer to any other computer on the information accessible through the
planet. Internet.
The Internet is a worldwide network of
The World Wide Web refers to HTML-
interconnected computer networks that
formatted online material that may be
connect devices using the TCP/IP
accessed using the HTTP protocol.
protocol.
The Internet can be compared to a The web can be considered as a store
large bookstore. with a collection of books.
The World Wide Web is a subset of
Internet is superset of WWW.
the Internet.

Tim Berners-Lee, an English scientist,


It first appeared in the late 1960s.
created the World Wide Web in 1989.

The Internet is mostly based on In comparison to the Internet, the


hardware. WWW is more software-oriented.
Hardware & Software Requirements for Internet

Hardware Requirement :
• To connect the Internet, any one of the following is mandatory.
• Modem is used to connect Internet through Telephone connection.
• NIC- Network Interface Card(wired/ wireless) facility is the most important hardware required to connect
Internet.
For example, the Laptop can be connected Internet through the wired/wireless.
• Dongle is used to connect the Internet using cellular network
Wi-Fi router or Hotspot is used to connect the Internet using wireless network
• Electronic device which supports cellular network
• Internet Connectivity such as Dial-up connection, ISDN, DSL, Cable TV, wired and wireless (Cellular)
Network.
Software Requirement
• The operating system should support TCP (Transfer Control Protocol) / IP (Internet Protocol), SMTP
(Simple Mail Transfer Protocol), FTP (File Transfer Protocol), HTTP (Hyper Text Transfer Protocol) and HTTPS
(Hyper Text Transfer Protocol Secured) protocols.
• Browsers and other Internet clients access to the web applications such as Outlook, Gmail, Whatsapp,
Facebook, Twitter and etc.
Dial-up Connection

A dial-up connection is established when two or more data


communication devices use a Public Switched Telephone Network (PSTN)
to connect to an Internet Service Provider (ISP) from computers. Many
remote locations depend on Internet dial-up connections because
broadband and cable are rare in remote areas with low population.
Internet Service Providers often provide dial-up connections, a feasible
alternative for budget-conscious subscribers.
H: a computer, a modem and a telephone line
S: Communication software, web browser, FTP

• Less expensive
• Requires very modest hardware and software resources.
• Low Speed
• Low Reliability
E-mail
E-mail is defined as the transmission of messages on the
Internet. It is one of the most commonly used features over
communications networks that may contain text, files, images,
or other attachments. Generally, it is information that is stored
on a computer sent through a network to a specified individual
or group of individuals.

Email messages are conveyed through email servers; it uses


multiple protocols within the TCP/IP suite. For example, SMTP
is a protocol, stands for simple mail transfer protocol and used
to send messages whereas other protocols IMAP or POP are
used to retrieve messages from a mail server. If you want to
login to your mail account, you just need to enter a valid email
address, password, and the mail servers used to send and https://www.javatpoint.com/e-
receive messages. mail
HTTP
The Hypertext Transfer Protocol (HTTP) is the foundation of the World Wide Web, and
is used to load webpages using hypertext links. HTTP is an application layer protocol
designed to transfer information between networked devices and runs on top of other
layers of the network protocol stack. A typical flow over HTTP involves a client
machine making a request to a server, which then sends a response message.
• It is a protocol used to access the data on the World Wide Web (www).
• The HTTP protocol can be used to transfer the data in the form of plain text,
hypertext, audio, video, and so on.
• This protocol is known as HyperText Transfer Protocol because of its efficiency that
allows us to use in a hypertext environment where there are rapid jumps from one
document to another document.
• HTTP is similar to the FTP as it also transfers the files from one host to another host.
But, HTTP is simpler than FTP as HTTP uses only one connection, i.e., no control
connection to transfer the files.
• HTTP is similar to SMTP as the data is transferred between client and server. The
HTTP differs from the SMTP in the way the messages are sent from the client to the
server and from server to the client. SMTP messages are stored and forwarded
while HTTP messages are delivered immediately.
HTTP vs. HTTPS https://www.techtarget.com/whatis/definition/HTTP-
Hypertext-Transfer-Protocol

HTTPS is the use of Secure Sockets Layer or Transport Layer Security (TLS) as a sublayer under regular HTTP
application layering. HTTPS encrypts and decrypts user HTTP page requests as well as the pages that are returned by
the web server. It also protects against eavesdropping and man-in-the-middle attacks. HTTPS was developed
by Netscape. Migrating from HTTP to HTTPS is considered beneficial, as it offers an added layer of security and trust.

HTTP status codes


In response to HTTP requests, servers often issue response codes, indicating the request is being processed, there
was an error in the request or that the request is being redirected. Common response codes include:
200 OK. This means that the request, such as GET or POST, worked and is being acted upon.
300 Moved Permanently. This response code means that the URL of the requested resource has been changed
permanently.
401 Unauthorized. The client, or user making the request of the server, has not been authenticated.
403 Forbidden. The client's identity is known but has not been given access authorization.
404 Not Found. This is the most frequent error code. It means that the URL is not recognized or the resource at the
location does not exist.
500 Internal Server Error. The server has encountered a situation it doesn't know how to handle.
FTP
• FTP stands for File transfer protocol.
• FTP is a standard internet protocol provided by TCP/IP used for transmitting the files from one host to another.
• It is mainly used for transferring the web page files from their creator to the computer that acts as a server for other
computers on the internet.
• It is also used for downloading the files to computer from other servers.
• Although transferring files from one system to another is very simple and straightforward, but sometimes it can
cause problems. For example, two systems may have different file conventions. Two systems may have different
ways to represent text and data. Two systems may have different directory structures. FTP protocol overcomes these
problems by establishing two connections between hosts. One connection is used for data transfer, and another
connection is used for the control connection.

There are two types of connections in FTP:

Control Connection: The control connection uses very simple rules for communication. Through control connection, we
can transfer a line of command or line of response at a time. The control connection is made between the control
processes. The control connection remains connected during the entire interactive FTP session.

Data Connection: The Data Connection uses very complex rules as data types may vary. The data connection is made
between data transfer processes. The data connection opens when a command comes for transferring the files and
closes when the file is transferred.
FTP
Advantages of FTP:
• Speed: One of the biggest advantages of FTP is speed. The FTP is one of the fastest way to transfer the files from one computer
to another computer.
• Efficient: It is more efficient as we do not need to complete all the operations to get the entire file.
• Security: To access the FTP server, we need to login with the username and password. Therefore, we can say that FTP is more
secure.
• Back & forth movement: FTP allows us to transfer the files back and forth. Suppose you are a manager of the company, you
send some information to all the employees, and they all send information back on the same server.

Disadvantages of FTP:
• The standard requirement of the industry is that all the FTP transmissions should be encrypted. However, not all the FTP
providers are equal and not all the providers offer encryption. So, we will have to look out for the FTP providers that provides
encryption.
• FTP serves two operations, i.e., to send and receive large files on a network. However, the size limit of the file is 2GB that can be
sent. It also doesn't allow you to run simultaneous transfers to multiple receivers.
• Passwords and file contents are sent in clear text that allows unwanted eavesdropping. So, it is quite possible that attackers can
carry out the brute force attack by trying to guess the FTP password.
• It is not compatible with every system.
TELNET
• Telnet is a network protocol used on the Internet or Local Area Network (LAN) connections.
• Telnet is one of the earliest remote login protocols that enables remote terminal access to a host computer.
• A Telnet program allows a user on one system to log in to a remote system and issue commands in a
command window of the remote system.
It used as a standard TCP/IP protocol for virtual terminal service which is provided by ISO.
• The computer which starts the connection is known as the local computer. The computer which is being
connected to i.e. which accepts the connection known as the remote computer.
• During telnet operation, whatever is being performed on the remote computer will be displayed by the local
computer. Telnet operates on client/server principle. The local computer uses telnet client program and the
remote computers uses telnet server program.
URL
A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the Internet. It is also referred to as a web
address. URLs consist of multiple parts -- including a protocol and domain name -- that tell a web browser how and where to
retrieve a resource.
End users use URLs by typing them directly into the address bar of a browser or by clicking a hyperlink found on a webpage,
bookmark list, in an email or from another application.

How is a URL structured?


The URL contains the name of the protocol needed to access a resource, as well as a resource name. The first part of a URL
identifies what protocol to use as the primary access medium. The second part identifies the IP address or domain name -- and
possibly subdomain -- where the resource is located.
URL protocols include HTTP (Hypertext Transfer Protocol) and HTTPS (HTTP Secure) for web resources, mail to for email
addresses, FTP for files on a File Transfer Protocol (FTP) server, and telnet for a session to access remote computers. Most URL
protocols are followed by a colon and two forward slashes; "mail to" is followed only by a colon.
Optionally, after the domain, a URL can also specify:
• a path to a specific page or file within a domain;
• a network port to use to make the connection;
• a specific reference point within a file, such as a named anchor in an HTML file; and
• a query or search parameters used -- commonly found in URLs for search results.
Parts of a URL:
Using the URL https://www.techtarget.com/whatis/search/query?q=URL as an example, components of a URL can include:

• The protocol or scheme. Used to access a resource on the internet. Protocols include http, https, ftps, mailto and file. The
resource is reached through the domain name system (DNS) name. In this example, the protocol is https.
• Host name or domain name. The unique reference the represents a webpage. For this example, whatis.techtarget.com.
• Port name. Usually not visible in URLs, but necessary. Always following a colon, port 80 is the default port for web servers,
but there are other options. For example, :port80.
• Path. A path refers to a file or location on the web server. For this example, search/query.
• Query. Found in the URL of dynamic pages. The query consists of a question mark, followed by parameters. For this
example, ?.
• Parameters. Pieces of information in a query string of a URL. Multiple parameters can be separated by ampersands (&). For
this example, q=URL.
• Fragment. This is an internal page reference, which refers to a section within the webpage. It appears at the end of a URL
and begins with a hashtag (#). Although not in the example above, an example could be #history in the URL
https://en.wikipedia.org/wiki/Internet#History.
• The URL mailto:president@whitehouse.gov initiates a new email addressed to the mailbox president in the domain
whitehouse.gov.
• The URL ftp://www.companyname.com/whitepapers/widgets.ps specifies the use of the FTP protocol to download a file.
What is an intranet?
INTRODUCTION

Intranet is a secure and private communication network Examples of intranets


within an organization that supports internal employee • A company wiki where employees can find
workflows like sharing information. documents for work assignments
The intranet is designed for communication, documentation, • An internal social network that fosters
and socializing. It functions as the central access point for personal relationships and prevents feelings of
both external and internal resources that enable your isolation at work
employees to work efficiently. • A collaborative workspace where employees
The intranet is part of the internet. As opposed to a public work together on projects
entity, it is a private internal wiki owned by a single • An employee onboarding platform to train
organization. There is robust firewall security that prevents new hires and help them onboard at their own
unauthorized users from accessing the network. pace
• Updated internal knowledge base to keep
employees on the same page with expert-
verified information
How does an intranet work?
INTRODUCTION

Similar to the internet, an intranet runs on the TCP/IP


protocol. The computers on an intranet also have unique IP
addresses for location identity.
In the past, you could only connect to intranets via Wide Area
Networks (WAN) and Local Area Networks (LAN) with a
physical location. Thanks to modern intranet CMS, more
companies are opting for cloud-based solutions that allow
remote employees to connect wirelessly to a company’s
intranet and enjoy features such as search engines, blogs,
mobile applications, and cloud collaboration.

https://www.hyperoffice.com/blog/2018/06/20/intranet-examples/
What is an extranet?
INTRODUCTION

An extranet is a subsection of a company’s intranet. Similar to


an intranet, it is a controlled private network where vendors,
partners, and authorized customers can access information
from a company’s intranet.

The term extranet became popular in the early 2000s when


several organizations used it to describe a central repository
of shared data that is only accessible to authorized members
of specific workgroups.

Since the extranet is structured like an intranet, it relies on IP


and TCP for data exchange. Extranets also have security
features such as firewalls and password-protected login
details to prevent unauthorized access.
Examples of extranets
INTRODUCTION

• A distribution network to maintain communication


between suppliers and distributors
• A central collaboration tool for a franchise to communicate
across numerous locations.
• Cross collaboration across government agencies
• Ecommerce site integration to exchange inventory data via
a secure network
• A project management tool where a project manager can
share documents and contracts with subcontractors and
other stakeholders
• A board portal where members of an association can
access meeting minutes and board documents
• Onboarding documents for subcontractors or freelance https://www.glasscubes.com/what-is-extranet/
hires who do not have access to your employee intranet https://www.claromentis.com/blog/five-ways-the-
extranet-can-boost-your-business/
INTERNET, INTRANET & EXTRANET
INTERNET, INTRANET & EXTRANET
SEARCH ENGINES
A search engine is a coordinated set of programs that
searches for and identifies items in a database that
match specified criteria. Search engines are used to
access information on the World Wide Web.
• Identify Web pages that match queries based on
one or more techniques
• Keyword indexes, page ranking

• Also serve as:


• Shopping tools
• Advertising vehicles (search engine marketing)
• Tool within e-commerce sites

• Outside of e-mail, most commonly used Internet


activity
SEARCH ENGINE PROCESS
Crawling. Crawlers discover what pages exist on the web. A
search engine constantly looks for new and updated pages
to add to its list of known pages. This is referred to as URL
discovery. Once a page is discovered, the crawler examines
its content.
Indexing. After a page is crawled, the textual content is
processed, analyzed and tagged with attributes that help
the search engine understand what the content is about, to
weed out duplicate pages and collect signals about the
content, such as the country or region the page is local to
and the usability of the page.
Searching and ranking. When a user enters a query, the
search engine searches the index for matching pages
and returns the results that appear the most relevant on
the search engine results page (SERP).
The engine ranks content on a number of factors, such as
the authoritativeness of a page, back links to the page and
keywords a page contains.
INTERNET, INTRANET & EXTRANET
HOW GOOGLE WORKS
Thank You

You might also like